Introduction To Computer 2018 Edition
Introduction To Computer 2018 Edition
to
Computers
2018 Edition
By
Darrell Hajek,
Cesar Herrera
Copyright 2018
Preface
Preface:
In 2017 we learned that the price of the text we had been using for our introductory computer
literacy course had increased significantly (to over $150.) We felt that this was, not only
excessive, but counterproductive, since very few students would be likely to buy the text at
that price.
We looked for alternative texts for the course, but found none that we considered adequate
for both content and price, and so, we decided to write our own.
We have tried to include all of the material necessary for an introductory course for computer
literacy, but, in order to keep a low price for our students, we have attempted to keep the
content to ONLY what would be necessary for such a course. We fully expect that many will
disagree with the choices we have made, both in what we have included and (probably even
more) in what we have failed to include. We will revisit these decisions when we prepare
future editions. Suggestions and recommendations are welcome.
We have created a set of supplementary PowerPoint files for the text as well as a testbank.
We will be happy to make both available to any teacher who has decided to adopt the book
as assigned text for a course.
[i]
Contents
Contents
1 Introduction .............................................................................................................. 1
1.1 Evolution of the Computer: ......................................................................................... 1
1.1.1 Earliest Devices ................................................................................................................ 1
1.1.2 1600’s: Mechanical Calculators ........................................................................................ 2
1.1.3 1800’s: Babbage ............................................................................................................... 3
1.1.4 1940’s: Electromechanical and Electronic Computers ....................................................... 3
1.1.5 1950’s: Commercial Computers........................................................................................ 4
1.1.6 1960’s and beyond:........................................................................................................... 4
1.1.7 Different classes of computers: ......................................................................................... 5
1.1.7.1 Mainframe computers ....................................................................................................................... 5
1.1.7.2 Minicomputers .................................................................................................................................. 6
1.1.7.3 Supercomputers ................................................................................................................................. 6
1.1.7.4 Personal Computers .......................................................................................................................... 7
1.1.7.5 PDA’s ................................................................................................................................................ 8
1.1.7.6 Smartphones ...................................................................................................................................... 9
1.1.7.7 Tablet Computers .............................................................................................................................. 9
1.1.7.8 Embedded Computers ..................................................................................................................... 10
1.1.8 Communications and Networks ...................................................................................... 10
1.1.8.1 Client-server networks .................................................................................................................... 11
1.1.8.2 Peer to peer networks ...................................................................................................................... 11
ii
Contents
iii
Contents
3 Software ................................................................................................................. 37
3.1 System Software ........................................................................................................ 37
3.1.1 Operating Systems .......................................................................................................... 37
3.1.1.1 Single Tasking Systems .................................................................................................................. 37
3.1.1.2 Multi-Tasking Systems ................................................................................................................... 37
3.1.1.3 Multi User Systems / Time Sharing Systems................................................................................. 38
3.1.1.3.1 Dartmouth Time Sharing System (DTSS) ................................................................................................ 38
3.1.1.3.2 UNIX......................................................................................................................................................... 39
3.3.1.2 Ethical and Unethical Uses of Computers and Computer Programs ............................................ 48
3.3.1.2.1 Unethical Behavior ................................................................................................................................... 48
3.3.1.2.1.1 Piracy ..................................................................................................................................................................... 48
iv
Contents
v
Contents
4.2.1.1 Addresses......................................................................................................................................... 65
5 Input ....................................................................................................................... 75
5.1 Keyboards.................................................................................................................. 75
5.1.1 Keyboard Types ............................................................................................................. 76
5.1.1.1 Standard Computer Keyboard ........................................................................................................ 76
5.1.1.2 Laptop Size Keyboards ................................................................................................................... 76
5.1.1.3 Flexible Keyboards ......................................................................................................................... 76
5.1.1.4 On-Screen Keyboards ..................................................................................................................... 77
5.1.1.5 Projection Keyboards ...................................................................................................................... 77
5.1.2 Keyboard Layouts .......................................................................................................... 77
5.1.2.1 QWERTY Keyboard ....................................................................................................................... 77
5.1.2.2 Dvorak Simplified Keyboard .......................................................................................................... 78
vi
Contents
vii
Contents
viii
Contents
ix
Contents
x
Contents
K...................................................................................................................................... 148
L ...................................................................................................................................... 148
M ..................................................................................................................................... 148
N...................................................................................................................................... 149
O...................................................................................................................................... 149
P ...................................................................................................................................... 150
R ...................................................................................................................................... 151
S ...................................................................................................................................... 151
T ...................................................................................................................................... 152
U...................................................................................................................................... 152
V...................................................................................................................................... 152
W ..................................................................................................................................... 153
X...................................................................................................................................... 153
10-Image References ................................................................................................ 155
xi
Introduction to Computers – Chapter 1
1 Introduction
Humans have always found it necessary to perform some kinds of calculations, and
over the centuries, people have used many devices to perform these calculations. The
complexity of these devices has been increasing as new needs have developed with the
progress of technology.
The oldest known calculating device is the abacusi, which was invented in Asia over
2,000 years ago.
Since the development of the abacus, calculating devices have been continuously
refined, culminating with our modern digital computers. Today, computers play a very
important role in solving a huge variety of problems. The modern uses of computers
include: (among many others)
allowing calculations to be performed very quickly,
automating repetitive processes,
storing and manipulating large quantities of data,
allowing us to browse the Internet.
This chapter provides a review of the developments that resulted in the construction of
the first computer. It also presents a brief description of the evolution of the computer
from its origins until this century.
1.1 Evolution of the Computer:
1.1.1 Earliest Devices
Humans have been using different kinds of devices to help them do calculations since well
before recorded history began.
Probably the first calculating aids people used
were their fingers.
(but fingers would probably not be considered
to be devices in the sense we would normally
use the term.)
The earliest widely used mechanical calculating
device, the iiabacus, was used by the Sumerians
and Egyptians as early as 2000 BC. Its use was Abacus
widespread among the Romans, Indians, Chinese
and Japanese.
1
Introduction to Computers – Chapter 1
Several kinds of analog computers were constructed in ancient and medieval times to
perform astronomical calculations. These include the Antikythera mechanism iii and the
astrolabeiv, both developed in ancient Greece (c. 150–100 BC),
Astrolabe
A computer-generated reconstruction
of the front and back of the Antikythera A
Mechanism.
AA
1.1.2 1600’s: Mechanical Calculators
Throughout the 17’th century there was a great deal of interest in designing and building
mechanical calculators. Particularly noteworthy were the calculators designed and built
by Blaise Pascalv and by Gottfried Leibnitzvi (who also described the binary number
system that is used in all modern computers.) It was in this period that the slide rule vii
first appeared (attributed, in part to Isaac Newton.)
2
Introduction to Computers – Chapter 1
3
Introduction to Computers – Chapter 1
4
Introduction to Computers – Chapter 1
slowly moved away from magnetic core memory devices to solid-state semiconductor
memory This greatly reduced the cost, size and power consumption of computing
devices.
Eventually the cost of integrated circuit devices became low enough that home
computers and personal computers were feasible.
With the introduction of the graphical user interface (GUI), the use of computers no
longer required specialized training and the development of the Internet (especially the
World Wide Web) allowed home and mobile computers (including smart phones) to be
used for entertainment, finance (especially online banking), e-commerce (online
shopping), personal research (Google search, Wikipedia), communications (e-mail,
Instant Messaging, Facebook, Twitter) and education. Of course, with such widespread
uses for a wide range of people, there was a great proliferation of computers and
computer applications that could not possibly have been imagined by the original
pioneers in the field.
1.1.7 Different classes of computers:
Starting around 1960, computer manufacturers began specializing – producing different
types of computers aimed at specific segments of the market:
5
Introduction to Computers – Chapter 1
1.1.7.2 Minicomputers
Minicomputers are a class of smaller computers that
developed in the mid-1960s and sold for much less
than mainframe and mid-size computers from IBM.
When single-chip CPUs appeared, beginning with the
Intel 4004 in 1971, the term "minicomputer" came to
mean a machine that lies in the middle range of the
computing spectrum, smaller than the mainframe
computers but larger than the microcomputers.
Minicomputers usually took up one or a few 19-inch
rack cabinets.
Compare this with the large mainframes that could
fill an entire room.
The definition of minicomputer is vague, and, A PDP-8 on display at the
consequently, there are a number of candidates for Smithsonian's National
being the first minicomputer. An early and highly Museum of American
successful minicomputer was Digital Equipment History in Washington, D.C
Corporation's (DEC) PDP-8xv, which was launched in 1964 and cost from US$16,000
upwards.
The term minicomputer is no longer widely used. The term midrange computer is
now preferred.
1.1.7.3 Supercomputers
Supercomputers are computers that have world-class computational capacity. In
2015, such machines could perform quadrillions of floating point operations per
second.
xvi
Supercomputers were introduced in the 1960s, made initially, and for decades
primarily by Seymour Cray at Control Data Corporation (CDC), then at Cray
Research and at subsequent
companies, all bearing his name or
monogram.
The first computer to be
commonly referred to as a
supercomputer was the CDC6600,
released in 1964. It was designed
by Cray and was the fastest in the
world by a large margin. It
demonstrated that there was a
viable supercomputing market
when one hundred computers were
sold at $8 million each. CDC 6600
CDC 6600
6
Introduction to Computers – Chapter 1
7
Introduction to Computers – Chapter 1
8
Introduction to Computers – Chapter 1
In 1994, IBM introduced the IBM Simonxxi, which was the first PDA with full
mobile phone functionality. The IBM Simon can also be considered the first
smartphone.
In 1996, Nokia introduced a PDA with full mobile phone functionality, the 9000
Communicator, which became the world's best-selling
PDA. The Communicator spawned a new category of
PDAs: the "PDA phone", now called "smartphone". Another
early entrant in this market was Palmxxii, with a line of PDA
products which began
in March 1996.
IBM Simon
and charging
Palm TX base
Apple Newton and I-Phone
1.1.7.6 Smartphonesxxiii
Smartphones typically combine the features of a cell phone with those of other
popular mobile devices, such as personal digital assistant, media player and GPS
navigation unit. It is the mobile phone functionality that distinguishes the smart
phone from the PDA. Most smartphones have a touchscreen user interface, can run
third-party apps, and have cameras built in.
1.1.7.7 Tablet Computers
The smartphone proved to be too small
for many uses and, starting around
1910, the “tablet computer” emerged
as a device intermediate in size between
a smartphone and a laptop.
A tablet computer is a mobile
computer with a touchscreen
display, circuitry and battery in a Smartphones
single unit.
9
Introduction to Computers – Chapter 1
10
Introduction to Computers – Chapter 1
There are two general types of computer networks: client-server networks and peer to
peer networks
1.1.8.1 Client-server networks
A client-server network employs only two types of hosts: clients and servers.
A client is a computer used by a user to connect to a network and make requests
to servers.
A server is a computer that receives and responds to requests from client
machines. The server provides services to clients, usually by sending information
of some kind or receiving and processing information of some kind.
1.1.8.2 Peer to peer networks
Another type of network is known as peer-to-peer, because each host can
simultaneously act as both a client and a server (unlike specialized servers of the
client-server model) and because each has equivalent responsibilities and status.
Peer-to-peer architectures are often abbreviated using the acronym P2P.
1.2 Computer Definition:
Although computers have their origins in mechanical calculating devices (primarily
numerical calculators) they have been adapted to the processing of other kinds of data
(text, sound, graphical, video, …)
Thus, a computer is no longer simply a calculating device, but has evolved into a data
processing device.
In order for the computer to process data, the data must be available in the computer to
be processed. Further, the computer must have the ability to access the data and, then,
to do something with it.
A computer is controlled by sequence of commands
Such a sequence of computer commands is called a program.
A computer must have both a processor and memory:
Processor: (often called a Central Processing Unit or CPU) is a device which
actually does the data processing. For every possible action of the processor, there
is a numerical code (called a machine command) which can be stored in the
memory of the computer.
Memory: a place where the data (and machine commands controlling the actions of
the CPU) can be stored.
1.2.1 Information Processing Cycle
A computer works by continually repeating four actions over and over:
Fetch:
The processor reads (fetches) a machine command from memory.
11
Introduction to Computers – Chapter 1
Decode:
The processor identifies the command action.
Execute:
The processor performs the action.
Store:
If the action resulted in the computation of some value, then that value is stored
in the appropriate location.
In fact, the individual actions of a CPU tend to be very simple (add two numbers,
copy a number from one memory location to another, …) A computer derives its
power not from the ability to perform powerful/complex actions, but rather from
sheer speed, from being able to perform many simple actions in a very short period
of time.
12
Introduction to Computers – Chapter 1
13
Introduction to Computers – Chapter 1
1
The term hacker was once used to describe a computer expert who used his technical
knowledge to overcome a problem. It has come, in the popular culture, to be used to describe
someone who uses his technical knowledge to break into computer systems.
14
Introduction to Computers – Chapter 1
1. The oldest known calculating device is the _______ which was invented in Asia
over 2000 years ago.
1.1.1 Several kinds of analog computers were constructed in ancient and medieval
times to perform astronomical calculations. These include the Antikythera
mechanism and the __________, both developed in ancient Greece (c. 150–100
BC)
1.1.4 The world's first programmable, electronic, digital computers were the
________computers, developed for British codebreakers during World War II to
help in the cryptanalysis
1.1.4 In the United States, _________, the first general purpose, programmable
computer was initially designed to compute artillery firing tables for the US
army
1.1.7 Starting around _______, computer manufacturers began specializing –
producing different types of computers aimed at specific segments of the
market:
1.1.7.1 __________computers are computers used primarily by commercial and
governmental organizations for critical applications and bulk data processing
such as census, industry and consumer statistics, enterprise resource planning
and transaction processing
1.1.7.1 The term “_________” originally referred to the large cabinets that housed
the central processing unit and main memory of early computers. Later, the term
was used to distinguish high-end commercial machines from less powerful units
1.1.7.2 The term minicomputer is no longer widely used. The term _______
computer is now preferred
1.1.7.3 The first computer to be commonly referred to as a supercomputer was the
__________, released in 1964.
1.1.7.3 Supercomputers were introduced in the 1960s, made initially, and for
decades primarily by Seymour _____ at Control Data Corporation (CDC), then
at subsequent companies, all bearing his name or monogram
1.1.7.5 A(n) ________is a mobile device that functions as a personal information
manager. They were discontinued in early 2010s after the widespread adoption
of smartphones and tablets.
1.1.7.7 A(n) _______computer is a mobile computer with a touchscreen display,
circuitry and battery in a single unit
1.1.7.7 The first modern tablet, the ______, was released in 2010
15
Introduction to Computers – Chapter 1
1.1.8 With increased use of computers it became important to move data from one
computer to another quickly and efficiently. This, then, motivated the
development of computer _________
1.1.8 There are many different sizes and types of networks. At one extreme is the
_______ which allows a few computers to copy information from one to
another, and to share access to resources such as printers and modems for
Internet access.
1.1.8.1 A(n) _______ is a computer used by a user to connect to a network and
make requests to servers.
1.1.8.1 A(n) ______ is a computer that receives and responds to requests from
client machines
1.2 A computer is controlled by sequence of machine commands. Such a sequence
of computer commands is called a(n) _______
1.4.2 Multiple Choice
1. The oldest known calculating device is the abacus which was invented in
_______over 2000 years ago.
a) Asia
b) Rome
c) India
d) Greece
e) none of the above
1. Today, computers play a very important role in solving a huge variety of
problems. One of the modern uses of computers is _____
a) allowing calculations to be performed very quickly,
b) automating repetitive processes,
c) storing and manipulating large quantities of data,
d) all of the above
e) none of the above
1.1.1 The use of the abacus was widespread among the ______
a) Romans
b) Indians
c) Chinese
d) all of the above
e) none of the above
1.1.1 The astrolabe, a kind of analog computer, was developed in ancient _____
a) India
b) China
c) Greece
16
Introduction to Computers – Chapter 1
d) Egypt
e) none of the above)
1.1.2 _________ described the binary number system that is used in all modern
computers
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
1.1.2 The slide rule is attributed in part to _________
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
1.1.3 _________ designed the analytical engine, which was, in fact, a
programmable computer. The design for the analytical engine included many
ideas that were later incorporated into widely used computers beginning in the
1940’s
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
1.1.3 Babbage was never able to complete construction of any of his machines due
to conflicts with his chief engineer and inadequate funding. It was not until the
_______s that the first general-purpose computers were actually built
a) 1920
b) 1930
c) 1940
d) 1950
e) none of the above
1.1.4 _________ was the world's first programmable, electronic, digital computer
a) Colossus Mark 1
b) ENIAC
c) LEO 1
d) UNIVAC
e) none of the above
17
Introduction to Computers – Chapter 1
18
Introduction to Computers – Chapter 1
19
Introduction to Computers – Chapter 1
20
Introduction to Computers – Chapter 2
2 Computer Components
Almost all modern computers have pretty much the same design.
They all have the same basic components. These basic components
are:
Processorxxv: The component which actually performs the
actions/executes the commands that the computer carries out. Processor
-21-
Introduction to Computers – Chapter 2
Input devices:
Input devices are
components/devices which allow
us to put information/data into the
computer memory.
The most common input devices Keyboard Mouse
are: xxxkeyboard
xxxi
mouse
Output devices:
Output devices are components/devices which
allow the computer to communicate
information/data from computer memory to
users and/or other computing devices.
The most common output devices are: Monitor
Printer
xxxii
monitors
xxxiii
printers
Communications Devices:
Communications devices are devices which facilitate communication with other
devices. These include: Network Interface Controller (NIC), Wireless
communications devices, Bluetooth interface controllers, Ethernet ports, modems
Bus:
The component which facilitates movement of data from one place to another within
the computer.
In most systems, these components will be either mounted on or
connected to the computer’s xxxivmotherboard.
A motherboard (also called a system board) is a circuit board.
Electronic components are attached to, or, in some cases, built
into, the motherboard. motherboard
2.1 Central Processing Unit (CPU)
The CPU interprets and carries out the basic instructions that
result in the computer doing what we want it to do.
A xxxvCentral Processing Unit (CPU) has two subdivisions: The
Control Unit and the Arithmetic Logic Unit (ALU)
CPU
Figure 1CPU
-22-
Figure 2CPU
Introduction to Computers – Chapter 2
-23-
Introduction to Computers – Chapter 2
The time it takes for the processor to reference a memory cell is pretty much
independent of where it is located in memory. That is the reason for the term random
access memory.
This makes it different from other direct-access data storage media (such as hard
disks, CD’s, DVD’s.) For those types of media the time required to read and write
data items varies significantly depending on their physical locations on the
recording medium.
