Professional Documents
Culture Documents
Overview
This chapter presents a broad survey of concepts and terminology related to computers. The idea
of computer literacy is introduced. You discover what a computer is and what it does. You learn
about the components of a computer, the power of computers, computer software, and networks
and the Internet. Categories of computers are identified, including personal computers,
minicomputers, mainframe computers, and supercomputers.
You discover how people employ computers, from home users to large business users. Finally,
you learn how people use computers to provide information. Reading and understanding the
material in this chapter should help you better understand these topics as they are presented in
more detail in the following chapters.
computer literate. Being computer literate means you have knowledge and understanding of
computers and their uses.
Back to Top
store huge amounts of data and information; and communicate with other computers. Computers
allow users to generate correct information quickly, hold the information so it is available at any
time, and share the information with other computer users.
Back to Top
Discuss the uses of the Internet and the World Wide Web
The worlds largest network is the Internet, which is a worldwide collection of networks that
links together millions of businesses, government agencies, educational institutions, and
individuals. Users connect to the Internet to send messages, access information, shop for goods
and services, meet or converse with other users, and access sources of entertainment and leisure.
Most users connect to the Internet through an Internet service provider (ISP) or an online service
provider (OSP). The World Wide Web is a popular segment of the Internet that contains billions
of documents called Web pages. These documents can contain text, graphics, sound, video, and
built-in connections, or links, to other Web pages stored on computers throughout the world.
Back to Top
and computers usually connected to a network. The power user such as an engineer, architect,
or desktop publisher typically works with multimedia, which combines several media
elements into one application, and requires the capabilities of a workstation or other powerful
computer.
Back to Top
Expand Your
Knowledge
1. Computer literacy
6. Networks
2. Computer
7. The Internet
3. Computer components
8. Computer categories
4. Computer power
5. Computer software
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
Computer Literacy
It is difficult to think of a field in which computers are not used. In addition to general-purpose
computers, special-purpose computers are used in everything from automobiles to electric razors.
Consider how computers have influenced our daily lives, both positively and negatively. (To err
is human, but to really foul things up requires a computer. Anonymous, from a BBC Radio
broadcast.) List ways in which computers are being used today. What is the most common use?
What is the most unusual use? As a result of the expanding use of computers, in 1986 Florida
became the first state to demand computer literacy of all students by grade 12.
Back to Top
Computer
Although computers are thought of as a relatively recent innovation, the term computer has a
long history. Prior to 1940, computer was a job title that referred to anyone performing
calculations.
Consider how data is different from information. Data is processed into information. Clifford
Stoll lecturer, computer security expert, and author of Silicon Snake Oil: Second Thoughts on
the Information Superhighway notes a wide gap between data and information. Stoll insists that
information has a pedigree, or lineage. Its source is known, whether by a respected professor or a
seventh grader. The Internet has great gobs of data, Stoll maintains, and little, little
information.
The first three operations in the information processing cycle input, process, and output are
performed to process data into information, while the fourth operation storage refers to a
computers electronic reservoir capability. Think about how we perform each phase in the
information processing cycle in the human computer (i.e., the human brain) while completing
a common task, such as learning a telephone number.
Back to Top
Computer Components
Different types of input devices are designed to transmit different types of data or to transmit
data in different ways. Think of other input devices (joysticks, scanners, digital cameras, and so
on) and the different types of data they transmit or the different ways they transmit data.
Because it is more lasting than output from a monitor or speaker, the printers output often is
called hard copy. Think of other output devices with which you are familiar (data projectors,
computer output microfilm, and so on).
Some computer components are considered internal, while others are considered external.
External components are called peripherals. Input, output, and communications devices often
are peripheral devices.
The difference between the temporary character of memory and permanent nature of storage will
be made painfully clear the first time you experience a power failure while working on a
computer. Think of other examples of storage devices (magnetic tape, PC Cards, and so on).
The capability to communicate may be one of the most significant factors influencing how
computers are used now and in the future.
Back to Top
Computer Power
In one billionth of a second, an electronic signal travels almost 12 inches. This means that
todays supercomputer (the fastest, most powerful, and most expensive category of computers)
can perform 1.8 trillion operations per second. If a person did one arithmetic operation a second
without stopping, it would take more than 31,000 years to perform the number of operations a
supercomputer can do in one second. Researchers predict that one day computer speed will be
measured in exaflops, or one quintillion (1 x 1018) calculations per second.
The reliability of computer components often is measured in MTBF (mean time between failure,
in hours). A typical component might be rated 10,000 MTBF.
Although the term computer error is widespread, most computer errors can be traced to human
mistakes. Consider instances of computer error with which you are familiar. How might human
blunders have resulted in the computer error? Why are people apt to blame computers?
Supercomputers have more than 600 gigabytes of memory, meaning that they can store more
than 600 billion letters, numbers, and special characters, and have 2 terabytes (2 trillion bytes) of
disk space. Equally important is the speed at which data can be retrieved, processed, and stored
again.
Connected computers can share each operation in the information processing cycle. To recognize
the value of communication, imagine trying to solve a problem individually, and then trying to
solve the same problem with the assistance of several classmates.
Back to Top
Computer Software
The difference between computer hardware and computer software is important. A 3-inch
floppy disk is hardware; however the programs stored on it are software. Programs or software,
like data, are input into the computer.
Because you interact with it directly, you may be more consciously aware of application software
than system software. Remember that system software determines how you interact with
application software. Popular operating systems include DOS (Disk Operating System),
Windows 3.x (technically, not an operating system but an operating environment that makes DOS
easier to use), Windows 95, Windows 98, Windows 2000, Windows XP, Mac OS, OS/2, UNIX,
Linux (rhymes with cynics), and NetWare. DOS was developed by Microsoft for IBM personal
computers. DOS started Microsofts climb to the top of the software world -- at one time,
versions of DOS were used worldwide by more than 100 million people. DOS has a commandline interface, meaning that people have to memorize and type instructions.
Today, operating systems with a graphical user interface, such as Microsofts Windows, are far
more popular.
Most application software packages are designed to be used with specific operating systems.
Much of the software with which you are familiar is packaged software. Because of their
complexity, most software programs are written by teams of programmers working together. Just
as people understand a variety of spoken languages (English, French, Chinese, and so on),
computers recognize a number of programming languages.
Back to Top
Networks
A network with which you might be familiar is the school computer lab. Consider resources that
can be shared on a network. For example, the school computer lab may share a single printer.
Think of advantages of sharing resources. Why are most business computers part of a network?
Back to Top
The Internet
Estimates claim that more than 50 percent of U.S. homes are connected to the Internet, and more
than 13 million do so through an online service provider. Although the growth rate of the Internet
and online services has slowed from a peak of more than 140 percent in 1994-95, the growth rate
still is around 20 percent annually. Surveys show the number of Web site visitors continues to
expand rapidly, practically doubling every year. Interestingly, surveys show that teenage boys
and girls are accessing the Internet for different reasons. While boys seem to focus on
entertainment, girls use the Internet more for schoolwork and chat.
Back to Top
Computer Categories
In addition to differences in size, speed, processing capabilities, and price, other factors, such as
the size of main memory and number of peripheral devices, also can be considered when
categorizing computers. Rapid changes in technology make it difficult to define categories
precisely. As a rule of thumb, todays PCs have about as much memory and processing power as
the mainframes of a decade ago.
Think of personal computers with which you are familiar. How is the computer used? What
factors influence the choice of a personal computer? In addition to such obvious considerations
as processing speed and amount of memory, less apparent factors, such as available software or
even the computers footprint (the amount of space it occupies on the work surface) also may
be important. A desktop computer monitor often is placed on top of the system unit case. This
sometimes can be an ergonomic problem, forcing users to look up. Server computers often are
used in academic environments. What features of server computers would make them
particularly attractive to schools? In todays mobile society, notebook computers have become
indispensable tools. Since 1993, sales of notebook, and smaller computers have rivaled sales of
larger systems, partly because of their enhanced capabilities and increased use by field sales
forces. The capabilities of handheld computers also continue to expand. Visor, a new handheld
computer from Handspring, is an electronic organizer but also offers video games, a cell phone, a
modem, an MP3 player, and a two-way pager. Called the Swiss Army knife of handheld
computers, Visor uses the Palm operating system, which is the same operating system used by
the Palm Pilot, a popular handheld computer from 3Com, and is available for about $200.
The growing movement toward decentralization in business, coupled with the increasing power
of mid-range servers, has led to a recent trend away from mainframe computers and toward midrange servers. What advantages might mid-range servers have over mainframe computers for a
business?
Organizations that deal with huge, constantly changing collections of data accessed
simultaneously by many users, such as banks, insurance companies, universities, and
government agencies, often use mainframe computers. Despite this, mainframe sales are
declining approximately 10 percent per year.
One of the most important features of supercomputers is their capability to create complex,
three-dimensional images almost instantaneously. Television networks often use supercomputers
to generate complicated images and then give viewers the sense of going through the image.
Due to their size and expense, only large businesses and government agencies use
supercomputers. IBMs Option Blue supercomputer was used by the Department of Energy to
simulate nuclear explosions, allowing the effects of aging and adverse conditions on nuclear
weapons to be explored without underground detonations.
Back to Top
Individuals in higher income levels have greater access to the Internet than people in
lower levels, and the gap may be growing.
African-Americans earning less than $40,000 are less than half as likely to own a
computer as whites in the same income group.
Networks have changed the face of both small and large business. In the 1970s, executives
usually worked with monthly reports; in the 1980s, they used weekly reports; today, daily or
even hourly reports are available. How have computers affected the efficiency of businesses?
What impact have computers had on the interpersonal side of business (i.e., employee and
customer relationships)? How have computers changed peoples jobs? Have computers cost any
people their jobs?
Back to Top
Web Publishing
With todays Web page authoring software, children as young as 10 years old, and sometimes
younger, can create and publish their own Web pages. If you created a Web page, what type of
information would you provide? Why? Would you be interested in seeing someone elses Web
page? Why or why not? If you have created a Web page, what type of software did you use?
What was the most difficult part of creating your Web page?
