Professional Documents
Culture Documents
Nput and Utput Evices: Computer Studies
Nput and Utput Evices: Computer Studies
Computer Studies
1.
Input, Output and Secondary Storage Devices are collectively known as peripherals
The processor or Central Processing Unit (CPU) makes all the calculations of the computer. In
order for a process to be possible we need to feed in data to the computer through the input
devices. The computer will then process the data according to a particular program and finally
deliver information through the output devices. If the information produced needs to be stored
for the future, we will store this into a secondary storage peripheral device.
Input
Device
Computer
Output
Device
INPUT
PROCESS
OUTPUT
- Page 1 -
Form 3
Computer Studies
- Page 2 -
Form 3
Computer Studies
Input devices are all those hardware equipment that are used to enter data into the computer.
Keyboard
This is the most common and widely used input device. There are different types of keyboards
but the QWERTY keyboard is the most widely used. Apart from the normal alphabetical keys,
the keyboard has:
A Numeric Keypad
Navigation Keys
Function Keys
Function keys change function used according to the application being used.
Mouse or Trackball
- Page 3 -
Form 3
Computer Studies
Touchpad
- Page 4 -
Form 3
Computer Studies
Advantages
Disadvantages
- Relatively inexpensive
mouse
mouse
devices
- Small footprint
Scanner
- Page 5 -
Form 3
Computer Studies
Joystick
Barcode Reader
- Page 6 -
Form 3
Computer Studies
This system uses special ink to write numbers with coded magnetic ink. This special ink
contains the written numbers magnetically. This system is widely used on cheques issued by
banks. The MICR is much faster than OCR or other methods when reading codes and thus
identifying cheques.
Federal Reserve
Branch / City
Bank Number
District, 2 digits: 01 to
Designation &
12
Clearing
- Page 7 -
Form 3
Computer Studies
Graphics Table
Pen
- Page 8 -
Form 3
Computer Studies
Input Device
Advantages
Disadvantages
Keyboard
Relatively slow
Mouse
Light Pen
Mark Reader
Fast input
MICR
Joystick
Digital camera
Graphics Tablet
Slow
pictures
Speech Reader
No hands needed
Limited vocabulary
Touch Screen
Easy operation
Intuitive
and software
Relatively slow
sophisticated operations
Scanner
No artistic performance
required
- Page 9 -
Form 3
Computer Studies
After processing the inputted data, the computer will give its output. This output can be in two
different formats:
OUTPUT as
Softcopy
INPUT
PROCESS
OUTPUT as
Hardcopy
Hardcopy Output on a tangible (something you can touch) such as a printer printout.
- Page 10 -
Form 3
Computer Studies
The monitor is the most common type of output device and is also called Visual Display Unit
(VDU).
Resolution
This term refers to the clarity or sharpness of a printout or display screen. The more pixels there are per
square inch, the better and greater the resolution.
LOW Resolution
HIGH Resolution
- Page 11 -
Form 3
Computer Studies
One can find different standards for monitors. They support different colour depths (number of colours
it supports). The most common standards for monitors are:
1. VGA (Video Graphics Array) mode appeared in 1987. It offered a resolution of 720x400 in text
mode and a resolution of 640 by 480 (640x480) in 16-colour graphics mode. It also offered a
resolution of 1024 x 768.
The VGA quickly became the baseline display mode for PCs.
2. SVGA (Super Video Graphics Array) is a graphics mode which can display 256 colours at
resolutions of 640x200, 640x350 and 640x480. SVGA can also display higher definitions such as
800x600 or 1024x768 by using fewer colors.
3. XGA (eXtended Graphics Array). is an IBM display standard introduced in 1990. Today, it is the
most common appellation of the 1024 768 pixels display resolution, but the official definition is
broader than that. It was not a new and improved replacement for Super VGA, but rather
became one particular subset of the broad range of capabilities covered under the "Super VGA"
umbrella.
The initial version of XGA expanded upon IBM's VGA, adding support for two resolutions:
800 600 pixels with high color (16 bits per pixel, i.e. 65,536 colors).
1024 768 pixels with a palette of 256 colors (8 bits per pixel)
television
sets.
The CRT uses a vacuum tube in which an electron gun is installed.
When
electrons fired by the electron gun touch the phosphor layer situated
at the
internal side of the screen, this will glow. This dot of light is called a
Pixel.
- Page 12 -
Form 3
Computer Studies
Liquid Display Unit / Liquid Crystal Display (LCD) we usually find this installed in laptops and handheld
computers. The technology used is different from that of the CRT. LCD uses tiny capsules filled with
liquid crystals. When the molecules of the liquid are subjected to an electric field, the liquid crystals align
and light reflects off them.
Without the field, their alignment reverts to its original, nonreflecting arrangement, so the elements appear dark.
Combinations of LCDs are arranged to form patterns of reflected
light that spell out numbers, symbols or letters.
TFT (Thin Film Transistor) is a variant of LCD which uses thin
film
CRT
VDU
LCD
Pixel
14 15 17 21
This is the length measured in inches (1 inch = 2.54cm) of the screen measured
diagonally, that across two corners.
VGA
SVGA
Bit map
Side NOTE:
terminals, namely INTELLIGENT TERMINLAS (having a CPU) AND DUMB TERMINALS (no CPU)
Intelligent terminals can do some local processing of data and then communicate with a main
computer just to relay the results
In a dumb terminal, all processing must be done through the main computing system
Printers
- Page 13 -
Form 3
Computer Studies
Printers are output devices that transfer the output of the computer on paper (hardcopy). The printers
can be divided into two categories Impact and Non-Impact:
Impact refers to all those printers whose printing heads touch the paper. An example is the
Dot matrix printer.
Non-Impact are all those printers whose printing heads do not touch the paper. An example
is a Laser or an Ink-Jet printer.
This type of printer is rarely used any more since new printer technology, which is more efficient and
economic, has been discovered. The principle of this type of printer is that number and letter are each
situated on metal leafs as shown.
These leafs make part of the daisy wheel. In order to print, the daisy wheel rotates while a hammer will
strike each character, which will make contact with the printer ribbon and the paper.
- Page 14 -
Form 3
Computer Studies
Line Printers
As the name suggests these type of printers will print one whole document line at one go. There are two
basic types of line printers:
1. Barrel Printers This printer has a number of disks each containing all the letters and
numbers. These disks are situated one near each other on a shaft and can rotate
independently from each other. Lines are written by revolving each disk in the correct
position in order to form a complete line. A row of hammers will strike the ribbon and
papers.
2. Chain Printers All the alphabet and numbers are imprinted on a chain. In order to
write on paper, a hammer will strike the right characters to print.
- Page 15 -
Form 3
Computer Studies
Dot matrix printers are categorised as character printers because they write one character at a time. The
printing head is made up of several pins, which form a column. The printing head is attached to a belt
which moves it from side to side along the width of the paper and at the same time the paper is rolled up
by means of a roller. In order to write, the head pins are fired with the aid of an electro magnet, which
hit the ribbon and paper.
Inkjet Printers
These types of printers are the most popular nowadays. It is basically what most home users have
today. These printers have good resolution, are silent and for small amount of printing are not
particularly expensive. These printers are called page printers.
There are two types of technologies used:
1. The first type (called Bubble Jet) has a chamber containing ink. The ink is heated up with tiny
electrical heaters. This will cause the ink to expand and form a bubble. The bubble will burst
and the ink transferred on paper.