The time difference is due to mechanical considerations, such as media
rotation speeds and arm movement delays.
There are two distinct types of memory: Random Access Memory (RAM) and Read Only
Memory (ROM)
The computer can read information from, but cannot write to, locations in ROM.
Most home or office computers include magnetic disk drives and have only a minimal
hardware initialization core and bootloader in ROM (known as the BIOS in IBM-
compatible computers.) This is the minimum configuration necessary to allow the
computer to load the rest of the operating system from disk into RAM. This
arrangement results in an operating system that is relatively easy to upgrade.
ROM is implemented using nonvolatile types of memory (The contents do not
change when the computer is powered down and then later restarted.)
Data items can be read from both RAM and ROM, but can be written only to locations
in RAM.
RAM is normally associated with volatile types of memory. (When the computer
is turned off the contents of volatile memory are erased.)
Access to locations in RAM is generally much faster than to locations in ROM.
This is one of the reasons that only minimal initialization software will be in
ROM.
There are, in fact several different types of RAM, some of which are much faster than
others (and more expensive and use more power and generate more heat.)
In order to achieve greater execution speed but hold costs down, computer
manufacturers use relatively cheap memory for most of their RAM, but include a
small amount of (more expensive) high speed circuitry. This is called cache memory.
A system will attempt to store in cache memory, information that is likely to be
accessed frequently, and/or in the immediate future.
2.3 Secondary Storage:
Secondary storage (also known as external memory or auxiliary storage), differs from
primary storage in that it is not directly accessible by the CPU. The computer usually
uses its input/output channels to access secondary storage and transfers the desired data
using intermediate areas in primary storage (These areas are called buffers). Secondary
storage does not lose the data when the device is powered down (it is non-volatile.) It is
-24-
Introduction to Computers – Chapter 2
also typically two orders of magnitude less expensive than primary storage but access to
secondary storage is much slower than primary storage access.
Modern computer systems typically have two orders of magnitude more secondary
storage than primary storage.
In modern computers, xxxviiihard disk drives are
normally used as secondary storage. The time taken
to access a given byte of information stored on a
hard disk is typically a few thousandths of a second,
(a few milliseconds.)
By contrast, the time taken to access a given byte of
information stored in random-access memory is
measured in billionths of a second (nanoseconds.)
Diagram labeling the major
This illustrates the significant access-time components of a computer
difference between solid-state memory and HDD
rotating magnetic storage devices: hard disks are
typically about a million times slower than primary memory.
Rotating optical storage devices (such as CD and DVD drives), have even longer
access times.
With disk drives, once the disk read/write head reaches the proper placement and the
data of interest rotates under it, subsequent data on the same track are relatively fast to
access.
To reduce the seek time and rotational latency, data are transferred to and from disks
in large contiguous blocks.
2.4 Input Devices:
Clearly, users will need some way to enter information into their computers.
To facilitate this, the computers must be connected to some kinds of input devices.
Traditional input devices include the keyboard, mouse and scanner. More recently touch
screens and cameras built into smartphones/tablets have also become widely used.
2.4.1 Keyboard:
A xxxixkeyboard is a typewriter-style device, which uses
buttons or keys, to act as mechanical levers or electronic
switches.
Keyboard
-25-
Introduction to Computers – Chapter 2
-26-
Introduction to Computers – Chapter 2
-27-
Introduction to Computers – Chapter 2
-28-
Introduction to Computers – Chapter 2
-29-
Introduction to Computers – Chapter 2
2.5.2.2 Projectors
A xlixprojector or image projector is a device that
projects an image (or moving images) onto a surface,
such as a projection screen.
Earlier projectors created their images by shining a light
Projector
through lenses, but many newer types of projectors can
project the image directly, by using lasers.
The very newest types of projectors are handheld projectors. Current handheld
models do not produce very bright images, and their projections are hard to
see if there is much ambient light
2.5.2.3 Printers
A lprinter is an output device that prints graphics or text
on paper or similar physical media.
Printers produce hard copy output, as opposed to the
previously described devices which were all soft copy
devices.
The two most common kinds of printer are laser printers Printer
and inkjet printers.
Monochrome (black and white) laser printers are commonly found in offices,
where they are used to produce text documents. Color laser printers are more
expensive than monochrome, but their prices are going down, and they are
becoming more common
Inkjet printers are cheaper than laser printers and can produce relatively
high quality color output. They are commonly found in homes and small
businesses.
2.6 Communications Devices
There are several kinds of communications devices used in computers. Some duplicate
the functionalities of others, although in different ways, and some provide relatively
specialized services.
2.6.1 NIC’s
Many computers come with communications devices preinstalled. The most common
of these devices is the Network Interface Controller (NIC)
A network interface controller is a computer hardware component that connects
a computer to a computer network.
Early network interface controllers were commonly implemented on expansion
cards that plugged into a computer bus, but most modern computers have a
network interface built into the motherboard.
-30-
Introduction to Computers – Chapter 2
2.6.2 Wireless
Most modern laptops come with hardware capable of communicating wirelessly with
a router or with other computers.
Wireless hardware for a desktop computer eliminates the need to run network
cable from the router to the computer.
Wireless hardware can also give a laptop or desktop computer the capability to
communicate wirelessly with other computers, without the need for a router.
2.6.3 Bluetooth
li
Bluetooth is a wireless technology now included on many
smartphones, laptops and desktop computers. It allows the
computer to communicate wirelessly with other devices
that have the hardware necessary to send and/or receive
Bluetooth signals.
A typical Bluetooth
One popular way of utilizing Bluetooth technology on a mobile phone headset.
computer is with a mouse capable of Bluetooth
communication, which eliminates the need for a wire.
Wireless control of and communication between a mobile phone and a handsfree
headset was one of the earliest applications to become popular
2.6.4 Ethernet Ports
Thelii Ethernet port is another popular communication device that comes built into
most personal computers. It allows the computer to communicate with another
computer, a router or other networking device using Ethernet
cable.
Some laptop manufacturers, wanting to offer models that
are as light and simple as possible, have opted to remove
the Ethernet port and allow users to rely on the laptop's
wireless card, Ethernet Port
-31-
Introduction to Computers – Chapter 2
2.7 Bus:
A bus is a physical arrangement that facilitates the transmission of data from one
place in the computer to another.
There are various kinds of buses in a computer for different specific functions,
that is, for transmitting different specific kinds of information.
Some of them are: data bus; address bus; universal serial bus (USB)
Early computer buses were parallel electrical wires with multiple connections, but the
term is now used generally for any arrangement that provides the function of
transmitting data.
2.8 Questions:
2.8.1 Completion
2. The component which actually performs the actions/executes the commands that
the computer carries out is called the processor or ______
2.1 The _________ interprets and carries out the basic instructions that result in the
computer doing what we want it to do
2.2 The term "memory", (primary memory, primary storage) is ___________
semiconductor memory, i.e. integrated circuits consisting of silicon-based
transistors
2.2 Data items can be read from both RAM and ROM, but can be written only to
locations in _______
2.2 Most home or office computers include magnetic disk drives and have only a
minimal hardware initialization core and bootloader in ROM (known as the
______in IBM-compatible computers).
2.2 In order to achieve greater execution speed but hold costs down, computer
manufacturers use relatively cheap memory for most of their RAM, but include
a small amount of (more expensive) high speed circuitry. This is called
________memory
2.4 Traditional _______devices include the keyboard, mouse and scanner.
2.4.2 A text file might be represented by a picture of a paper notebook, and clicking
while the cursor hovers over this _______might cause a text editing program to
open the file in a window
-32-
Introduction to Computers – Chapter 2
-33-
Introduction to Computers – Chapter 2
2.1 The central processing unit has two subdivisions, the control unit and the
_______
a) CPU
b) ALU
c) VDU
d) OSU
e) none of the above
2.3 The time taken to access a given byte of information stored on a hard disk is
typically a few thousandths of a second, (a few_________.)
a) microseconds
b) milliseconds
c) nanoseconds
d) macroseconds
e) none of the above
2.3 The time taken to access a given byte of information stored in random-access
memory is measured in billionths of a second (_________.)
a) microseconds
b) milliseconds
c) nanoseconds
d) macroseconds
e) none of the above
-34-
Introduction to Computers – Chapter 2
-35-
Introduction to Computers – Chapter 2
2.3 Secondary storage does not lose the data when the device is powered down (it is
non-volatile.) It is also typically two orders of magnitude more expensive than
primary storage.
2.3 Rotating optical storage devices (such as CD and DVD drives), have much
shorter access times than do rotating magnetic storage devices, such as hard
disks.
2.4.4 Very few tablet computers incorporate touchscreens, since their larger screens
would make them too expensive.
2.4.5 Most laptops and tablets come with digital cameras built in.
2.5.2. Headphones cannot provide good quality sound. For good fidelity, speakers
are needed.
2.6.1 Early network interface controllers were commonly built into computer
motherboards, but most on most modern computers, they are implemented on
expansion cards that plugged into a computer bus
-36-
Introduction to Computers – Chapter 3
3 Software
Of course a computer is of little use if it does not have programs to execute, programs that
will make it do what the user wants it to do. Computer programs (collectively known as
Computer Software) can generally be divided into two classifications: System Software
and Application Software
System software is software which provides an interface and services both for users
and for other software.
Application software is software designed to provide specific services for users.
3.1 System Software
System software is often divided into two classifications: Operating Systems (often
referred to as simply OS’s) and Utility Programs
3.1.1 Operating Systems
The operating system (prominent current examples include UNIX, Microsoft
Windows, Mac OS X, Android, iOS, and Linux), allows the components of a
computer to work together.
An operating system would include programs that interface:
• users with hardware;
• users with software;
• software with hardware;
• software with other software.
An operating system will perform tasks like transferring data between memory and
disks and like rendering output onto a display device.
3.1.1.1 Single Tasking Systems
The earliest operating systems required users to type their programs (and their
operating system commands) on punched cards. The cards would be placed (in
proper order) into a card reader. The cards would be read and the program
executed. These operating systems were inherently single tasking systems,
executing one program at a time, finishing one program before beginning the next.
3.1.1.2 Multi-Tasking Systems
In the early days of computing, CPU time was expensive, and peripherals were
very slow. When the computer ran a program that needed access to a peripheral,
the central processing unit (CPU) would have to stop executing program
instructions while the peripheral processed the data. This was usually very
inefficient.
-37-
Introduction to Computers – Chapter 3
The first computer using a multitasking system was the British Leo III owned by
J. Lyons and Co. (First completed in 1961.) During batch processing, several
different programs would be loaded in the computer memory, and the first one
would begin to run. When the first program came to an instruction that required
waiting for response from a peripheral, the context of this program was stored
away, and another program in memory was given a chance to run. This process of
running until required to wait, and, passing control to another program, rather than
stopping and waiting, would continue until all programs finished running
3.1.1.3 Multi User Systems / Time Sharing Systems
With computers loading several programs into memory at once,
(Multitasking systems) it seemed natural to allow several users
to interact with the system concurrently (Multi-User systems)
Instead of submitting programs as a sequence of punched cards,
the user would interact with the system by means of a “monitor”
(in the early days this was often an livASR 33 teletype)
In order to better support multi user systems the concept of
“time slicing” was developed. The CPU would be assigned to
A Teletype Model
execute commands from one process for a short period of time 33 ASR teleprinter,
(slice), then from another process for a period (slice) of time, with punched tape
… (The idea being that each user would have the impression reader and punch,
usable as a
that the computer was continually working for him.)
computer terminal
3.1.1.3.1 Dartmouth Time Sharing System (DTSS)
The first successful multiuser time sharing system was at Dartmouth
College. It began operations on May 1, 1964. and remained in operation
until the end of 1999. Its implementation began in 1963, by a student
team under the direction of John Kemeny and Thomas Kurtz and had
the aim of providing easy access to computing facilities for all members
of the college. Kemeny felt that 10 seconds was the maximum time that
a user should have to wait for a system response2. The system provided
interactive time-sharing for up to nearly 300 simultaneous users in the
1970s (a very large number at that time.)
2
10 seconds might seem quite a long wait time today, but users of the single user systems common
at that time would typically have to wait overnight, and a waiting times of several days was not
uncommon.
-38-
Introduction to Computers – Chapter 3
3.1.1.3.2 UNIX
Probably the most widely used multi-user operating system now is UNIX,
developed by Thompson and Ritchie at AT&T’s Bell Labs in 1969.
Although UNIX was originally only intended just for use inside the Bell
system, its use soon spread widely first to academic institutions and shortly
thereafter to vendors such as IBM, SUN microsystems and Microsoft, under
proprietary names such as XENIX (Microsoft) AIX (IBM) and SOLARIS
(SUN)
UNIX spread so widely in part because it was designed to be easily portable
to a wide range of different computing systems. It was developed as a
collection of individual modules (utilities) and written in a high level
language ( C ) which made it easy to modify and keep up to date.
-39-
Introduction to Computers – Chapter 3
-40-
Introduction to Computers – Chapter 3
-41-
Introduction to Computers – Chapter 3
-42-
Introduction to Computers – Chapter 3
3.1.1.5.1 Android
lviii
Android is a mobile operating system developed by
Android Inc. (starting in 2003) (later purchased by Google
in 2005.) It is based on Linux and is designed primarily for
touchscreen mobile devices such as smartphones and tablets.
Android works with a user interface that is principally based
on direct manipulation. It uses touch gestures that loosely
correspond to real-world actions, such as swiping, tapping
and pinching These are used to manipulate on-screen objects Nexus 7 tablet,
(icons) running Android
4.1 Jelly Bean
Android typically includes a virtual keyboard for text input.
In addition to touchscreen devices, Google has further expanded the system to
include Android TV for televisions, Android Auto for cars, and Android Wear
for wrist watches, each with a specialized user interface.
Variants of Android are also used on notebooks, game consoles, digital
cameras, and other electronics.
In September 2015, Android had 1.4 billion monthly active users, and it has
the largest installed base of any operating system.
3.1.1.5.2 iOS
lix
iOS is a mobile operating system created and developed by
Apple Inc. exclusively for its hardware. It is the operating
system that presently powers many of the company's mobile
devices, including the iPhone, iPad, and iPod Touch. It is the
second most popular mobile operating system globally after
Android. iPad tablets are also the second most popular, by sales
(second to Android) since 2013.
The iOS user interface is based on direct manipulation, using iOS on
multi-touch gestures. It implements interface control elements Smartphone
including sliders, switches, and buttons. Interaction with the system includes
gestures such as swipe, tap, pinch, and reverse pinch, all of which have
specific definitions within the context of the iOS operating system and its
multi-touch interface. Internal accelerometers are used by some applications
to respond to shaking the device or rotating it.
-43-
Introduction to Computers – Chapter 3
-44-
Introduction to Computers – Chapter 3
The collective noun application software refers to all applications collectively. This
distinguishes it from system software, which is mainly involved with running the
computer.
Applications may be bundled with the computer and its system software or published
separately, and may be coded as proprietary, open-source or university projects. Apps
built for mobile platforms are called mobile apps.
There are many types of application software:
• An application suite (or software suite) consists of multiple applications bundled
together. They usually have related functions, features and similar user interfaces. They
are often able to interact with each other, e.g. open each other's files.
o Business applications often come in suites, e.g. Microsoft Office, LibreOffice
and iWork, which bundle together a word processor, a spreadsheet, etc.; but
suites exist for other purposes, e.g. graphics or music.
• Enterprise software addresses the needs of an entire organization's processes and data
flows, across several departments, often in a large distributed environment.
o Examples include enterprise resource planning systems, customer relationship
management (CRM) systems and supply chain management software.
o Departmental Software is a sub-type of enterprise software with a focus on
smaller organizations or groups within a large organization. (Examples include
travel expense management and IT Helpdesk.)
• Enterprise infrastructure software provides common capabilities needed to support
enterprise software systems. (Examples include databases, email servers, and systems
for managing networks and security.)
• Information worker software lets users create and manage information, often for
individual projects within a department, in contrast to enterprise management.
o Examples include time management, resource management, analytical,
collaborative and documentation tools.
o Word processors, spreadsheets, email and blog clients, personal information
system, and individual media editors may aid in multiple information worker
tasks.
• Content access software is used primarily to access content without editing, but may
include software that allows for content editing. Such software addresses the needs of
individuals and groups to consume digital entertainment and published digital content.
o Examples include media players, web browsers, and help browsers.
• Educational software is related to content access software, but has the content or
features adapted for use in by educators or students.
-45-
Introduction to Computers – Chapter 3
-46-
Introduction to Computers – Chapter 3
Some pirates have cited their first amendment rights as an excuse for piracy.
They claim that since posting information in electronic form is protected by the
first amendment, the distribution of illegal software is an exercise of the rights
of self-expression and should not be infringed upon.
Some think that software piracy doesn't hurt anyone, that it is a victimless
crime. They believe that, with the rising prices of software, software
manufacturers are really not hurt by pirates making illegal copies of their
programs. They think since they are not going to pay for the software anyway,
it is OK to get it free.
Another common excuse runs along the lines of "the software is really not
worth the money they're charging anyway." The argument continues that since
the software is buggy, it's really not a crime to distribute faulty products.
Finally, some claim that they're simply "testing" the software. "If I really like it,
I'll pay for it," runs the common excuse, "but this program just sits on my hard
drive and I almost never use it."
Piracy is Unethical
This view holds that piracy is really not a victimless crime. Due to software
piracy, the industry has seen some 12 billion dollars and over 100,000 jobs lost.
The attraction of piracy is due to its anonymity and the ease with which illegal
copies of software can be made and distributed. However, every person who
makes illegal copies is contributing to the monetary losses caused by piracy.
Information really does not "want to be free." People who write the software
have rights to profit from it, just as people who write books have the sole right
to sell them. Copying software is depriving the rightful owners of software of
hard-earned wages.
Software piracy cannot be protected by the first amendment, because the first
amendment does not cover illegal activities. Just as yelling "Fire!" in a crowded
-47-
Introduction to Computers – Chapter 3
3.3.1.2.1.1 Piracy
The issue of software piracy is dealt with at great length in another section,
but there is no question that accepting unauthorized copies of software,
and/or allowing friends and associates to make copies of software you have
purchased would be illegal, in addition to being, at the very best,
questionable, ethically speaking.
-48-
Introduction to Computers – Chapter 3
3.3.1.2.1.2 Cyberbullying
Although bullying has always been a part of life, the emergence of social
networking has given enormously greater powers to would be bullies. (A
number of widely publicized incidents in which the victims were driven to
suicide can attest to this.)
