🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

DOC-20240628-WA0010..pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Transcript

Arab American University Faculty of Engineering and Information Technology COMPUTER SKILLS Prepared By Computer Science Department Prof. Mohammad Awad Dr. Rami Hodrob Dr. Mohammed Maree...

Arab American University Faculty of Engineering and Information Technology COMPUTER SKILLS Prepared By Computer Science Department Prof. Mohammad Awad Dr. Rami Hodrob Dr. Mohammed Maree Dr. Ahmad Ewais Mr. Ra‘fat Amarneh 2020 Table of Contents Title Page# Chapter 1(Introduction to Computers) ……………………………………………………..2 Introductions ………………………………………………………………………………………………….2 How Computer Work ………………………………………………………………………………………....3 Computer Generations ……………………………………………….……………………………………….4 Modern Computer Applications ……………………………………………………………………………...6 Chapter 2 (Internet and E-Learning) ………………………………………………………………...……...9 Computer Network ……………………………………………………………………………………….…...9 Internet ……………………………………………………………………………………………..………..10 E-Lerning …………………………………………………………………………………………………....14 E-Learning Platforms ……………………………………………………………………………………..…17 Advantages of E-Learning ……………………………………………………………………………..……19 How to Use Model ………………………………………………………………………………………..…19 How to Use Zoom ………………………………………………………………………………………..….33 How to Access University Email ………………………………………………………………………..…..41 Chapter 3 (Computer Hardware) ………………………………………………………………………..….44 Introduction …………………………………………………………………………………….....................44 Computer Input ………………………………………………………………………………………...……45 Computer Output …………………………………………………………………………………………....51 Processing Devices ……………………………………………………………………………………….....54 Storage ………………………………………………………………………………………………...…….60 Chapter 4 (Computer Software) …………………………………………………………………………….72 Introduction ………………………………………………………………………………………………….72 Types of Computer Software ………………………………………………………………………………..72 Categories of Software ………………………………………………………………………………………75 Obtaining Software ………………………………………………………………………………………….76 File System ………………………………………………………………………………………………….77 Viruses and Malware ………………………………………………………………………………………..78 Chapter 5 (Applied Lab Material) ………………………………………………………………………….81 Microsoft Windwos …………………………………………………………………………………………81 Microsoft Word ………………………………………………………………………………………….…..82 Microsoft Excel ……………………………………………………………………………………….……..84 Microsoft PowerPoint ……………………………………………………………………………………… 85 1 Chapter One Introduction to Computers 1.1 Introduction Digital Literacy is a life skill. Computers, Information, and Communication Technologies have changed the world more than any other invention over the past one hundred years. Today‘s world is an information-rich and it has become a necessity for everyone to know about computers. Figure 1.1 Digital world A computer is an electronic data processing device, which: 1. Accepts and stores data input, 2. Processes the data input. 3. Generates the output in a required form. Figure 1.2 Computer Functions  Functionalities of a Computer Any digital computer carries out the following four functions Step 1 − Takes data as input. Step 2 − Stores the data/instructions in its memory and uses them as required. Step 3 − Processes the data and converts it into useful information. Step 4 − Generates the output. Figure 1.3 Computer Functions 2  Data vs. Information - Data is a representation of a fact or idea such as Numbers, Words, Pictures, Sounds. - Information is data that has been organized or presented in a meaningful manner.  Advantages of Computers The following are certain advantages of computers:  High Speed  Accuracy  Storage Capability  Reliability  Automation  Reduction in Paper Work and Cost Figure 1.4 Advantages of Computers  Disadvantages of Computers The following are certain disadvantages of computers:  Can limit learning and create a dependency.  The potential loss of privacy.  Time consumption and lots of distractions.  No I. Q. (Intelligence Quotient) 1.2 How Computers Work? It is important to remember that computers are not "smart" in the way that we think of the word. That is, they do not "think" as people do. However, they are extremely complex and very fast and run on cleverly designed programs, so they give the impression of being "smart." Figure 1.5 Smart Computing 3 Switches in computers are used to express numbers. If a switch is a "1," it reads as "TRUE." If the switch is a "0," it reads as "FALSE." This uses only two digits, a 0 and a 1, which is referred to as binary counting. The switch that controls the on-off in the computer is called Transistor, the transistor is used to design the integrated circuit IC, which is designed for the microprocessors, now known as CPUs. Figure 1.5 Transistors and ICs 1.3 Computer Generations and Types. There are five computer generations known to date. Table 1.1 Computers Generations Figure 1.6 Computer Generations 4 Some Types of Computer Systems 1. Wearable devices:  Google smartwatches and Apple Watch.  Smart glasses, Figure 1.7 Wearable Devices 2. Smartphone 3. Tablet 4. Hybrid Tablets 5. Ultrabook 6. Laptop (Notebook) 7. All-in-One ("AIO") 8. Desktop Figure 1.8 Computer Devices 9. Workstation: Is a middle-range machine between a mainframe and a PC. Used for scientific & engineering applications. Figure 1.9 Workstations 5 10. Mainframe: This is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously. Figure 1.10 Mainframe 11. Supercomputer:  Is the fastest, most powerful computer  The most expensive.  The fastest supercomputers are capable of processing more than one quadrillion instructions in a single second.  Used in technical areas that deal with large numbers such as in weather forecasting. Figure 1.11 Supercomputers 1.4 Modern Computer Applications:  Business A computer has become an integrated part of all business organizations. The computer is used in business organizations for:  Budgeting  Sales analysis  Financial forecasting  Managing employee database  Banking Today, banking is almost totally dependent on computers. Banks provide the following facilities − 6  Online accounting facility, which includes checking current balance, making deposits and overdrafts, checking interest charges, shares, and trustee records.  ATMs that are completely automated are making it even easier for customers to deal with banks.  Education The computer helps in providing a lot of facilities in the education system.  The computer provides a tool in the education system known as CBE (Computer Based Education).  CBE involves control, delivery, and evaluation of learning.  Computer education is rapidly increasing the graph for many computer students.  There are several methods in which educational institutions can use a computer to educate the students.  Marketing In marketing, uses of the computer are the following −  Advertising − With computers, advertising professionals create art and graphics, write and revise copy, and print and disseminate ads to sell more products.  Home Shopping − Home shopping has been made possible through the use of computerized catalogs that provide access to product information and permit direct entry of orders to be filled by the customers.  Healthcare Computers have become an important part of hospitals, labs, and dispensaries. They are being used in hospitals to keep the record of patients and medicines. It is also used in scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT scans, etc. are also done by computerized machines.  Diagnostic System − Computers are used to collect data and identify the cause of illness.  Lab-diagnostic System − All tests can be done and the reports are prepared by computer.  Patient Monitoring System − These are used to check the patient's signs of abnormality such as in Cardiac Arrest, ECG, etc.  Pharma Information System − The computer is used to check drug labels, expiry dates, harmful side effects, etc.  Surgery − Nowadays, computers are also used in performing surgery.  Engineering Design Computers are widely used for engineering purpose. Some of the fields are −  Structural Engineering − Requires stress and strain analysis for the design of ships, buildings, budgets, airplanes, etc.  Industrial Engineering − Computers deal with design, implementation, and improvement of integrated systems of people, materials, and equipment.  Architectural Engineering − Computers help in planning towns, designing buildings, determining a range of buildings on a site using both 2D and 3D drawings. 7  Communication Communication is a way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is meant. Some main areas in this category are −  E-mail  Chatting  Usenet  FTP  Telnet  Video-conferencing  Government Computers play an important role in government services. Some major fields in this category are  Budgets  Sales tax department  Income tax department  Computation of the male/female ratio  Computerization of voters lists  Computerization of PAN card  Weather forecasting 8 Chapter Two Internet and E-learning 2.1 Computer Network A computer network is a group of two or more computer systems linked together. Computers on a network are sometimes called nodes. Computer networks are used to exchange data using shared resources such as printers, CD-ROM, and files. Benefits of computer networks  Resource sharing.  Time-saving  Communication. Figure 2.1 Computer Network 2.1.1 Data Communication Hardware  Data communication hardware is used to transmit digital information between computers or between computers and other computers or nodes.  