Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015....

14
1 Computers and Software History and Purpose of Operating Systems n An operating system (OS) is a set of instructions designed to work with a specific type of computer, such as a Dell ® PC or a Macintosh ® computer. The OS controls all the computer’s functions. It also provides an interface, the on-screen tools you use to interact with the computer and your programs. n The operating system manages the central processing unit (CPU) so that processing tasks are done properly, manages computer memory, manages files stored on the computer’s disks, manages input and output devices, and loads application programs into memory. n In 1984, Apple ® became the first computer maker to offer a personal computer equipped with a graphical user interface (GUI). Macintosh names both the computer and its operating system. n The DOS (Disk Operating System) operating system used in early personal computers was the basis for MS-DOS, Microsoft’s first operating system. MS-DOS was eventually replaced in Microsoft computers by the Windows operating system, a GUI OS that has gone through multiple versions. n UNIX was designed to work on powerful business and scientific computers. Later versions of UNIX have been developed to work on microcomputers, or personal computers. n One of these versions of UNIX, a system called Linux, has become very popular. Linux works with an optional GUI and is very fast compared to other operating systems. It is also unique in that it is an open-source operating system, in which the source code (programming language) used to create it is available to the public. Architecture of a Microcomputer System n Microcomputer architecture refers to the hardware that makes up a typical computer system. Microcomputers generally have the following structure: l Processing devices: The central processing unit, or CPU, processes data. The CPU is a small, thin piece of silicon attached to a circuit board. The CPU is covered with tiny electrical circuits. By moving data along these circuits in specific ways, the CPU can calculate and compare data very quickly. l Primary storage: The computer’s primary storage, called random access memory, or RAM, stores data and instructions while the computer is working in chips connected to the CPU. Data in RAM is lost when the computer is turned off. l Secondary storage devices: To provide storage for applications and files, most computers include secondary storage devices such as hard drives or DVD drives. These devices let you store data permanently—even when the computer is turned off. l Peripherals: Hardware that is separate but can be connected to the case is called a peripheral. Peripherals can include keyboards, mice, monitors, printers, scanners, and voice input devices. Peripherals are necessary to perform both input and output chores for the computer. Computer Basics

Transcript of Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015....

Page 1: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

1

Computers and Software

History and Purpose of Operating Systems

n An operating system (OS) is a set of instructions designed to work with a specific type of computer, such as a Dell® PC or a Macintosh® computer. The OS controls all the computer’s functions. It also provides an interface, the on-screen tools you use to interact with the computer and your programs.

n The operating system manages the central processing unit (CPU) so that processing tasks are done properly, manages computer memory, manages files stored on the computer’s disks, manages input and output devices, and loads application programs into memory.

n In 1984, Apple® became the first computer maker to offer a personal computer equipped with a graphical user interface (GUI). Macintosh names both the computer and its operating system.

n The DOS (Disk Operating System) operating system used in early personal computers was the basis for MS-DOS, Microsoft’s first operating system. MS-DOS was eventually replaced in Microsoft computers by the Windows operating system, a GUI OS that has gone through multiple versions.

n UNIX was designed to work on powerful business and scientific computers. Later versions of UNIX have been developed to work on microcomputers, or personal computers.

n One of these versions of UNIX, a system called Linux, has become very popular. Linux works with an optional GUI and is very fast compared to other operating systems. It is also unique in that it is an open-source operating system, in which the source code (programming language) used to create it is available to the public.

Architecture of a Microcomputer System

n Microcomputer architecture refers to the hardware that makes up a typical computer system. Microcomputers generally have the following structure:

l Processing devices: The central processing unit, or CPU, processes data. The CPU is a small, thin piece of silicon attached to a circuit board. The CPU is covered with tiny electrical circuits. By moving data along these circuits in specific ways, the CPU can calculate and compare data very quickly.

l Primary storage: The computer’s primary storage, called random access memory, or RAM, stores data and instructions while the computer is working in chips connected to the CPU. Data in RAM is lost when the computer is turned off.

l Secondary storage devices: To provide storage for applications and files, most computers include secondary storage devices such as hard drives or DVD drives. These devices let you store data permanently—even when the computer is turned off.

l Peripherals: Hardware that is separate but can be connected to the case is called a peripheral. Peripherals can include keyboards, mice, monitors, printers, scanners, and voice input devices. Peripherals are necessary to perform both input and output chores for the computer.