Clearly the parents of would be victims have a responsibility to protect their
children from these online predators, but the parents of potential bullies
also have a moral/ethical responsibility to monitor their children, and to
prevent them from engaging in such behavior.
3.3.1.2.1.3 Plagiarism
Documents with all kinds of information are widely available on the
Internet (as well as images and videos) and software to copy from the online
documents and paste what was copied into documents of our own is also
generally available. It is easy to forget our ethical (and legal) duty to
attribute the source of what we are using.
There is also a booming cottage industry of people who will write papers
and do homework assignments for high school and college students.
Needless to say, submitting someone else’s work as one’s own is frowned
on by teachers everywhere, and must be considered an ethical violation.
-49-
Introduction to Computers – Chapter 3
3.3.1.2.2 Insecurities
The simple fact that we have and use a computer puts us at risk of a number
of possible dangers, any or all of which can and should worry us.
-50-
Introduction to Computers – Chapter 3
-51-
Introduction to Computers – Chapter 3
-52-
Introduction to Computers – Chapter 3
What follows are a few of the ethical quandaries confronting developers every day -
- whether they know it or not. There are no easy answers, in some measure because
the very nature of the work is so abstract. To make matters worse, business has
become so inextricably linked with computer technology that it is difficult to balance
the needs and motivations of all invested parties in trying to prevent today's business-
case feature from becoming tomorrow's Orwellian nightmare.
The trick is to think past the current zeitgeist and anticipate every future utilization
of what you build. Pretty simple, huh? Consider this less of a guidebook for making
your decisions and more of a starting point for the kind of ethical contemplation we
should be doing as a daily part of our jobs.
-53-
Introduction to Computers – Chapter 3
3.3.2.1 Ethical dilemma No.1: Log files--what to save and how to handle them
Programmers are like pack rats. They keep records of everything, often because it's
the only way to debug a system. But log files also track everything users do, and in
the wrong hands, they can expose facts users want kept secret.
Many businesses are built on actively protecting log files. Some remote-backup
services even promise to keep additional copies in disparate geographic locations.
Not every business aspires to such diligence. Snapchat, for example, built its brand
on doing a very bad job of backing up data, but its users are attracted by the freedom
of the forgetful system.
The mere existence of log files begs several ethical questions. Are they adequately
protected? Who has access? When we say we destroy the files, are they truly
destroyed?
The crux is ascertaining what information is worth keeping, given the risks of doing
so, ethical or otherwise. Here, the future complicates the equation. In the 1960s,
smoking was widely embraced. No one would have thought twice about keeping
track of people's smoking habits. Today, however, the knowledge of someone's
smoking activity can be used to raise health insurance rates or even deny coverage.
Future business deals; future government regulations; an unforeseen, desperate
need for new revenue streams -- it may be impossible to predict what seemingly
innocent log file will become problematic in the future, but it is essential to consider
the ethics of how you handle the logs along the way.
3.3.2.2 Ethical dilemma No.2: Whether-and how-to transform users into
products
It's a well-worn adage of the startup era: If you're not paying for a service, you're
not a customer; you're the product.
On the Internet, "free" services abound. In fact, the question of where the money
will come from is often put off, being off putting. We just build the amazingness,
keep an eye on the adoption metrics, and figure someone else will take care of the
dirty work of keeping the server lights on. Worst case, there are always ads.
Developers need to be upfront about who will support their work and where the
money will come from. Any changes should be communicated to users in a clear,
timely fashion to avoid shock and blowback. Transforming people into products is
an ethical shift not to be taken lightly. Shady ad deals, shady ad networks -- we
need to be careful how we handle the implicit trust of early adopters.
3.3.2.3 Ethical dilemma No.3: How free does content really want to be?
A number of businesses depend on serving up content without paying those who
create it. Some turn around and sell ads or even charge for access. These businesses
often couldn't survive and couldn't price their material as attractively if they had to
shoulder their fair share of the development costs. They develop elaborate
-54-
Introduction to Computers – Chapter 3
-55-
Introduction to Computers – Chapter 3
-56-
Introduction to Computers – Chapter 3
should a company follow when customers are in different countries? When data is
in different counties? When data is transferred across international lines?
Keeping up with every legal contingency can be Herculean, leaving many
organizations surely tempted to bury their heads in the sand.
3.3.2.9 Ethical dilemma No.9: How much to give back to open source
Everyone knows that open source is free. You don't pay anything and that's what
makes it so wonderful and complex. But not everyone contemplates the ethical
issues that come with using that free code. All of the open source packages come
with licenses and you need to follow them.
Some of the licenses don't require much sacrifice. Licenses like the Apache License
or the MIT License require acknowledgement and that's about it. But other licenses,
such as the GNU General Public License, ask you to share all your enhancements.
Parsing open sources licenses can present ethical challenges. One manager from a
big public company told me, "We don't distribute MySQL, so we don't owe anyone
anything." He was keying on the clause, written decades ago, that tied the license's
obligations to the act of redistributing software. The company used MySQL for its
Web apps, so he felt it could take without giving back.
There are no simple ways to measure the ethical obligations, and many
programmers have wasted many keystrokes arguing about what they mean. Still,
the entire endeavor will grind to a halt if people stop giving. The good news is that
it's often in everyone's best interest to contribute because everyone wants the
software to remain compatible with their use of it.
3.3.2.10 Ethical dilemma No.10: How much monitoring is really warranted
Maybe your boss wants to make sure the customers aren't ripping off the company.
Maybe you want to make sure you get paid for your work. Maybe some spooky guy
from the government says you must install a backdoor to catch bad guys. In every
case, the argument is filled with assurances that the backdoor will only be used, like
Superman's powers, to support truth and justice. It won't be used against political
enemies or the less fortunate. It won't be sold to despotic regimes.
But what if the bad guys discover the hidden door and figure out how to use it
themselves? What if your backdoor is used to support untruths and injustices? Your
code can't make ethical decisions on its own. That's your job.
3.3.2.11 Ethical dilemma No. 1: How bulletproof should code really be
Sure, the minimal calculation, simple data structure, and brute-force approach works
well in demo when the problems are small. The users try out the code and say, "Gosh
this works quickly." Several months later, when enough data has been loaded into the
system, the cheap algorithm's weaknesses appear and the code slows to a crawl.
Developers must often decide exactly how hard to work on the final product. Do you
whip off a quick and cheap solution or spend weeks adding bulletproof code that
deals with extreme cases? True, clients and users should assume some of the
-57-
Introduction to Computers – Chapter 3
responsibility during the requirements and sign-off phases, but developers are often
better equipped to anticipate potential contextual hiccups of running code.
3.3.2.12 Ethical dilemma No.12: How much should future consequences
influence present decisions
Many projects don't make waves. The information goes in and never escapes. Some,
however, take on a life of their own, escaping into the wild where they may do untold
harm. Security, penetration testing, espionage -- these are obvious candidates for
considering the collateral damage of your code.
Take Stuxnet, a virus widely considered a tool for attacking the centrifuges used to
purify uranium in Iran. Perhaps it succeeded, but now it lives on, floating along in
Windows systems throughout the world.
For most developers, the collateral damage is less obvious. We code for today -- a
hard enough proposition -- but we should also consider the future.
Some programmers, for example, love to write complex code that integrates with the
operating system and installs new or more complicated drivers. Is that going to work
in the future? Will it play well with other new drivers? Will it work with the next
generation of the OS? Or will your software leave people with a computer that runs
slower and fails more frequently even when your software isn't running?
It may seem simple, but choosing whether to stick with the APIs or follow the
standards is an ethical decision. Yes, technology is evolving quickly, and a slavish
devotion to outdated mandates can be a hindrance to progress. But we need to
consider our part in writing code that lasts a bit longer and not take the decision to
swim outside our lane lightly. We can always ask for changes to the standards or the
APIs if we need them.
3.4 Questions
3.4.1 Completion
3. _______ software is software which provides an interface and services both for
users and for other software
3. _________software is software designed to provide specific services for users.
3.1.1.4.2.2 On PCs, _______is the most popular operating system
3.1.1.4.2.3 ________ has been ported to more platforms than any other operating
system
3.1.1.4.2.3 ________ has the largest installed base of all general-purpose operating
systems
3.1.1.5.2 In the iOS operating system, internal _________ are used by some
applications to respond to shaking the device or rotating it
-58-
Introduction to Computers – Chapter 3
3.1.2 The term system software can also be used for software development tools
(like________, linkers and debuggers)
3.2 ___________software (also called end-user programs) includes such things as
database programs, word processors, Web browsers and spreadsheets
3.2 The collective noun application software refers to all applications
collectively. This distinguishes it from ________ software, which is mainly
involved with running the computer.
3.2 An application _______ consists of multiple applications bundled together.
They usually have related functions, features and similar user interfaces. They
are often able to interact with each other, e.g. open each other's files
3.2 _________Software can refer to video games, screen savers, programs to
display motion pictures or play recorded music
3.3.1.1 Some pirates have cited their _____amendment rights as an excuse for
piracy
3.4.2 Multiple Choice
3. Computer programs (collectively known as Computer Software) can generally
be divided into two classifications:
a) System Software and User Software
b) System Software and Application Software
c) Network Software and User Software
d) Network Software and Application Software
e) none of the above
3. _________ software is software which provides an interface and services to users
and other software
a) System
b) User
c) Network
d) Application
e) none of the above
3. _________ software is software designed to provide specific services for users
a) System
b) User
c) Network
d) Application
e) none of the above
3.1.1.2 The first computer using a multitasking system was the_____
a) IBM 360
b) Colossus Mark I
-59-
Introduction to Computers – Chapter 3
c) LEO III
d) ENIAC
e) none of the above
3.1.1.3.1 The first successful multiuser time sharing system was
a) DTSS
b) UNIX
c) Multics
d) ENIAC
e) none of the above
3.1.1.3.2 Probably the most widely used multi-user operating system is
a) DTSS
b) UNIX
c) Multics
d) ENIAC
e) none of the above
3.1.1.4.1 ______ is a personal computer operating systems with a command line
interface.
a) AppleDOS
b) CP/M
c) MS-DOS
d) all of the above
e) none of the above
3.1.1.4.2 ______ is a type of user interface that allows users to interact with
electronic devices through graphical icons and visual indicators, instead of text-
based user interfaces
a) CLI
b) GVI
c) GUI
d) all of the above
e) none of the above
3.1.1.5.1 Android works with a user interface that is mainly based on direct
manipulation, using touch gestures that loosely correspond to real-world actions,
such as_________, to manipulate on-screen objects
a) swiping
b) tapping
c) pinching
d) all of the above
e) none of the above
-60-
Introduction to Computers – Chapter 3
3.2 Business applications often come in_______, e.g. Microsoft Office, LibreOffice
and iWork, which bundle together a word processor, a spreadsheet, etc
a) combos
b) suites
c) factions
d) all of the above
e) none of the above
3.4.3 True-False
3.1.1.2 In the early days of computing, CPU time was expensive, and peripherals
were very slow
3.1.1.4 The earliest personal computers generally featured operating systems with
rather primitive command line interfaces.
3.1.1.4 Personal computers are intended to be operated directly by an end-user who
is not necessarily a computer expert or technician
3.1.1.4.2 The first commercially available computer with a GUI was the Apple
Macintosh.
3.1.1.5 The vast majority of modern smartphones use one of three operating
systems: Android, Linux, or iOS
3.2 A Web Browser is considered to be a systems program.
3.3.1.1 There are two contrasting ethical views on the issue of piracy, and both have
their valid points.
3.3.1.2.1.6 Some employers make it a practice to monitor employees’ activities
while at work
3.3.1.2.2.1 The majority of identity theft victims do not realize that they are victims
until it has negatively impacted their lives.
3.3.1.2.2.2 Traditional bullying is much more serious than cyberbullying.
3.3.1.2.2.4 Computer viruses currently cause hundreds of thousands of
dollars' worth of economic damage each year.
-61-
Introduction to Computers - Chapter 4
4 lxSystem Unit
In a desktop computer, most of the electronic components are housed in
an enclosure a called the lxisystem unit. These units are usually rectangular,
most are made of steel, aluminum and/or plastic. Most of them used to be
painted gray, but recently other colors have become more common. System Unit
lxii
4.1 Motherboards
A motherboard (also known as the mainboard or system board) is the
main printed circuit board (PCB) found in general purpose
microcomputers and other expandable systems.
It holds the electronic components of a system, such as the central
Motherboard
processing unit (CPU) and memory, and allows communication
between many of them. It also provides connectors for other
peripherals.
The term Motherboard specifically refers to a PCB with expansion capability. It will
typically have components attached to it. These often include peripherals, interface
cards, sound cards, video cards, network cards, hard drives, and/or other forms of
persistent storage; and a variety of other custom components.
lxiii
4.1.1 CPU: Microprocessor
A central processing unit (CPU) is electronic circuitry within a
computer that carries out the instructions of a computer program
by performing the basic arithmetic, logical, control and
input/output (I/O) operations specified by the instructions.
Principal components of a CPU include the arithmetic logic Microprocessor
unit (ALU) that performs arithmetic and logic operations,
processor registers that supply operands to the ALU and store the results of ALU
operations, and a control unit that orchestrates the fetching (from memory) and
execution of instructions by directing the coordinated operations of the ALU,
registers and other components.
Most modern CPUs are microprocessors, meaning they are contained on a single
integrated circuit (IC) chip.
4.1.1.1 Processor Size
Modern microprocessors are often described as being 8 bit, 16 bit, 32 bit or 64 bit
processors. This description is somewhat ambiguous, since it can refer to (and has
been used to refer to) either the number of lines in the data bus (how many bits
can be transferred simultaneously) or the number of bits in the address bus
(describing the potential amount of memory for the computer) or the number of
bits in one of the processor’s registers (how many bits can be processed
-63-
Introduction to Computers - Chapter 4
-64-
Introduction to Computers - Chapter 4
4.2.1.1 Addresses
Each word (or byte) in computer memory has a unique address, a number which
is used in identifying the word/byte whose content is to be read or modified. The
address has a binary representation of N, bits, making it possible to store 2N words
in the memory (where N is determined by the CPU and the address bus of the
motherboard. Values of 32 and 64 are common in more recent microcomputers),
4.3 Instruction and Machine Cycles
An instruction cycle (sometimes called a fetch–decode–execute cycle) is the basic
process of computer function. It is the process by which a computer retrieves a program
instruction from its memory, determines what actions the instruction dictates, and carries
out those actions. This cycle is repeated continuously by a computer's central processing
unit (CPU), from boot-up to power down
Different CPU’s can have different cycles based on different instruction sets, but they
will all be generally similar to the following:
Fetch the instruction: The instruction code is retrieved from the memory address
that is currently stored in a program counter (PC), and copied into an instruction
register (IR). At the end of the fetch operation, the PC will be updated to contain the
address of the next instruction that will be read at the next cycle.
Decode the instruction: The instruction whose code is in the IR (instruction register)
is identified.
Obtain necessary data: In case the instruction requires data stored in memory, the
address of that data is computed and the data is copied from memory into
register(s) in the CPU.
Execute the instruction (Based on the type of instruction the Program Counter
may be updated to a different address from which the next instruction will be
fetched.)
Store any resulting values
The cycle is then repeated.
-65-
Introduction to Computers - Chapter 4
4.4 Cache
Cache memory is random access memory (RAM) that a computer microprocessor can
access more quickly than it can access regular RAM. This memory can be integrated
directly with the CPU chip or placed on a separate chip that has a separate bus
interconnect with the CPU. Cache memory is fast but expensive. Traditionally, it is
categorized in "levels" that describe its closeness and accessibility to the microprocessor:
Level 1 (L1) cache is extremely fast but relatively small, and is usually embedded in
the processor chip (CPU).
Level 2 (L2) cache is often bigger than L1; it may be located on the CPU or on a
separate chip or coprocessor but with a high-speed alternative bus connecting the
cache to the CPU, so as not to be slowed by traffic on the main system bus.
Level 3 (L3) cache is typically specialized memory that works to improve the
performance of L1 and L2. It can be significantly slower than L1 or L2, but is usually
twice the speed of regular RAM. In the case of multicore processors, each core may
have its own dedicated L1 and L2 cache, but share a common L3 cache. When an
instruction is referenced in the L3 cache, it is typically elevated to a higher tier cache.
4.5 ROM and other Types of Memory
There are two distinct types of memory: Random Access Memory (RAM) and Read Only
Memory (ROM)
Data items can be read from both RAM and ROM, but can only be written to locations
in RAM.
ROM is implemented using nonvolatile types of memory (The contents do not
change when the computer is powered down and then later restarted.) RAM,
on the other hand, is normally associated with volatile types of memory.
(When the computer is turned off the contents of volatile memory are erased.)
Most home or office computers include magnetic disk drives and have only a minimal
program in ROM (known as the BIOS in IBM-compatible computers) which will
load the operating system from the disk into RAM when the computer is started.
The operating system runs from RAM rather than ROM because instructions in
the operating system are executed very frequently and ROM access is slower than
RAM access
This arrangement also allows an operating system to be upgraded relatively easily.
There are, in fact several different types of RAM, some of which are much faster than
others (and more expensive and use more power and generate more heat.) These are
the kinds of RAM used for cache memory.
-66-
Introduction to Computers - Chapter 4
4.5.1 CMOS
lxv
CMOS (complementary metal-oxide-semiconductor)
is a type of integrated circuit that requires very little
power, It can store data and execute simple instructions
(keeping track of time passing, system time and date, etc)
without draining a battery providing the power it needs
to operate. CMOS Battery
CMOS has been used on motherboards to store the BIOS
instructions. For this function, it is being replaced by the technology used for SSD-
flash drives.
4.6 Data Representation
The primary function of a computer is information processing. (This INCLUDES
numerical computation, but also involves much more.)
In order for a computer to be able to process information, the information must be
represented in a form that the computer can deal with.
For many reasons, computer designers have come to use binary (two state) equipment
to store representations of data.
Among the reasons are the following:
Binary devices are relatively cheap to manufacture
Distinguishing between two states is less error prone than distinguishing between
more than two states.
4.6.1 Character Codes
We expect our computers to process text data, and so it is necessary that
representations of characters (letters, digits, punctuation symbols, etc.) must be stored
in computer memory.
4.6.1.1 ASCII
One of the earliest (and still one of the most commonly used) systems for doing
this is ASCII (American Standard Code for Information Interchange.)
ASCII is a character encoding standard. ASCII codes are used to represent text in
computers, telecommunications equipment, and other devices.
