Computer Fundamentals Series1-eBook
Computer Fundamentals Series1-eBook
Introduction to
Computer Fundamentals
and
Information Technology
(Series 1 – With Simple Visual Basic 2008 Jumpstart)
Copernicus P. Pepito
This e-book version is for Promotion Purposes only. You can buy your
hardcopy of this e-book from National Bookstore (the Publisher of this
book). Thanks.
2
Dedication
Acknowledgement
From the bottom of my heart, I am so grateful to have a mom like you, Mama
Glo. But you passed away so soon, leaving your family in great pain and agony. Your
best encouragement that tells me to keep on writing books, still echoes in my mind. That
encouragement sustains me to live my life happily, again.
I would like to express my heartfelt gratitude to Ms. Letty Custodio of National
Bookstore - Purchasing Department who is very instrumental to the success of my
books. Without her uncommon understanding and patience that are so rare to most human
beings, my books could not have been written.
I am very thankful also to Madam Zeny Alulod of Cacho Hermanos Publishing,
for the heart-to-heart talks and to Ms. Lyn Francisco of National Bookstore – Accounting
Department whose inspiring words (based on biblical wisdom) can never be forgotten .
Well, if there is someone who motivated me to be brave in expressing myself
through written-words, she was no other than my beloved grandmother, Dr. Roberta
Pepito. Her editing-style made me feel very confident about my English-grammar
proficiency (eventhough, I’m not good at it - honestly speaking!). By the way, I have
other grandmother who taught me to be caring and loving, by being caring and loving
herself - Lola Bening Prietos. And grandfather too, who taught me a lot of wisdom in his
own little way – Lolo Ciano Prietos.
Lastly, I give thanks to our Almighty God who unceasingly poured out a lot of
blessings to me, and whose plan to my life and the lives of my loveones I cannot
questioned, and who answered my questions about life, trials, and death through the
books written by His servants.
4
Hello out there! This book is written, because deep in my heart and soul, I’m
craving to share the knowledge I learned about computers. As a teacher, I felt this urge to
extend my classes from the four corners of my classroom to the far-reaching part of the
Philippine archipelago. Invading every classroom, every library, and every home. I’d like
to imagine that this book would be read by thousands of students with great interest and
enthusiasm. I want them to enjoy reading the way I enjoyed writing it. This is my
message to all students in Introduction to computer class, “our adventure to learn about
computer has just begun”. Well, what can I say more, but: bon voyage, adventurer!
This is a common overheard statement: “there is nothing constant in this world
but change". I believe that this one is true with computers. Every year, we heard and read
news about new computer models, new software versions and releases. We even wonder
if what we have learned today can still be applied for tomorrow’s technology.
As a matter of honesty, we even got discouraged and felt inferior to other high-
tech countries like the U.S.A., Japan, and some other parts of Europe. We feel as though
we cannot catch up with their technological advancement.
I know this because I feel also the same. This book is written as an attempt to
playing “catch up” with the modern trends of information technology in the whole world.
I feel that as a teacher in computer science, I have the responsibility to help in elevating
our computer literacy-level through research with the different available resources at
hand, and compile them into a book ready to be read and learned by the Filipino youth.
I see another obstacle to our learning endeavor. This is about the high cost of
computer books nowadays. In other words this book is designed to be updated as possible
in terms of technological trends and as affordable as possible in terms of price or cost of
ownership. I could express it in these words: “This book is written by the heart and soul
of a teacher whose very intention is to help and share, withholding nothing, not even his
very intimate secret. Dare? Enjoy!
I Believe
I firmly believe that computer fundamentals should embrace the past, present and
future of information technology. Otherwise, we fall short of how computer evolves
completely. Serving in the field of computer studies, I have the responsibility to build a
bridge to link this past, present and future of computer revolution. And I’m hoping that
those students who would like to pass on this bridge could be able to see the whole
picture of what the computer is all about. Then next, how the computer enriches our lives
and what to expect in the near future about its never-ending evolution. This book is
written for the purpose of building that bridge.
6
Reading this book is your journey starting from the past, then to the present and
to the future. I’d like to end this preface by quoting Microsoft’s corporate motto: “ Where
do you want to go today?”. My answer is: to SM (ShoeMart) watching movies and
doing some window-shopping. That is how I spend my leisure time, most of the time.
Very simple, very normal. But I have a dream.
Copernicus P. Pepito
AMA Computer University
Quezon City Campus
7
This is the first book I published under National Bookstore. I am so very happy
and thankful that thousands of Filipino students were patronizing the books I wrote. I
cannot think of other ways to share with you what I learned in the best way I can, but
only through writing a book like this. I could be not your Instructor inside your
classroom, but I am, in the other way around, for I write this book which primary purpose
is to extend the four corners of my classroom at AMA Computer University – Quezon
City campus (and now at Mapua IT Center - Makati Campus) to the far-reaching part of
the Philippine archipelago.
I felt honored and fulfilled to received an e-mail from a student in Camiguin
Islands (somewhere near in Cagayan De Oro, Mindanao) asking for help about her
subject in programming. I didn’t expect that such a far away place, my book was read by
a student like her who was eager to learn.
I am hoping that this second edition will add more to your basic knowledge in
computer and provides you an insights about Information Technology (IT). Have a
happy day learning IT now!
Copernicus P. Pepito
Mapua IT Center
Makati Campus
8
Table of Contents
Dedication i
Acknowledgement ii
About the Author iii
Preface to the First Edition iv
Preface to the Second Edition vi
Chapter 1 Introduction 1
The CMOS 36
Flash Memory 36
The Input Devices 39
The Output Devices 39
The Storage Devices 42
Computer Ports 45
Computer Bus 45
Bus Standards 46
Expansion Slots 46
The UPS 46
The Computer Number System (Series II) 47
Presenting: The Octal Number System 47
Decimal to Octal Number Conversion 47
Octal to Decimal Number Conversion 47
Octal to Binary Number Conversion 48
Binary to Octal Number Conversion 49
LEC ACTIVITY TEST 2 51
Chapter 3 The Basics of Computer Software 52
History of Computer Software Revolution 52
Software Revolution: Timeline (In 1970’s) 52
Software Revolution: Timeline (In 1980’s) 53
Software Revolution: Timeline (In 1990’s) 54
Bits, Bytes, Data and Information 56
The Computer Programming Languages 57
Structured Programming Language 57
Object-Oriented Programming Language (OOP) 58
Different Categories of Programming Languages 58
C Programming Language 58
C++ Programming Language 59
Visual BASIC Language 60
C# Programming Language 61
About Visual Web Developer 63
A Special Note about IDE 63
Java Programming Language 64
Python Programming Language 64
The Scripting Languages 65
The HTML 65
The JavaScript 66
The PHP 67
The XML 68
The CGI 68
Authoring Software 69
The Operating System 69
The DOS (Disk Operating System) 69
Microsoft Windows Operating System 70
Other Operating System 73
10
Chapter 1
Introduction
If you have read my previous book’s edition, you can really feel the well-added
improvement when it comes to topics, figures, pictures and images. What is more
noticeable is that in the first edition, no pictures or images can be found. It is purely text
and figures and line drawings and symbols. In this new edition, pictures and images are
its main offering. I am also a believer of a common overheard statement, that “a picture
can speak a thousand words,” or something like it. To make it a practice in my book
writing endeavor, I will adhere to such old wisdom of the times. Here are the summary of
the added exciting topics on this new edition:
Note:
This second edition’s revision and updates is mainly based on the latest book written by Peter Norton
(principal developer and creator of Norton Anti-Virus and Utilities) entitled “Introduction to
Computers”. So, if you find this new edition as something more “meatier” than the first edition, it is
because this book stands in the shoulder of a giant.
14
Note:
For technical reason, this book’s title did not contain the words “Second Edition”. One of the reasons
being considered is its new title; since the old title is “Introduction to Computer Fundamentals: Concepts
and Applications”, while the new edition is titled with “Introduction to Computer Fundamentals &
Information Technology”. Furthermore, the new edition is a major revision that doubles the pages of the
first edition. Aside from many added topics to almost all chapters and with enhanced discussions, another
15
chapters were added to offer more important topics to the student most especially in the area of the World
Wide Web and basic computer security.
A long, long time ago (not in a far distant galaxy), humans had invented abacus.
An Arabic number system that is used for calculation. But out of more human needs,
abacus can no longer satisfy the new demands for highly complicated and repetitive tasks
of calculations. This new demand had prompted the humans to invent more calculating
tools. And to make it short, one of these, is the computer.
The following are the important landmarks of the early computer revolution:
-1939
- A German engineer Konrad Zuse invented the first general-purpose
computer.
- An American professor John Atanasoff of the Iowa State College (now a
university) invented the first electronic computer called the Atanasoff-Berry
Computer (ABC).
-1940’s
- Harvard University professor Howard Aiken invented the automatic general-
purpose calculator called Mark I in 1944 which in turn was financed by the
International Business Machine (IBM).
The UNIVAC 1 was considered as the first generation of computers that was
built using vacuum tubes.
-1948
- The three physicists at Bell Laboratories – J. Bardeen, H.W. Brattain, and W.
Shockley invented the transistor that could perform and accomplish the same
function like the vacuum tube. Transistors were first used to build computers in
1956. This is the beginning of the computer’s second generation.
-1960’s
- In mid 1960’s transistor-based computers were replaced by smaller and more
powerful third-generation computers built around the concept of integrated
circuit (IC). The IC is a technology that integrates hundreds of transistors in
one single tiny similar chip.
-1965
- In 1965, the first home computer is introduced by Honeywell Corporation in the
United States. It is called the “H316 Kitchen Computer”.
-1969
- In 1969, the first microprocessor (the brain of the computer ) was first
invented. This invention was considered the beginning of the fourth
generation of computers.
-1970’s
- In mid 1970’s, Apple, Tandy, and Commodore computer companies had
introduced the first low-cost computers that are considered as powerful as
many of the room-sized computers in early 1950’s and 1960’s.
-1971
- In 1971, the world’s first commercially available microprocessor (the brain of
the computer) was designed and created by Dr. Ted Hoff of Intel Corporation. It
is originally designed for use in calculator that paves the way in its use in
computer. At the same year, Steve Wozniak (co-founder of Apple Computer)
together with his colleague Bill Fernandez design and create a computer which
they called Cream Soda Computer. They named it after they had drank Cragmont
cream soda during the construction of the computer.
-1972
- In 1972, the 5.25 floppy disk (diskette) is first introduced in the market. This
limited storage device makes it easy to transfer data, program, or any software
from one computer to another. Today, computer users are typically using a USB
Mass Storage Device (Thumb Drive or Flash Drive) to move their data, program
or software anywhere, anytime.
17
-1973
- In 1973, the hard disk as mass storage device was introduced by IBM
Corporation. It is originally designed to hold 70 MB of data. Today’s hard disk is
over 160 GB in capacity.
-1974
-In 1974, Intel Corporation and Motorola Inc. introduced an 8-bit micro-
processor with 64 KB of RAM memory and runs a speed of 2 MHz. Today’s
microprocessor is a 64-bit, with 2 GB of RAM and runs over a speed of 2.3 GHz.
-1975
-In 1975, the first commercially available Personal Computer (PC) called Altair
was introduced in the United States.
-1976
-In 1976, the first Apple I computer was designed and marketed by the founders
of Apple company: Steve Jobs and Steve Wozniak. Their company Apple,
Incorporated was established and named it after their favorite snack food.
-1978
- In 1978, the Epson company introduces their first dot-matrix printer with model
number MX-80.
Before computers came into existence, there were already calculating machines
invented. If computers can be compared to lions and tigers, then these early machines are
the dinosaurs. Like the dinosaurs, they were extinct. Their flesh and blood were long
gone (as well as their usefulness) but their skeletons remained. Maybe to remind us, that
they exist a long, long time ago and worth remembering as part of our past, part of our
history. Now let us travel back in time (with our time machine?).
The vacuum tubes were used as the internal components for the first generation
computer. The first generation of computers begun with the introduction of the first
commercially viable electronic computer: the UNIVAC I. The short term for the
20
Universal Automatic Computer. The UNIVAC I was designed and patterned after the
ENIAC (an acronym for Electronic Numerical Integrator and Calculator).
The transistor was used as the internal components of the second generation
computer. Transistors were much smaller, faster, and reliable than vacuum tubes. They
consumed less electrical energy and needed no warm-up time.
than one transistor. Integrated circuits are made of silicon chip. A silicon is a
semiconductor crystalline substance that can conduct electric current.
The Japanese coined the term fifth generation computer to describe their plan to
build a powerful computer by mid-1990’s. Later the term evolved to encompass
computer intelligence: artificial intelligence, natural language, and expert system.
However, the fifth generation’s focus is more on connectivity. This is to permit computer
users to connect their computers to other computers. Like the way that happened with the
Internet today. Can the Internet be the precursor of Information Superhighway? Who can
tell?
Note:
Personal computer is also called microcomputer and desktop computer. The PC is also called
microcomputer since it is smaller than the minicomputer in terms of its size and weight. It is also known as
desktop computer, because PC always sits at the top of the desk.
Supercomputers
The supercomputer like Cray 1 generates data for aerodynamics research using
computational fluid dynamics. Supercomputer primarily used for scientific research that
involves with the manipulation of highly complex mathematical data and equations.
These data requires trillions of operations to resolve.
Physicists use supercomputers to study and analyze the results of explosions of
nuclear weapons which are presently being tested. Meteorologists use supercomputers to
analyze and study the formation of tornadoes. Scientists and engineers are using
supercomputers to sort through, analyze, and interpret mountains of seismic data gathered
during oil-seeking explorations. There are only few hundred supercomputers presently
used in the whole world today.
Handheld personal computer is a computing device that is small enough to fit in our
hand. A popular type of handheld PC is the Personal Digital Assistant (PDA). It is a small
appointment book and is normally used for special applications, such as taking notes,
displaying phone numbers and addresses and keeping track of dates or agendas.
Smart Phone is a cellular phone with advanced features such as an Internet Web surfing
capability and access to e-mails, as well as a personal organizer at the same time.
Network Server is usually a powerful personal computer with powerful software and
peripherals that enables it to function as the primary computer in the network.
Workstations that are used by the employees in the company are usually connected to the
network server which served as the central main computer. Most of the company’s
resources are stored to this main computer, that is why the employee can use any
workstation in any department to access their files or folders or any information they
need anywhere they are in the company premises.
26
Note:
Charles Babbage is considered the Father of Computer.
27
Sometimes in our lives as students has this question in our minds why we study
this and that. Are all these difficult subjects are applicable and useful when we work in
the company? How about this algebra, trigonometry and analytic geometry? Can I apply
this when I work abroad? Well, I cannot answer you with a resounding yes. Maybe
because, I am not a mathematician. Or simply I didn’t know the answer (honestly
speaking). However, I can answer you that we can use and apply our knowledge that we
learned in studying number system conversion, because it is really an applied knowledge.
Wise men said that knowledge can only becomes power when it is applied. I strongly
agree. So here is now the reason :
Computers and networking equipment such as routers and switches work with
binary digits (bits). In other words, the base 2 number system (binary number system) is
what the computers and data communication devices are using for its design,
implementation, and operation. Bits can be either a binary 1 or binary 0 that can
represent as the absence (0) or presence (1) of current which flows within a cable, wire or
circuitry in the computer system. In switching system application, 1 can be an ON state,
while 0 can be an OFF state. In writing the programming logic or algorithm, 1 can be
interpreted as True or Yes, while 0 can be interpreted as False or No.
The bits are encoded internally in the computer system and on networking media
(cables or wires) as either electrical voltages on copper cable such as unshielded twisted
pair (UTP) cable or a light pulses on fiber optic cable and electromagnetic waves in the
wireless communication.
Now let us consider the application of these number systems to the Internet
technology. We, the human beings are more comfortable working with decimal numbers,
therefore, Internet Protocol (IP) addresses are usually written as dotted-decimal
numbers separated by periods (dots), each representing an octet, so that we can read
them easily. This is referred to as “dotted decimal notation”. This is in IP version 4
(IPv4) of the Internet Protocol which uses the 32-bit address scheme (divided into 4
octets) to identify a particular network and a host on the network. In IP version 6
(IPv6), the IP address is written in hexadecimal format. We have to remember that these
IP addresses which are written in decimal and hexadecimal numbers will be converted
28
into its equivalent binary numbers so that the network equipments such as computers,
modems, network interface cards (NIC), routers and switches could understand them.
Knowing and learning binary numbers and how they relate to decimal and
hexadecimal numbers are critical to understanding successfully the network routing, IP
addresses, subnets, and computer circuitry. Not to mention on becoming a successful
network administrator or network engineer someday. Who knows?
Examples:
Examples:
1.) 102 = 1 x 21 + 0 x 20
=2+0
= 210
2.) 1102 = 1 x 22 + 1 x 21 + 0 x 20
= 4 +2+0
= 610
3.) 11112 = 1 x 23 + 1 x 22 + 1 x 21 + 1 x 20
= 8+ 4+ 2+1
= 1510
= 11102
= 10012
30
= 11110002
31
LEC ACTIVITY
TEST 1
Chapter 2
The Basics Of Computer Hardware
“Man is still the most extraordinary computer of all.”
-John F. Kennedy, Jr.
The computer is very powerful and useful that they make our life very convenient
and comfortable. They are used in scheduling airlines flight which makes ticket
reservation so easy and fast, not to mention accuracy and convenience. They are even
used to predict or forecast the weather conditions, making us well-informed about the
incoming typhoon (or even a tidal wave). Automated Teller Machines (ATM) are
computers that allow us to withdraw cash anytime, anywhere. These are all but the few
benefits which we have enjoyed because of the invention of computers. Imagine, living
without computers, how lousy life could be.
But, what the computer can really do? Why can they accomplish such incredible
tasks? The truth is, computers can do only four simple tasks: receive an input, process
information, produce output, and store information. The question here is why they can
accomplish such tremendous task? The answer is: man made them so. Behind every
computer’s power and tremendous capabilities is an intelligent man. Man’s boundless
creativity and brilliance are the driving forces that power-up this computer; and they
express it in terms of a program. A program is a set of commands or instructions for a
computer to follow. We usually call this end-product: a software. This will be our topic
in the next chapter. As of this moment, we will just limit and focus our discussions to the
hardware aspects of computer.
Every computer system contains hardware components that are used for receiving
input, processing information, producing the output, and storing information. Let us start
with the input device. The most common input devices are keyboards, mouse, and
joystick (used in computer games). And the most common output devices are monitor
(screen) and printer.
Let us go to the microprocessor. The microprocessor is used in processing
information such as performing arithmetic computations and making decisions based on
given choices or alternatives. Technically speaking, the microprocessor is also called the
central processing unit (CPU) or the brain of the computer.
The most common storage devices that are used for storing information are floppy
diskettes, hard disks, CD-ROMS, DVD-ROMS, USB Flash Drive and backup tapes.
Computer’s memory (both temporary or permanent storage) such as RAM (Random
Access Memory) and ROM (Read Only Memory) are considered storage devices
(technically speaking). It’s because they are capable of holding information temporarily
(in the case of RAM chips) and permanently ( in the case of ROM chips). The computer
is made of these major components.
33
-1981
- In 1981, the first portable computer called Osborne I was introduced. It has two
floppy drives and no hard disk. It has pre-installed software – an operating system
called CP/M (Controlled Processor for Microcomputer), word-processing
software called WordStar and spreadsheet software called SuperCalc.
In August 1981, IBM Corporation introduces its first IBM PC running an
operating system called DOS (Disk Operating System) provided by Microsoft
Corporation. It runs a speed of 4.77 MHz, 16 KB of RAM with two floppy disk
drives and an 8-bit microprocessor with a model number of 8088 designed and
developed by Intel Corporation.
At the same year, Xerox Corporation introduces Xerox Star computer with the
use of a mouse. This is the first time, the mouse is used as an input device and as
an alternative (partially) to the keyboard for navigation of the PC’s screen.
-1982
-In 1982, the Sun Microsystems, Inc. was established (founded) and introduces
its first workstation called Sun 1. At the same year, Intel corporation, introduces
its 16-bit 80286 micro-processor.
-1983
-In 1983, Compaq computer company releases the first successful 100 percent
IBM-PC compatible.
-1985
-In 1985, Intel corporation introduces its 32-bit 80386 microprocessor. Another
giant computer company Hewlett-Packard, releases the LaserJet laser-printer with
its main feature is a 300 dpi (dot per inch) resolution.
-1986
-In 1986, IBM corporation introduces its first laptop computer. At the same
year, CD-ROM technology is being introduced as a promising storage device in
an international conference held in Seattle, Washington, U.S.A.
-1987
-In 1987, the Extended Industry Standard Architecture (EISA) bus design is
introduced by a group of independent computer manufacturers to compete with
34
-1988
-In 1988, Next Inc. a computer company established by Steve Jobs after he left
the Apple Computer company which he co-founded, introduces the first PC to use
Object-Oriented Programming (OOP) in its operating system and uses CD-ROM
drive instead of a floppy disk drive.
-1989
-In 1989, Apple Computer introduces its laptop computer called PowerBook. At
the same time, the Apple Computer together with IBM and Motorola companies
signed a cooperative agreement to design and produce a RISC-based (Reduced
Instruction Set Computing) chips, object-oriented operating system, and
develop common multimedia standards. Their collaborative efforts resulted to the
invention of the microprocessor called PowerPC.
-1993
- In 1993, IBM corporation introduces its first RISC-based workstation, the
RS/6000, powered by the PowerPC 601 microprocessor chip.
-1994
- In 1994, Apple Computer follows IBM by introducing its own RISC-based
computer powered by PowerPC microprocessor chip.
-1995
-In 1995, Intel Corporation introduces the Pentium microprocessor. Power
Computing company releases its first-ever Apple-Macintosh clones. It is called
Power 100.