Computer Basics

Page 2: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 22 Computers and Software

Understanding Software Applications and Software Upgrades

n Software includes all of the programs that tell a computer what to do and how to do it. Software is generally divided into two types: operating system software and application software.

n Application software performs a specific job or task. The most common types of application software include word processing software for writing letters and reports; spreadsheet software for calculations and numerical analysis; database software for storing and finding information; presentation software for creating slide shows; desktop publishing software for creating printer-ready publications such as brochures, newsletters, and invitations; browser software for navigating the Internet; and personal information manager (PIM) software for handling e-mail, schedules, tasks, and contacts.

n Other types of application software include programs for graphic design and manipulation, financial management packages, programs such as Java and Flash that allow you to create specialized content for Web pages, and even programs that allow you to write music.

n Most types of software undergo continuous review by their designers to identify performance problems and security issues, as well as to add new features and functionality. When software is changed by the vendor, the vendor issues an upgrade. Upgrades are usually handled by downloading revisions from the vendor. Some applications, such as operating systems, are configured to update automatically so users can always work with the most recent version.

Figure 1

Devices and peripherals connected to a computer system.

Page 3: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 3

DIRECTIONS 1. Using the Internet or other resources, prepare a

report that evaluates, compares, and contrasts at least two types of application software that you may use based on their appropriateness for a task, licensing agreements, and available support.

2. As you work, take notes and keep track of your sources. Include a list of sources or bibliography with your report and format the bibliography using a standard reference style such as APA or MLA.

3. Evaluate the information you find and use it only if it is accurate, relevant, and valid.

4. Share your report with the class.

Apply 1

Several types of application software are listed in the Understanding Software Applications and Software Upgrades section. They include word processors, spreadsheets, databases, presentation graphics, telecommunications, and personal information managers. In this activity, you will learn more about application software.

Internet Essentials

Origins of the Internet

n In the 1960s, people were working on ideas that later became the Internet. In 1969, the first four major computer centers in the United States were linked. By 1973, the network was international. In 1983, the Internet protocols went online for the first time. Two major groups worked on the development of the Internet: the United States military and university researchers.

n In the 1960s, the United States government wanted to find a way to communicate in the event of a disaster or military attack. The military began to work on a system that would operate even if some communication connections were destroyed. The Defense Advanced Research Projects Agency (DARPA) of the U.S. Department of Defense focused on computer networking and communications. In 1968, this research led to a network of connected computer centers called the Advanced Research Projects Agency Network (ARPANET).

n With the military’s leadership and funding, DARPA formed computing research centers at universities across the United States. From 1969 through 1987, the number of computers on the network increased from 4 to more than 10,000. These connections created the networks that became the Internet.

n The Internet is a network of networks. It connects everything from single computers to large networks. The Internet can even connect computers that run different operating systems. This ability to share information with almost any computer makes the Internet a powerful tool for communication.

n The World Wide Web, or Web, is one part of the Internet. The World Wide Web is a huge collection of documents linked by hypertext. Writers format documents and add the hyperlinks by using HyperText Markup Language, or HTML.

Connecting to the Internet

n Options for connecting to the Internet are based on availability, location, speed, and price. You can access the Internet using various types of phone lines (dial-up, DSL, or IDSN) or using cable or satellite technology.

l The least expensive way to get online is to use a dial-up connection between a standard phone line and a modem. These connections are called “dial-up” because your computer must connect to the Internet by using a telephone number to contact a server. Only 10 percent of households in the United States still use dial-up access.