2. The second type (called Ink Jet) uses a piezo quartz nozzle. When electricity is passed through
it, it vibrates and transfers the ink on paper.
- Page 16 -
Form 3
Computer Studies
In the inkjet printing mechanism, the print head has several tiny nozzles, also called jets. As the
paper moves past the print head, the nozzles spray ink onto it, forming the characters and
images.
Laser Printers
Laser printers offer the best quality in terms of printout quality and
resolution. On the other hand they are the most expensive to run.
Laser printers are called page printers since they print one page at a go.
The laser printer uses a laser beam, a drum and a toner.
Printer Classification
Printers can be subdivided into four groups
CHARACTER
LINE
GRAPHICS
PAGE
Prints character at a
time
a time
a time
Printer Glossary
CPS
NLQ
Draft Mode
lowest printable resolution, it is also the quickest but not the best output, it is
usually used for spell checking before the actual print
DPI
dots per inch, this gives the resolution of the print, the higher the dpi the higher
the resolution more clear
Resident
Scalable
Example: a
Font
a a
aa
aa
Form 3
Computer Studies
A printer works relatively very slow when compared to a CPU. In order to free
the CPU to attend to other tasks during printing, the printing job (file) is
temporarily stored on disk, tape, or memory. The printer will then receive the
file to print chunk by chunk enough to keep it busy. This compensates for
slow operating speeds of some peripheral devices. When spooling is to a
printers memory, this is also known as memory buffer.
Memory buffer
Printers have memory buffers to speed up their operation. Printing speeds are
very slow compared to computer speeds and the printing job is spooled to a
printers memory buffer. This is usually in the region of 10k to 50k RAM on small
office printers. The computer downloads quickly in the fraction of a second the
printing job to buffer memory. When the data in the buffer is exhausted, the
next chunk of printing data is downloaded again by the computer in a split
second. Sophisticated printers use large memory buffers and buffer area may be
split into two separate memory areas.
Side NOTE:
On-line or Off-line
ON-LINE:
refers to when a peripheral device is under the control of the CPU i.e. connected
to the computer and usable
OFF-LINE:
refers to when a peripheral device is not under the control, and cannot be
controlled by the CPU
Plotters
- Page 18 -
Form 3
Computer Studies
The plotter uses pens to write on paper and is usually used for engineering drawings. There are two
types of plotters:
1. Flatbed Plotter This uses a flat paper which is fixed, and pens (or styluses) that move on it
draw the required design.
2. Drum Plotter Here the paper moves along a drum vertically while pens move side to side
horizontally.
- Page 19 -
Form 3
Computer Studies
Output Device
Advantages
Disadvantages
cheap
Daisywheel Printer
Chain Printer
Fast
No graphics
Line Printer
Thermal Printer
Quiet
Very quiet
Laser Printer
Expensive to run
Flatbed Plotter
Very expensive
capabilities
Drum Plotter
Very expensive
Very small
VDU
Speech Synthesizer
- Page 20 -
Form 3
Computer Studies
and is
shapes
figures.
affect
of
are
0)
- Page 21 -
Form 3
Computer Studies
These devices are used to produce sound from the computer system. The soundcard is a card installed
in the tower case of the computer. Its role is to convert the signal coming out of the computer to a
format that can be reproduced by the external speakers.
Computer Categories
and Optical recorders/players, Auto-pilot, Automatic Washing Machines, Mobile Phones, GPS, etc. will
have an embedded computer to control them. The program for these computers is normally hard coded
that is built in the machines ROM (Read Only Memory).
Embedded systems controlling common appliances are one form of dedicated computers they have a
CPU, Input Output devices, software stored in ROM and some RAM as workspace.
task provided that the correct instructions are loaded in the computer, therefore depending on what
PROGRAM we load, the computer may act differently.
Examples:
- Computer + Word
- Computer + Excel
- Computer + Paint
- Computer + AutoCAD
Form 3
Computer Studies
Secondary storage devices cannot be classified under input or output devices. These devices are used to
store data for later use.
1. Magnetic
2. Optical
3. Electronic
1. Magnetic Storage
Magnetic storage devices store the data on a magnetic layer. Examples of such devices are:
a. Floppy Disk
b. Hard Disk
c.
Magnetic Tape
The technology used is very simple to understand. The magnetic layer is magnetised when there is a
binary 1 and left un-magnetised when there is a binary 0.
Floppy Disk
Floppy disks store small amount of data typically not larger than 1.44MB. These small diskettes are used
mainly to transport small files from one computer to another.
- Page 23 -
Form 3
Computer Studies
The construction of the floppy is basically a plastic disk coated with magnetic material, enclosed in a PVC
jacket to protect the magnetic material.
In order to write data to a floppy this must be first formatted. This procedure involves the creation of
sectors and tracks. On the diskette, data is recorded on closed concentric rings (tracks).
Each track is divided into sectors. These are invisible wedged-shaped sections used by the computer for
storage reference purposes.
Label
- Page 24 -
Form 3
Computer Studies
Hub
- Page 25 -
Form 3
Computer Studies
- Page 26 -
Form 3
Computer Studies
- Page 27 -
Form 3
Computer Studies
Hard Disks
As the name implies, hard disks are built with metal or glass platters covered with a substance that
allows data to be held in the form of magnetised spots. Today hard disks are composed of more than
one disk (also named as platter), which are stacked on each other. This technology gives the possibility
of having large storage capacity. Typically computer systems today have an 80GB (or more) hard disk
capacity.
- Page 28 -
Form 3
Computer Studies
- Page 29 -
Form 3
Computer Studies
Magnetic Tape
This type of storage media is used in large computers where large amounts of data are stored. The tape
is made up of a thin plastic tape having horizontal running tracks and vertical frames. The data to be
stored is divided into:
Trailer containing number of blocks, to be used as cross reference with the header
Magnetic tape is ideally suited to store a list of records whose sequential order is sorted for later
processing. Payroll systems and record updating is ideal for tape. A sorted tape can be used to issue
pay cheques, update a list of customers etc.
2. Optical Storage
CD-ROM stands for Compact Disk Read Only Memory. This is an optical disk where information is
stored at the time of manufacturing.
Examples of CD-ROM are Music CDs and software that one buys from computer shops such as games.
Optical disks write data with a high power laser beam, which records data by burning tiny pits onto the
surface of the disk. In order to read data, a low power laser beam reads data by reflecting smooth
areas, which are interpreted as 1 bits, and not reflecting pitted areas which are interpreted as 0 bits.
The typical storage capacity of a CD-ROM is 650Mb, which makes them a very versatile data storage
media when it comes to store data for short and long term periods of time.
- Page 30 -
Form 3
Computer Studies
Re
adi
ng
Dat
a
Re
adi
ng
1
The
lase
r beams reflects off the smooth surface, which is interpreted as a 1 bit.
Reading 0
The laser beam enters a pit and is not reflected,
which is interpreted as a 0 bit.
- Page 31 -
Form 3
Computer Studies
CD-R
CR-R which stands for Compact Disk- Recordable is a CD format that allows users to use a CD-R drive to
write data, only once, onto a specially manufactured disk that can then be read by a standard CD-Rom
drive.
CD-RW
CD-RW stands for Compact Disk Rewritable. This type of media allows users to copy and erase data.
Thus, this disk can be used over and over again.