hardware devices are needed as: 1. Network Adapter Card (NIC) or Modem. ◦ NIC enables and controls the exchange of data between the nodes in a LAN. ◦ Modem: modulate demodulate. Digital to analog to digital. 2. Cables for a wired connection. 3. Telephone line, satellite, hub, or switch. Figure 2.2 NIC (Network Interface Card) 2.1.2 Networks Classification  Local Area Networks (LANs): located in single buildings or campuses.  Wide Area Networks (WANs): WANs cover a large geographical area, and connect cities and countries 2.1.3 Transfer media  Wireless Communication:  Wireless signals are electromagnetic waves, which can travel through the vacuum of outer space and media such as air.  No physical medium is necessary for wireless signals Figure 2.3 Wireless Device Wired Communication: Used cables to transfer data such as fiber optics Figure 2.4 Fiber Cable and Network Connector 9 2.2 Internet 2.2.1 What is the Internet? - The internet is a global network of computers that works much like the postal system. The internet enables computers to send one another small packets of digital data. Internet is a worldwide collection of interconnected networks. - The Internet has no central computer that controls it. - To avoid conflict between internet addresses an organization founded by the US National Foundation of science is responsible for regulating the internet like registering unique domain names. 2.2.2 How it works Internet data packets carry different types of data for different applications. Common types include web pages, email messages, and large files that might be digital videos, music files or computer programs. Today, the web is often used to provide an easy-to-use interface for numerous applications, including email, file transfer, Usenet newsgroups, and messages (Internet Relay Chat). 2.2.3 Internet Connection The Internet connection can be established via one of the following: - Connection Information Service Gateway.  Connect via an Internet Service Provider (ISP): ISP: is a company that provides individuals and organizations with access to the internet.  Dial-up connection: using a modem and telephone line. (very slow about 56Kbps) - Network connection:  Via LAN that connected to the internet such as ADSL (Asymmetric Digital Subscriber Line). 2.2.4 Internet Protocol (IP) Protocol: a set of rules and signals used when computers of the networks communicate. Example: TCP/IP (Transmission Control Protocol/ Internet Protocol) TCP/IP Protocol: - TCP/IP is a communication protocol that permits data transmission over the internet. - The software for this protocol comes with the system as windows. - Each message sent is divided into packets. The packet is a piece of a message transmitted over the network. Each packet contains the source address, a destination address, and the data. 2.2.5 Internet Browser - Application software that presents you with a Graphical User Interface (GUI) for searching, viewing, and managing information over any network. - Examples: Internet Explorer and Netscape Communicator. 2.2.6 Domain Name - Each computer on the internet is identified by its unique numeric address which consists of 4 numbers separated by dot with no spaces. Example: 185.37.12.6 - the IP of the computer is not easy to remember then alphanumeric addresses are used as www.aaup.edu 10 - to translate Internet addresses to their numeric values there is a server called DNS (Domain Name Server) is used. This is a program (software) that runs on the computer server of LAN.\  Domain Types: - com: commercial - edu: educational - gov: government - org: organization - net: network. - Info: information - Ps, jo, fr, us, UK: National Domains Figure 2.5 URL  URL: (Uniform Resource Locator) - consists of the access method (HTTP, FTP) followed by a colon, double slashes, domain name, domain type, and any path to the page domain. 2.2.7 Email Address - Consists of two parts separated by @. - Example: user_name@domain_name.domain _type [email protected] Google Derive steps:  After creating google E-mail go to:  Upload or create files  Share and organize files Figure 2.6 Gmail and Google Drive 2.2.8 Web Search Engines All of us use search engines, most of us daily. Even so, most people don't know how to search. This section will teach you some powerful new about using Google in particular.(www.google.com).  Basic Search Figure 2.7 Basic Search 11  Search at Specific Time Figure 2.8 Specific Search  Advanced Search Google offers an Advanced Search Page with many of these options: Figure 2.9 Advanced Search 12  Search using Google Scholar Figure 2.10 Google Scholar 13 2.3 E-learning1 2.3.1 Definitions E-learning:2 A learning system based on formalized teaching but with the help of electronic resources is known as E-learning. While teaching can be based in or out of the classrooms, the use of computers and the Internet forms the major component of E-learning. E-learning can also be termed as a network- enabled transfer of skills and knowledge, and the delivery of education is made to a large number of recipients at the same or different times. E-learning or Electronic learning it is a learning method that is facilitated and supported via information and communication technology (ICT). Figure 2.10 E-learning Distance Learning: 3 Is a method of study where teachers and students do not meet in a classroom but use the internet, e- mail, etc., to have classes. This means that students learn remotely and do not have face-to-face learning with instructors or other students. Figure 2.11 Distance Learning Blended Learning:4 Blended learning is an approach to education that combines online educational materials and opportunities for interaction online with traditional place-based classroom methods. It requires the physical presence of both teacher and student, with some elements of student control over time, place, path, or place. Figure 2.12 Blended Learning 1 https://moodle.aaup.edu/course/view.php?id=7980 2 https://economictimes.indiatimes.com/definition/e-learning 3 https://www.uopeople.edu/blog/what-is-distance-learning/ 4 https://en.wikipedia.org/wiki/Blended_learning 14 Flipped Classroom Learning:5 A flipped classroom is an instructional strategy and a type of blended learning focused on student engagement and active learning, giving the instructor a better opportunity to deal with mixed levels, student difficulties, and differentiated learning preferences during the in-class time. It moves activities, including those that may have traditionally been considered homework, into the classroom. In a flipped classroom, students watch online lectures, collaborate in online discussions, or carry out research at home while engaging in concepts in the classroom with the guidance of a mentor. Figure 2.13 Flipped Classroom Learning Mobile Learning:6 Mobile learning (m-learning) is education via the Internet or network using personal mobile devices, such as tablets and smartphones to obtain learning materials through mobile apps, social interactions, and online educational hubs. It is flexible, allowing students access to education anywhere, anytime. Mobile learning provides a way for educational institutions to deliver knowledge and educational content to students on any platform, anyplace, and at the time of need. Students use mobile apps and tools to complete and upload assignments to teachers, download course instruction, and work in online social groups to complete tasks. Figure 2.14 Mobile Learning 5 https://en.wikipedia.org/wiki/Flipped_classroom 6 https://www.webopedia.com/TERM/M/mobile-learning-m-learning.html 15 MOOCs and examples (Coursera, udacity, etc.):7 MOOCs (Massive Open Online Course) are online courses with video content. They enable large numbers of participants to learn from top universities around the world. This is what you need to know about MOOCs. The most important MOOC platforms are: Coursera: Largest MOOC platform worldwide, over 20 million course participants. Many high-quality courses were created by the universities of Stanford, Princeton, Yale, London, Munich, Zurich, and many more. edX: Second largest MOOC platform, around 10 million learners. High-quality content from Harvard, MIT, Berkeley, and Oxford, among others. Udacity: Created as a MOOC platform at Stanford. Now mostly programming courses in cooperation with industry partners such as Google, Facebook, or Daimler. Course topics include artificial intelligence and self-driving cars. FutureLearn: Largest European MOOC platform (UK-based). Includes various British and European universities; however, courses are sometimes shorter in duration. Figure 2.15 MOOCs 7 https://www.edukatico.org/en/report/mooc-massive-open-online-course-the-key-facts 16 2.3.2 E-learning Platforms Moodle8: Is a learning platform designed to provide educators, administrators, and learners with a single robust, secure, and integrated system to create a personalized learning environment. It delivers a powerful set of cross-platform learner-centric tools and collaborative learning environments that empower both teaching and learning. Figure 2.16 Moodle’s cross-platform interface Blackboard9: Is a Learning Management System (LSM) that provides powerful, yet simple tools and workflows that help learners and instructors stay organized, easily take action, and engage with content and each other. It provides a design and architecture approach that enables a seamless user experience across a broad set of capabilities that will continue to evolve, in addition to a wide range of services that aim at driving academic effectiveness and learner engagement to enable continuous improvement through education insights. Figure 2.17 Blackboard cross-platform interface 