Back to Top
Overview
7. Define Webcasting
3. Identify a URL
This chapter introduces one of the most significant innovations of the past half century the
Internet. The Internet is defined, and the history of the Internet is detailed. You discover how the
Internet works and learn about Internet service providers and online services, connecting to the
Internet, how data travels the Internet, and Internet addresses. The World Wide Web, search
engines, and multimedia on the Web are explained. You become familiar with Webcasting,
electronic commerce, Web publishing, and other Internet services including e-mail, FTP, Telnet,
newsgroups, mailing lists, chat rooms, and instant messaging. Finally, netiquette, the Internet
code of acceptable behavior by users, is described.
Identify a URL
The most widely used service on the Internet is the World Wide Web. The World Wide Web
(WWW or Web) consists of a worldwide collection of electronic documents called Web pages.
A browser is a software program used to access and view Web pages. Each Web page has a
unique address, called a URL (Uniform Resource Locator), that tells a browser where to locate
the Web page. A URL consists of a protocol, domain name, and sometimes the path to a specific
Web page or location on a Web page. Most URLs begin with http://, which stands for hypertext
transfer protocol, the communications standard that enables pages to transfer on the Web.
Back to Top
Recognize how Web pages use graphics, animation, audio, video, and virtual
reality
Many exciting Web pages use multimedia. Multimedia refers to any application that integrates
text with one of the following elements: graphics, sound, video, virtual reality, or other media
elements.
A graphic is a digital representation of information such as a drawing, chart, or photograph. Two
common file formats for graphical images on the Web are JPEG (Joint Photographic Experts
Group) and GIF (Graphics Interchange Format), which use compression techniques to reduce
the size of graphics files and thus speed downloading.
Animation is the appearance of motion created by displaying a series of still images in rapid
sequence. One popular type of animation, called an animated GIF, uses computer animation and
graphics software to combine several images into a single GIF file.
Audio is music, speech, or any other sound. A common format for audio files on the Web is
MP3, a popular technology that compresses audio. More advanced Web audio applications use
streaming audio, which transfers audio data in a continuous and even flow, allowing users to
listen to the sound as it downloads. Video consists of full-motion images that are played back at
various speeds. Video files often are quite large in size. The Moving Pictures Experts Group
(MPEG) defines a popular video compression standard. Streaming video allows you to view
longer or live video images as they are downloaded.
Virtual reality (VR) is the use of computers to simulate a real or imagined environment that
appears as a three-dimensional (3-D) space. A VR world is an entire 3-D site that contains
infinite space and depth.
Back to Top
Define Webcasting
Pull technology is a method of obtaining information that relies on a client such as your
computer to request a Web page from a server. On the other hand, Webcasting, also called push
technology, is a method of obtaining information in which a server automatically downloads
content to your computer at regular intervals or whenever updates are made to the site.
Webcasting saves time by delivering information at regular intervals and allows users to view
Web content when they are offline, that is, when they are not connected to the Internet.
Back to Top
Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat
rooms, and instant messaging work
A variety of services are used widely on the Internet, including e-mail, FTP, newsgroups and
message boards, mailing lists, chat rooms, and instant messaging. E-mail (electronic mail) is the
transmission of messages and files via a computer network. You use an e-mail program to
create, send, receive, forward, store, print, and delete messages. To receive messages, you need
an e-mail address, which is a combination of a username and a domain name that identifies a
user.
FTP (File Transfer Protocol) is an Internet standard that allows you to upload and download
files with other computers on the Internet. An FTP server is a computer that allows you to use
FTP to upload files to, and download files from, an FTP site. With anonymous FTP, anyone can
transfer some, if not all, available files. A newsgroup is an online area in which users conduct
written discussions about a particular subject. The computer that stores and distributes
newsgroup messages is called a news server. You use a program called a newsreader to access a
newsgroup, read previously entered messages (called articles), and add (post) messages of your
own.
A thread consists of the original article and all subsequent related replies. In a moderated
newsgroup, a moderator reviews articles and posts them, if appropriate. A message board is a
popular Web-based type of discussion group that does not require a newsreader and typically is
easier to use than a newsgroup. A mailing list is a group of e-mail names and addresses given a
single name. To add your e-mail name and address to a mailing list you subscribe to it; to
remove your name, you unsubscribe.
A chat is real-time (meaning everyone involved in the chat is online at the same time) typed
conversation that takes place on a computer. A location on an Internet server that permits users to
chat is called a chat room. Some chat rooms support voice chats and video chats, where you
can hear or see others and they can hear or see you as you chat. A chat client is a program on
your computer that allows you to connect to a chat server and start a chat session. Instant
messaging (IM) is a real-time Internet communications service that notifies you when one or
more people are online and then allows you to exchange messages or join a private chat room.
Back to Top
Avoid sending flames (abusive messages) and spam (unsolicited junk mail).
Use abbreviations (such as BTW for by the way) for popular phrases.
Expand Your
Knowledge
1. The Internet
7. Webcasting
8. E-Commerce
3. URLs
9. Web Publishing
11. Netiquette
The Internet
The Internet has had a profound affect on the world of computers. Microsoft CEO Bill Gates
claims, The Internet is pervasive in everything were doing. The Internet also has assumed an
increasing prominence in the world at large. Today, the letters www seem an omnipresent part
of advertisements on buses, billboards, and magazines.
The Internet, as it is known today, was born in 1983 when ARPANET was split into two
interconnected networks: ARPANET and MILNET. The size of the Internet doubled when
NSFnet joined the Internet in 1986.
The Internet has proven to be a reliable means of transmitting data. Occasionally, however,
transmission problems do occur. For 30 minutes in the spring of 1995, all of the traffic destined
for MIT was sent through a small wire in Florida, a situation described as equivalent to routing
all of the flights bound for OHare to a driveway.
Back to Top
URLs
On a Web page, a link is a built-in connection to another related Web page or part of a Web page.
A link can be a word, phrase, or image. URLs make it possible to navigate using links, because
each link is connected to a URL. When you click a link, the Web site or document associated
with the URL is displayed. Some people refer to this activity of jumping from one Web page to
another as surfing the Web.
URLs are registered for a standard fee (usually about $70). To acquire an appropriate URL, some
companies are willing to spend a great deal more for a URL that already has been registered.
Recently, eCompanies paid an entrepreneur $7.5 million for a Web address. This more than
doubled the previous record Compaqs purchase of altavista.com for $3 million.
Back to Top
The limitations of search engines. A query about mustangs on the American plains might
produce results involving Southern Methodist University's football team and the Ford car.
The nature of queries. While a traditional researcher, such as a librarian, uses queries
averaging 14 words, the typical Internet query is just over one word.
The creators of Web pages. Developers of commercial Web pages sometimes distort
results by repeating frequently requested keywords in the background, where spiders see
them but people do not.
Despite these difficulties, search engines are among the most popular sites on the Web. When
choosing a search engine, experts suggest that novice users, and users looking for obscure
information, turn first to the larger search engines (AltaVista, Yahoo!, Lycos, and so on) because
they are easiest to use and cast the largest net.
Back to Top
seniors use the Web more than catalogs or guidebooks; about 80 percent of college-bound
students start looking at college Web sites as sophomores.
News Web pages are the most popular Web sites among Americans with access to the Internet.
Although these Web sites often are associated with newspapers, magazines, television stations, or
radio stations, some are published only online, without a related print or broadcast media.
Portal Web pages often offer the following free services: search engine, news, sports and
weather, free personal Web pages, reference tools, shopping malls, e-mail, instant messaging,
newsgroups, and chat rooms. The dictionary defines a portal as a door or gateway. Portal Web
pages are gateways to a host of services.
Personal Web pages sometimes use Web cams to provide minute-by-minute views of life in a
dorm room, an apartment, a new-born babys crib, or even the inside of a refrigerator. One
devotee of these personal Web pages says visitors often develop a sort of relationship with the
Web page developer. Perhaps this observation is true; some personal Web pages receive more
than 1,000 hits a day.
Back to Top
Webcasting
Some people use Webcasting to download copyrighted material, such as music, from Web sites.
Many young, unknown musicians see music Web sites as a way to gain exposure, but some
already-popular musicians see sharing music on Web sites as little more than theft. The heavy
metal rock band Metallica sued Napster (a music Web site) for copyright violations. A number of
colleges have placed a ban on music Web sites. These schools maintain that students
downloading and sharing music creates a tremendous amount of traffic, clogging the schools
computer systems. As a result, the schools are using filtering software to deny access to music
Web sites. Several student groups have formed to protest this response.
Back to Top
E-Commerce
Today, more than 50 percent of Web sites are commercial. Online product sales total more than
$6 billion, which represents a twelve-fold increase in just five years. These numbers should be
kept in perspective in 1999, e-commerce still represented only 0.5 percent of U.S. consumer
spending.
Business to consumer e-commerce often allows buyers to purchase directly from businesses,
eliminating the middleman and thus providing goods and services at lower costs. Other
advantages of e-commerce include:
global presence
two-way communication
decreased costs
Businesses advertise with their own Web site or on another companys Web site. The most
successful Web advertisements are on popular sites, such as search engines. In terms of audience,
advertising on the Web is expensive. The cost to reach 1,000 consumers is about $75 on the Web,
$60 in a newspaper, $44 in a magazine, and $5 on television. Yet, Web advertisements do offer
advantages:
Unlike traditional media advertising, which is passive (and often ignored by the
audience), Web advertising is interactive. The audience expresses an interest in the
product by clicking a hyperlink and choosing to view a Web ad.
For many products, Web users are the ideal customers. Web users tend to be students or
highly educated consumers in their late 30s, with average incomes of about $55,000.
What products could benefit most from advertising on the Web. Why?
Back to Top
Web Publishing
Deciding upon the purpose of the Web site and the audience for whom it is intended will make it
easier to determine what should and should not be included on the Web site. Web publishing is
an increasingly commonplace Internet activity. With the assistance of word processing packages,
Web page authoring software, or Web sites that assist in the creation of Web pages, even
elementary school children are developing personal Web pages.
