Professional Documents
Culture Documents
Figure 1.1 – Picture of Mr. Babbage’s Invention (Left) and Picture of Mr.
Hollerith’s Invention (Right)
And in the year 1970, Intel Company unveils their first Dynamic
Random Access Memory (DRAM) chip. The following year, Shugart leads the
creation of the floppy disk, where data can be saved as external storage. In 1973,
a research staff from Xerox Company named Robert Metcalfe develops the
Ethernet. During the year 1975, IBM Company releases their first commercially
available portable computer that is called IBM 5100. While in 1976, Steve Jobs
together with Steve Wozniak start the Apple Computer.
Figure 1.3 – Pictures of the first floppy disk and the IBM 5100
In 1981, the first IBM personal computer was introduced to the market
and this computer uses Microsoft MS-DOS operating system and the rest was
history. If you will notice this brief history, the common use of computer was
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 1 – WHAT IS COMPUTER SCIENCE?
to solve, or compute that’s why Computing Science indeed is a very huge topic.
And this module will be covering the Essentials or the Fundamentals of that
Science.
That’s how big computing Science is? Just another fact: Do you know
who the Father of Modern Computer Science is? It’s Alan Turing. So let’s know
who this man was? According to ReadWrite.com “Mr. Alan Turing was born in
June 23, 1912 at Paddington, London.” He was considered the father of modern
computer science because of his great contribution to the computing world like
the Turing Machine and the cracking of German Enigma Codes during the
World War II.
Figure 1.4 – Picture of Mr. Alan Turing and the Turing Bombes
The next topics for this chapter will expose you to the different basic
terminologies in Computer Science and Information Technology/Information
Systems as preparation for your further studies.
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 2 – INFORMATION SYSTEM VS INFORMATION TECHNOLOGY
That’s why in the next part of this chapter, we will be discussing some
of the known software technologies.
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 3 – SOFTWARE AND HARDWARE TECHNOLOGIES
Software Technologies
Software based on O’leary’s definition is the other term for program
and according to him program is the set of instructions that tells the computer
how to process data into the form you want. That’s why, softwares are not
only found in computers, it can also be found in other devices like TVs,
Refrigerators, Mobile Phones, Clocks and etc. Why? Because these devices
have Integrated Chips (IC) inside and inside those IC’s are set of instructions
(programs/algorithms) that allows it to function or move.
purpose applications or basic applications are kinds of programs that you have
to know to be considered as computer competent. And Special-Purpose
Applications or advanced applications are programs that are more narrowly
focused on specific discipline and occupations.
Hardware Technologies
When we say Hardware, we are dealing with the physical computer
(tangible parts of the computer, which you can touch and see). Since the birth
of computer, it is classified into four types namely: Super Computer,
Mainframe Computer, Minicomputer and Microcomputer.
Let us define each types of computer and the definition I will be using
is based from byte-notes.com. So let’s now begin with Super Computer,
Super Computer according to byte-notes.com is the “most powerful computer
in terms of performance and data processing. These are specialized and task
specific computers used by large organizations. These computers are used for
research and exploration purposes, like NASA uses super computers for
launching space shuttles, controlling them and for space exploration purposes.
Super computers are very expensive and very large in size. It can be
accommodated in large air-conditioned rooms; some super computers can
span an entire building. Seymour Cray is the one who designed the first super
computer CDC 6600 in 1964.”
And those are the four classifications of computer. Now, you know
that what you have at home is only the micro-computers. I suggest if you want
to see how a mini-computer, super-computer and mainframe computers. You
can search Youtube.com for videos. In the next chapters, we will be dealing
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 3 – SOFTWARE AND HARDWARE TECHNOLOGIES
with the parts of the computer and how to it works but for the next lesson, we
will be discussing on the Hierarchy of Data and what information is all about?
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 4 – DATA AND INFORMATION
Are you familiar with what we call the Hierarchy of Data? According
to Wikipedia.com Hierarchy of Data or Data Hierarchy is the systematic
organization of data, often in a hierarchical form.
Now, let us discuss and define each hierarchy form, so that you will
have a clearer view on what it is?
And this ends our lesson about the hierarchy of data or the Data
Hierarchy. But the learning doesn’t stop in that because the next topic is
another crucial and important lesson in the world of computer science and that
is the Number System. In this next lesson, we will be discussing some of the
known number system in computing science like binary, decimal, octal and
hexadecimal. We will also be dealing with the steps on how to convert binary
to decimal, octal to decimal and etc. And lastly, is that in the next lesson.
Students will learn how to do the basic mathematical operations with these
new number systems that you will learn. So let us define now what a number
system is?
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 4 – DATA AND INFORMATION
Do you know that the most commonly used system of numerals is the
Hindu-Arabic numeral system! According to Wikipedia.com, Two Indian
mathematicians are credited with developing it. Some other names that is
incorporated with this numeral system are Aryabhata of Kusumapura who
developed the place-value notation in the 5th century and also Brahmagupta
who introduced the symbol for zero.
base of the number system (where base is defined as the total number of digits
available in the number systems). Living in the Information Technology and
Computing Ages there are various number systems that we encounter like
Binary Number System, Octal Number System and Hexa-Decimal Number
System.So let us define and discuss it one by one.