-1996
-In 1996, the U.S. Robotics company introduces the PalmPilot. This is the start of
the world-renowned Personal Digital Assistant (PDA). At the same year, Sun
Microsystem introduces its first workstation with 64-bit micro-processor called
Sun Ultra.
-1997
-Intel Corporation introduces its Pentium II microprocessor. At the same time,
they introduced MMX (Multi-Media Extension) technology that increases the
35
-1998
-Intel Corporation releases the Pentium II Celeron microprocessor which offers
slower performance but with reduced price. Ideal for home-user or for companies
whose users do not need a fast PC. Intel Corp. names their new Pentium II as
“Xeon” which is designed for high performance network servers and workstations
used by companies or universities who need fast PC’s.
At the same year, Apple Computer introduces its colorful iMac. It features the
new G3 microprocessor and USB connections but without a floppy disk drive. It’s
microprocessor is more faster than Intel’s Pentium II.
-1999
Intel releases its Pentium III microprocessor which features an enhancements for
Website’s graphic application. In the same year, the Advance Micro Devices
(AMD) Corp., a premier competitor of Intel Corp. introduces its Athlon
microprocessor that competes with Pentium III’s Xeon and Celeron market.
Apple Computer at the same time, releases its iMac computer with a G4
microprocessor, faster than Intel’s Pentium III or AMD’s Athlon microprocessor.
-2000
Both AMD and Intel Corp. announced to release the world’s first microprocessor
to run in 1GHz speed.
-2001
Apple Computer introduces iPod, the first music player with an internal 5 GB
mass storage device that can store 1,000 CD songs. The 3 general categories of
Apple iPods are: iPod Shuffle (the smaller one with 1Gb capacity), iPod Nano (8
Gb capacity), and iPod Video (with 160 Gb of capacity). The iPod Shuffle was
designed and introduced to the market late, compared to the Nano and Video
version.
-2003
Another supercomputer was created by Mike Showerman and Craig Steffen. It
can perform 6.5 billion mathematical operations per second and it uses Linux as
its operating system. At the same year, Intel and AMD release its respective 64-
bit microprocessor, as well as Apple Computer with their Power Macintosh- a
G5-64 bit microprocessor.
We saw also around this year, the emergence of the Intel Centrino technology for
Laptop computers which are commonly known as “wireless” technology. This
36
means that you can surf the Internet with your Laptop without wires. Bringing
your Laptop to Starbucks and Robinsons Shopping Center, will give you a free
access to the Internet connection.
-2005
The Bluetooth-enabled devices allow sharing of text, pictures, videos, music or
files, across a broad range of devices such as on your cell-phone, PDA, or iPod.
The Intel’s dual core processors (also known as Core Duo) are hot in the market.
-2006
Intel’s Core 2 Duo is the emerging microprocessor technology in the market. It
boasts an increase of 40 percent more performance to its predecessor, the Core
Duo microprocessor.
-2007
Intel’ Quad Core is now in the market for Desktop computers. We are waiting
excitedly for the Quad Core CPU that will also be used to power-up the Laptop
computers.
instruction set computing (RISC). Most of the UNIX-based computers (such as the
high-end servers and workstations) are RISC-powered and as well as other Apple
Macintosh computers too. Todays Macintosh is powered by Intel Core 2 Dou and Quad
Core microprocessor technology, which means that the new breed of Macintosh
computers are CISC microprocessor designed.
Another microprocessor design technology is emerging in the present time (though it is
not a new idea, historically-speaking). Its hype is so overwhelming. It is popularly known
as parallel processing microprocessor design. This system has a multi-processing
capability. We have to remember also that the microprocessor’s architecture has the
biggest influence on how many transistors it has. And in microprocessor design, the more
transistors a microprocessor has, the faster and powerful it is.
AMD’s model of microprocessors and their primary use are the following:
The other factor that affects the performance of a computer is its capability to process the
number of bits of data at any one time. For example, the older Intel 8088 microprocessor
can only move data in 8-bit chunks. Then followed by the Intel 80286 microprocessor
that can move data in 16-bit chunks. The succeeding Intel microprocessors can move data
in 32-bit. And presently, AMD and Intel are producing microprocessor that can move
data in 64-bit. So the higher data bit-rate transfer, the faster the microprocessor. So if we
compare the data to vehicles running on the road, then bit-rate transfer can be compared
to road lanes. An 8-bit could be a one lane, and 16 bit could be two lanes, 32 bits are four
lanes, while 64-bits could be 8 lanes. The more lanes in the road, the more vehicles can
run. The same thing with bit-rate transfer in the computer. The more bit-rate transfer, the
faster the computer.
• Advanced Smart Cache – provides more cache system, thus, delivers higher
processing performance.
• Smart Memory Access – provides optimization of the available data bandwidth,
thus, improves system performance.
• Advanced Digital Media Boost – accelerates a broad range of applications,
including engineering and scientific applications, video, image, photo, and audio
processing, data encryption, and financial applications.
• Intelligent Power Capability – delivers more energy-efficient smarter battery
performance.
• Wide Dynamic Execution – delivers more instructions per clock cycle to
improve execution time.
bus means higher processing speeds and a faster computer. The PCI bus is a computer
bus used for attaching peripheral devices to a computer motherboard. While the AGP bus
is the specification for a type of dedicated video card interface over which the card can
access system memory (RAM) at a very high transfer rate (up to 2.1GB per second at the
66 MHz PCI bus clock speed). This provides up to eight times the bandwidth of the PCI
bus. AGP is one part of the solution to the memory requirements of accelerated 3D video.
Video cards use on-board memory for storing images, textures, and geometry data, which
allows the video hardware direct, rapid access to it. The amount of data is very large, and
the speed at which it must be transferred from the system memory is too high for the PCI
bus. The high bandwidth capability of the AGP allows data to move rapidly from main
memory to video RAM (Random Access Memory).
Cache Memory
The ROM (Read Only Memory) is a non-volatile type memory because the
program and data stored into it are permanent. Like RAM , the ROM is also a chip. The
computer can only read information or instructions from it, but it can never write or store
any new information or program on it. The ROM is used to check the basic subsystems
of the computer hardware, in order to ensure that all basic parts are working and in good
condition. Otherwise, the ROM won’t let the computer to function. In short, the ROM
holds the instructions (programs or software, technically speaking - a firmware) that the
PC needs to operate.
The CMOS
The CMOS (Complementary Metal-Oxide Semi-conductor) chip is used to hold
and record all the basic setups of the computer system such as the number of hard disks
installed, the system date and time, and if other computer peripherals are connected to it
such as modem, sound card and others. The CMOS is a type of semi-conductor design
technology that consumes less electrical energy.
In desktop personal computer, this chip is powered by a battery. That’s the reason
why your computer has an updated time clock and date, even if you had switched it off
41
for a day or week. All settings of hardware and software are recorded on CMOS chip.
Once we boot-up our computer, all the settings will be read and restored so that the
computer can function properly. In this way, the computer would know what are the
hardware peripherals are installed or connected to the computer‘s main system, the exact
date and time, and its software and hardware configurations.
Flash Memory
Note:
The MP4 technology works like the MP3. The MP3 compresses music and audio files without affecting its
quality, while MP4 compresses video or movie files. MP4 is also known as MPEG-4 AVC (Advanced
Video Coding).
The mouse or trackball are both pointing devices that are designed to move a big
arrow pointer around the screen and point to a specific characters or objects.
The touch screen can respond when the user points to or touches a particular
part of the screen regions. These touch screen is commonly used in a well-established
malls, airports, and libraries.
The touch tablet is used by designers, engineers, and artists. They use it for
drawing or designing a particular object.
The barcode readers use light rays to read a product code for the purpose of easy
inventory and monitoring of product movements and status. In a well-established stores,
barcode readers are attached to the POS (Point-of-Sale) machines or to the ECR
(Electronic Cash Register) machines. POS machines resemble like the ECR, but it is 100
percent computer since all the basic parts and features of Personal computer (PC) can be
found on it.
A scanner is an input device that can convert photographs, drawings, charts, and
other printed information into bit patterns which can be saved or stored in a computer’s
storage device or main memory. This stored information can be manipulated, revised,
modified or changed by the user using a special type of software.
A digital camera looks like an ordinary camera that we are using in taking
pictures to preserve a treasured memories and special moments in our lives. However, a
43
digital camera is not limited to capturing printed images; it can capture snapshots of the
real images. Instead of capturing images or pictures on the film, a digital camera stores
bit patterns on disks or other digital storage devices.
We use the webcam when we want to see our relatives, friends and acquaintances in a
distant places while chatting with them using the Internet. A webcam is a small camera
which images can be accessed through the Internet, instant messaging, or in video
conferencing. This webcam is attached to our desktop computer or already built-in in our
laptop computer.
The audio digitizers contain circuitry to digitize sounds from microphones and
can be stored into a computer’s main memory or storage device. Once it was stored, it
can be modified, manipulated or enhanced through the use of a special type of software.
There are also other input devices such as sensing devices which are designed
specifically to monitor temperature, pressure, and humidity. The data provided by these
sensing devices is used in scientific research and application, robotics, medical
monitoring, weather forecasting, and environmental climate control.
The joystick and game pad are game controllers used by the users to play games in the
computer alone or by groups or teams through a network-based computer games in a
Local Area Network (LAN) or in an Internet settings. The joystick enables the user to
“drive” or “fly” through a game, directing a vehicle such as a plane or car or directing a
character such as a soldier or warrior in a battle-ground.
and clearer its images appear on the screen. We have to take note, that as the resolution
increases, the image on the screen gets smaller. The resolution settings are expressed in
pixels horizontally across the screen such as 640 x 480 or 1280 x 1024 and so on. Higher
settings of resolution are not always better, because they can cause images on the screen
to appear too small which causes eyestrain. An eyestrain means a fatigue of the eyes.
The muscle of our eyes becomes strained when we look at the screen for so long.
The quality of the images or pictures that a monitor can display is defined as much by
the video card, also commonly known as video controller or video adapter. This video
card is a device we plug in to one of the expansion (input/output) slots in the PC’s
motherboard. In some newer designed motherboard, this video card is already built
directly on it. The most commonly used video cards are nVidia, ATI, and Intel’s GMA
(Graphics Media Accelerator).
Personal Computer replaces the old-fashioned slide projectors and overhead
projectors as the source of presentation. Instead, we are now using Data Projector
(LCD Projector), to present our slides with Microsoft PowerePoint presentation
software. This makes our presentation so attractive, alive and animated. We can show our
presentation directly to the white-painted wall, whiteboard or on a white large screen as
though we are watching the presentation the way we watch movies in the cinema’s
theater.
A printer is used to produce a hard copy on paper for whatever information or
images are displayed on the screen. There are two basic groups of printers: impact and
non-impact. Dot-matrix printers are the best example of impact printer. It prints text
and graphics by using pinpoint-sized hammers that transfer into the paper; while the ink-
jet and laser printers are the best examples of non-impact printer.
An ink-jet printer sprays an ink directly into a paper, while the laser printer use
a laser beam that creates patterns of electrical charges on a rotating drum. The patterns of
electrical charges attract black toner and transfer it to paper while the drum rotates.
46
A plotter is typically like a printer, but its primary use is in scientific and
engineering applications, since it can print large format images such as house blueprint
drawing designed by architects.
The LCD Projector (Data Projector) is used for presentation purposes which is
usually connected to our PC or Laptop. With it, we can watch the output of our computer
like the way we watch movies. We display the output into the big white screen, to a
whiteboard, or to a white-painted wall.
Note:
Today’s Laptop has no floppy drive. Instead, we use USB drive (or USB Flash disk) to store our
data, software, pictures, graphic images, MP3s, and .avi (video files or MP4s).
Hard disk is rigidly solid and magnetically sensitive disk that spins rapidly and
continuously inside the computer system unit case. We would know if the hard disk drive
is active when the small red light (located usually in-front of the CPU casing) is flashing
or blinking. This means that our computer is storing or retrieving data or information in
our hard disk.
USB Flash Disk (Thumb Drive) is a small and lightweight flash memory mass storage
device that is rewritable and removable. USB Flash drive is generally faster and can hold
more data and yet reliable to use. Its size is as small as our thumb, that is why the other
name of it is “thumb drive”. We have to plug the USB Flash Disk into the USB port or
hub so that we can access the data or software stored into it. We can see a small printed
circuit board (PCB) inside a transparent or a see-through Flash Drive case.
Tape Drive is a type of storage device that reads and writes data or information on a
magnetic tape. We usually used the tape drive to backup our important data or files from
our hard disk. The main disadvantage of this type of storage device is its slower seek
time, that results to slow access of data.
Computer Ports
The computer ports allow the user to connect to the input and output devices or other
peripherals into the PC or Laptop. These ports are usually can be found at the back of our
PC or in some cases, in-front of it.
. Keyboard and Mouse ports – as the name implies, we can plug our PC’s keyboard and
mouse into them.
. Monitor port – the LCD monitor is plug into this computer port.
. Network port – to connect our PC or Laptop to the company or school’s Local Area
Network (LAN), this is the port we use, as well as to connect to the Internet via the
company or school’s LAN. Presently, we call this port as RJ-45 port, the standard port
used in LAN technology. RJ stands for Reference Jack.
. Modem port - this is the port we use to connect our PC to a phone line in order to
access to the Internet. We usually call this port as RJ-11 port.
. Parallel port - the older model printer should be connected to this port for hardware
compatibility. Newer model of printers are using the USB (Universal Serial Bus) ports to
connect them.
. Serial port – this port is the one we use to connect our external modem. This is mostly
applied if we want to connect our PC or Laptop to the Internet via phone line and by
using open-source software such as Linux operating system (O.S). External modem is a
small box with light-emitting diode (LED) on it that indicates if the data are transmitted,
received or a signal is on. Microsoft Windows-based OS such as Windows XP or Vista is
using an internal modem that is directly installed and plugged inside our computer’s
motherboard and central processing unit (CPU) case.
. USB port – the universal serial bus (USB) is a newly designed port for computer
devices or peripherals to connect to, such as the printers, USB flash drive, iPod, and
digital cameras.
. Audio port - there is a color coding or symbols (sometimes called an icon) used and
applied to this port to distinguish it from one another. The yellow speaker out port is
designed to connect to home stereos, while the green speaker out is for desktop speakers
or headphones. The pink microphone port is for small microphone we use in chatting
over the Web.
Note:
Some Laptop most especially the Acer, has a color coding like the way we can find in our
PC. But some Laptop used only two ports, without any color-code. In this case, the icon
50
or symbol is used. The icon for audio port is used to connect your speaker or sub-woofer
on it, while the icon for microphone port is used to connect your small microphone on it.
Computer Bus
The computer bus is a group of parallel wires that is a path or route between the
different interconnecting components of a computer system. The two main buses in a
computer are the internal or system bus and external or expansion bus.
The expansion bus connects external devices such as mouse, printer, keyboard or
modem to the CPU, while the system bus connects the CPU to other devices that resides
on the motherboard (main board of a computer).
The system bus has two parts. They are called data bus and address bus. Since 1 byte is
equivalent to 8 bits, then a 16-bit data bus can transfer two bytes of data at a time, while a
32-bit data bus can transfer four bytes of data, and 64-bit data bus can transfer 8 bytes of
data. Like the microprocessor, the speed of the bus is measured in megahertz (MHz). The
address bus connects only the RAM and CPU and carries only memory location
addresses.
Bus Standards
. Universal Serial Bus (USB) is a hot swappable bus which means that a computer user
can connect then disconnect a USB device without affecting the PC or Laptop.
51
. Accelerated Graphics Bus or Port (AGP bus) allows the video card to access the
RAM directly, thus increasing the speed of graphics performance for 3-D (Dimensional)
and full motion video applications.
. PC Card bus is used exclusively on Laptop computer and is used as network cards,
external modem WiFi card, thumb scanner and biometric security system.
. FireWire (IEEE 1394) bus is used to connect digital and video cameras. We can use
the FireWire bus to transfer data in high speed rate.
Expansion Slots
Through expansion slots, we can increase the capability of our computer. Like for
example, you can add a new high-end video card to your PC so that you can enjoy
playing your computer games that demand higher video graphics display resolution. If
your PC is older and it has no internal modem attached to it, you can buy an internal
modem adapter card and plug it in - in one of the available expansion slots of your PC.
In that way, you can connect your PC to the telephone lines to surf the Internet.
The expansion slots are but just an extension of the computer bus that we have discussed
earlier. Can you still remember it?
The UPS
The Uninterruptible Power Supply (UPS) is a standby battery backup for your
computer or company’s server. The UPS provides temporary and limited electrical
energy while your computer and company’s server is experiencing electrical brown-outs
or any electrical power failure or when electrical current fluctuates abnormally.
Note:
The surge suppressor is a device that protects your computer against voltage spikes. There is also a device
called line conditioner that protects the PC with line noise which came from high-demand electrical
equipment that operates near your PC.
To convert decimal number into octal number, first we divide the decimal number
by 8. Then we have to take note the remainder after each computation of division
operation. The computation process will stop when the quotient becomes 0. Again we
have to read the remainders in upward direction or the last number is to be read first.
Examples:
Examples:
1.) 148 = 1 x 81 + 4 x 80
= 8+4
= 1210
2.) 2308 = 2 x 82 + 3 x 81 + 0 x 80
= 128 + 24 + 0
= 15210
3.) 68 = 6 x 80
= 610
Octal Binary
0 000
1 001
2 010
3 011
4 100
5 101
6 110
7 111
Examples:
1.) 368 =
3 = 0112
6 = 1102
= 0111102
2.) 1428 =
1= 0012
4 = 1002
2 = 0102
54
= 0011000102
3.) 75.038 =
7 = 1112
5 = 1012
0 = 0002
3 = 0112
= 111101.0000112
Other Solution
We can solve this octal to binary conversion by using the following technique:
Other Solution
We can solve this binary to octal conversion by using the following technique:
55
For example, to convert the binary number to its equivalent octal number we simply
group them into three bits: 4 2 1 / 4 2 1
1 1 1 / 1 0 1
By summing up all the octal numbers equivalent at the top of each respective binary 1
we can get the right answer : 758 (4 + 2 + 1 / 4 + 1).
Another example; to convert the binary number 100110000 to its equivalent octal
number, we group them again into three bits: 4 2 1 / 4 2 1 / 4 2 1
10 0 11 0/ 0 0 0
Now summing up all the octal numbers at the top of each respective binary 1, we will
arrive to the answer : 4608 ( 4+0+0 / 4 + 2 + 0 / 0 + 0 + 0 ). We simply didn’t
include in our summation any octal number equivalent at the top of each respective
binary 0.
Examples:
1.) 1110001012 =
1112 = 7
0002 = 0
1012 = 5
= 7058
2.) 110.1112 =
110 = 6
111 = 7
= 6.78
3.) 1002 =
100 = 4
= 48
56
LEC ACTIVITY
TEST 2
Chapter 3
The Basics Of Computer Software
“The heart has its reason which reason knows not of.”
-Blaise Pascal
The software is the one that drives the hardware (the computer) to do amazing
things. Without it, a computer is but just a box, nothing but a lifeless box. Software truly
brings the computer to life. Basically, the software enables a computer to perform
specialized task. In other words, the software contains a set of instructions for a computer
to follow willingly, like a servant following his or her master’s commands. Generally, the
software is categorized into two. The first one is the system software, while the other is
the application software.
Operating systems such as Windows Vista and Linux, and utility software such as
anti-virus program and anti-spyware are belong to the system software category. While
Microsoft Office 2007, database software, graphics software, computer games,
multimedia authoring software, entertainment and education software, are under the
application software category.
Note:
The Pascal programming language was created by Dr. Niklaus Wirth became the most
popular structured programming language in its time. During this decade, Pascal
language was used and popularized as the easiest programming language of choice by the
academicians, and in fact the most recommended programming language for introductory
course in programming in the United States and in other parts of the world.
-1972
The C Programming Language (PL) was created by Dr. Dennis Ritchie and Brian
Kernighan. The UNIX OS was re-written in C.
58
-1975
Bill Gates and Paul Allen (founder and co-founder) of Microsoft Corporation created
BASIC (Beginner’s All-Purpose Symbolic Instruction Code) computer programming
language to run on Altair microcomputer (PC). It is also in this same year they
established their company.
-1979
The VisiCalc was released by Software Arts, Inc. This is the first commercial
spreadsheet software for PC users. Today, we are using Microsoft Excel as our
spreadsheet software. On the same year, WordStar was released by MicroPro
International Incorporated. This is the first commercial word-processing software for PC
users. Today, we are using Microsoft Word as our word-processor. The Oracle
Corporation (formerly Relational Software Inc.) releases the ORACLE relational
database management system (RDBMS) software to the market. The Oracle Database is
the world’s first commercial SQL (Structured Query Language) language.
-1981
The Disk Operating System (DOS), an IBM PC-DOS and Microsoft’s MS-DOS
teamed-up and introduces it to the PC users. For over a decade, DOS dominates the PC
world as the most popular and widely used operating system, conquering more than half
of the market for IBM PC and Compatible users.
During this time also, the CP/M (Controlled-Processor for Microcomputers) operating
system is introduced to power up the first created portable computer, bundled with
SuperCalc (a spreadsheet software) and WordStar (a word-processing software).
-1982
The AutoCAD, an engineering and architecture software is introduced by Autodesk, Inc.
It is primarily used to design 2-D and 3-D (D stands for Dimensional) drawings or
objects.
-1983
The first version of C++ Object-Oriented Programming (OOP) language was
developed at AT&T Bell Laboratories, lead by Dr. Bjarne Stroustrup.
-1984
The free software project called GNU (GNU’s not UNIX) was initiated by Richard
Stallman of Massachusetts Institute of Technology (MIT). The Free Software Foundation
supports the undertaking, as an alternative to expensive proprietary software like the
59
Microsoft products and technologies. At the same year, another word-processing software
called WordPerfect was released by Satellite Software International. This software has
more capabilities than the previous WordStar word-processor.