Originally based on the English alphabet, ASCII encodes 128 specified
characters into seven-bit integers. The characters encoded are digits 0 to 9
(represented by the codes 48-57), lowercase letters a to z (represented by the
codes 97-122), uppercase letters A to Z (represented by codes 65-92), basic
punctuation symbols, the space symbol and several control codes that
originated with Teletype machines.
-67-
Introduction to Computers - Chapter 4
Since the ASCII codes use 7 bits, each character can be (and almost always is)
represented as content of an 8 bit byte
The extra bit is sometimes used to extend the ASCII system to represent
more symbols/characters, but not in a uniformly accepted way. It is more
often used for error checking.
4.6.1.2 Unicode
Many languages use symbols/characters that are not included in the ASCII coding
system.
The Unicode system was developed in an effort to allow speakers of these
languages access to computers.
Unicode is a computing industry standard for the consistent encoding,
representation, and handling of text expressed in most of the world's writing
systems.
The latest version of Unicode contains a repertoire of more than 128,000
characters covering 135 modern and historic scripts, as well as multiple
symbol sets.
4.6.1.3 EBCDIC
IBM had difficulty adjusting their many card punch machines to accommodate
ASCII coding, and so developed their own coding system which they called
extended binary coded decimal interchange code (EBCDIC) which was more
compatible with their existing hardware. EBCDIC is an eight-bit character
encoding, and was created to extend the existing Binary-Coded Decimal (BCD)
Interchange Code, or BCDIC.
EBCDIC was announced with the release of the IBM System 360. When the
system 360 became wildly successful, so did EBCDIC. Now all IBM mainframe
and midrange peripherals and operating systems use EBCDIC as their inherent
encoding
4.7 Adapter cards:
An adapter card (expansion card, expansion board, or accessory card) is a printed
circuit board that can be inserted into an electrical connector, or expansion slot on a
computer motherboard to add functionality to a computer system via the expansion bus.
4.7.1 Expansion bus:
An expansion bus is a computer bus which moves information between the internal
hardware components of a computer system (including the CPU and RAM) and
peripheral devices. It is a collection of wires and protocols that allows for the
expansion of a computer
-68-
Introduction to Computers - Chapter 4
4.8 Bay:
A system unit will normally have open spaces built in where equipment such as disk
drives can be installed.
These open spaces are called bays, or often drive bays.
A drive bay is a standard-sized area where hardware can be added to a computer.
Over the years since the introduction of the IBM PC, it and its compatibles have
had many form factors of drive bays. Four form factors are in common use today,
the 5.25", 3.5", 2.5" or 1.8" drive bays. These names do not refer to the width of
the bay itself, but rather to the sizes of the disks used by the drives mounted in
these bays
Drive bays are most commonly used for the installation of disk drives, although they
can also be used for front-end USB ports, I/O bays, card readers, fans, fan controllers,
RAID controllers, tool storage, and many other things.
4.9 Connectors and Ports
lxvi
In computer hardware, a port serves as an interface between the computer and other
devices.
In computer terms, a port usually refers to the female
part of connection.
Computer ports have many applications. They can
be used to connect computers to monitors, Example of unit with Several Ports
webcams, speakers, and other peripheral devices
Physically, a computer port is a specialized outlet on a piece of equipment to which
a plug or cable connects.
Electronically, the several conductors where the port and cable contacts connect,
provide a method to transfer signals between devices
4.9.1 USB Ports
A USB port is a standard connection interface for personal computers and consumer
electronics devices.
USB stands for Universal Serial Bus, an industry standard for short-distance
digital data communications.
USB ports allow USB devices to be connected to each other with and to transfer
digital data over USB cables.
They can also supply electric power across the cable to devices that need it.
-69-
Introduction to Computers - Chapter 4
4.11.1 Completion
4. In a desktop computer, most of the electronic components are housed in an
enclosure a called the ______unit
4.1 A(n) ________ is the main printed circuit board (PCB) found in general
purpose microcomputers and other expandable systems
4.1.1 Most modern CPUs are _________ meaning they are contained on a single
integrated circuit (IC) chip.
4.2 Each word in computer memory has a unique_______, a number which is used
in identifying the cell to read or modify its contents
4..4 ______memory, is random access memory (RAM) that a computer
microprocessor can access more quickly than it can access regular RAM
-70-
Introduction to Computers - Chapter 4
4.5.1 _______is the term usually used to describe the small amount of memory on a
computer motherboard that stores the BIOS settings. Some of these BIOS
settings include the system time and date as well as hardware settings
4.6.1.16 One of the earliest (and still one of the most commonly used) systems for
storing representations of characters in computer memory is______
4.6.1.2 ________is a computing industry standard for the consistent encoding,
representation, and handling of text expressed in most of the world's writing
systems
4.7.1 An expansion bus is a computer bus which moves information between the
internal hardware of a computer system (including the CPU and RAM) and
peripheral devices. It is a collection of wires and _______ that allows for the
expansion of a computer
4.8 A system unit will normally have open spaces built in where equipment such as
disk drives can be installed. These open spaces are called _______
4.9 In computer hardware, a(n) _______ serves as an interface between the
computer and other computers or peripheral devices.
4.9.1 A USB port is a standard cable connection interface for personal computers
and consumer electronics devices. USB stands for Universal Serial_______, an
industry standard for short-distance digital data communications
4.11.2 Multiple Choice
4 In a desktop computer, most of the electronic components are housed in an
enclosure a called the ________.
a) motherboard
b) cache
c) system unit
d) all of the above
e) none of the above
4.1 A _________ is the main printed circuit board found in general purpose
microcomputers and other expandable systems.
a) motherboard
b) mainboard
c) system board
d) any of the above
e) none of the above
4.1 The term Motherboard specifically refers to a(n) _________with expansion
capability
a) PCB
b) CPU
c) ALU
-71-
Introduction to Computers - Chapter 4
d) RAM
e) none of the above
4.1.1 A(n) _________ is the electronic circuitry within a computer that carries out
the instructions of a computer program by performing the basic arithmetic,
logical, control and input/output (I/O) operations specified by the instructions.
a) PCB
b) CPU
c) ALU
d) RAM
e) none of the above
4.1.1.2 One might describe the speed of a microprocessor as a number of ______
a) Hertz
b) MIPS
c) FLOPS
d) any of the above
e) none of the above
4.1.1.3 ________ is a CPU design strategy based on the idea that with a larger,
more complex instruction set, programs can be written using fewer instructions,
and thus run faster.
a) FLOPS
b) ROM
c) RISC
d) CISC
e) none of the above
4.1.1.3 ________is a CPU design strategy based on the insight that a simplified
instruction set can provide higher performance. The simplified instruction set
allows the CPU to be optimized to execute these instructions more efficiently
a) FLOPS
b) ROM
c) RISC
d) CISC
e) none of the above
4.2.1.1 Each cell in computer memory has a unique _______, a number which is
used in identifying the cell to read or modify its contents
a) ID
b) address
c) locater
d) site
e) none of the above
4.3 An instruction cycle (sometimes called a fetch–decode–execute cycle) is the
basic operational process of a computer. It is the process by which a computer
-72-
Introduction to Computers - Chapter 4
retrieves a program instruction from its memory, determines what actions the
instruction dictates, and carries out those actions. This cycle is repeated
continuously by a computer's _________, from boot-up to when the computer is
shut down.
a) ALU
b) Ports
c) motherboard
d) CPU
e) none of the above
4.4 Cache memory is _______
a) fast but expensive
b) fast and cheap
c) slow and expensive
d) slow and cheap
e) none of the above
4.5 The computer____________, locations in ROM
a) cannot read information from, and cannot write to
b) cannot read information from, but can write to
c) can read information from, but cannot write to
d) can read information from, and can write to
e) none of the above
4.5.1 ________ is the term usually used to describe the small amount of memory
on a computer motherboard that stores the BIOS settings. Some of these BIOS
settings include the system time and date as well as hardware settings.
a) Cache
b) CMOS
c) ASCII
d) HDMI
e) none of the above
4.6 The primary function of a computer is ________ processing.
a) information
b) numerical
c) binary
d) ASCII
e) none of the above
4.7 An ________ is a printed circuit board that can be inserted into an electrical
connector, or expansion slot on a computer motherboard to add functionality to
a computer system via the expansion bus.
a) adapter card
b) expansion card
c) accessory card
-73-
Introduction to Computers - Chapter 4
-74-
Introduction to Computers – Chapter 5
5 Input
In computing, an input device is a peripheral (piece of computer hardware equipment) used
to produce/provide data and control signals for transfer into a computer.
Examples of input devices include keyboards, mice, touchscreens, touchpads, scanners,
digital cameras and joysticks.
5.1 Keyboards
In computing, a lxviicomputer keyboard is a typewriter-style
device which uses an arrangement of buttons or keys to act as
electronic switches.
A keyboard typically has characters engraved or printed on the
keys and each press of a key typically corresponds to a single
written symbol.
Keyboard
While most keyboard keys produce letters, numbers or signs
(characters), other keys or simultaneous key presses can produce actions or execute
computer commands.
Despite the development of alternative input devices, such as the mouse, touchscreen,
pen devices, character recognition and voice recognition, the keyboard remains the most
commonly used device for direct (human) input of alphanumeric data into computers.
In normal usage, the keyboard is used as a text entry interface to type text and numbers
into a word processor, text editor or other programs.
In a modern computer, the interpretation of key presses is generally left to the
software.
A computer keyboard distinguishes each physical key from every other and reports
all key presses to the controlling software.
Keyboards are also used for computer gaming, either with regular keyboards or by using
keyboards with special gaming features.
A keyboard can also be used to give commands to the operating system of a computer,
such as Windows' Control-Alt-Delete combination, which brings up a task window
or shuts down the machine.
Before the development of GUI’s (graphical user interfaces) users communicated with
their computers’ operating systems by typing commands with their keyboards. The
commands would be interpreted and executed by a command line interface
A command-line interface is a type of user interface operated entirely through a
keyboard, or another device doing the job of a keyboard.
-75-
Introduction to Computers – Chapter 5
-76-
Introduction to Computers – Chapter 5
For connection with the computer the keyboards use a USB cable, and
operating system support goes as far back as Windows 2000.
5.1.1.4 On-Screen Keyboards
Software keyboards, or on-screen keyboards, often take the form of computer
programs that display an image of a keyboard on the screen. Another input device
such as a mouse or a touchscreen can be used to operate each virtual key to enter
text.
Software keyboards have become very popular in touchscreen enabled cell
phones, since hardware keyboards cost more and occupy more physical space.
5.1.1.5 Projection Keyboards
Projection keyboards project an image of keys, usually with a laser, onto a flat
surface. The device then uses a camera or infrared sensor to "watch" where the
user's fingers move, and will count a key as being pressed when it "sees" the user's
finger touch the projected image.
Projection keyboards can simulate a full-size keyboard from a very small
projector.
Because the "keys" are simply projected images, they cannot be felt when
pressed.
Users of projected keyboards often experience increased discomfort in their
fingertips because of the lack of "give" when typing.
A flat, non-reflective surface is also required for the keys to be projected.
Most projection keyboards are made for use with PDAs and smartphones
because their small size prohibits inclusion of physical keyboards.
5.1.2 Keyboard Layouts
There are a number of different arrangements of alphabetic, numeric, and punctuation
symbols on keys.
These different keyboard layouts arise mainly because different people want
easier access to different symbols, either because they are entering text in different
languages, or because they need a specialized layout for mathematics, accounting,
computer programming, or other purposes.
The United States keyboard layout is used as default in the currently most popular
PC operating systems: Windows, Mac OS X and Linux.
5.1.2.1 QWERTY Keyboard
The common QWERTY-based layout was designed early in the era of
mechanical typewriters, and its ergonomics were compromised to allow for the
mechanical limitations of the typewriter.
-77-
Introduction to Computers – Chapter 5
As the letter-keys were attached to levers that needed to move freely, inventor
Christopher Sholes developed the QWERTY layout to reduce the likelihood
of jamming.
With the advent of computers, lever jams are no longer an issue, but
nevertheless, QWERTY layouts were adopted for electronic keyboards
because they were widely used.
Alternative layouts such as the Dvorak Simplified Keyboard are not in
widespread use
5.1.2.2 Dvorak Simplified Keyboard
The lxixDvorak Simplified Keyboard is a
keyboard layout patented in 1936 by Dr. August
Dvorak and his brother-in-law, Dr. William
Dealey.
Dvorak proponents claim the layout requires Dvorak Layout
less finger motion and that its use results in fewer errors than the standard
QWERTY layout. Its proponents also claim that the reduction in finger distance
traveled permits faster rates of typing while also reducing repetitive strain injuries
5.1.2.3 Layouts for languages other than English
The QWERTZ layout is widely used in Germany and much of Central Europe.
The main difference between QWERTZ and QWERTY is that Y and Z are
swapped, and most special characters such as brackets are replaced by diacritical
characters.
Another situation takes place with other "national" layouts. Keyboards designed
for typing in Spanish have some characters shifted, to release the space for
characters Ñ and ñ.
Similarly, those for Portuguese, French and other European languages may have
a special key for the characters Ç and ç.
The AZERTY layout is used in France, Belgium and some neighboring countries.
It differs from the QWERTY layout in that the A and Q are swapped, the Z and
W are swapped, and the M is moved from the right of N to the right of L (where
colon/semicolon is on a US keyboard). The digits 0 to 9 are on the same keys, but
to be typed the shift key must be pressed. The unshifted positions are used for
accented characters.
Keyboards in many parts of Asia may have special keys to switch between the
Latin character set and a completely different typing system. Japanese layout
keyboards can be switched between various Japanese input methods and the Latin
alphabet by signaling the operating system's input interpreter of the change, and
some operating systems (namely the Windows family) interpret the character "\"
-78-
Introduction to Computers – Chapter 5
as "¥" for display purposes without changing the bytecode which has led some
keyboard makers to mark "\" as "¥" or both.
In the Arab world, keyboards can often be switched between Arabic and Latin
characters.
In bilingual regions of Canada and in the French-speaking province of Québec,
keyboards can often be switched between an English and a French-language
keyboard; while both keyboards share the same QWERTY alphabetic layout, the
French-language keyboard enables the user to type accented vowels such as "é"
or "à" with a single keystroke.
Using keyboards for more than one language leads to a conflict: the image on the
key does not necessarily correspond to the character produced on the screen. In
such cases, each new language may require an additional label on the keys,
because the standard keyboard layouts do not share even similar characters of
different languages
5.2 Scanners
An image scanner—usually abbreviated to just scanner—is a device that optically scans
images and converts them to digital representations of the images. There are various
kinds of scanners. Among them are:
lxx
flatbed scanners where the document is placed on a glass window for scanning.
lxxi
Hand-held scanners, where the scanning device is moved by hand
lxxii
3D scanners that are often used for industrial design, reverse engineering, test and
measurement, gaming and other applications.
lxxiii
Document scanners are scanners designed specifically to process collections of
loose leaf papers, usually just for text. These scanners generally have document
feeders, usually larger than those sometimes found on copiers or all-purpose
scanners. The main function of document scanners is to capture the images of
scanned documents or text and save these images digitally to picture or PDF
formats. With the advancement of scanning technology, most document
scanners can distinguish variations in color. Those with built-in optical
character recognition (OCR) software are able to convert images into
editable text.
Scans on document scanners are made at high speed, perhaps 20 to 150 pages
per minute, often in grayscale, although many document scanners do support
color.
Many document scanners can scan both sides of double-sided originals (duplex
operation). Sophisticated document scanners have firmware or software that
cleans up scans of text as they are produced, eliminating accidental marks and
sharpening type; this would be unacceptable for photographic work, where
-79-
Introduction to Computers – Chapter 5
marks cannot reliably be distinguished from desired fine detail. Files created are
compressed as they are made. The resolution used is usually from 150 to 300
dpi, although the hardware may be capable of somewhat higher resolution; this
produces images of text good enough to read and for optical character
recognition, without the higher demands on storage space required by higher-
resolution images.
Optical character recognition (OCR) is the conversion of images of typed,
handwritten or printed text into machine-encoded text, whether from a
scanned document, a photo of a document, a scene-photo (for example the
text on signs and billboards in a landscape photo) or from subtitle text
superimposed on an image (for example from a television broadcast). It is
widely used as a form of information entry from printed paper data records,
whether passport documents, invoices, bank statements, computerized
receipts, business cards, mail, printouts of static-data, or any suitable
documentation. It is a common method of digitizing printed texts so that they
can be electronically edited, searched, stored more compactly, displayed on-
line, and used in machine processes
Color scanners that typically read RGB (red-green-blue color) data.
This data is processed with some proprietary algorithm to correct for different
exposure conditions, and sent to the computer via the device's input/output
interface (usually USB).
Color depth (the number of bits that a scanner uses to represent colors in its images)
varies depending on the scanner, but is usually at least 24 bits. High quality models
have 36-48 bits of color depth.
Another parameter used for describing the capabilities of scanners is resolution,
measured in pixels per inch (ppi)
As of 2009, a high-end flatbed scanner could scan up to 5400 ppi and drum
scanners had an optical resolution of between 3,000 and 24,000 ppi.
-80-
Introduction to Computers – Chapter 5
-81-
Introduction to Computers – Chapter 5
At times, a mouse can reach an edge of its working area while the operator still wishes
to move the screen pointer farther. With a trackball, the operator just continues
rolling, whereas a mouse would have to be lifted and re-positioned.
Because trackballs for personal computers are stationary, they may require less space
for operation than a mouse, and may be easier to use in confined or cluttered areas.
They are often preferred in laboratory settings for this reason.
Many people with a mobility impairment use trackballs as an assistive technology
input device.
Access to an alternative pointing device has become even more important for
these people with the dominance of graphically-oriented operating systems.
Trackball users often state that they are not limited to using the device on a flat desk
surface. Trackballs can be used while browsing a laptop in bed, or can be used
remotely from an armchair to a PC playing a movie. They are also useful for
computing on boats or other unstable platforms where a rolling deck could produce
undesirable input
5.3.3 Joystick
A joystick is a lever that moves in all directions and controls
the movement of the pointer/cursor. A joystick works very
much like a mouse, except that with a mouse the cursor stops
moving as soon as you stop moving the mouse, but with a
joystick, the pointer continues moving in the direction the
joystick is pointing. To stop the pointer, you must return the
joystick to its upright position.
Most joysticks include two buttons called triggers. Joystick
Joysticks are used mostly for computer games (the idea
is to emulate an aircraft flight control system), but they are also used occasionally
for CAD/CAM systems and other applications.
Joysticks are also used for controlling machines such as cranes, trucks, underwater
unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius
lawn mowers.