Page 4: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 44 Computers and Software

l Some Digital Subscriber Lines (DSL) require a special telephone line. Integrated Services Digital Network (ISDN) lines require a special ISDN adapter and modem. As a result, both services cost more than regular phone service. Furthermore, DSL and ISDN are not available in all areas.

l Cable television companies offer Internet access through cable modems. This access is at speeds much faster than dial-up modems. You need a network card in your computer, a cable modem, and cable access. Satellite access is also very fast for downloading files to your computer, but it requires a phone line and a modem for sending files to outside users.

n Each computer that connects to the Internet has to be uniquely identified by a four-part number separated by periods called the Internet Protocol (IP) address. For example, the IP address for your computer might be 123.257.91.7. The administrator of the network to which your computer connects assigns your IP address.

n A domain name identifies one or more IP addresses and is used to locate information on the Internet. For example, an Internet server computer’s domain name might be whitehouse.gov, but its numeric IP address might be 206.166.48.45. The domain name and the IP address are simply two ways to identify the same computer on the Internet.

n Every domain name has a suffix that tells which type of organization registered the name. The most common domains are .com (commercial), .edu (education), .org (nonprofit organizations), .gov (government), .mil (military), and .net (network organizations). These are called top-level domains.

n In order to connect to the Internet, you need to a computer, smart phone, or tablet device; an Internet connection (Dial-Up, which is the slowest, ISDN, DSL, or cable or satellite); and an Internet service provider, which is a company that provides a link from your computer to the Internet.

How Browsers Work

n To access pages on the Web, users must use a Web browser. A browser is a software application designed to connect to and display pages from the Web.

n Browsers display Web pages in a graphical format that makes the content easy to understand. When you click a hyperlink (either a text link or an image), the Web browser retrieves and displays the document connected to that hyperlink. Every document has a unique address, called a uniform resource locator (URL), which tells exactly where the document is located on the Internet. A hyperlink instructs the browser to go to the URL for that document.

n URLs give you all the information you need to know about connecting to a particular page, document, or other resource.

l The first part of a URL specifies the protocol required to access the document. Web documents use http://, indicating that the file should be retrieved using hypertext transfer protocol (HTTP). Some URLs might have other protocols, such as ftp, which shows that the file should be retrieved with file transfer protocol. Another protocol, telnet, allows for access to remote computers.

l The next part of a URL, such as www.fbi.gov, is the domain name of the server that stores the Web site. This part of the URL usually takes you to the site’s home page.

l The remainder of a URL, if any, defines the path to the document’s location on the Web server. Like any computer, a Web server stores files in folders, so the path lists the folder and subfolders, if any, containing the desired document. Thus, a URL such as http://www.fbi.gov/employment/ identifies a folder named “employment” on the site’s Web server.

l At the end of a URL, you may see the name of a file—the specific Web resource for which you are looking. The resource may be an HTML document or a Web page, a video clip, a text file, or another type of resource. The file name extension identifies the type of resource.

Page 5: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 5

Figure 2

Internet Explorer allows you to choose what information from your browsing sessions you want to keep.

Working with a Browser

n Most Web browsers, including the popular Mozilla Firefox, Google Chrome, and Microsoft Internet Explorer, share some common features. By default, most browsers display Web pages in separate tabs so you can have more than one page open at a time. You can configure a browser’s basic settings for your own needs by changing the default home page, for example, or adjusting the current zoom percentage.

n To keep track of Web pages you want to revisit, you can use a feature such as Favorites in Internet Explorer or Bookmarks in Google Chrome and Mozilla Firefox. Rather than retyping the URL, you can return to any bookmarked or favorite page by clicking its name in the list. You can delete a page from the Bookmark or Favorites list when you no longer need it. Browsers also track your browsing history. Display the History list to quickly find pages you visited in the past. Clear the History list to remove a record of sites you have visited.

n You can use your browser to access e-mail accounts if you do not subscribe to another mail client. Web mail accounts offer you access to your mail from any computer or mobile device and can be configured with appearance themes, custom folders, and information imported from other e-mail apps. You can import the contacts from your address book, for example, so you can easily sort mail according to who sent it.

n You can select different levels of security and privacy for your browser. For example, set a high security level to disable all Internet file downloads, or a high privacy level to block cookies—small files that store identification information—from being automatically stored on your computer. Most browsers include options for preventing tracking, so you do not leave a record of the sites you have visited.

n You can also clear your cache, which erases your recent browsing history.

n You can customize your Web browser with the settings that you want, such as adding or removing buttons from the toolbar, setting your home page, and managing add-ons and preferences.