DVD-Rom
DVD-Rom stands for Digital Video Disk or Digital Versatile Disk. This optical disk looks like a normal CD
but in fact, it can store much more data than a CD
The following is a list of the most common DVD types with their respective capacities:
- Page 32 -
Form 3
Computer Studies
3. Electronic Storage
- Page 33 -
Form 3
Computer Studies
Electronic memory is the latest technology in secondary storage media. This is also referred to as Flash
memory.
Flash memory is non-volatile solid-state computer memory storage that can be electrically erased and
reprogrammed. It is a technology that is primarily used in memory cards and USB flash drives for general
storage and transfer of data between computers and other digital products. It is a specific type of
EEPROM (Electrically Erasable Programmable Read-Only Memory)
This type of memory media has no mechanical moving parts and thus it offers some advantages when
compared to the other type of media.
Advantages:
1. Very small
2. Does not consume a lot of energy in order to function
3. Noiseless
4. Limited heat emission
5. Portable
Disadvantages:
1. Limited amount of memory capacity when compared to the other type of media (Currently big
advancements are being made and the maximum capacity of this media is 60GB).
Because of their small size and big capacity, electronic memory is suitable to be used in portable devices.
Today electronic memory is being used in Digital cameras, Mp3 Players, PDAs, Mobile phones and
Laptops.
- Page 34 -
Form 3
Computer Studies
- Cassette tape
- Tape Stream
- Floppy Disk
- Hard Disk
- Zip Disk
- CD-Rom
- DVD
- Flash Memory
Imagine one has a thousand records stored on a secondary storage device and one needs to access the
543rd record. In serial access, one has to access the preceding 542 records before homing in on to the
543rd record.
On the other hand, in random (direct) access, one is given the possibility to go directly to the
particular record required.
Serial access is where the items are read, one at a time, from the physical start of the file, in the order in
which they are stored.
Data is stored on tape in Binary Coded Decimal Format. A tape is made up of horizontally running
tracks and vertical frames. When a file is stored on tape, the program is divided into:
a trailer (with the number of blocks for cross checking with the program header)
- Page 35 -
Form 3
Computer Studies
- Page 36 -
Form 3
Computer Studies
In serial access methods, as a means of security, parity checking is used. This is a means to check
tape data integrity. Horizontal parity utilises a tape track for checking whilst Vertical parity uses a
frame for parity checking. Both can be used for optimum integrity and error correction.
There are two types of parity systems Odd and Even parity. In even parity, the tape drive ensures
that both horizontally and vertically, there is an even number of 1s. This system works similarly for odd
parity. The only difference is that the 0s are used instead of 1s.
An even parity bit is set to 1 if the number of ones in a given set of bits is odd (making the total
number of ones, including the parity bit, even).
An odd parity bit is set to 1 if the number of ones in a given set of bits is even (making the total
number of ones, including the parity bit, odd).
- Even Parity
a. Set to 1 if number of 1s is odd
b. Set to 0 if number of 1s is even
- Odd Parity
a. Set to 1 if number of 1s is even
b. Set to 0 if number of 1s is odd
A
A
B
B
B
This mechanism enables the detection of single bit errors, because if one bit gets flipped due to line
noise, there will be an incorrect number of ones in the received data. In the two examples above, B's
calculated parity value matches the parity bit in its received value, indicating there are no single bit
errors. Consider the following example with a transmission error in the second bit:
- Page 37 -
Form 3
Computer Studies
A
A
A
B
B
B's calculated parity value (1) does not match the parity bit (0) in its received value, indicating the bit
error.
Even
Parity
Track
Frames
The diagram above shows the logical file structure on a tape (long pieces of plastic ribbon coated with
magnetic material). Parity checking is used as a measure of security, that is, to ensure that the
original data is not corrupt or missing in any way.
In the above diagram (which shows part of a tape ribbon), parity checking is even and this can be in both
horizontal (tracks) and/or vertical axis (frames). Check and count the bits for every frame and then for
every track. Parity can be even or odd.
If therefore the above file is transferred to a computer and if one single bit is wrong, then the parity will
no longer hold and the user gets an error display.
- Page 38 -
Form 3
Computer Studies
Direct Access Method Hard disk, Zip disk and floppy disk
Formatting a floppy disk or hard disk means preparing the medium to receive data. Mostly when a new
disk is bought, the surface are is free and not organized. In order to start writing data onto a disk, one
must format it or prepare the area into chunks where the data is stored (like boxes in a room to organise
our storage). Formatting prepares the disk into round concentric circles called TRACKS (like an athletics
track). Tracks are then subdivided into smaller pieces to form SECTORS. Even though the outer sector
is larger in area than the inner sectors, they will still hold the same amount of data.
Floppy disks rotate at about 360rpm. Data transfer is around 10k to 100k per second. They consist of
80 tracks and of 256 sectors per track. Floppy disks are lightweight, portable, relatively cheap,
rewritable, and can store 1.44Mb of data (they can store more if special software is used for compression
of data). Magnetic medium is brown in colour and soft. Disk allows random access. This is achieved
by storing each new file at the start of a new sector. If for example, program one occupies sectors 0, 1,
2 and half of sector 3, file two will be stored in sector 4, leaving half sector 3 empty. All programs stored
on disk are catalogued in a directory for easy searching. This is done by the operating system. A file is
not necessarily stored in sequential sectors but may be fragmented.
Hard disks are not readily portable (some exist which can be removed), becoming cheaper, rewritable,
typical storages nowadays at around 30GB (and more). Magnetic medium is shining silver metal and
- Page 39 -
Form 3
Computer Studies
hard. Since hard disks are getting larger and larger an important factor to look at when buying a new
hard disk is its access time.
Zip disks are very popular for making backups both in the industry, offices and at home. They are
magnetic disks but the media is made of high density magnetic material meaning that the surface is
more densely packed with magnetic particles. This allows for high density of data too. Zip disks use
special compression software which packs large amounts of data into smaller sized data. Zip disks
require special zip drives and special software compression. Typical zip disks are of 100Mb and 250Mb
capacities and are small cartridge like in shape.
Zip Drive
Zip Disk
Access time the time taken for a hard disk to seek data and is measure in milliseconds (1/1000th of a
second). If you have a hard disk with an access time of 10ms, a file of 10Mb will take less than another
with 12ms to access. Typical access time (time to seek data) is between 9ms / 12ms, the lower the
access time the costlier. Hard disks usually consist of 2 or more similar disks mounted on a common
spindle, this is then known as stack.
- Page 40 -
Form 3
Computer Studies
A stack is a number of rigid disks put on top of each other on a spindle or pivot. Files are accessed by
making reference not just to the track and sector but also on side number. Same track numbers on
different disks are known as cylinders. These were used on mainframe computers.
This is the most promising secondary storage technology; optical storage involves the use of a high
power laser beam to burn microscopic spots off the aluminium disks surface coating. Data is
represented by the presence of holes along a smooth shining surface. Binary 0, aluminium surface
burnt out presence of holes. Binary 1, aluminium surface reflects back. A much lower power beam is
then used to retrieve the data. The patterns of spots detected by the laser during a read operation are
converted into electronic signals used by the computer.
The capacity of the optical disk is enormous compared with most magnetic disk storage devices. A 5.25
optical disk, little larger in size than a diskette, can store between 600Mb to 17GB.