Back to Top
Internet Services
It is estimated that the number of e-mail users has increased 300 percent during the past five
years, and the number of e-mail messages sent per day has increased 400 percent. While its
growth has been phenomenal, not everyone is happy with e-mails ever-increasing use. In a
business setting, some feel that e-mail can be counter-productive. They contend that employees
spend too much time writing and reading e-mail on inconsequential topics subjects they never
would commit to paper. In a social setting, some wonder if e-mail is fitting in every situation.
Although e-mail is suitable for casual messages, most believe it is inappropriate for more serious
or formal communication, such as a wedding invitation. How do you feel about these
reservations regarding e-mail?
Many files on anonymous FTP sites are public domain software, freeware, or shareware. Public
domain software is not copyrighted and therefore can be distributed at no cost. Freeware also is
available at no cost but, because it is copyrighted, it cannot be resold. Shareware can be
downloaded and tried for free, but a license fee must be paid if the software is kept. Shareware
users who pay the license fee may receive a manual, notification of new releases or tips, and
access to technical support. The quality of freeware, public domain software, and shareware
varies greatly.
The real-time character of chat makes chat rooms different from newsgroups or mailing lists. The
extent to which a chat room is monitored varies. In some chat rooms, particularly those aimed at
adults, a monitors presence hardly is noticed. Chat rooms intended for minors, however, often
are monitored closely. Chat rooms can be an invaluable experience for children, letting them
share thoughts and ideas with people their own age from around the country, or even around the
world. Yet, to ensure that content is appropriate, parents may want to oversee a childs first few
chat room visits.
Back to Top
Netiquette
Netiquette can be applied to all aspects of the Internet. Which netiquette rules are most
important? Which rules are least important? Why? What rules, if any, would you add? In her
book, Guide for the Turn-of-the-Millennium, syndicated columnist Judith Martin (Miss Manners)
offers guidelines for use of the Internet and other technological innovations. Web sites such as
http://www.fau.edu/netiquette/netiquette.htm also offer advice on Internet manners.
Back to Top
Overview
This chapter discusses the role of the system software with respect to application software. It
then presents an overview of several productivity software applications, graphic
design/multimedia software applications, home/personal/educational software applications, and
communications software applications. The chapter then identifies various Web applications.
Finally, learning aids and supports tools within application software products are presented.
Back to Top
System software consists of programs that control the operations of a computer and its devices.
System software serves as the interface between a user, the application software, and the
computers hardware. One type of system software is the operating system. Before application
software can be run, the operating system, which contains instructions that coordinate the
activities among computer hardware devices, must be loaded from the hard disk into the
computers memory.
Back to Top
Identify the widely used products and explain the key features of
People use productivity software to become more effective and efficient while performing daily
activities. Word processing software allows users to create and manipulate documents that
contain text and graphics. With word processing software, you can insert clip art into a
document; change margins; find and replace text; use a spelling checker to check spelling;
place a header and footer at the top and the bottom of a page; and vary font (character design),
font size (character scale), and font style (character appearance).
With spreadsheet software, data is organized in rows and columns, which collectively are called
a worksheet. The intersection of a row and column, called a cell, can contain a label (text), a
value (number), or a formula or function that performs calculations on the data and displays the
result.
Database software allows you to create and manage a database. A database is a collection of
data organized to allow access, retrieval, and use of that data. A query is used to retrieve data
according to specified criteria, which are restrictions the data must meet.
Presentation graphics software is used to create presentations that communicate ideas,
messages, and other information to a group through a slide show. You can use a clip gallery to
enhance your presentation with clip art images, pictures, video clips, and audio clips.
A personal information manager (PIM) is software that includes an appointment calendar to
schedule activities, an address book to maintain names and addresses, and a notepad to record
ideas, reminders, and important information. A software suite is a collection of individual
applications sold as a single package.
Project management software allows you to plan, schedule, track, and analyze the progress of a
project. Accounting software helps companies record and report their financial transactions.
Power users often use software that allows them to work with graphics and multimedia.
Computer-aided design (CAD) software assists in creating engineering, architectural, and
scientific designs. Desktop publishing (DTP) software is used to design and produce
sophisticated documents. DTP is developed specifically to support page layout, which is the
process of arranging text and graphics in a document. Paint software is used to draw graphical
images with various on-screen tools. Image editing software provides the capability to modify
existing images. Video editing software and audio editing software can be used to modify
video and audio segments.
Multimedia authoring software is used to create electronic interactive presentations that can
include text, images, video, audio, and animation. Web page authoring software is designed to
create Web pages and to organize, manage, and maintain Web sites.
Many software applications are designed specifically for use at home or for personal or
educational use. Integrated software combines several productivity software applications that
share a similar interface and common features into a single package. Personal finance software
is an accounting program that helps pay bills, balance a checkbook, track income and expenses,
follow investments, and evaluate financial plans. Legal software assists in the creation of legal
documents and provides legal advice. Tax preparation software guides users through the
process of filing federal taxes. Personal DTP software helps develop conventional documents
by asking questions, presenting predefined layouts, and supplying standard text.
Expand Your
Knowledge
1. Application software
5. Software
2. System software
6. Web applications
7. Learning aids
4. Starting an application
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
Application Software
Popular types of application software can be categorized by their general use: productivity
software, graphics design/multimedia software, home/personal/educational software, and
communications software. An application can belong to more than one category. For example, an
e-mail program can be considered both productivity software and communications software.
Back to Top
System Software
Many application programs are designed to run with a specific operating system. When shopping
for an application software package, buyers must make sure they have a compatible operating
system. A software package designed to be used with the Macintosh operating system may not
work with the Windows operating system. The operating system version also is important. An
application designed for Windows XP may not work with Windows 3.1. Yet, because most
operating systems are downward compatible, software written for earlier versions of an operating
system (such as Windows 98) usually can be used with recent versions of the operating system
(such as Windows XP).
Back to Top
The user interface plays a key role in application software. Studies have found that GUI users
generally complete tasks more accurately, work faster, are more productive, and feel less fatigue
than users of a text interface. The Macintosh operating system the first popular GUI actually
was developed from an earlier GUI-based operating system created by Xerox.
The first version of Windows (1985) imitated the Macintoshs GUI (Apple sued Microsoft,
unsuccessfully, for copyright infringement). Although some users still feel the Macintosh
interface is superior, today some form of Windows is used on almost 90 percent of personal
computers. Because of this, even competitive products often use similar features, such as the
same menu names.
Back to Top
Starting an Application
To click an object on the screen, you move the pointer to the object and then press and release a
button on the mouse. Often, applications also can be started by double-clicking the icon that
represents the application.
When an application is started, the right-hand corner of the application window title bar usually
displays three buttons:
Minimize When clicked, this button reduces a window to a button on the taskbar.
Restore When clicked, this button returns a window to its initial size. When a
window does not fill the desktop, the Restore button is replaced by a Maximize button
that, when clicked, enlarges the window so it covers the entire desktop.
Close When clicked, this button closes the window. The Close button removes the
window from the desktop and its button from the taskbar.
A dialog box can contain option buttons, check boxes, text boxes, and command buttons. Option
buttons stipulate desired alternatives; check boxes turn specific capabilities on or off; text boxes
allow text to be entered; and command buttons immediately perform an action, such as
implementing (OK) or ignoring (Cancel) the choices made in a dialog box. Shortcut menus can
change depending on where the pointer rests when the mouse is right-clicked. Dimmed
commands on a menu or shortcut menu are unavailable.
Some applications use automatically display a smart tag when you perform a certain action.
Clicking the smart tag displays a menu of commands related to the action.
Back to Top
Software
Word processing software is used for creating, editing, formatting, saving, and printing
documents. In the modern office, word processing software has replaced the typewriter for
almost all written work. The editing capabilities of word processing software have altered the
creative process. The freedom to express yourself without reservation, knowing you easily can
revise what you have written, can improve the quality of written work. It is good practice to save
a document before printing it. When a document is saved, it exists as a file, or named collection
of data, instructions, or information. A file name uniquely identifies each file. Restrictions on file
names once were severe; file names could be no more than eight characters long, and many
characters, including spaces, could not be used. In Windows XP, however, a file name can have
up to 255 characters, including spaces.
Some spreadsheet programs offer more than 200 internal functions. When creating a spreadsheet,
formulas and functions usually must be preceded by a special character (such as =, +, or @) to
distinguish them from labels or values. Formulas use cell references, or addresses, of cells that
contain values. When formulas are copied from one cell to another, the cell references change to
reflect the new location. This update is called relative referencing. Another powerful capability,
called goal-seek, finds what value is needed to reach a specified goal.
While spreadsheet packages can manage data tables of a few thousand records, database software
can efficiently handle much larger data tables. In a database, common data types include text,
numeric, currency, date, memo, hyperlink, and object. When identifying data types, numbers
treated as text (such as zip codes, Social Security numbers, or telephone numbers) sometimes are
referred to as alphanumeric data because they are not used in calculations. The results of a
database query are placed in an ANSWER table.
Although introduced years after word processing and spreadsheet software, presentation graphics
software has had almost as great an impact on business, and on how people do business, as either
of the older applications. Presentations often include an outline with the text from each slide,
audience handouts that can be distributed to the audience, and a notes page with additional notes
for the presenter. Some presentation graphics packages offer templates for various presentations
(company meeting, financial report, marketing plan, progress report, employee orientation,
training, and so on).
PIMs essentially are free style database managers. They are very popular with people who
spend much of their time in business travel. These people, often called road warriors, find PIMs a
valuable part of the arsenal they bring to their daily battles. Like a daily planner, PIMs must be
reviewed regularly to be effective.
Unlike word processing software, DTP software increases hardware requirements. Because of its
relatively low cost (an advanced DTP system can be purchased for less than $10,000) and the
speed, control, security, and flexibility offered by desktop publishing, many companies are using
DTP instead of outside printing firms for their publishing needs.
Paint software and image editing software have had a tremendous impact on commercial art.
Commercial artists praise the capabilities offered by these applications. At the same time, many
feel these applications have led clients to demand more, both in terms of time and expectations.
As a result, some commercial artists believe their income, actually has dropped because of
graphic software.
Most software for home, personal, and educational use is relatively inexpensive. It still pays to
shop around. Prices for some software for home/personal use, such as integrated software, can
vary greatly for the same brand depending on the vendor. Some personal finance packages can
prepare reports on income and expenses, budget, net worth, taxes, and investments.