-1985
The first desktop publishing software called PageMaker was released by Aldus Inc.
Although it was originally developed for Apple Macintosh computer, sooner it was also
developed for IBM PC and Compatible computers.
At the same year, the first Graphical User-Interface (GUI) operating system for IBM PC
and Compatibles called Windows 1 was announced by Microsoft Corporation.
-1987
The visual programming language called HyperCard was introduced by Apple
Computer.
-1988
The first multi-tasking and multi-user operating system for IBM PC called OS/2 1.0 was
introduced by IBM and Microsoft corporations. They jointly developed this operating
system (O.S.).
-1989
In 1989, the Word-processor of Microsoft called MS Word for Windows O.S. was
introduced in the market.
-1993
In 1993, Microsoft Corporation releases the Windows NT operating system (OS).
-1994
In 1994, the most commonly used Linux distribution called Red Hat Linux was
introduced to the market.
-1995
In 1995, Microsoft Corporation releases the Windows 95 operating system. At the same
year, the computer scientists at Sun Microsystems created and developed the Java
programming language that runs on any hardware and software platforms.
60
-1996
In 1996, the Virtual Reality Modeling Language (VRML) was introduced to the PC
users. This is an authoring tools that provide simple interfaces and drag-and-drop editing
features to create three-dimensional worlds with color, sound texture on the Internet Web.
-1998
Microsoft Corporation releases the Windows 98 as an upgrade version of Windows 95.
Microsoft Visual Studio 6.0 which consist of Visual Basic 6.0, Visual C++ 6.0, Visual
FoxPro 6.0 and Visual InteDev was also released for programmers and developers.
-1999
In 1999, the Linux O.S.-based Star-Office which is a fully-featured alternative to MS
Office was released in the market by Sun Microsystems.
-2000
In February 2000, Microsoft Corporation releases Windows 2000 operating system as
well as the SQL (Structured Query Language) Server 2000. At the same year, the
giant computer hardware company (IBM) announces to ship their PC’s bundled with
Linux operating system.
-2001
In 2001, Microsoft Corporation introduces Windows XP operating system as an update
to Windows 2000 Professional, a client-operating system. At the same year, the Apple
Computer company introduces a new operating system called OS X. It is based on BSD
(Berkley Software Distribution) UNIX with magnificent graphical user-interface (GUI).
-2002
In 2002, an operating system developer Michael Robertson introduces Lindows, a Linux-
based O.S. with a fully graphical user-interface (GUI). This O.S. is packaged with an
OpenOffice software, an MS Office counter-part in Linux world. During this year, the
OpenOffice is a file-format compatible with MS Office, meaning you can open your MS
Office application to OpenOffice. The beauty about OpenOffice is that it can run on
Linux, as well as in Windows, Apple Mac OS (OS X), and even in Sun Solaris (a UNIX
O.S.). The first release of Visual Studio .NET framework happened in year 2002. The
new programming language called C# (C Sharp) was also introduced to the developer’s
community.
Note:
The C# programming language was originally launch in 2000. However, its official release as part of the
Visual Studio bundled programming language product was in 2002.
-2003
The Microsoft Corporation releases a family of Windows server-operating system called
Windows Server 2003 which include the Windows Server 2003 Standard Edition,
Enterprise Edition, Web Server Edition, Small Business Edition, and Data Center
61
Edition. At the same year, the MS Office 2003 was also introduced to computer users as
well as the Visual Studio .NET framework’s second release.
-2005
The Microsoft Corporation releases an enhancement to the .NET framework which is the
Visual Studio 2005. Microsoft SQL Server 2005 was also introduced. This is a major
enhancement to the previous SQL Server 2000.
-2007
The long-awaited client-operating system popularly known as Windows Vista was
released in 2007. This will replace Windows XP operating system. At the same year, the
Microsoft Office 2007 was also introduced to PC users. In the third week of November
2007, Microsoft corporation releases the Visual Studio 2008 which exclude the J#
programming language. The remaining programming languages packed into Visual
Studio 2008 are Visual C# 2008, Visual Basic 2008, Visual C++ 2008, and Internet
web development software called - Visual Web Developer 2008.
-2008
Microsoft Corporation releases a new family of server-operating system called Windows
Server 2008, and at the same time, the SQL Server 2008 is also introduced to the
systems administrators and database administrators.
For example, in a computerized enrollment system, the data are the names,
student numbers, subjects enrolled, and number of units taken. When the computer
processed these data, it produces the information: the registration form that contains the
list of subjects with its corresponding units, the different fees to be paid, such as
miscellaneous fees, library fees, and laboratory fees. From the registration form, you
would know how much tuition you have to pay, what room you are assigned and how
much you would pay for the next payment period such as on midterm exam or final
exam. These information are helpful to you for your budgeting tasks, otherwise you
wouldn’t know exactly how much you spend for leisure and fun without sacrificing your
budget for the tuition fee. In short, information can help us to decide effectively. This is
also applicable to other computerized business application systems. They are designed
and constructed to help managers and executives to decide and manage effectively.
Information Technology (IT) is truly an indispensable tool that aids our decision-making
process.
other module. The module can be reused by other parts of the program. The program in
structured programming language is viewed as a logical procedure that takes an input
data from the keyboard or disk, process the input data by the microprocessor, and
produces output data into the monitor’s screen.
C Programming Language
The C programming language was invented by Dr. Dennis Ritchie at AT&T Bell
Laboratories, New Jersey, USA in 1970’s. This is considered as one of the most powerful
programming language in its time. Its main objective why it was created is to replace
Assembly language as a programming language to design and develop operating systems
and system programs such as compilers, interpreters, utilities and databases. C language
was so very successful in its attempt. In fact, C was used and implemented by Dr. Ritchie
to develop the UNIX operating system. And almost all of its codes are written in C. Some
minor codes are written in Assembly language. The C programming language is
considered as middle-level programming language, because it combined the power of a
low-level language such as the Assembly language and the elegance of high-level
language like Pascal language. This further means that C language can directly
manipulate the bits, bytes, and even the computer hardware memory addresses. This
makes the C programming language so powerful and ideal for system programming and
embedded intelligence programming. Embedded intelligence programs are embedded
inside an Integrated Circuit (IC) that can be found in some intelligent electronic devices.
The computer scientists had observed that the Structured Programming languages
like Pascal and C can no longer meet the present demand of computing. More and more
users wanted more graphics; programmers and developers wanted more powerful
language that can make larger programs easier to develop, manage, and maintain. This is
the very reason why C++ was created: to come up with a programming language that
makes larger programming tasks easier and faster to design and construct.
C# Programming Language
The Microsoft corporation releases officially the C# programming language
version 1.0 in July 2000, which primary objective is to change the way how the
programmer and developer construct their Windows and web applications. This language
was invented by Anders Hejlsberg and Scott Wiltamuth – the two distinguished
Microsoft engineers. Anders Hejlsberg is legendary in the circle of programming
language invention arena, because he was the one who created Turbo Pascal
programming language and lead-creator of Delphi IDE at Inprise company (formerly
Borland International).
C# is created and developed by combining the strengths found in three
programming languages: C++, Java, and Visual Basic, and avoids its respective weakness
points. The objective of C# is to provide an object-oriented, Internet-centric, high-
performance and yet simple language for the .NET framework development
environment.
67
Note:
I am also writing about Java book. If you are intrigued enough about Java’s immense power and capability,
then I’d like to suggest that you have to read books about Java programming, especially the one I wrote. I
explain Java programming in that book in a way that is easy to learn, understand, and enjoyable to program
with. I promise.
Development (RAD). These capabilities of Python language are suitable for scripting
operating system administration tasks or as a glue language to connect system
components together. Like any new high-level programming languages, Python is also an
Object-Oriented Programming (OOP) and interpreted language. One of the most
outstanding features of Python is its simplicity in the implementation and design. For
example, it is easy to debug your Python program, because any error or bad input data
found in your program will not cause a segmentation fault. Instead, the Python interpreter
will simply raise an exception when an error or bad input occurs. And if in case the
Python program was not able to raise an exception, the Python interpreter will simply
print a stack trace for a programmer to easily trace the error in his or her program.
Note:
The exception is an error-handling mechanism within your program. Usually, this exception code is written
with the combination of try-catch and finally statements.
The HTML
The HTML is a scripting language that was developed by Tim Berners-Lee back
in 1989. We will use HTML in writing simple web pages.
The HTML stands for Hypertext Markup Language, which defines a set of
common styles for web pages. These common styles or elements are the tags, headings,
paragraphs, lists, tables and character styles (fonts) such as boldface, italics, or
underlined. The HTML describes also the structure of a document.
Markup language means that we start with the text of our page and add special
tags around paragraphs and words. The tags indicate the different parts of the page and
produce different effects in the browser. The HTML tags are the information inside the
bracket (< >). This indicates the elements or features of a page. The pages written in
HTML are plain text file. They can be read by any text editor that supports text writing.
Each HTML page needs a title to indicate what the page describes. The title
indicates what the web page is about and how it is used to refer to that page in bookmark
or hotlist entries.
71
<HTML>
<HEAD>
<BODY>
</TD>
<<FONT FACE="Helvetica, Arial"
COLOR="#000000">
<B>Our Portable
<BR>GenLab is ushering
<BR>in a new age.</B></FONT>
<FONT FACE="Helvetica, Arial"
COLOR="#0000FF">
<B>Would you
<BR> like to see
it?</B>
</FONT></FONT></TD>
</HEAD>
Figure 3.7 Sample HTML code
</BODY>
</HTML>
The JavaScript
The JavaScript is a scripting language that enhances the functionality and
usefulness of the mere static HTML web pages. With the use of JavaScript, we can create
dynamic and interactive web pages such as validate information in our Form that is filled-
up and submitted by a visitor of our website, add alert boxes to our web page, customize
reactions to mouse actions and keystrokes, perform calculations, and much much more.
The JavaScript was developed by Brendan Eich at Netscape Communications in 1995,
the company that releases the first world renowned web browser – Netscape Navigator.
The good thing about JavaScript is that it adheres to Object-Oriented
Programming (OOP) design principles, though not completely. In other words, you can
apply your OOP knowledge and skills in designing and developing JavaScript code.
<html>
<head>
<title>Displaying Hello World!</title>
<script type="text/javascript">
var datenow = Date();
var msg = 'Hello, World! The date today is ' + datenow;
alert(msg);
</script>
</head>
<body onload="hello();">
</body>
</html>
72
The PHP
The PHP (Hypertext Preprocessor) scripting language is used to create dynamic
Internet web pages. This PHP is an embedded and a server-side scripting language
which goal is to allow the Web developers to write dynamically generated pages quickly
and efficiently. Most of the command and function syntax of PHP are borrowed from C
programming language, Java, and Perl scripting language. The PHP is also very excellent
in database connectivity, whether you are using MySQL database, Oracle database,
PosgreSQL database, and others. Rasmus Lerdorf, invented PHP which was originally
defined as Personal Home Page. His original main purpose of inventing this scripting
language is to be able to monitor the Web page views. However, it was developed into a
more powerful language that is capable of developing dynamic web pages and database
connectivity in a simple and straight-forward manner.
<html>
<head>
<title>Hello World</title>
</head>
<body>
<?php
?>
</body>
</html>
The XML
The XML is a markup language developed by the World Wide Web Consortium
(W3C) which main goal is to overcome the limitations of HTML. The acronym XML
stands for the eXtensible Markup Language. In XML, there is no predefined tags, unlike
in HTML. Meaning, the designer and developer of the web page and website will create
the tags only if they are needed for his or her applications. This is how the XML
developer would do to his or her documents, to structure it the way he or she wants it.
Structuring a document is providing format to a document. This formatting process will
dictate how a document must be processed, manipulated, or presented. Like for example,
the price tag means a price tag in XML. Now this price tag has no equivalent tag in
HTML because the XML developer is the one who assigned this tag to his or her Point-
Of-Sale application system. Truly, XML extends the capability of HTML and made it
more useful, powerful, and flexible.
<?xml version=”1.0”?>
<productlist>
< product code=”01”>
<name> Hamburger </name>
<price> 35.00 </price>
</product>
The CGI
The CGI stands for Common Gateway Interface, a method for running
programs on the web server that is triggered by an input from a web browser. The CGI
scripts enable our reader to interact with our web pages. These interactions can be a
simple search for a chunk of information in a database, or to select an item from a form
and get a reply in return, or to offer a comment on what we have written.
When we encounter a search dialog or a fill-in form (in case of membership
application) on the web, then we have to use a CGI script in real application. A CGI
74
script is an extremely powerful feature of server interaction and web browser. The script
is usually a link between the server and some other program running on the Internet
system. This is usually a database program. The script performs some action based on the
input from the browser. The action includes calling other program from the system,
querying a database information, or calculating a value. The script also generates an
output which the server can understand. When the server receives the output from the
script, it passes back to the Web browser. Finally, the browser formats and displays the
output for the readers.
Note:
The Perl and other operating system scripting languages, particularly in the UNIX and Linux environment
are not included in the discussion above, because most of these scripting language originated as a system
administrator’s tool to accomplish his or her task in managing the network. They are not originally part of
the scripting language that revolutionizes the Internet technology. Though, in one way or another, they are
used in some cases to accomplish some Internet-related processes, they cannot be classified as scripting
language for the Internet web design and development purposes. The “opinion” is purely mine.
Authoring Software
Windows Vista
(A Real-Life Example of a Client or Workstation Operating System )
The Microsoft Windows Vista is a computer operating system. The World Wide Web is easily
accessible from anywhere in Windows Vista. By using Windows Vista, we can access the Support Online
Web site for answers to our common questions . It has tools that can help us to regularly test our hard disk
and check system files. Plus, it can even correct some of the problems found.
Windows Vista is a truly Web integrated. The Internet connection wizard makes the connection
to the Web fast and simple. Using Microsoft Outlook Express, we can send e-mails to our friends or post
messages to the newsgroups in the Internet. With the use of Microsoft NetMeeting, we can collaborate with
others on documents edited by teams. Plus, we can even hold a teleconferencing over the Internet. Using
Microsoft NetShow, we can play live media over the Internet.
Windows Vista supports DVD technology and high definition digital audio, so we can play high
quality digital movies and music on our computer. Using Microsoft Web-TV, we can watch television
broadcasts and check TV program listings.
Windows Vista includes a wide range of helpful troubleshooters that assist us with common
computer problems. When we have difficulty setting up a new high-tech printer, the Print troubleshooter
can walk us through the process step by step. We can use the Support Online Web site to find answers to
technical questions about Windows Vista.
The Windows Vista includes the Discover Windows Vista online tutorial, which teaches us about
the basics of Windows operating system. We can subscribe to our favorite Website, we can schedule times
77
for Windows Vista to automatically check the website on a regular basis and notify us when the website is
updated.
The Web pages that we subscribe to can be automatically downloaded to our computer or sent via e-mail.
By subscribing, we are free from the hassle processes of downloading, connecting times, and busy Web
servers.
In Windows Vista, we can browse the computer contents the same way we surf the Web sites.
More than ever, the PC’s now has more three-dimensional look, more shading and rounded corners. It
offers also some brighter color choices. It supports also the capabilities of a new microprocessor in 64-bit
to take full advantage of it.
With Windows Media Player 11, users can take advantage of digital broadcast support, as well as
video and audio rendering for multimedia presentations. Windows Vista enables the computer to find and
use hardware connected via a network by taking advantage of the universal Plug and Play support feature.
The automatic configuration feature of mobile computing in Windows Vista makes it easy to connect to the
Internet on this present time of wireless technology.
With Windows Vista’s IrComm modem support, we can use a cellular phone to connect to the
Internet. In addition, we can protect our data, programs and other files through its complete PC Backup
and Restore feature. This particular feature is ideal for disaster recovery when our PC malfunctions.
With Windows Firewall feature, we can stop many kinds of malware before they can infect our PC
or other computers on our Local Area Network (LAN). This feature is a critical first-line of defense to
protect our PC against many types of malicious software such as viruses, Trojan, and worms.
The Wireless Networking of Windows Vista, allows us to create a PC to PC wireless network
right in the comfort of our home. With wireless technology, playing computer games can be very exciting
and comfortable anywhere in the house or in the backyard or in the “sala” or in the kitchen.
Now you can easily edit your family affair videos with Windows Vista’s Movie Maker feature.
This affair could be your first baby’s birthday, your debut of last year, or simply your family’s yearly
reunion. These are just among the Windows Vista’s features. Discover the other features by yourself. Are
you ready now?
Here are the summary of the things you can do with Windows Vista:
• Finding the File in a few quick clicks – you can save time by instantly tracking down any file,
document, MP3, video, software, or photo by using the Instant Search capability of Windows
Vista.
• Keeping Photos Organized – with Windows Vista, you can tag your photos with a keyword or
date, or any label that you can remember easily, so that you can search them quickly using those
labels.
• Create a Customized Movie – the Windows Movie Maker feature of Windows Vista can blend
photos and videos into a personalized movie with soundtracks of your own choice, and proper
titles that you can imagine, and credits and acknowledgements for those people involved in the
movie-making process. After-all, movie-making is a team effort.
• Keeping track of your Music – With Windows Media Player 11 (all-black effect), you can
easily browse and play your MP3 and WMA files or your entire music library. It takes only a
single click to create a new playlist of your favorite music album or your most played tracks of
songs.
• Watch and Record TV drama series - this time, you can record any TV drama series (or
comedy series) any time you want, and watch it at your own convenient schedule. The computer
hardware you just need is a TV tuner that you can buy from your favorite computer store, and the
software you need is the Windows Vista’s Media Center.
• Surfing Multiple Web at once – with the new Internet Explorer 7, you can open multiple web
pages in one window and easily click between them with its tab browsing feature. A similar
feature and capability that you can find with Mozilla Firefox (a reincarnation of the Netscape
Navigator’s glorious days).
• More System Security- with Windows Vista’s Defender security software, you can be protected
from spam and phishing. Plus, you can protect your children from encountering some “for adults
stuff” in the Internet by using the centralized Parental Controls feature. With Parental Controls,
78
you can set boundaries on what your kids can do on the computer connected to the Internet to
provide them a safer web-surfing experience.
• See everything you have open lately – with the Windows Flip 3D, you can easily track of what
files you have open lately, by flipping through all the files and windows with a simple click of the
mouse.
Linux
The Linux is a multi-tasking operating system that supports multiple users and
multiple processors. Linux can run on nearly any type of computers (from Desktop,
Laptop, Server, and Supercomputers), and supports almost any type of software
applications. The most popular Linux operating system distributions are from Red Hat
Linux and Novell Linux. Most of the Linux distributions are free. Meaning, you can get it
without worrying about licenses or online activation.
UNIX
The UNIX operating system has been popular for high-powered workstations that
are used in engineering and scientific applications. It is also heavily used in a mission-
critical applications such as Web servers that are used for online transactions,
maintaining Internet domain names, large database servers of banks, manufacturing
companies, and pharmaceutical firms.
Mac OS X
The new Apple Macintosh operating system, popularly known as Mac OS X, is
based on the UNIX operating system code (the BSD (Berkley System Distribution)
UNIX). The Mac OS is heavily favored by graphics artists, multi-media developers, and
media publishers. This is due to its highly powerful graphics features and capabilities.
Graphics artists who created cartoon movies and TV cartoon series, TV, magazine, and
newspaper advertisements, are using iMac computers as their tools for their creative
works.
There is another kind of operating system that is not popular to us, but we usually
used them already through some of our electronic gadgets. This kind of operating system
is directly built into the circuitry of an electronic device such as in our PDA’s (Personal
Digital Assistant), cell phones, medical equipments, bar-code scanners, and electronic
devices found in automobiles. The widely used embedded operating systems are the
following:
• Microsoft Windows CE.NET and Windows XP Embedded
• Palm Pilot OS ( found in Palm PDAs and Sony PDAs)
• Microsoft Pocket PC OS
• Symbian OS (found in smart phones of Nokia and Sony-Erricson)
The Internet devices called routers and switches use an operating system that is
specifically designed for them to operate and work. Most of the popular router and switch
are designed and developed by Cisco Systems, the world leader in Internet device design
and manufacturing. It is called the Cisco IOS. A router is simply a special type of
computer with very specific function and purpose. Like the computer we use that needs
an operating system to run, the router needs an OS to run too. The router needs the Cisco
IOS to run configuration files that contain instructions and parameters that control the
traffic in and out of the Cisco router or switch. The configuration files specify all the
information for the correct setup of selected routing protocols on the router to
communicate with other routers, successfully. By using routing protocols, the router can
decide effectively how to send the packet that contains data or information to the best
path to reach its destination in a fast and efficient way.
The Operating Systems are actually categorized in four classifications. The first
one is the Workstation OS which are used primarily by computers that are not connected
to the networks. These are usually the type of operating system that we used at home, or
installed in our laptops. The Microsoft Windows, Linux, and UNIX, have their own
individual version for this workstation operating system. The most popular are from
Microsoft which are called the Windows XP Home Edition and Windows XP
Professional and Windows Vista. The Windows XP Professional operating system is used
primarily in the computers found in the company that are connected to the Local Area
Network, Intranet, Internet or Extranet. It is specifically designed for a computer
(workstation) that connects to the server in the network that needs system security
settings.
The second category is a Network Operating System (NOS) that is specifically
designed for network servers. Network servers act as the main computers used in the
company. The most famous server operating systems are still from Microsoft. They are
the Windows Server 2003 and Windows Server 2008. The Linux and UNIX operating
systems are usually used as server operating system in the company.
The third in the category of an operating system is the one used for PDAs, cell phones,
bar-code readers, and electronic devices found in automobiles. It is called the embedded
operating system. The most popular embedded system are Windows CE.NET,
Windows Pocket PC, Palm OS and Symbian OS.
The last category is an operating system called the Internetwork Operating System
(IOS) which specific application is in the Internet devices called routers and switches.
Because of the IOS that powers up the router and switch, the computer connected to the
Internet can communicate to each other, regardless of distance or time. The router and
switch made this possible.