5.3.4 Touchscreen
A touch screen is a computer display screen that is also an input device. The screens
are sensitive to pressure;
a user interacts with the computer by touching pictures or words on the screen.
There are three types of touch screen technology:
Resistive: A resistive touch screen panel is coated with a thin metallic electrically
conductive and resistive layer that causes a change in the electrical current which
is registered as a touch event and sent to the controller for processing. Resistive
touch screen panels are generally more affordable but offer only 75% clarity and
-82-
Introduction to Computers – Chapter 5
the layer can be damaged by sharp objects. Resistive touch screen panels are not
affected by outside elements such as dust or water.
Surface wave: Surface wave technology uses ultrasonic waves that pass over the
touch screen panel. When the panel is touched, a portion of the wave is absorbed.
This change in the ultrasonic waves registers the position of the touch event and
sends this information to the controller for processing. Surface wave touch screen
panels are the most advanced of the three types, but they can be damaged by
outside elements.
Capacitive: A capacitive touch screen panel is coated with a material that stores
electrical charges. When the panel is touched, a small amount of charge is drawn
to the point of contact. Circuits located at each corner of the panel measure the
charge and send the information to the controller for processing. Capacitive touch
screen panels must be touched with a finger unlike resistive and surface wave
panels that can use fingers and stylus. Capacitive touch screens are not affected
by outside elements and have high clarity.
5.3.5 Graphics Tablet
A lxxvigraphic tablet (also known as a digitizer, drawing
tablet, digital drawing tablet, pen tablet, or digital art
board) is a computer input device that enables a user to
hand-draw images, animations and graphics, with a special
pen-like stylus, similar to the way a person draws images
with a pencil and paper.
graphics tablet
These tablets may also be used to capture data or
handwritten signatures.
They can also be used to trace images from pieces of paper taped or otherwise
secured to a tablet surface.
Capturing data in this way, by tracing or entering the corners of linear poly-
lines or shapes, is called digitizing.
The device consists of a flat surface upon which the user may "draw" or trace an
image using the attached stylus, a pen-like drawing apparatus. The image is displayed
on the computer monitor, though some graphic tablets now also incorporate an LCD
screen for a more realistic or natural experience and usability.
Some tablets are intended as a replacement for the computer mouse as the primary
pointing and navigation device for desktop computers.
5.3.6 Touchpad
A touchpad or trackpad is a pointing device featuring a specialized surface that can
sense the position (and movement) of the user’s fingers touching it, and translate their
motion and position to a relative position to be displayed on the screen.
-83-
Introduction to Computers – Chapter 5
Touchpads are a common feature of laptop computers, and are also used as a
substitute for a mouse where desk space is scarce.
5.4 Questions
5.4.1 Completion
5. Examples of ______ devices include keyboards, mouse, scanners, digital cameras
and joysticks
5. In computing, an input device is a(n) ________ (piece of computer hardware
equipment) used to provide data and control signals into a computer
5.1 In computing, a computer keyboard is a(n) _________-style device which
uses an arrangement of buttons or keys to act as electronic switches
5.1 In normal usage, the keyboard is used as a(n) ______entry interface
5.1.1.3 ______keyboards are a junction between normal type and laptop type
keyboards
5.1.1.3 The vast majority of flexible keyboards in the market are made from
_________
5.1.1.5 ________keyboards display an image of keys, usually with a laser, onto a
flat surface. The device then uses a camera or infrared sensor to "watch" where
the user's fingers move, and will count a key as being pressed when it "sees" the
user's finger touch the projected image
5.1.2.1 The common _______-based layout was designed early in the era of
mechanical typewriters, so its ergonomics were compromised to allow for the
mechanical limitations of the typewriter
5.1.2.2 Proponents of the _______ keyboard claim the layout requires less finger
motion and reduces errors compared to the standard layout
5.2 An image _______ is a device that optically scans images and converts them to
digital representations of the images
5.3.5 Capturing data with a graphics tablet, by tracing or entering the corners of
linear poly-lines or shapes, is called ______
-84-
Introduction to Computers – Chapter 5
-85-
Introduction to Computers – Chapter 5
c) AZERTY
d) QWERTY
e) none of the above
5.1.2.3 The ________ keyboard layout is used in France, Belgium and some
neighboring countries
a) QWERTZ
b) DVORAK
c) AZERTY
d) QWERTY
e) none of the above
5.2 An image scanner—usually abbreviated to just scanner—is a device that
optically scans images and converts them to digital representations of the
images. There are various kinds of scanners. Among them are:
________scanners where the document is placed on a glass window for
scanning
a) flatbed
b) window
c) document
d) industrial
e) none of the above
5.2 An image scanner—usually abbreviated to just scanner—is a device that
optically scans images and converts them to digital representations of the
images. There are various kinds of scanners. Among them are:
________ scanners that are often used for industrial design, reverse engineering,
test and measurement, gaming and other applications
a) flatbed
b) window
c) document
d) industrial
e) none of the above
5.3 A ______device is an input interface that allows a user to input spatial data to a
computer by controlling the position of a cursor on the computer display
a) cursor
b) spatial
c) pointing
d) all of the above
e) none of the above
5.3.1The most common pointing device is the _______
a) touchscreen
b) mouse
c) touchpad
-86-
Introduction to Computers – Chapter 5
d) trackball
e) none of the above
5.3.1 The optical mouse _______
a) is cheaper than a mechanical mouse and responds more slowly
b) is cheaper than a mechanical mouse and responds more quickly
c) is more expensive than a mechanical mouse and responds more slowly
d) is more expensive than a mechanical mouse and responds more quickly
e) none of the above
5.3.2 A _______ is a pointing device consisting of a ball held by a socket
containing sensors to detect a rotation of the ball about two axes
a) touchscreen
b) mouse
c) touchpad
d) trackball
e) none of the above
5.3.4 A _______ touch screen panel is coated with a thin metallic electrically
conductive and resistive layer that causes a change in the electrical current
which is registered as a touch event
a) resistive
b) surface wave
c) capacitive
d) all of the above
e) none of the above
5.3.4 A ________ touch screen panel is coated with a material that stores electrical
charges. When the panel is touched, a small amount of charge is drawn to the
point of contact. Circuits located at each corner of the panel measure the charge
and send the information to the controller for processing
a) resistive
b) surface wave
c) capacitive
d) all of the above
e) none of the above
5.3.6 ________ are a common feature of laptop computers, and are also used as a
substitute for a mouse where desk space is scarce
a) Touchscreens
b) Touchpads
c) Joysticks
d) all of the above
e) none of the above
-87-
Introduction to Computers – Chapter 5
5.4.3 True-False
5.1 A keyboard typically has characters engraved or printed on the keys and each
press of a key typically corresponds to a single written symbol
5.1 Despite the development of alternative input devices, such as the mouse,
touchscreen, pen devices, character recognition and voice recognition, the
keyboard remains the most commonly used device for direct (human) input of
alphanumeric data into computers
5.1.1.1 The IEEE has established a standard computer keyboard design that all
manufacturers conform to.
5.1.1.2 Keyboards on laptops and notebook computers usually have a shorter travel
distance for the keystroke, shorter over travel distance, but always have the same
set of keys
5.2 There are a number of different arrangements of alphabetic, numeric, and
punctuation symbols on keys of computer keyboards
5.2 Document scanners produce very high resolution images.
5..3.3 Most joysticks include buttons called triggers
5.3.4 Resistive touch screen panels are not affected by outside elements such as
dust or water
5.3.4 Capacitive touch screens are not affected by outside elements and have high
clarity
5.3.6 Touchpads are a quite expensive and are found only on high end laptop
computers.
-88-
Introduction to Computers – Chapter 6
6 Output
After a computer executed a program, has processed some data, it will probably be desirable
for the computer to produce some kind of tangible effect in the outside world; for it to
produce some kind of output.
Users normally want to have some indication of what the computer is doing or has
done.
Computers have come to be able to produce a number of different kinds of output. Some
of the general classes of computer output include text, graphics, tactile, audio, and video.
Text consists of characters that are used to create words, sentences, and paragraphs.
Graphics are digital representations of nontext information such as drawings, charts,
photographs, and animation.
Tactile output such as raised line drawings may be useful for some individuals who
are blind.
Audio is music, speech, or any other sound.
Video consists of images played back at speeds to provide the appearance of full
motion
The great majority of the output produced by computers can be divided into two
classes: output that users can see and output that users can hear
6.1 Visual Output
The kinds of computer output that people can see can be subdivided again, into two
different classes. We describe these as hard copy and soft copy
Output resulting in reasonably permanent visual effects (often ink) on a physical
medium (usually paper) is described as hard copy
Output resulting in temporary visual effects, effects that disappear as soon as the
computer moves on to computation of some other task, is described as soft copy.
6.1.1 Visual Devices: Soft Copy
The most common computer output device is the computer monitor (or computer
screen.) The term monitor [also referred to as a video display terminal (VDT) and
video display unit (VDU) ] refers to a display screen for video images, (and the
case that holds it.)
Monitors create a visual display for you to view from processed data.
They come in a variety of screen sizes and visual resolutions.
There are two common types of modern computer monitors, cathode ray tube
(CRT) and flat panel screens. More recently organic light-emitting diode (OLED)
has started becoming popular as well.
-89-
Introduction to Computers – Chapter 6
-90-
Introduction to Computers – Chapter 6
-91-
Introduction to Computers – Chapter 6
6.1.1.4 Projectors
lxxx
A projector or image projector is an optical device that
projects an image (or moving images) onto a surface (often
a projection screen.)
The computer sends the image data to its video card,
which then sends the video image to the projector. Acer Projector
-92-
Introduction to Computers – Chapter 6
-93-
Introduction to Computers – Chapter 6
Inkjet printers tend to be lower priced than laser printers, especially color laser
printers, and are the type of printer most commonly found in homes and small
offices.
Storage of inkjet documents can problematical, depending on the quality of the
inks and paper used.
If low-quality paper is used, it can yellow and degrade due to residual acid in
the untreated pulp;
in the worst case, old prints can literally crumble into small particles
when handled.
Of course, this is a property of the paper, not the printer, and would be
true for any kind of printer.
High-quality inkjet prints on acid-free paper can last as long as typewritten or
handwritten documents on the same paper.
The ink used in many low-cost consumer inkjets is water-soluble, so care
must be taken with inkjet-printed documents to avoid contact with moisture,
which can cause severe "blurring" or "running".
In extreme cases, even sweaty fingertips during hot humid weather could
cause low-quality inks to smear.
Similarly, water-based highlighter markers can blur inkjet-printed
documents, and can also discolor the highlighter's tip.
Many inkjet printers now use pigment based inks which are highly water
resistant: or, in some cases, only the black ink is pigment-based.
Resin or silicone protected photopaper is widely available at low cost,
introducing complete water and mechanical rub resistance for dye and
pigment inks.
The photopaper itself must be designed for pigment or for dye inks, as
pigment particles are too large to be able to penetrate through dye-only
photopaper protection layer.
lxxxi
6.1.2.2 Laser Printers
Laser printing is an electrostatic digital
printing process. It produces high-quality text
and graphics (but only moderate-quality
photographs) by passing a laser beam back and
forth over a charged cylinder (called a "drum")
to create an electrostatic representation of the
desired image.
-94-
Introduction to Computers – Chapter 6
The drum then attracts electrically charged powdered ink (called toner), and
transfers the image to paper. The paper is then heated in order to fuse the ink onto
the paper.
Laser printing differs from other printing technologies in that each page is always
rendered in a single continuous process without any pausing in the middle. Other
technologies, like inkjet, can pause every few lines. A laser printer needs enough
memory to hold the bitmap image of an entire page.
Memory requirements increase with the square of the dots per inch.
During the 1980s, memory chips were still very expensive, which is why, at
that time, entry-level laser printers came with four-digit retail prices. Later,
memory prices plunged, and 1200 dpi printers have been widely available in
the consumer market since 2008.
Laser printers that print on plastic sheets, are also available.
6.1.2.3 Dot Matrix Printers
lxxxii
Dot matrix printing or impact matrix
printing is a kind of computer printing that uses
a print head that pushes wires against an ink-
soaked cloth ribbon to make dots on the paper.
Dot Matrix
Letters are drawn out of a dot matrix, and varied
fonts, as well as arbitrary graphics can be produced.
Each dot is produced by a tiny metal rod, also called a "wire" or "pin", which is
extruded from the print head by the power of a tiny electromagnet or solenoid.
In the 1970s and 1980s, dot matrix impact printers were generally considered the
best combination of expense and versatility, and until the 1990s they were by far
the most common form of printer used with personal and home computers. They
are not, however, very quiet.
Dot matrix printers are still preferred where fan fold paper is desired and/or where
there is a requirement for multiple copies (since non-impact printers do not
support carbon copies.)
6.1.2.4 Other Kinds of Printers
6.1.2.4.1 Virtual Printers
A virtual printer is a piece of computer software that acts like a printer
driver, but which is not connected with a physical computer printer.
Instead, a virtual printer can be used to create a file which is an image
of the data which would be printed. These files can be used for archival
purposes or as input to another program (in format of a PDF file, for
example) or to transmit to another system or user.
-95-
Introduction to Computers – Chapter 6
6.1.2.4.2 3D Printers
A 3D printer is a device for making a three-dimensional object from a
3D model or other electronic data source. 3D printers place layers of
material (including plastics, metals, food, cement, wood, and other
materials) one over another under computer control. They work in much
the same way that an inkjet printer deposits layers of ink on paper.
6.1.2.4.3 Solid ink printers
Solid ink printers (also known as phase-change printers) are a type of
thermal transfer printer. They use solid sticks of colored ink, similar in
consistency to candle wax. These sticks are melted and fed into a print-
head. The printhead sprays the ink on a rotating, oil coated drum. The
paper then passes over the print drum and the image is transferred to the
page.
Solid ink printers are most commonly used as color printers in offices.
They are excellent at printing on transparencies and other non-porous
media. Solid ink printers can produce excellent results. Their acquisition
and operating costs are similar to laser printers.
Drawbacks of the technology include high energy consumption and
long warm-up times. Also, some users complain that the resulting prints
are difficult to write on, because the wax tends to repel inks. This type
of printer is only available from one manufacturer, Xerox, manufactured
as part of their Xerox Phaser office printer line.
6.1.2.4.4 Dye-sublimation printers
A dye-sublimation printer (or dye-sub printer) is a printer which
employs a printing process that uses heat to transfer dye to a medium
such as a plastic card, paper or canvas. The process is usually to lay one
color at a time using a ribbon that has color panels.
Dye-sub printers are intended primarily for high-quality color
applications, including color photography; and are less well-suited for
text. Dye-sublimation printers are now increasingly used as dedicated
consumer photo printers.
-96-
Introduction to Computers – Chapter 6
-97-
Introduction to Computers – Chapter 6
Some plotters used roll-fed paper, and therefore had minimal restriction on the
size of the output in one dimension. These plotters were capable of producing
quite sizable drawings.
6.1.3 Visual Output - Fonts
A great deal of computer generated information is displayed as text, whether on a
monitor (referred to as soft copy, because it very quickly disappears, leaving no
permanent record) or on paper, printed by a printer (referred to as hard copy because
there is a physical record of what was printed.)
Text can be printed in various sizes and styles/fonts
Technically, the term “font” refers to a combination of three things: font-face,
font-style and font-size, but the word is frequently used to mean just font-face.
6.1.3.1 Font-Face
The font-face (typeface) is the general appearance of the characters, ie. What they
look like, how they are shaped.
There are two general classifications of fonts: serif and san-serif. A serif is a small
line attached to the end of a stroke in a letter or symbol A typeface with serifs is
called a serif typeface (or serifed typeface). A typeface without serifs is called
sans serif or sans-serif. There is considerable debate as to which type of font face
is easier to read. There are studies to support both sides of the issue.
One of the most common serif fonts is named Times-New-Roman
0123456789abcdxyzABCDXYZ
A commonly used san-serif font is named Ariel
0123456789abcdxyzABCDXYZ
6.1.3.2 Font-Style
The term “font-style” refers to whether a font is printed/displayed using any of a
few properties (each of which can be used in combination with any, or all, of the
others):
Bold
Italicized
Underlined
6.1.3.3 Font-Size
The font size (or text size) is the overall size (generally height) of a font shown
on a screen or printed on a page.
A font is typically measured in points (pt).
-98-
Introduction to Computers – Chapter 6
-99-
Introduction to Computers – Chapter 6
6.3 Questions
6.3.1 Completion
6. After a computer executed a program, has processed some data, it will probably
be desirable for the computer to produce some kind of tangible effect in the
outside world; for it to produce some kind of _______
6.1.1 A(n) _________ creates a visual display for you to view from processed data
6.1.1.2.2 A(n) _______display consists of two glass plates separated by a thin gap
filled with a gas such as neon
6.1.1.3 A(n) ______ is a light-emitting diode (LED) in which the emissive
electroluminescent layer is a film of organic compound that emits light in
response to an electric current.
6.1.1.3 Flexible OLED’s are often used in ________ devices
6.1.1.4 Most projectors create an image by shining a light through a small
transparent lens, but some newer types of projectors can project the image
directly, by using _______
6.1.2.2 _______printing differs from other printing technologies in that each page is
always rendered in a single continuous process without any pausing in the
middle, while other technologies like inkjet can pause every few lines.
6.1.2.4.1 A(n) ______ printer is a piece of computer software whose user interface
and API resembles that of a printer driver, but which is not connected with a
physical computer printer. It can be used to create a file which is an image of the
data which would be printed, for archival purposes or as input to another
program
6.1.2.4.5 _______printers are widely used in cash registers, ATMs, gasoline
dispensers and some older inexpensive fax machines.