Personal finance software wizards (automated assistants) can help to balance accounts, prepare
budgets, plan mortgages, calculate savings, and arrange retirements. Legal software is designed
to facilitate creation of standard documents; unusual circumstances might still demand the
services of a lawyer. Tax preparation software also is best used by people in fairly common
circumstances.
For some students, educational software is a welcome alternative to traditional classes, allowing
them to work privately at their own pace. Reference software articles often include links that,
when clicked, display related articles. Because referenced material can change frequently, some
reference software packages can be updated via the World Wide Web.
Computer communications touch everyones life. Consider the ATM that knows a bank
balance even though it is located 500 miles from the bank. Many e-mail programs allow users to
send registered mail with a return receipt guaranteeing the recipient received the message. Email and personal information management (PIM) software sometimes also are considered part
of groupware. Although e-mail has assumed an important role in business messages, traditional
paper letters and memos still are used In fact, some maintain that the amount of paper
correspondence has increased.
Back to Top
Web Applications
Web applications can be a better buy than packaged applications. For example, a $50 packaged
antivirus program can be replaced by a Web application that costs less than $30 annually, is
updated frequently, and uses less space on a hard disk. In addition, packaged software might
include features you will never use, which increases the cost of the package. Often, you can use
the standard version of a similar Web application for less money or even for free, and only pay
more for the additional features you want. Web applications can save businesses money with
reduced installation, upgrade, and maintenance costs. Some social analysts believe that the lower
cost of Web applications also can help close the digital divide.
For Web application vendors, benefits include easier updating and debugging (error correcting),
removal of packaging and distribution costs, and elimination of software piracy (the illegal
copying and selling of software). Despite their advantages, analysts point out that Web
applications may not be right for everyone. For some consumers, paying a monthly fee
ultimately costs more than the one-time purchase of packaged software. Also, many households
do not have the fast Internet connection needed for certain Web applications to run smoothly.
Finally, some people worry that files stored at a Web application site can be infected with
viruses. Web application vendors believe these worries are groundless and that Web applications
benefit both buyers and sellers.
Back to Top
Learning Aids
In many applications, an audible beep indicates an error, and the last entry should be reviewed.
Function key F1 often is used to activate the Help feature. Some applications have a Help button
that, when clicked, changes the mouse pointer to a Help arrow. This arrow can be used to obtain
help on a command, button, or bar by pointing at the item and clicking. Many software
developers have eliminated users manuals in favor of extensive online Help. Computer stores
occasionally carry a few trade books, but entire aisles of computer-related books can be found in
most large book stores.
For some applications, other learning aids, such as tutorials or keyboard templates, are available.
Tutorials are step-by-step instructions using real examples that show how to use an application.
Tutorials can be printed, software-based, or Internet-based. Keyboard templates (plastic sheets
that fit around a portion of the keyboard) illustrate the keyboard commands for various tasks.
Wizards can be used to help create memorandums, meeting agendas, fax cover sheets, flyers,
letters, resumes, charts, forms, reports, awards, pleadings, calendars, postcards, envelopes,
mailing labels, newsletters, and Web pages. Some applications also offer document templates,
which are special documents that provide basic tools for shaping a final document. The
availability of learning aids and support tools is an important consideration in selecting an
application package.
Back to Top
Overview
Chapter 4 presented the components in the system unit, described how memory stores data,
instructions, and information, and discussed the sequence of operations that occur when a
computer executes an instruction. The chapter included a comparison of various microprocessors
on the market today.
Explain how the CPU uses the four steps of a machine cycle to process data
The central processing unit (CPU), also called a processor, significantly impacts overall
computing power and manages most of a computers operations. The CPU contains the control
unit and the arithmetic/logic unit. The control unit directs and coordinates most of the
operations in the computer. For every instruction, the control unit repeats a set of four basic
operations called the machine cycle: (1) fetching the instruction or data item from memory, (2)
decoding the instruction into commands the computer understands, (3) executing the
commands, and, if necessary, (4) storing, or writing the result to memory. The arithmetic/logic
unit (ALU) performs the execution part of the machine cycle. Specifically, the ALU carries out
three operations:
A personal computers CPU usually is contained on a single chip, which some call a
microprocessor. Intel is a leading manufacturer of personal computer processors. Most highperformance PCs use a processor from Intel called the Pentium processor. A second Intel brand,
called the Celeron, is designed for less expensive PCs. Two more brands, called the Xeon
and Itanium processors, are ideal for workstations and low-end servers. Intel-compatible
processors have the same internal design as Intel processors and perform the same functions, but
are made by other companies and often are less expensive. An alternative design to the Intel-style
processor, the Motorola processor, is found in Apple Macintosh and Power Macintosh systems.
A new type of processor designed for lower-costing personal computers and Internet appliances,
called an integrated CPU, combines functions of a processor, memory, and a video card on a
single chip. Todays processors are equipped with MMX technology, a built-in set of
instructions that manipulates and processes multimedia data more efficiently. Intels SSE
instructions and AMDs 3DNow! are two other technologies that improve a processors
performance of multimedia, the Web, and 3-D graphics. To optimize and extend battery life for
notebook computers, Intel mobile processors use SpeedStep technology and AMD
processors use PowerNow! technology.
Back to Top
The combinations of 0s and 1s used to represent data are defined by patterns called coding
schemes. Popular coding schemes are ASCII, EBCDIC, and Unicode. Coding schemes make it
possible for humans to interact with a digital computer that recognizes only bits. Every character
you type on a keyboard is converted into a corresponding byte, a series of on/off electrical states
the computer can process.
Back to Top
Describe the types of expansion slots and cards in the system unit
An expansion slot is an opening, or socket, where you can insert a circuit board into the
motherboard. These circuit boards called cards, expansion cards, boards, expansion boards,
adapters, adapter cards, interface cards, add-ins, or add-ons -- add new devices or
capabilities to the computer. Four types of expansion cards found in most computers are a video
card, a sound card, a network interface card, and a modem card.
A video card converts computer output into a video signal that is sent through a cable to the
monitor, which displays an image. A sound card enhances the sound-generating capabilities of a
personal computer by allowing sound to be input through a microphone and output through
speakers.
A network interface card (NIC) is a communications device that allows the computer to
communicate via a network. A modem card is a communications device that enables computers
to communicate via telephone lines or other means. Many of todays computers support Plug
and Play, a capability with which the computer automatically can configure expansion boards
and other devices as you install them.
Notebook and other portable computers have a special type of expansion slot used for installing a
PC Card, which is a thin credit card-sized device that adds memory, disk drives, sound,
fax/modem, and communications capabilities to a mobile computer.
Back to Top
Back to Top
Expand Your
Knowledge
2. The CPU
7. Ports
3. Processor comparison
8. Buses
4. Data representation
9. Notebook computers
5. Memory
10. Handheld computers
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
Dual inline package (DIP), which consists of two parallel rows of downwardpointing thin metal feet (pins)
Pin grid array (PGA) package, which holds a larger number of pins because the
pins are mounted on the surface of the package
Flip chip-PGA (FC-PGA) package, which places chips on the opposite side (flip
side) of the pins
Single edge contact (SEC) cartridge, which connects to the motherboard on one
of its edges
Back to Top
The CPU
The power of personal computer processor chips (the chips that contain the CPU) has grown at
an astounding rate. As chips become older and more widely used, price cuts usually are
introduced.
Several factors affect CPU processing speed. CPUs in most of todays personal computers use
pipelining, a technique that increases processing speed by beginning execution of a second
machine cycle instruction before the first instruction is completed. CPUs also use high-speed
storage locations, called registers, to hold data and instructions temporarily. The control unit
relies on a small chip called the system clock to synchronize all computer operations. The speed
at which a processor executes instructions is called clock speed, or clock rate, and is measured
in megahertz (MHz). The system clock is a major factor affecting processor speed. A higher
clock speed means the CPU can process more instructions per second.
Back to Top
Processor Comparison
Although once frequently used, the term microprocessor is much less common today.
Sometimes you can upgrade your processor to increase the computers performance. There are
three forms of upgrades:
With a chip for chip upgrade, the existing processor chip is replaced with a new
one
With a piggyback upgrade, the new processor is stacked on top of the old one
The past three years have seen a steady drop in the cost of computers. PC prices plunged as a
result of lower prices for processors, memory chips, and hard drives. Consumers also are
showing increased interest in new less powerful, but less expensive, personal computers that
work perfectly well for the most popular uses word processing, Internet access, and
spreadsheet applications. The surge in low-priced computer sales has had an impact on Intel, the
worlds largest processor manufacturer. By focusing on making inexpensive processor chips,
rivals AMD and Cyrix are making inroads into Intels dominance. Intels response, the
Celeron, has proven popular, but the lower-priced chip offers a smaller profit margin.
Back to Top
Data Representation
Just as the decimal system (10 digits) is suited to human anatomy (10 fingers), the binary
system (2 digits) is perfect to represent the on-off states (2 states) of a computer. Basic coding
standards make it possible for components within computers to communicate, allow
manufacturers to be confident that the components they produce will operate correctly in a
computer, and enable consumers to purchase components that are compatible with their systems.
In the ASCII-8 and EBCDIC codes, the first four characters represent the zone, and the last four
characters represent the digits 1 through 8. ASCII, originally a seven-bit code, was expanded to
eight bits in an effort to provide for symbols used in other nations. Unicode, a 2-byte (16-bit)
code, can represent 216, or 65,536, characters. The system employs the codes used by ASCII and
also includes other alphabets (such as Cyrillic and Hebrew), special characters (including
religious symbols), and some of the word writing symbols used by various Asian countries.
Back to Top
Memory
Because computers use the binary number system, the actual values for the units in which
memory and storage are measured are based on powers of 2. For example, one kilobyte = 210 =
1,024.
RAMs volatility, and its ability to be changed, are its most distinguishing characteristics. When
RAM is purchased it comes in banks of nine chips eight are needed to represent a byte and the
ninth is needed for parity. RAM chips usually are packaged on small circuit boards called single
inline memory modules (SIMMs) or dual inline memory modules (DIMMs) that are inserted
into the motherboard. During the past 20 years, the price of RAM has dropped an average of 20
percent each year, but its capacity has more than doubled every two years.