After knowing the different Number system especially the one that we
use in the information technology world. Let us try to discuss some of the
basic mathematic operations with these types of data. Based on the book
Introduction to Computer Concepts by Juny Pilapil La Putt, there are four
different mathematic operations for binary numbers which is Binary
Addition, Binary Subtraction, Binary Multiplication and Binary Division.
Binary Addition is simple to learn since there are only two characters,
0 and 1, to consider. It is performed in the same manner as decimal
addition. There are only four possible combinations when adding these
two numbers and this is shown by the following table for binary addition.
0+0=0
0+1=1
1+0=1
1 + 1 = 0 Plus a carry-over of 1
To add two numbers, you can either count two digits in sequence or
you can simply remember the results of adding the four possible
combinations of digits, as given in the addition table. Carry-overs are
performed in the same manner as in decimal arithmetic. Since 1 is the
largest digit in the binary system, any sum greater that 1 requires that a
digit be carried over.Here are samples of binary addition also taken from
La Putt’s book.
a) BINARY DECIMAL
11 3
+100 + 4
111 7
b) BINARY DECIMAL
1010 10
+1100 +12
10110 22
c) BINARY DECIMAL
11.01 3.25
+101.11 + 5.75
1001.00 9.00
0 - 0 = 0
1 - 0 = 1
1 - 1 = 0
0 - 1 = 0 with a borrow of 1
a) BINARY DECIMAL
1010 10
- 100 - 4
110 6
b) BINARY DECIMAL
1111 15
-1000 - 3
111 7
c) BINARY DECIMAL
1000.11 8.75
- 11.01 - 3.25
101.10 5.50
0 x 0 = 0 0 x 1 = 0
1 x 1 = 1 1 x 0 = 0
And the following are the samples of binary multiplication from the
same book:
a) BINARY DECIMAL
111 (multiplicand) 7
X 101 (multiplier) x 5
111 35
000
111
100011
b) BINARY DECIMAL
11.00 3.0
X 10.10 x 2.5
0000 7.5
1100
0000
1100 .
111.1000
And last but not the least topic for the Binary Number Systems
Mathematic Operation is what we call the Binary Division. According to the
same book that we are using althrough-out the number systems, Binary
division is a very simple process. As in the decimal system, division is the
inverse of multiplication and division by zero is similarly meaningless.
Division is defined as the process of determining how many times one
number, the divisor, can be subtracted from the other number, the divident
while still leaving a positive remainder. The number of times this can be done
is the result, or the quotient.
The division of binary fraction is handled the same way as the division
of decimal fractions; that is, one converts the divisor to an integer by moving
the binary point in both the divisor and the divident the same number of
places. The complete table for the binary division is as follows:
0 / 1 = 0 1 / 1 = 1
Now, let us look at the example given by Mr. La Putt in his book:
a) BINARY DECIMAL
1100 ÷ 100 12 / 4 = 3
= 11
Are you now ready to try it yourself? At the end of this chapter are
different activities that you can try to test your understanding about our topics
in Chapter 1. See you!
Network Connectivity
When you heard of terms: Network, Internet or Connectivity, What
comes into your mind? When we say Network in computing terminology it is
a group of different computer or digital devices that is interconnected with
each other. And according to Techopedia.com, “Network Connectivity
describes the extensive process of connectinv various parts a network to one
another, for example, through the use of routers, switches and gateways, and
how the process works.”
After discussing what protocol is? We can now discuss the two different
type of Networks namely LAN (Local Area Network) and WAN (Wide Area
Network). LAN or Local Area Network according to Creative-Wisdom.com
is a smaller network that is within one location or between several buildings.
And when we say Local Area Network it can be in one room, several rooms in
a floor, between floors or can be between buildings but connected locally
meaning Local Area Network or LAN doesn’t use Service Providers to
transport data from one location to another location or from one building to
another building.
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 5 – NETWORK CONNECTIVITY
Last topic for this lesson is Packets. And more advance topic for Network
Connectivity will be discussed in Chapter 4 of this course module. Packets
according to digitalocean.com are the most basic unit that is transferred over a
network. When communicating over a network, Packets are the envelops that
carry your data into pieces from one end point to the other. And Packet is the
protocol data unit for the Network Layer of the OSI Model.
And those are some of the basic terminologies when it comes to network
connectivity. Again, more of Data Communication and Network Connectivity
will be discussed in Chapter 4 of this course module. Now, let’s precede to the
last lesson of Chapter 1 which is People Behind these Systems.
INTRODUCTION TO COMPUTING
CHAPTER 1: COMPUTING ESSENTIALS
LESSON 6 – PEOPLE BEHIND THESE SYSTEMS
Computer Components
And those are the six classifications of System Units together with
their samples and pictures. So now, Let’s move on to the different internal
components of a System Unit.
Processor
Processor also known as Central Processing Unit (CPU) is the heart
and brain of the computer because without this computer cannot do anything.