6.1.2.4.7 Pen-based ______were an alternate printing technology once common in
engineering and architectural firms
6.1.3.1 A(n) ______is a small line attached to the end of a stroke in a letter or
symbol
6.1.3.3 There are approximately ___________ points in one inch
6.2 _________are designed to allow a single user to listen to an audio source
privately, in contrast to a speaker, which emits sound into the open air, for
anyone nearby to hear
-100-
Introduction to Computers – Chapter 6
-101-
Introduction to Computers – Chapter 6
b) inkjet
c) inkdot
d) spraydot
e) none of the above
6.1.2.2 ________ printing differs from other printing technologies in that each page
is always rendered in a single continuous process without any pausing in the
middle, while other technologies can pause every few lines
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.3 ________ printing is a type of computer printing which uses a print head
that prints by impact, striking an ink-soaked cloth ribbon against the paper
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.3 In the 1970s and 1980s, __________ printers were generally considered the
best combination of expense and versatility, and until the 1990s they were by far
the most common form of printer used with personal and home computers
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.4.3 ________ printers are most commonly used as color office printers, and
are excellent at printing on transparencies and other non-porous media
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.3.3 The font size (or text size) is the overall size (generally height) of a font
shown on a screen or printed on a page. A font is typically measured in:
a) pt
b) px
c) pc
-102-
Introduction to Computers – Chapter 6
d) em
e) none of the above
6.1.3.3 The font size (or text size) is the overall size (generally height) of a font
shown on a screen or printed on a page. ___ is a font measure convenient for
defining sizes of individual characters relative to characters around them:
a) pt
b) px
c) pc
d) em
e) none of the above
6.1.2.4.4 _________ printers are now increasingly used as dedicated consumer
photo printers
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.4.5 _________ printers are widely used in cash registers, ATMs, gasoline
dispensers and some older inexpensive fax machines
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.4.6 These printers were also referred to as letter-quality printers because they
could produce text which was as clear and crisp as a typewriter.
a) dye-sub
b) daisy-wheel
c) dot-matrix
d) thermal
e) none of the above
6.3.3 True-False
6.1.1.2.2 Very large displays generally use plasma display technology
6.1.1.2.2 CRT screens are usually back-lit to make them easier to read in bright
environments.
6.1.1.2.2 Liquid crystal displays are lightweight, compact, portable and cheap and
they are also more reliable than CRTs.
6.1.1.4 The newest handheld projectors produce images that are easy to see, even
when there is ambient light.
-103-
Introduction to Computers – Chapter 6
-104-
Introduction to Computers – Chapter 7
7 Storage
Computer data storage, often called storage or memory, is a technology consisting of
computer components and recording media used to retain digital data. It is a core function
and fundamental component of computers.
In practice, almost all computers use a storage hierarchy, which puts fast but expensive (and
small) storage options close to the CPU and slower but larger and cheaper options farther
away.
Generally, the fast but volatile technologies (which lose data when off power) are
referred to as "memory", while slower persistent technologies are referred to as
"storage"; or “secondary storage”.
Secondary storage (also known as external memory or auxiliary storage), also differs
from primary storage in that it is not directly accessible by the CPU.
The computer usually uses its input/output channels to access secondary storage and
transfers the desired data into and out of intermediate areas (buffers) in primary
storage (memory/RAM).
Secondary storage does not lose the data when the device is powered down—it is
non-volatile.
It is typically also two orders of magnitude less expensive than primary storage
(memory/RAM).
Modern computer systems typically have two orders of magnitude more secondary
storage than primary storage.
In modern computers, hard disk drives are by far the most common form of secondary
storage. Some other examples of secondary storage technologies are optical disk
drives, flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape,
paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.
7.1 Hard disk drives
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage
lxxxv
device used for storing and retrieving digital information using one
or more rigid ("hard") rapidly rotating disks (called platters) coated
with magnetic material.
The platters are paired with magnetic heads arranged on a movable
actuator arm. These headsh read and write data to the platter Hard Disk Drive
surfaces. Data is accessed in a random-access manner. With cover removed
(meaning that individual blocks of data can be stored or retrieved in any order rather
than sequentially.)
The time taken to access a given byte of information stored on a hard disk is typically a
few milliseconds (thousandths of a second.)
-105-
Introduction to Computers – Chapter 7
By contrast, the time taken to access a given byte of information stored in random-
access memory is measured in nanoseconds (billionths of a second.) This illustrates the
significant access-time difference between solid-state memory and rotating magnetic
storage devices: hard disks are typically about a million times slower than memory.
With disk drives, once the disk read/write head reaches the proper placement and the
data of interest rotates under it, subsequent data on the track are much faster to access.
The time it takes to move the head to the proper placement is called “seek time”.
The time it takes for the desired data to rotate under the head is called “rotational
latency”
To reduce the seek time and rotational latency, data are transferred to and from disks
in large contiguous blocks.
Sequential or block access on disks is orders of magnitude faster than random
access, and many sophisticated paradigms have been developed to design efficient
algorithms based upon sequential and block access
The two most common form factors for modern HDDs are 3.5-inch, for desktop
computers, and 2.5-inch, primarily for laptops. HDDs are connected to systems by
standard interface cables such as PATA (Parallel ATA), SATA (Serial ATA), USB
or SAS (Serial attached SCSI) cables.
Introduced by IBM in 1956, HDDs became the dominant secondary storage device
for general-purpose computers by the early 1960s. Continuously improved, HDDs
have maintained this position into the modern era.
As the 1980s began, HDDs were a rare and very expensive additional feature in PCs,
but by the late 1980s their cost had been reduced to the point where they had become
standard on all but the cheapest computers.
Most HDDs in the early 1980s were sold to PC end users as an external, add-on
subsystem. The subsystem was not sold under the drive manufacturer's name but
under the subsystem manufacturer's name such as Corvus Systems and Tallgrass
Technologies, or under the PC system manufacturer's name such as the Apple
ProFile. The IBM PC/XT in 1983 included an internal 10 MB HDD, and soon
thereafter internal HDDs became much more common on personal computers.
7.1.1 RAID
Random Array of Inexpensive Disks
When relatively inexpensive, albeit smaller and, in many cases less reliable, hard
disks started to be marketed, it was recognized that by using several smaller hard
disks instead of just one large disk, one could create a system of smaller less
expensive disks with a larger capacity. Such a system could have several
advantages:
-106-
Introduction to Computers – Chapter 7
Price: It was usually possible to buy large storage capacity for less money as
a combination of smaller cheaper drives than a single high capacity drive
would cost, since the smaller drives were manufactured in large quantities,
resulting in economies of scale. The smaller drives were also more readily
available.
Reliability: With several different drives, it is possible to put duplicate data on
more than one drive. Then, if one drive were to fail, its data would not be lost.
Access Speed: With data in a large file stored on different drives, the system
can read different portions of the file from the different drives simultaneously,
resulting in faster upload times than would be possible with one single drive.
In a RAID system, data can be distributed across the drives in several different
ways, referred to as RAID levels. These levels vary according to the required level
of redundancy and performance.
The different schemes, or data distribution layouts, are named by the word
RAID followed by a number, for example RAID 0 or RAID 1.
Each scheme, or RAID level, provides a different balance among the key
goals: reliability, availability, performance, and capacity.
RAID levels greater than RAID 0 provide protection against unrecoverable
sector read errors, as well as against failures of whole physical drives
7.2 Optical Storage Devices
lxxxvi
Optical storage is the storage of data on an optically readable
medium. Data is recorded by making marks in a pattern that can be
read back using light, usually a beam of laser light, precisely focused
on a spinning optical disc.
CD/DVD Disk Drive
Rotating optical storage devices, such as CD and DVD drives,
have even longer access times than do hard disk drives.
The three most common optical media are CD, DVD and Blu-ray. CDs store about
300,000 pages of text or roughly 700 MB. DVDs are commonly used for movies and
hold around 4.7 GB of memory. Blu-ray has five times the storage of DVD and is
used for high-definition (HD) movies. On a single-layer disc, Blu-ray can hold 25GB
of data, and a dual-layer disc can hold 9 hours of an HD movie or about 50GB of
data.
Optical discs can be used to backup relatively small volumes of data, but backing up
of entire hard drives, which as of 2015 typically contain many hundreds of gigabytes
or even multiple terabytes, is less practical. Large backups are often instead made on
external hard drives, since their price has dropped to a level making this viable; in
professional environments. Magnetic tape drives are also used.
-107-
Introduction to Computers – Chapter 7
Floppy disks, initially as 8-inch (200 mm) media and later in 5¼-inch (133 mm)
and 3½-inch (90 mm) sizes, were a very widely used form of data storage and
exchange from the mid-1970s into the late 2000s.
-108-
Introduction to Computers – Chapter 7
-109-
Introduction to Computers – Chapter 7
complex machines, organized into data processing systems, used punched cards for
data input, output, and storage.
Herman Hollerith invented the recording of data on a medium that could then be read
by a machine. (Prior uses of machine readable media had been for control, not data).
After some initial trials with paper tape, he settled on punched cards, developing
punched card data processing technology for the 1890 US census, and forming a
company that was later to become (a major part of) what would become known as
IBM.
Punched card technology developed into a powerful tool for business data-
processing. By 1950 punched cards had become ubiquitous in industry and
government.
Most early digital computers used punched cards as the primary medium for input of
both computer programs and data These were often prepared using specialized
keypunch machines
7.4.5 Zip Drive
xcii
The Zip drive is a removable floppy disk storage system
that was introduced by Iomega in late 1994. At the time of its
release it was a medium-to-high-capacity device.
Originally, Zip disks launched with capacities of 100 MB, but
later versions increased this to first 250 MB and then
Zip Drive
750 MB.
The format became the most popular of the “superfloppy” products which filled
a niche in the portable storage market in the late 1990s.
However, it was never popular enough to replace the 3.5-inch floppy disk. Later
versions of the disc matched the capacity available on rewritable CDs but this was
later far surpassed by rewritable DVDs
Zip drives fell out of favor for mass portable storage during the early 2000s
7.5 Cloud Storage
Some organizations have begun renting storage to subscribers.
Referred to as “cloud storage” or “storage in the cloud”
Cloud storage is a model of data storage in which the digital data is stored in
logical pools. The physical storage spans multiple servers (and often locations),
and the physical environment is typically owned and managed by a hosting
company.
These cloud storage providers are responsible for keeping the data available
and accessible, and the physical environment protected and running.
-110-
Introduction to Computers – Chapter 7
People and organizations buy or lease storage capacity from the providers to
store user, organization, or application data.
Cloud storage services may be accessed through a co-located cloud computer
service, a web service application programming interface (API) or by
applications that utilize the API.
7.6 Questions
7.6.1 Completion
7.0 Computer data storage, often called storage or memory, is a technology
consisting of computer components and recording media used to retain
_______data
7.0 In practice, almost all computers use a storage______, which puts fast but
expensive (and small) storage options close to the CPU and slower but larger
and cheaper options farther away.
7.0 ________storage does not lose the data when the device is powered down—it is
non-volatile
7.1 A hard disk drive is a data storage device used for storing and retrieving
digital information using one or more rigid ("hard") rapidly rotating disks
(platters) coated with ________ material
7.2 With _____ storage, data is recorded by making marks in a pattern that can be
read back with the aid of light, usually a beam of laser light
7.2 The three most common optical media are CD, DVD and______
7.3 A flash drive is a data storage device that includes flash memory with an
integrated _______ interface
7.4.1 ________disks, initially as 8-inch (200 mm) media and later in 5¼-inch
(133 mm) and 3½-inch (90 mm) sizes, were a very widely used form of data
storage and exchange from the mid-1970s into the late 2000s
7.4.3 Paper tape was widely used during much of the twentieth century for
___________communication
7.4.5 The Zip drive is a medium-to-high-capacity (at the time of its release)
removable floppy disk storage system that was introduced by _______ in late
1994.
7.4.5 The ______drive is a medium-to-high-capacity (at the time of its release)
removable floppy disk storage system that was introduced by Iomega in late 1994
-111-
Introduction to Computers – Chapter 7
7.5 Some organizations have begun offering to rent storage to subscribers. This is
referred to as “_______storage”
7.6.2 Multiple Choice
7.0 Modern computer systems typically have________
a) two orders of magnitude more secondary storage than primary storage but
data are kept for a longer time in primary storage
b) two orders of magnitude more secondary storage than primary storage and
data are kept for a longer time in secondary storage
c) two orders of magnitude more primary storage than secondary storage and
data are kept for a longer time in primary storage
d) two orders of magnitude more primary storage than secondary storage but
data are kept for a longer time in secondary storage
e) none of the above
7.1 The time taken to access a given byte of information stored on a hard disk is
typically a few thousandths of a second, or ________
a) nanoseconds
b) microseconds
c) milliseconds
d) picoseconds
e) none of the above
7.1 The most common form factor for modern HDDs in desktop computers is
_______ inches
a) 8
b) 5.25
c) 3.5
d) 2.5
e) none of the above
7.1 The most common form factor for modern HDDs in laptop computers is
_______ inches
a) 8
b) 5.25
c) 3.5
d) 2.5
e)
7.1.1 A RAID system can provide the advantage of:
a) lower price
b) greater reliability
c) faster upload speed
-112-
Introduction to Computers – Chapter 7
-113-
Introduction to Computers – Chapter 7
7.4.2 Magnetic tape remains a viable alternative to disk in some situations due to
a) lower cost per bit
b) faster data access
c) greater storage density
d) all of the above
e) none of the above
7.4.2 _________ have/has historically offered enough advantage in cost over disk
storage to make it a viable product, particularly for backup, where media
removability is necessary
a) Punched cards
b) Punched paper tape
c) Magnetic tape
d) all of the above
e) none of the above
7.4.3 It was common to find a selection of _______ containing useful programs in
most minicomputer installations
a) Punched cards
b) Punched paper tape
c) Magnetic tape
d) all of the above
e) none of the above
7.4.5 The _______ format became the most popular of the superfloppy products
which filled a niche in the late 1990s portable storage market
a) CD
b) cloud
c) ZIP
d) RAID
e) none of the above
7.6.3 True-False
7. In practice, almost all computers use a storage hierarchy, which puts fast but
expensive (and small) storage options close to the CPU and larger and more
expensive options farther away
7. Generally, the fast but volatile technologies (which lose data when off power) are
referred to as "memory", while slower persistent technologies are referred to as
"storage"
7.1 Hard disks are typically about a million times faster than memory
7.1 Most HDDs in the early 1980s were sold to PC end users as an external, add-on
subsystem
-114-
Introduction to Computers – Chapter 7
7.1.1. In a RAID system, data can be distributed across the drives in one of several
ways, referred to as RAID levels
7.3 USB flash drives are immune to electromagnetic interference (unlike floppy
disks), and are unharmed by surface scratches (unlike CDs).
7.4.4 By 1950 punched cards had been replaced by magnetic tape throughout
almost all industry and government
-115-
Introduction to Computers – Chapter 8
-117-
Introduction to Computers – Chapter 8
-118-
Introduction to Computers – Chapter 8
The public use of the Internet, and the World Wide Web in particular, began
to explode in the early 1990’s. This was sparked primarily by the 1993 release
of “Mosaic”, the first widely available browser with graphic capabilities.
Mosaic was developed by a team lead by Marc Andreeson working at the
University of Illinois.
Later Andreeson and his team formed a company which produced and
marketed the browser Netscape Navigator (1994).
In 1995, Microsoft released its browser, Internet Explorer. Explorer
(mostly by virtue of being free) quickly became the most widely used
browser in the world (attaining a 95% usage share in 2002.)
Explorer’s usage share has since declined, with the launch of Firefox
(2004) and Google Chrome (2008), as well as with the growing
popularity of operating systems (such as OS X, Linux, iOS and
Android) that do not support Internet Explorer
8.1.3.1.1 Difference between Internet and WWW
WWW is so widely and commonly used that many people fail to understand
that there is more to the Internet and that WWW is, in fact, only one of many
services provided by the Internet.
8.1.3.1.2 WWW and Hypertext concept
Hypertext is the underlying concept defining the structure of the World Wide
Web.
Hypertext is text displayed on a computer display or other electronic
devices which contains references (hyperlinks) to other Web elements,
either on the same or on a different Web page, which the reader can
immediately access. The hypertext pages are interconnected by these
hyperlinks which are typically activated by a mouse click, keypress
sequence or by touching the screen.
In addition to text, hypertext is also used to implement links to tables,
images, videos, sounds (music) and other content forms.
WWW pages are often written in the Hypertext Markup Language (HTML)
which enables an easy-to-use and flexible connection and sharing of
information over the Internet
8.1.3.1.3 Web Servers
The function of a web server is to store and deliver web pages to clients.
-119-
Introduction to Computers – Chapter 8
The communication between client and server takes place using the
Hypertext Transfer Protocol (HTTP).
Pages delivered are most frequently HTML documents, which may include
images, style sheets and scripts in addition to text content.
Many web servers also support server-side scripting using Active Server
Pages (ASP), PHP, or other scripting languages. Usually, this function is
used to generate HTML documents dynamically ("on-the-fly”) and
frequently to access data in a database.
8.1.3.2 Internet Services: E-Mail
Electronic mail, (most commonly called email or e-mail), is a method of
exchanging digital messages from a sender to one or more recipients. Email was
the first service implemented on the Internet
Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. The senders and
receivers are not required to be online simultaneously. They connect by means
of a mail server. The senders’ messages are stored on the mail server until the
receivers log on to download them.
Electronic mail predates the inception of the Internet and was in fact a
crucial tool in creating it.
The history of modern, global Internet email services reaches back to the
early ARPANET.
Standards for encoding email messages were proposed as early as 1973.
It costs very little to send an email message, and many have taken advantage of
this to send numerous unsolicited messages, often advertising products or
promoting get rich quick schemes. Such unsolicited email is often referred to as
“spam”.
8.1.3.3 Internet Services: FTP
Although e-mail is convenient for direct communications between users, it
quickly became obvious that a different system was needed for transferring larger
data files (such as computer programs, graphic images, audio files, …)
The File Transfer Protocol (FTP) is a standard network protocol used to transfer
computer files from one host to another host over a TCP-based network (such as
the Internet.)
-120-
Introduction to Computers – Chapter 8
-121-
Introduction to Computers – Chapter 8
-122-
Introduction to Computers – Chapter 8
Critics of publicly editable wiki systems argue that these systems could be easily
tampered with, while proponents argue that the community of users can catch
malicious content and correct it quickly.
8.4 Blogs
A blog (a truncation of the expression weblog) is a discussion or informational site
published on the World Wide Web and consisting of entries ("posts") typically displayed
in reverse chronological order (the most recent post appears first). The term
“blogosphere” is commonly used to refer to the collection of all blogs together as a
connected community.
Until 2009, blogs were usually the work of single individuals, and often covered single
subjects.
More recently "multi-author blogs" (MAB’s) have developed These typically have posts
written by large numbers of authors but are professionally edited.
The emergence and growth of blogs in the late 1990s coincided with the advent of web
publishing tools that facilitated the posting of content by non-technical users. Before
this, creating and posting on a blog required some sophistication on the use of the
Internet, and most blogs tended to emphasize technical and computer oriented themes.
A majority of blogs are interactive, allowing visitors to leave comments and even
message each other on the blogs. In this sense, blogging can be seen as a form of social
networking service.
Many bloggers report some sort of income from their blogs, most often in the form of
ad revenue, but paid speaking engagements are also common.