Standard Density
Double Density
- Page 41 -
Quadruple Density
Form 3
Computer Studies
CD-Rom (medium)
CD-Rom stands for Compact Disk Read Only Memory note that these disks are for reading and only
store the information that the manufacturer records on it. The user cannot erase, change, or add to it,
only read it. This type of optical disk is used primarily for storing huge amounts of data such as
government statistics, encyclopaedias, medical reference books, and dictionaries. CD-Roms have an
access time of about 160ms and a transfer rate of up to 800KB/s
The CD-Rom is an optical storage disk meaning it can be read by light sensing equipment. The
difference between this and magnetic type storage is the large amount of data it can hold. In fact, a CDRom can store up to 600Mb of data. Unlike the hard disk it is portable. A CD-Rom allows manufacturers
to store video clips, still pictures and sound tracks apart from text to create what we now call multimedia.
- Page 42 -
Form 3
Computer Studies
This type of video disk allows for recording onto the next free tracks until the disk is full.
This type of medium is recorded only once.
Erasable optical disks are an alternative to large capacity hard disks. They store 1,400 times as much
data as diskettes. In contrast to CD-Roms, erasable disks can be modified and erased. The removable
disks provide convenience and security along with huge storage capacity. Optical disks can also be used
to back up fixed hard disks. Many experts think that optical storage will become the most efficient
inexpensive storage method. They offer 15,000 tpi (tracks per inch), compared to 96 tpi of floppy disks.
NOTE that although nowadays we have re-writable CDs they are still not suitable for storing word
processing documents, databases etc. for they do not allow editing and manipulation (Save to CD cannot
be performed like to a floppy disk). They can only store an exact copy, which cannot be altered. Be
careful to exam questions regarding this.
The DVD medium is similar to the CD-Rom disk. There are no visible differences except that the tracks
are more closely packed. Therefore there are more tracks on the DVD than on the CD-Rom disk. These
new disks allow far more storage than the previous CD-Rom and today are available with a capacity of
around 17GB. This large amount of storage enables the inclusion of more video clips; in fact, the most
significant development sector for the DVD is in the film industry. One can already rent full feature films
on DVDs. The advantage of DVDs over the original video cassette tapes is the high quality digital sound
and video. These films are sometimes also provided with different language tracks pre-recorded so one
can choose the language in which to listen to the sound track
- Page 43 -
Form 3
Computer Studies
A CD-Rom is similar to an audio CD but with the recording tracks much thinner and closer to each other.
Therefore, the disk would be holding much more tracks for recording. At first there were two or three
major standards, which meant that not all CD-Rom drives were compatible to read all CD Roms.
However agreement was reached and a standard was set up. The CD-Rom drive uses a laser light to
read data on the tracks while the disk is spinning at a standard speed. These speeds have been
increasing rapidly from 1x to 40x. A high-speed CD-Rom drive, allows for better access time and better
refresh rates.
Access Time the time taken for the transfer of data from the CD to the computer
Refresh Rates higher refresh rates prevent the video picture from flickering.
DVD devices operate much on the same principle as CD-Rom drives. They use a laser light to trace the
video signal on the tracks. The tracks are however more compact and since the layout of these tracks is
totally different from that of the CD-Rom drive new standards had to be agreed.
DEVICE
MEDIA
TYPE
ACCESS
Cassette Tape
Magnetic
Serial
Reel Tape
Magnetic
Serial
Floppy Disk
Magnetic
Direct
Hard Disk
Magnetic
Direct
Zip Drive
Zip Disk
Magnetic
Direct
CD-Rom Drive
CD-Rom
Optical
Direct
WORM Drive
WORM
Optical
Direct
CD-R, CD-RW
CD-R, CD-RW
Optical
Direct
DVD Drive
DVD
Optical
Direct
Electronic
Direct
- Page 44 -
Form 3
Computer Studies
BOOLEAN LOGIC
Computers are effectively complex calculators. All inputs to the computer from keyboard, mouse and
other input devices must be translated to numbers. This is done so that the computer would be able to
work out the problem and produce the required output.
Discrete data or digital data consists of a set of pulses, which may be counted. A switch can be
either on or off (1 or 0). Integer numbers are also discrete you cannot have a whole number between
5 and 6 for example. Other examples of discrete data are car mileometer readings, heartbeats etc.
Modern computers can only store and process digital data. Hence any analogue data which needs to be
processed by a computer must be first converted to digital form. This is done by taking samples of the
analogue data at fixed time intervals. These samples are then converted to the digital equivalent.
Modems are used to convert analogue data to digital and vice versa.
Examples of Analogue type:-
- Page 45 -
Form 3
Computer Studies
Logic Gates
Logic gates are electronic devices that are used in the computer to work out these mathematical
calculations. Logic gates are fed with a particular binary number consisting of two or more digits and
generate a single output. Logic gates have rules which determine the output of a logic gate depending
on the input of the logic gate. These rules are known as truth tables.
AND Gate
OR Gate
NOT Gate
OR Gate
AND Gate
A
C
A
C
Input
Output
A
C
OR
NOT Gate
AND
- Page 46 -
Input
Output
NOT
Form 3
Computer Studies
The OR Gate
The OR gate can be compared to an electric circuit consisting of a battery, a bulb which represents the
output, and two switches, switch A and switch B which represent the inputs connected as shown above.
Two inputs (A and B), when combined in an electrical circuit using an OR Logic Gate will yield an output
(C) which is equal to either 0 (false) or 1 (true), depending on which values, 0 or 1, the inputs have. In
general, OR is true when either or both inputs (A and B) are true, otherwise, OR is false.
The following truth table shows when an OR Logic Gate is true and when it is false.
Input A
Input B
Output C
The only time Output Y is true (equal to 1) is when either or both Inputs A and B are true (equal to 1);
when both Inputs A and B are false (equal to 0), Output Y is also false (equal to 0).
The AND gate can be compared to an electric circuit consisting of a battery, a bulb which represents the
output, and two switches, switch A and switch B which represent the inputs connected as shown above.
Two inputs (A and B), when combined in an electrical circuit using an AND Logic Gate will yield an output
(C) which is equal to either 0 (false) or 1 (true), depending on which values, 0 or 1, the inputs have. In
general, AND is true only when both inputs (A and B) are true, otherwise, AND is false. (When
any Logic Gate is true, it means that electrical current is able to go through it; when it is false, electrical
current is not allowed to go through it.)
The following truth table shows when an AND Logic Gate is true and when it is false.
Input A
Input B
Output C
1
- Page 47 -
Form 3
Computer Studies
The only time Output Y is true (equal to 1) is when Inputs A and B are both true (equal to 1), otherwise
Output Y is false (equal to 0).
The NOT Gate has only one input and one output as shown in the table before.
Whenever an Input is true (only one Input is required), the NOT makes it false. Similarly, whenever an
Input is false, the NOT makes it true. The NOT gate is also known as an inverter.
The following table shows when Output C is true and when it is false.