Not only in computers but also in other electronic devices, it needs to have a
processor but in their case, it is called IC chips or Integrated Circuit chips. So
let’s now seek the definition of Processor from the Internet, according to
businessdirectory.com “Processor is a microchip implanted in a CPU’s hard
drive that processes instructions sent to it by the computer and software
programs. Processors come in a number of sizes and are manufactured by
such corporations as Intel and Advanced Micro Devices. The greater the
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 1 – COMPUTER COMPONENTS AND SYSTEM UNIT ARCHITECTURE
gigahertz capacity of the processor, the quicker the computer will be able to
process instructions sent to it.”
According to Computing Essentials book of O’Leary Processor has
two basic components: 1) Control Unit – that tells the rest of the computer
system how to carry out a program’s instructions. And 2) Arithmetic-logic
unit – that performs two operations (arithmetic and logical).
Speed of the computer processor is expressed in word sizes and the
higher its bits, the more data it can process at a time. Processing speed of a
computer is represented by its clock speed (it is the number of time the CPU
can fetch and process data or instruction in a second).
And aside from the ordinary processor that we have in the market,
there is what we called specialty processors. The book Computing Essentials
by O’Leary cited some of what we call specialty processors like Coprocessors,
Smart Cards and RFID Tags.
Coprocessor according to techtarget.com “Is a special set of circuit s
in a microprocessor chip that is designed to manipulate numbers or perform
some other specialized function more quickly than the basic microprocessor
circuits could perform the same task. A coprocessor offloads specialized
processing operations, thereby reducing the burden on the basic
microprocessor circuitry and allowing it to work at optimum speed.” This
Coprocessor is commonly found in GPU or the Graphic Processing Unit.
And last but not the least, as cited by O’leary in his book is RFID
Tags. RFID which is the acronym for Radio Frequency Identification Tag is
also a microprocessor chip that can store information. According to
technovelgy.com “RFID refers to small electronic devices that consist of a
small chip and an antenna. The chip typically is capable of carrying 2,000
bytes of data or less. The RFID device serves the same purpose as a bar code
or a magnetic strip on the back of a credit card or ATM card; it provides a
unique identifier for that object. And, just as a bar code or magnetic strip must
be scanned to get the information, the RFID device must be scanned to
retrieve the identifying information.”
Imagine, aside from the ordinary processor like Celeron, Core Duo &
i5 created by Intel and Athlon & Phenom created by AMD. We have seen in
this chapter that there is also specialty processor like GPU, Smart Cards and
RFID Tags. Really, there are lots of things to learn about Computing Science.
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 1 – COMPUTER COMPONENTS AND SYSTEM UNIT ARCHITECTURE
Motherboard
Motherboard is what we call the chassis of a computer because it is
where the internal parts of a system unit are interconnected. According to
Computing Essentials book of O’leary, “System Board also known as
Mother/Mainboard controls communications for the entire computer systems.
Every component within the system unit connects to the system board. All
external devices including the keyboard, mouse and monitor connect to the
system board. System Board has a variety of different electronic components
such as Sockets, Slots and Bus Lines.
Memory has different types and we will be tackling in this lesson the
three well known types of memory; ROM (Read-Only Memory), RAM
(Random-Access Memory) and Flash Memory.
at a time. Many modern PCs have their BIOS stored on a flash memory chip
so that it can easily be updated if necessary. Such a BIOS is sometimes called
Flash BIOS.
Flash memory is also popular in modems because it enables the
modem manufacturer to support new protocols as they become standardized.
Flash memory is also called flash RAM.
So, were done again with the definition and types of memory and last
for this lesson is the discussion of other important internal peripherals.
Other Internal Peripherals
Other Internal Peripherals of a System Unit includes Ports and Power
Supply. Ports according to O’Leary’s book is a socket on a system unit that is
use to connect the external devices. Some of the ports are directly connected
to the Motherboard while some has cards that are inserted to the slots on the
system board. Ports are classified as Standard Ports, Specialized Ports, Legacy
Ports and Cables.
“No matter how powerful a computer system may be, its central
processing unit cannot function alone. Its performance depends largely on the
design and capabilities of the input and output devices that work with it.”(La
Putt, 1986)
This statement only means that computer is worth nothing if there will
be no data being inputted in it. That’s why in this lesson, we will be
discussing some of the I/O Components of a computer. By the way, I/O is a
common IT jargon or slang term for Input & Output. Input and Output devices
are use to give humans a connection to a computer system and when we say
Input devices, this are devices that allows any user to input raw data to a
computer system while Output devices are devices that present the processed
data into a meaningful format.
And now let’s dig deeper to this two by discussing it on by one. Let’s
begin with defining what Input is? And what are the Input Components of a
computer system followed by defining what Output is? And also discussing
what the different Output Components are?
Here also are the common types of Mice / Mice for Notebook from
Computing Essential book of O’Leary:
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 2 – INPUT AND OUTPUT
1) Optical Mouse – has no moving parts and is currently the most widely
used. It emits and sense light to detect mouse movement. An optical mouse
can be used on almost any surface with high precision.
5) Touch pads – to control the pointer by moving and tapping your finger on
the surface of a pad.
Aside from the said classification of mouse there are still other
pointing devices that are commonly used in the market like Touch Screen,
Joysticks and Stylus.
Photoshop product, that lets you resize and otherwise modify a captured
image.