8 https://moodle.org/ 9 https://www.blackboard.com/ 17 Canvas10: Is an open and reliable web-based software that allows institutions to manage digital learning, educators to create and present online learning materials and assess student learning, and students to engage in courses and receive feedback about skill development and learning achievement. It includes a variety of built-in course construction and management tools that can be customized to create unique and accessible teaching and learning experiences. In Canvas, administrative users are called Admins. Admins oversee and manage an institution's Canvas account, or they may oversee and manage a sub-account within an institution‘s Canvas account. Figure 2.18 Canvas Learning Management Platform Google Classroom11: Is a free web service developed by Google for schools that aims to simplify creating, distributing, and grading assignments. The primary purpose of Google Classroom is to streamline the process of sharing files between teachers and students. It integrates docs, sheets, slides, Gmail, and calendar into a cohesive platform to manage student and teacher communication. Figure 2.19 Interface of Google Classroom App 10 https://www.instructure.com/canvas/ 11 https://classroom.google.com/ 18 2.3.3 Advantages of e-learning12  saves time and money: As e-learning is conducted online, your learners can access teaching and learning content anywhere and anytime. Learners don‘t requisite to take time out from their homes in up normal situations such as COVID 19 or jobs to join classes. E-learning is also cost-effective where learners and instructors save a considerable amount on travel and accommodation costs.  leads to better retention: learners nowadays prefer interactive content where they would watch a video or listen to a podcast rather than read through pages of a manual.  E-learning is consistent: e-learning delivers consistent and standardized training every time where each learner encounters the same experience irrespective of when and where he or she takes the course.  E-learning is scalable: it is a one-time investment and it encounters as many learners you need. The more learners take the course, the faster you can recover the expense.  E-learning offers personalization: e-learning makes it possible to satisfy individual needs. It lets learners select their learning track and direct at their own pace. 2.4 How to use Moodle: 2.4.1. Log in to Moodle and View Courses: You can access the AAUP Moodle platform following the URL link: https://moodle.aaup.edu/?lang=en Figure 2.20 The main page of AAUP-Moodle stage 12 https://trainingindustry.com/articles/e-learning/5-advantages-of-e-learning/ 19 To log in to the Moodle platform by clicking on the (Login) at the top right of the screen. Then you will be redirected to the login page. After that, you have to enter your user name and password the same that you are using to log in to the portal. Figure 2.21 Login page After that, you will be redirected to the main page of your Moodle account. Figure 2.22 the main page of user Moodle account 20 The list of courses that recently accessed by the student: Figure 2.23 Recently accessed courses list The list of all courses that the student enrolled in the current semester: Figure 2.24 All courses list To change the course view language by using the language menu on the left top of the main screen: Language menu 21 Calendar page: to know dates of the upcoming events, exams, and assignments due dates. Figure 2.25 Calendar page Message Page: You can access the message page by clicking on the Message icon ( ) on the right top of the main page. Figure 2.26 Message page 22 2.4.2 View Course Activities: To access the activities on a specific course you have to open the course main page by clicking on the course name and it will be displayed as follows: Figure 2.27 Course icon Then you will be redirected to the course main page which includes all activities and learning resources. Figure 2.28 Course main page Some of Moodle activities icons:  Quiz (exam)  Assignment ( )  Zoom Meeting ( )  URL link ((  File ( )  Questionnaire ( )  Announcement ( )  Forum ( )  Chat ( ) 23 2.4.3 Assignment Activities: To access the assignment on the course page by clicking on the assignment icon on the course main page ( ): Figure 2.28 Assignment Activity on the course page Then the student will be redirected to the assignment page as follow: Figure 2.29 Assignment Details Page  Assignment attached file ( ): This file includes questions of the assignment to be answered.  Submission status( ): it describes if there is a submission or not.  Grading status ( ): This displays if the instructor has graded the assignment or not yet.  Due Date ( ): the last date (deadline) to submit the assignment. 24  Time Remaining ( ): This shows the number of hours till the assignment deadline.  Last modified ( ): the date of the last modification to the assignment done by the student.  Add submission ( ): to submit a student‘s answer, click on the submit button ( ), then the student will be redirected to the submission page as follow: Figure 2.30 Assignment submission page  The maximum number of files that students can submit ( ).  Maximum size of files that students can submit ( ).  Types of files that student can submit ( )  To upload the answer file by clicking on the icon ( ). Figure 2.31 Upload page 25 To upload the answer file: 1. Chose the Upload file option ( ). 2. Then click on the chose file ( ). 3. Then upload the file by clicking on ( ) Figure 2.32 Upload File 4. After the upload process complete, save the file by clicking on ( ). Figure 2.33 Assignment submission page after uploading the attempt 26 5. The answer file will be saved as a draft ( ), which means a student can edit or change his answer before the deadline. 6. To edit or change the draft submission, choose the edit submission button ( ). 7. Remove the draft answer file by using the remove submission button ( ). 8. To submit the answer file and change the submission status form draft (not submitted) to submit, click on the Submit assignment button ( ), then this message will appear to confirm the submission and to notify the student that he will not be able to make any changes on the attempt. 9. After the confirmation of the submission, the student has to press the continue button ( ). After submitting the assignment, the submission status will be changed to green color as shown in the next figure. Figure 2.34 The assignment page after the submission 27 4.4. Quizzes and Exams Activities: 1. First, the student needs to access the exam page by clicking on the exam icon ( ) on the course page. Figure 2.35 Exam start attempt page 1. Attempts allowed ( ): number of attempts that students can do. 2. This quiz opens at ( ): date and time when students can start the attempt (start answering the quiz‘s activities). 3. This quiz closes at ( ): date and time to close the quiz. 4. Time limit ( ): time that will give to the student to complete the attempt. 5. To start the attempt by using the button ( ) then click on ( ). Figure 2.36 Start attempt window 28 Figure 2.37 Exam (quiz) page  Question text and chooses:  Time left to close the exam (quiz) ( ).  Move to the next question ( ).  Move between questions using question icon:  Icon of the answered question ( ).  Icon of the non-answered question ( ).  Students can put a flag on the question using this button ( ).  Icon of the flagged question ( ).  To remove the flag ( ).  To finish the attempt ( ) 29 Figure 2.38 Answers summary  Return to the exam by using the button ( ).  Submit the attempt ( ). - This message to inform the student that he will not be able to change the answers. - To submit and finish by using the button ( ). Figure 2.39 Exam page after the submission 30 2.4.5. Communicate with teachers via Moodle:  Using the participant icon ( ) on the course page, the student can view the list of participants. Figure 2.40 Participant page  Select the role teacher ( ) to get the teacher contacts. 31  Click on the teacher name ( ). Figure 2.41 User profile  to send message to the instructor by using message icon ( ) f 32 2.5 How to use Zoom? 2.5.1 Login to Zoom using AAUP account  In the beginning, you need to go to the Zoom website by following the link: https://zoom.us/ Figure 2.42 Zoom Main Page  Then on the right, you can find the Resources list, click on it and then choose ―Download Zoom Client‖  Click on Download 33  Then open the file that you downloaded and wait for it to be saved. Figure 2.43 Zoom Download 34  Click on ―Sign In‖ to Activate Account. Figure 2.44 Login Page  Next for verification, please confirm your date of birth. Then click the CONTINUE button.  Fill Your Email Address (like [email protected] ) and then click Sign Up. Figure 2.45 Sign Up 35  A message will be sent to your AAUP email to activate your Zoom account.  Now, to access your AAUP Webmail, enter the AAUP website: https://www.aaup.edu/ and click on QUICK LINKS ->Webmail as shown in the next figure. Figure 2.46 Quick Links  Student can log in directly to your Webmail using the following link: http://email.aaup.edu  Enter Email Address as ([email protected]) and Password: 36  You will find the activation email in the Inbox folder or junk folder. Click on the ―Activate Account‖ button that was included in the email or copy and paste the activation URL into your browser to activate your account.  After clicking on the activate account button, you will be asked if you are signing up on behalf of a school, click the ―No‖ button, and then click ―Continue.