Page 6: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 66 Computers and Software

Intranets and Extranets

n Rather than run all their operations and communications over the Internet, many companies, universities, and other organizations install intranets. An intranet is a private network that uses the same TCP/IP protocol as the Internet.

n Intranets offer many of the same services the Internet does, such as e-mail and Web sites. Intranets are different from the Internet in that they are not meant for public use. Firewall software prevents outsiders from accessing the intranet.

n An intranet can also be converted to an extranet, which allows for limited public access. Companies often use extranets so employees can access the network while they travel or telecommute. Extranets are also used to share information with other businesses.

Using Search Engines and Search Tools

n While a Web browser is used to access pages on the Web, a search engine is a program or Web site designed to search the Web looking for documents that match specified criteria, such as keywords. Search engines index keywords in Web pages and maintain a database of those words. You can search for Web sites by typing one or more keywords in the search engine; the engine then displays a list of pages that contain your keyword(s).

n You can improve search effectiveness by using advanced search tools. For example, use an exact-phrase search by enclosing the text you want to find in quotation marks. Some search engines accept complete sentences in the form of a question, such as “How do hurricanes form?”

n Other advanced search tools include the use of inclusion operators (such as a plus sign) to find only pages that contain a match for all the specified words; exclusion operators (such as a minus sign) to find pages that contain certain words but not others; and wildcards—symbols such as asterisks or question marks that stand for one or more characters.

n You may also want to use Boolean search strategies to improve your searches. To conduct a Boolean search, type an operator such as AND, OR, or NOT to link the keywords in the search box.

l The AND operator will result in pages that include all keywords connected by the operator. For example, if you use the word telescope as your keyword, the search engine will list pages containing information about every type of telescope. But if you are primarily interested in reflecting telescopes, you can use the Boolean search telescope AND reflecting to see pages that include both terms.

l The OR operator will result in pages that include either of the keywords connected by the operator. For example, the search phrase telescope OR microscope will display pages about either telescopes or microscopes.

Apply 2

Being able to understand the information supplied in a URL will help you use the Web more efficiently. In this activity, you will apply what you have learned about URLs.

1. With your teacher’s permission, use the Internet to locate a Web site with a URL that includes an international country code.

2. Copy the URL to a word-processing document.

3. Write a brief paragraph explaining the parts of the URL, including the country code.

4. Include a table in your document that lists country codes for at least ten countries, including the one you have already located.

5. Format the document and the table to improve visual appearance and reading comprehension.

6. Share your paragraph with a partner or the class.

Page 7: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 7

l The NOT operator excludes pages that might ordinarily be included in search results. The search phrase tablet computers NOT iPad would exclude iPad pages from the search results.

n Note that many search engines in wide use today do not necessarily follow Boolean search protocols because they use different algorithms to select and display search results. A search string such as island resorts NOT Hilton Head is likely to return a number of Hilton Head sites in a search engine such as Google or bing.

Using Web Tools to Display and Share Content

n The Internet makes it easy to share content using specialized tools for downloading and transferring content. File Transfer Protocol (FTP), for example, lets you transfer files from an FTP server to your computer in an operation called downloading. In uploading, you transfer files from the client to the server. Once you’ve stored a file on an FTP server, you can distribute the URL so that your friends can also download the file from the server.

n Telnet is an older protocol that lets users access files on remote computers. Telnet has largely been replaced by SSH and SSH2, which are encrypted and therefore more secure than telnet.

n The larger a file is, the more time it takes to travel over a network. File compression is a way of reducing file size so a file can travel more quickly over a network. If you are sending a large file, it is important to compress it. The most widely used compression software for a Windows system is WinZip®. Macintosh computers use a program called StuffIt™ to compress files and a utility called StuffIt Expander to decompress files.

n It’s important to exercise caution when downloading files from the Internet, especially program files. Files are commonly used to transmit viruses. It’s a good idea to check all downloaded files for viruses before saving them. You can also minimize the risk of getting a virus from a file by converting document files to PDF format. PDFs are less likely to contain viruses, and they can also be smaller than original document files.

n Many Web sites include mini programs called plug-ins. Plug-ins are embedded in a Web site to add a feature or function, such as a search engine or video player. One of the most well-known plug-ins is Adobe Flash Player. Plug-ins are complete programs and can even be installed on computers or other devices without a browser.