Utilities Software
The operating system has already the utility software programs included in its
package. These utility programs perform system maintenance, repair, enhance or extend
the capabilities of the operating system.
The utility software is used when damaged system files happened during the time
we forget to shutdown our computer properly. Some other cases involve the sudden
electrical power outage and hard disk’s head crash. This would result to many bad sectors
and lost clusters in our hard disk. This is reported during the time we boot our computer.
When the damage is a severe case, it is advisable that we have to reformat and
repartition the hard disk. Although some of the stored or saved software and data can be
back-uped, the affected files are possibly cannot be restored. There are commercial utility
programs such as the famous Norton Utilities that can repair these affected files. You
have to purchase this utility software separately. The Norton Utilities can diagnose and
repair damaged disk, recover files that have been accidentally deleted, resurrect a crashed
hard disk, and optimize hard disk drive performance by defragmenting the disk.
82
The antivirus software, backup utilities, and firewalls are also classified as
utilities software. They can enhance or extend the capabilities of the operating system.
The antivirus utility can examine or check the contents of the hard disk, USB drive, and
RAM for hidden viruses that might be lurking on these storage devices. The firewall
software or hardware (or a combination of both), can examine or block traffic coming
from or going to the Internet. In this way, your computer could detect (and will inform
you) if you are being attacked by a hacker or simply an intruder that violates your right to
privacy.
Type Examples
Note:
Download manager software such as IDM (Internet Download Manager), Torrent, and Kazza, are
classified as software utilities too. They are used in downloading files in the Internet in a fast and easy way.
83
The Microsoft Word 2007 is a full-featured word-processor designed to help us work efficiently
with our paper works in the office. Typing text in MS Word is similar to typing on a mechanical typewriter.
The letter arrangement of the keys is the same. So if we have a background in using a typewriter, it is easier
for us to learn how to use the keyboard.
We could find that MS Word 2007 is easier to use than a typewriter. Moreover, it helps us to
accomplish our task faster, more neat and presentable. For example, when we type enough words to reach
the end of the line, MS Word automatically moves to the next line. This feature is called a word wrap.
With this feature, we don’t have to watch for the end of the line.
The most outstanding feature of MS Word is its editing capability. If we change our mind after we
write something, we can edit what we have written, delete the word or sentence we do not want or add a
word or sentence to our document. And then the MS Word will automatically adjust the spacing of the text.
We can also apply formatting to control the appearance of our document. We can format the text
appearance by making it in italic, underlined, or bold form. We can even specify to center the text, to left
justify or to right justify the text. Plus, we can add or insert pictures and graphs to our documents. Not only
that, the MS Word can automatically check the spelling of our text. So you don’t have to worry about
wrong spelling anymore. With this feature of MS Word, we can be perfect in our spelling. How about our
grammar? Well, the time will come, the MS Word can accurately pinpoint our grammatical errors. For
now, let us be just contented with what it can do.
When an MS Word, finds a wrong spelling, it underlines the word with a red zigzag line. You
could notice that it underlines your first name, last name, address or tagalog expressions you typed in your
document. Take note that the word “tagalog” here was underlined with a red zigzag line by the Microsoft
Word 2007 at the time I typed this document . This means that the spelling checker of MS Word can only
understand English words and consider other foreign words as misspelled words as its default. When an
MS Word, suspects a wrong grammar in your sentence constructs, it underlines the phrases with a green
85
zigzag line. Now remember, MS word is like humans, it is not perfect (the grammar correction pinpoints
only some possibilities, not accuracy of pinpointing it).
The new Microsoft Word 2007 features a translation tool tip option available for English (US), Spanish,
and French. When selected, pointing the mouse cursor over a word will display its translation in the
particular language. With the Document Inspector feature, it can strip MS Word documents of information
such as author name and comments. The feature of building blocks lets us save frequently used content,
so that they are easily accessible for further use. The contextual spell checker feature catches incorrect
usage of correctly spelled words. With MS Word 2007, we can write directly our blog entries to a blog
sites. These are but just few of the features of MS Word 2007.
Note:
This book is written using MS Word 2007!
Note:
The Adobe Reader 8.1 is used to open a .PDF (Portable Data Format) formatted document. You oftenly
encounter this type of document when you are downloading a document from the Internet.
86
contain multiple worksheets. A worksheet is a grid of rows and columns in which we can type the data or
value. The cell is designated by a thick border, and it is the intersection of rows and columns in a
worksheet. An active cell is a cell in which you can enter data in a worksheet.
Excel provides capabilities for moving the existing content of one or more cells to a different
location. This approach is called cut and paste because you cut or remove data from its original location,
and then paste or insert the data at a different location.
A font is a general appearance of text, numbers, and other character symbols. To make our
worksheet attractive, we have to change the font and font size for selected headings, labels, and values.
Using the AutoFormat feature, we can format the data in our worksheets, applying a professionally
designed template. It adds different colors, shading, and font effects to provide clarity and visual appeal to
the worksheet.
The Microsoft Excel contains graphing functions too, which has its own ChartWizard. With the
use of ChartWizard, Excel can walk us through the four necessary steps required to create a chart (graph).
Excel has a database manipulation capability. It can organize the data or information in systematic way. In
other words, Excel spreadsheet software can store and retrieve data, in the same way we use database
management system software such as Microsoft Access or Microsoft SQL Server. But maybe not that good
enough like the way Microsoft Access can do.
The new Microsoft Excel 2007 features conditional formatting that support Color Scales, Icon
Sets, and Data Bars. The color scales will automatically color the background of a group of cells with
different colors. The icon sets will precede the text in a cell with an icon that represents some aspect of the
value of the cell. The data bars show a gradient bar in the background of the cell.
The Formula Auto-complete feature of MS Excel 2007 automatically suggests function names,
arguments and name ranges and automatically completing them if desired. The feature of CUBE functions
allows the importation of data including a set of aggregated data from data analysis services coming from
SQL Server Analysis Services.
The Page Layout View feature shows the spreadsheet in a way that mirrors the formatting that
will be applied when printed. The Quick Filter option allows the selection of multiple items from a drop
down list of items in the column. The option to filter based on color has been added to the choices
available. Its new charting engine feature supports advanced formatting, including 3D rendering, shadows
and transparencies. The chart layouts can also be customized to highlight various trends in the data.
The User-Defined Functions (UDF) feature of Microsoft Excel 2007 are custom functions
written by the user to supplement Excel’s set of built-in functions. This is handy if the function needed by
the user cannot be found in Excel 2007.
Most of us are using Microsoft Word 2007, Microsoft Excel 2007, Microsoft
PowerPoint 2007, and Microsoft Excel 2007, to accomplish our paper works in the office
or in the school. There are other application software that are bundled with Microsoft
Office 2007 which most of us are not aware of or not familiar with. What they are and
what they can do to make our work better and life easier, are listed below:
Computer Simulation
Schools, military, and businesses use simulation techniques for training. User-
oriented simulations allow the person to temporarily live their fantasies. Sports
simulation like the world re-known athlete stars are among the favorite computer games
of the new generation today.
In military application, the fighter jet pilot can simulate the right and safe landing of F14
in an aircraft carrier using the computer.
Database software allow users to efficiently and quickly manage, organize, store and
retrieve large amounts of information. We can view data in many ways, arrange records
in any order, and print reports in any form and arrangement.
94
Corporate Databases
Note:
The Microsoft SQL Server Management Studio is a database utility that is used mainly to manipulate the
table and other parts of SQL Server database.
Note:
The Oracle SQL Developer is a database utility software which is the graphical-user interface (GUI)
equivalent to the Oracle SQL Plus console-based manipulation of the Oracle database. This Oracle SQL
Developer can also be used to manipulate the database of SQL Server, MySQL, and Microsoft Access,
graphically.
MySQL
This is the most popular and widely used RDBMS in the open-source community.
Well, it doesn’t mean that MySQL Database runs only in Linux, it will also run in
Windows operating system environment. MySQL is definitely simple to use, probably
because it has less features than Oracle or SQL Server. This does not mean that MySQL
RDBMS is not powerful. As a matter of fact, there are about over 4 million installed
MySQL Database applications worldwide, estimatedly. Since MySQL is an open-source
RDBMS, therefore, it is free. Now when cost is the main factor why your company
cannot afford a high-end RDBMS like Oracle or SQL Server, then settle with MySQL
first. Later on, if you have the ready budget in your pocket, switch-on to Oracle or SQL
Server. This is only in the case of a company. For personal use, like for experimentation
purposes, you can have every database you want, from Oracle, to SQL server and many
others, free of charge (by downloading the Express Edition at the Internet). Believe me, it
is true.
97
PostgreSQL
The PostgreSQL is dubbed as the world’s most advanced open-source database.
This RDBMS was originally developed in early 1970’s and was formerly called “Ingres”.
Ingres database became a commercial database success. As time goes by, many interested
RDBMS creators enhance and improve the capabilities of PosgreSQL, until such time
that today, it was developed by many developers around the world to become a highly-
scalable object-relational database server.
98
Note:
The PG (PostgreSQL) Explorer is a database utility software that is used in manipulating the PostgreSQL
database.
99
Okay, we already heard that the Open Source Community or the Open Software
Foundation is giving their software for free. Yes, definitely yes! That is the very reason
why you got your Linux operating system for free. You get your PHP and MySQL free,
and Java programming language too! Plus, a dozen of cool and powerful software are
given away for you to learn and master.
But, we must not forget also that commercial software that cost millions of pesos
have their own free version. The giant computer software companies such as Microsoft
and Oracle call their free software version as Express Edition. Though it has some
inherent limitations, these limitations are purely more of limited storage capacity of data
to be stored and computer memory and CPU usage, not actually with software features
and capabilities. You can download these software directly from their website. This
further means, that whatever you want to learn and dream to design and develop, you
have the tools you need to transform them into reality. And all these tools are free for
your constant practice and experimentation in honing your programming knowledge and
skills.
The actual application of Hexadecimal Number System is in the way how the
computer assigned memory addresses. Memory addresses are the actual memory location
where each data is stored systematically for easy and fast search and retrieval process.
Moreover, our data, information, program, or software are stored in hexadecimal number
format. Needless to say, it’s like Octal Number System that is used to conserved memory
storage space. We have to take note that the computer system has done many conversion
process involving a binary to decimal number conversion and vise-versa to store, retrieve,
manage, and control our data, program, or software.
In computer networking, Hexadecimal Number System is applied as the physical
address of the LAN-card which is called MAC (Media Access Control) address. In other
words, each and every LAN-card in a computer network has a unique MAC address that
is in hexadecimal format. The new IP address scheme in the Internet is also in
hexadecimal format. It is the IPv6 (Internet Protocol version 6). The older IP address is
expressed in decimal format. The old IP address scheme was called IPv4(IP version 4).
With this consideration in mind, our learning experience will never go in vain.
These reasons are the very essence why we study this different number system which the
computer is using extensively. The hexadecimal number system consists of ten numbers:
0 to 9 and six letters. These six letters: A through F are also considered as numerical
values. This is a base 16 number system. The given table that follows is the comparison
100
between the decimal and hexadecimal numbers. The letter A in hexadecimal is 10, while
B is 11, C is 12, and so on.
Decimal Hexadecimal
Number Number
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
10 A
11 B
12 C
13 D
14 E
15 F
16 10
17 11
18 12
19 13
20 14
21 15
22 16
23 17
24 18
25 19
26 1A
27 1B
28 1C
29 1D
30 1E
31 1F
Examples:
Quotient Remainder
1.) 4210 = ?16
42/16 = 2 10 (is A)
2/16 = 0 2
.
. . 4210 = 2A16
338/16 = 21 2
21/16 = 1 5
1/16 = 0 1
.
. . 33810 = 15216
21/16 = 1 5
1/16 = 0 1
.
. . 2110 = 1516
Examples :
= 2304 + 176 + 5
= 248510
102
= 3840 + 16 + 12
= 386010
= 224 + 8
= 23210
Examples :
1.) 3BD616 = ?2
3= 0011
B= 1011
D= 1101
6 = 0110
.
. . 3BD616 = 00111011110101102
2.) 4F.9A16 = ?2
4= 0100
F= 1111
9 = 1001
A = 1010
.
. . 4F.9A16 = 01001111.100110102
3.) E716 = ?2
E = 1110
7 = 0111
.
. . E716 = 111001112
Other Solutions
We too, can solve this hexadecimal to binary conversion by using the following
technique (like the way we did in octal to binary conversion):
number equivalent above each binary number ( 8+0+0+0). In other words, when we
combine the three hexadecimal numbers (FA816), we will arrive to the answer : 1111
1010 10002. What we did with the excess binary number was to simply make it a zero
number. Now solve it by your own?
Examples:
7 A
.
. . 11110102 = 7A16
A F B
.
. . 1010111110112 = AFB2
0001
1
.
. . 00012 = 116
Other Solutions
Now this time we reverse the process by converting the binary number into
hexadecimal number equivalent. Again, we can solve this binary to hexadecimal
105
conversion by using the following technique (like the way we did in hexadecimal to
binary conversion):
LEC ACTIVITY
TEST 3
1.) 9A16 = ?2
2.) 7F16 = ?2
107
3.) E3.5D16 = ?2
4.) 4B2816 = ?2
5.) 1CE16 = ?2
6.) CE116 = ?2
3.)1100111100002 = ?16
Chapter 4
The Basics Of Computer Networking
“Make it simple as simple as possible
but not simpler.”
-Albert Einstein
-1969
In 1969, the seeds of the Internet were planted. It is called ARPANET, and this is the
year when the Advanced Research Project Agency (ARPA) of the U.S. Department of
Defense began connecting computers at the different defense contractors and universities.
-1977
In 1977, the first commercial LAN technology was introduced. It’s called ARCnet or a
short term for Attached Resource Computing Network. Datapoint Corporation is the
company that invented this LAN technology.
-1978
In 1978, the next LAN technology called Ethernet was introduced by its inventor, Bob
Metcalf who at the same time established the networking company called 3COM
corporation.
-1980
The National Science Foundation (NSF), another U.S. federal agency, joined the
Internework project after the U.S. Defense Department stopped funding the ARPANET.
Their own version is called NSFnet.
-1981
In 1981, the first modem was introduced by Hayes Microcomputer Products, Inc. It’s
called SmartModem.
-1982
The term “Internet” was first used to refer to the worldwide network of networks of
computer (International Networks). The global network that emerges from the
ARPANET and NSFnet.
-1984
In 1984, the IBM Corporation introduces its own LAN technology called Token Ring
networking system.
-1987
The HyperCard programming language was introduced by Apple Computer that leads to
the development of HTML.
-1988
The computer virus called “Internet Worm” crippled about 10 percent of all Internet
host computers.
110
-1989
The European Particles Physics Laboratory in Geneva, Switzerland called CERN created
the World Wide Web (WWW).
-1992
The Internet becomes the world’s largest e-mail network with an estimated 25 million
Internet users.
-1993
The first commercial graphical-user-interface (GUI) Web browser called “Mosaic” was
developed at the National Center For Supercomputing Applications (NCSA) in the
U.S.
-1994
The Netscape Navigator, a Web-browser was introduced by Netscape Communications
company. It is based on Mosaic standard, but with more advanced and powerful features.
-1995
The first online auction company called e-Bay was founded.
-1997
In 1997, both Netscape Communication and Microsoft Corporation release the new
version of their respective Web-browser, the Netscape Navigator and Internet Explorer
4.
-1998
The new Internet Protocol standard called IPv6 (Internet Protocol version 6) was drafted
and released by the Internet Engineering Task Force (IETF).
-1999
The new Internet term called “blog” was coined by Peter Merbolz.
-2002
The XML ( Extensible Markup Language) becomes very popular for Web-based
applications. At the same time, the boom of wireless networking started.
-2003
111
The Wi-Fi (Wireless Fidelity) of the IEEE 802.11 b/g standard for wireless network is
widely used in the U.S. with hotspots springing up in companies or other commercial
locations such as Starbucks Coffee.
-2004
In 2004, the unsolicited e-mail called Spam causes major problems across the Internet.
-2005
All IP (Internet Protocol) addresses of the old IP standard called IPv4 (version 4) were all
used, thus it can no longer be assigned. After 2005, the network devices must use the new
IPv6 standard in assigning IP addresses.
Figure 4.8d Wireless Local Area Network with Wireless Network Adapter
Figure 4.8e Wireless Local Area Network with Wireless Access Point 1
116
Figure 4.8f Wireless Local Area Network with Wireless Access Point 2
The Internet
The Internet is an interconnection of networks all over the world that links
schools, companies, government agencies, and research institutions. It is a collection
of millions of interconnected computers located in countries throughout the world -
all linked by phone lines and high speed cables, satellite discs, satellite space-
stations to form a gigantic computer network system. In reality, the Internet is a
collection of thousands of smaller networks, each network linked to the next network
to form one large worldwide network.
It enables us to communicate to other millions of people around the globe. In the
Internet, we can send or receive Electronic Mail (E-mail) to any of these millions of
people who have their own E-mail address. These people could be our relatives,
117
friends, lovers, clients, or new acquaintances whom we have some special feelings or
interests.
We can connect to any computer server or network from any parts of the world
that is open to public users. Connections and accessing of information that are not
classified or confidential are possible even those that we can find in NASA, The
Whitehouse, and other big companies. We can enjoy these benefits in using the
Internet without worrying to pay long distance charges. We just simply pay a
minimum charge for a monthly rate that is fixed or with an equivalent of hours to be
spent in using the Internet. We pay our bills to an Internet Service Provider (ISP) such
as the Pacific Internet, or Network Service Provider (NSP) like PLDT SmartBro, or
Globe’s Broadband.
We can do our research work without the need to go to a particular library or
school. We simply type or choose a particular topic of interest on a Uniform Resource
Locator (URL) commonly known as websites such as whatis.com and asks.com
websites, then the browser like the Internet Explore (IE) or Firefox would take us to
the topics we are researching. There are many different search engines software in the
Internet like Google.com or yahoo.com which will simplify our research tasks and
make our search endeavor so quick and easy. We can also get a meaning to a
particular word by using the free online encyclopedia – the Wikipedia.
We can exchange messages, thoughts, beliefs, philosophies, and principles to other
students or teachers in other universities here in the Philippines or abroad. We can
reach these people by sending messages to them through E-mail or chatting with them
through Internet Relay Chat (IRC). We can have real-time discussions and forum
with them anywhere they are in the world.
IRC is subdivided into hundreds of categories where users talk live around the
clock and around the world about everything under the sun (the moon and the stars).
The IRC would even permit us to go to a private chat room to talk about topics that are
confidential, rated-R, or personal in nature.
The UseNet produces thousands of pages of discussions everyday and organized
subject categories. These subjects can be about politics, cultures, society, history, or
business. We can choose, view or read only those areas or topics that are important to
us. And we can participate the discussion freely and interestingly. The UseNet
Newsgroup is a highly sophisticated venue to broadcast messages or articles in which
we can receive feedbacks, comments, and even answers to our questions.
survive a nuclear attack or natural disasters such as tornado, tidal wave, super typhoon, or
an earthquake. When such attack or disaster happens, the network must still function so
that the communication of the people will not stop or totally hindered. Yes, in the Internet
design and implementation, because of its multiple paths or redundant paths, even if one
part of the network was destroyed, the other parts of the network would still remain
operational, thus the data communication could continue to flow through other surviving
lines of the network.
How about Intranet? The Intranet is the private network version of Internet (the
public network). In private network, only those authorized users are permitted to
access information or resources to the Intranet server or computer system network.
Unlike in the Internet, any user can have access anytime, anywhere. The Intranet is
most commonly used in private big companies. Usually, employees only in these
companies have the right to access in their company’s Intranet.
Intranet is a secure and a reliable enterprise-wide network and associated
applications which use Internet technologies and standards. Most Intranet
implementations today focus primarily on internal corporate World Wide Web
(WWW) servers (Intrawebs) for the purpose of simple document distribution. The full
potential of Intranets can be realized only if the diverse management capabilities and
functionality available in a Local Area Network (LAN) environment can be replicated
at an enterprise-wide level using the Internet platform. Like for example the speed in
accessing resources is faster in the Local Area Network, compared to the Intranet.
119
Extranet
Maybe you heard also about Extranet. The Extranet is an Intranet which is
partially accessible by authorized users who are physically located outside the company
or employees in the other companies that are business partners such as distributors,
suppliers, or contractors. These other company employees need to have a valid login
name with the corresponding password to successfully access and use the Extranet.
In the Extranet setup, these authorized outside users are also limited to view or
access some specific resources in the hosting networks. Based on the users login name,
password, or possible domain name, the outside users can be managed and controlled
effectively on what particular web pages or information they are allowed to view or get.
This is also applicable on other shareable resources in the networks such as downloadable
files, videos, pictures, images, company marketing campaign materials, product demos in
mpeg format. So this is how extranet differs from intranet.
Two popular basic network structures that we always heard about are client/server
and peer-to-peer networks. These two differs in many ways, most especially in terms of
system security, accessing resources, reliability and scalability. Let us examine them one
by one.
Peer-to-Peer Networks
The peer-to-peer network is characterized by its simplicity in implementation
and operation. However, system security and scalability suffer because of these
characteristics. For example, in peer-to-peer, all computers connected to the network
have equal relationships to each other and have similar types of software and hardware
that support the sharing of resources. Accessing resources are almost free for all, because
every computer can access other computer, though it requires login-name and password.
There is no centralized management of systems security. Since, every computer is free to
access other computer, scalability is also difficult to achieve. Centralization of managing
resources and system security administration is vital to a successful and scalable network
which is not part of a peer-to-peer design structure and implementation.
121
Client/Server Networks
A client/server network is a server-based network. Meaning, the server will act as
the central or main computer, while other computers called clients or workstations will
access it for resources request. Each and every client PCs on the network share the
processing and storage workload with the main computer called server.