‖ On the next page, fill in your first and last name and a password as shown in the next figure. 37  On the next page, you can invite other people to create a free Zoom account via email. You can skip this step if you want by Clicking Skip this step. 38 2.5.2. Zoom Menu Log in to Zoom Application: The Zoom menu contains several features that can be used at any time throughout lecture meetings such as: 1. Join Audio: Mute or Unmute Microphone. 2. Start Video: - Click the Start and Stop Video button in the menu bar at the bottom to begin your video. 3. Chat: Students can send messages to everyone as public messages or specific participants as private messages. You can also attach files to the chatbox. 39 4. Share Screen: - The student is able to share his computer screen by clicking on the ―Share screen‖ function in Zoom. - A new window will be displayed as shown in the next figure. Students can share Screens or specific applications. - To stop sharing the screen, click on the “Stop Share” button on top of your computer screen. Finish Meeting, the student needs to click on the ―End button. 40 2.6 How to Access University Email 1. You can enter your email through the following link (http://email.aaup.edu) or the university official website https://www.aaup.edu and click on the ―Quick Links‖ menu. 2. Use the same username that you use for the Portal, followed by the student's domain. Example ([email protected]). 3. Enter the same password used for the Portal. 41 - You will be able to view messages saved in the inbox, sent items, drafts, etc. folders. Create and send an email message: - At the top of the page, select New message. - On the To line, enter the email address. - On the Add, a subject line, enter a brief description of what your message is about. - To attach a file to your message, select Attach. You can attach photos and documents from your computer or OneDrive. Attachments always appear at the top of the email. - Type your message in the body and then select Send. 42 Reply to an email message13: In your message list, choose the message that you want to reply to. - At the top right corner of the message pane, select or , or select and then choose Reply or Reply all. - Type your response message and then select Send. 13 https://moodle.aaup.edu/course/view.php?id=7980 43 Chapter Three Computer Hardware 3.1 Introduction All types of computers follow the same basic logical structure and perform the following five basic operations for converting input data into information useful to their users. S.No. Operation Description The process of entering data and instructions into the computer 1 Take Input system. Saving data and instructions so that they are available for 2 Store Data processing as and when required. Performing arithmetic and logical operations on data to convert 3 Processing Data them into useful information. Output The process of producing useful information or results for the 4 Information user, such as a printed report or visual display. Control the Directs the manner and sequence in which all of the above 5 workflow operations are performed. Figure 3.1 Basic operation of computers, the hardware component of the computer 44 Computer Systems is the integration of physical components called Hardware and none physical components called Software? 1. Hardware (H.W.): These are the touchable components and electronic devices (The physical parts of the computer). The Central Processing Unit (CPU), Memory, and peripheral devices. 2. Software (S.W.): The programs that run over the computer. Figure 3.2 The computer system (hardware and software)14 3.2 Computer Input Input is when data from the outside world which is made digital and entered into a computer. Images into a camera, sound into a microphone, text into a keyboard, or movement and clicks into a mouse or trackpad—all of this is real-world information input into a computer 3.2.1 A keyboard The keyboard is the oldest type of input still commonly used. There are two basic types of keyboards: standard and extended. There are two basic types of keyboards: standard and extended. Standard keyboards have the normal character keys (A-Z, 1-0), modifier keys (control, alt, escape, etc.), and function keys. An extended keyboard also includes navigation keys (arrows, page up/down, etc.) and a numeric keypad, a set of keys with numbers and mathematical keys for quick number entry and calculations. Figure 3.3 Basic computer keyboard 14 https://truongtuyetvy.weebly.com/unit-1-types-and-components-of-computer-systems.html 45 the keyboard contains keys you press to enter data and instructions into a computer or mobile device Figure 3.4 Computer keyboard types Keyboard Shortcuts: These are the most common types. You begin by holding down one of the special shortcut keys: keys; Then, you press any letter key in addition, then let go of both keys. For example: + This combination will "Select All" ("A" for "All") of whatever you are selecting. Or: + This combination will close a window and/or quit the program. Or: + This combination will open the "My Computer" window The Control, Alt, or Windows/Start, here are some common two-key shortcuts: CTRL + O Open CTRL + P Print CTRL + N New (Document) CTRL + S Save CTRL + W Close Window CTRL + A Select All CTRL + X Cut CTRL + C Copy CTRL + V Paste CTRL + Z Undo CTRL + B Bold (for word processing) 46 CTRL + I Italic (for word processing) CTRL + U Underline (for word processing) ALT + TAB Switch Window (‗Windows Flip‘) This shortcut closes the foremost window; if you are at the ALT + F4 Desktop, it can be used to shut down the computer. ALT + PRINT SCREEN Copies an image of the active window to the clipboard WIND + D Show the Desktop WIND + F Find Window WIND + E Open "My Computer" Window 3.2.2 Pointing Device It is an input device that allows a user to control a small symbol on the screen called the points. In a graphical user interface (GUI), a pointer is a small symbol on the screen whose location and shape change as a user moves a pointing device.  Mouse It is a small handheld pointing device. As you move a mouse, the pointer on the screen also moves. The bottom of a mouse is flat and contains a mechanism that detects the movement of the mouse. Figure 3.5 An optical mouse has buttons. A touch mouse often has no buttons  Touchpad It is a small, flat, rectangular pointing device that is sensitive to pressure and motion commonly used on laptop computers.  Pointing Stick It is a pressure-sensitive pointing device, and it‘s shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard.  Trackball It is a stationary pointing device with a ball on its top or side. Figure 3.6 The touchpad. Pointing stick. Trackball mouse 47 3.2.3 Touch Screens It is a touch-sensitive display device. Touch screens are convenient because they do not require a separate device for input. Figure 3.7 Some types of touch screens  Touch Input Devices that utilize touch input include monitors for desktops and screens on laptops and tablets, smartphones, portable media players, digital cameras, tablets, kiosks, and navigation systems.  Desktop Monitors and Screens on Laptops and Tablets These touch-enabled monitors and screens allow users to interact with the operating system without a keyboard or pointing device. Instead of using a mouse to click an object on the screen.  Smartphones Its supports touch input includes tapping to run an app, sliding or swiping to scroll, and pinching and stretching to zoom. 3.2.4 Digital Cameras It produces digital images that can be stored in a computer, displayed on a screen, and printed. The big advantage of the digital camera is making photos both inexpensive and fast because there is no film processing. Figure 3.8 Digital Camera15 3.2.5 Pen Input With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make selections. Figure 3.9 You use a stylus to write, draw, or make selections on a touchscreen that supports pen input 15 https://www.usa.canon.com/internet/portal/us/home/explore/solutions-services/mobile-apps/camera-connect 48 3.2.6 Graphics Tablet A graphics tablet, also called a digitizer, is an electronic plastic board that enables a user to hand-draw images, animations, and graphics. graphics tablet detects and converts movements of a stylus or digital pen into digital signals that are sent to the computer. Figure 3.10 Graphic Tablet16 3.2.7 Scanners and Reading Devices Some input devices capture data directly from a source document -which is the original form of the data-, and this saves the user‘s time. For instance, optical scanners, Optical readers, barcode readers, RFID (radio frequency identification) readers, magnetic stripe card readers, and MICR (magnetic ink character recognition) readers.  Optical Scanners An optical scanner is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process. The quality of a scanner is measured by its resolution, that is, the number of bits it stores in a pixel and the number of pixels per inch. Many scanners include OCR (optical character recognition) software, which can read and Convert text documents into electronic files. OCR software converts a scanned image into a text file that can be edited. Figure 3.11 a. optical character recognition17 b. A flatbed scanner  Bar Code Readers It's a hand-held optical reader or stationary input device used to capture and read the information contained in a bar code using laser beams. A barcode is an identification code that consists of either a set of vertical lines and spaces of different widths or a two-dimensional pattern of dots, squares, and other images. Figure 3.12 A barcode reader uses laser beams to read barcodes, QR code, and magnetic stripe 16 https://www.thearchitectsguide.com/blog/best-drawing-tablets 17 https://www.openpr.com/news/1847603/emerging-trends-in-optical-character-recognition-ocr 49 A QR code (quick response code) is known as a 2-D barcode because it stores information in both a vertical and horizontal direction.  