8.5 Podcasts and Webcasts
A podcast is a form of digital media that consists of a series of audio or digital radio
episodes, subscribed to and downloaded through web syndication or streamed online to
a computer or mobile device. The word is made by combining "pod" and "broadcast.
A webcast is a media presentation distributed over the Internet using streaming media
technology to distribute a single content source to many simultaneous listeners/viewers.
A webcast may either be distributed live or on demand. Essentially, webcasting is
“broadcasting” over the Internet
Webcasting differs from podcasting in that webcasting refers to live streaming while
podcasting simply refers to media files being made available on the Internet
8.6 Surfing the Web
Viewing a web page on the World Wide Web normally begins either by typing the URL
of the page into a web browser, or by following a hyperlink to that page or resource. The
web browser then initiates a series of background communication messages to fetch and
display the requested page.
-123-
Introduction to Computers – Chapter 8
In the 1990s, using a browser to view web pages—and to move from one web page to
another through hyperlinks—came to be known as 'web surfing'
8.7 Using Search Engines
Since there are millions (billions?) of Web pages, nobody could possibly remember the
URL’s of all of them. For this reason, (and probably other reasons as well) programs
known as search engines were developed to help users find documents that they might
be interested in.
Search engines are programs that search for documents using specified keywords. They
return lists of the documents where these keywords were found.
The term search engine really refers to a general class of programs, but, the term is
often used to specifically describe systems like Google, Bing and Yahoo! Search.
Systems that enable users to search for documents on the World Wide Web
8.8 Social Networking
A social networking service (also social networking site or SNS) is a platform to build
social networks or social relations among people who share similar interests, activities,
backgrounds or real-life connections.
Social network sites are web-based services that allow individuals to create a public
profile, create a list of users with whom to share connections, and view and cross the
connections within the system.
Most social network services are web-based and provide means for users to interact
over the Internet.
Social network sites are varied and they incorporate new information and
communication tools such as mobile connectivity, photo/video/sharing and
blogging.
Online community services are sometimes considered a social network service,
(though in a somewhat broader sense) the term social network service usually
refers to an individual-centered service whereas online community services are
group-centered.
Social networking sites allow users to share ideas, pictures, posts, activities, events, and
interests with people in their network.
The main types of social networking services are those that contain category places (such
as former school year or classmates), means to connect with friends (usually with self-
description pages), and a recommendation system linked to trust.
Popular connection methods now combine many of these, with American-based
services such as Facebook, Google+, LinkedIn, Instagram, Reddit, Pinterest, Vine,
Tumblr, and Twitter widely used worldwide.
There are others outside of the US: Nexopia in Canada; Badoo, Bebo, Vkontakte
(Russia), Delphi, Draugiem.lv (Latvia), iWiW (Hungary), Nasza-Klasa (Poland),
-124-
Introduction to Computers – Chapter 8
-125-
Introduction to Computers – Chapter 8
-126-
Introduction to Computers – Chapter 8
TCP is the protocol used by major Internet applications such as the World Wide
Web, email, remote administration and file transfer.
The User Datagram Protocol (UDP) is another widely used protocol of the
internet.
UDP also provides delivery of a stream of packets between applications running on
hosts communication over an IP network. The UDP packets, however, are not error
checked. UDP is used for applications such as Internet telephony in which the time
of arrival is important, and the loss or miscommunication of occasional packet can
be tolerated.
8.9.6 Local Area Networks
As personal computers have become cheaper and easier to use, it is increasingly
common for a family to have several computers in their home. These computers, then,
are often connected to each other to facilitate intercommunication.
Such a group of interconnected computing devices forms what we call a local
area network (LAN.)
Connecting the devices in a LAN allows the users to transfer information from one
computer to another easily. It also allows them to share access to resources, such as
printers and internet access devices.
In addition to computers and printers, LAN’s often include such devices as
routers, modems and gateways.
Devices in a LAN will typically communicate by means of either a physical
medium (typically twisted pair cable) or radio waves (WIFI)
8.9.6.1 Intranet
The TCI/IP protocols can also be used for private local networks. Such networks
are called intranets. Intranets can be connected to the Internet or can be completely
isolated.
An intranet's websites and software applications look and act just like any others.
8.9.6.2 Extranet
If an intranet is connected to the Internet, its websites and software are typically
protected by a firewall and are inaccessible from outside. When a company allows
access to any part of its intranet (for example, some parts might be accessible to
customers or suppliers outside the company) it is called an extranet.
-127-
Introduction to Computers – Chapter 8
xciii
8.9.6.3 Twisted Pair
Twisted pair cabling is a type of wiring in which two
conductors of a single circuit are twisted together for the
purposes of canceling out electromagnetic interference
(EMI).
It was invented by Alexander Graham Bell.
8.9.6.4 WIFI Twisted Pair Cable
Wi-Fi (or WiFi) is a local area wireless computer
networking technology that allows electronic devices to connect to the network,
mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM
radio bands.
Many devices can use Wi-Fi, e.g. personal computers, video-game consoles,
smartphones, digital cameras, tablet computers and digital audio players. These
can use wireless technology to connect to other network resources such as
printers, modems, routers, access points and/or gateways.
8.10 Social Issues
Since the Internet is used in so many ways and by so many people, it has come to have
important social effects.
New norms for Internet communications (netiquette) have had to be developed.
Information and communications systems have become targets for attempted theft
and/or damage and this requires users to take special means to protect their systems.
8.10.1 Netiquette/Ethics3
The term “netiquette” is used to refer to online etiquette over networks, such as online
communities, forums, and even online learning environments.
Following the rules of netiquette improves the readability of your messages, lays the
groundwork for making trustworthy connections and helps other people to better
understand you
Here are a few guidelines to help you follow proper netiquette:
• Stay on topic. While discussion is encouraged, rambling conversations aren’t
conducive to a quality experience.
• Use appropriate subject lines in your replies. As a conversation evolves,
it’s helpful to change the subject line of a threaded message to reflect the
changing topic. For example, if the subject line reads "Participation
requirements" and the conversation evolves into a discussion on attendance,
3
This section was copied from the University of Phoenix Web Site
-128-
Introduction to Computers – Chapter 8
changing the subject line to “Attendance” in your reply would help others
interested in the topic to join the conversation.
• Avoid ''I agree'' and ''Me, too!'' messages. Spending time reading messages
without substance can be frustrating for all parties.
• Avoid posting messages using all caps. (IT'S LIKE SHOUTING!) It’s OK
to use all caps occasionally to emphasize a point, but you should only
capitalize the individual words you want to highlight, not the entire sentence
or paragraph.
• Avoid writing errors, even when "talking" with one another. Even though
messages posted in the Main newsgroup are conversational and often
informal; one should avoid posting messages with grammatical, spelling and
typographical errors. Post intelligible messages despite the informality of the
environment.
• Carefully choose the format for your messages. Long paragraphs are
difficult for other people to follow on-screen. In general, try to limit each
paragraph to five to seven lines and avoid using font styles, colors and sizes
that are difficult to read. Please also avoid using stationery because it takes
longer to download.
• Be friendly. Remember that even though you can’t see the person you’re
connecting with online, you’re still connecting with someone. Before posting
a comment, ask yourself “Would I say this to a person face to face?” If the
answer is “no,” don’t post it.
• Avoid responding when emotions are running high. If you’re angry about
something someone has posted, don’t reply to their message until you’ve had
a chance to calm down. Remember, your posted messages can be seen by
everyone, even potential employers.
• Before posting anyone’s picture on any social networking site, get the
person’s permission. Give your friends, family members and co-workers the
opportunity to control their digital self.
8.10.1.1 Abbreviations and Acronyms
Abbreviations and acronyms are commonly used in online communications to
quickly express words and phrases that we use in everyday conversation.
Abbreviations and acronyms that are frequently used online include:
• BTW: By the way
• FYI: For your information
• IMO: In my opinion
• IMHO: In my humble opinion
• IMNSHO: In my not-so-humble opinion
-129-
Introduction to Computers – Chapter 8
-130-
Introduction to Computers – Chapter 8
Networks include not only the Internet and private data networks, but also
Bluetooth, Wi-Fi and other wireless networks which are, in many cases, very
public and easy to hack.
Computer security covers all the processes and mechanisms by which digital
equipment, information and services are protected from unintended or unauthorized
access, change or destruction and the process of applying security measures to ensure
confidentiality, integrity, and availability of data both in transit and at rest.
8.10.2.1 Safe Surfing
The advancement and proliferation of technology has altered our lives in many
ways.
Certain technologies, such as the Internet and email, have dramatically enhanced
our ability to communicate and conduct business.
However, they also have their drawbacks.
Perhaps most alarming is that these technologies have made us vulnerable to a
new realm of criminal activity.
The anonymity of the Internet, as well as the ability to search out victims
quickly and effectively, has created incredible challenges for parents,
educators and law enforcement who are on the front lines attempting to deter
predators.
8.10.2.2 Malware
Malware, short for malicious software, is any software used to disrupt computer
operations, gather sensitive information, or gain access to private computer
systems.
Malware is defined by its malicious intent, acting against the requirements of the
computer user.
It does not include software that causes unintentional harm due to some
deficiency.
The term badware is sometimes used, and applied to, both true (malicious)
malware and unintentionally harmful software.
Malware may be stealthy, intended to steal information or spy on computer users
for an extended period without their knowledge, or it may be designed to cause
harm, often as sabotage, or to extort payment.
'Malware' is an umbrella term used to refer to a variety of forms of hostile or
intrusive software, including computer viruses, worms, Trojan horses,
ransomware, spyware, adware, scareware, and other malicious programs. It can
take the form of executable code, scripts, active content, and other software It is
often disguised as, or embedded in, non-malicious files. As of 2011 the majority
of active malware threats have been worms or Trojans rather than viruses.
-131-
Introduction to Computers – Chapter 8
4
A backdoor is a method, often secret, of bypassing normal authentication. Backdoors are often used
for securing remote access to a computer.
-132-
Introduction to Computers – Chapter 8
-133-
Introduction to Computers – Chapter 8
or registration code for the software that unlocks the mode, or the purchase
and download of a separate version of the software
8.10.2.2.7 Scareware
Internet security writers use the term "scareware" to describe software
products that produce frivolous and alarming warnings or threat notices.
Usually these are for fictitious or useless commercial firewall and registry
cleaner software. The software is often packaged with a look and feel that
mimics legitimate security software in order to deceive consumers.
8.10.3 Protection of Identity
Almost 50 million people subscribed to some form of identity-theft protection in
2010.
Those services, which cost about $120 to $300 a year, promise to protect your ID
by monitoring your credit reports 24/7, scouring “black-market chat rooms” for
your personal information, removing your name from marketing lists, and filing
fraud alerts. Some throw in up to $1 million in insurance.
Many of these services come from banks, which account for more than half of the
$3.5 billion a year spent on ID-theft protection subscriptions.
In a sense, consumers who buy this protection from their banks are, in fact,
helping to foot the bill for services that financial institutions are obligated to
provide. Federal law requires that they shield their customers from losses
stemming from credit-card and bank-account fraud.
These protection plans provide questionable value, and some promoters of these
services have been charged by the Federal Trade Commission for misleading sales
practices and false claims.
This is not to say that Identity theft is not a serious problem.
In 2010 there were 8.1 million identity fraud victims (this was down 27% from
the year before.) Clearly, this constitutes a serious threat, but the number 8.1
million victims overstates the danger.
According to the U.S. Department of Justice, more than 80 percent of what
is being reported as identity theft involves fraudulent charges on existing
accounts. In most of these cases a cardholder’s liability is limited to $50 for
a lost or stolen credit card and for debit cards, liability for an unauthorized
transaction is limited to $50 if it’s reported within two business days of the
date a cardholder learns of it.
-134-
Introduction to Computers – Chapter 8
-135-
Introduction to Computers – Chapter 8
The web technology has made it easy for students all over world to get skills they
need to progress in society and enhance their life style. Students are becoming
proficient with computers and the Internet at much younger ages. It motivates
many students to acquire better thinking skills, remain well informed and grow as
responsible citizens for their countries.
The vast majority of middle and high school teachers who are involved in high-
level educational programs say the Internet has a "major impact" on their ability
to access content and resources for their teaching.
8.11 Questions
8.11.1 Completion
8.1.1 The Internet was originally developed by the US federal government, a
project of _______
8.1.1 The Internet first came into being in 1964 as an interconnection between four
_______: one at University of California Santa Barbara, one at University of
California Los Angeles, one at Stanford University and one at the University of
Utah
8.1.2 In practice, an individual will often access the Internet from his home, using
a(n) ______ to connect to a local Internet service provider (ISP)
8.1.3.1 The World Wide Web is a system of “web______” (documents and other
web resources)
8.1.3.1 WWW web pages are identified by _______’s
8.1.3.1 The public use of the Internet, and the World Wide Web in particular, began
to explode in the early 1990’s. This was sparked primarily by the 1993 release
of “_______”, the first widely available browser with graphic capabilities
8.1.3.1.2 WWW pages are often written in__________, which enables an easy-to-
use and flexible connection and sharing of information over the Internet)
8.1.3.1.2 WWW web pages are interlinked by _______ links
8.1.3.1.3 The communication between client and server takes place using the
Hypertext Transfer ________(HTTP).
8.2 The term E-commerce (also written as e-Commerce, eCommerce or
similar variations), refers to trading in products or services using
computer ________
8.2.1 ________.com is currently the largest company specializing in online
B2C business
-136-
Introduction to Computers – Chapter 8
-137-
Introduction to Computers – Chapter 8
8.1.3 The Internet has had a profound effect because it provides a number of
valuable “services” for its users. Among these services is ______
a) FTP
b) IM
c) VoIP
d) all of the above are Internet services
e) none of the above
8.1.3.1 The World Wide Web is a system of “web pages” (documents and other
web resources) which are identified by “_______” and are interlinked by
hypertext links
a) URL’s
b) VDT’s
c) widgets
d) podlets
e) none of the above
8.1.3.1 Web pages can be accessed via the Internet using a program called a “Web
_______
a) Accesser
b) Searcher
c) Browser
d) Surfer
e) none of the above
-138-
Introduction to Computers – Chapter 8
8.1.3.3 ______ is a standard network protocol used to transfer computer files from
one host to another host over a TCP-based network (such as the Internet.)
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
8.1.3.4 ______ is a type of online chat which offers real-time text transmission over
the Internet
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
8.1.3.5 _______ is a methodology for the delivery of voice communications (and
other kinds of multimedia sessions) over the Internet
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
-139-
Introduction to Computers – Chapter 8
-140-
Introduction to Computers – Chapter 8
a) HTML
b) IP
c) TCP
d) all of the above
e) none of the above
8.10.1 Following the rules of netiquette _______
a) improves the readability of your messages
b) lays the groundwork for making trustworthy connections
c) helps other people to better understand you
d) all of the above
e) none of the above
8.10.4.1 Using the Internet to ask large numbers of people for small
investments/donations to help provide capital to open a business is known as
___________.
a) kickstarting
b) crowdfunding
c) collaborating
d) all of the above
e) none of the above
8.11.3 True-False
8.1.2 The architecture of the Internet is based on the specification of the TCP/IP
protocol, and was designed to connect any two networks
8.1.2 In order to reduce expenses, most ISP’s limit their external Internet
connections to one backbone connection.
