IT Fundamentals PDF
IT Fundamentals PDF
IT Fundamentals PDF
Evolutions of Computer
INTRODUCTION
Computers are everywhere: at work, at school, and at home. People use all types and
sizes of computers for a variety of reasons and in a range of places. While some
computers sit on top of a desk or on the floor, mobile computers and mobile devices are
small enough to carry. Mobile devices, such as many cell phones, often are classified as
computers.
Computers are a primary means of local and global communication for billions of
people. Consumers use computers to correspond with businesses, employees with
other employees and customers, students with classmates and teachers, and family
members and military personnel with friends and other family members. In addition to
sending simple notes, people use computers to share photos, drawings, documents,
calendars, journals, music, and videos. Through computers, society has instant access to
information from around the globe. Local and national news, weather reports, sports
scores, airline schedules, telephone directories, maps and directions, job listings, credit
reports, and countless forms of educational material always are accessible. From the
computer, you can make a telephone call, meet new friends, share opinions or life
stories, book flights, shop, fill prescriptions, file taxes, take a course, receive alerts, and
automate your home. At home or while on the road, people use computers to manage
IT Fundamentals
(Introduction to Computing)
Introduction 2
Evolutions of Computer
schedules and contacts, listen to voice mail messages, balance checkbooks, pay bills,
transfer funds, and buy or sell stocks. Banks place ATMs (automated teller machines) all
over the world, so that customers can deposit and withdraw funds anywhere at any
time. At the grocery store, a computer tracks purchases, calculates the amount of
money due, and often generates coupons customized to buying patterns.
For simplifying and providing a framework for discussion of the growth of computer
industry, it is customary to break it into generations of growth. Originally, the term
'generation’ was used to distinguish between varying hardware technologies. But since
1968, both hardware and software advances are considered in the generations
classification. These generations represent major advances in computing technology.
There are totally five computer generations known till date. Each generation has been
discussed in detail along with their time period and characteristics. Here, approximate
dates against each generation have been mentioned which are normally accepted.
First Generation
The period of first generation was 1946-1959.
The computers of first generation used vacuum
tubes as the basic components for memory and
circuitry for CPU (Central Processing Unit). These
tubes, like electric bulbs, produced a lot of heat
and were prone to frequent fusing of the
installations, therefore, were very expensive and
could be afforded only by very large
organizations. In this generation, mainly, batch
processing operating system were used. Punched
cards, paper tape, and magnetic tape were used
as input and output devices. Computers in this
generation used machine code as programming
language.
IT Fundamentals
(Introduction to Computing)
Introduction 3
Evolutions of Computer
Second Generation
The period of second generation was 1959-1965. In this generation, transistors were
used that were cheaper, consumed less power, more compact in size, more reliable and
faster than the first generation machines made of
vacuum tubes. In this generation, magnetic cores were
used as primary memory and magnetic tape and
magnetic disks as secondary storage devices. In this
generation, assembly language and high-level
programming languages like FORTRAN and COBOL were
used. The computers used batch processing and
multiprogramming operating system.
Third Generation
The period of third generation was 1965-1971. The
computers of third generation used integrated circuits
(IC's) in place of transistors. A single IC has many
transistors, resistors and capacitors along with the
associated circuitry. The IC was invented by Jack Kilby.
This development made computers smaller in size,
reliable and efficient. In this generation, remote
IT Fundamentals
(Introduction to Computing)
Introduction 4
Evolutions of Computer
Fourth Generation
The period of fourth generation was 1971-1980. The computers
of fourth generation used Very Large Scale Integrated (VLSI)
circuits. VLSI circuits having about 5000 transistors and other
circuit elements and their associated circuits on a single chip
made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful,
compact, reliable, and affordable. As a result, it gave rise to
personal computer (PC) revolution. In this generation, time
sharing, real time, networks and distributed operating system
were used. All the high-level languages like C, C++, DBASE etc.
were used in this generation.
IT Fundamentals
(Introduction to Computing)
Introduction 5
Evolutions of Computer
Fifth Generation
The period of fifth generation is 1980-till date. In the fifth
generation, the VLSI technology became ULSI (Ultra Large
Scale Integration) technology, resulting in the production
of microprocessor chips having ten million electronic
components. This generation is based on parallel
processing hardware and AI (Artificial Intelligence)
software. AI is an emerging branch in computer science,
which interprets means and method of making computers
think like human beings. All the high-level languages like C
and C++, Java, .Net etc. are used in this generation.
AlI includes:
Robotics
Neural networks
Game Playing
Development of expert systems to make decisions in real life situations.
Natural language understanding and generation.
DIGITAL REVOLUTION
The digital revolution is an ongoing process of social, political and economic change
brought about by digital technology, such as computer and internet. Technology driving
the digital revolution is based on digital electronics and the idea that electrical signals
can represents data, such as numbers, words, pictures and music. Without digital
electronics, computers would be huge machine. Digitization is the process of converting
text, numbers, sound, photos and video into data that can be processed by digital
devices. The digital revolution has evolved through four phases, beginning with big,
expensive, standalone computers a progressing to today’s digital world in which small,
inexpensive digital devices are everywhere.
IT Fundamentals
(Introduction to Computing)
Introduction 6
Evolutions of Computer
IT Fundamentals
(Introduction to Computing)
Introduction 7
Evolutions of Computer
During this phase of the digital revolution, personal computers were not
connected to networks, so they were essentially self-contained units that
allowed users to interact with installed software
When historians look back on the digital revolution, they are certain to identify
the Web as a major transformative influence. The Web (short for World Wide
Web) is a collection of linked documents, graphics, and sounds that can be
accessed over the Internet.
IT Fundamentals
(Introduction to Computing)
Introduction 8
Evolutions of Computer
your browser to access word processing applications that run from the
Internet, instead of software that you have installed on your local hard
disk.
IT Fundamentals
(Introduction to Computing)
Introduction 9
Evolutions of Computer
Activity # 1
STRICTLY NO ERASURE.
I. Identification: Identify the following. Write your answer on the space provided
before each number. (10 pts.)
______________________3. It is the basic component for memory and circuitry for CPU
in the first generation.
IT Fundamentals
(Introduction to Computing)
Introduction 10
Evolutions of Computer
IT Fundamentals
(Introduction to Computing)
Chapter 1 11
Computer Hardware
Chapter 1
ALL ABOUT COMPUTER
What Is a Computer?
In basic terms, computer is an electronic device that is designed to work with
Information. The term computer is derived from the Latin term ‘computare’, this means
to calculate or programmable machine. Computer cannot do anything without a
Program. It represents the decimal numbers through a string of binary digits.
Charles Babbage is called the "Grand Father" of the computer. The First mechanical
computer designed by Charles Babbage was called Analytical Engine. It uses read-only
memory in the form of punch cards.
Computer can be defined as an electronic device that performs rapid computations and
generates desired output for users based on input data and programs. Computer can
capture, store, retrieve and process data. The data may be numbers, characters, audio,
video, images etc. IT is an advanced electronic
device that takes raw data as input from the
user and processes these data under the
control of set of instructions (called program)
and gives the result (output) and saves output
for the future use. It can process both
numerical and non-numerical (arithmetic and
logical) calculations.