Aside from Scanners there are also different types of scanning device
such as Card Readers, Barcode Readers and Character and Mark Recognition
Devices.
Card Readers are devices that decode or interpret the data written in a
magnetic strips (Strips that can be found at the back of credit card, debit card
or even identification cards) or the RFID tags (microchip that can be found in
access card, price tags, passports and etc.).
Barcode Readers are devices that contains photoelectric cell that scan
or read barcodes. Barcodes according to computerhope.com are lines of
different widths and sizes representing data, that when read determine what
the scanned object is. Barcodes are often used to help organize and index
information or prices about an object. Barcodes used by the U.S. postal
service that helps speed the delivery of mail is another perfect example of how
a barcode could be used.
We’re done discussing the Input Devices; let’s now move on to the
Output Devices. What is Output Devices? As i discussed earlier, Output is a
device or hardware that exhibit to human the processed data from the
computer whether by means of LCD Display, LCD Projector, Printed Output
and etc.
But let’s seek the dictionary to know what does Output device means?
According to Reference.com Output Device is an electronic or
electromechanical equipment connected to a computer and used to transfer
data out of the computer in the form of text, images, sounds or other media to
a display screen, printer, loudspeaker or storage device. Most modern storage
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 2 – INPUT AND OUTPUT
devices such as disk drives and magnetic tape drives act as both input and
output devices, others such as CD-ROM are input only.
Monitors may vary in shape and size. It may be a Cathode Ray Tube
(CRT) Monitors or it may be a Liquid Crystal Display (LCD) / Light Emitting
Diode (LED) Monitors. According to Computing Essentials book “Basically,
all monitors have the same distinguishing features like Clarity, Resolutions,
Dot (Pixel) pitch, Refresh rates, Size and Aspect Ratio. Let us define each
features in this lesson.
Dot (pixel) pitch – is the distance between each pixel. Most newer monitors
have a dot pitch of .31mm (31/100th of a millimeter) or less. The lower the dot
pitch (the shorter the distance between pixels), the clearer the image produced.
Aside from CRT, LCD and LED Monitors there are also some special
type of monitor that is used for special functions. Three of the special purpose
monitor or device that displays data to the user are E-book readers (handheld,
book size devices that display text and graphics. Common E-book reader is
the Amazon Kindle), Data projectors (specialized device that is similar to
opaque projector but data projcetors should be connected to a computer in
order to work) and High-Definition Television (television or monitor that is
much clearer and more detailed than regular television but High-Definition
television also requires a specialized ports and specialized cable such as
HDMI).
Aside from this two major classification of printers, we also have Dot
Matrix Printers (this printers are used to print characters and images using a
series of small pins on a print head. A bit inexpensive and reliable but quite
noisy. Typically used for task where high-quality out put is not priority or
required.), Thermal Printers (printer that uses healt elements to produce
images on heat sensitive paper. Commonly used as Tape receipts in the
groceries, atm machines, fast foods and etc.), Plotters (special purpose printer
for printing wide specialized output like blueprints, sketches designs and large
drawings), Photo Printers (another specialized printers that is design to print
photo quality images) and Portable Printers (typically small and portable in
size where in you can bring anywhere with your notebook).
Aside from the speaker and headsets there are also what we called as
Digital Music Players which are specialized hardware used for storing,
transferring and playing audio files.
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 3 – STORAGES
Storages
Aside from the CPU or the Central Processing Unit, another important
part of a computer is the Storage because it is where you put or save all your
processed data or data for processing. And in this lesson we will be defining
what a storage is? And what are the different types of storage?
Storage according to Techopedia.com is any computing hardware that
is used for storing, porting and extracting data files and objects. It can hold
and store information both temporarily and permanently, and can be internal
or external to a computer, server or any similar computing device.
This type of storage are considered as secondary storage because the
Memory of computers are referred to as the primary storage. The important
characteristics of the secondary storages as written in the computing essential
book of O’Leary is as follows:
1) Media are the actual physical material that holds the data and
programs
2) Capacity measures how much a particular storage medium can hold.
3) Storage devices are hardware that reads data and program from
storage media. Most also write to storage media.
4) Access speed measures the amount of time required by the storage
device to retrieve data and programs.
Next after Hard drives are the Thumb Drives and the External Hard
Disk. Thumb drives commonly known as USB Flash Disk or USB Thumb
drives, are one of the most compact way of transfer and storing data or
information because it can be transported even on a key ring. Thumb drive
capacity can be as small as 1 GB to 256 GB and of course the higher the
capacity the higher price of the USB Thumb drive. Aside from Thumb drive
another alternative will be what we call as the External Hard Disk, Same as to
the traditional internal hard disk. External Hard disk can be also SSD (Solid
State Drive) or the SATA (Serial Advanced Technology Attachment) Hard
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 3 – STORAGES
Disk but in this case External Hard disk is connected or linked to a PC using
USB cable and USB Ports.
Compact Disc (CD) is one of the most widely used optical format.