Similar to flash ROM, another variation of ROM, called EEPROM (electrically erasable
programmable read-only memory), can be erased electrically and rewritten. Because of its
nonvolatile nature, EEPROM is used in electronic cash registers to store item prices.
The amount of time it takes the processor to read data from memory, called access time, directly
affects how fast the computer can process data. Memory access time is measured in terms of
nanoseconds, or billionths of a second.
Back to Top
Back to Top
Ports
Port connectors are devised to be foolproof each is designed so it can fit only one type of
socket in only one correct position. Serial ports always are male on the system case. Cables
connected to parallel ports often are employed over shorter distances.
Special-purpose ports include:
1394 port a port that can connect multiple devices requiring faster data
transmission speeds such as digital cameras and DVD drives
MIDI (musical instrumental digital interface) port a special type of serial port
designed to connect the system unit to a musical instrument
SCSI (small computer system interface) port a high-speed parallel port used to
attach peripheral devices such as disk drives and printers
IrDA port a port that allows wireless devices to transmit signals to a computer
via infrared light waves
Back to Top
Buses
A highway analogy can help clarify how bus width affects the speed of data transfer. Data moves
like cars the more lanes (greater the bus width) the faster the traffic (data) flow. Ideally, buses
used to transfer data should be large enough to use the processing power of registers. Sometimes,
however, manufacturers reduce bus size to cut costs.
Word size, which indicates the number of bits processed in each machine cycle, has been
compared to the amount of coffee produced with each turn of a coffee grinders handle.
Theoretically, if word size doubles then processor throughput also could double.
The types of expansion buses on a motherboard determine the types of cards you can add to a
computer. Types of expansion buses include:
An ISA (Industry Standard Architecture) bus, the most common and slowest
expansion bus, connects to devices such as a mouse, modem card, sound card, and
low-speed network card
A local bus is a high-speed expansion bus used to connect higher speed devices
such as hard disks
The universal serial bus (USB) and 1394 bus are buses that eliminate the need to
install expansion cards into expansion slots
Back to Top
Notebook Computers
A typical notebook computer often has a keyboard/mouse, IrDA, serial, parallel, video, and USB
ports. The keyboard/mouse port allows users who are uncomfortable with a notebook computers
smaller keyboard and less-traditional pointing devices (often a touch pad or pointing stick) to
connect a full-sized keyboard or a mouse to the computer.
Back to Top
Handheld Computers
One of the most popular handheld computers is the Palm Pilot from 3Com. First introduced in
1996, a recent version, Palm IIIc, offers a color screen and an expandable, full-sized keyboard.
Another pioneering handheld computer is Visor from Handspring. Visor runs the Palm operating
system and features an expansion slot that can accommodate add-ons such as digital cameras and
music players. Visors greatest innovation, however, may be the slot in the back, which can
accommodate modules with various functions including a pager, an MP3 music player,
videogame cartridges, and a module that converts the Visor into a cell telephone.
Back to Top
Chapter 5: Input
| Overview | Expand Your Knowledge | Checkpoint | Practice Test |
Overview
In this chapter, you learn what is input and what are input devices. The keyboard is presented and
different keyboard types are described. You are introduced to various pointing devices, such as
the mouse, trackball, touchpad, pointing stick, joystick, touchscreen, and pen input. Scanners and
reading devices, including optical scanners, optical readers, magnetic ink character recognition
readers, and data collection devices are explained. You learn about digital cameras, audio input,
speech recognition, video input, and videoconferencing. Finally, input devices for physically
challenged users are explored.
Voice input is the process of entering data by speaking into a microphone that is attached to the
sound card on a computer. Voice recognition is the computers capability of distinguishing
spoken words. The first voice recognition programs were speaker dependent. With speakerdependent software, the computer makes a profile of your voice, which means you have to train
the computer to recognize your voice. Today, most voice recognition programs use speakerindependent software, which has a built-in set of word patterns and does not have to be trained to
recognize your voice. Some voice recognition software requires discrete speech, meaning that
you have to speak slowly and separate each word with a short pause. Most voice recognition
products, however, support continuous speech, allowing you to speak in a flowing conversational
tone.
Back to Top
input video from these devices, the device is plugged into a video capture card, an expansion
card that converts the analog signal into a digital signal the computer can understand. A digital
video (DV) camera is a new generation of video camera that records video as digital signals,
instead of using analog signals, and therefore does not require a video capture card. Video files
can demand huge amounts of storage space. Video compression reduces the size of video files by
recognizing that only a small portion of an image changes from frame to frame. Instead of
storing every frame in its entirety, a video compression program might store an initial frame and
then store only the changes from one frame to the next. A video decoder is a card that
decompresses video. A video digitizer can be used to capture an individual frame from a video
and save the still picture in a file.
Back to Top
Whether at work or at home, it may be necessary to obtain input devices that address physical
limitations. Voice recognition is ideal for blind or visually impaired users, but several other input
devices also are available. A keyguard, which is placed over the keyboard, allows people with
limited hand mobility to rest their hands on the keyboard and guides a finger or pointing device
so that only one key is pressed. Keyboards with larger keys and on-screen keyboards on which
keys are pressed using a pointing device also can help. Pointing devices such as small trackballs
controlled with a thumb or one finger and head-mounted pointers also are available for users
with motor disabilities. Two new developments are gesture recognition and computerized
implant devices. With gesture recognition the computer will be able to detect human motions.
Computerized devices implanted in the brain will allow paralyzed individuals to transmit signals
to the computer.
Back to Top
Expand Your
Knowledge
1. Input
2. The keyboard
9. Digital cameras
3. Keyboard Types
4. Pointing devices
5. Using a mouse
12. Scanners and reading devices
6. Mouse types
7. Voice recognition
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
Input
Of the four operations in the information processing cycle input, process, output, and storage
input is the operation to which computer users are most closely linked and on which each
subsequent action depends.
Typed commands use keywords specific words, phrases, or codes that a program recognizes as
instructions. Keywords are an essential element of command-driven programs, such as DOS. The
problem with keywords is that:
This makes command-driven programs difficult to use. Menu-driven programs and graphical
user interfaces eliminate the problems of having to memorize and correctly type keywords.
Back to Top
The Keyboard
Data entered through the keyboard averages about one error for every 300 characters, while data
entered more directly, such as with a scanning device, averages only one error for every 3 million
characters. Nevertheless, the keyboard continues to be the most popular input device. Some
special keys ALT, CTRL, and SHIFT almost always are used in combination with other keys.
Desktop computer keyboards generally have two ways to enter numbers the numeric keypad
and the row of number keys above the alphabetic keys. Think of situations in which both would
be used. The numeric keypad also contains arrow keys, but these keys are active only when the
keypad is turned off. Although the purpose of function keys varies, some developers have tried to
standardize certain keys (such as using F1 to access online Help). In addition to the NUM
LOCK key, other toggle keys are the CAPS LOCK key and the INSERT key. Unlike the CAPS
LOCK key on a typewriter, the CAPS LOCK key on a computer keyboard cannot be used to
print the special characters on the keys in the number row.
Back to Top
Keyboard Types
Keyboards are used primarily to enter alphanumeric data. Not surprisingly, keyboards for
oriental languages are significantly more complex than the keyboard shown in Figure 5-3. The
QWERTY keyboard was devised in 1867 by Christopher Sholes, inventor of the first practical
commercial typewriter. Ironically, Sholes intent when designing the keyboard was to slow
typists down; if typists worked too quickly, keys had a tendency to jam. Many feel the QWERTY
keyboard is an anachronism, and its continued use is counterproductive. A more recent design,
called the Dvorak keyboard (named for August Dvorak, American educator, 1895-1975) places
the most frequently used keys in the middle of the typing area. Studies have shown that trained
typists using the Dvorak keyboard are up to 20 times faster than trained QWERTY typists.
Despite this, the Dvorak keyboard rarely is used. Repetitive stress injury (RSI) afflicts more than
1.8 million people in the United States. A debilitating repetitive stress injury that plagues some
keyboard users is carpal tunnel syndrome. This painful wrist injury affects sufferers not only
when working at the keyboard, but when performing other tasks as well. The wrist rest on the
keyboard in Figure 5-3 is designed to reduce wrist strain.
Back to Top
Pointing Devices
The original mouse was a one-button, cigarette-pack shaped device invented by Doug Engelbart
in 1964. Today, many software manufacturers have made the mouse (or a related pointing
device) an essential part of their applications. When the screen is cluttered or pointer targets are
small, however, some experienced users still prefer keyboard commands if they are offered.
Some people feel that a touchpad is the most difficult pointing device to use. To satisfy divergent
preferences, several laptop computers include both a pointing stick and a touchpad.
Although trackballs, touchpads, and pointing stick devices require less space than a mouse
(making them popular for portable computers), most people find them harder to use. Because of
this a smaller mouse, called Mouse2Go, has been developed for use on a small pad that clips to
the side of a portable computer.
Joystick concepts evolved from actual use in jet fighter airplanes, where joysticks allowed pilots
to control an aircrafts movement quickly and precisely.
Although touch screen users touch a symbol on the screen, it is the location where the touch
occurred, not the symbol contacted, that is important. Because they are so user-friendly, even
people unfamiliar with computers are comfortable with touch screens.
Back to Top
Using a Mouse
The major advantage of a mouse is that it is easy to use. The disadvantages are twofold: first, the
mouse requires additional desk space, making it difficult to use in cramped locations; and
second, mouse use demands that a hand be taken from the keyboard (unlike a pointing stick,
which can be used without removing a hand from the keyboard). When a mouse has two buttons,
one is the primary mouse button and the other is the secondary mouse button. To reverse the
functions of these buttons or change other mouse options in Windows 98, point to Settings on the
Start menu, click Control Panel on the Settings submenu, then double-click the Mouse icon in
the Control Panel window. In the Mouse Properties dialog box that displays, the Basics tab
allows you to change pointer speed, button selection, and double-click speed.