One of the most common application of client/server settings is in the operation of
a relational database management system (RDBMS). The corporate database such as
Oracle, SQL Server, and PostgreSQL is commonly installed on the main computer for
centralized access of its resources. When a user needs to find information in the database
server, he or she will simply use the database client software to send a query to the server
computer, which in turn searches that particular information in the database and returns
the needed information to the user who requested it.
Main computers (servers) and client PCs (workstations) are the two most important
devices found in the computer networks. They are the network devices that the computer
users have interacted with, most of the time in their office works.
In the discussion of the two most common network structures, we learned that
computers are the most important hardware used in networking. There are other hardware
or devices used in networks, which enable these computers to communicate to each other
successfully. Like for example, how the client computer can access with the server
computer? They have to be connected in some ways, such as through cables or radio
122
frequency signal (in the case of a wireless network) or other networking devices that links
them. This is now the main focus of our discussion. What are these networking devices?
Here they are.
Networking Media
Todays organization use both the wire-based networking media and the wireless
media to form a hybrid computer network. Most of the cables or wires that we can see
at the back of our company PCs are called unshielded-twisted-pair (UTP) wire. This
cable consists of four pairs of wires inside it. Each pair has two wires that are separately
insulated or coated in rubberized plastic, then they are twisted around each other. This
cable is made of copper and the signal that passes through it, is an electric current or
voltage.
The two cable design that is used to connect networking devices are called
straight-through or cross-over cable. When we connect similar network devices such as
computer to computer, switch to switch, router to router, or a router to computer, or hub
to switch, we need to connect them with cross-over cable. Router and computer are
considered similar devices because their design or architecture are the same. In other
words, most of their components are the same in functionality. The same holds true with
switch and hub. The switch networking device simply enhances and extended the
capability of a hub. As a matter of fact, a switch is but an intelligent hub. It is capable of
being configured and administered so that the network can achieve high performance.
In a cross-over cable design, some pair of wires are cross-connecting to other pair
of wires, as though they form an X as they are crossing over to each other’s path. The
cross-connect design can be achieved easily by color coding of wires.
123
There is also a special type of cable design that is primarily used to be plugged
into the port of a router or a switch so that a network administrator or network engineer
124
can configure and administer them. This is called the roll-over cable. The roll-over cable
is designed specifically to this purpose.
There are eight wires inside a twisted pair cable. In a roll-over designed cable, the first
wire at the extreme edge has the same color of the last (8th wire) wire found at the other
extreme edge of the cable, while the second wire has the same color of the 7th wire found
at the other extreme edge of the cable, and so on, hence the term “roll-over” implies.
Unlike the first two cable designs (straight-through and cross-over) where most of them
are designed by network administrators or network engineers or systems administrators
and systems engineers, the roll-over cable is already a packaged component with a router
or switch purchase.
One cable used also in networking is called fiber-optic cable. Unlike the UTP
wire which is made of copper, the fiber-optic cable is made of fiber-glass. And the signal
that passes through it is in the form of light. That is why, this type of cable is so very
expensive and its data transmission capability is very fast compared to the UTP cable.
Wireless media uses radio signal or infrared signal (in the case of a Bluetooth
technology implementation) that travels through the air for transmitting data. The
Laptops today are equipped with wireless media (cellular modem) which allow the user
to connect to the companies LAN, Intranet and Internet without the use of a wire or cable.
Note:
There is another cable used in the network which has a specialized function. It is used to configure the
router and switch. This cable is known as rollover cable. This type of cable does not need to be designed
and terminated by the network administrator, because it is already bundled with the router or with the
switch.
Figure 4.16 Network Interface Card (NIC) – Front View & Side View
Switch
The switch is an intelligent hub which has its own Internetwork Operating
System(IOS) inside it. The IOS is the very reason why the switch has enough intelligence
125
of its own to learn how to manage network traffic in a fast and efficient manner. In other
words, a switch is used to ease bandwidth shortages and network bottlenecks. This
network device acts as the concentration point for the connection of client computers
(workstations), servers, hubs, routers, and other switches in the network. In a hub, two or
more computers could possibly send data at the same time within a single path or link in
the network, that is why a collision happened, because two or more data would collide to
each other when they pass at the same time within a single path or link. In using a switch,
this collision will no longer occur because the switch provides a dedicated, point-to-point
virtual circuit (logical link) between two connected network devices such as the
workstations. Moreover, a switch can segment a LAN into microsegments.
Microsegmentation is a technique wherein the network administrator can organize his or
her network to be subdivided into two or more virtual LANs (VLANs). These VLANs
are simply smaller LANs within one physical LAN. Each and every VLAN domain is a
collision-free domain, so no collision of data will happen.
Note:
The repeater, hub and bridge are three networking devices that are rarely used in today’s networking
operation, (though most commonly used in early 1980’s up to late l990’s). Why? The functionality of a
hub (as well as repeater) and bridge are already incorporated within the switch capabilities and features. So
why use hub or bridge, when you can use a switch that makes your network to rock and roll.
Router
A router is a network device with the most intelligence of any networking devices
found in the network. It is capable of determining and deciding where to transmit the data
from one computer to another and choose the best path in order to deliver the data to its
recipient, successfully - regardless of distance and time. Within a router is a very
powerful operating system called Internetwork Operating System (IOS). This is the
driving force behind the router’s capability to choose the best path in transmitting data.
The router makes all things possible in the Internet. Actually, without the invention of it,
an Internet cannot be what it is today. The Internet operates 24 hours a day, 7 days a
126
week, and 265 days a year with millions of routers scattered and installed around the
world.
Note:
Older Laptops (pre-Centrino technology) need a wireless adapter to be able to connect to the network
wirelessly.
What is a Gateway?
Historically, in the early invention of a router, it was commonly called a gateway.
Network engineers and scientists found the term unsuitable for the present capabilities of
a router. A router is not just a gateway to connect to a larger network like the Internet and
Intranet, it is more than that. That is why, today a gateway has a lot of meanings. The
question is, what is a gateway? A gateway, in its simplest definition and description, is a
node on a network that serves as an entrance to another network. In a small or medium-
scale businesses, the gateway is the network device (usually a router or a computer
server) that routes data from one local computer to an outside larger network such as the
Internet. The router or server accepts and redirects and filters any data packets passing
through the network.
When we configure our internal network such as our LANs or Intranets to be able
to connect to the Internet, we need to point each and every workstations (client PCs) to
the gateway’s IP address. This means, that all our workstations must be configured with
a Gateway IP address of our router or server’s fast Ethernet IP address. The gateway IP
addresses are automatically supplied and assigned by the Dynamic Host Configuration
Protocol (DHCP) server that is also configured to manage needed IP addresses of our
128
network, from IP addresses of our Domain Name Service (DNS) server, Web Server,
Mail Server, Application Server, and Windows Internet Naming Service (WINS) Server,
and all workstations and switches connected in our network.
Ethernet Technologies
In networking world, the quality of networking media is measured in terms of its
speed and the distance a data can travel down the cables or wires (whether it is a
Category 5 or Fiber optic), or through air (in the case of wireless technology).
Bandwidth is the measurement of speed of networking media which is expressed in
cycles or bits per second (Hertz) or (bps). In other words, this is the amount of data a
networking media can carry. This further means also that the higher the bandwidth of the
networking media, the faster it can transmit data.
Originally, the Ethernet (10Base-T) technology’s speed is in 10 Mbps (Mega-bits-per
second). Today, we have the Fast Ethernet (100Base-T) technology that runs 100
Mbps. The next wave is the Gigabit Ethernet which can achieve a speed of 1000 Mbps
or 1Gbps data transfer rate.
Networking Protocols
Networking protocols are set of rules and conventions that govern a particular
aspect of how networking devices on a network communicate. The most common
protocol in use today in the Internet or LAN is the Transport Control Protocol- Internet
Protocol (TCP/IP). One of the common uses of a protocol is how the data should be
formatted as it is transmitted between two networking devices.
Note:
There are other protocols used by different operating system (OS) vendors before, the two widely used are
IPX/SPX of Novell IntranetWare and NetBIOS/NetBEUI of Microsoft Windows Server.
Digital Connections
DSL Connections
The Digital Subscriber Line (DSL) is usually used by Internet users at home. This
is the most affordable and easy to setup and install. Though it has a limited bandwidth, it
is typical for Internet users whose needs are mostly for e-mails using Hotmail or Yahoo,
school-research through Google search-engine, and high-tech socialization with friends
using Friendster, or watching short movies (.avi or mpeg) with YouTube.
129
Broadband Connections
Broadband connections simply describe a network connection that can transmit
data faster than a DSL technology can do. Some of the broadband connections utilize
WAN technologies such as the T1, T3, Integrated Service Digital Network (ISDN), and
Asynchronous Transfer Mode (ATM).
Wireless Connections
The wireless connections technology allows connectivity so that portable and
handheld computers such as Laptops and PDAs can move around while being
continuously connected to the network, and can communicate to each other successfully
without wires. There are many situations when mobility plays an important role for a
particular employee in accomplishing his or her tasks, as well as increasing his or her
productivity level.
Note:
Few years back, I’m using a Dial-up connection. A dial-up connection is simply to dial-up a particular
telephone number given by an Internet Service Provider (ISP) in order for you to connect to the Internet.
You need to have a telephone lines and a modem (internal or external) so that you can have this type of
network connection. You can get a connection to the Internet by setting up an inexpensive account with the
ISP provider or buy an ISP pre-paid card with a specific maximum number of hours you can use the card to
access the Internet. It works like your cell-phone pre-paid cards.
130
Flowchart
Input
Process
Output
Algorithms or Pseudo-codes
sufficient to successfully solve the programming problem. Remember that this algorithm
is the product or result of our ideas which we think logically through analysis. In other
words, we need an analytical minds or brains that can think in logical way. Have you
learned to think logically in your subject: LOGIC? Think again.
Let me finish this discussion by sharing with you about a very short story of Isaac
Newton, the scientist who discovered and formulated the “Law of Gravity”. He was
asked how he discovered the law of gravity. His answer is very simple and
straightforward. This is his answer: “I think always about it”.
In constructing flowchart, algorithm or even writing our program, the best way to
come up with the solution is simply to think about it all over and over again. And if you
are as crazy as me in programming, never go to sleep until you find the idea on how to
solve the present programming problem at hand. Are you willing to go to that extent?
Then if you would, I’m sure you’ve got what it takes to be a programmer, by blood and
by flesh.
To end this discussion (again, this time I really mean it!) let me tell you about the
importance of the word “think” in the programmer’s life. The late Thomas J. Watson, Sr.
founder of IBM Corporation (one of the world’s largest and biggest computer companies)
put an inscription above his table. And you know what is that? This inscription is a single
word : THINK. I think why? Would you like to think why too? Okay, let us put it this
way: in our programming task, let us “think”. Don’t ask me why, period!
A.) Constants – are literal values that do not change during program execution. It can be
of the numeric or string data type.
Numeric Constant - may be an integer (whole number) or a real number (with a decimal point).
It may be preceded by a positive (+) or negative( - ) sign.
Examples:
We have to take note that there should be no other characters that should be used in
conjunction with constant values such as the following incorrectly written constant
values: 20,000 $44.60 450/hr ½. The foregoing incorrectly written constants are
natural for us humans, but for the computer to process constant values, they are not. The
comma is not allowed, as well as the dollar sign. The / (slash) symbol is not allowed in
134
declaring a constant value. This will result to a “syntax error” when you convert your
Algorithm to an actual computer program.
Examples:
Note:
The entire string constant values must be enclosed in quotation marks, one before the first character and the
other after the last character. In the third example of the list, the double quotation mark can be found before
the letter T and the other quotation mark can be found after the exclamation mark of the string, ‘This, I
promise you!’.
Note:
A variable may be one of the following types: Numeric, String, or an Array. Numeric types are in
numbers, while String types are in character or series of characters. The Array is a special type of variable
which has only one name referenced to it, but can hold one or more similar data type values at the same
time. Ordinary variable can only hold one value at a time.
Mathematical Operators
+ Addition
- Subtraction
* Multiplication
/ Division
% Modulus
** Exponent
Relational Operators
Operators Rules
And (&&) If both or all expressions are evaluated to True, then the result is True.
Or ( | | ) When either or any (or just one) of the expression(s) is True, the result is
True.
Not ( ! ) If the expression is True, then the result is the opposite of the expression.
136
Note:
The pipe ( | ) symbol which is used as logical OR symbol can be found at the top of the Enter key and
below the Backspace key in the keyboard. In other words, it is located between these two keyboard keys.
In some keyboard design, this symbol is below the Enter key.
The Logical AND (&&) is also equivalent to logical multiplication with the use of the
symbol asterisk(*), while the Logical OR (||) is also equivalent to logical addition with
the use of the plus (+) symbol.
In logical operators, 0 is equivalent to False and 1 is equivalent to True. So the first table
below is equivalent to the second table that follows:
X Y Z = X&&Y
False False False
False True False
True False False
True True True
Second Table of the Logical AND
X Y Z = X || Y
False False False
False True True
True False True
True True True
X !Z
0 1
1 0
137
X Z
False True
True False
In logical Not operator, the value of variable X is simply inverted, so the value of
variable Z is the inverted value of variable X.
The logical NOT operator has a higher precedence than the others. The AND operator
has higher precedence than the OR operator. Both the logical AND and OR operators
have lower precedence than the relational and arithmetic operators.
Note:
When Mathematical and Logical Operators are found in an equations or expressions, then, the
Mathematical Operators have higher priorities than Logical Operators in the calculation process.
The computer follows usually the rules in mathematics when it comes to calculating mathematical
expressions.
1. 12 + 10 * 3
= 12 + 30
= 42
2. 11 % 2 – 5
=1–5
= -4
3. 20 / 4 * 3
=5*3
= 15
B.)Relational Expressions
Examples:
1. I<=5
2. Ctr>60
3. Ans !=’Y’
138
We will see the actual application of the Relational Expressions in the Flowchart,
Algorithm or Pseudocode, as well as to actual computer program.
Explanation:
We know that 9 is greater than 5, so this results to the evaluation of True, while 4 is less
than 8, so it results to True also. Based on the AND (&&) Truth Table, the True (T)
AND True (T) evaluation will result to True. If we convert the True (T) to the value of
logical 1, then we can calculate it logically as 1 * 1 where logical AND is equivalent to
logical multiplication (*). The resulting calculation is 1 which is equivalent to True (T).
2. 5>=9 | | 8<=4
F || F
F
Explanation:
We know that 5 is not greater than 9 so this results to the evaluation of False, while 8 is
not less than 4, so it results to False also. Based on the OR ( | | ) Truth Table, the False
(F) OR False (F) evaluation will result to False. If we convert the False (F) to the value of
logical 0, then we can calculate it logically as 0 + 0 where logical OR is equivalent to
logical addition ( + ). The resulting calculation is 0 which is equivalent to False(F).
Explanation:
We know that 9 is greater than 5 so this results to the evaluation of True, while 4 is less
than 8, so it results to True also. Based on the AND (&&) Truth Table, the True (T)
AND True (T) evaluation will result to True. If we convert the True (T) to the value of
logical 1, then we can calculate it logically as 1 * 1 where logical AND is equivalent to
logical multiplication (*). The resulting calculation is 1 which is equivalent to True (T).
We know that 5 is not greater than 9 so this results to the evaluation of False, while 8 is
not less than 4, so it results to False also. Based on the OR ( | | ) Truth Table, the False
(F) OR False (F) evaluation will result to False. If we convert the False (F) to the value of
139
Explanation:
We know that 9 is greater than 5 so this results to the evaluation of True, while 4 is less
than 8, so it results to True also. Based on the AND (&&) Truth Table, the True (T)
AND True (T) evaluation will result to True. If we convert the True (T) to the value of
logical 1, then we can calculate it logically as 1 * 1 where logical AND is equivalent to
logical multiplication (*). The resulting calculation is 1 which is equivalent to True (T).
We know that 5 is not greater than 9 so this results to the evaluation of False, while 8 is
not less than 4, so it results to False also. Based on the OR ( | | ) Truth Table, the False
(F) OR False (F) evaluation will result to False. If we convert the False (F) to the value of
logical 0, then we can calculate it logically as 0 + 0 where logical OR is equivalent to
logical addition ( + ). The resulting calculation is 0 which is equivalent to False(F).
This time, we have to evaluate the last remaining logical expression which is T && F.
Based on the AND ( && ) Truth Table, True (1) && False (0) is equal to False (0). We
can calculate it easily to use its numerical equivalent by this logical multiplication
operation:
1 * 0 = 0.
1. 9 / 3 = = 9 % 3
3 == 0
F
Explanation:
It is obvious that 3 is not equal to 0. That is why our answer is False (F). The left side of
the equation divides 9 by 3, and the result is 3, while at the right side of the equation is
the number 9 divided by 3 and its remainder is zero (0). This is how the percent (%)
works in Flowcharting, Algorithm, Pseudo-code, and Program. The operation of percent
(%) symbol will return the remainder value.
2. 7 != 15 / 2
7 != 7.5
T
140
Explanation:
The exclamation mark (!) together with the equal (=) symbol, means “not equal” in
programming application. Since 7 is not equal to 7.5, therefore, our answer is True (T).
Explanation:
The Relational expression 5>3 evaluates to True (T) while the Relational 7!=7 evaluates
to False, and Relational expression 9<=9 evaluates to T (eventhough 9 is not less than 9,
however it is equal to 9). Obviously, 5 is greater than 3; and 7 not equal to 7 is False,
because they are actually equal to each other. The 9<=9 evaluates to True because of the
equal (=) symbol after the less than (<) symbol that results to 9=9. The True and False (T
&& F) evaluates to False, because using the equivalent logical multiplication that
translates to 1 * 0 = 0, where True is equivalent to 1 and False is equivalent to 0. Now the
!(T) just simply evaluates to False, because this translates to NOT True, which means it is
False. The False Or False ( F | | F) evaluates to False, because using the equivalent logical
addition that translates to 0 + 0 = 0, where True is equivalent to 1 and False is equivalent
to 0.
Explanation:
The expression 10 = = 10 % 2 * 2 evaluates to False (F) because the expression at the left
side of our equation will never be calculated to 10. The inner expression in the
parentheses T && F will evaluate to False because using the logical multiplication 1 * 0
= 0, where True is equivalent to 1 and False is equivalent to 0. The !( F ) negates the
value, so it evaluates to True.
T && T
T
Explanation:
The variable A has a value of 1, while the variable B has a value of 2. Therefore the
expression A < B evaluates to True. The variable C has a value of 3 and variable D has a
value of 4, that is why the expression C < D evaluates to True.
T || T
T
Explanation:
We first substitute the variable with its respective value. In the case of variable A, it has a
value of 1, while B has a value of 2, and so on. The expression 3 <= 6 evaluates to True,
as well as also the expression 3 >= 2. Then finally, we have the logical evaluation True
Or True (1+1=1), which evaluates to True.
Note:
In actual programming practice, the variables used are usually longer characters (not a single character) that
denotes what a particular variable is all about. For example, the variable for Quantity could be Qty, or the
variable used for Centimeter is Cm. In some instances, programmers and developers use the entire word as
a variable name. In this way, the variable stands out what it means.
We used single characters here in our example, for the sake of simplicity. This is opposite in programming
practice, because the longer the name of the variable, the easier it is to understand the code.
Explanation:
The expression (3-1)*2 is calculated as 4, because the inner expression in the parentheses
was first calculated (3-1), which computed value is 2. Then we multiply this computed
value 2 to 2 that results to the computed value of 4.
Now the expression 2>1 evaluates to True while the expression 4<3 evaluates to False,
and yet this will be logically results to True since (1 + 0 =0), where 1 is equivalent to
True and 0 is equivalent to False.
Finally we have the expression T && T ( 1 * 1 = 1), that evaluates to True.
142
LEC ACTIVITY
TEST 4
General Instructions: Evaluate and determine if the following expressions are True or
False.
4.(W>Z) | | ( X != Y)
5. ((W*Z) < (X * W)) | | ( Z > W)
6. (( W+X) <= (Y-W)*3)) && ((W<Z) | | (Z>Y))
143
Chapter 5
Business At The World Wide Web
“If you can dream it, you can do it.”
-Walt Disney
Some of us thought that the Internet and the World Wide Web (WWW) are the
same or synonymous from each other. But it is not, definitely not. They are two distinctly
different things. As a matter of fact, the Internet was invented two decades before the
World Wide Web was created. The Internet is the network infrastructure of a gigantic
global networks, while the Web is a service - a type of system for accessing documents
online using the network infrastructure of the Internet.
If the Internet started in the United States at the Department of Defense, the
World Wide Web started in Europe. It was invented and created in 1989 at the European
Particle Physics Laboratory in Geneva, Switzerland. The World Wide Web was
originally a method for cross-referencing an online documents and incorporating them
with footnotes and figures. This is how one document is link from another documents.
The other documents could be stored in different locations on a single PC, or on different
workstations on the Local Area Network (LAN), Wide Area Network (WAN), or on the
Internet. The goal of the inventors of the Web is to create a simple way to access any
144
document that was stored on a network, without having to search through indexes or
directories. And without having to manually copy the documents from one computer to
another before opening them.
Web documents or commonly known as Web pages can be linked together because they
are designed and developed in a hypertext format. This hypertext formatting is a system
that provides an easy way to manage large collection of different documents. These
documents can include static and moving text, graphics, image, sound, movies, pictures,
and much much more. The hypertext system enables us to view other documents that are
linked to the present web document (web page) that we are currently viewing - by
clicking its respective link. The Hypertext Transfer Protocol (HTTP) is the type of
protocol we used to design and develop this web document (web page).
Type: //InternetAddress/Path
Where the Type specifies the type of Server in which the file is located, the
InternetAddress refers to the address of the Server, while the Path is the location within
the file structure of the Server. The Path includes the list of folders where the desired
Web page is located.