CD can store from 650 MB up to 1 GB of data on one side. There are three
basic types of CD: Read only (Common type of CD that you can buy in Music
Stores and as well as in Software Companies, wherein the CD only holds data
and available only for reading), Write once (Type of CD that is available in
Computer peripheral stores or Bookstore where in you can use the CD to hold
your data for future use or for transfer purposes), and Re-writeable (Same as
to write once type of CD, Re-writeable is a type of CD where in you can erase
and over ride the data that is written in it but most of Re-writeable CD have
maximum limits.
Blu-ray Disc is the next generation optical disc. Because this type of
optical disc can hold high-definition video due to its high capacity. A typical
Blu-ray Disc can store a capacity of 25 to 100 GB. Imagine how large of
video data it can hold in one disc. Again, same as to the DVD and CD, Blu-
ray also has three basic types: Read Only, Write Once and Re-Writeable.
And last for the common types of Storage is the Cloud Storage and the
Mass Storage Devices. Cloud Storage according to Webopedia.com means
“the storage of data online in the cloud,” wherein a company’s data is stored
in and accessible from multiple distributed and connected resources that
INTRODUCTION TO COMPUTING
CHAPTER 2: INSIDE THE HARDWARE
LESSON 3 – STORAGES
Some of the mass storage devices that supports this strategy are File
Servers (dedicated computers with relatively large storage capacities that
provide users access to fast storage and retrieval of data), Network Attached
Storage (similar to a file server except simpler and less expensive; widely
used for home and small business storage needs), RAID Systems (larger
versions of the specialized devices that enhances organizational security by
constantly making backup copies of files moving across the organization’s
network), Tape Library (device that provides automatic access to data
archives on library of tapes) and lastly is the Organizational cloud storage
(high-speed Internet connection to a dedicated remote organizational cloud
storage server).
Storage Area Network is an architecture to link remote computer
storage devices, such as enterprise storage system, to computers such that the
devices are as available as locally attached drives. The key to a SAN is a high-
speed network, connecting individual computers to mass storage devices.
Special file systems prevent simultaneous users from interfering with each
other.
INTRODUCTION TO COMPUTING
CHAPTER 3: SOFTWARE IN GENERAL
LESSON 1 – TYPES OF SOFTWARE AND APPLICATION SOFTWARE
Types of Software
Before we discussed the major classification of Software let us first define
what the term software is? The term Software refers to the set of electronic
program instructions or data a computer processor reads in order to perform a
task or operation. In contrast, the term Hardware refers to the physical
components that you can see and touch, such as the computer hard drive,
mouse and keyboard.
If you will search for the term “Software” at Google search engine, “Software
is a program that run on a computer and performs certain functions. It is
something used or associated with and usually contrasted with hardware as the
entire set of programs, procedures, and related documentation associated with
a system and especially a computer system (computer program) or material
for use with audiovisual equipments.” And that definition is coming from
Merriam-webster.com.
With this definition, i can clearly and confidently say that a Computer
Program or Software is a set of instructions or algorithm that instructs the
computer system on what to do? What to Process? And lastly, what to output?
Application Software
Application software, or simply applications, are often called as productivity
programs or end-user programs because they enable the user to complete tasks
such as creating documents, spreadsheets, databases, and publications, doing
online research, sending email, designing graphics, running businesses, and
even playing games!
When you begin creating a document, the word processing software has
already set the margins, font style and size, and the line spacing for you. But
you can change these settings, and you have many more formatting options
available. For example, the word processor application makes it easy to add
color, headings, and pictures or delete, copy, move, and change the
document's appearance to suit your needs.
INTRODUCTION TO COMPUTING
CHAPTER 3: SOFTWARE IN GENERAL
LESSON 1 – TYPES OF SOFTWARE AND APPLICATION SOFTWARE
This figure above shows the different sample of application software such as
the Microsoft Word. MS Word is a powerful word-processing application that
is included in the software suit of applications called Microsoft Office. And a
software suite is a group of software applications with related functionality.
For example, office software suties might include word processing,
spreadsheets, database, and presentation and email applications. Graphic
suites such as Adobe Creative Suite include applications for creating and
editing images, while Sony Audio Master Suite is used for audio production.
This application software classification has many different categories and that
will be the focus of this lesson. So in the next discussion we will be discussing
the definition of each category and also its example.
INTRODUCTION TO COMPUTING
CHAPTER 3: SOFTWARE IN GENERAL
LESSON 1 – TYPES OF SOFTWARE AND APPLICATION SOFTWARE
Actually, there are lot more categories for the application softwares but what
we stated and discussed above are the common classifications. Our next
lesson will be focusing on the discussion on System Software.
MODULE OF INSTRUCTION
Types of Software
Before we discussed the major classification of Software let us
first define what the term software is? The term Software refers to the
set of electronic program instructions or data a computer processor
reads in order to perform a task or operation. In contrast, the term
Hardware refers to the physical components that you can see and
touch, such as the computer hard drive, mouse and keyboard.
Introduction to Computing 1
Chapter 3: Software In General Introduction to Computing
Application Software
Application software, or simply applications, are often called
as productivity programs or end-user programs because they enable
the user to complete tasks such as creating documents, spreadsheets,
databases, and publications, doing online research, sending email,
designing graphics, running businesses, and even playing games!