Figure 3

A bing search using the Boolean operator AND finds pages for reflecting telescopes.

Page 8: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 88 Computers and Software

Internet Ethics

n How people use computers, including networks and e-mail, can affect other people. People who practice ethics behave morally. Ethical computer users respect others and make sure their actions do not harm anyone.

n One way you can act ethically is to follow your organization’s acceptable use policy, or AUP. These policies identify the responsibilities of Internet use. They spell out certain rules of behavior and explain the consequences of breaking those rules.

n The federal government provides regulatory control over material you may find on the Internet. Copyright laws, the Fair Use Doctrine, and trademarks and patents should always be considered as part of ethical Internet behavior.

l Copyright laws protect individuals and companies from the theft or misuse of their intellectual property, such as creative, literary, or artistic work. Copyright exists as soon as a work is created, but the creator can register it with the U.S. Copyright Office. It is a crime to copy this kind of work without the permission of the person who owns the copyright to it.

l If the content is protected by copyright, you must have permission from the copyright holder to use the work. However, part of copyright law called the Fair Use Doctrine allows you to use a limited amount of copyrighted material without permission for educational purposes. For example, you can quote a few lines of a song or a passage from a book. Similarly, an author may issue a creative commons license allowing others to use the work.

l Some intellectual property is protected by trademark or patent. A trademark is a symbol that indicates that a brand or brand name is legally protected and cannot be used by other businesses. A patent is the exclusive right to make, use, or sell a device or process. Many types of inventions can be patented.

n Two other ethical challenges may arise when using the Internet: software piracy and plagiarism.

Software Piracyn Software piracy is the illegal copying of computer

programs. It is estimated that about one-third of all software in use is pirated.

n Most programs that you buy are licensed only to the purchaser. In other words, it is illegal for you to copy such a program and give it to a friend. It is also illegal to accept a copy of software from someone else. When you use pirated software, you are violating U.S. copyright laws, and punishments can be serious: If you are convicted of copyright infringement, you can be fined up to $250,000 or sentenced to jail for up to five years—or you may be both fined and sentenced.

n Software piracy affects software publishers. They lose money when people use illegal copies of programs to avoid paying for legitimate copies.

Plagiarismn If you do not cite your sources, you are guilty

of plagiarism, which is the unauthorized use of another person’s ideas or creative work without giving that person credit. Plagiarism is equivalent to stealing another person’s work and passing it off as your own.

n The consequences of plagiarism can be quite significant. If you plagiarize work in school, you may have to redo the assignment or lose credit altogether. Your school may also take disciplinary actions, such as detention. In the professional world, the consequences of plagiarism are even more significant. A professional who plagiarizes work suffers a loss to his or her reputation and may face legal ramifications, such as a lawsuit.

n To avoid plagiarism you just need to properly cite your sources. You should insert a citation when you quote, summarize, or paraphrase someone else, use someone else’s idea, or reference someone else’s work. In a works cited section or footnote, you tell the reader the source of your credited information.

Page 9: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 9

Apply 3

In this activity, you will search the Internet to learn what types of information are protected by copyrights and what you legally can and cannot use. Then, you will use a word-processing program to make a top-ten list of facts about copyright laws.

1. Working with a partner and a table in which to record information, fill in one column with what you already know about copyright laws, creative commons, public domain, and open source regulations. Fill in another column with what you want to know.

2. With your teacher’s permission, open your Web browser and navigate to a search engine.

3. Use the search engine to find information about copyright laws.

a. Search for keywords from your table.

b. Look for sites that explain what information you can and cannot use according to copyright laws.

c. Research illegal acts such as software piracy, as well as patent and trademark infringement.

d. Find sites that explain the consequences of violating these copyright laws in simple, easy to understand language.