Computer allows users to store and process
information quickly and automatically. It is a
programmable machine that allows user to
store all sorts of information and then ‘process’
that information, or data, or carry out actions
with the information, such as calculating
numbers or organizing words.
IT Fundamentals
(Introduction to Computing)
Chapter 1 12
Computer Hardware
include text, numbers, images, audio, and video. Information conveys meaning and is
useful to people. Many daily activities either involve the use of or depend on
information from a computer. As shown in Figure 1-2, for example, computers process
several data items to print information in the form of a cash register receipt.
CHARACTERISTICS OF COMPUTER
Computer is a versatile device. It can be designed to do any kind of activity provided all
data and instructions are made available to it in digital form. The important
characteristics of computer are:
1. Speed
2. Accuracy
Computer has huge storage capability. For a personal computer, 128 MB RAM is almost
a standard today. The main memory can be upgraded further by inserting RAM chips
that are available in modules of 64 MB, 128 MB and so on. Cache memory is also
available in Pc. Cache memory is faster access memory device and hence it improves
processor’s performance.
Secondary or auxiliary storage devices are used for permanent storage. Modern
computers have enormous secondary storage capacity, e.g., a PC hard disk can store
more than 80 GB of data. Pen drives, DVDs, CD-ROMs, CD-Rs, magnetic tapes etc. are
IT Fundamentals
(Introduction to Computing)
Chapter 1 13
Computer Hardware
other secondary storage devices. A CD-ROM can store 650 MB and more of data on a
single disk. Huge storage and fast retrieval capability makes computer a very special tool
for data processing and communications.
4. Versatility
Though computers are basically designed to carry out only arithmetic operations, yet
they are capable of performing almost any task that has a series of finite logical steps
5. Fatigue-free
Computer is free from fatigue. It does not get tired of work and never loses
concentration. It can perform basic arithmetic operations with the same degree of
speed and accuracy for any extent of time continuously, with the same amount of
efficiency as the first transaction.
6. Programmable
7. Networking Capability
Categories of Computers
IT Fundamentals
(Introduction to Computing)
Chapter 1 14
Computer Hardware
similar functionality and features. For example, newer cell phones often include media
player, camera, and Web browsing capabilities. As devices converge, users need fewer
devices for the functionality that they require. When consumers replace outdated
computers and devices, they should dispose them properly.
Personal Computers
Desktop Computer
Notebook Computers
A notebook computer, also called a laptop
computer, is a portable, personal computer often
designed to fit on your lap. Notebook computers
are thin and lightweight, yet they can be as
powerful as the average desktop computer. A
netbook, which is a type of notebook computer, is
smaller, lighter, and often not as powerful as a
traditional notebook computer. Most netbooks
cost less than traditional notebook computers. An
ultra-thin is another type of notebook computer
IT Fundamentals
(Introduction to Computing)
Chapter 1 16
Computer Hardware
that is lightweight and usually less than one-inch thick. Some notebook computers have
touch screens, allowing you to interact with the device by touching the screen, usually
with the tip of a finger.
On a typical notebook computer, the keyboard is on top of the system unit, and the
monitor attaches to the system unit with hinges. These computers weigh on average
from 2.5 to more than 10 pounds (depending on configuration), which allows users to
transport the computers from place to place. Most notebook computers can operate on
batteries or a power supply or both.
Tablet PC’s
Tablet PCs are useful especially for taking notes in lectures, at meetings, conferences,
and other forums where the standard notebook computer is not practical.
Mobile Devices
Mobile devices, which are small enough to carry in a pocket, usually do not have disk
drives. Instead, these devices store programs and data permanently on special memory
inside the system unit or on small storage media such as memory cards. You often can
connect a mobile device to a personal computer to exchange information between the
computer and the mobile device.
IT Fundamentals
(Introduction to Computing)
Chapter 1 17
Computer Hardware
Some mobile devices are Internet-enabled, meaning; they can connect to the Internet
wirelessly. With an Internet-enabled device, users can chat; send e-mail and instant
messages, and access the Web. Because of their reduced size, the screens on mobile
devices are small, but usually are in color.
Popular types of mobile devices are smart phones and PDAs, e-book readers, handheld
computers, portable media players, and digital cameras.
IT Fundamentals
(Introduction to Computing)
Chapter 1 18
Computer Hardware
is becoming increasingly difficult to differentiate between the two devices. This has led
some manufacturers to refer to PDAs and smart phones simply as handhelds.
E-Book Readers
Handheld Computers
IT Fundamentals
(Introduction to Computing)
Chapter 1 19
Computer Hardware
Digital Cameras
Game Consoles
A game console is a mobile computing device designed for
single-player or multiplayer video games. Standard game
consoles use a handheld controller(s) as an input device(s);
a television screen as an output device; and hard disks,
optical discs, and/or memory cards for storage. Weighing
on average between two and nine pounds, the compact
size of game consoles makes them easy to use at home, in
the car, in a hotel, or any location that has an electrical
IT Fundamentals
(Introduction to Computing)
Chapter 1 20
Computer Hardware
outlet. Three popular models are Microsoft’s Xbox 360, Nintendo’s Wii (pronounced as
wee), and Sony’s PlayStation 3.
A handheld game console is small enough to fit in one hand, making it more portable
than the standard game console. With the handheld game console, the controls screen,
and speakers are built into the device.
Mainframe Computers
A mainframe is a large, expensive, powerful
computer that can handle hundreds or thousands of
connected users simultaneously. Mainframes store
tremendous amounts of data, instructions, and
information. Most major corporations use
mainframes for business activities. With mainframes,
enterprises are able to bill millions of customers,
prepare payroll for thousands of employees, and
manage thousands of items in inventory. One study
reported that mainframes process more than 83
percent of transactions around the world.
Mainframes also can act as servers in a network
environment. Servers and other mainframes can access data and information from a
mainframe. People also can access programs on the mainframe using terminals or
personal computers.
Supercomputers
A supercomputer is the fastest, most
powerful computer — and the most
expensive. The fastest supercomputers
are capable of processing more than one
quadrillion instructions in a single second.
With weights that exceed 100 tons, these
computers can store more than 20,000
times the data and information of an
average desktop computer. Applications
requiring complex, sophisticated
mathematical calculations use
IT Fundamentals
(Introduction to Computing)
Chapter 1 21
Computer Hardware
Embedded Computers
An embedded computer is a
special-purpose computer that
functions as a component in a
larger product. Embedded
computers are everywhere — at
home, in your car, and at work.
The following list identifies a
variety of everyday products
that contain embedded
computers.
Because embedded computers are components in larger products, they usually are
small and have limited hardware. These computers perform various functions,
depending on the requirements of the product in which they reside. Embedded
computers in printers, for example, monitor the amount of paper in the tray; check
the ink or toner level, signal if a paper jam has occurred, and so on.
IT Fundamentals
(Introduction to Computing)
Chapter 1 22
Computer Hardware
STORE
The computer accepts input. Computer input is whatever is entered or fed into a
computer system. Input can be supplied by a person (such as by using a
keyboard) or by another computer or device (such as a diskette or CD-ROM).
Some examples of input include the words and symbols in a document, numbers
for a calculation, and instructions for completing a process, pictures, and so on.
The computer performs useful operations, manipulating the data in many ways.