Magnetic Stripe Readers It used to read the magnetic stripe on the back of credit cards, entertainment cards, bank cards, identification cards, and other similar cards. The stripe contains information identifying you and the card issuer.  MICR Readers MICR (magnetic ink character recognition) devices read text printed with magnetized ink. MICR is used mainly by the banking industry to ease the processing of cheques and other documents. MICR Reader18 3.2.8 Smart Card A small electronic device about the size of a credit card that contains electronic memory. They are called smart cards as they can accept tiny memory chips embedded in them which act as microprocessors where it is located under a gold contact pad on one side of the card. Used for a variety of purposes such as storing digital cash and storing patient‘s medical records. Construction of Smart Card19 3.2.9 Microphone Microphones are built into most handheld and laptop devices, as well as some desktop computers. Computers without microphones can accept peripherals (using either an audio jack or USB) or can use a microphone which is part of a headset. Speech recognition is becoming more and more common. 3.2.10 Motion Sensors Newer technology allows the camera to see your eyes, face, hands, and body. The technology "sees" what you do and can react to that. Some video games have such a system, where if you move your body, your screen character moves in the same way. 18 https://www.magtekeurope.com/products/cheque-scanners/imagesafe.htm 19 https://www.electronicslovers.com/2020/03/smart-cards-what-are-they-and-how-do-they-work.html 50 3.3 Computer Output The output is data that has been processed into a useful form. The form of output varies, depending on the hardware and software being used and the requirements of the user. a user encounters four basic types of output: text, graphics, audio, and video. These devices include: screen and printer. Categories of output devices: 3.3.1 Monitors (Screen) and Graphics Adapter: A display is an output device that visually conveys text, graphics, and video information. Displays consist of a screen and the components that produce the information on the screen. Most current displays are a type of flat-panel display, which means they have a shallow depth and a flat-screen. monitors nowadays use pixels which is is one dot on your screen. Each pixel a separate color. Here is a pixel as you might see it in a graphics editing program, like Photoshop: Figure 3.13 Monitors pixels This Figure shows the displays for a variety of computers and mobile devices. A monitor is a display that is packaged as a separate peripheral device. Monitor display Laptop and digital Navigation system Handheld game device Smartphone camera displays display display display Figure 3.14 A variety of display devices, it can be used to connect to the internet Figure 3.15 Smart TVs enable you to connect to the Internet 51 The graphics adapter is the electronic device that links the monitor to the processor and motherboard. A Graphics adapter can be inserted into an expansion slot on the motherboard. Nowadays, most of the motherboards have graphics adapter built-in. Figure 3.16 Graphics Adapter20. 3.3.2 Printers Printers produce hard copy output. Printers can be chosen according to the price, size (and weight), speed, quality of output, color requirement, and even noise level.  Dot-matrix printer. They used metal pins to strike the ink ribbon and paper. Letters would be formed by creating many small dots in that letter's shape. These printers produced very low-quality tex  Ink-jet printers (line printers): Inkjet printers spray small dots of liquid ink on paper to create images. Printer resolution is measured by the number of dots per inch (dpi) a printer can print. - Its resolution is good, huge ink-jet printers used by Architects, its Line printer.  Laser printers (page printers): Its High speed, High resolution, and Speed of printing reach 32 pages per minute (ppm), Page printer. Figure 3.17 Ink-jet printers, Laser printer, a dot-matrix printer, and inkjet printing21.  All-in-One Printers It‘s a single device that looks like a printer or a copy machine but provides the functionality of a printer, scanner, copy machine, and perhaps a fax machine 20 https://computer.howstuffworks.com/graphics-card.htm 21 http://www.dp3project.org/technologies/digital-printing/inkjet 52 Figure 3.18 An all-in-one printer. A mobile printer. Plotter.  A 3-D printer can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and more Figure 3.19 3-D printer 3.3.3 Data Projectors It‘s a device that takes the text and images displaying on a computer or mobile device screen and projects the images on a larger screen. Two types of smaller; An LCD projector, and A digital light processing (DLP) Figure 3.20 Data projector. Interactive whiteboard 3.3.4 Interactive Whiteboards It‘s a touch-sensitive device, resembling a dry-erase board, which displays the image on a connected computer screen, usually via a projector. 53 3.4 Processing Devices Computers and mobile devices include components that are used for input, processing, output, storage, and communications. Many of these components are inside the case that contains and protects the electronics of the computer or mobile device from damage. These cases are available in a variety of shapes and sizes. Figure 3.21 Cases for computers and mobile devices are available in a variety of shapes and sizes The basic component of the computer is shown in this Figure. Figure 3.22 System Unit Components 3.4.1 Motherboard The motherboard is the main circuit board of the computer. Many electronic components, such as the processor and memory, attach to the motherboard; others are built into it. The following Figure shows photos of current desktop and laptop motherboards. 54 Figure 3.23 A desktop motherboard and a laptop motherboard 3.4.2 The Processors (CPU) The basic instructions that operate a computer. The processor significantly impacts overall computing power and manages most of a computer‘s operations. Some computer and chip manufacturers use the term microprocessor to refer to a personal computer processor chip. Most processor chip manufacturers now offer multi-core processors. A processor core, or simply core, contains the circuitry necessary to execute instructions. The operating system views each processor core as a separate processor. A multi-core processor is a single chip with two or more separate processor cores. Over the last twosome of years, the PC instrumentalist has been offered first dual-core processors, then quad-core models and octo-core. Multi-core processors are used in all sizes of computers. Figure 3.24 A multicore processor22 The processor also called the Central Processing Unit (CPU): is the electronic component that interprets and carries out the basic instructions that operate the computer. CPU has three components: 1. CU (Control Unit): it Controls the flow of input/output, and it Used to fetch and decode instructions. 2. ALU (Arithmetic Logic Unit): Does the logical and arithmetic operations. 3. Registers: it‘s very high-speed storage arrears. 22 https://www.soundonsound.com/sound-advice/multi-core-processors-musicians 55 Processors contain a control unit (CU) and an arithmetic logic unit (ALU). These two components work together to perform processing operations. The following Figure illustrates how other devices connected to the computer communicate with the processor to carry out a task. When a user runs an application, for example, its instructions transfer from a storage device to memory. Data needed by programs and applications enter memory from either an input device or a storage device. The control unit interprets and executes instructions in memory, and the arithmetic logic unit performs calculations on the data in memory. The resulting information is stored in memory, from which it can be sent to an output device or a storage device for future access, as needed. Figure 3.25 computer system components23 and basic CPU connections The control unit is the component of the processor that directs and coordinates most of the operations in the computer and the arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations. A processor contains small, high-speed storage locations, called registers that temporarily hold data and instructions. Registers are part of the processor, not part of memory or a permanent storage device.  Machine Cycle A machine cycle comprises the steps that a computer's processor executes when it receives a machine language instruction. modern CPUs can perform millions of machine cycles per second. For every instruction, a processor repeats a set of four basic operations, which comprise a machine cycle: (1) Fetching, (2) decoding, (3) executing, and, if necessary, (4) storing. Figure 3.26 Machine Cycle 23 http://www.lankaitschool.com/2017/06/function-of-computer-system.html 56 3.4.3. Memory Memory (RAM, ROM, and Cache):  RAM (Random Access Memory): is used to store programs and other data waiting for processing, Data will be lost when turning off the computer. RAM a volatile memory.  ROM (Read Only Memory): it holds the instructions that boot (startup) and prepare a computer for use. ROM is a non-volatile memory.  