When it comes to hypertext Web documents, the browser will communicate with
the Web server using the Hypertext Transport Protocol (HTTP). The HTTP protocols are
set of rules on how the computers connected to the Internet would communicate to each
other.
Most of the time, the browser is dealing with formatting and displaying Web
documents (pages). The most common scripting languages use to design and develop a
Web page are Hypertext Mark-up Language (HTML) and JavaScript. The HTML
program includes the text of the Web page, the structure of it, and the links to other Web
page or images. JavaScript extends the capability of HTML by making web pages to
become alive, dynamic and interactive. There are also other commercial software that are
use to design and develop web pages such as Microsoft’s FrontPage, Macromedia’s
Dreamweaver, Adobe Flash, and many others.
145
There is also other technology to know besides HTTP. It is the FTP. The FTP
(File Transfer Protocol) protocol enables us to send or receive files, images, pictures,
MP3s, videos, or software from a computer connected to the Internet anywhere in the
Philippines or anywhere in the world.
control such as a button with an arrow drawn on it. We can click a hyperlink and jump or
transfer from our present location to the URL specified by the hyperlink.
When the mouse pointer touches the hyperlinked text, the hyperlink’s URL appears in the
Web browser’s status bar, and then the mouse pointer changes its shape. The shape of the
mouse pointer becomes a hand icon with a pointing index finger. Other hyperlinked
design is expressed in an image map where we can click on its different parts to jump or
transfer to different links or Web pages.
A web server is the program that runs on web site. Its primary responsibility is to
reply the browser’s requests for files. We need a web server before we can publish
documents on the Web. To request a page on a website, the web browser establishes a
connection to a Web server using the HTTP protocol. The server accepts the connection,
sends the requested file, and finally closes the connection. After that, the web browser
formats the information it got from the server.
The web server is also responsible for managing information storage, linking
forms and browser with programs such as large array of databases. There are many
servers available for different platforms or environments with different features and
capabilities.
The Web site is simply a collection of related Web documents (web pages). The
Website is housed on Web servers. The Web server is a powerful and high-performance
Internet host computer that often store thousands of Web documents. The Web pages are
used to offer products through online catalogs, distribute online news, offer interactive
educational services such as certification exams, and live playing of online audio such as
in esnips.com or an online video of your own self-directed and choreographed comedy
through YouTube.com.
somewhere (on planet earth) and at hotmail.com company was already using the “coper
e-mail address”. Once you registered your e-mail address on a particular e-mail service
company, you and you alone is the only one who has the sole and reserved right to use it.
However, your e-mail address can have a similar address in other e-mail service company
such as the Yahoo.com mail or gmail.com (a Google mail). Like for example, my e-mail
address in [email protected] has similar e-mail address in yahoo.com which is
[email protected] whose owner is someone other than I. This is okay since
[email protected] and [email protected] are not the same e-mail service company.
The disadvantage in my part is that when I want to have my other e-mail address at
yahoo.com , I have to use other e-mail address because coper7 has already been owned
by someone else. This is also the very reason why I use this e-mail address in my Yahoo
mail account as: [email protected]. So much for this stuff about e-mail address
idiosyncrasies. Let us go to its application in the company setting.
E-mail is one of the most important communication tools a company can use to its
advantage. Bill Gates, in his book, “Business at the Speed of Thought”, has pointed out
that his company, Microsoft, has a flat organizational chart. An opposite to a bureaucratic
hierarchical type of organization. Gates explained that at Microsoft, any employee who
has a genuine concern to the company can send him an e-mail anytime he or she wants.
In other words, this particular employee doesn’t have to ask permission to his immediate
superior about the thing he would like to communicate with the Chairman of the Board.
This makes Microsoft with a flat organizational chart. According to Gates, the employee
of Microsoft can talk anything even though this could be a bad news to him. He even
encourages his company officers that such news must be given full attention, and must
travel fast - up, up, and up to him. With this technique, according to Gates, the middle
manager cannot have the opportunity to intercept, regulate, screen, or worst of all, cover-
up a bad news, that is eventually beneficial to the company as a whole. So at Microsoft,
“bad news must travel fast”, so that solutions can be formulated to solve any problems a
company has.
To those of us who used e-mails to communicate with our family, relatives and
friends; here are some advantages that we can enjoy with electronic mail. The following
are the advantages of Electronic Mail (E-mail) compared to the traditional postal service
mail. E-mail is fast. It takes a few minutes to send the E-mail in order to reach its
destination, whether across the office or other branches of the company, or across the
ocean (or all over the sea) or anywhere in the world.
The E-mail message can be read by the recipient from any computer which is
connected to the Internet. That computer can be at home, in the office, or anywhere in the
globe. It is like receiving your e-mail anywhere you are and anytime you want. As long
as the Internet exists on the area where you are in. It is more economical to send E-mail
to many people compared to the postal mail. You don’t need an individual stamp for each
letter with the same content and you don’t need to use individual paper and envelop for
each recipient.
The E-Commerce
The e-commerce is a high-tech term that means doing and conducting business
online with the use of Internet. For example, when a customer buys a product over the
Web, instead of going to a store physically to buy it.
The study of electronic commerce (E-Commerce) often focuses on security,
cryptography, and electronic currency and payments. But e-commerce is more than just
the exchange of money in business transaction. It also includes research, development,
marketing, advertising, negotiation, sales and support.
The e-commerce has given companies around the world a new opportunities in
conducting business in a totally different way compared to the traditional business
transactions. Using large online databases and powerful websites, companies can sell
goods, and customer can order them online, send invoices to customers and receive
payments through credit cards or other form of electronic payment (e-payment).
In e-commerce, the B2B (Business-to-Business) transaction is the most popular
implementation. In B2B, the business transaction is more of company to company, not
from a company to a customer or consumer. Hence, the term B2B implies.
Internet Sales
Internet sales are likely to take two general forms: ordinary commerce in tangible
things and information commerce. Ordinary commerce in tangible things will greatly
resemble common transactions today: purchases that are currently carried out by
telephone, ordinary mail-order, and even in person. In information commerce, unlike
ordinary commerce in tangible things, there may be no package to help identify the
sender after the goods are delivered. Instead, both parties will conduct the exchange
electronically: the buyer will send digital cash using credit cards or some form of
electronic payment such as fund-transfer, and the seller will send information or the
goods. Some of these transactions may be sizable, such as the sale of access to
proprietary databases or the purchase of computer software, videos (MP4s), music
(MP3s), eBooks and other products that needs intellectual capital to produce. For
example, providers of information on the World Wide Web might choose to charge a
fraction of a penny to each person accessing their pages, downloading files or software,
MP3s, MP4s, eBooks, or Online exam reviewers from their website.
The common issue that this online sale is suffering is that credit cards used in
purchasing products through the Internet can be used illegally by hackers for their own
spending. The micro-commerce solves this issue. Micro-commerce in information will
require a digital payment system that does not rely on the participation of a third party
such as credit bureau or credit card issuer. If such payment system could be widely
deployed, the potential for growth of Internet information commerce is enormous.
150
Online Shopping
You can buy a computer directly from Dell via their website. Or a company can
purchase their routers and switches directly to Cisco Systems through its website. These
two great companies rake big profits through online purchases by their customers. As a
matter of fact, most of their sales came from online buyers. These are just among the few
celebrated success stories of online shopping.
Online shopping is the very example of the Internet buzzword called B2C or
business-to-consumer transactions. Though, in the case of our second real-world
example of Cisco Systems, the sales transaction is called B2B (Business-to-Business)
because it is a company to company sales transaction.
There are other celebrated success stories of online shopping. Two of these are the
Amazon.com that originally sells books online, and eBay where you can bid on just any
kind of products you can think of. The Amazon.com is a type of an online shop, while
eBay is an online auction.
Online Catalog
The online catalogs are set up like directories in the Amazon.com. These online
catalogs are presenting the products and services into categories and subcategories. For
example, if we want to buy a PDA at Amazon.com, we have to select first the Electronics
category on the list, secondly the Personal Electronics subcategory list, then to the
Handheld Devices subcategory list, and finally choosing the PDA item on the list.
151
Online Purchase
To shop online, we have to choose the products or items we want to buy using the
online catalogs. Now to select these items (like the way we buy in the supermarket where
we use a push carts to fill in with the goods we buy), we have to fill a shopping cart – an
electronic holding area that stores information about the products that we have selected to
buy. After we are ready to make our purchase, we can pay for it through our credit cards
or through an online account that we set up with an online vendors.
Online Banking
If you are using your bank’s website to accomplish the following task: paying
your credit card bills, monthly telephone bills, water and electric bills, view your sons or
daughters ATM withdrawal transactions or simply checking if the check you deposited
had already been posted into your bank account; then you have made an online banking
without you noticing it.
Though this discussion is purely my own idea, without any reference to foreign
books, most especially the book written by Peter Norton, “Introduction To Computers”, I
find it very interesting to talk about it – online window shopping. Most of us, do a lot of
window shopping. Sometimes we do this for our “canvassing” purposes, or in most cases,
we do window shopping because we have no money to buy what we want, at all.
Now, I share with you this high tech way of online shopping with realistic
example. Well, to make realistic, let us make it happen. If you are connected to the
Internet right now, we can do our online window shopping right away. Like for instance,
152
you would like to shop by the window only (through the Internet) on other books that I
have written, you can simply type my name at the Google, (and then presto!) you will be
presented with the hyperlink to National Bookstore website where you can be taken and
directed to navigate more. Try it!
Are you ready now? If you are ready, type this is what you have to do:
1. Type my full name (including my middle initial such as Copernicus P. Pepito) at the
Google search engine. You will be taken to the hyperlink of National Bookstore website.
2. Click the hyperlink of National Bookstore. This time you will see the National
Bookstore website.
3. Now at the top-right portion of the National Bookstore home page, you can see the
Search by: List box. Choose now the Author item, so that you will have now the
Search by Author category. After this, type my full name: Copernicus P. Pepito at the
Search text box.
4. Finally, click the Search button.
Can you see now the list of the other books I have written? I hope you did it right! Here
are the figures below, to give you a glimpse on our online window shopping:
Figure 5.8 Online Window Shopping Using the Google Home Page
153
Figure 5.9 Online Window Shopping using National Bookstore Home Page
The employee who just stayed home to do their company’s job is a telecommuter
type of employee, though some telecommuters are employees who are constantly moving
from one location to another. Most of these employees are technical support engineers
and consultants who constantly travelling to serve their client’s needs and need to send
reports of accomplishments back to their headquarters. They can also troubleshoot some
of their clients network and information systems while they are at home or while they are
on the road. This saves them time, money and effort than being physically present to the
office or in the client’s place.
Telecommuters rely heavily on computers and Internet connections to
accomplish their tasks. They are constantly on the go, while some others are constantly
present at the comfort of their house. In either way, they are very productive.
technology (Voice Over IP), and much, much more. It seems that the long time held
belief that the best thing in life is free - is now a reality with Internet technology. Well,
there is always a price to pay – a rampant violation of intellectual property rights owned
by the creators and producers of the intellectual products and services. Some of these are
legal, some are don’t. It is up to you how you can enjoy without being feeling guilty.
Here are the cool Web sites that we can enjoy surfing with:
• The Google is a search engine where we can easily find the hyperlinked of the
Web sites we need to go to:
http://www.google.com
• The Wikipedia is an online encyclopedia where we can learn the meaning of the
word we want to know or to check the exact meaning of the word we presently
encountered:
http://en.wikipedia.org
• The YouTube is a website where you can watch your favorite singer with their
MTV or some clips of their recent concert. Or just simply watching some comedy
videos created and directed by a common and normal humans like you. You can
publish your own video too at YouTube.com.
http://www.youtube.com
• The Friendster is a website for communicating with your friends online, and share
with them your thoughts, pictures, events, and hobbies. This is where you can
socialize to them in a high tech way.
http://www.friendster.com
• The Esnips is a website where you can share your favorite songs. You can also
play MP3’s online with this website. With the use of a download manager
software such as the Internet Download Manager or Torrent, you can download
the MP3s you like.
http://www.esnips.com
• The Ebooksboard is a website where you can find the eBooks you need. You can
download them freely.
http://www.ebooksboard.com
Note:
You can surf the http: www.knowfree.net too, so that you can find other eBooks. It’s also an excellent
web site to download eBooks. Try it now!
• The Sadikhov is a website where you can get your IT related certification exams
reviewers such as for Cisco Systems certification, Microsoft certification, Sun
Microsystem certification, Oracle certification, and much, much more.
http://www.sadikhov.com
• The Zedge is a website where you can download your cellphone ringtones, 3G
videos, wallpaper, screensavers, and cellphone games.
http://www.zedge.net
• The Download is a website where you can download your PC or Laptop hardware
components drivers and software utilities, computer games, and more.
http://www.download.com
• The Net2Phone is a website where you can use your PC or Laptop to call long-
distance to your family, relatives, or friends who lived or work in any countries
around the world using the VoIP (Voice Over IP) technology for free. Yes, the
best thing in life is free like this one. Unbelievable, isn’t it?
http://www.net2phone.com
Note:
You can use also the http://www.skype.com to call a long-distance, free-of-charge using the VoIP
technology.
• The meebo is an instant messaging software like your Yahoo Messenger (YM)
and your Microsoft Instant Messaging software. Chatting with your friends,
relatives, and families becomes so high-tech with meebo and YM.
Example:
1.) Draw a flowchart that computes and prints the area of a circle. Use the
formula: A= πr2 where Pi (π) is approximately equivalent to 3.1416.
161
Solution: In Algorithm
Begin
Enter r
A=3.1416*r*r
Print A
End
162
Begin
Pi=3.1416
Enter r
A = Pi * r * r
Print A
End
This famous example about the area of a circle gives us an idea on the classical
truth, “that there are many solutions in a particular problem”. Or like the way we said,
“there are many ways to kill a chicken, if the chicken is your problem”. But a computer is
no chicken. It is a mind game. Yes, a mind game. In this example, we have two correct
solutions, but we arrived with the same correct final answers. So think more, to come up
with more solutions. In actual programming task, the second solution presented is more
preferred and recommended. Because declaring a constant value at the top of the
program, makes the program more readable and easily modifiable. This is a good
programming habit. The famous philosopher Aristotle once said: “We are what we
repeatedly do. Excellence, then, is not an act but a habit.” Let us practice this good
programming habit now, to achieve par excellence. Who knows, Aristotle could be right?
163
Example:
2.) Draw a flowchart that converts an input temperature in degree Celsius into
Fahrenheit . Display or print its result. Use the formula : F= (9/5)*C+32.
Solution : In Algorithm
Note:
You could notice that in formula –oriented worded problems, the input part is always the variables (r or c)
at the right side of the equation. And the output part is always the unknown (A or F in our example). Never
say “Enter Area” if the area is the unknown. This is the technique in formula-oriented worded problems.
Solution: In Flowchart
Begin
Enter C
F=(9/5)*C+32
Print F
End
164
LEC ACTIVITY
TEST 5
1.) Draw a flowchart that converts an input temperature in degrees Fahrenheit into
Celsius. Display or print its result. Use the formula : C=(5/9)*F-32
2.) Draw a flowchart that computes and prints the area of a sphere. Use the formula :
A= 4πr2 where Pi (π) is approximately equivalent to 3.1416.
3.) Draw a flowchart that will compute and print the volume of a sphere. Use the
formula : V=4/3πr3 where Pi(π) is approximately equivalent to 3.1416.
4.) Draw a flowchart that computes the simple interest (I) on a short-term loan and
print its result. The given input data are P for pesos. R for annual interest, and L
for the number of days of the loan. Use the formula : I = P*R*(L/365).
165
Chapter 6
The Basics of Graphics and Multimedia
“The last thing one knows in constructing
a work is what to put first.”
-Blaise Pascal
There are many ways we can load images or pictures or even videos to our
computer. We need to load these pictures or images to enhance their presentation by
editing some parts of it that are not perfectly captured by our digital camera or digital
video camera.
By using a scanner, we can scan our picture so that we can transfer it into the PC.
The image scanner works like a photocopier machine, however instead of copying a
picture onto a paper, it transfers the image directly into our computer.
By using a digital camera, we can store digitized pictures which we can transfer
into our computer. By using the digital video camera, we can capture and store full-
motion video on optical disc or USB drive. We can transfer the content into the
computer, so that we can edit it to make the video more attractive and professionally-
taken.
We can also load clip-arts into our documents to enhance its presentation. Historically,
clip-arts are professionally designed graphics and drawings that could be easily clipped
from the pages and glued to a paper layout.
Drawing Software
Animation Software
CAD/CAM Software
The HyperCard
Defining Multimedia
Note:
This multimedia player - Microsoft Media Player 11 is bundled with Windows Vista. You can play movies
(.avi) and audio/music files (MP3s) with it.
172
Note:
WinAmp multimedia player is very excellent when you want to play your MP3’s with it. The sound is so
great. You can play your videos (.avi) with it, too.
Note:
The iTunes Multimedia player is very excellent when you want to play your MP3’s with it. The sound is so
great. This is the same multimedia player that powers Apple iPod Nano, iPod Shuffle, iPod Video, Apple
iPhone, and other Apple products. You can download iTunes free-of-charge at the Apple website. This is
my favorite MP3 player at my Laptop. This software is so amazing! Truly, the best thing in life is FREE!
173
Note:
The Apple QuickTime Multimedia Player is very excellent when you want to play your videos (MP4s) with
it.
Note:
The DivX multimedia player is very excellent when you want to play your videos (.avi) with it. This is my
favorite multimedia player when I’m watching videos at my Laptop.
174
Note:
The realPlayer multimedia player is very excellent when you want to play your videos (.avi) with it. This
multimedia player has a Windows Media Player and DivX multimedia player combined user-interface. At
the top of the multimedia player is colored with shining black (color of Windows media player), while at
the bottom navigation part is all silver (color of DivX multimedia player). One of the finest multimedia
players I had ever seen, so far.
Note:
The FLV multimedia player is an excellent media player to most of the Internet-downloadable video files.
When your multimedia player doesn’t work for some video files you downloaded from the Internet, try
playing it with FLV Player.
Note:
The VLC Multimedia Player is an excellent media player to most of the Internet-downloadable video files.
Mostly, to the video files that are originated from Open Source Community or playable with Linux
Operating System Multimedia Player.
In this case, we are presented with the worded problems without any formula
given. Using our background in basic mathematics, we can come up with our self-
constructed formulas. Some involves conversion or derivation of formulas we had
already encountered or learned before. For example, we are given a task to draw a
flowchart that computes the radius of a circle. This involves derivation of formula based
on the formula of the area of a circle. Let us try it now. Since the formula of the area of a
circle is A=πr2, therefore we have to solve the radius as our unknown, we came up with
these derivations:
A= πr2
r2 = A/π
r= A
√ π
Let us have our example now, to test if we are capable of formulating our own
equations.
Example:
1.)Draw a flowchart that computes and prints the sum of two input numbers.
Solution : In Algorithm
Solution : In Flowchart
Begin
Enter n1,n2
S=n1+n2
Print S
End
2.) Draw a flowchart that converts the input inches into its equivalent centimeters.
One inch is equivalent to 2.54 cms. Then print the result.
Solution: In Algorithm
Solution: In Flowchart
Begin
Enter I
C = I * 2.54
Print C
End
178
LEC ACTIVITY
TEST 5
1.) Draw a flowchart that computes and prints the difference of two input numbers.
2.) Draw a flowchart that computes and prints the product of two input numbers.
3.) Draw a flowchart that computes the average of three input quizzes. Then, print
the result.
4.) Draw a flowchart that converts the input value of dollars into its equivalent value
in peso. Assume that one dollar is equivalent to 44.50 (pesos). Then, display the
result.
179
Chapter 7
Artificial Intelligence And Information Systems
“Try not to be a man of success,
but a man of value.”
-Albert Einstein
The computer scientists and engineers are devoting too much time and effort in
making computers to reason, perceive, and act like human beings. Inspite of its ambitious
and near to impossible goals, the study of Artificial Intelligence (AI) has produced
impressive results. This study resulted to the inventions of robots, electronic chess
players, expert systems and computers that can communicate in human language (though
limitedly).
AI Defined
Artificial Intelligence is the study of how to make computers do things what the
human beings can do. Other computer scientist defined AI as the study of the
computations that makes it possible to perceive, reason, and act like we do. There are two
approaches to AI. The first approach is an attempt to use computers to emulate human
mental processes. An example of this approach is about an expert who asks a group of
people to explain how they solve a problem. Their solutions are captured by the expert
and transform them into a software model. The end-product of this complete software is
called “expert system”.
The second approach involves on designing intelligent machines that are
independent from how the people think. This approach considers that human intelligence
is just one possible kind of intelligence. The methods or procedures on how the machine
solve the problems might be different from the methods used by human, but not less
intelligent.
AI is already applied in the word-processor application software when its
automatic grammar checking feature is trying to correct a language concept that most
users cannot fully explain themselves.
Besides, translation without understanding will only produce an erroneous result. The
translator must know what the sentence means before it can translate it accurately.
The computers have so much trouble in understanding and translating natural-language
such as English language. Unlike in programming languages such as Pascal, C, and
BASIC, they have few keywords with exact and precise meaning. Part of the problem of
natural languages, is its massive vocabulary. It contains thousands of words. In computer
application, one word must have only one meaning, otherwise the computer becomes
confused and unable to follow the command or instruction correctly.
An expert system is a software program designed to emulate the decision-making
process of a human expert. The foundation of every expert system is a knowledge-base
representing ideas from a specific field of expertise. An expert is a person who has great
amount of knowledge and skills on a particular field of study or profession. By
confining his or her practice to that field, the expert achieves mastery. Obviously, expert
systems derive their knowledge and capabilities from the experts.
A knowledge-base represents knowledge in the form of if-then else rules. Along
with the knowledge-base, a complete expert system includes inference engine which
puts the user-input together with the knowledge-base, apply logical principles, and
produces the requested expert advice. Expert systems aid the user by providing fast
automated data analysis and informed second opinions. In other situation, expert systems
assist non-experts (users) by providing advice base on decisions and analysis of one or
more experts. Some of the first successful expert systems were researched and developed
in medical field. Medical knowledge is orderly and well-documented, that is why the
researchers believed it could be captured and modeled in knowledge-base expert systems.