This manipulation is called processing. Examples of processing include
performing calculations, sorting lists of words or numbers, modifying documents
and pictures according to user instructions, and drawing graphs. A computer
processes data in the CPU.
o Process: A systematic series of actions a computer uses to
manipulate data.
The computer stores data. A computer must store data so that it is available for
processing. Most computers have more than one location for storing data (the
hard drive or C:\, and the floppy drive or A:\). The place where the computer
stores the data depends on how the data is being used. The computer put the
data in one place while it is waiting to be processed and another place when it is
not needed for immediate processing. The storage of data in the computer is
called ‘online storage’ while the storage of data on computer tapes, diskettes or
CD-ROMs is called ‘offline storage’.
IT Fundamentals
(Introduction to Computing)
Chapter 1 23
Computer Hardware
COMPONENTS OF A COMPUTER
Computer System
All of the components of a computer system can be summarized with the simple
equations.
Hardware, Software and Peopleware. The physical units of a computer system excluding
the third component), constitute its hardware. Hardware consists of mechanical,
electrical and electronic parts of the system. Sets of programmed instructions constitute
the software. Peopleware is the people element in the system.
COMPUTER SYSTEM
.
Computer System
HARDWARE
A computer, like human brain, receives data and instructions, stores them and
processes the data according to the instructions given to it. It receives data from
input devices, stores them in memory and displays them through an output
IT Fundamentals
(Introduction to Computing)
Chapter 1 24
Computer Hardware
HARDWARE
CPU PERIPHERALS
2. COMPUTER PERIPHERALS
The input/output and storage devices surround the central processing unit
(CPU). Hence, they are called the peripheral devices. They are usually the
electromechanical devices connected to the CPU that exchange data and
programs with the CPU. The users interact with the CPU through these devices.
Thus, they act as interface between users and the CPU. The interaction is difficult
because of the language barrier. The CPU uses machine language, which is
difficult for most users. The input- output (I/0) devices help in taking the
translated version of the input to the machine's memory and similarly, to render
the processed symbols into the language of the user. During the first two
decades of commercial use of computers, 110 operations were performed
mostly by punching holes on cards and paper tape with a special device. More
direct and convenient I/0 devices have been developed since then. The
peripherals connected directly to the CPU are called online devices and devices
not directly connected are called offline devices.
IT Fundamentals
(Introduction to Computing)
Chapter 1 25
Computer Hardware
These peripherals can be further divided into input devices, output devices and
secondary storage devices.
INPUT DEVICES
Input devices allow the user to input data and instructions to the computer.
There are a variety of input devices. Direct entry of data generally requires a
keyboard. Any resource required for the functioning of a process, in the course
of which it will be transformed into one or more outputs. It may also use other
devices for direct data entry like a touch sensitive screen, voice recognition
system and scanners.
o Keyboard
Keyboard is the most popular input device for direct entry of data and
instructions into computer. The standard QWERTY keyboard is used for
computer. The enhanced keyboard has 101 keys.
IT Fundamentals
(Introduction to Computing)
Chapter 1 26
Computer Hardware
Alt key – Short for Alternate, this key is like a second control key.
Arrow Keys – Most keyboards have four arrow keys that enable
you to move the cursor (or insertion point) up, down, right, or
left. Used in conjunction with the Shift or Alt keys, the arrow keys
can move the cursor more than one position at a time, but this
depends on which program is running.
Caps Lock Key – A toggle key that, when activated, causes all
alphabetic characters to be uppercase.
Ctrl key – Short for Control, this key is used in conjunction with
other keys to produce control characters. The meaning of each
control character depends on which program is running.
Esc Key – Short for Escape, this key is used to send special codes
to devices and to exit (or escape) from programs and tasks.
IT Fundamentals
(Introduction to Computing)
Chapter 1 27
Computer Hardware
o Mouse
A mouse is a small hand-held 'point and click'
device that is connected to the CPU through a
cable.
Douglas Engelbart invented mouse in 1963 at
Stanford Research Institute. Xerox Corporation's
Palo Alto Research Center enhanced its capabilities by adding analogue to
digital conversion. In the early 1970's. With the adoption of Graphical
User Interface technology, mouse became an essential input device for
computer later in the 1980's.
IT Fundamentals
(Introduction to Computing)
Chapter 1 28
Computer Hardware
IT Fundamentals
(Introduction to Computing)
Chapter 1 29
Computer Hardware
o Light Pen
Light pen consists of a stylus connected by a cable to the
computer terminal. When the stylus is brought into
contact with the screen, a dot appears there on the
screen. By moving the stylus on the screen, lines and
curves can be drawn on the screen that can be stored
and used as input.
o Trackball
Trackball was originally built into the keyboard. Running a
hand over the trackball made the cursor on the screen to
move. The cursor is used to make selection from a menu
displayed on the computer screen.
IT Fundamentals
(Introduction to Computing)
Chapter 1 30
Computer Hardware
o Joystick
Joystick is a small vertical stick attached to a trackball for
easier mechanical movements. It is used mainly in game
programs.
o Scanners
Scanners are direct-entry input devices. As the data entry
is automatic, the scanners ensure more accurate data
entry. These scanners include optical scanners and
magnetic ink character readers. The optical scanners use
light for sensing input and they include OCR, OMR and
Barcode reader.
o Barcode Reader
Barcode is a set of small bars of varying thickness and
spacing printed on the packages of products, on the
back cover pages of books, tags etc. The barcode reader
uses an optical scanner to read product code and
converts it into electrical pulses. The device is
connected to a computer and the information read is
passed to the computer in digital form for automatic bill
generation and updating of files.
o Digital Cameras
IT Fundamentals
(Introduction to Computing)
Chapter 1 31
Computer Hardware
OUTPUT DEVICES
Output device displays result of the computer processing for user. These are the
devices that allow information to be represented that is given out to the user,
such as a display screen or printer.
o Printers
Printers are purely output devices. They produce hard copy output.
Computer printers vary widely in their technologies and capabilities. They
can be classified in a number of ways. First, they can be classified into
three broad groups: character printers, line printers and page printers.
The character printers print one character at a time. Dot matrix printer
(DMP), daisy wheel printer, thermal printer and inkjet printer are the
IT Fundamentals
(Introduction to Computing)
Chapter 1 32
Computer Hardware
various types of character printers. Drum printer and chain printer are
line printers. Laser printer and magnetic printer are page printers.
They can also be classified into impact and non-impact printers based on
the basis of the printing mechanism. The impact printing technology uses
some mechanical pressure to produce images on paper. The impact
printers include dot matrix printer, daisy wheel printer and chain printer.
It is possible to take multiple copies of output with impact printers. Non-
impact printers do not use mechanical force to produce output on paper
and hence they can produce only single copy output.
Inkjet Printer
IT Fundamentals
(Introduction to Computing)
Chapter 1 33
Computer Hardware
Laser Printer
Drum Printer
Magnetic Printer
IT Fundamentals
(Introduction to Computing)
Chapter 1 34
Computer Hardware
Graphic Plotters
STORAGE DEVICES
Types of Memory:
o Random Access Memory (RAM) This means that any location in memory
may be accessed in the same amount of time as any other location.
Memory access means one of
two things, either the CPU is
reading from a memory location
or the CPU is writing to a
memory location. When the CPU
reads from a memory location,
the contents of the memory
location are copied to a CPU
register. When the CPU writes to
a memory location, the CPU
copies the contents of a CPU register to the memory location, overwriting
the previous contents of the location. The CPU cannot carry out any other
operations on memory locations.