4. Evaluate each site you visit for accuracy and validity.

5. Write down the source information about each Web page that you use.

6. With your teacher’s permission, print relevant information from the Web sites you find most helpful. You may want to copy the information from the Web page into a word processing or notes program, along with the page’s URL, and then print it.

7. Using your browser’s History list, go back to one of the sites that explained the consequences of copyright violations. Mark the site as a favorite or bookmark it.

8. When you have finished your research, exit your Web browser.

9. Use your findings to write ten facts about copyright laws, creative commons, public domain, and open source regulations in a word processing document. Format the items as a numbered list.

10. Insert a page break after the last item in the numbered list. On the new page, insert a sources heading and format it appropriately.

11. On the next line, type a list of the Web sites or other sources you recorded, using a standard reference style such as MLA or APA. Format the sources in a smaller font size than the rest of the document text, and leave one blank line between sources. Remove all hyperlink formatting.

12. Proofread the document carefully. Check the spelling and grammar, and correct any errors.

13. Preview the document. Then, with your teacher’s permission, print the document.

14. Close the document, saving all changes, and exit your word processing program.

15. As a class, brainstorm scenarios that do or do not violate copyright laws.

Page 10: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 1010 Computers and Software

Types of Networks and How They Work

n A computer network is two or more computers connected to one another to share resources such as files and equipment. Each computer has a network interface card that handles the flow of data to and from the computer. Computers may be connected with physical wires that carry data, or the network may be wireless, in which case the data travels through the air using microwave or radio wave technology.

n Networked computers that are near each other form a local area network, or LAN. A LAN might include all the computers in an office or a school; a home network could also be considered a LAN. Computers that are networked over an entire building, or in multiple locations, form a wide area network, or WAN.

n Two common types of network structure are peer-to-peer and client/server networks.

l In a peer-to-peer (P2P) network, each computer is both a client and a server. Information can be shared equally from one computer to another; no specific computer controls the flow of information.

l In a client/server network, one main computer or server controls access, permissions, and all aspects of network use. The server provides a directory, or list, of all resources available on the network. Client computers receive information from the server, usually requiring some form of security such as a user name and password to access the network.

n Networks are maintained by a network administrator. A network administrator may design, install, and monitor both the hardware and software required for the network. A network administrator also pays special attention to security to keep the network safe from trespassers and viruses.

Networking and Emerging Technologies

Apply 4

In this activity, you will explore more information about types of networks and how they are structured.

1. With your teacher’s permission, conduct research in the library or on the Internet to find more details about different types of networks, including LANs, WANs, the Internet, and intranets.

2. Compare the advantages and disadvantages of peer-to-peer and client/server networks. If you can find illustrations of these network types, ask your teacher for permission to download and save them as files so you can use them in your report. Make sure to copy the source information for these images.

3. Explore the different operating capabilities of wired and wireless networks and the conditions under which they are appropriate.

4. Present your findings in a word processed document. Include in the document any images you were able to find to explain network architecture and functions.

5. Cite your sources of information and illustrations in MLA or APA format.

6. With your teacher’s permission, print your report and share it with the class.

Page 11: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 11

Benefits and Risks of Networked Computing

n People using a network can collaborate more easily than those working on standalone systems. Everyone on a network has the ability to access programs and data stored anywhere on the network. You might use an application such as Google Docs which is stored on a network rather than on your own computer, or you might print a document on a printer that is located on a different floor than your computer. Teams can function more efficiently when all members can access files from a network location.

n Networked computing also has risks. Anyone who is able to access the network, either legally using a password or illegally by hacking into the network, can gain access to sensitive files that might include financial or health data or proprietary company information. One of the most important tasks of a network administrator is to keep a network safe not only from careless users who may not follow internal security protocols but also from outside attackers determined to gain access to whatever is on the network.