Input (A or B or Combination)
Output C
The amount of inputs to a logic gate will determine the number of possible outputs. This can be worked
out by following this simple calculation:
For n number of inputs to the gate, the combinations produced can be calculated by using 2n
Where 2 stands for the binary number that can have only two digits either 1 or 0
Example:
A gate with 2 inputs 22 = 4
A gate with 3 inputs 23 = 8
- Page 48 -
Form 3
Computer Studies
Boolean Expressions
When building the Boolean expression, the following symbols should be used at all times:
1)
A OR B represented as A + B
2)
3)
NOT A represented as
- Page 49 -
Form 3
Computer Studies
Example:
NOT
AND
In order to work out a Boolean expression, one must follow some basic steps:
Always work out the Boolean expression starting from output to the input
d. The logic circuit is made up from a number of gates, thus it is good practise to see the circuit as
being made up of a number of gates rather than as a whole
- Page 50 -
Form 3
Computer Studies
- Practical Examples -
Example 1:
NOT
AND
C = ((NOT A) AND B)
C = (() . B)
- Page 51 -
Form 3
Computer Studies
The figure below helps to understand better how the Boolean expression above was constructed:
A
NOT
AND
C = (() . B)
- Page 52 -
Form 3
Computer Studies
BINARY CONVERSIONS
Objectives:
Number Systems
As discussed in the Boolean Logic chapter, the computer is basically a complex calculator. A computer
must translate everything to number form and perform a series of calculations before it can work out
something. It does not use the Decimal number system as us humans but uses Binary numbers and
Hexadecimal numbers. This chapter will help us to understand better how the conversions are made,
and how calculations are achieved.
Why Binary?
A computer, being an electronic machine is made up of switches, that is, the circuits are either in the ON
state or in the OFF state. The binary number system is the ideal number system to represent the twostates because it has only two digits: zero and one. A term commonly used to refer to 1 or 0 in binary
system is bit.
A bit is defined as a Binary Digit that can be either 0 or 1. A group of 8 bits is called a byte. The
number of bits processed by a processor is called the wordlength and is determined by the computer
- Page 53 -
Form 3
Computer Studies
manufacturer. The following terms are often used as a unit of memory measure of a computer. For
example, we speak of gigabytes of hard-disk space and megabytes of RAM
A BIT (Binary Digit) is one of the digits used in binary notation, i.e. 0 or 1.
As already mentioned, human beings use the Decimal number system to perform calculations. This
number system is based on the manipulation of 10 basic numbers
System
Base
Digits Used
Decimal
Base 10
0,1,2,3,4,5,6,7,8,9
Binary System
The computer is made up of electronic circuits, which in turn are made of switches. A switch can be
either ON or OFF, meaning it can only have TWO states.
System
Base
Digits Used
Binary
Base 2
0,1
- Page 54 -
Form 3
Computer Studies
Hexadecimal System
Hexadecimal numbers are used by the computer for addressing the memory locations. Hexadecimal
system uses a 16-digit system
System
Base
Digits Used
Hexadecimal
Base 16
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
As the Hexadecimal system has more digits than the Decimal system, letters had to be added to the
system:
10
11
12
13
14
15
- Page 55 -
Form 3
Computer Studies
In order to convert a Decimal number to Binary, we must divide the decimal number by 2 successively.
If the number has a remainder, this is equal to 1, if not it will equal to 0:
Example:
15
r0
r0
r1
ANS: 0010
48
r1
24
r0
r1
12
r0
r1
r0
r1
r0
r1
r1
ANS: 01111
ANS: 0110000
110101
Most
Significant
Bit
(MSB)
Least
Significant
Bit
(LSB)
- Page 56 -
Form 3
Computer Studies
1st Method:
(1 x 16) + (1 x 8) + (1 x 4) + (0 x 2) + (1 x1)
16 + 8 + 4 + 0 + 1
=29
nd
2 Method:
27
26
25
24
23
22
21
20
Weight
128
64
32
16
16
16 + 8 + 4 + 0 + 1
=29
Form 3
Computer Studies
In this method, the decimal number is divided by 16. In this way a remainder from 0 to 15 is obtained.
You must keep in mind that in Hexadecimal we have to convert from 0 to 15 into A to F respectively.
Example:
16
30
16
r14
r1
ANS: 1
14
ANS: 1
16
100
16
6
0
ANS: 6
16
1024
r4
16
64
r0
r6
16
r0
r4
ANS: 4
In this method, one must first change the decimal number to binary. Secondly, the binary number must
be grouped in groups of 4 bits each, starting from the least significant bit.
Finally each individual group in converted to decimal again, and any number greater than 9 must be
converted to A to F.
- Page 58 -
Form 3
Computer Studies
Example:
Convert from Decimal to HEX
Decimal Number:
166
Step 1:
Convert to Binary:
10100110
Step 2:
Step 3:
Change to decimal:
ANS:
1010 0110
10
1st Method:
As used in Binary to Hexadecimal conversion we are going to use the same method. This can be shown
more clearly through the following example:
A516
= (A x 161)
(5 x 160)
= (10 x 16)
(5 x 1)
= 160
= 16510
- Page 59 -
Form 3
Computer Studies
2nd Method:
The second method involves the Hexadecimal number being grouped. Secondly, each number is
converted to a 4-bit binary number. Thirdly, each 4-bit number is grouped in a single binary number and
finally this number is converted to decimal.
HEX Number:
B3
Step 1:
Step 2:
Step 3:
Regroup:
Step 4:
Convert to decimal:
1011
0011
10110011
17910
- Page 60 -
Form 3
Computer Studies
Converting Hexadecimal numbers to Binary is relatively simple. One must first get each HEX number and
convert it into a 4-bit binary number. Finally, the individual 4-bit binary numbers are grouped together to
form a single binary digit.
Example:
HEX Number:
A4F
Step 1:
Step 2:
Step 3:
Group together:
1010
0100
1111
1010010011112
Converting from Binary to Hexadecimal follows the same principle as used in the HEX to Binary
conversion. The Binary number is first divided into 4-bit binary groups. Each group is converted to
decimal and then finally to HEX.
- Page 61 -
Form 3
Computer Studies
Example:
Binary Number:
Step 1:
Step 2:
Convert to decimal
Step 3:
Convert to HEX
11001101
1100
1101
12
13
D
= CD16
Binary Arithmetic
As mentioned before, the computer is a complex calculator and certain arithmetic calculations take place.
In this course we are going to concentrate on learning how to perform addition and subtraction on Binary
numbers.
Addition:
Since in Binary we only use two numbers; 1 and 0 calculations are very simple to understand. However,
some rules have to be followed:
0
0
1
1
+
+
+
+
0
1
0
1
=
=
=
=
0
1
1
0 carry1
- Page 62 -
Form 3
Computer Studies
Example:
Add the following binary numbers:
1) 1101 + 1100
2) 1000 + 0111
Sum (1)
Sum (2)
Carry 1
1101 +
1100
11001
13
12
25
1000 +
0111
1111
8
7
15
Carry 1
Subtraction:
Subtraction is not as easy as addition, since computers are not capable to perform subtraction. For this
reason, we must use addition. Consider the following
Subtract X from Y
ADD (-X) to Y
=
=
YX
Y + (-X)
In the end the two above examples will give the same result. This concept is known as
COMPLIMENTATION. In order to assign a negative quantity to a binary number one must perform 1s
and 2s compliment.
1s Compliment
In order to find the ones compliment of a binary digit one must replace ones (1s) with zeros (0s) and
vice versa.
Example:
Find the ones compliment of 11001010
Binary digit
11001010
Convert
00110101
- Page 63 -
Form 3
Computer Studies
2s Compliment
To achieve the twos compliment, you must add a binary 1to the ones compliment of a binary number
Thus following the result obtained in the example above we have:
Ones compliment
ADD 1
00110101
+1
Twos compliment
110110
Subtraction Rules
Example:
Work out 110 11
- Page 64 -
Form 3
Computer Studies
Step 1:
110 011
110 + ( - 011 )
011
100
+1
2s compliment
101
Step 3:
110 +
101
1011
Ignore the carry so ANS is:
11
Registers
In our computer, information is held in the form of Binary digits and stored in Registers, these being like
binary containers or drawers. Registers have certain limits or sizes; in other words an 8-bit register
cannot contain a 6-bit binary digit.