Back to Top
Mouse Types
Since its introduction in 1965, the mouse has gone through several transformations. Microsofts
green eye mouse, an early mouse with two buttons, was released in 1983 and now is a
collectors item. Other interesting mouse variations include Spectrums RingMouse (which uses
infrared to point), Interlinks wireless mouse (often used for presentations), and Interlinks
DuraPoint PC mouse (an incredibly durable mouse that gained the Pentagons interest). A new
mouse from Immersion Corporation provides tactile sensations, with an internal motor that
allows users to feel the desktop. The mouse which senses cursor position, identifies screen
objects, and sends pulses to a motor beneath the surface of the mouse lets users feel icons,
sense Web links, or bump through menu commands.
Back to Top
Voice Recognition
Some experts believe voice input eventually will be the most common way to operate a
computer. Speech recognition is particularly welcome to people with certain disabilities.
Although speech recognition continues to improve, developers admit that advertisements touting
high accuracy rates generally assume a standard vocabulary. Specialized words, regional accents,
and local dialects reduce accuracy. Even a 95 percent accuracy rate, meaning that on average 1
out of every 20 words is wrong, may not inspire confidence. (Imagine if, in conversation, every
20th word spoken was misinterpreted.) Nevertheless, voice recognition systems are gaining in
popularity.
Back to Top
Digital Cameras
Some manufacturers use dots per inch to represent a digital cameras resolution, or the sharpness
and clarity of the image it produces. Dots per inch (DPI) is the number of pixels in an inch of
screen display. A pixel is a single point in an electronic image. Digital cameras for the consumer
range from 640 x 480 dpi to 1,792 to 1,200 dpi. The actual photographed resolution is called the
optical resolution. Some manufacturers also state enhanced resolution, which uses a special
formula to add pixels between those generated by the optical resolution. With the price of digital
cameras decreasing, will the era of film-based cameras soon come to an end? Why or why not?
Back to Top
Video Input
Video input is used in a variety of ways, from developing training films to creating presentation
enhancements. Video input also has been used in the workplace to record (sometimes secretly)
office or assembly-line workers in an effort to find possible quality or efficiency problems. Do
you think this secret recording is ethical? Why or why not?
Back to Top
Back to Top
Chapter 6: Output
| Overview | Expand Your Knowledge | Checkpoint | Practice Test |
Overview
television. You explore monitor quality and monitor ergonomics. Various types of printers are
presented, such as impact printers, nonimpact printers, portable printers, plotters and largeformat printers, and special-purpose printers. You find out about audio output and other output
devices, including data projectors, facsimile machines, and multifunction devices. Finally, you
become acquainted with terminals and output devices for physically challenged users.
The quality of a CRT monitor depends largely on its resolution, dot pitch, and refresh rate. The
quality of an LCD monitor or display depends primarily on its resolution.
A CRT monitors screen is coated with tiny dots of phosphor material, called pixels, that glow
when electrically charged to produce an image. Resolution, which describes the sharpness and
clearness of that image, is related directly to the number of pixels a monitor can display. The
greater the number of pixels the display uses, the better the quality of the image. Dot pitch, a
measure of image clarity, is the distance between each pixel on a display. The smaller the
distance between pixels (dot pitch), the sharper the image. Refresh rate is the speed that a
monitor redraws images on the screen. Refresh rate should be fast enough to maintain a constant,
flicker-free image.
The resolution of an LCD monitor or display generally is proportional to the size of the monitor
or display. That is, the resolution increases for larger monitors and devices.
Back to Top
thermal printer is a nonimpact printer that generates images by pushing electrically heated pins
against heat-sensitive paper. Although the print quality of standard thermal printers generally is
low, two special types of thermal printers, thermal wax-transfer printers and dye-sublimation
printers, have a much higher print quality.
Some printers are used for special purposes. A photo printer is a color printer that can produce
photo lab quality pictures as well as printing everyday documents. A label printer is a small
printer that prints on an adhesive type material that can be placed on a variety of items. A
portable printer is a small, lightweight printer that allows a mobile user to print from a
notebook or handheld computer while traveling. Plotters are sophisticated printers used to
produce high-quality drawings such as blueprints, maps, and circuit diagrams. A large-format
printer, which operates like an ink-jet printer but on a larger scale, creates photo-realistic quality
color prints.
Back to Top
Identify the purpose of data projectors, fax machines, and multifunction devices
A data projector takes the image on a computer screen and projects it onto a large screen so that
an audience of people can see the image. Two smaller, lower priced data projectors are an LCD
projector, which uses liquid crystal display technology, and a digital light processing (DLP)
projector, which uses tiny mirrors. A facsimile (fax) machine transmits and receives documents
over telephone lines. A fax modem is a communication device that allows you to send (and
sometimes receive) electronic documents as faxes. A multifunction device (MFD) is a single
piece of equipment that looks like a copy machine but provides the functionality of a printer,
scanner, copy machine, and sometimes a fax machine.
Back to Top
performs the processing and then sends the output back to the dumb terminal. An intelligent
terminal has memory and a processor that has the capability of performing some functions
independent of the host computer. Some special-purpose terminals perform specific tasks and
contain features designed for a particular industry. A point-of-sale (POS) terminal is a specialpurpose terminal used to record purchases at the point where a consumer buys a product or
service. An automatic teller machine (ATM) is a self-service, special-purpose terminal used to
access your bank account.
Back to Top
Expand Your
Knowledge
1. Output
6. Audio output
2. Display devices
3. Monitor quality
8. Terminals
4. Monitor ergonomics
5. Printers
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
Output
For computer users, output may be the most significant stage of the information processing
cycle. Output is the goal of input and processing. It provides the information users need to work
and make decisions. Output used by a machine often is an intermediate result. Eventually it will
be processed into a form that can be used by people.
Sound Blaster is the de facto standard for computer audio. You may be familiar with audio output
from certain cars and vending machines: Fasten seat belts or Please deposit twenty-five
cents. Voice output telephone calls promoting banks, services, or political candidates are
increasingly common. Yet, audio output is not always welcome. Voice output once was employed
in grocery store checkouts. Because of negative public reaction, however, it has been
discontinued.
Back to Top
Display Devices
Although soft implies a touchable quality, soft copy only has an electronic, intangible
existence, unlike the physical presence of hard copy (printed material).
So much information today is in color that sales of monochrome monitors have plummeted. A
number of less expensive monitors that use gray scaling, however, are popular among business
users.
The CRT in a monitor uses from 15,000 to 20,000 volts to accelerate electrons from the gun to
the screen. Servicing of monitors, therefore, only should be done by trained personnel. Color
monitors sometimes are known as RGB monitors (for red, green, and blue). Red, green, and blue
are lights primary colors. These three fundamental colors are not the same as the three primary
pigments you may have mixed in art class (red, yellow, and blue). Believe it or not, when red
light and green light mix the result is seen as yellow light.
Application software sometimes requires a specific video standard for optimal performance. A
factor to keep in mind when purchasing a monitor is that any video card capable of a higher
resolution can run programs that require lower resolution levels a concept called backward
compatibility. The CGA standard monitor, introduced in 1981, had a 640 x 200 resolution and
displayed four colors. Todays SVGA monitor has a resolution more than 6 times better and can
display 16.7 million colors. Although flat-panel displays use relatively little power and the clarity
of the images they produce continues to improve, they are not as bright as CRT monitors.
Because active matrix displays are much clearer than passive matrix displays, most of todays
notebook computers have active matrix displays. LCD screens often are backlighted but
consume microwatts of power and give off virtually no heat. Gas plasma screens, while much
brighter, consume hundreds or thousands of times more power than LCDs.
Back to Top
Monitor Quality
In some ways, pixel images on a monitor are similar to the works created by pointillist painters
like Georges Seurat.
The flickering that is seen on some monitors is a result of a too-slow refresh rate. Older monitors
refresh images using a technique called interlacing, in which the an electron beam draws only
half the horizontal lines with each pass. Most of todays monitors are noninterlaced. For the eyes,
noninterlaced monitors tend to be less tiring than interlaced monitors. All video display devices
look better in a dark environment.
Back to Top
Monitor Ergonomics
Studies show that working in an ergonomically designed environment lessens fatigue, reduces
injury, and increases productivity.
Printers
Varying requirements have led to the development of printers with different capabilities. In
addition to the questions posed in Figure 6-15, the following factors should be considered when
purchasing any printer:
What is the total printer cost? (Supplies and maintenance should be weighed
along with initial price.)
How much is the printer used? (The duty cycle, or recommended maximum
output per month, and the mean time between failure (MTBF), or estimated time
before a component needs service, are key considerations.)
What type of output will be produced? (A printers capabilities must match output
requirements.)
Who will use the output? (External correspondence requires better quality printing
than internal-only reports.)
Are multiple copies necessary? (Only impact printers can produce multiple copies
on a single pass.)
Where will the printer be used? (Impact printers are noisy in closed locations, but
are more resistant to extreme conditions.)
For a printer to function, the appropriate printer driver must be installed in the computer. Drivers
are software that transform the computers output into signals a printer can understand and use.
Most printer manufacturers include driver software. Because most printers are 1,000 times
slower than computers, all printers have a buffer that temporarily stores a few pages, allowing
the computer to dump output into the buffer and continue processing.
Print quality depends on dots per inch and the amount of overlap. Letter quality (LQ) print
corresponds to that produced by a typewriter. Many impact printers produce near letter quality
(NLQ) print, which is slightly less clear than letter quality. Although most dot-matrix printers
use continuous-form paper (in which individual sheets are connected together), some also can
use single-sheet paper without removing any paper by parking continuous-form paper while a
single sheet is printed.
Nonimpact printers represent the fastest growing segment of the printer market. One attraction of
nonimpact printers is their quiet operation. Imagine the noise level in an office with several
impact printers operating simultaneously! Due to separate development, printer resolution is
expressed in dots per inch while monitor resolution is stated in pixels per inch (which is
dependent on dot pitch). The resolution of a high-end printer is about 10 times better than the
resolution of an SVGA monitor. Although high resolution is good, more dpi requires additional
memory.