Relationship between Computer Networks and Other Communications Networks

n “Communications network” used to refer to the widespread system of copper wiring that connected telephones throughout the world. Now copper wiring is being replaced by fiber-optic cables, strands of fiberglass that transmit digital data by pulses of light. These cables can carry large quantities of information, and they transmit data faster and more efficiently than copper wires.

n Fiber-optic cabling and wireless networks have made possible the same types of connectivity found with computer networks.

l Wireless connections, or Wi-Fi, use radio waves to connect devices such as computers or cell phones.

l Teleconferencing and videoconferencing rely on fast network connections and increased broadband width available with fiber-optic cabling.

l “Telepresence” videoconferencing and virtual reality systems also rely on high-end computer networking to supply greater fidelity of motion and sound.

Communicating in the 21st Century

n Today’s high-speed networks, both wired and wireless, are one contributor to the sophisticated ways people now communicate.

n Smart devices such as tablets, smartphones, and wearable technology rely on wireless communication options such as Wi-Fi and Bluetooth and communications satellites to supply information to the user at almost any location.

n Almost instant connectivity has had a tremendous impact on businesses around the world. A shopper can now use an online source to purchase almost anything, at any time of the day or night, on any day of the year. Corporations can form teams with members from widely separated locations who can collaborate by sharing information stored on the cloud, with deep savings in travel costs. Employees can telework, allowing businesses to function more efficiently in smaller office spaces. It is even possible for a surgeon in one city to control a robot to conduct an operation in a different city.

n Emerging technologies such as smart devices have driven a boom in consumer spending, because people are always eager to have the latest version of popular devices. As the science of nanotechnology becomes more widespread and cost-effective, the ability to manipulate matter at the atomic level may lead to ever more sophisticated computers and medical devices.

Figure 4Tablet PCs are a convenient way to keep in touch when you’re traveling.

Page 12: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 1212 Computers and Software

Apply 5

In this activity, you will conduct research to learn about technology trends. Then, you will create a slide presentation to display your findings.

1. With your teacher’s permission, open a Web browser and navigate to a search engine. Search for sites that offer information about technology trends and emerging technologies. Try to identify at least five trends. For example, you might research wireless networks, tablets, touch screens, smartphones, satellite technology, nanotechnology, or smart devices.

a. Try searching for words or phrases such as technology trends, or use a Boolean search such as Technology AND Trends. Review each Web site you visit for accuracy and validity. When possible, find at least two sources for each fact. When you find a Web site with useful information, bookmark the site, or with your teacher’s permission, print the pages. Check copyright guidelines to make sure you may legally use the content. When you have completed your research, close your Web browser.

b. Record the information that you find. Include the name of each trend and a description.

c. If you locate any images or photographs related to the trends, ask your teacher for permission to download and save them as files so you can use them in your presentation. Again, make sure you can use them legally.

d. Record your source citation information.

2. With the information you have recorded, draw a storyboard to map a presentation of at least eleven slides. Use project- and time-management skills to be sure you complete the presentation by the due date.

3. Start your presentation program. Create a new presentation, and save it with an appropriate name in the location where your teacher tells you to store the files for this activity.

4. Apply a theme or design to the presentation.

5. Format the first slide to contain a title such as “What’s New in the Computer World?” and a subtitle such as “Latest Technology Trends.” Insert a footer on this slide only that reads “Prepared by [your full name],” along with today’s date.

6. Develop your presentation, creating one or two slides for each trend you recorded. Select an appropriate slide layout, enter a title, and insert the content. Include a slide listing ways the trends and emerging technologies impact individuals and businesses. On another slide, create a chart that compares and contrasts the trends and technologies.

7. When you have finished creating your slides, proofread each one carefully with a partner or peer editor. Correct any errors in spelling, capitalization, punctuation, or usage.

8. View the slide show and make any changes that you think will improve the presentation value, or make the presentation more effective.

9. Add transitions and animations, and view the presentation again.

10. Add speaker’s notes that you can refer to while delivering the presentation.

11. With your teacher’s permission, print the notes pages for yourself, and print handouts with three slides per page for the class.