A number that it is too big to be represented in a register of a particular size causes a Numerical
Overflow Error.
For Example:
A 3bit register is used to store the number 810
810 = 10002 As it can be clearly seen you need 4 bits to represent the decimal number 8. In this case
an Overflow Error will be generated.
A Number overflow error can also be generated if the number is too small to be represented in the
register.
A register can contain integers, that is the quantity of a whole number. This whole number can be
positive, negative or zero.
- Page 65 -
Form 3
Computer Studies
Unsigned Integers can only be positive or zero. If we take a 3-Bit digit, we can have the following
numbers:
Example:
Binary
000
001
010
011
100
101
110
111
Integer
0
1
2
3
4
5
6
7
In order to determine how many different combinations or codes can be obtained using a number of
digits; one can use the expression 2n.
To determine the largest number that can be obtained using a number of bits one must use
2n - 1
Example: What is the largest number that can be represented using 8 bits?
28 - 1
256 1 = 255
We subtract one since the numbers start from zero. In this case the range is between 0 and 255
Thus, the larger the size of the register, the greater is the largest number that can be stored in it as
illustrated in the table below:
Size of register
2 bits
4 bits
8 bits
16 bits
Different codes
22 = 4
24 = 16
28 = 256
216 = 65536
Largest integer
4-1 = 3
16-1 = 15
256-1 = 255
65536-1 = 65535
Range
From 0 to
From 0 to
From 0 to
From 0 to
3
15
255
65535
Signed Integers
Signed integers are all those integer numbers that can be either Positive, Negative or Zero. Signed
integers can be represented as follows:
- Page 66 -
Form 3
Computer Studies
Ones compliment and Twos compliment were discussed earlier when we dealt with the binary
subtraction.
This mode has a bit after the most significant bit that shows if the number is positive or negative. When
this bit is 1, it is negative and when it is 0 it shows that it is positive.
Example: The 4-bit register in the example is representing -6
0 means Positive
1 means Negative
In order to obtain the range of signed integers that can be represented in an X-bit register, the following
expression can be used:
- Page 67 -
Form 3
Computer Studies
Example: What is the range of signed integers that can be represented in a 4-bit register?
Representation of characters
As we already know, all information going in the computer must be changed to binary numbers. Thus
each character must be assigned by a numerical code referred to as a Character Code.
The Character Set is the group of codes that can be used. The number of codes that can be created in
this character set is dependant on the size of the bits used to store the character.
Example: if an 8-bit is used, 256 (28) characters can be represented
- Page 68 -
Form 3
Computer Studies
APPLICATION SOFTWARE
1.
Hardware and System software (Operating System) alone do not provide a single
specialised task
2.
representations) which look like push buttons on the screen and the user can use the
mouse to select them. This interface idea is known as Graphical User Interface (GUI).
The following image shows the familiar GUI of MS Windows XP
- Page 69 -
Form 3
Computer Studies
- Page 70 -
Form 3
Computer Studies
APPLICATIONS SOFTWARE
Productivity
Software
Word processing
Business
Specialty
Software
Desktop
publishing
Spreadsheets
Personal finance
Presentation
Graphics
Entertainment
Software
Home /
Personal
Software
Games
Cookbooks
Etc..
Medical
Encyclopedias
guides
Almanacs
CAD / CAM
Gardening
Library searches
Etc..
Home repair
Painting
Etc..
Communications
Hypertext
Groupware
Multimedia
authoring
(and multimedia
software
components such
as animation
software,
music/MIDI,
sound capture
and editing, video
capture
and
editing,
speech
synthesis,
drawing, painting,
hardware support
)
Browsers
books
Home decoration
Drawing
Suites
Phone
Project
management
Database
managers
Desktop
accessories
Education /
Reference
Software
- Page 71 -
Form 3
Computer Studies
- Page 72 -
Form 3
Computer Studies
Easy to use:
Lets the user do the job with minimum effort
ii.
Robust:
Application should be tolerant to users mistakes and allow recovery if
something should go wrong.
iii.
iv.
Helpful:
If a mistake is done, the application should give the user a clear
explanation of what was wrong and how to recover from the error.
The system should issue warning messages and request confirmation
before allowing the user to proceed.
On-line help, through telephone line or through Internet.
One should not underestimate the importance of user-friendliness for the
success of a system all too often a computer system does not succeed
simply because users do not accept it.
- Page 73 -
Form 3
Computer Studies
Accounts
1.
The accounting package keeps track of money owed to the company for goods sold or
services provided.
A fixed-asset inventory record is maintained for each item and includes such data as date
purchased, cost, location, and inventory item number.
2. The system includes data on performance reviews, skills, and professional development.
Manufacturing
1. In a manufacturing company, the order entry and processing system accepts and processes
customer orders.
2. When an order is made, the system takes care to feed data, either to the warehouse if the
item is in stock or if it is out of production. It also feeds data to the accounts receivable
system for billing.
3. The system monitors the orders from the order entry until the product is delivered to the
customer.
Production scheduling
Manufacturing resources (materials, machinery and workers) are allocated through the
production process in order to minimise time and increase efficiency of the production line.
- Page 74 -
Form 3
Computer Studies
Project Management
1. This application software provides the management with a tool to keep projection within
budget and on time.
2. The tasks, which are going to make up the project, are put one after each other in their
order so that the project can be finished.
3. This software will give the management a tool to plan the project without involving any
expensive measures.
Robotics
1. An industrial robot is best at tasks that are repetitive and tasks that require precision
movements, moving heavy loads, and working in hazardous areas.
2. This software application will give access to the robot programmer to load the set of tasks
that the robot has to perform to carry out the job.
Ease of correction
Automatic Formatting
Multiple copies and Form Letters
Automatic Features
Search and replace facilities
Spelling checkers and thesaurus
- Page 75 -
Form 3
Computer Studies
Font changes
Mail Merge
Other features: Multi column text, grammar checker, table formatting,
inclusion of drawings
Catalogues
Brochures
Presentations
Reports
Memos
News releases
Addressing
Mailing list
- Page 76 -
Form 3
Computer Studies
The results must be of typeset quality, meaning that proportional spacing, kerning, tracking
and leading control, and justification of both right and left margins is possible. Automatic
hyphenation is also usually supported.
This allows the user to arrange text and images on the display screen as desired in columns,
sidebars, and so on. The arrangement on the screen is the same as that which appears when
the page is printed.
Incorporate graphics:
This makes it possible for the user to move text and images as desired. The DTP software
does not usually allow the user to create the text and the image data these must be created
using other software (a word processor for the text, and a graphics package for the graphics)
and then imported into the DTP program for exact placement.
All DTP software allows the user to edit text. Such text editing facilities are usually minimal,
and only meant for performing small corrections or adding captions and headings.
Although this of course depends more on the printer than the DTP software, it does mean that
the software must support high-resolution printers (typically at least 300 dpi resolution).
<< NOTE >>
Nowadays, Word Processors such as MS Word will also provide desktop publishing features such as
automatic table of contents and index creation, multi-column documents, tables, frames, embedded
graphics objects etc.
Even providing such DTP features however, software such as MS Word still is considered a Word
Processor and not a Desktop Publisher.