IT Fundamentals
(Introduction to Computing)
Chapter 1 35
Computer Hardware
fails e.g. if you pull out the power lead!). There is therefore a
requirement for permanent or long term storage which is also referred to
as secondary storage or auxiliary storage. This role is fulfilled by disk and
tape storage.
• Static RAM (SRAM) The word static indicates that the memory retains
its contents as long as power is being supplied. However, data is lost
when the power gets down due to volatile nature. SRAM chips use a
matrix of 6-transistors and no capacitors. Transistors do not require
power to prevent leakage, so SRAM need not have to be refreshed on a
regular basis.
IT Fundamentals
(Introduction to Computing)
Chapter 1 36
Computer Hardware
Used as RAM
Lesser in size
Less expensive
Less power consumption
Note: RAM is empty and doesn’t contain any instruction for the microprocessor to execute. Now
ROM plays its parts. ROM contains a small set of instruction called the ROM BIOS (basic
input/output system). These instructions tell the computer how to access the hard disk, find the
operating system, and load it into RAM. After the operating system is loaded, the computer can
understand your input, display output, run software, and access your data .
o Magnetic Disks
Magnetic disks are made of rigid metals or synthetic plastic material. The
disk platter is coated on both the surfaces with magnetic material and
IT Fundamentals
(Introduction to Computing)
Chapter 1 37
Computer Hardware
both the surfaces can be used for storage. The magnetic disk provides
direct access and is popular for both small and large computer systems.
The magnetic disk comes in two forms: hard disks and floppy disks.
Hard drive: The storage area within the computer itself, where
megabytes of space are
available to store bits of
information. Also known as
a hard disk.
o Magnetic Tape
Magnetic tape is serial access storage medium. It can store large volume
of data at low costs. The conventional magnetic tape is in reels of up to
3600 feet made of mylar plastic tape. A continuous plastic strip covered
with magnetic oxide; the tape is divided into parallel tracks onto which
data may be recorded by selectively magnetizing parts of the surface, or
spots, in each of the tracks.
o Optical storage
Optical storage technology uses light as the medium for representing
data. It uses reflecting surfaces and laser technology to read and write
data on a disk. Also known as a laser disk. Commonly used optical
storage devices include CD-ROM, CD-R, CD-RW and DVD.
IT Fundamentals
(Introduction to Computing)
Chapter 1 38
Computer Hardware
IT Fundamentals
(Introduction to Computing)
Chapter 1 39
Computer Hardware
These features are designed to lessen the work of the CPU and produce
faster video and graphics.
IT Fundamentals
(Introduction to Computing)
Chapter 1 40
Computer Hardware
IT Fundamentals
(Introduction to Computing)
Chapter 1 41
Computer Hardware
Internal Component
o Motherboard
o Expansion Slots
IT Fundamentals
(Introduction to Computing)
Chapter 1 42
Computer Hardware
The expansion card has an edge connector that fits precisely into the
expansion slot as well as a row of contacts that is designed to establish an
electrical connection between the motherboard and the electronics on
the card, which are mostly integrated circuits.
o Network Card
o Graphic Card
IT Fundamentals
(Introduction to Computing)
Chapter 1 43
Computer Hardware
o Memory Slots
The most common types of RAM are SDRAM and DDR for desktop
computers and SODIMM for laptop computers, each having various types
and speeds. The picture above is an example of what memory slots may
look like inside a desktop computer. In this picture, there are three open
available slots for three memory sticks.
o Cooling Fan
o Power Supply
IT Fundamentals
(Introduction to Computing)
Chapter 1 44
Computer Hardware
o Ports
IT Fundamentals
(Introduction to Computing)
Chapter 1 45
Computer Hardware
Activity # 1
STRICTLY NO ERASURE.
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
IT Fundamentals
(Introduction to Computing)
Chapter 1 46
Computer Hardware
II. Multiple Choice: Circle the word or phrase that best completes each statement.
3. It is specialized, single user computer that typically has more power and features
than a standard desktop PC.
a. Game console b. Workstation c. Handled computer
A. Categories of Computer
1.
2.
3.
4.
5.
B. Characteristic of Computer
6.
7.
IT Fundamentals
(Introduction to Computing)
Chapter 1 47
Computer Hardware
8.
9.
10.
11.
12.
13.
IT Fundamentals
(Introduction to Computing)
Chapter 1 48
Computer Hardware
Activity # 2
STRICTLY NO ERASURE.
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
___________________2.A device that allows the user to input data and instructions to
the computer.
___________________3. Inventor of mouse.
IT Fundamentals
(Introduction to Computing)
Chapter 1 49
Computer Hardware
F.
________ 5. It is a small vertical stick attached to a
trackball for easier mechanical movements.
IT Fundamentals
(Introduction to Computing)
Chapter 1 50
Computer Hardware
Activity # 3
STRICTLY NO ERASURE.
I. Identification: Identify the following. Write your answer on the space provided
before each number. (30 pts.)
IT Fundamentals
(Introduction to Computing)
Chapter 1 51
Computer Hardware
1. RAM - ________________________________________________________.
2. NIC - _________________________________________________________.
3. DVD - _________________________________________________________.
4. CMOS - ________________________________________________________.
IT Fundamentals
(Introduction to Computing)
Chapter 1 52
Computer Hardware
5. AGP - ________________________________________________________.
6. CD-R - _________________________________________________________.
7. CPU - __________________________________________________________.
8. PSU - __________________________________________________________.
9. GPU - ______________________________________________________.
IT Fundamentals
(Introduction to Computing)
Chapter 2 53
Data Representation
Chapter 2
DATA REPRESENTATION
DATA REPRESENTATION BASICS
What is data representation? Data representation refers to the form in which data is
stored, processed, and transmitted. For example, mobile phones, iPods and computers
store numbers, text, music, photos and videos in formats that can be handled by
electronic circuitry. Those formats are data representations.
When data is input into a computer, the numbers or words we understand are
translated into a binary numbers system. Binary is the language of computers.
Everything you type, input, output, send, retrieve, draw and so on is, in the end,
converted to the computer’s native language: binary.
The number system that we use in our day-to-day life is the decimal number system.
Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number
system, the successive positions to the left of the decimal point represent units, tens,
hundreds, thousands and so on.
IT Fundamentals
(Introduction to Computing)
Chapter 2 54
Data Representation
256 different symbols or characters because the eight 1s and Os in a byte can be
combined in 256 different ways.
The value 256 is more than the number of symbols; it is the number of patterns of 0 and
1 that can be created using eight bits. This number can be obtained using a calculation:
There are two possible states for a switch, on and off. In a byte, there are eight
switches. To calculate the number of patterns, raise 2 to the number of bits: 2s = 256.
Table 1 shows the first 9 powers of 2.
The byte is an extremely important unit because there are enough different eight-bit
combinations to represent all the characters on the keyboard, including all the letters
(uppercase and lowercase), numbers, punctuation marks, and other symbols.