Cache Memory: is a random access memory (RAM) that a computer microprocessor (CPU) can access more quickly than it can access regular RAM. The CPU processes data looks first in the cache memory, and if finds the data there, it does not have to do the more time-consuming reading of data from larger memory (RAM). The memory consists of electronic components that store instructions waiting to be executed by the Figure 3.27 RAM and RAM installation24. processor, data needed by those instructions, and the results of processing the data. Stores three basic categories of items, each location in memory has an address. Memory size commonly is measured in MB, gigabytes (GB) or terabytes (TB), and Computers and mobile devices contain two types of memory: Figure 3.28 Types of Memory Two common types of RAM exist: 24 https://www.digitaltrends.com/computing/what-is-ram/ 57 RAM chips usually reside on a memory module and are inserted into memory slots. Cache Memory speeds the processes of the computer because it stores frequently used instructions and data. Figure 3.29 Cache Memory Levels Read-Only Memory (ROM) refers to memory chips storing permanent data and instructions. Flash memory can be erased electronically and rewritten. CMOS technology uses battery power to retain information when the power to the computer is off. Access time is the amount of time it takes the processor to read from memory, which is measured in nanoseconds. Today‘s computers support Plug and Play technology, which means the computer automatically, can recognize peripheral devices as you install them. Plug and Play support means you can plug in a device and then immediately begin using it Figure 3.30 EPROM 3.4.4 Expansion Slots and Cards  Bus It is a collection of wires through which data is transferred from one part of the computer to another. A bus allows the various devices both inside and attached to the system unit to communicate with one another. All buses consist of two parts:  The address bus: Transfers information about where data should go.  The data bus: Transfers instructions coming from or going to the processor. (Transfers actual data). 58 Types of Buses A computer has a system bus, possibly a backside bus, and an expansion bus.  A system bus, also called the front-side bus (FSB), is part of the motherboard and connects the processor to the main memory.  A backside bus (BSB) connects the processor to the cache.  An expansion bus allows the processor to communicate with peripheral devices.  Ports: It is the interface between the computer and the outer world. Figure 3.31 Computer cards, port location and Ports comparison - Intel Nuc 9 Pro versus Mac mini 25 Types of ports: Serial Port  Used for external modems and older computer mouse  Two versions: 9 pins, 25 pin model  Data travels at 115 kilobits per second Parallel Port  Used for scanners and printers  25 pin model PS/2 Port  Used for old computer keyboard and mouse  Most of the old computers provide two PS/2 port, each for the mouse and keyboard Universal Serial Bus (or USB) Port  It can connect all kinds of external USB devices such as an external hard disk, printer, scanner, mouse, keyboard, etc.  Most of the computers provide two USB ports as a minimum.  Data travels at 12 megabits per second. Figure 3.32 Computer Ports 25 https://appleinsider.com/articles/20/06/01/intels-xeon-nuc-9-pro-kit-is-what-we-want-to-see-in-a-mac-pro-mini 59 VGA Port  Connects monitor to a computer's video card.  It has 15 holes. Ethernet Port  Connects to a network and high-speed Internet.  Connects the network cable to a computer. Game Port  Connect a joystick to a PC Digital Video Interface, DVI port  Connects Flat panel LCD monitor to the computer's high-end video graphic cards. 3.5 Storage The binary system uses two unique digits (0 and 1); Bits and bytes; Computers must translate S.W. into binary form and then must translate it from a binary form into a language you can understand. Computers operate with electronic switches that are either "on" or "off", corresponding to 1 or 0. Every Eight bits grouped as a unit are called a byte. A byte represents a single character in the computer or mobile device. Figure 3.33 Bits and Bytes 3.5.1 Binary and decimal numbering systems A Binary Number is made up of only 0s and 1s. There is no 2, 3, 4, 5, 6, 7, 8, or 9 in Binary. A "bit" is a single binary digit26. Bit vs. Byte 26 https://www.mathsisfun.com/binary-number-system.html 60 Example of a Binary Number: 110100 We count in Decimal Figure 3.34 Counting in Decimal We Count using Binary like counting in decimal except we reach 10 much sooner. Figure 3.35 Binary Counting27. Figure 3.36 Binary Counting28 In Binary there are Ones, Twos, Fours, etc 27 https://www.mathsisfun.com/binary-number-system.html 28 https://www.mathsisfun.com/binary-number-system.html 61 Figure 3.37 Binary and Decimal Example 62 Figure 3.38 Binary to Decimal Example (0101)2 = (5)10 (14)10 = (1110)2  Binary to decimal Examples29 29 https://www.mathsisfun.com/binary-number-system.html 62  Decimal to Binary Reminders Way: we need to write out the remainder in the reverse order —1100. So, 12 in the decimal system is represented as 1100 in binary. Figure 3.39 From decimal to Binary using reminders30.  Binary addition: Binary addition is as your everyday addition (decimal addition), but that it carries on a value of 2 instead of a value of 10. Figure 3.40 Binary Addition31 and binary addition example 30 https://indepth.dev/the-simple-math-behind-decimal-binary-conversion-algorithms/ 31 https://www.howtogeek.com/367621/what-is-binary-and-why-do-computers-use-it/ 63  Binary Subtraction by 2’s Complement32 The operation is carried out using the following steps: 1) At first, 2‘s complement of the subtrahend is found. 2) Then it is added to the minuend. 3) If the final carryover of the sum is 1, it is dropped and the result is positive. 4) If there is no carryover, the two‘s complement of the sum will be the result and it is negative. Example 1: Example 2: 32 https://www.math-only-math.com/ 64 3.5.2 Computer Encoding Systems – The ASCII (American Standard Code for Information Interchange) code is 7 Bits. (2 7) =128 characters. – The ANSI (American National Standards Institute) code is 8 Bits. (2 8) =256 characters. – The Unicode is 16 Bits. (216) =65536 characters, which includes most of the languages of the world. 3.5.3 A storage medium A storage medium, also called secondary storage, is the physical material on which a computer keeps data, information, programs, and applications. Examples of storage media include internal hard disks, external hard disks, solid-state drives (SSDs), memory cards, USB flash drives, optical discs, and network- attached storage devices, magnetic stripe cards, smart cards, RFID tags, and microfilm. Cloud storage. The following figure shows a variety of storage options: Figure 3.41 A variety of storage options 65 Figure 3.42 Storage devices 3.5.4 Storage Operations A storage device is a hardware that records and/or retrieves items to and from storage media. Writing is the process of transferring data, instructions, and information from memory to a storage medium. Reading is the process of transferring these items from a storage medium into memory. Figure 3.43 Read and Write operations 3.5.5 Storage Capacity Capacity is the number of bytes (characters) a storage medium can hold. The following Table identifies the terms manufacturers may use to define the capacity of storage media. For example, a storage medium with a capacity of 750 GB can hold approximately 750 billion bytes. 66 Figure 3.44 Disk properties Example1: How many Bytes in 15 Kbytes? 15 KB = 15 * 210 = 15 * 1024 = 15360 Bytes. Example2: How many Bits in 25 MB? 25 MB = 25 MB * 1024 *1024 * 8 = 25 MB * 220 * 8 =209715200 Bits. Example3: How many GB in 20000 KB? 20000 / (1024*1024) Types of mass storage devices and media: 1. Magnetic disk. 2. Magnetic Tape. 3. Optical Laser Disk. Figure 3.45 Mass Storage devices 3.5.6 Magnetic Disks  Hard Disk: A hard disk also called a hard disk drive (HDD), is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data. Depending on how the magnetic particles are aligned, they represent either a 0 bit or a 1 bit. Desktops and laptops often contain at least one hard disk. The entire hard disk is enclosed in an airtight, sealed case to protect it from contamination. A hard disk that is mounted inside the computer‘s case. 67 Figure 3.46 Hard Disk The surface of magnetic disks and hard disks is formatted as follows:  Tracks are concentric (circles with the same center).  A cylinder is the same-numbered tracks on each recording surface.  Tracks are divided into sectors. The sector is the smallest unit that can be accessed on a disk. The number of sectors depends on the density of the disk. Typically, the storage capacity of each sector in a track is 512 bytes. A bad sector is a sector that can‘t be accessed.  