- Page 77 -
Form 3
Computer Studies
Lables are words to describe particular items such as Bread, Tomatoes, Meat etc.
Values are numeric quantities like LM 0.15, LM 0.30 etc. Value cells are sometimes called Input
cells, since the user inputs data to the spreadsheet via these cells, and represent the variables
or parameters of the system being modelled by the spreadsheet.
Formulas describe computations to be made on the contents of the cells (formulas are not
displayed on the spreadsheet they are computed, and their results displayed instead). For this
reason, formula cells are sometimes called Output cells or Result cells, since they serve to
display the results of computations performed by the spreadsheet.
The real power of a spreadsheet comes from the fact that formulas are recalculated every
time the value in a value cell changes the output cells change dynamically as the input
parameters are varied.
Spreadsheet formulas can perform:
I.
II.
III.
IV.
Financial calculations
Mathematics
Statistics
Date calculations
3. Operations on Cell.
Spreadsheets can carry operations on cells or group of cells such as: clear, move, delete and
copy whole rows and columns.
4. Data Graphing.
A nice feature of spreadsheets is to display selected values in graphical form:
- Page 78 -
Form 3
Computer Studies
Line graphs
Bar graphs
Scatter plots
Area graphs
5. Spreadsheet publishing.
Modern spreadsheets support desktop publishing features such as fonts, colours, graphics and
borders. These features are useful for preparing presentation and reports.
Form 3
Computer Studies
a.
Numeric
b.
Date fields
c.
d.
Text fields
e.
Memo fields
f.
Picture fields
Note: for more information on fields, follow text book page 289
The Database Management systems (ref book pg 289)
The Data Base Management Systems (DBMS) is a software package for creating, maintaining and
retrieving data from a database.
Although the term database is frequently taken to include BOTH the collection of data AND the
package which provides access to the data (the DBMS), strictly speaking this is not so. We will use
the following terms for clarity:
Database:
DBMS:
Database System:
Form 3
Computer Studies
When a value entered in such a field, the DBMS can immediately check that the value
entered is in the list, and if not reject it. This practically eliminates mistyping such fields.
Required fields:
While certain fields may not apply in certain cases (e.g.
telephone number) and therefore may be left blank, others are required (e.g. an
employee number and employee name). The DBMS will ensure that required fields are
not left blank.
Mutually dependant fields: Certain fields may depend on other fields. For example in
a record, which contained fields MARRIED and WIFES NAME, entering N for the first
should force you to leave the second blank, and vice versa. The DBMS may be instructed
to carry out such checks.
Unique fields:
Certain fields may be declared unique, such as the
employee number field. Such fields are called key fields, and serve to uniquely identify a
record. The DBMS can ensure that data entered in such fields is indeed unique.
- Page 81 -
Form 3
Computer Studies
Computer simulations are useful scientific and business tools. They enable computers to
pretend (simulate) that they are carrying out a number of things from simulating a queue at the
post office, to working out what would happen in the event of a nuclear war.
Computer simulations are usually based on mathematical models held inside the computer
that represent the physical process being carried out in the real world.
Virtual reality simulations are different from computer simulations because they require
special interface devices that transmit the sight, sound and sensations of the simulated world to
the user.
Interface devices include:
Head mounted display (HMD), equipped with screens directed to the eye for the
vision, earphones for the sound, and position tracker to monitor the location of the
user.
The haptic interface (Haptic technology, technology that interfaces with the user through
the sense of touch), which relays the sense of touch and other physical sensations in
the virtual world.
Uses of Virtual Reality:
Virtual reality is currently used to explore and manipulate experimental data in ways that were
not possible before.
Therapists use VR to treat sufferers of child abuse and people who are afraid of heights.
Muscular dystrophy patients can learn how to use a wheelchair through virtual reality.
Surgeons may use VR to plan and practise an operation on a virtual patient rather than a
real person.
- Page 82 -
Form 3
Computer Studies
Architects could take clients on a virtual tour of a new house before it was built.
VR could be used to train the operators of aircraft and other complicated machinery.
Network VR simulations could enable people in many different locations to participate
together in teleconferences, virtual surgical operations, or simulated military training
exercises.
- Page 83 -
Form 3
Computer Studies
THE INTERNET
Objectives
To understand the nature of the Internet as in terms of a global network of computers
connected together.
Discover the different uses of the Internet such as email, information, browsing, file
transfer, socialising, and the use of other computers on the net.
Discuss HTML and URL and their uses in the world of the Internet.
Networks is the term used when a number of computers are connected together in order
to share resources and achieve communication from one place to another.
LANs (Local Area Networks) as they are generally called are a network of computers that
cover a small geographical area usually only the building of the company.
The internet can be described as a global network of computer networks. These networks
vary in nature and size, such as, huge government departments, university and college
networks, large companies such as IBM and many other commercial systems and non
profitable organizations.
People use the internet for different reasons such as, email, file transfer, information
retrieval, social chatting, and checking on news, weather etc.
In 1969 the USA government started a project called DARPA in order to connect
computers that are geographically distant from each other. This was required as a means
of exchanging military research information between researchers at different locations.
- Page 84 -
Form 3
Computer Studies
By time, this network started evolving both in number and technology and in 1990 the
Internet that we know today was launched.
Today, the Internet connects millions of computers together that share resources and
knowledge.
The Uses of the Internet:
The use of the internet can be divided into the following five major categories:
1. The Email (Electronic Mail)
Probably the most common use of the internet. Email is much faster than traditional
methods of sending documents (postal system). Documents travel as binary files and
are then converted back into plain text using special software. Email is efficient and
convenient.
The email provides the facility to send letters through the Internet to people who have
access to the net. Multiple copies can be sent to multiple addresses just by adding the
address to the address list.
You can check for post at any time of day.
This is achieved by means of special application software such as Microsoft Outlook Express
or Netscape Communicator.
One of the greatest features of emails is the ability of attaching files to the letter in the
form of documents, pictures, sounds, and movies.
2. Information Browsing
One of the most used features of the Internet is to search for particular information through
large databases all over the world
- Page 85 -
Form 3
Computer Studies
This information provided in the form of web sites makes part of the so called World
Wide Web or more commonly known as WWW. This is a means to search information
centres all over the world.
Examples of software used to access the WWW are MS Internet Explorer and the Mozilla
Firefox
3. File Transfer
FTP or File Transfer Protocol is a system used on the Internet to make possible the
transfer of information from one computer or network to another.
Anonymous FTP refers to those archive sites which allow anyone to access it.
4. Socializing Chat and Newsgroups
An important part of the Internet which is widely used by youngsters is the Chat or
Internet Relay Chat IRC. With this facility, people can communicate real time
through the keyboard.
Another form of socialising, are newsgroups (known as Usenet). This allows you to post
and read articles on newsgroups. Usually newsgroups are grouped and have a particular
topic
.
5. HTML Hypertext Mark-up Language
HTML is a language that is used to create Web Sites. This language gives the facility of
linking different pages together.
On web sites this can be seen when the cursor is dragged over a particular word or
phrase. The cursor will change from an arrow sign to a palm sign. When the mouse
button is double clicked on that word or phrase, another page will be loaded.
6. URL Universal Resource Locator
This is the address that shows in which computer (information centre) the web site is
held.
An Internet address (for example, http://www.4sale.com/trade/), usually consisting of
the access protocol (http), the domain name (www.4sale.com), and optionally the path
to a file or resource residing on that server (trade).