Unlike other types of nonimpact printers, the image produced by ink-jet printers can smear if
moistened. Although laser printers are popular, they do not handle all printing jobs well. Special
feeders are needed to print multiple envelopes, and multipart forms cannot be used at all.
Back to Top
Audio Output
Like other computer components, high-quality speakers are growing smaller. NXT has developed
speakers for its flat-panel technology that deliver superior sound despite being only one sixtyfourth of an inch thick. The speaker technology has been licensed by NEC, Acer, and Mission
and is included in their new PCs and notebooks.
Back to Top
Which device a stand-alone fax machine or a fax modem would be most useful for a
home user. For a small office? For a large office? Why?
Back to Top
Terminals
Terminals also sometimes are called display terminals or video display terminals (VDTs).
Historically, terminals have been dumb and dependent on a mainframe, to which they were
connected by a cable, called an umbilical cord, for any processing. The advent of inexpensive
personal computers gave rise to terminals with independent processing capabilities. Personal
computers that function as intelligent terminals are connected to switch boxes that allow them to
operate as PCs or to access a mainframe. Although they are intelligent terminals, some
workstations are designed without disk drives so restricted data cannot be downloaded or copied.
Some terminals, such as credit card authorization devices in department stores, look very little
like normal computers. POS (point-of-sale) terminal printers are special-purpose printers used at
supermarket checkouts. These usually are low-grade dot-matrix printers that have seven or nine
pins.
Back to Top
Keyboard options StickyKeys (allows the SHIFT, > alt, and CTRL keys, which usually
are used with other keys, to be used by pressing one key at a time), FilterKeys (ignores
brief or repeated keystrokes), and ToggleKeys (plays a tone when a toggle key is pressed)
Sound options SoundSentry (generates visual warnings when a sound is made) and
ShowSounds (displays captions for program speech and sound)
Display options High Contrast (uses colors and fonts designed for easy reading)
Mouse options MouseKeys (allows pointer to be controlled with the numeric keypad)
Back to Top
Chapter 7: Storage
| Overview | Expand Your Knowledge | Checkpoint | Practice Test |
Overview
This chapter explains various storage media and storage devices. Students discover how memory
is different from storage. Floppy disks are introduced, and characteristics of a floppy disk, floppy
disk drives, care of floppy disks, and high-capacity floppy disks are presented. Hard disks are
explained, and students find out about characteristics of a hard disk, how a hard disk works,
removable hard disks, hard disk controllers, RAID, and maintaining data on a hard disk.
Compact discs, including CD-ROMs and DVD-ROMs, are described. Finally, students learn
about tapes, PC Cards, and other types of storage such as smart cards, microfilm and microfiche.
Memory, which is composed of one or more chips on the motherboard, is a temporary holding
place for data and instructions during processing. The contents of volatile memory, such as
RAM, are lost when the power to the computer is turned off. The contents of nonvolatile
memory, such as ROM, are not lost when power is removed from the computer. Storage holds
items such as data, instructions, and information for future use; that is, storage holds these items
while they are not being processed. Storage is nonvolatile, which means the items in storage are
retained even when power is removed from the computer. Compared to memory, the access time
(the time it takes to locate a single item) for storage is slow.
Back to Top
capacity disk drives are the SuperDisk drive, the HiFD drive, and the Zip drive. The
SuperDisk drive reads from and writes on a 120 MB or 250 MB SuperDisk. The HiFD
(High-Capacity FD) drive reads from and writes on a 200 MB HiFD disk. The Zip drive is
a high-capacity disk drive that uses a Zip disk. The Zip disk is larger and thicker than a 3.5inch floppy disk and can store 100 MB or 250 MB of data.
Back to Top
Eliminate the need to transport files when away from a desktop computer
Instantaneously save large audio, video, and graphics files when surfing the Web
Make audio files, video clips, or pictures available to family, friends, co-workers,
and customers
Immediately view time-critical data and images while away from a main office or
location
Back to Top
A compact disc (CD) is a flat, round, portable metal storage medium that usually is 4.75 inches
in diameter and less than one-twentieth of an inch thick. Compact discs store items using
microscopic pits (indentations) and land (flat areas) that are in the middle layer of the disc. A
high-powered laser light creates the pits in a single track, divided into evenly spaced sectors, that
spirals from the center to the edge of the disc. A low-powered laser reads items by reflecting light
off the disc surface. The reflected light is converted into a series of bits that the computer can
process.
Back to Top
Expand Your
Knowledge
3. Floppy disks
10. Tape
4. High-capacity disks
11. Enterprise storage systems
5. Hard disks
6. Advantages of an Internet Hard
Drive
7. Compact discs
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
1 KB stores approximately page of text. Depending on speed and size, rough costs for RAM
are about $40 to $50 per megabyte, while hard disk storage costs are around $0.20 per megabyte.
Back to Top
Floppy Disks
Although the 5.25-inch floppy disk is physically larger, the storage capacity for a 5.25-inch
floppy disk is less than for a comparable 3.5-inch floppy disk. Because of the 3.5-inch floppy
disks greater durability and superior storage capacity, the 5.25-inch floppy disk at best can be
considered a very endangered species. With its rigid plastic shell, it may be difficult to see the
3.5-inch disk as floppy. The name is justified, however, by the disks ancestry and the fact that,
if the protective shell is removed, the disk on which the data is written is indeed floppy. Today,
most new computers (although not the new Apple iMac) come with a 3.5-inch floppy disk drive;
a few manufacturers still will, for a price, add a 5.25-inch floppy disk drive.
The procedure for formatting a floppy disk depends on the operating system. Floppy disks are
soft-sectored, meaning that the number of sectors is not predetermined. The cluster concept
creates an odd situation: one file with 100,000 bytes requires less disk space (about 25 clusters at
8 sectors per cluster and 512 bytes per sector) than 1,000 small files of 100 bytes each (1,000
clusters).
A floppy disk spins at about 300 revolutions per minute. When writing data, the floppy disk
drives read/write head generates electronic impulses that change the magnetic polarity of areas
along a track to represent the 1 or 0 bits being recorded. When reading data, the read/write head
senses the magnetic areas that have been recorded.
Back to Top
High-Capacity Disks
The three types of high-capacity disks were developed by three different manufacturers:
SuperDisk is from Imation, HiFD is from Sony Electronics, Inc, and the Zip drive is from
Iomega.
Although manufacturers always are concerned about software piracy (unlawfully duplicating or
distributing proprietary software), many recommend that users create a backup of programs
before installing them on a computer. Backup guards against system failures, such as a head
crash, and human errors, such as inadvertently deleting key files. If you ever accidentally delete a
file, seek help immediately from a computer support person who sometimes can recover the
erased file.
Back to Top
Hard Disks
In the early 1980s, hard disk drives were called Winchester drives because they had two 30megabyte disks, a characteristic reminiscent of the Winchester 30-30 rifle. In addition to making
hard disks more efficient and allowing the installation of multiple operating systems, large hard
disks may be partitioned to:
Save keystrokes (operating systems usually return to the directory they left)
Unlike floppy disk read/write heads, hard disk read/write heads do not touch the disk surface.
Because of the close tolerance between the disk head and the rotating disk surface, hard disk
drives are manufactured in an extremely clean setting, typically cleaner than a hospital operating
room. Many hard disk drives are warranted for five years, but most warranties are prorated,
meaning that if it fails in the first year it can be replaced at 20 percent of the original cost. All
warranties are void, however, if the drive is opened, because contaminated air and dust render the
drive unusable.
On a personal computer, a hard disk controller (HDC) is the interface for the hard disk. Many
external hard drives use a USB port as their interface. Two other types of HDCs are the EIDE
(Enhanced Integrated Drive Electronics) controller, which can support up to four hard disks,
and SCSI (small computer system interface) controllers, which can support multiple disk
drives as well as other peripherals. A removable hard disk is a disk drive in which a plastic or
metal case surrounds the hard disk so that you can remove it from the drive. Two reasonably
priced, removable hard disks are the Jaz disk, which can store up to 2 GB, and the Peerless
disk, which can store up to 20 GB.
A RAID (redundant array of independent disks) system integrates two or more hard disks,
duplicating data, instructions, and information to improve data reliability.
Back to Top
Compact Discs
Laser disks first were developed by RCA for showing home movies. The 14-inch optical disk
was a derivative of these early 1980s video disks. Advantages that compact discs offer over hard
disks include: greater data density, less expense (bit for bit), increased durability, and no head
crashing.
Back to Top
Along with processor speed, amount of memory, and hard disk capacity, CD-ROM drive speed is
a featured element of almost every personal computer advertisement. Like CD-ROM drives,
DVD-ROM drive speeds are indicated with the letter X to represent the standard speed of a DVD
drive. That speed, however, is considerably faster than the data transfer rate of the original CDROM. While a 24X CD-ROM drive has a data transfer rate of 3,600 KB per second, a 5X DVDROM has a data transfer rate of 6,750 KB per second.
Back to Top
Tape
Magnetic tape was developed in the mid-1950s to replace the earlier method of storing data on
punched cards. To better understand the difference between sequential access and direct access
(or random access), compare an audio cassette tape to a CD-ROM. An audio cassette tape is
sequential; to listen to the fourth song it is necessary to listen to (or fast-forward through) the
first three songs. A CD is direct; it is possible to go straight to the fourth song. For what
applications would sequential storage be appropriate? For what applications would it be
unsuitable? Tape cartridges can be purchased formatted or unformatted. One-quarter-inch wide
cartridge tapes typically are 600 feet long. Unattended tape backup is a great time saver.
Consider how many 1.44 MB floppy disks are needed and how much time is required (removing
disks as they become full and inserting new disks) to back up 150 MB of data. With tape backup,
you can press a key, go about other business, and return to remove the finished backup tape.
Back to Top
Microfilm and microfiche images are so small that they can be read only with a microfilm and
microfiche reader. Large organizations use microfilm and microfiche to archive inactive files.
Back to Top
Overview
System software is an essential part of a computer system. This chapter defines system software
and discusses two types of system software: operating systems and utility programs. You learn
what an operating system is and explore user interfaces, operating systems features, and
operating system functions. A variety of popular operating systems are described including DOS,
Windows 3.x, Windows 95, Windows 98, Windows 2000, Windows XP, Windows CE, the Mac
OS, OS/2, UNIX, Linux, and NetWare. You discover what happens when they start a computer
and why a boot disk is important. Finally, a number of utility programs are explained.