A cluster consists of several adjacent sectors. Typically, the cluster size ranges from 8 to 64 sectors. For 512-bytes sectors, the size of a cluster ranges from 4096 bytes = 4 Kbytes to 32,768 bytes = 32 Kbytes. Figure 3.47 The surface of magnetic disks 68 Figure 3.48 sector, track and cluster of magnetic disks  Operations applied on Hard Disk A. Defragmentation: Rearranging Clusters to enhance performance. To enhance performance, fragments must be rearranged so that files are stored in contiguous clusters. Such a process is called defragmentation. Many utility programs can be used to defragment the hard disk. One comes with Windows, which is disk defragmenter: start – accessories - system tools – disk defragmenter. B. Partitioning: divide the hard disk into separate areas called partitions; each partition functions as if it were a separate hard disk drive. C. Formatting: The process of preparing the disk to be used (read/write). It erases the FAT. There are two types of disk format: The high-level format that most users use and the low-level format. The high-level format does not erase the data, just the FAT. The low-level format erases all data and partition the hard disk into many partitions and divide each partition into tracks and sectors. Figure 3.49 a. defragmentation b. partitioning and formatting Figure 3.50 Disk partition and format using Windows 69  Optical Laser Disks An optical disc is a type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. Optical discs used in computers typically take 650 MB, 700 MB. The surfaces of the optical disk consist of one track in a spiral shape. – CD: Compact Disk. – DVD: Digital Versatile Disk or Digital Video Disk. The speed of the CD drive 24X, 32x, 40x, 48x, 52x are representing the spin speed times the speed of the original CD standard. CDs of technology types:  A CD-ROM (CD-read-only memory)  A CD-R (CD-recordable)  A CD-RW (CD-rewritable) 33 Figure 3.51 a. Optical disk and drive b. CD and DVD surface30 DVDs: DVD quality far surpasses that of CDs, DVDs to have greater storage capacities and higher resolutions than CDs. – A DVD-ROM (DVD-read-only memory)  DVD-R and DVD+R are competing DVD-recordable WORM formats.  DVD-RW, DVD+RW, and DVD+RAM are competing for DVD-rewritable formats that users can write on multiple times.  Flash Memory Storage: Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten. Flash memory chips are a type of solid-state media. The lack of moving parts makes flash memory storage more durable and shock-resistant than other types of media, such as magnetic hard disks or optical discs. Figure 3.52 Flash Memory and SSD34 33 http://www.cs.cornell.edu/courses/cs4410/2016fa/slides/14-disksraid.pdf 34 https://noise.getoto.net/tag/ssd/ 70  SSDs: An SSD (solid-state drive) is a flash memory storage device that contains its processor to manage its storage, SSDs are used in all types of computers, including servers, desktops, laptops, tablets, and a variety of mobile devices, such as portable media players and DV cameras. Some computers have both a traditional hard disk and also an SSD. External SSDs also are available.  Cloud Storage: Some users choose cloud storage instead of storing data locally on a hard disk, SSD, or other media. Cloud storage is an Internet service that provides storage to computer or mobile device users. Cloud storage is available for home and business users, with various degrees of storage services available. Cloud storage fee arrangements vary, depending on the user‘s storage requirements. Figure 3.53 Cloud Storage30 Figure 3.54 Cloud Storage Examples. Figure 3.55 Hierarchy of Storage. 71 Chapter Four Computer Software 4.1 Introduction Computer Software S.W. (Programs and Apps): A program, or software, consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. 4.2 Types of Computer Software 4.2.1 System Software: consists of the programs that control or maintain the operations of the computer and its devices. An Operating Systems (OS) is a set of programs that coordinates all the activities among computer or mobile device hardware. Other programs, often called tools or utilities, enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices. Figure 4.1. Example tasks that can be performed by the system software Operating System Functions: Starting Computers and Mobile Devices – If a computer or mobile device is off, you press a power button to turn it on. A user interface (UI) controls how you enter data and instructions and how information is displayed on the screen. With a graphical user interface (GUI), you interact with menus and visual images. Figure 4.2. UI Examples 72 Operating systems typically provide a means to establish Internet connections. Figure 4.3. OS Providing Means to Establish an Internet Connection Operating systems often provide users with a variety of tools related to managing a computer, its devices, or its programs. Figure 4.4. Various Computer Management Tools Provided by the OS A user account enables a user to sign in to, or access resources on, a network or computer – A username, or user ID, identifies a specific user – A password is a private combination of characters associated with the username Figure 4.5. User Account Example 73 Figure 4.6. OS Interaction with a User, Application, and Hardware Types of Operating Systems: 74 Mobile Operating Systems: The operating system on mobile devices and many consumer electronics is called a mobile operating system and resides on the firmware. Android is an open-source, a Linux-based mobile operating system designed by Google for smartphones and tablets iOS, developed by Apple, is a proprietary mobile operating system specifically made for Apple‘s mobile devices Windows Phone, developed by Microsoft, is a proprietary mobile operating system that runs on some smartphones 4.2.2. Applications Software: An application, or app, sometimes called application software, consists of programs designed to make users more productive and/or assist them with personal tasks. 4.3 Categories of Software:  Productivity applications can assist you in becoming more effective and efficient while performing daily activities at work, school, and home. Productivity applications include word processing, presentation, spreadsheet, database, note-taking, calendar, and contact management, project management, accounting, personal finance, legal, tax preparation, document management, and enterprise computing.  Graphics and media applications include computer-aided design, desktop publishing, paint/ image editing, photo editing and photo management, video and audio editing, multimedia and website authoring, media players, and disc burning.  Personal Interest applications are designed specifically for lifestyle, medical, entertainment, convenience, or education activities. Most of the programs in this category are relatively inexpensive; many are free. Some applications focus on a single service, while others provide several services in a single application.  Communications applications are used to enable people to communicate and share information with others.  Security tools are used to protect your computers and mobile devices. You can use one or more security tools. Security tools include personal firewalls, antivirus programs, malware removers, and Internet filters. Although some of these tools are included with the operating system, you also can purchase stand-alone programs that offer improvements or added functionality.  File, disk, and system management tools perform maintenance-type tasks related to managing a computer, its devices, or its programs, you can use one or more file, disk, and system management tools. Functions provided by these tools include the following: managing files, searching, viewing images, uninstalling software, cleaning up disks, defragmenting disks, setting up screen savers, compressing files, maintaining a personal computer, and backing up files and disks. Although some of these tools are included with the operating system, you also can purchase stand-alone programs that offer improvements or added functionality. 75 Table 4.1. Program and App Categories 4.4. Obtaining Software: Software is available in a variety of forms: retail, custom, web app, mobile app, mobile web app, shareware, freeware, open-source, and public domain.  Retail software: is mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company. Some retail software, such as an operating system, is preinstalled on new computers and mobile devices. You also can purchase retail software from local stores and on the web. With online purchases, you may be able to download purchased programs immediately instead of waiting for the software to arrive by mail.  Custom software: performs functions specific to a business or industry. Sometimes a company cannot locate retail software that meets its unique requirements. In this case, the company may use software developers to create tailor-made custom software. Custom software usually costs more than retail software.  A web app: is an application stored on a web server that you access through a browser. Users typically interact with web apps directly by visiting a website, but some web apps also can be accessed locally offline. Many websites provide free access to their apps. Some charge a onetime fee, while others charge recurring monthly or annual subscription fees. You may be able to use part of a web app free and pay for access to a more comprehensive program or pay a fee when a certain action occurs. 76  A mobile app: is an application you download from a mobile device‘s app store, sometimes called a marketplace or other location on the Internet to a smartphone or other mobile device. Some mobile apps are preinstalled on a new mobile computer or device. Many mobile apps are free; others have a minimal cost — often less than a few dollars.  A mobile web app: is a web app that is optimized for display in a browser on a mobile device, regardless of screen size or orientation. Many app developers opt for web delivery because they do not have to create a different version for each mobile device‘s app store. Many web apps use a responsive design, which means the app displays properly on any computer or device.  