Here are the few real-world examples of expert systems used by the companies today:
• Blue Cross Insurance company in the United States is using an expert system that
automates insurance claim processing. The expert system handles up to 200
routine claims each day. The software extracted diagnostic rules from watching
and observing human claim processor while they apply those rules. The
programmers (developers) analyzed and design the manual process and turned
into an expert system. The developers analyze how the claim processor (an
insurance agent) decides and act upon a particular insurance claim request.
Pattern Recognition
Pattern recognition involves identifying recurring patterns in input data with the
goal of categorizing or understanding that data. The application of pattern recognition
includes face identification, hand writing recognition and fingerprint identification. Other
application includes weather forecasting, automatic voice recognition, surveillance,
satellite data analysis, robot vision, biological slide analysis, and other scientific data
analysis.
One of the best examples of pattern recognition is Partek’s Screener’s Solution.
This is a statistical analysis and visualization software that enables the chemical elements
researchers to easily, reliably, and quickly identify promising lead compounds from
plate-based high throughput screening. The researcher can simply import the chemical
and biological data into it, so that she or he can normalize, filter, and scale the present
data being analyzed.
Image Analysis
The image analysis is the process of identifying shapes and objects in an image,
picture, drawing or video. This image analysis is applied in piloting cruise missiles, and
colorizing old motion pictures.
AI was successful in image analysis software invention for optical character
recognition (OCR). OCR is commonly used in shopping malls. Sales clerks and cashiers
are using wand readers to recognize numbers and words when they input purchases on
the Point of Sale (POS) terminals. Today’s POS terminals are hundred percent computer,
meaning they can be programmed like our PCs at home. Inside them are motherboards,
microprocessors, RAMs/SIMMS, ROMs, and many more. The difference between PC
and POS terminals are the case that housed them and some extra peripherals used by the
POS machines such as barcode scanner, a small customer display screen, and cash box.
The OCR scans the image of the page into the memory of the computer using
scanner, fax modem, or digital camera. The OCR software identifies and locates printed
characters in images or pictures.
Pattern recognition technology is widely used in fingerprint analysis. These
benefits had enabled law-enforcers to easily track and capture criminals and put them
behind bars. See, computers had made our life even better, and safer. What we have to do
is to consider its positive side, rather than to focus on its negative side.
Neural Networks
The neural network is simply an artificial brain that emulates the actual human
brain. The human brain consists of billions of neurons. They are connected to each other
in massively distributed and parallel structure. The idea of parallel computing technology
was inspired by the human brain’s structure. A neural network is a distributed and
parallel computing system that uses a network of a few thousand simpler processors
called neurons.
A neural network learns patterns by trial and error like our brain learns, that is
why when patterns are often repeated, it develops a habit to recognize it. The neural
network can still function even if some of its neurons are destroyed, because it distributes
knowledge throughout the network.
The application of this technology is useful for recognizing patterns in scientific
research that analyze a large volume of numbers, stock market analysis and bank’s loan
processing. The neural network is applied in signature analysis in a bank with those
signatures that are stored in the database. It is also applied in investment analysis that
attempts to predict the movement of stock currencies from previous data. In the airline
184
industry, the neural network is applied in monitoring the state of the aircraft engines,
vibration levels and sound, and early warnings of engine problems.
The MIS enables managers to decide effectively on how to manage the business
by knowing the company’s financial status through gathering, organizing, and evaluating
information that are important to the company’s survival and growth. This type of
information systems are based on the different needs of each level of management
hierarchy. Meaning, at the different levels, company managers have different types of
data that they need.
For a frontline manager, the daily sales reports are more important information he or
she needs every now and then. While a senior manager would like to have an information
system that deals with the quarterly summary reports of the financial performance of the
company. For an MIS to be effective and efficient to the organization, it must be able to
summarize vast amount of business data into meaningful information that is useful
specifically to any level of managers that need them.
Like MIS, DSS enables managers to become an effective decision makers on the
companies daily operation strategies and tactics. Mostly, managers in different levels, use
DSS to access and analyze data in the company’s transaction processing system to aid
them on how to formulate strategies in handling companies operation in the most
competitive ways. DSS is not only limited to the company’s transaction system, it also
involves with knowing competitors data or stock market reports that are vital to
companies competitive position in the market and aid the effectiveness of the manager’s
mission-critical decisions. One of the best examples of DSS is the e-Prescribing of the
187
The IS Department
useful information mined from a voluminous data stored in the enterprise database
system.
IS Storage System
Since Information Systems functions and responsibilities are gathering and
managing data, any loss of it is extremely damaging and costly to the company. Some
company would suffer a huge financial loses if their data is unavailable or their computer
systems operation is disrupted due to some system errors due to corrupted data.
Storage system plays an important role in preserving the integrity of the data and
as well as the effectiveness of recovering them from access failure. The Redundant Array
of Independent Disks (RAID) is a storage system that solves the probable problems of
data loss due to some unforeseen data access failure. The RAID links any number of disk
drives or disk arrays so that they act as a single disk. This is done for redundancy of disk
so that if one disk drive fails, the other array of disk will take over functioning since they
have the same content of data. This technique is called mirroring or stripping with parity.
Mirroring is a storage system technique that writes data to two or more disks
simultaneously, providing a complete copy of all the data on multiple drives in the event
one disk drive fails. This improves reliability and availability, because when one disk
fails, the mirrored disk continues to function as expected, therefore it maintains the
availability of data as well as its reliability.
The stripping storage system technique spreads the data over multiple disk drives which
provide the user with fast data access. This technique of storage system stores parity
information that can be used to reconstruct data when a disk drive fails. The stripping
with parity storage system technique also provides error-checking to ensure data
integrity.
All companies in the world rely their decisions heavily on the reports generated
by mission-critical applications and decision-support system (DSS). Business leaders and
managers can decide effectively if these reports are accurate and timely. The IS
professionals must ensure that the computerized system they developed, managed, and
maintained is accurate and delivers mission-critical reports in a fast and efficient manner.
With this, the IS professionals should analyze carefully the company and its internal
business processes, the needs of the employees and customers, as well as the needed
technologies to come up with the most dependable and reliable computerized system that
a company can count on.
When developing information systems, the system designer and developer use the
systems development life cycle (SDLC) to aid and guide them in constructing the
system effectively. SDLC is a series of five phases. These phases are usually in order
when accomplished. Here are the five phases of developing the information system:
analysis, design, development, implementation, and maintenance.
Example:
1.)Draw a flowchart that determines if the input age is qualified to vote or not.
Qualifying age is 18. If qualified, print “Qualified to vote”, if not (else), print
“Too young!”.
Solution : In Algorithm
Solution: In Flowchart
Begin
Enter A
If Y Qualified to
A>=18 Vote A
Too
young!
End
2.) Draw a flowchart that determines if the input number is a magic number (143) which
is equivalent to the magic words : “I love you”. If it is equivalent, then display the
message: “Right”, otherwise, display the message: “Wrong”.
191
Solution: In Algorithm
Solution : In Flowchart
Begin
Enter n
If Y
N=143 Right A
Wrong
End
192
LEC ACTIVITY
TEST 6
1.) Draw a flowchart that determines if the employee has to be paid of overtime pay
(OT). They will be paid an OT if they exceed 40 hours work in a week, regular pay (RP)
if less than or equal to 40 hours only. Display “OT Pay” or “RP pay”, based on this
condition.
2.) Draw a flowchart that determines if the input grade is “Passed” or “Failed”. The
passing grade is 75 and above. Displays “Passed” or “Failed” based on this condition.
3.) Draw a flowchart that determines if the input number is ODD or EVEN. Odd numbers
are 1, 3, 5, 7…9391, and Even numbers are 2,4,6,8…10000.
4.) Draw a flowchart that determines if the input number is POSITIVE or NEGATIVE.
Consider 0 as positive number.
193
Chapter 8
Computer Application at Work, School and Home
There is a profound effect of the computer revolution to our work, our school, our
home, and our society in general. Consider the following real-life examples of computer
application that we are directly or indirectly enjoying right now.
specialist when problems arise. The doctors use computer – aided tomography (CAT)
scans to see cross-sectional slices of human bodies.
Today’s Health Care Providers are now using computer in health care procedures
such as ultrasound and magnetic resonance imaging, and laser eye surgery to fetal
monitoring. Modern surgeons today are now using robotic surgical devices to perform
delicate operations, and even to conduct surgeries remotely. The new virtual-reality
technologies are being used to train new surgeons in cutting-edge techniques, without
cutting an actual patient.
Today’s hospitals and clinics are using computers to maintain patients records
and billings, and even managing schedules. Hospital information system stores medical
history and insurance records of the patients, to easily bill them.
In St. Luke Hospital at Quezon City (Manila), they are using Local Area Network (LAN)
– based Billing System where the patients are free to know the progress of their bills or
charges. With this system, you don’t need to go to the cashier’s office to ask about your
bills. Very convenient, isn’t it? Most especially if you were hospitalized due to some
vehicular accidents that caused you to have broken legs. Inspite of your misfortune, you
can still crawl to the nearby workstation (computer) to look for your bills.
We can send money to our loved-ones to their ATM accounts. In a matter of less
than a minute, our loved-ones can receive the money we sent. Imagine how convenient
our life is, with this kind of computer technology. We can even pay our phone, water and
electric bills automatically through the use of our ATM accounts. This financial
transaction is popularly known as electronic fund transfer (EFT), a process of transferring
money between banking accounts.
Today computers are used to speed up the tasks in processing accounting and
payroll systems. The employees throughout business organizations use personal
computers to accomplish their respective tasks. Secretaries are using word-processing
software such as MS Word to type reports, and memos. Sales and marketing executives
are using presentation software such as MS PowerPoint to design sales presentation
slides and pamphlets, and the accounting people are using spreadsheet software such as
MS Excel to analyze monthly or annual budgets for the company.
In the case of multinational companies which have offices in different parts of the
world, the employees are communicating through e-mail. With groupware, a new class
of multi-user software, the users can share and work on the same documents
simultaneously. These users can be considered as workgroups. The workgroups that are
working in a particular design project don’t need to be in the same place or room to work.
This is possible by using the Microsoft Project software. They can coordinate changes
or modifications since all changes appear simultaneously with their respective
workstation (computer).
The paperless office is the office of the future in which magnetic and optical
archives will replace cabinets. Moreover, it will also replace reference books and
journals. Memos and letters will be replaced by electronic communication, such as
sending memo through e-mail. There is no need of papers since the employees are
reading through computer screens, not paper documents anymore. You can see now, the
possibility of a paperless office, because we are now ordinarily using eBooks to study
and learn, electronically. See, it has no paper-reading, anymore.
Figure 8.6 The office worker is working with her desktop computer
198
Today, computers can be the most effective tool to aid the decision-making of the
managers. It can provide them information support and advices on how to run
departments, divisions or even the entire company. This software is commonly known as
decision- support system (DSS).
The managers are also using management information system (MIS) to help them
in planning, directing, organizing, and controlling the company’s different activities. The
MIS is commonly defined as a computerized system that includes database management
system for storing and retrieving data or information, and software tools for analyzing
data. They are used in producing different reports that suit to the needs of different level
of management.
Managers can use MIS to produce departmental reports and examine long-term
trends and relationships between departments. The other type of software that can help
project manager to make effective decisions is the project management software such as
the MS Project. This software helps schedule, coordinate, and track the progress of the
project.
200
Virtual School
Some people all over the world use personal computer for searching information
and for educational purposes. They communicate and chat through Internet’s IRC
(Internet Relay Chat). They send messages or letters through Internet’s e-mail. There are
now CD-ROM versions of dictionaries, almanacs, encyclopedias, and medical references
with multimedia capabilities. Multimedia features of CD-ROM versions made it more
entertaining to researchers in using computer for research tasks.
Most of the children and youngsters at home are playing computer games for
entertainment. Computer games are mostly an emulation of card games, sporting events,
street fights, flight simulation games, car racing games, and puzzle solving games. Many
of today’s computer games are state-of-the-art software which include dazzling graphics,
sound and special effects. One of the best examples of online encyclopedia is the
Wikipedia. The research work is now going high-tech with Wikipedia!
In this conditional statement, there are more than two alternatives, options, or
choices to which the computer would make a choice. Again there are conditions to be
tested, whether True (Yes) or False (No) . When true, the computer would execute the
associated statement or statements, otherwise it would continue evaluating the remaining
conditional statements (alternatives) . Once it satisfies the condition (proven true or yes),
the computer executes the associated statement and will ignore all the remaining
conditional statements below (if there is any) it. In our flowcharting solutions, Y stands
for Yes, while N stands for No.
Example:
1.) Draw a flowchart that will display the corresponding color of the given input
letter. The corresponding letter of each color are given below:
Letters Colors
B or b Blue
R or r Red
G or g Green
Y or y Yellow
Other letters Unlisted color
Solution: In Algorithm
Enter a value for L (for letter)
If L=’B’ or L=’b’ then
Print “Blue”
Else if L=’R’ or L=’r’ then
Print “Red”
Else if L=’G’ or L=’g’ then
Print “Green”
Else if L=’Y’ or L=’y’ then
Print “Yellow”
Else
Print “Unlisted color”
204
Begin
Enter L
Y
If L=’B’ or
L =’b’ “Blue” A
Y
Else If L=’R’ or
L =’r’ “Red” A
Y
ElseIf L=’G’
or L =’g’ “Green” A
Else If L=’Y’ Y
or L =’y’ “Yellow” A
“Unlisted
color “
A
End
Note:
Since we are required to come up with a solution that will accept either the uppercase (capital) letter or
lowercase (small) letter, it is necessary to use the logical OR statement.
205
2.)Draw a flowchart that will display the corresponding remark of a given input grade.
The range of grades and its corresponding remark are given below:
90 - 100 Excellent
80 - 89 Good
75 - 79 Fair
50 - 74 Poor
other grades Out-of-Range
Solution : In Algorithm
Solution: In Flowchart
Begin
Enter G
If G>=90 Y
And G<=100 “Excellent “ A
Else if G>=80
Y
and G<=89 “Good” A
206
Y
Else if G>=50
And G<=74 “ Poor” A
“Out of N
Range”
End
Note:
In this particular example, we use the logical AND because we have to trap the range of grades,
since the output should correspond within it. In logical AND operator, all conditions must be evaluated to
true (Yes) in order for the computer to execute the associated statement(s), otherwise the computer will
continue testing the remaining conditional statements or symbols below. When all conditional statements
were not proven true (or Yes), the computer will execute the last statement which is associated with the
else conditional statement.
207
LEC ACTIVITY
TEST 7
1. Draw a flowchart that will display the corresponding college level of a given input
year level. The year and college levels are given below:
1 Freshmen
2 Sophomore
3 Junior
4 Senior
2. Draw a flowchart that will display the corresponding day of the week when a day
number is being entered. The day number and its corresponding days are listed below:
1 Monday
2 Tuesday
3 Wednesday
4 Thursday
5 Friday
6 Saturday
7 Sunday
Other nos. “Unknown day”
Letters Languages
P or p Pascal
C or c COBOL
H or h HTML
J or j Java
Other letters “Unknown language”
208
4. Draw a flowchart that will display the corresponding remark of a given score in 20
items quiz. The range of scores and its corresponding remarks are given below:
16 - 20 Best
10 - 15 Better
5 9 Good
0 - 4 Poor
Other scores “Out-of-Range”
209
Chapter 9
Understanding Basic Computer Security
“But if you took all the benefits
that people derive from computers,
mixed them together, and distilled them down
into a single element, what would you have?
The answer is simple: information.”
-Peter Norton
Awareness is the first step to good computer security. This is according to Peter
Norton, the author of the book where this book is mainly based and a principal developer
of Norton Anti-virus and Utilities. Safeguarding our PC and its valuable information is
very important to us and to our work. Imagine if a virus erases or destroys our documents
that must be submitted in a matter of few hours. Or attacked by a hacker who slows
down our connection to the network, thus put all our online-intensive work to crawl. We
should understand all the dangers that specifically threaten our computer system. We
need to know how each threat can affect our work and prioritize them accordingly.
A threat is anything that can cause harm to our computer resources. In the
context of computer security, a threat can be a virus infection or an attack by a hacker.
Now if we don’t use any anti-virus software, our computer will become very vulnerable
to virus infections. If we don’t turn-on the Firewall capability of our operating system or
did not implement a Firewall to our computer network system, we are vulnerable to a
hacker’s attack.
How about applying countermeasure posed by a virus infection or a hacker
attack? We can apply regular backup process of our data. This will be our
countermeasure against the threat of data loss caused by virus infection. Putting a
firewall to our computer network system is our countermeasure against a possible attack
by a hacker. In other words, countermeasure is our step to ward off a threat, thus
protecting our data from harm.
Identity Theft
Identity theft is a technology term used when someone impersonates you. His or
her impersonation ranges from using your name, Identification Card, SSS number, or
your other personal information in order to get a document or credit in your behalf,
without you knowing it.
Now how the identity theft could stole your money in the bank? By shoulder
surfing! Shoulder surfing is simply watching someone who withdraws on the ATM
machine, and getting to know his or her PIN (Personal Identification Number) number.
An identity theft could also use wire-tapping (by using a telephone line extension)
so that he or she can listen to your conversation on the telephone as you give your credit
210
card number or other pertinent personal information to a credit card agent. The
technology term for this one is snagging.
An identity theft could also use the dumpster diving technique where he or she
can go to garbage cans or trash bins to get your cancelled checks, bank deposit slips, or
credit card statements.
One of the most predominant sources of identity theft technique is called social
engineering where the theft tricks the unsuspecting victim into providing critical
information under the pretext of something legitimate such as pretending to be the one
who is in authority. Like for example, someone who claimed to be a webmaster and
would like to check if the victim’s online record such as SSS contribution is already
qualified to make a salary loan. Since the hapless victim has a plan to file a salary loan,
he or she would reveal his login-name and password to the decoy’s webmaster.
Computer Viruses
A computer virus is a program that works like a biological virus. It spreads from
software to software, from USB drive to hard disk or vice versa, and from one computer
to another (in the case of computers connected to a network). So what is a computer
virus?
It is simply a tiny and powerful program written and developed by an intelligent and
malicious programmer. This computer virus program has a destructive power,
unpredictable behavior and has a capability to reproduce itself. Depending on how it is
intentionally designed and programmed, a virus may destroy data files, corrupt software
integrity, gobble up computer’s main memory storage, or cause serious system failures
and errors.
Virus scanner and cleaner software is designed and programmed to search and
destroy computer viruses in the computer system. The computer subsystems that can be
scanned are hard disk, external hard disk, floppy disk, computer’s main memory
(SIMMs/RAM), CD/DVD ROM drive and USB drive. Once a virus or viruses are found,
the virus scanner and cleaner software will notify the users and remove the viruses from
an infected disks or quarantined them.
Most of the anti-virus software such as the Norton Anti-virus, AVG, and Mc-Afee
Anti-virus utilities have the capabilities or features to continually monitor system activity.
This software watches and reports any suspicious virus-like actions detected upon
monitoring the system.
The virus scanner and cleaner should be continually updated to be able to detect
the newly programmed computer viruses. This means that you have to have a newest
version of this software always. Remember that an old version anti-virus software won’t
be able to detect newer viruses. For example, your anti-virus software is copyrighted
2009, it means that those viruses created in the year 2010 can no longer be detected or
cleaned successfully by your anti-virus software.
Computer viruses have some brothers too. They are called Trojans (Trojan
horses), Worms, and Logic bombs. A trojan is a program that performs a useful task,
however it carries out some secret destructive motive and cruel intention. In other words,
Trojan horses introduce malicious software under the pretension of being a useful
211
program. Usually these Trojan horses can be found in the Internet with filenames that
make them sound like utilities or games. When a user downloads and runs such program,
it might change data, erase files or folders, or cause some other kinds of trouble.
A worms are like viruses, they can reproduce themselves. There difference is that
a worm can travel independently over computer networks to search out uninfected
workstations to occupy. This worm program resides in a workstation’s memory, not on
the network disk. The worm can be eliminated by turning off all the workstations
connected on the network.
Logic bombs are program triggered to perform a task or mission when it
encounters some sequence of events or activities or after a certain amount of time elapses
or when a date came. Like for example, the Friday the 13th viruses , and April Fool’s day
virus. These viruses can be classified as logic bomb type, because of the nature of how
they are activated and when they will be activated, and what triggers them to activate.
Most of the textbooks treated all of these programs as viruses. Well, whatever these
programs are called, they are designed with the same purpose: to destroy or make
troubles to our computing tasks. We must try our best to avoid or eradicate them. And
denounce them as evil or bad.
The software developers have created a lot of tracking programs that continuously
monitor our online activities in accessing the Internet. Some of these are useful to
Webmasters who want to determine the kind of visitors who are surfing their websites,
but some tracking programs intrude our privacy and preference. Here are the online
spying tools - cookies, spyware, spam, and web bugs.
213
Cookies
So what is a cookie? We heard this one many times over. Like for example, when
you study Java programming language, programming a cookie is always a prerequisite to
learn Java programming. A cookie is a small code that a Web server asks your Web
browser such as Internet Explorer or Mozilla Firefox to place on your computer. The
cookie contains pertinent information that identifies your workstation’s IP address, your
login name, e-mail address, and some information about your visit to the Web site. For
example, the cookie might list the last time you visited the Web site, which Web page
you downloaded, and how long you were at the web site before leaving from it.
Spyware
The spyware is also known as adware. Like the cookie, the spyware can track a
computer user’s activities and report them to someone else. The spyware collects and
record secretly your e-mail address, web usage, individual keystrokes, and even your
personal information. The spyware can land on your laptop from many sources: e-mail
messages, web pages, and pop-up adds (advertisements).