8.1.3.1 In 1995, Microsoft released its browser, Internet Explorer. Explorer (mostly
by virtue of being free) quickly became the most widely used browser in the
world
8.1.3.1.1 The Internet is one of the services provided by WWW.
8.1.3.1.2 In addition to text, hypertext is also used to implement links to tables,
images, videos, sounds (music) and other content forms
8.4 A majority of blogs are interactive
8.5 Webcasting differs from podcasting in that podcasting refers to live streaming
while webcasting simply refers to media files placed on the Internet
-141-
Index
Index
A
Abacus; 1
Accelerometer; 9, 43
Activity monitoring; 50
Address; 23, 64, 65
Address Bus; 32, 65
Addressable memory; 64
Adware; 14
AIX; 39
ALU; 22, 63
Amiga; 40
Android; 37, 41, 41, 43
Android Auto; 43
Android TV; 43
Android Wear; 43
Anti-virus; 14, 51
Antikythera mechanism; 1
Apple;7, 41, 43
Apple II; 7
Apple App Store; 42
Apple Lisa; 40
Apple Macintosh; 40
Apple Newton; 8
AppleDOS; 39
Application; 44
application programmer interface; 44
Application Software; 37, 44
Application suite; 44
Apps; 42
ASR-33; 38
Astrolabe; 1
AT&T; 39
Atari; 40
ATM; 26
Audio output device; 28
B
Babbage; 3
Backdoor; 57
Batch Processing; 37
Bell Labs; 39
BIOS; 23, 66, 67
-143-
Index
binary number; 2
binary representation; 65
Bit; 23
Bluetooth; 21, 31
Bootloader; 23
Boot up; 65
Buffer; 24
Bug; 55
Bullying; 51
Bundle; 44
Bus; 21, 32, 65
Button; 43
Byte; 23
C
C; 39
Cache; 23, 66
CAD; 44
CAE; 44
Camera; 9, 25, 27
Card reader; 37
CD; 21, 23, 24
Cell; 23
Central Processing Unit; 63
Chrome OS; 41
Chromebook; 41
Circuit board; 21
CISC; 64
Client; 11
Client server network; 10, 11
Clock Generator; 22
Clock Tick; 22
CMOS; 67
Colossus; 3
Command Line Interface; 39
Commodore; 7
Commodore Amiga; 40
Commodore PET; 7
Communication; 10
Communications Device; 21
Compiler; 44
Computer components; 21
-144-
Index
Computer Ethics; 53
Computer Literacy; 12
Computer Software; 46
Content access software; 44
Control Data Corporation; 6
CDC; 6
CDC 6600; 6
Control Unit; 22
CP/M; 39
CPU; 6, 11, 11, 22, 37, 63, 64, 65
Cray; 6
Cray I; 6
CRM; 44
CRT; 29
Cursor; 26
Cyberbullying; 49, 51
D
Dartmouth; 38
database programs;44
Data Bus; 3263
Data processing device; 11
Debugger; 44
DEC; 6
Desktop computers; 7
desktop publishing software; 44
digital-animation editors; 44
Digital Cameras; 27, 42
Digital divide; 13
Digital Equipment Corporation; 6
Digital images; 27
Digital photos; 27
Digital Research; 40
Digital watch; 10
DTSS; 38
DVD; 21, 23, 24
E
e-commerce; 4
e-mail; 4
Educational software; 44
Efficiency; 12
-145-
Index
embedded computers; 10
embedded systems; 10
End-user programs;44
ENIAC; 3
Enterprise Software; 44
Enterprise infrastructure software; 44
Entertainment Software; 44
Ethernet; 21, 31
Ethernet Port; 31
Ethical Issues; 46
Ethics; 53
Event calendars; 42
F
Facebook; 4, 13
fetch–decode–execute cycle; 65
Firewall; 14
first amendment rights; 46
Flash Drive; 21, 27
Flatbed scanner; 26
Flexible display; 29
Forensics; 14
Flip-flop; 23, 64
FLOPS; 64
G
Game consoles; 26
GEM; 40
Gesture; 9, 43, 43
Gigaflops; 64
Gigahertz; 64
GNOME; 41
Google; 4, 43
Google+; 13
Google Play Store; 42
Google search; 4
GPS; 9, 42
GPS navigation; 42
Graphical user interface; 4, 26
graphic-art software; 44
Graphic images; 27
Graphical User Interface; 40
GUI; 4, 26, 40
-146-
Index
H
Hacker; 14
Handheld projector; 30
Harassment; 51
Hard copy, 29
Hard Disk; 23
Hard Disk Drive; 21, 24, 63
HDD; 21
Headphones; 28
Helpdesk; 44
Hertz; 64
Hovering; 26
HTML editors; 44
Hybrid vehicles; 10
I
I/O; 63
IBM; 4, 5, 6, 7, 39, 66
IBM 650; 4
IBM compatible; 66
IBM Personal Computer (PC); 7
IBM Simon; 8
IC; 63
Icon; 26, 43
Identity Theft; 50
Image scanner; 26
Image projector; 30
Information worker software; 44
Inkjet printer; 30 43
Input Device; 21, 25
Instant Messaging; 4
instruction cycle; 65
instruction set; 65
Integrated circuit; 4, 4
integrated development environment; 44
Intel; 6, 41
Intel 4004; 6
Intel x86; 41
Interface card; 63
Internet; 4, 10, 13, 56
iOS; 37,
iPad; 9, 43
-147-
Index
iPod; 43
iPhone; 43
IR; 65
IT Helpdesk; 44
iWork; 44
J
Jacquard loom; 3
K
Kay, Alan; 40
KDE; 41
Kemeny; 38
Keyboard; 21, 25
Keylogger; 53
Kiosk; 26
Kurtz; 38
L
L1; 66
L2; 66
L3; 66
LAN; 10
Laptop Computers; 7
Laser printer; 30
LCD; 29
Leibnitz; 2
LED; 29
LEO; 4
LEO III; 37
LibreOffice; 44
LinkedIn; 13
Linux; 37, 41
Local area network; 10
Log files; 54
M
Mac OS; 37, 40
Mainboard; 63
Mainframe computers; 5, 6
Main memory; 64
Malware; 14
Mechanical calculators; 2
Media development software; 44
-148-
Index
Media players; 42
Megahertz; 64
Memory; 11, 21, 64
Memory cell; 23, 64
Microcomputers; 7, 65
Microphone; 9
Microprocessor; 63
Microsoft; 39
Microsoft Windows; 37, 41
Microsoft Office; 44
Midrange computer; 6
Minicomputers; 6
MIPS; 64
Mobile computers; 4
Modem; 10, 31
Monitor; 21, 29, 38
Monitoring; 50, 57
Motherboard; 21, 63, 65
Mouse; 21, 25, 26
MP3; 10
MP3 player; 10
MS-DOS; 39, 41
multimedia development software; 44
Multi Tasking System; 37
Multi User System; 38
N
Network; 10
Network card; 63
Network Interface Controller; 30
Newton; 2
NIC; 21, 30
Node; 10
Nokia 9000 Communicator; 8
Nonvolatile; 66
Notebook Computers; 7
O
OLED; 29
Online banking; 4
Online shopping; 4, 13
Open Source; 57
Operating System; 37
-149-
Index
Optical Storage; 21
Organic light-emitting diode; 29
OS; 37
Output Device; 21, 27
Outsourcing; 12
P
P2P; 11
Palm; 8
Pascal; 2
PC (personal computer); 41
PC (program counter); 65
PCB; 63
PDA; 8
PDP 8; 6
Peer to peer network; 10, 11
Peripheral; 37, 63
PERQ; 40
Persistent storage; 63
Personal Computer;7, 26, 39
Personal Digital Assistant; 8
PET; 7
Pinch; 43, 43
Piracy; 46, 48
Pirates; 46
Plagiarism; 49
Plasma display technology; 29
Platter; 21
Pointer; 26
Portable Computers; 7
Primary Storage; 21, 64
Printer; 21, 30
Privacy; 52
Processor; 11, 21
Processor size; 63
Processor speed; 64
Productivity; 12
Product engineering software; 44
Program; 11
Projector; 30
Punched card; 25, 37, 38
-150-
Index
R
RAM; 21, 23, 65, 66
Random access; 23, 65
Ransomware; 14
Register; 63
Reverse pinch; 43
Ritchie; 39
RISC; 64
ROM; 23, 66
Rotational latency; 24
Router; 10
S
Scanner; 25, 26
Scareware; 14
Screen; 29
Screen Savers; 44
Secondary Storage; 21, 24
Seek time; 24
Semiconductor memory; 4, 23, 64
Sensor; 9
Server; 11
Silicon; 23
Simulation software; 44
Single Tasking System; 37
Slide rule; 2
Slider; 43
Smart phone; 4, 9,25, 26, 41, 41, 42
Social networking; 13
Soft copy 29
Software; 37
Software Suite; 44
Software Users; 46
SOLARIS; 39
Sound card; 63
Spam; 120
Speakers; 28
Spreadsheet; 44
Spyware; 14
Stuxnet; 58
Stylus; 9, 26
SUN Microsystems; 39
-151-
Index
Supercomputer; 6, 41
Swipe; 43, 43
Switch; 43
System board; 63
System Software; 37, 44
System Unit; 63
T
Tandy Radio Shack; 7
Tablet; 25
Tablet Computer; 9, 26
Tapping; 43
Telecommuting; 12
Teletype; 38
Thompson; 39
Three Rivers Computer Corporation; 40
Tianhe-2; 6
Time Sharing System; 38
Time-slice; 38
TOP500 supercomputers; 41
Torvalds, Linus; 41
Touch gestures; 43
Touchpad; 26
Touchscreen; 9, 25, 26
Transistor; 4, 4, 23
Trojan; 14
Trojan horse; 14
TRS 80; 7
Twitter; 4, 13
Typewriter; 25
U
UNIVAC; 4
Universal Serial Bus; 32
UNIX; 37, 39, 41
USB; 21, 32
Utility Programs; 37, 44
V
VDT; 29
VDU; 29
Video cameras; 42
Video cards; 63
Video games; 28, 42, 44
-152-
Index
Virtual keyboard; 9
Virus; 14, 49, 51
Volatile; 66
Volatility; 21
W
Wearable; 29
Web browsers; 44
Wikipedia; 4
Windows; 37, 41
Wireless; 31
Word; 64
Word processor; 44
Workplace Privacy; 52
World Wide Web; 4
Worm; 14
WWW; 4
X
XENIX; 39
Xerox; 40
Xerox 8010 Information System; 40
Xerox Alto; 40
Xerox Star; 40
-153-
Introduction to Computers – Image References
10-Image References
i
Abacus: This image comes from the 12th edition of the Encyclopædia Britannica or earlier.
The copyrights for that book have expired and this image is in the public domain
ii
Pullan, J. M. (1968). The History of the Abacus. New York, NY: Frederick A. Praeger, Inc.,
Publishers. ISBN 978-0-09-089410-9. LCCN 72075113
iii
Credit: Antikythera Mechanism Research Project
iv
Astrolabe: Photo taken by Andrew Dunn Whipple Museum of the History of
Science Location Cambridge, United Kingdom Established 1944 Website, The Whipple
Museum's website. Andrew Dunn uploaded it first to the English Wikipedia on 6. Nov. 2004
and released it there under CC-BY-SA-2.0
v
Pascal’s calculator: Photographer David Monniaux / (2005) Permission is granted to copy,
distribute and/or modify this document under the terms of the GNU Free Documentation
License, Version 1.2 or any later version published by the Free Software Foundation;
vi
Leibnitz calculator: "Leibnitzrechenmaschine" by User:Kolossos - recorded by me in
de:Technische Sammlungen der Stadt Dresden (with photo permission). Licensed under CC
BY-SA 3.0 via Commons
vii
Slide Rule: ArnoldReinhold - Own work (I took this picture of an artifact in my possession
on February 3, 2006. The object itself is functional in nature, was created before 1970 and
has no copyright notice, either on front or back.) Permission is granted to copy, distribute
and/or modify this document under the terms of the GNU Free Documentation License,
Version 1.2 or any later version published by the Free Software Foundation
viii
Babbage Analytical Engine: Bruno Barral: licensed under the Creative Commons
Attribution-Share Alike 2.5 Generic license
ix
By Unknown - This file is from the collections of The National Archives (United Kingdom), catalogued
under document record FO850/234. For high quality reproductions of any item from The National
Archives collection please contact the image library.This tag does not indicate the copyright status of
the attached work. A normal copyright tag is still required. See Commons:Licensing for more
information.English | français | italiano | македонски | +/−, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=501979
x
ENIAC: US Army Photo: This image is a work of a U.S. Army soldier or employee, taken or
made as part of that person's official duties. As a work of the U.S. federal government, the
image is in the public domain
xi
UNIVAC I: This image is a work of a U.S. Army soldier or employee, taken or made as part
of that person's official duties. As a work of the U.S. federal government, the image is in the
public domain
xii
By Cushing Memorial Library and Archives, Texas A&M - Flickr: IBM Processing Machine, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=17397582
xiii
Photo from Museum of LEO Computers Society
-155-
Introduction to Computers – Image References
xiv
By Lawrence Livermore National Laboratory, Attribution,
https://commons.wikimedia.org/w/index.php?curid=1565787
xv
PDP-8: This work has been released into the public domain by its author, Alkivar at
Wikipedia
xvi
By Jitze Couperus - Flickr: Supercomputer - The Beginnings, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=19382150
xvii
Cray I: Clemens PFEIFFER: licensed under the Creative Commons Attribution-Share Alike
2.5 Generic license
xviii
Commodore PET: Rama & Musée Bolo: This work is free software licensed under the
Creative Commons Attribution-Share Alike 2.0 France license.
xix
IBM PC 5150: Rama & Musée Bolo: This work is free software licensed under the Creative
Commons Attribution-Share Alike 2.0 France license.
xx
By Blake Patterson from Alexandria, VA, USA - Newton and iPhone: ARM and ARM, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=7039806
xxi
IBM Simon: Bcos47: The copyright holder of this work, released the work into the public
domain
xxii
Palm TX: Stefano Palazzo: Permission granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version 1.2 or any
later version published by the Free Software Foundation;
xxiii
By Maurizio Pesce from Milan, Italia - OnePlus One vs LG G3 vs Apple iPhone 6 Plus vs Samsung
Galaxy Note 4, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=46026497
xxiv
Copied from Official Apple Support
xxv
Intel 80486DX CPU. Bottom view with gold plated pins ---- Photograph © Andrew Dunn, 9
November 2005. This file is licensed under the Creative Commons Attribution-Share Alike
2.0 Generic license.
xxvi
By No machine-readable author provided. Cyberdex assumed (based on copyright claims). - No
machine-readable source provided. Own work assumed (based on copyright claims)., Public Domain,
https://commons.wikimedia.org/w/index.php?curid=647267
xxvii
Hard Drive; Author: Evan-Amos; This file is licensed under the Creative Commons
Attribution-Share Alike 3.0 Unported license
xxviii
Optical Disk; Author: Ubern00b; Permission is granted to copy, distribute and/or modify
this document under the terms of the GNU Free Documentation License, Version 1.2 or any
later version
xxix
SanDisk Cruzer Micro; Author: Evan-Amos; The copyright holder of this work has released this
work into the public domain.
xxx
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xxxi
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
xxxii
Copied from /www.samsung.com/us/computing/monitors/
-156-
Introduction to Computers – Image References
xxxiii
HP LaserJet 5 printer; Author: Thiemo Schuff; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Germany license
xxxiv
Motherboard; Author: Julianprescott2604juuly; This file is licensed under the Creative
Commons Attribution-Share Alike 4.0 International license
xxxv
CPU; Author: Andrew Dunn; This file is licensed under the Creative Commons Attribution-Share
Alike 2.0 Generic license
xxxvi
CPU Block Diagram; Author: Lambtron; This file is licensed under the Creative Commons
Attribution-Share Alike 4.0 International license
xxxvii
Clock Generator; Author: Audrius Meskauskas Audriusa; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xxxviii
"Hard drive-en" by I, Surachit. Licensed under CC BY-SA 3.0 via Commons
xxxix
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xl
Punched card: Author: Arnold Reinhold; This file is licensed under the Creative Commons
Attribution-Share Alike 2.5 Generic license
xli
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
xlii
Scanner; Author: Luke Launderville; This work is licensed under the Creative Commons Attribution-
ShareAlike 3.0 License
xliii
Capacitive touchscreen of a mobile phone; Author: Medvedev; This file is licensed under the
Creative Commons Attribution 3.0 Unported license
xliv
An Internet kiosk in Hemer, Germany; Author: Asio otus; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xlv
Speakers for notebook computers; Author: Evan-Amos; this work was released into the public
domain
xlvi
Headphones; Author: Adamantios; This file is licensed under the Creative Commons Attribution-
Share Alike 3.0 Unported, 2.5 Generic, 2.0 Generic and 1.0 Generic license
xlvii
In-ear headphones; Author: Ballerinus; This file is licensed under the Creative Commons
Attribution-Share Alike 3.0 Unported license
xlviii
Flat Panel Display; Author: Freeware-flo; Permission is granted to copy, distribute and/or modify
this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
version
xlix
Projector; Author: Michael Movchin; This file is licensed under the Creative Commons Attribution-
Share Alike 3.0 Unported license
l
HP LaserJet 5 printer; Author: Thiemo Schuff; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Germany license
li
Bluetooth mobile phone headset; Author: ed g2s • talk; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
lii
Maria Toutoudaki/Stockbyte/Getty Images
liii
By Pratyeka - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=54659127
liv
By Rama & Musée Bolo - Own work, CC BY-SA 2.0 fr,
https://commons.wikimedia.org/w/index.php?curid=36769003
lv
By unknown, https://en.wikipedia.org/w/index.php?curid=1016513
-157-
Introduction to Computers – Image References
lvi
By Screenshot is taken and uploaded by Tyomitch (talk · contribs),
https://en.wikipedia.org/w/index.php?curid=2611871
lvii
GPL, https://commons.wikimedia.org/w/index.php?curid=1191127
lviii
By Developers.android.com -
https://developer.android.com/design/media/index_landing_page.png, CC BY 2.5,
https://commons.wikimedia.org/w/index.php?curid=20780279
lix
By www.apple.com, https://en.wikipedia.org/w/index.php?curid=51694141
lx
Public Domain, https://commons.wikimedia.org/w/index.php?curid=433140
lxi
Public Domain, https://commons.wikimedia.org/w/index.php?curid=433140
lxii
By Julianprescott2604juuly - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=38794746
lxiii
CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=406963
lxiv
By No machine-readable author provided. Cyberdex assumed (based on copyright claims). - No
machine-readable source provided. Own work assumed (based on copyright claims)., Public Domain,
https://commons.wikimedia.org/w/index.php?curid=647267
lxv
CMOS Battery on a Computer Motherboard. © Steve Gschmeissner / Science Photo
Library / Getty Images
lxvi
Ports on the back of an Apple Mac Mini
Evan-Amos - Own work
Public Domain
lxvii
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
lxviii
By Drawn by Mysid in CorelDRAW. - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=364930
lxix
Public Domain, https://commons.wikimedia.org/w/index.php?curid=874943
lxx
Canon CanoScan N 650U Image Scanner. This is an example of a flatbed reflective scanner
By Luke Launderville - I created this work entirely by myself., CC BY-SA 3.0,
https://en.wikipedia.org/w/index.php?curid=19637143
This image is licensed under the Creative Commons Attribution-ShareAlike 3.0 License.
lxxi
By Chris Whytehead, Chris's Acorns – CC-BY-SA-3.0, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=18033660
lxxii
By Creative Tools from Halmdstad, Sweden - CreativeTools.se - VIUscan - Laser-scanned - ZPrinter -
3D printed - Viking Belt Buckle 24, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=12419129
lxxiii
By Zuzu (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0) or GFDL
(http://www.gnu.org/copyleft/fdl.html)], via Wikimedia Commons
lxxiv
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
lxxv
By Suimasentyottohensyuushimasuyo - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=1509949
lxxvi
By Cyrotux - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=2696533
lxxvii
Copied from /www.samsung.com/us/computing/monitors/
lxxviii
By Jari Laamanen - Own work, FAL, https://commons.wikimedia.org/w/index.php?curid=1829066
-158-
Introduction to Computers – Image References
lxxix
By Septagram at English Wikipedia - Transferred from en.wikipedia to Commons by Liftarn using
CommonsHelper., Public Domain, https://commons.wikimedia.org/w/index.php?curid=12137116
lxxx
By Michael Movchin - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=21150893
lxxxi
By KDS4444 - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=47285674
lxxxii
By Fourohfour - Own work, CC BY-SA 2.5,
https://commons.wikimedia.org/w/index.php?curid=596036
lxxxiii
By Original uploaded by Pointillist (Transfered by Gavin.perch) - Original uploaded on
en.wikipedia, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=13654118
lxxxiv
By http://muzyczny.pl - http://muzyczny.pl, CC BY-SA 4.0-3.0-2.5-2.0-1.0,
https://commons.wikimedia.org/w/index.php?curid=15232513
lxxxv
This photo was taken by Evan-Amos as a part of Vanamo Media, which creates public
domain works for educational purposes
lxxxvi
By Evan-Amos - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=39729457
lxxxvii
By Original: Evan-Amos Derivative work: Beao - This file was derived from: Usb-thumb-
drive.jpg, Public Domain, https://commons.wikimedia.org/w/index.php?curid=12862548
lxxxviii
By George Chernilevsky - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=6963942
lxxxix
By Daniel P. B. Smith. - Image by Daniel P. B. Smith.;, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=7097264
xc
By TedColes - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=11736857
xci
By Arnold Reinhold - I took this picture of an artifact in my possession. The card was
created in the late 1960s or early 1970s and has no copyright notice., CC BY-SA 2.5,
https://commons.wikimedia.org/w/index.php?curid=775153
xcii
By Morn - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=30135961
xciii
By Baran Ivo - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=2964670
-159-