Shareware: is copyrighted software that is distributed at no cost for a trial period. To use a shareware program beyond that period, you send payment to the software developer or you might be billed automatically unless you cancel within a specified period. Some developers trust users to send payment if software use extends beyond the stated trial period. Others render the software useless if no payment is received after the trial period expires. In some cases, a scaled-down version of the software is distributed free, and payment entitles the user to the fully functional product.  Freeware: is copyrighted software provided at no cost by an individual or a company that retains all rights to the software. Thus, software developers typically cannot incorporate freeware in applications they intend to sell. The word, free, in freeware indicates the software has no charge.  Open-source software: is software provided for use, modification, and redistribution. This software has no restrictions from the copyright holder regarding the modification of the software‘s internal instructions and its redistribution. Open-source software usually can be downloaded from a web server on the Internet, often at no cost. Promoters of open source software state two main advantages: users who modify the software share their improvements with others, and customers can personalize the software to meet their needs.  Public-domain software: has been donated for public use and has no copyright restrictions. Anyone can copy or distribute public-domain software to others at no cost. 4.5 Filesystem A file is a collection of information that has a name called filename. Each file name has an extension that distinguishes file types. So the filename is on the form file_name.ext_name example: letter.doc is a document file. Figure 4.7. Example of a file name with its extension A folder (or directory) is a special file used to organize other files. I mean programs and information files are placed in folders (directories). 77 Some Types of Files 1. ASCII file (Text file): a file that consists of ASCII characters, no images, no equations, and no special format. Example: *.txt (Notepad program) 2. Document file: That contains text, images, and other formatted text. Example: *.doc (MS-Word program) 3. Spreadsheet file: That contains rows and columns of data. Example: *.xls (MS-Excel program) 4. Web file: That can be opened by internet browsers. Example: *.htm (Internet explorer program) 5. Executable program file: To execute (run) a computer program. Example: *.exe , *.com 6. Graphics file: That contains digitized images (the binary code of the image). Example: *.bmp , *.gif 7. Audio file: That contains digitized sound. Example: *.wav , *.mp3 8. Video file: That contains digitized video frames and when played produced motion video. Example: *.avi , *.mpeg There is software available to compress audio, video, and graphics files to save space and to be able to send and receive them over the internet. 4.6 Viruses and Malware A computer virus is a potentially damaging program that affects a computer or device negatively by altering the way it works. This occurs without the user‘s knowledge or permission. Once the virus is in a computer or device, it can spread and may damage your files, programs and apps, and operating systems. Viruses do not generate by chance. The programmer of a virus, known as a virus author, intentionally writes a virus program. Writing a virus program usually requires significant programming skills. The virus author ensures the virus can replicate itself, conceal itself, monitor for certain events, and then deliver its payload. A payload is a destructive event or prank the virus delivers. Viruses can infect all types of computers and devices. Most variations of viruses have two phases involved in their execution: infection and delivery. The first step in the infection phase is the activation of the virus. The most common way viruses spread is by users running infected programs or apps. During the delivery phase, the virus unleashes its payload, which might be a harmless prank that displays a meaningless message — or it might be destructive, corrupting or deleting data and files. There are many types of computer viruses:  Viruses that erase files and programs once they infect the computer.  Viruses that sleep until a given time/date.  Viruses that replicate themselves creating more and more copies of themselves taking the whole memory and halting the system.  Viruses that infect the FAT, for this type an expert can recover the lost data.  Viruses that run the hard disk at its highest speed for hours to get overheated and physically damaged.  Viruses that are capable of transmitting themselves over networks.  Viruses that send a copy of themselves to each address in your address book. (email) In addition to viruses, other malware includes worms, trojan horse programs, and rootkits. A worm resides in active memory and replicates itself over a network to infect computers and devices, using up system resources and possibly shutting down the system. 78 A trojan horse is a destructive program disguised as a real program, such as a screen saver. When a user runs a seemingly innocent program, a trojan horse hiding inside can capture information, such as user names and passwords, from your computer or enable someone to control your computer remotely. Unlike viruses, trojan horses do not replicate themselves. A rootkit is a program that easily can hide and allow someone to take full control of your computer from a remote location, often for nefarious purposes. For example, a rootkit can hide in a folder on your computer. The folder appears empty because the rootkit has instructed your computer not to display the contents of the folder. Rootkits can be very dangerous and often require special software to detect and remove.  Source of Viruses and Malware:  Interchangeable magnetic disks  The internet  Local computer networks  Antivirus Programs: To protect a computer from virus attacks, users should install an antivirus program and keep it updated by purchasing revisions or upgrades to the software. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or incoming files. Figure 4.8. Example of Antivirus Programs Antivirus programs scan for programs that attempt to modify a computer‘s start-up files, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the web, email attachments, opened files, and all types of removable media inserted in the computer or mobile device. Antivirus has a database of all known viruses. Each time you can check a single file or the hard disk for viruses, the anti-virus checks the file and compare it with the definition of viruses in its database. The database of the definitions of viruses must be updated regularly. If an antivirus program identifies an infected file, it attempts to remove the malware. If the antivirus program cannot remove the infection, it 79 often quarantines the infected file. Quarantine is a separate area of a hard drive that holds the infected file until the infection can be removed. This step ensures other files will not become infected. Quarantined files remain on your computer or mobile device until you delete them or restore them. Most antivirus programs also include protection against other malware, such as worms, trojan horses, and spyware. When you purchase a new computer, it may include a trial version of antivirus software. Many email servers also have antivirus programs installed to check incoming and outgoing email messages for viruses and other malware. Some of the most popular antiviruses are: – Bitdefender 35 Antivirus – Kaspersky36 Antivirus – Symantec Norton37 Antivirus – Webroot38 SecureAnywhere Antivirus – McAfee39 Antivirus Plus – Avast40 Antivirus – Panda41 Antivirus – AVG42 Antivirus – Microsoft Defender43 Antivirus 35 https://www.bitdefender.com/ 36 https://me.kaspersky.com/ 37 https://us.norton.com/ 38 https://www.webroot.com/us/en 39 https://www.mcafee.com/en-us/index.html 40 https://www.avast.com/ 41 https://www.pandasecurity.com/ 42 https://www.avg.com/ 43 https://www.microsoft.com/en-us/windows/comprehensive-security 80 Chapter Five Applied Lab Material 5.1 Microsoft Windows  Control Panel  create an account,  do defragmentation,  view computer specification,  uninstaller programs and features  Network and Sharing Center  Internet options  Create Files  Create Folders  Copy Files  Compress Files and Folders  Hide/ Show Files and Folders  Search for Files  Alt+Tab Keyboard  File Explorer  Multiple Desktops  Windows Firewall 81 5.2 Microsoft Word  Text format.  Numbering/ bullets  Page border.  Insert page numbers.  Header and footer.  Insert picture/from a file, auto shapes  Insert equations.  Page design (themes)  Watermark  Page layout (columns)  create a table of contents/ create a table of figures  Insert table / table format  Templates  Insert Hyperlink, comments  Insert page break 82  Insert references (footnote)  Review  View 83 5.3 Microsoft Excel  Page Format  Add/ Delete Sheets  Cell Format  Data Validation.  Conditional Format  Filter And Sort  Functions (Sum, Average, Max, Min, Count, If, SUMIF, COUNTIF, AVERAGEIF, SUBTOTAL (outline), DATE, AND).  Create Manual Equation (Function) As: (X5 +2y)/5xy  Insert Charts 84 5.4 Microsoft PowerPoint  Slide Format  Insert Picture, Table, Chart, Shapes, SmartArt, WordArt, Date & Time, Object, Slide Number  Header and Footer  Insert Slide/ Delete Slide  Slide Design  Slide Background  Animation  Transaction  Insert Action  Insert Sound and Video, Screen Recording.  Slide Master (view) End of the Course Summary Reference: 1. Discovering Computers, 11th Edition, by Larry and Nancy Long 85

Tags

computer skills computing education
Use Quizgecko on...
Browser
Browser