Text Codes
Early programmers realized that they needed a standard text code that was agreeable
to all of them. In such a system, numbers would represent the letters of the alphabet,
punctuation marks, and other symbols. This standard code system would enable any
programmer or program to use the same combinations of numbers to represent the
same individual pieces of data. The four most popular text code systems invented are
the following:
ASCII. ASCII (pronounced as AS-key) stands for the American Standard Code for
Information Interchange. Today, the ASCII character set is by far the most
commonly used in computers of all types. Table 2 shows the 128 ASCII codes.
ASCII is an eight-bit code that specifies characters for values from 0 to 127.
Extended ASCII. Extended ASCII is an eight-bit code that specifies the characters
for values from 128 to 255. The first 40 symbols represent pronunciation and
special punctuation. The remaining symbols are graphic symbols.
IT Fundamentals
(Introduction to Computing)
Chapter 2 55
Data Representation
enough Unicode codes can be created to represent more than 4 billion different
characters or symbols. This total is enough for every unique character and
symbol in the world, including the vast Chinese, Korean, and Japanese character
sets and those found in known classical and historical texts. In addition to world
letters, special mathematical and scientific symbols are represented in Unicode.
One major advantage that Unicode has over other text code systems is its
compatibility with ASCII codes. The first 256 codes in Unicode are identical to the
IT Fundamentals
(Introduction to Computing)
Chapter 2 56
Data Representation
This work of manipulating, storing and processing the data takes place in the Central
Processing Unit, the computer’s main memory. The CPU consists of an arithmetic and
logic unit, or ALU, a control unit, and a set of registers.
The arithmetic and logic unit is the portion of the CPU where arithmetic and
logical operations take place.
The control unit is the part of the CPU that supervises the general operations of
the computer.
The registers are devices that hold data inside the computer’s memory long
enough to execute a particular function, such as indexing, calculating, sorting or
otherwise manipulating data. They are the CPU’s own internal memory.
IT Fundamentals
(Introduction to Computing)
Chapter 2 57
Data Representation
Data travels from one part of the computer to another through a kind of path known as
a bus.
Similar to a school bus for school children, a computer data bus picks up a load of data
from one of the components on the main computer board and then transfers the data
to another component on the main computer board. The main circuit board of a
microcomputer is also known as the motherboard. The motherboard is the principal
board that has connectors for attaching devices to the bus. Typically, it contains the
CPU, memory and basic controllers for the system. The data bus is really a series of
electrical circuits that connect the various electrical elements on the main board.
The data are input into the computer and processed in the CPU. They travel along the
bus to be stored in the computer’s memory. The amount of memory available is
described in bytes of information, referring to the combination of bits representing
characters. The higher the number of bytes the more memory the computer has.
CONVERSIONS
We have discussed the meaning of Decimal Number System. It uses ten digits, 0, 1,
2,3,4,5,6,7,8 and 9, therefore has a base of 10. The Binary Number System uses only
two digits, 0 and 1, so it has a base of 2. Hexadecimal means 16. The Hexadecimal
Number System uses 16 digits 0-9 and A to F.
Weight is the value of each digit position. Decimal Weights represents the value of
each digit position of a decimal number such as Units (10 0), Tens (101), Hundredths
(102), Thousandths (103), etc. Binary Weights are enumerated as units (20), two (21),
fours (22), Eights (23), and so on.
1. Binary to Decimal Conversion
Steps:
IT Fundamentals
(Introduction to Computing)
Chapter 2 58
Data Representation
Solution:
1 x 25= 32
1 x 24 = 16
1 x 23= 8
0 x 22= 0
1 x 21= 2
0 x 20= 0
58
1110102 = 5810
Steps:
a. Divide decimal number by 2.
b. Write the quotient and the remainder.
c. Divide the quotient by 2.
d. Repeat steps b and c until the quotient is 0.
e. Write the digits from bottom to top. The resulting string will be the binary
number.
Solution:
IT Fundamentals
(Introduction to Computing)
Chapter 2 59
Data Representation
2 82
2 41 r 0
2 20 r 1
2 10 r 0
2 5 r 0
2 2 r 1
2 1 r 0
0 r 1
8210 = 10100102
TABLE OF EQUIVALENCES
IT Fundamentals
(Introduction to Computing)
Chapter 2 60
Data Representation
Solution:
2 A F 0
0010 1010 1111 0000
2AF016 = 101010111100002
Steps:
a. Group the digits of the binary number from the last digit by 4’s
b. If the last group is less than 4 digits, add zeros to the left to make it 4.
c. From the table of Equivalences, write below the corresponding
hexadecimal number equivalent of each group.
d. Write the hexadecimal digits as a string.
Solution:
1 0110 0101
1011001012 = 16516
IT Fundamentals
(Introduction to Computing)
Chapter 2 61
Data Representation
Steps:
a. Write the hexadecimal number downward. If the hexadecimal digit is a
letter, change it first to its corresponding decimal number.
b. Multiply each digits with the corresponding hexadecimal weights starting
with units is at the bottom of the list.
c. Add the products. The sum is the corresponding decimal number.
Solution:
3 x 162 = 768
4 x 161 = 64
B=11 x 160 = 11
843
34B16 = 84310
Binary Arithmetic
Binary arithmetic is essential part of all the digital computers and many other digital
system.
Binary Addition
It is a key for binary subtraction, multiplication, division. There are four rules of binary
addition.
IT Fundamentals
(Introduction to Computing)
Chapter 2 62
Data Representation
In fourth case, a binary addition is creating a sum of (1 + 1 = 10) i.e. 0 is written in the
given column and a carry of 1 over to the next column.
Example − Addition
Subtraction
Subtraction and
Borrow, these
two words will be
used very
frequently for the
binary
subtraction. There are four rules of binary subtraction.
Example − Subtraction
Multiplication
IT Fundamentals
(Introduction to Computing)
Chapter 2 63
Data Representation
Example − Multiplication
Activity # 1
IT Fundamentals
(Introduction to Computing)
Chapter 2 64
Data Representation
STRICTLY NO ERASURE.
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
Activity # 2
IT Fundamentals
(Introduction to Computing)
Chapter 2 65
Data Representation
I. Conversion:
1. 45810 =__________________________2
2. 12010 = __________________________2
3. 85310 = __________________________2
IT Fundamentals
(Introduction to Computing)
Chapter 2 66
Data Representation
4. 24810 = __________________________2
1. 11000112 = __________________________10
IT Fundamentals
(Introduction to Computing)
Chapter 2 67
Data Representation
2. 1110012 = ___________________________10
3. 100010002 = _________________________10
IT Fundamentals
(Introduction to Computing)
Chapter 2 68
Data Representation
4. 1100011102 = ________________________10
IT Fundamentals
(Introduction to Computing)
Chapter 2 69
Data Representation
Activity # 3
A. Decimal To Hexadecimal Conversion
1. 102410 = __________________________16
2. 89510 = ___________________________16
1. F3E16 = _______________________________________2
IT Fundamentals
(Introduction to Computing)
Chapter 2 70
Data Representation
2. A7B616 = _______________________________________2
IT Fundamentals
(Introduction to Computing)
Chapter 2 71
Data Representation
3. 23F16 = __________________________________________ 2
3. A2FE16 = __________________________________________ 2
IT Fundamentals
(Introduction to Computing)
Chapter 2 72
Data Representation
Activity # 4
Compute the following Binary arithmetic.