Spam
Notes:
Malware is the term used to destructive software such a computer viruses, Trojan horses, and Worms, as
well as also some attack scripts that turned data into garbled or unusable.
Cybercrime
Any act of stealing hardware and software resources are classified as cybercrime.
But a cybercrime is more than just stealing the physical resources of the computer, it is
also about a fraudulent act. A fraud such as stealing account information from
unsuspecting customers, non-delivery of services or merchandise that are ordered online,
or an online auction of something that did not exist, or some ATM card debit fraud or an
international credit card debit fraud. Imagine if you are charge with a big amount in your
credit card of the things you didn’t purchased? Or losing a lot of money from your ATM
card, because someone is withdrawing from it.
214
Hacking
Hacking is an illegal act of accessing the computer resources of some people
without their knowledge or permission, or unauthorized access into company’s network
system. Usually, a hacker uses a network or Internet connection to connect to some other
people’s computer or a particular company’s computer network, in order to corrupt,
change, or destroy data.
Hacker employs the sniffing technique where he or she tries to guess the
password of the hapless victim. Or in a more highly sophisticated way, he or she would
capture the password of the victim using some type of malware. This malware would
capture the password, then it will send the password to him or her.
The other technique used by a hacker is the IP spoofing. In this technique, the hacker
intercepts the data while it is transmitted or gain access to the computer network system
by posing as an authorized user. The hacker was able to gain entry because he or she
pretends to be using a legitimate computer or workstation connected to the network with
an IP address that is belong to the network where he or she was accessing.
Another technique used by the hacker is called phishing. In this technique, the hacker
may contact the unsuspecting victim by e-mail, and ask the victim to provide password
information for an apparent legitimate reason. Like for example, the hacker wanted to get
your name as well as the CD key of the software you purchased or it’s registration
number. In this way, the hacker can use the software you purchased since he or she would
be required by the software company to enter the name of the one who purchase the
software as well as the registration number, because only the legitimate purchaser of the
software can enjoy the free updates and technical support.
Cyberterrorism
Firewalls
Putting firewalls in our computer system network is our best defense against the
possible attack of a hacker. This is the countermeasure that we can apply in our
computing task.
Firewalls can be both a hardware device with a software on it or purely a software
that runs in your Personal Computer (PC), Laptop, or in a company’s main computer
called Server, or in powerful Internet device called Router.
215
mean for 00 is year 2000, not year 1900. Many of the common Year-2000 problems do involve incorrect
calculations within business-oriented computer systems.
The other reasons why there are only two digits to accept for the year date is to conserve storage
(memory) space. In early and late 60’s, memory storage conservation is a practice because of the high cost
of the memory storage device. Furthermore, most of the system developers (programmers) during that time
had not expected that their programs mostly in COBOL would last for 3 decades. They don’t worry about
the possibility when it comes to the year date 2000. In other words, they were not able to anticipate this
kind of problem. This lesson should served as “charge for experience” to all of us who would be
application developers in the near future. We have to be able to anticipate what might happen in the years
to come; though, this is a case of software engineering practice. Let us think like software engineers in
action, every time we design, develop and maintain our business application system.
------------------------------------------------------------------------------------------------------------
Example:
1. Draw a flowchart that will generate and display the given sequence numbers:
Sequence numbers
1
2
3
4
5
Solution : In Algorithm
Solution : In Flowchart
217
Begin
n =1
Y
While n<=5
Print n
End
A
n = n+1
2. Draw flowchart that will compute the sum of the generated given sequence
numbers in example number 1. Then display the sequence numbers and the
computed sum.
Solution : In Algorithm
Begin
N=1
S =0
Y
While N<=5 Print N
218
N
N = N +1
Print S
A
S=S+N
End
Note:
You could notice that we have our pairs of “begin and end” after our while loop
statement. The purpose of this technique is to group the associated (compound)
statements so that when the computer had evaluated (proved or tested) that the condition
is still True (Yes), then all the statements within the body of the loop (statements within
the pairs of these: begin and end) will be executed. The looping process only stop when
the condition becomes False (No).
These two examples illustrate the two common equations or formulas in
programming (the increment formula and accumulator formula). The increment formula
simply adds the N by 1 (in our example), or by 2s, by 3s and so on) while the computer
executes the looping statement, the incrementing variable will add 1 until the condition
is evaluated to false or the condition is being met(satisfied). This is the time the computer
stops performing the looping operation (iteration process).
In real-world programming tasks, the increment and its opposite the decrement
formula has many useful application ranging from animation, graphics propagation and
of course repetitive calculations. The accumulator formula is also popular in the
programming field because of its usefulness. Accumulator formula is oftenly use in
determining and calculating the item stocks inventories, employees’ salaries and
deductions, and many more.
You would find out its importance when you are already embarking to your
programming job in the near future. Believe me, it’s important to know and learn the
application of these simple yet useful formulas.
219
LEC ACTIVITY
TEST 9
1. Draw a flowchart that will generate and display the given sequence numbers:
5
4
3
2
1
2. Draw a flowchart that will generate and display the given sequence numbers:
2
4
6
8
10
3. Draw a flowchart that will compute the sum of the generated given sequence
numbers in Test number 2. Then display the sequence numbers and its computed
sum.
4. Draw a flowchart that will compute the sum of the generated sequence numbers
in Test number 1. Then display the sequence numbers and its computed sum.
Bonus Question:
Draw a flowchart that will generate and print the given sequence numbers. (This is
about squaring a number).
1
4
9
16
25
220
Chapter 10
The Future of Information Technology
“What we anticipate seldom occurs;
what we least expect generally happens.”
-Benjamin Disraeli
B.)Optical Computers
In today’s computer, electrons travel between transistor switches on copper wires to store
and process information. In Optical computer, photons travel on optical fibers or thin
films to store and process data. This will make an optical computer to have faster speed
and processing capability and more compact, and with larger bandwidth compared to our
modern computers today. In the near future, optical computers will eliminate the
enormous copper wires used in the printed circuit board (PCB) of our computer.
C.)Holographic Storage
The holographic storage technology leverages the advances across a number of
technologies from micro-mirror arrays to new non-linear polymer recording media. This
storage technology offers high storage capacity and very high speed data access, because
the holographic access methods read an entire page of data in one access operation. Our
present storage technology today that uses the optical storage technology only reads and
writes data by altering an optical medium on a per bit basis, while holographic storage
technology records an entire interference patterns all at once.
221
During the time when I write the draft of the first edition of this book, it was way
back 1990’s (late 1990’, specifically). Though eventually the first edition was published
in 2002 (due to the slow process of publishing a book, we cannot help it!), most of the
predictions outlined on this short chapter becomes actually our present technology today.
Take for example, the Xerox Corporation researcher’s prediction (first bulleted
discussion). It predicted that in the near future, we will be using 1000 x 800 pixel
computer monitors. The Compaq Presario Laptop I used to write this second edition is
configured with a Display (Monitor) setting at 1280 x 800 pixel. So Xerox Corporation’s
prediction is right. I enjoyed now the technology they predicted decades ago.
The second bulleted discussion was also now our present technology because it predicted
that we will be using an affordable low-power rewritable storage devices, instead of
using diskettes or CD/ROM to store our data or software. My main storage device that I
used to write this book this time is a Kingston USB Drive which I bought from CD-R
King. See? The prediction of a decade ago was so accurate.
Now let us go to the third bulleted discussion. The prediction is that we will use a
computer with more than one microprocessor (Parallel processing technology). It is also
222
true today, because my Compaq Presario Laptop is a Dual Core microprocessor. The
Quad Core desktop computer is common today. See again? Parallel processing
technology is our present technology. A decade ago, it is but just a dream. Yesterday’s
dream is today’s reality.
The Wireless Telecommunications and Network prediction is exactly what we are
enjoying right now starting from Laptop computer with Centrino (wireless) technology
and Wireless Broadband technology. It is an anywhere, anytime network computing.
The remaining predictions are still yet to be realized. But we know for sure that these
predictions about the technology revolution will sooner become a reality. So wait and be
excited, for the future holds some great technology to offer for us, to enjoy life better and
easier.
For the sake of knowing and reviewing the first edition’s technology predictions, I
retained the following discussions (written in smaller font-size):
No one can stop the on-going revolution of computer technology. We are now growing into a
future shaped by this revolution. Here are some of the fearless predictions of computer scientists and
engineers who are now presently working with their ambitious inventions:
• Xerox (Corporation) PARC researchers predicted that by the early year 2000, we will be using
1000 x 800 – pixel computer monitors. They are thin enough and power-efficient to run on
batteries for days.
• Sooner, low-power rewritable storage devices will become affordable. This will make our
software to be stored on rewritable cards rather than on diskettes or CD/ROM.
• Parallel processing technology will make our computer to use more than one micro-processors
(CPUs) to work on several tasks at the same time. Pattern recognition, vision detection, and
speech recognition can be performed very well by this technology inspite of its high demand on
speed and voluminous data.
• Gallium Arsenide (GaAs) chips are ten times faster in moving impulses or signals than silicon
chips. Furthermore, it emits less heat. In the near future, our computers are made of this kind of
hybrid integrated circuit (IC). Optical computers transmits information in light waves rather than
electrical pulses. This kind of computer technology can process information hundred of times
faster than our present computer today.
• Fiber optic cables can transmit television signals, telephone calls, and data communication at the
same time. We can enjoy a true digital TV, clearer voice over the telephone, and high speed
Internet access.
• Wireless Telecommunications and network will allow mobile workers, to send and receive
computer data from cars, boats, and planes easily. Like the way we make it by cellular phone calls
today. Our laptop contains an internal modem with a little antenna to dial-up the office’s server or
through the company’s intranet system.
• Virtual Reality Computer Aided Design (CAD) software allows architects and engineers to
walk-through a buildings and mechanical assemblies before they are constructed. This technology
creates an illusion that we can be immersed in a fantasy world that never exist in reality.
• Intelligent software agent can ask questions, respond to commands, and pay attention to the
work patterns of its user. It can also serve as a guide and a coach and has reasoning capabilities.
An intelligent software agent can be instructed to deliver our morning paperless newspaper via
Internet, reset our alarm clock or turning our coffee maker.
• On-demand Online Automobiles; with this technology , you can design and order customized
car based on your personal taste through Internet. The ordering process requires manufacturers,
suppliers, distributors, and retailers to be connected in the Internet so that the user can reach them
out wherever they are in the world and whatever the customer would like to buy it.
• Embedded Intelligence; with this technology, computer capabilities are embedded in most of the
electronic gadgets which we are using now such as CD players, VCRs, microwave ovens, car
223
electronic systems, and other household appliances and tools. Actually in reality and present
technology, we are already enjoying this benefits without knowing it. No wonder why our
appliances today seems so highly sophisticated and behaved as though they know how to do their
tasks. Well its because inside them is a computer embedded with intelligence (intelligent
program). In the near future, most of our home appliances will be these smart.
• Active badge is a clip-on computerized ID-badge which continually reports its location for
record-keeping purposes in the database server. When employees are equipped with active
badges, doors will open for them, rooms can greet people by name, receptionists and secretaries
will know the employees ‘ whereabouts and telephone calls can be forwarded to wherever the
recipient might be at the moment.
• Micromachines is a product of microtechnology. This machine is in a scale of a million of a
meter. Microscopic moving parts are etched in silicon chip. It has a microsensor, a tiny device that
can detect temperature and pressure. Microsensors are used in spacecrafts, planes, and cars.
According to the scientists speculation and brave prediction, someday this tiny machines may be
able to roam around our bodies to search and destroy cancer cells and other deadly bacteria. When
that time comes, computer will become our living hero. Who said computer is nothing?
Example:
Draw a Flowchart and write its equivalent Algorithm in modular (subroutine) approach
that will compute the salary of an employee in a weekly basis. If the number of hours
worked by an employee exceeds 40 hours a week, the excess hours should be considered
as overtime, thus, its computation is 150 percent from its base salary of 100 pesos per
hour. An SSS contribution for every employee is 200 pesos ,while the withholding tax is
10 percent (%) of the employee’s gross salary.
Solution: In Algorithm
Procedure RPay
Initialize
RPH = 100, SSS = 200
Compute
RP = RPH * HW
T = RP * 0.10
S = RP – T – SSS
Print “You Salary”, S
Procedure OTPay
Initialize RPH = 100, SSS = 200, RH=40
Compute
RS = RPH * RH
OH = HW - 40
OPH = RPH * 1.50
OP = OH * OPH
S = OP + RS
T = S * 0.10
S = S – SSS - T
Print “Your Salary is:”, S
Where:
HW = Hour’s Work
OPay = Overtime Pay
RPay =Regular Pay
RPH =Rate Per Hour
HW = Hours Work
T = Tax
RP = Regular Pay
S = Salary
RS = Regular Salary
RH =Regular Hour
OH = Overtime Hour
OPH = Overtime Pay Hours
OP = Overtime Pay
225
Begin
Enter HW
Y
While OPay A
HW>=40
RPay
End
226
RPay
RPH= 100
S SS =200
RP = RPH * HW
T = RP * 0.10
S = RP - T - SSS
Return
227
OPay
RPH= 100
S SS =200
RH = 40
RS = RPH * RH
OH = HW - 40
OPH = RPH * 1.50
OP = OH * OPH
S = OP + RS
T = S * 0.10
S = S - SSS - T
Return
Note:
You could notice that a subroutine will begin with its name, not with the word “Start”.
For example, the subroutine for Regular Pay starts with RPay written on its Terminal
Symbol:
RPay
It is also the same with the Overtime Pay where it starts with the word “OPay” instead of
the word “Start”. Now the Terminal Symbol for the ending part of our Flowchart has the
word “Return” on it, instead of the word “End”. This is because the subroutine should
return to the calling main program, or to return a value to the calling main program.
You will notice also that if the conditional expression:
228
While HW>=40
is evaluated to True (Yes), then the subroutine: OPay will be executed, otherwise the
RPay subroutine will be executed. We can see it with the following flowchart depiction:
Y
While
OPay
HW>=40
RPay
Within the subroutine is another group of flowchart symbols with more equations and
calculations are being performed. With the use of subroutine, we can simplify our very
large flowchart or algorithm by breaking them into subroutines where each subroutine
performs a specific task. With this technique, we can easily concentrate in one subroutine
at a time. Like for example, we really have a hard time formulating the equations to
compute the overtime pay. So, we have to focus on it. Our flowchart and algorithm
reflects the complexity of our solution. As you could noticed , understanding alone on
how our equations calculate are for a moment, pose already a complexity in our solution.
One thing also to consider is that within our subprogram, we initialize the variables we
used within the subroutine. Remember that the values of these initialized variables are
local to the subroutine. Meaning, that their values will not conflict to other variables in
other subroutines. Therefore, it is very safe to use the same name of variables from one
subroutine to another.
Let us now dissect the initialization happened in the first subroutine that we have, the
Regular Pay subroutine. First, we initialize the Rate Per Hour (RPH) variable, then the
Social Security System (SSS) contribution.
RPay
RPH= 100
S SS =200
229
After this, we construct the equations we need to calculate the Regular Pay. So, we come
up with the following equations inside our Process symbol.
RP = RPH * HW
T = RP * 0.10
S = RP - T - SSS
The equation:
RP = RPH * HW
is an equation that computes the gross regular pay. Now to get the net regular pay, we
need to deduct the gross pay from the withholding tax and SSS contribution of the
employee. In real life, there are more deductions to the employee salary than withholding
tax and SSS contribution. But this two is always present to any payroll system in any
private company or public offices.
For the sake of simplicity, in our simple payroll system, we assign a fix tax to each
employee to 10 percent. In reality again, this is not the case. Though, consultants and
authors have this kind of tax (only 10 percent deduction, based on my experience as an
author and training consultant. I think, other practicing professionals have this kind of tax
too. ). To compute for the Salary (S), we simply formulate this simple equation:
S = RP – T – SSS
In the Overtime Pay (OPay), the equations are more harder to formulate. Let us now have
our discussion about this one. First, we have to initialize the variables with constant
values. The values for these variables are for the moment, will not change. The Regular
Hour (RH) is a maximum of 40 hours. In excess of 40 hours work, it is already
considered as an overtime. So there must be an added income that an employee can get
from his or her salary.
RPH= 100
S SS =200
RH = 40
Next is the discussion on how to compute the overtime pay. Here is now the equations
that calculate it:
230
RS = RPH * RH
OH = HW - 40
OPH = RPH * 1.50
OP = OH * OPH
S = OP + RS
T = S * 0.10
S = S - SSS - T
RS = RPH * RH
where:
RPH is the Rate Per Hour,
while RH is the Regular Hour
To compute for the Overtime Hour, we have to subtract the number of Hours Work (HW)
from 40 (the regular number of hour’s work). Let say an employee has rendered 47 hours
in a week, then his or her overtime hour is 7 (47 – 40). Here is the equation:
OH = HW - 40
Where:
OH is Overtime Hour
HW is Hour’s Work
This time, we need to get the rate of the overtime pay. Since an overtime pay per hour is
150 percent from the present regular pay, then we have to multiply the present regular
pay (RP) to 1.5 (for 150 %). Our equation is:
Where:
This time, it is easy to compute the Overtime Pay. Here is our equation to get it:
OP = OH * OPH
Where:
S = OP + RS
Where:
And to compute finally the net salary, we need to deduct the gross salary from
withholding tax (T) and the SSS contribution. Here is now the last equation:
S = S - T - SSS
Where:
T is the Tax
S is the Salary (net salary)
Wow! This time we are through discussing. It is but a very long and winding discussion
on the Subroutine topic. But it’s worth the effort. Isn’t it?
232
LEC ACTIVITY
TEST 10
For Chapter 1
a.) Binary Nos. Conversion to Decimal Nos.
1.) 310
3.) 710
5.) 1110
1.) 10002
3.) 110102
5.) 11011102
For Chapter 2
Decimal Nos. Conversion to Octal Nos.
a.) Decimal Nos. Conversion to Octal Nos.
1.) 138
3.) 348
5.) 22318
1.) 5610
3.) 11710
5.) 167810
1.) 1001112
3.) 0010110102
5.) 010011.1100012
1.) 78
3.) 7.58
5.) 7478
234
For Chapter 3
a.)Decimal Nos. Conversion to Hexadecimal Nos.
1.) 3E16
3.) EF16
5.) 2CF16
1.) 13810
3.) 24410
5.) 6390610
1.) 100110102
3.) 1110 0011.0101 11012
5.) 0001 1100 11102
1.) AC16
3.) CF16
5.) 7716
For Chapter 4
1.) Solution: In Algorithm
Solution : In Flowchart
Begin
Enter F
C=(5/9)*F-32
Print C
End
Solution : In Flowchart
Begin
Enter R
V=(4/3)*3.1416*r*r*r
Print V
End
For Chapter 5
1. ) 100/2 == 21 % 3
50 == 0
F
5.(W*Z)<(X*W) | | (Z>W)
(10*40)<(20*10) | | (40>10)
400 < 200 || T
F || T
T
237
For Chapter 6
1.)Solution: In Algorithm
Solution: In Flowchart
Begin
Enter n1, n2
D = n1-n2
Print D
End
3.)Solution: In Algorithm
Solution : In Flowchart
Begin
Enter Q1,Q2,Q3
Ave=(Q1+Q2+Q3)/3
Print Ave
End
For Chapter 7
1.)Solution: In Algorithm
Solution: In Flowchart
Begin
Enter g
Y
If (g>=75) Passed A
Failed
End
3.)Solution: In Algorithm
Solution : In Flowchart
Begin
Enter n
R =n %2
If R= 0 Y
Even nos.
A
Odd nos.
End
For Chapter 8
1.)Solution: In Algorithm
Print “Junior”
Else if (L=4) then
Print “Senior”
Else
Print “Unlisted-level”
Solution : In Flowchart
Begin
Enter L
Y
If L=1
Freshman A
Y
Else If
L=2 Sophomore A
Y
Else If
L=3 Junior A
Y
Else If
L=4 Senior A
Unlisted level
End
242
3.)Solution : In Algorithm
Solution : In Flowchart
Begin
Enter L
If L=’P’ Y “Pascal” A
Or L=’p’
Y
If L=’C’ “COBOL”
Or L=’c’ A
Y
If L=’H’ “HTML”
Or L=’h’ A
If L=’B’
Y “BASIC”
Or L=’b’ A
“Unknown
Language”
End
244
For Chapter 9
1.) Solution : In Algorithm
Solution : In Flowchart
Begin
N=5
Y
While Print N
N>=1
End N=N-1
A
245
3.)Solution: In Algorithm
Solution: In Flowchart
Begin
N=2
S=0
While
Y
N<=10 Print N
Print S
N=N+2
End
S = S+N
A
Note:
Chapter 10 has no answer, since it has only one Practice Test.
246
ERRATA?
When I read my own book, especially the first edition of this book, I found
many errors, mostly in the way I spell the word such as “Celcius” when in
fact it should be written as “Celsius”. This is actually not a typographical
error, but my own error. I’d like you to know that I owe you an “apology”.
Whew!!! At least, I spell the word “apology”, correctly. Afterall, this is a
book not a cellular phone. Meaning, mispelled or erroneous words (worst
of all, wrong discussions) are unusual in book writing and communication.
Communicating knowledge with you – students, must be correct and
factual. With this, I am guilty of my own errors. Though, I have my
Technical Reviewers and English grammar editors who did their very best
to ensure the accuracy of this book, still, I am the one who wrote this
book, therefore an error or errors are mine alone (originally). This further
means, that my error or errors are originally mine, it cannot be faked by
someone else...joke. If you find errors in this book, please don’t hesitate to
communicate with me through my e-mail address:
[email protected]. But, I’d like to warn you, make no mistake in
your spelling when writing your e-mails (remember, you are writing an e-
mail not sending short text messages in a cellphone). Just kidding, buddy.
Good luck to all of you (…and to me too.)!
247
248