12. Rehearse the presentation.

13. Show your presentation to the class and respectfully watch the presentations of your classmates.

14. Close the presentation, saving all changes, and exit the presentation program.

15. As a class, discuss some of the more interesting trends you discovered during your research. What other new developments do you expect to see within the next ten years? In what new ways do you think computers and/or technology will be used in the future? How are these technology trends relevant to daily living, lifelong learning, and future careers?

Page 13: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 13

Diagnosing and Troubleshooting Computer Problems

n When your computer is not working properly, you can use diagnosis and troubleshooting to identify and fix problems. Diagnosing includes steps for figuring out what is causing the problem, and troubleshooting involves solving the problem.

n You can solve many computer problems yourself by taking simple steps. For example, problems can occur when cables or wires become loose. When your monitor goes dark or your keyboard won’t respond, turn the system off and check to make sure all cables are securely connected. Many computers are plugged in to a power strip. Make sure the power strip is on. If your wireless mouse or keyboard stops working, you may need to change the battery in the device.

n Many computer problems—such as a program freezing—can be solved by a simple reboot. When you reboot your computer, you turn it off and then on again. If your computer is unresponsive and you cannot reboot, you may be able to use a key combination to access a troubleshooting menu or restart the computer. On a Windows PC, you can press Ctrl + Alt + Delete.

n If programs do not work correctly, make sure you are running them on a compatible operating system, with at least the minimum operating criteria for the software. Also make sure you have the hardware required to run the software.

n You can often refer to documentation in a manual or online source for troubleshooting information. In addition, many systems come with built-in troubleshooter utilities. Usually these prompt you through a series of questions to diagnose the problem, and they may offer suggestions for action you should take.

n Steps for troubleshooting devices and peripherals are similar to troubleshooting the entire computer system. First, check the cables and connections. Second, turn the device off and then back on. If there is still a problem, you can look for a troubleshooter utility for the device in your operating system’s Help program, or use a device management utility to check that the device is set up properly and that the driver software is installed and up to date. In Windows it is called Device Manager; on Mac systems, it is called Profile Manager.

n If a device stops working, you can update the driver, roll back the driver to a previous version, disable the driver, or uninstall and reinstall it.

n You can often use a utility to restore your system to the state it was in before it stopped working. Windows comes with a Restore utility. You select the date and time to which you want to revert, and Windows runs a program to restore that configuration. Changes that occurred since that date and time are undone, including new software installation or modified system settings.

Caring for a Computer System

Figure 5

A Windows 8 trouble-shooting utility for solving printer problems.

Page 14: Computer Basics - Pearson Educationwps.pearsoned.com/.../splash/Computers_and_Software.pdf · 2015. 6. 9. · when the computer is turned off. l Peripherals: Hardware that is separate

Computers and Software 1414 Computers and Software

n Some computers come with recovery CDs or DVDs that you insert into the appropriate drive before rebooting. You may then select from a menu of options for checking and repairing problems.

Software Security

n You can prevent many software problems by keeping your software secure.

n One of the simplest and most important methods of protecting data and keeping your computer running efficiently is to install and use an antivirus program or antimalware program to identify and remove viruses, spyware, and malware. These programs continually monitor your system for dangerous files. Once they find a virus, they delete it or at least quarantine it so it can do no harm.

n Simply installing an antivirus program is not enough to protect your computer. New viruses are created every day. Software publishers update their antivirus programs to defeat each new attack. You must update your version of the program to take advantage of these changes. Fortunately, the companies generally make it easy to download updates over the Internet.

n To protect yourself from viruses, follow these simple rules:

l Install an antivirus program on your computer and keep the program up to date.

l Always check files that you download from the Internet for viruses before saving them to your hard drive.

l If your antivirus program can do so, set it to monitor incoming e-mail messages and to check files.

l Always check the disks you borrow from someone else before using them on your computer.

n To help block unauthorized users from accessing your computer through a network, you can install and activate a firewall. A firewall is a program that restricts unauthorized access. Most operating systems, including Microsoft Windows, come with a firewall, and so do many antivirus programs.

n Backing up is simply creating a copy of the data on your hard drive that is stored separately in an offsite or remote location away from the hard drive. You can back up data manually or use a program that performs the backup automatically on a set schedule.