1. 110011
+ 011011
2. 100010
+ 001100
3. 1011100
+ 1001100
IT Fundamentals
(Introduction to Computing)
Chapter 2 73
Data Representation
4. 1111000
- 011110
5. 111100
- 001100
IT Fundamentals
(Introduction to Computing)
Chapter 2 74
Data Representation
Activity # 5
Convert the High level Language to Machine Language using the Extended ASCII
Code.
Example: B I T
IT Fundamentals
(Introduction to Computing)
Chapter 3 75
Computer Software
Chapter 3
Computer Software
Computer needs to be given instructions to perform any task. A set of instructions for a
specific task is termed a routine and a complete set of instructions to execute a related
set of tasks is a program.
Software, also called a program, consists of a series of related instructions, organized for
a common purpose, that tells the computer what tasks to perform and how to perform
them. You interact with a program through its user interface. The user interface controls
how you enter data and instructions and how information is displayed on the screen.
Software today often has a graphical user interface. With a graphical user interface (GUI)
(pronounced as gooey), you interact with the software using text, graphics, and visual
images such as icons. An icon is a miniature image that represents a program, an
instruction, or some other object. You can use the mouse to select icons that perform
operations such as starting a program. Computer programs or software can be divided
into two major categories: systems software and applications software.
Computer Software
Application Software
Application software consists of programs designed to make users more productive and/
or assist them with personal tasks. A widely used type of application software related to
communications is a Web browser, which allows users with an Internet connection to
access and view Web pages or access programs. Other popular application software
includes word processing software, spreadsheet software, database software, and
IT Fundamentals
(Introduction to Computing)
Chapter 3 76
Computer Software
presentation software. Many other types of application software exist that enable users
to perform a variety of tasks. These include personal information management, note
taking, project management, accounting, document management, computer aided
design, desktop publishing, paint/image editing, photo editing, audio and video editing,
multimedia authoring, Web page authoring, personal finance, legal, tax preparation,
home design/landscaping, travel and mapping, education, reference, and entertainment
(e.g., games or simulations, etc.).
Spreadsheets
Data Management
Word Processing
Word processing software allows the user to manipulate text rather than
just numbers. Modern word processors contain many productive writing
and editing features. A typical word processing software package consists of
an integrated set of programs including an editor program, a formatting
IT Fundamentals
(Introduction to Computing)
Chapter 3 77
Computer Software
Desktop Publishing
Multimedia
IT Fundamentals
(Introduction to Computing)
Chapter 3 78
Computer Software
INTERNET BROWSER
A web browser is a software application which enables a user to display and interact with
text, images, videos, music, and other information that could be on a website. Text and
images on a web page can contain hyperlinks to other web pages at the same or different
website. Web browsers allow a user too quickly and easily access information provided on
many web pages at many websites by traversing these links. Web browsers format HTML
information for display so the appearances of a web page many differs between browsers.
Web browsers communicated with web servers primarily using HTTP (hypertext transfer
protocol) to fetch web pages. HTTP allows web browsers to submit information to web
servers as well as fetch web pages from them. Pages are identified by means of a URL
(uniform resource locater), which is treated as an address, beginning with “http://” for
HTTP access.
The file format for a web page is usually HTML (hyper-text markup language) and is
identified in the HTTP protocol. Most web browsers also support a variety of additional
formats, such as JPEG, PNG, and GIF image formats, and can be extended to support more
through the use of plug ins. The combination of HTTP content type and URL protocol
specification allows web page designers to embed images, animations, video, sound, and
streaming media into a web page, or to make them accessible through the web page.
POPULAR BROWSERS
Firefox
IT Fundamentals
(Introduction to Computing)
Chapter 3 79
Computer Software
source developers. Firefox is also known for its vast range of plug ins/add-
ons that let the user customize in a variety of ways. Firefox is a product of
the Mozilla Foundation. The latest version of Firefox is Firefox 3.
Internet Explorer
IE almost fully supports HTML 4.01, CSS Level 1, XML 1.0, and DOM Level 1.
It has introduced a number of proprietary extensions to many of the
standards. This has resulted in a number of web pages that can only be
viewed properly using IE. It has been subject to many security vulnerabilities
just like Windows has. Much of the spyware, adware, and viruses across the
Internet are made possible by exploitable bugs and flaws in the security
architecture of IE. These are drive-by downloads come into play
(see computer security lesson for more details on that).
Safari
IT Fundamentals
(Introduction to Computing)
Chapter 3 80
Computer Software
since. In May 2008 Safari controlled 6.25% of marketshare among all web
browsers.
Opera
There are many Internet browsers, all with a number of versions each.
Therefore, it is difficult to show steps for all of them. The following
sections contain information on how to change the homepage for those
that are the most popular. With a little intuition, you should be able to
change your the default home page; even if your version isn't listed. To
proceed, select your browser from the list below and follow the steps.
o Internet Explorer
IT Fundamentals
(Introduction to Computing)
Chapter 3 81
Computer Software
5. Click Apply.
6. Click Ok.
o Mozilla Firefox
o Chrome
Tip: If you would like the page you have open set as your home page, click the Use Current button.
Tip: To see if your new home page has en set correctly, click Home icon.
SYSTEM SOFTWARE
System software is consists of programs that control or maintain the operations of the
computer and its devices. System software serves as the interface between the user, the
application software, and the computer’s hardware. It comprises programs designed to
coordinate the operations of the computer system. It manages the hardware, software
and data resources of the computer system. It includes three types of programs: system
management programs, system support programs and system development programs.
IT Fundamentals
(Introduction to Computing)
Chapter 3 82
Computer Software
These are programs that support efficient operation of a computer. They provide a
variety of support services to users and management of computer system. These
support services include utility programs, security monitors and performance
monitors. Utility software consist of programs that are very frequently requested by
many application programs like programs for transferring data from one medium to
another, formatting disk, backing up and sorting of files.
Utility Software
A utility program allows a user to perform maintenance-type tasks usually
related to managing a computer, its devices, or its programs. For example,
you can use a utility program to transfer digital photos to an optical disc. Most
operating systems include several utility programs for managing disk drives,
printers, and other devices and media. You can also buy utility programs that
allow you to perform additional computer management functions.
Examples of utility programs are antivirus software, backup software and disk
tools. Let's look at each of these in a bit more detail.
Antivirus or anti-virus software (often abbreviated as AV),
sometimes known as antimalware software, is computer software
used to prevent, detect and remove malicious software. Antivirus
(or anti- virus)software is used to safeguard a computer from
malware, including viruses, computer worms, and Trojan horses.
Antivirus software may also remove or prevent spyware and
adware, along with other forms of malicious programs. Free
antivirus software generally only searches your computer using
signature-based detection which involves looking for patterns of
data that are known to be related to already-identified malware.
Paid antivirus software will usually also include heuristics to catch
new, or zero-day threats, by either using genetic signatures to
identify new variants of existing virus code or by running the file in
a virtual environment (also called a sandbox), and watching what it
does to see if it has malicious intent.
Definition of computer virus A computer virus is a program or
piece of code that is loaded onto your computer without your
IT Fundamentals
(Introduction to Computing)
Chapter 3 83
Computer Software
knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made. A simple virus
that can make a copy of itself over and over again is relatively easy
to produce. Even such a simple virus is dangerous because it will
quickly use all available memory and bring the system to a halt. An
even more dangerous type of virus is one capable of transmitting
itself across networks and bypassing security systems.
In computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. A computer virus is a
program designed to harm or cause harm on an infected
computer. Its spreads through e-mail attachments, portable
devices, websites containing malicious scripts and file downloads.
A computer virus attaches itself to the host files and always
activate whenever you open the infected files. The virus can
replicate itself and then infect the other files on your computer
causing more damage.
Types of computer virus
o Resident Viruses This type of virus is a permanent
which dwells in the RAM memory. From there it can
overcome and interrupt all of the operations
executed by the system: corrupting files and
programs that are opened, closed, copied, renamed
etc.
o Multipartite Viruses Multipartite viruses are
distributed through infected media and usually hide
in the memory. Gradually, the virus moves to the
boot sector of the hard drive and infects executable
files on the hard drive and later across the computer
system.
o Direct Action Viruses The main purpose of this virus
is to replicate and take action when it is executed.
When a specific condition is met, the virus will go
into action and infect files in the directory or folder
that it is in and in directories that are specified in
the AUTOEXEC.BAT file PATH.
IT Fundamentals
(Introduction to Computing)
Chapter 3 84
Computer Software
IT Fundamentals
(Introduction to Computing)
Chapter 3 85
Computer Software
These programs help users and system developers in designing and building systems.
They help in developing programs and procedures and prepare programs for
computer processing. These include language translators, programming tools and
IT Fundamentals
(Introduction to Computing)
Chapter 3 86
Computer Software
Compiler and Interpreter: High level languages are widely used. They have
been developed to enable the users to program the machines in a language
similar to the language of the users. For example BASIC, Pascal, C and Java use
scientific notations and subroutines in programming formats that are similar
to mathematical formulas and equations. On the other hand, COBAL contains
business jargons widely used in business.
IT Fundamentals
(Introduction to Computing)
Chapter 3 87
Computer Software
Compiler Interpreter
Compiler prepares an object program from Interpreter translates and immediately executes
source program each instruction of the source program
It is a debugging tool and is useful during
Debugging is complex and time consuming
program developing stage
Lower execution time Higher execution time
Requires higher program development Requires less program development effort and
effort and time time
These programs manage the hardware, software and data resources of the computer
system. It includes operating system, database management system (DBMS) and
telecommunication monitors. An operating system is a set of programs that
coordinates all the activities among computer hardware devices. It provides a means
for users to communicate with the computer and other software. DBMS is a set of
programs that controls creation, maintenance and use of database. It allows different
applications to share data and programs concurrently. It also secures data in the
database from misuses. DB2, Oracle, MS SQL Server etc. are some of the examples of
database management systems.
OPERATING SYSTEM
IT Fundamentals
(Introduction to Computing)
Chapter 3 88
Computer Software
o Process Management
o Memory Management
o Device Management
Single-user OS expects to deal with one set of input devices those that can be
controlled by one user at a time
IT Fundamentals
(Introduction to Computing)
Chapter 3 89
Computer Software
It can be defined as the combination of hardware and software that helps people
and computer communicate with each other. A computer’s user interface includes a
display device, mouse, and keyboard that allow viewing and manipulating computing
environment. Originally, computers had a command-line interface that required
users to type memorized commands to run programs and accomplish tasks.
Command-line user interface can be accessed from most operating systems,
including Windows and Mac OS.
Most computer today feature a graphical user interface, abbreviated as GUI and
pronounced as “gooey” or “gee you eye”. A graphical user interface provides a way
to point and click a mouse to select menu options and manipulate graphical objects
displayed in the screen.
IT Fundamentals
(Introduction to Computing)
Chapter 3 90
Computer Software
supplies it, the DOS is known as PC-DOS. MS-DOS is like a translator between
computers and users. It is basically a set of programs, which enables the user to
communicate with the CPU, the disk drives and the printer, and manage these
resources efficiently.
Lay out:
Directory
C:\ CICT
A
Root Directory
B Sub-directories
Commands in DOS
Dir This command lists the contents of a directory in the hard disk
or floppy disk.
Dir/p The /p option is used to list the contents page wise, one
screen at a time.
Dir/w This option lists contents width wise.
Dir [drive] to list the contents of another directory.
Example dir a: This command lists all the files in drive A
while remaining in drive C.
Dir *. <extension> This lists all files with the extension specified
Example dir *.exe lists all files with extension 'exe'.
IT Fundamentals
(Introduction to Computing)
Chapter 3 91
Computer Software
But this command will work only if the subdirectory SALARY is empty and the
command is issued from outside the Salary subdirectory; that is, all files should
be deleted before removing the subdirectory by DEL command and move to its
parent directory.
UNIX
UNIX was developed by AT&T's Bell Labs in 1969 by Kenneth Thompson and
Dennis Ritchie, system engineers at AT&T's Bell Labs. It went through many
revisions and gained in popularity until 1977, when it was first made
commercially available by Interactive Systems Corporation. It is widely used in
multi-user systems. It is a powerful operating system with multitasking, 78
Computer Software multiprogramming and interactive features.
IT Fundamentals
(Introduction to Computing)
Chapter 3 92
Computer Software
OS/2
OS/2 Warp is bundled with a bonus pack that includes a number of applications
like a word processor, a spreadsheet, personal information manager and easy
Internet access and other online services.
Windows
IT Fundamentals
(Introduction to Computing)
Chapter 3 93
Computer Software
Microsoft Windows uses DOS operating system. It employs graphic user interface
(GUI) technology. A GUI acts as a translator allowing the user and the computer
to communicate with each other in a way that is easy for both to understand. The
users can activate programs from windows by clicking on icons or symbols
appearing on the monitor. An icon is a picture appearing on the screen that
represents an action or application that the computer can implement. It requires
a mouse to run. Multiple windows open multiple applications that are invoked.
Windows is a highly integrated environment in which different applications have
the same 'look and feel', so users familiar with one application can easily work in
other applications. Example, the icons for printing and saving file are the same in
Excel, Word, Access and PowerPoint.
Windows Versions
IT Fundamentals
(Introduction to Computing)
Chapter 3 94
Computer Software
This is the era of fax/modems, email, the new online world, and
dazzling multimedia games and educational software. Windows 95
has built-in Internet support, dial-up networking, and new Plug and
Play capabilities that make it easy to install hardware and
software. The 32-bit operating system also offers enhanced
multimedia capabilities, more powerful features for mobile
computing, and integrated networking.
IT Fundamentals
(Introduction to Computing)
Chapter 3 95
Computer Software
With Windows 98, you can find information more easily on your PC
as well as the Internet. Other improvements include the ability to
open and close programs more quickly, and support for reading
DVD discs and universal serial bus (USB) devices. Another first
appearance is the Quick Launch bar, which lets you run programs
without having to browse the Start menu or look for them on the
desktop.
IT Fundamentals
(Introduction to Computing)
Chapter 3 96
Computer Software
Windows Vista is
released in 2006 with the
strongest security system
yet. User Account Control
helps prevent potentially
harmful software from
making changes to your
computer. In
Windows Vista Ultimate,
BitLocker Drive Encryption provides better data protection for your
computer, as laptop sales and security needs increase.