2
MODULE OF INSTRUCTION
Figure 3.1 – Office Productivity Software
Introduction to Computing 3
Chapter 3: Software In General Introduction to Computing
4
MODULE OF INSTRUCTION
Introduction to Computing 5
Chapter 3: Software In General Introduction to Computing
System Software
System software refers to the files and programs that make up
your computer's operating system. System files include libraries of
functions, system services, drivers for printers and other hardware,
system preferences, and other configuration files. The programs that
are part of the system software include assemblers, compilers, file
management tools, system utilites, and debuggers.
6
MODULE OF INSTRUCTION
Introduction to Computing 7
Chapter 3: Software In General Introduction to Computing
8
MODULE OF INSTRUCTION
Introduction to Computing 9
Chapter 3: Software In General Introduction to Computing
The next step was allowing several users to share the use of the
computer simultaneously. The computer would run one user's job for a
prescribed short period of time and then move on to the next user's job.
This was called time-sharing. It allowed for allocating the period of
computation on the basis of the priority rankings of the various job.
10
MODULE OF INSTRUCTION
The use of UNIX spread around the country and initially Bell
Labs gave it away free. Later Bell Labs realized that UNIX had
commercial potential and arranged for the marketing of it.
Introduction to Computing 11
Chapter 3: Software In General Introduction to Computing
12
MODULE OF INSTRUCTION
Sun Microsystems in the Silicon Valley has also developed the Solaris
operating system, which competes with Windows among computer
professionals, particularly the one using the work station computers
manufactured by Sun Microsystems.
1) Microsoft Windows 7
Introduction to Computing 13
Chapter 3: Software In General Introduction to Computing
2) Windows 8
14
MODULE OF INSTRUCTION
3) Ubuntu
Based on SearchEnterpriseLinux.Techtarget.com,
“Ubuntu (pronounced oo-BOON-too) is an open source
Debian-based Linux distribution. Sponsored by Canonical Ltd.,
Ubuntu is considered a good distribution for beginners. The
operating system was intended primarily for personal
computers (PCs) but it can also be used on servers. The word
"ubuntu" is from the African Zulu language and translates as
"humanity to others."
Introduction to Computing 15
Chapter 3: Software In General Introduction to Computing
4) Windows XP Professional
16
MODULE OF INSTRUCTION
5) Windows 8.1
6) Macintosh OSX
Introduction to Computing 17
Chapter 3: Software In General Introduction to Computing
7) Linux Mint
8) Android
18
MODULE OF INSTRUCTION
9) Windows XP
10) Fedora
Introduction to Computing 19
Chapter 3: Software In General Introduction to Computing
Key Terms
Android
Application Software
Content Access Software
Device Drivers
Educational Software
Enterprise Infrastructure Software
Entertainment Software
Fedora
Information Worker Software
Linux Mint
Macintosh OSX
Media Development Software
Microsoft Windows 7
20
MODULE OF INSTRUCTION
Mobile Applications
Mobile Operating System
Operating System
Product Engineering Software
Productivity Program
Simulation Software
Software
System Software
System Utility Software
Ubuntu
Web Browser
Windows 8
Windows 8.1
Windows XP
Windows XP Professional
References
Text References
Include list of books, journals and other online references that you used in
writing the module. Titles of sources should be written out in full.Text
References
Example :
Introduction to Computing 21
INTRODUCTION TO COMPUTING
CHAPTER 4: SOFTWARE IN GENERAL
LESSON 1 – LAN, WAN, CONNECTIVITY, AND COMMUNICATION MEDIUM
Local Area Network (LAN) has different variety of standards and the most
common is known to be Ethernet. LANs using this standard are reffered to as
Ethernet LANs but it doesn’t stop there because there are also different variety
like Home Networks, Wireless LANs and Personal Area Network.
Wireless LAN is somehow the same as with the Local Area Network but the
only difference is the way it is deployed. Wireless LAN uses radio frequency
to connect to different computer and devices. This type of network won’t
work without the Wireless Access Point that serves as the base station.
Personal Area Network is a type of wireless network that works within a very
small area – your immediate sorroundings. PANs connect cellphones to
headsets, PDAs to other PDAs, keyboards to cellphone, and so on.
INTRODUCTION TO COMPUTING
CHAPTER 4: SOFTWARE IN GENERAL
LESSON 1 – LAN, WAN, CONNECTIVITY, AND COMMUNICATION MEDIUM
Aside from the LAN or the Local Area Network, we also do have the Wide
Area Network. Wide Area Network (WAN) is a much bigger network than
LAN because if we talk about WAN we are talking about a large geographical
scope. According to ComputerHope.com “WAN is a collection of computers
and network resources connected via a network over a geographic area. Wide-
Area Networks are commonly connected either through the Internet or special
arrangements made with phone companies or other service providers. A WAN
is different from a MAN because of the distance between each of the
networks. In a WAN, one network may be anywhere from several hundred
miles away, to across the globe in a different country.” If you want to learn
more about WAN Technologies, it is much more detailed in the Data
Communication and Networking 4 (Wide Area Network Technologies).
Connectivity
When we say Connectivity, it is more on the network design, network model,
and network infrastructure or network architecture. Because connectivity
deals with the arrangement and coordination of different devices inside a
network. There are various technology that is associated in this topic and we
will be discussing it one by one.