7. Study Note
In this chapter we have gone through the basics sections that make up the Internet. We have
also included some hints on how to send / receive emails and the basic steps for using Browsing
software.
At this point, you should be able to:
Understand the nature of the Internet as in terms of a global network of computers
connected together.
Understand the different uses of the Internet such as Email, Information browsing, File
transfer, Socializing and the use of other computers on the net.
- Page 86 -
Form 3
Computer Studies
Describe HTML and URL and their uses in the world of the Internet.
Describe the basic features of the email and browsing software.
8. << Questions >>
Q1. What are the advantages of the email as compared to the conventional written letter?
Q2. Describe the term URL
Q3. How can the Internet promote socializing between people of different countries and
cultures?
9. Glossary
ANSI
Anonymous FTP
ASCII
Com
DNS
Encryption
Ethernet
File Server
A computer that stores files on the Internet, making them available for
access by various internet tools.
Firewall
Forum
Frame
FTP
File transfer protocol, this defines how the files are transferred over the
internet.
HTTP
HTML
Hub
Hz
IP
Internet Protocol
- Page 87 -
Form 3
Computer Studies
IRC
ISDN
Log
Login
Mailing List
Net Surfer
Newsgroup
Message area, defined by subject matter, which forms part of the Usenet
Node
Offline
PPP
Site
SMTP
URL
- Page 88 -
Form 3
Computer Studies
MULTIMEDIA
1. Objectives
Benefits of Multimedia;
Where it is used.
2. Multimedia
Definition of Multimedia:
Multimedia is a general term applied to all hardware devices and software that
offer a combined solution to video, audio and text presentations. The
presentations are usually interactive, which mean that the user may take an
active part in selection. This is the most active developing field for peripherals
and software alike.
- Page 89 -
Form 3
Computer Studies
If a product contains at least three of these elements, it can be claimed to have multimedia
properties, but if no sound or moving pictures are present, then the benefits that can be obtained
from using it are limited.
3. Multimedia technology
Multimedia technology can be subdivided into 2 categories:
a. Multimedia Hardware and Software
b. The Transport and storage medium
4. Multimedia Hardware and Software
Most PCs (Personal Computers) today are equipped with hardware that can support
Multimedia products (application software).
However, the minimum requirements by multimedia products are:
Operating system MS Windows 95 or 98
CPU 486DX2 / 66Mhz
RAM 12MB for Windows 95 and 16MB for Windows 98
Screen display 640 x 480 pixels, 256 colours
CD-Rom Speed Double speed (2x)
Hard disk space 6MB
Audio 8-bit sound card
Other Speakers or headphones and a mouse
As you can see, the minimum requirements shown above are way below what is available
in many computers today.
5. The transport and storage media
Multimedia products (software) are stored in digital formats. The standard media for the
storage and transport of Multimedia software has become the CD-ROM and more
recently the DVD-ROM.
The reason for adopting such a standard was for the excellent features that the CD and
DVD can offer. Such features are slim and portable size and have great storage capacity.
6. Benefits of Multimedia
There is an old Chinese proverb that says:
- Page 90 -
Form 3
Computer Studies
- Page 91 -
Form 3
Computer Studies
SOFTWARE
1. Objectives
What is software and why it is needed;
The difference between Application software and System software;
Installing computer System software and Application software;
Discuss the purchasing of software and software piracy and protection;
Nature of software;
Discuss System software, Control programs, Operating Systems, System utilities, Diagnostics
and program software.
2. Software
A computer system is made up of the hardware (physical electronics in or attached to
the computer caser) and the software (a program made up of instructions that tell the
hardware what to do);
Software programs can be divided into two main groups:
- Application Software
- System Software (refer to figure on page 267)
- Page 92 -
Form 3
Computer Studies
The main job of the System software or Operating system as it is normally called,
deals with the control of the computer hardware whilst the Application software caters
for particular applications such as Payroll, Stock control, Word processor etc.
In order to run an Application software, an Operating system must be loaded first.
3. Installing a computer Operating system
To install an OS, it is recommended to backup or take a copy of the contents, if any, of
your hard disk since the hard disk is usually formatted prior to the OS installation.
This procedure can be dangerous, since if it is not performed as it should be, precious data
can be lost. It is thus advised that the installation documentation be read carefully.
Otherwise, it is best to seek help from a professional. Usually, the installation of new
operating systems like Windows has a friendly installation wizard that will guide you
through the process of loading.
4. Application Software
In order to install the Application Software, it is necessary to have an Operating System
previously installed;
Most modern application software comes on a CD or DVD. Installing a program is not
simply done by copying the contents of the CD onto the hard disk.
In order to perform the program installation one usually needs to run the installer or setup program usually present. This program provides an interface and guides you step by
step on how to install the program.
In the progress, program files might be uncompressed, put into their correct sub
directories, and the system configured for usage.
If a problem with the installation should arise, you should consult the installation manuals
provided with the software.
5. Buying Software
There are a number of benefits when buying original software:
It ensures that you have the latest version, including manuals and all accompanying
support material;
You can be given help from the manufacturer if you have trouble;
Upgrades at reduced prices;
It is requested by law that you only purchase licensed software (refer to book The
software Copyright Law page 273);
Reduces virus risks.
- Page 93 -
Form 3
Computer Studies
Reseller Piracy This occurs when computer hardware companies or shops sell
computers which are pre-installed with non-licensed software.
d. Home Piracy An example of this form of piracy is the trading of copied software with
friends.
Please read the first paragraph on book page 270 so as to have an idea of the amount of
software piracy that takes place in Malta and the rest of the world.
7. Software protection
In order to produce software, software manufacturing companies spend a lot of money
and resources for producing that software;
Thus they adopt different systems in order to prevent their software from being copied
illegally;
Hereunder are some of the most commonly adopted protection systems (refer to book pg
270);
- Page 94 -
Form 3
Computer Studies
b. Keyword protection:
This is frequently used with cheap software.
This system demands that every time you start the program, the software will
ask you to enter a particular word from the users manual. Each time the
program is used, a different word from a different page will be demanded.
Although it is quite easy to photocopy the manual, it is frequently not worth it
since the software is quite cheap (and the manual usually quite thick).
c. Software Registration:
The software owner will be asked to register the newly purchased software with
the manufacturing company. This can be achieved by either sending a card
supplied with the software by post, or by doing an on-line registration on the
Internet. Your name and details will be listed at the mother companys database,
and thus this will give you some privileges, such as free help, cheap
upgrades etc.
9. Nature of Software
The term SOFTWARE includes all programs that control the computers activities. These are:
Programming Software
System Software
Operating Software
Application Software
- Page 95 -
Form 3
Computer Studies
Systems Software:
Control Programs:
This is an integral part of the operating system, which handles the
transfer of data between peripherals and internal storage, checks if peripherals are working
properly and informs the operator if they are not. Control programs together with the Operating
system fall under the Operating Software category.
System Utilities:
These programs are included within the operating system. They
perform housekeeping tasks, such as formatting disks, backing up data and copying files, setting
system parameters etc. (Example Windows Explorer).
Diagnostic Utilities:
Programming Software:
These include all those programming tools necessary to create
(code) programs (usually application software).
These programs allow:
The writing of a source program file (using an editor)
Translation of source code into machine code
Production of the object program file
Testing and debugging aids
Program executor
10. Study Note
At this stage you should be able to discuss:
- Page 96 -
Form 3
Computer Studies
- Page 97 -