Windows Vista also features enhancements to Windows Media
Player as more and more people come to see their PCs as central
locations for digital media. Here you can watch television, view and
send photographs, and edit videos.
IT Fundamentals
(Introduction to Computing)
Chapter 3 97
Computer Software
Windows 8 is a re-imagined
operating system, from the chipset
to the user experience, and
introduces a totally new interface
that works smoothly for both touch
and mouse and keyboard. It
functions as both a tablet for
entertainment and a full-featured
PC for getting things
done. Windows 8 also includes enhancements of the familiar
Windows desktop, with a new taskbar and streamlined file
management.
IT Fundamentals
(Introduction to Computing)
Chapter 3 98
Computer Software
sync across all devices, the option to boot directly to the desktop,
Bing Smart Search so you can find what you're looking for across
the PC or the web, a Start button to navigate between the desktop
and Start Screen, and more flexible options for viewing multiple
applications at once on one or all screens. There are also several
new built-in apps such as Bing Food & Drink, Bing Health & Fitness,
and great utility apps like Reading List, Calculator, and Alarms.
Many of the great apps shipped in Windows 8 are back and even
better, making your experience more enjoyable right from the
start.
Windows desktop
The windows desktop is the base of operations for using your computer. It
displays small pictures called icons that helps you access software,
documents and the components of your computer system.
Two key programs for file management are available with windows:
(1) My Computer
(2) The Windows Explorer.
Each of these programs gives a picture of the files – documents, data and
program files that are stored on the various computer disks. You have a choice of
“VIEWS” or ways of displaying the information, using large or small icons, with or
IT Fundamentals
(Introduction to Computing)
Chapter 3 99
Computer Software
without details. Either program can be used to copy, move, delete and open
programs and documents. My Computer looks at a particular location on the
computer and displays all the folders and files.
My Computer:
View button
In this example of My Computer, the disks and folders are displayed as large
icons. You can switch the type of display using the “VIEWS” button on the menu
bar.
By right-clicking on a drive
and selecting “Properties”
you get the following:
IT Fundamentals
(Introduction to Computing)
Chapter 3 100
Computer Software
The left-hand side of the explorer window The right-hand side of the explorer lists the files and
displays a tree-diagram of the disk drives, sub-folders in the selected drive\directory.
with folders displayed.
In this example, the VIEW has been set on“Details.” A
Clicking on the + beside a folder or disk small icon to represent the file application type is
drive will display all subfolders. followed by the full file name.The file size, type and
date/time saved are also listed.
An open folder on the left indicates the
folder whose contents are displayed on By clicking a column heading bar (Name, Size, Type
the right-hand side of the screen. or Modified) you can sort the file listing
alphabetically (Name), by Size, by type of file, or by
date/time last saved. A second click reverses the
order. This feature makes it easy to find files.
IT Fundamentals
(Introduction to Computing)
Chapter 3 101
Computer Software
Linux
The Linux OS is frequently packaged as a Linux distribution for both desktop and
server use, and includes the Linux kernel (the core of the operating system) as well as
supporting tools and libraries. Popular Linux OS distributions include Debian, Ubuntu,
Fedora, Red Hat and openSUSE.
Android
IT Fundamentals
(Introduction to Computing)
Chapter 3 102
Computer Software
Android applications. Android OS version varies from 1.0 to 4.2 Jellybean (July 2012).
Notice carefully you can see all the OS names are desserts, but still the naming reason
is not released by Google and the names are alphabetically ordered, starting from 1.5
Cupcake to 5.0 Lollipop (C-L).
IOS
IT Fundamentals
(Introduction to Computing)
Chapter 3 103
Computer Software
applications to respond to shaking the device (one common result is the undo
command) or rotating it in three dimensions (one common result is switching from
portrait to landscape mode).
Apple provides major updates to the iOS operating system approximately once a year
via iTunes and also, for devices that came with iOS version 5.0 or later, over the air.
The latest version is iOS 8, which is available for the iPhone 4S, iPhone 5,iPhone
5C, iPhone 5S, iPhone 6, iPhone 6 Plus, iPad 2, the third and fourth generation iPad,
the first and second generation iPad Air, the first, second and third generation iPad
Mini, and the fifth generation iPod Touch. The OS update was released on September
17, 2014.
People ware
Every day, people around the world rely on different types of computers for a variety of
applications. To illustrate the range of uses for computers, this section takes you on a
visual and narrative tour of five categories of users:
• Home user
• Small office/home office (SOHO) user
• Mobile user
• Power user
• Enterprise user
Home User
In an increasing number of homes, the
computer no longer is a convenience. Instead,
it is a basic necessity. Each family member, or
home user, spends time on the computer for
different reasons that include personal
financial management, Web access,
communications, and entertainment.
IT Fundamentals
(Introduction to Computing)
Chapter 3 104
Computer Software
messages, and chat rooms using personal computers, smart phones, and
other mobile devices.
Mobile User
Today, businesses and schools are
expanding to serve people across
the country and around the world.
Thus, increasingly more employees
and students are mobile users, who
work on a computer or mobile
device while away from a main
office, home office, or school.
Examples of mobile users are sales
representatives, real estate agents,
insurance agents, meter readers,
package delivery people, journalists,
consultants, and students.
IT Fundamentals
(Introduction to Computing)
Chapter 3 105
Computer Software
Mobile users often have mobile computers and/or mobile devices. With
these computers and devices, the mobile user connects to other
computers on a network or the Internet, often wirelessly accessing
services such as e-mail and the Web. Mobile users can transfer
information between their mobile device and another computer, such as
one at the main office or school. For entertainment, the mobile user plays
video games on a handheld game console and listens to music or watches
movies on a portable media player.
Power User
Another category of user, called a power
user, requires the capabilities of a
workstation or other type of powerful
computer. Examples of power users include
engineers, scientists, architects, desktop
publishers, and graphic artists. Power users
often work with multimedia, combining text,
graphics, audio, and video into one
application. These users need computers with extremely fast processors
because of the nature of their work.
Enterprise User
An enterprise has hundreds or thousands of
employees or customers that work in or do
business with offices across a region, the
country, or the world. Each employee or
customer who uses a computer in the
enterprise is an enterprise user. Many large
companies use the words, enterprise
computing, to refer to the huge network of
IT Fundamentals
(Introduction to Computing)
Chapter 3 106
Computer Software
IT Fundamentals
(Introduction to Computing)
Chapter 3 107
Computer Software
Activity # 1
STRICTLY NO ERASURES
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
__________________________2.
2 types of Software
__________________________3.
IT Fundamentals
(Introduction to Computing)
Chapter 3 108
Computer Software
C. Types of Software
8.
9.
IT Fundamentals
(Introduction to Computing)
Chapter 3 109
Computer Software
Activity # 2
I. Identification: Identify the following.
__________________4. It is also the native browser on the iPhone and iPod touch.
IT Fundamentals
(Introduction to Computing)
Chapter 3 110
Computer Software
Activity # 3
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
________________5. Part of a window that contains the start button and notification
area.
________________6. It provides a tree diagram structure to indicate the storage
relationships among files and folders.
________________7.
Two type of User interface
________________8.
IT Fundamentals
(Introduction to Computing)
References 111
IT Fundamental
A. Example of OS
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
C. Types of Malware
16.
17.
18.
19.
20.
IT Fundamentals
(Introduction to Computing)