- Telnet
Clients include Web browsers, chat applications, and email software, among
others. Servers include Web, database, application, chat and email, etc.
A server manages most processes and stores all data. A client requests
specified data or processes. The server relays process output to the client.
Clients sometimes handle processing, but require server data resources for
completion.
Aside from the Client/Server and PeerToPeer Model, we also have different
topologies or network arrangement. But what is a Network Topology?
According to Computing Essentials book of O’Leary, Network Topology is
the way to arranged or configure a network. And it has 6 different common
types, such as Bus Network (a network arrangement wherein all devices are
connected into a common cable called Bus or Backbone), Ring Network (a
design wherein each computer or device is connected with other two computer
or device forming a ring), Star Network (each devices is connected directly to
a central network switch), Tree Network (each device is connected to a central
node, either directly or through one or more other devices. The central node is
connected to two or more subordinate nodes that in turn are connected to other
subordinates and so forth, forming a treelike structure), Hybrid Network
(combination of different topologies that is utilize by big organization for their
complex network) and Mesh Network (newest type of topology that does not
use a specific physical layout because mesh requires that each node have more
than one connection to the other nodes).
Communication Medium
Data transmission and other Networking technologies is nothing without the
bridge or the Communication Medium. This Communication Medium plays a
vital role in the data transmission or networking because they are the one who
carry the data from one point to another. Communication Medium can be
either wireless or wired (physical connection).
Twisted Pair Cable are pairs of copper thin copper wire that are literally
twisted together. Common application of Twisted Pair is the LAN Cables and
the Telephone Cable.
Fiber Optic Cable is the thinnest type of cable because it utilizes fiber optics
which is usually 9micro meter to 65micro meter. Imagine, Fiber optic can be
much thinner than your hair. Fiber Optic uses light for transmission instead of
the electric current. Compared to Coaxial and UTPs, it transmits data much
faster, reliable and lighter.
When we say Protocol? This are set of rules that governs a communication or
exchange of information. This can be the step by step procedure or can be the
guidelines to follow in communicating or exchanging information. According
to Computerhope.com “Protocol is a standards used to define a method of
exchanging data over a computer network such as local area network, Internet,
Intranet, etc. Each protocol has its own method of how data is formatted when
sent and what to do with it once received, how that data is compressed or how
to check for errors in data.”
We have different types of protocols and let’s us discuss some of the most
common protocols in the Data Communication that is based on
WikiBooks.com.
ICMP (Internet Control Message Protocol) is one of the main protocols of the
Internet Protocol Suite used by network devices to send error message and
relay query messages.
Actually there are lots of different protocols that is associated with data
communication but i prefer not to tackle it here as it will also be tackled in
your Data Communication and Networking 1 subject in the future. So now,
let’s proceed in the discussion of the different standards that is used to allow
different devices or equipment from different manufacturer to communicate
with one another.
Let us first, define the reason why there’s a need for Standard or Standard
giving body? According to an article at what-when-how.com website
“Standards are necessary in almost every business and public service entity.
The primary reason for standards is to ensure that hardware and software
produced by different vendors can work together. Without networking
standards, it will be difficult – if not impossible – to develop networks that
easily share information. Standards also mean that customer are not locked
into one vendor. They can buy hardware and software from any vendor whose
equipment meets the standard.”
This are just some of the standard giving body that is much known or very
popular in the Networking field. Now let us discuss the two different standard
model that is used nowadays. OSI (Open Systems Interconnect) and TCP/IP
(Transmission Control Protocol / Internet Protocol) are the two well known
model in computer network.
OSI Model is divided into 7 layers namely: Physical Layer, Data Link Layer,
Network Layer, Transport layer, Session Layer, Presentation Layer and
Application Layer. Let us somehow discuss each layer briefly because deeper
discussion of this topic will be in your Data Communication and Networking
1: Networking Fundamentals.
INTRODUCTION TO COMPUTING
CHAPTER 4: SOFTWARE IN GENERAL
LESSON 2 – PROTOCOLS AND STANDARDS, AND INTERNET ARCHITECTURE
Data Link layer, provides node-to-node transfer (reliable link between two
directly connected nodes), by detecting and possibly correcting errors that
may occur in the physical layer. This layer is divided into two sublayer which
is Media Access Control (MAC) and the Logical Link Control (LLC).
Presentation Layer, is a layer of the OSI that will establish context between
application-layer entities, in which the application-layer entities may use
different syntax and semantics if the presentation services provides a big
mapping between them. If a mapping is available, presentation service data
units are encapsulated into session protocol data units, and passed down the
protocol stack.
And last but not the least is the Application layer. It is the layer among the 7
OSI layer that is closest to the end user, which means both the OSI application
layer and the user interact directly with the software application. This layer
interacts with the software applications that implement a communicating
component. Application-layer functions typically include identifying
INTRODUCTION TO COMPUTING
CHAPTER 4: SOFTWARE IN GENERAL
LESSON 2 – PROTOCOLS AND STANDARDS, AND INTERNET ARCHITECTURE
And those are seven OSI layers, you will be learning more of that in your Data
Communication and Networking 1. Now, let’s proceed to the discussion of
another known model / standard in networking that is the TCP/IP Model.