Most operating systems perform similar functions that include managing programs, managing
memory, scheduling jobs, configuring devices, accessing the Web, monitoring performance,
providing housekeeping services, and administering security. Managing programs directly affects
your productivity. A single user/single tasking operating system allows only one user to run one
program at a time. A multitasking operating system allows a single user to work on two or more
applications that reside in memory at the same time. A multi-user operating system enables two
or more users to run a program simultaneously.
A multiprocessing operating system can support two or more CPUs running programs at the
same time. Managing memory involves assigning items to an area of memory while they are
being processed. The purpose of memory management is to optimize use of random access
memory (RAM). With virtual memory (VM), the operating system optimizes memory by
allocating a portion of a storage medium, usually the hard disk, to function as additional RAM.
Scheduling jobs (operations the processor manages) involves determining the order in which
jobs are processed.
Spooling increases efficiency by placing print jobs in a buffer (an area of memory or storage
where data resides while waiting to be transferred) until the printer is ready, freeing the processor
for other tasks. Configuring devices establishes communication with each device in the
computer. A device driver is a small program that tells the operating system how to
communicate with a device. Accessing the Web may entail including a Web browser and e-mail
program in the operating system. Monitoring performance helps to identify and solve system
problems.
A performance monitor is a program that assesses and reports information about various
system resources and devices. Providing housekeeping services entails performing storage and
file management functions. A file manager performs such functions as formatting and copying
disks; listing the files on a storage medium; checking the amount of used and unused space on a
storage medium; organizing, copying, deleting, moving, and sorting files; and creating shortcuts
(icons on the desktop that run a program when clicked).
Administering security involves establishing user accounts on a network. Each account typically
requires a user name and a password to log on, or access, the network.
Back to Top
Back to Top
Datacenter (for business with huge volumes of transactions and large-scale databases), and
Windows .NET Web Server (for Web server and Web hosting businesses).
OS/2 Warp Server for E-business is IBMs network operating system designed for all sizes of
business.
UNIX is a multitasking, command-line operating system implemented on many different types
of computers. Because it is both a stand-alone operating system and a network operating system,
some call UNIX a multipurpose operating system. Linux is a popular, free, multitasking
UNIX-type operating system. Solaris, a version of UNIX developed by Sun Microsystems, is
a network operating system designed for e-commerce applications.
Back to Top
Discuss the purpose of the following utilities: file viewer, file compression,
diagnostic, uninstaller, disk scanner, disk defragmenter, backup, and screen saver
Most operating systems include several utility programs that perform specific tasks related to
managing a computer, its devices, or its programs. A file viewer is a utility that allows you to
display and copy the contents of a file. A file compression utility shrinks the size of a file. A
diagnostic utility compiles technical information about a computers hardware and certain
system software programs and then prepares a report outlining any identified problems. An
uninstaller is a utility that removes an application, as well as any associated entries in the
system files. A disk scanner is a utility that (1) detects and corrects both physical and logical
problems on a hard disk, and (2) searches for and removes unnecessary files.
A disk defragmenter is a utility that reorganizes files and unused space on a computers hard
disk so data can be accessed more quickly and programs can run faster. A backup utility copies,
or backs up, selected files or an entire hard drive onto another disk or tape. A screen saver is a
utility that causes the monitors screen to display a moving image on a blank screen if no
keyboard activity occurs for a specified period.
Back to Top
Expand Your
Knowledge
1. System software
6. Stand-alone operating
systems
2. Starting a computer
3. User interface
7. Network operating
systems
4. Features of operating
systems
8. Embedded operating
systems
9. Utility programs
Here you will find additional information that will expand and enhance your knowledge beyond
that contained in your textbook. Compare this information to what may be provided in a
traditional classroom by your instructor or peers.
System Software
Software is a key component of any information system. Of the total number of corporate dollars
spent on computing, the software share is increasing while the hardware share is decreasing.
Typically, different sizes of computers use different operating systems, and even the same types
of computers may not use the same operating system. The operating system that a computer uses
sometimes is called the software platform, or platform. Application software packages often
require a specific software platform. A cross-platform application, however, is one that runs on
multiple operating systems.
Back to Top
Starting a Computer
When you turn on a computer after it has been powered off, you are performing a cold boot.
When you restart a computer that already has been powered on, you are performing a warm
boot. Your typically can perform a warm boot by pressing a combination of keys on the
keyboard (in Windows, CTRL+ALT+DEL), selecting options from a menu, or pressing a Reset
button on the computer.
If you watch the screen closely as the POST is conducted, the value for the total amount of
memory can be seen to change as it is measured in the memory test. If the POST results do not
match the data on the CMOS chip, an appropriate message should appear. The boot program
typically is the first side, first track, and first sector of the hard disk. When you install an
operating system, one of the installation steps involves making an emergency disk from which
you can start your computer if the hard disk is damaged.
Back to Top
User Interface
You can interact with an operating system directly (as you do when copying files, moving files,
formatting disks, and so on) or indirectly (as you do when working with an application program).
An operating system is intended to be transparent; that is, it does not have to be understood,
considered, or even known. The operating system with which an application program will work
is specified on the application software package. The application programs you want to use
should be considered before deciding on an operating system, and the operating system must be
considered when choosing application software.
A graphical user interface is designed to be easier to use (more user-friendly) than a commandline interface. As an example of this user-friendly nature, consider how a relatively simple task,
such as deleting a file, is performed with a command-line interface and with a GUI. With a
command-line interface, you might type del followed by the file name in quotation marks.
Therefore, you must remember the command, type it correctly, and use the proper syntax. On the
other hand, with a GUI you need only select (click) the file name in the file manager window and
then click the Delete command on a menu or the Delete button on a toolbar. Although most
people find a GUI the easiest interface to use, some long-time computer virtuosos still feel a
command-line user interface is more efficient.
Back to Top
spooling comes from the observation that placing print jobs temporarily in a buffer is somewhat
like winding thread onto a spool so that it can be used at a later time. Today, adding and
configuring devices is easier because most devices support Plug and Play, which means the
computer can recognize a new device and automatically load the necessary drivers. A feature of
Windows 95, Plug and Play initially was greeted with mixed reviews. In fact, some wags
claimed the new technology was more accurately called, Plug and Pray.
Processor utilization the amount of time that the processor is working and not idle is one way
of monitoring system performance. In addition to the programs that come with most operating
systems, several utility programs are available to monitor system performance. Formatting a disk
is the process of preparing it for reading and writing. Today, most floppy and hard disks are
preformatted by the manufacturer. If you format a disk that already contains data, the formatting
process erases the file location information, but it does not erase the actual files on the disk.
Therefore, if you accidentally format a disk, often you can unformat it with a utility program.
System security usually is most important for large systems or networks. For single-user PCs,
adequate system security can be a key in the users pocket.
Back to Top
the popularity of DOS was a result of the large number of applications written to work with the
operating system.
Windows 1.0, released in 1985, was Microsofts first attempt with a graphical user interface. It
was not until five years later, however, with the release of Windows 3.0, that computer users
began to take Windows seriously. Windows required 2 MB of memory (with 4 MB
recommended) and an 80386 or newer processor, so it could not be used with many older PCs.
Nevertheless, because Windows 3.0 was easier to use than DOS, eventually most software was
written, and many popular DOS programs were rewritten, to work with Windows.
Despite the advantages of Windows 95 and a heavily-funded promotional campaign, a poll of
DOS and Windows 3.x users showed not everyone immediately embraced the new operating
system. When asked how likely they were to adopt Windows 95 within the next six months,
respondents replied:
extremely likely
possible
35%
not likely
53%
dont know
2%
10%
has been lukewarm. New standards let IBM computers run Apple software. More than 4,000
applications are designed to run under the Mac OS. Microsoft has developed the more popular
Mac OS applications.
IBM supplies OS/2 (Operating System/2) Warp with its high-end personal computers. OS/2
originally was developed jointly by IBM and Microsoft to replace MS-DOS. As an interim
measure, Microsoft developed Windows, an operating environment to work with DOS. The
eventual popularity of Windows, coupled with the initial poor sales of OS/2, resulted in
Microsoft and IBM going their separate ways, with Microsoft concentrating on Windows and
IBM continuing to develop OS/2. Features offered in OS/2 Warp include:
Integrated Java programming language that allows Java applications to run without a Web
browser
same operating system as the Palm but offers several additional features videogames, cell
telephone, modem, MP3 player, and two-way pager at about half the cost.
Back to Top
Utility Programs
Utilities generally reside in storage until summoned by the user or operating system kernel.
Microsoft was the target of several lawsuits for allegedly incorporating utility programs
developed by others into their DOS operating system. Some versions of DOS were modified
because of this litigation. In light of the ever-increasing number of utility programs included with
operating systems, will a market remain for separate utility programs?
In addition to the utilities mentioned in this chapter, other Windows 98 utilities include:
Drive Converter (FAT 32) Converts the hard drive to the FAT32 file system, an
enhancement that stores data more efficiently, creating extra disk space and helping
programs run faster.
Registry Checker Finds and fixes registry problems each time the computer is started,
automatically scanning the registry for inconsistent data structures.
System File Checker Keeps track of critical files that make the computer run, restoring
the files if they are moved or changed.
Microsoft Magnifier Makes the screen more readable by displaying a magnified portion
in a separate window and making it possible to alter the color scheme and contrast of the
magnification window for easier visibility.
Desktop enhancers Change the desktop look and organization, allowing users to create
and switch between multiple desktops.
File conversion Converts from one file format to another so that a file can be used by
another application.
Internet organizers Helps in the management and use of favorite Web sites, searching
the Web and reporting on site changes.
Antivirus programs Prevent, detect, and remove computer viruses. Viruses and antivirus
programs are explored in Chapter 12.
Some utility programs are used primarily by select groups. For example, text editors -- utility
programs that make it easy to work with lists and records -- are popular with programmers and
people who work with databases. PC Tools and Norton Utilities are popular utility software
packages for personal computers.
Back to Top