Like what I said a while ago, TCP/IP Model is divided into 4 different layers.
From lowest to highest, the layers are the Network Layer, Internet Layer,
Transport Layer and Application Layer.
Network Layer, is used to move packets between the Internet layer interface of
two different host on the same link. The process of transmitting and receiving
packets on a given link can be controlled both in the software device drivers
for network cards, as well as on firmware or specialized chipsets.
2) Packet routing: This is the basic task of sending packets of data (datagrams)
from source to destination by forwarding them to the next network router
closer to the final destination.
And that is the two common model or standard that we are using for Data
Communication. In the next lesson, we will be discussing some of the internet
architectures.
Internet Architecture
What is Internet Architecture? According to livinginternet.com, is a meta-
network, a constantly changing collection of thousands of individual networks
intercommunicating with a common protocol. This architecture is based in the
very specification of the standard TCP/IP protocol, designed to connect any
two network which may be very different in internal hardware, software, and
technical design. Once two networks are interconnected, communication with
TCP/IP is enabled end-to-end, so that any node on the Internet has the near
magical ability to communicate with any other no matter where they are. This
openness of design has enabled the Internet Architecture to grow to a global
scale. Here are some terminologies that is related to Internet Architecture.
Routers is a specialized hardware that does the routing of data. This hardware
is commonly known as the Layer 3 Hardware because it uses logical addresses
to route the information from the sender to its destination. According to
Webopedia, A Router is a device that forwards data packets along networks.
A Router is connected to at least two networks, commonly two LANs or
WANs or a LAN and its ISP's network. Routers are located at gateways, the
places where two or more networks connect.
INTRODUCTION TO COMPUTING
CHAPTER 4: SOFTWARE IN GENERAL
LESSON 2 – PROTOCOLS AND STANDARDS, AND INTERNET ARCHITECTURE
Routers use headers and forwarding tables to determine the best path for
forwarding the packets, and they use protocols such as ICMP to communicate
with each other and configure the best route between any two hosts.
There are several brands of router like Cisco Systems, Juniper Networks,
Hewlett-Packard, Huawei Routers, Nokia Networks, ZyXEL, ZTE and more.
Physical Maintenance
Of course, every one of us doesn’t want our computer or laptops to
malfunction or get broken. In fact some of us are doing some extra efforts to
protect this machine, it is for a reason that this machine is a bit expensive and
also because this machine is somehow important in our studies or even in our
work.
If you want to sustain your machine, it requires a lot of work because you
need to keep it very clean as in physically clean. Dust at the office, school or
even at home is typically 2 to 10 µm (micro-meter) and even though its 20-
50times smaller than your hair. Once dust accumulates it can cause damage in
your motherboard because of short circuits.
That’s why you have to check the user’s manual if there are instruction
specific for your keyboard. Here are some of the tips you can follow to keep
your keyboard clean.
Of course, if you will be cleaning your keyboard. You need to first unplug it
from the PS/2 or USB port of your system Unit to avoid another trouble. After
that, gently shake the keyboard in an upside down position, so that the dust
and dirt will fall-out from the keys.
You may use compressed air to clean between the keys because if you will
just blow it by your mouth, water from your saliva might cause another
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
problem. Use a moist cloth to clean the top of the keys as much as possible
put rubbing alcohol in the cloth to make it more effective.
Lastly, reconnect the keyboard to your system unit and check if it is still
working properly.
Next thing, after cleaning your keyboard is your Mouse. If you are using
optical mouse, there is no need for in depth cleaning since it does not have any
mechanical parts inside that will accumulate dust. But if you are using
Mechanical Mouse, you need to do an in depth cleaning because it can
accumulate dust inside the mouse balls.
Aside from the mouse, there is another external parts of the computer that
needs to be clean which is the Monitor or the Display. Monitors are clean to
fully utilize its clarity and vibrance because most of the time dust, dirts and
fingerprints tends to make our monitor not clear and a bit darker. In order for
you to clean the Monitor what you just need is either a cloth moist with a bit
water or a cloth with a monitor cleaning solution.
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
Of course, if you will clean the external parts, you also need to clean the
system unit itself. In cleaning a computer surface here are some of the tips
which I get from a website GCFLearnFree.org. Dust is your computer’s main
enemy. Use an antisatic wipe to lightly dust your computer casing. Don’t use
furniture cleaners or strong solvents. Use a can of compressed air with a
narrow nozzle to blow out debris from the air intake slots. Spray cleaning
solutions like diluted ammonia cleaner or glass cleaner on a paper towel or
antistatic wipe. Clean the monitor housing and case not the monitor screen by
wiping in a downward motion. A safe cleaning solution for computer surfaces
not computer screens is ammonia diluted with water or glass cleaner
comprised mostly of ammonia and water (check the label). The milder the
solution, the better.
When it comes to the inside of the system units I suggest you need to use a
small vacuum cleaner to do the dusting. And also don’t forget to always use
the antistatic gloves in order to avoid the damage in the IC’s, Resistors,
Capacitors and etc. So I presume, next time you are now ready to do this
preventive maintenance on your computer in order to maintain its quality.
Data Maintenance
Aside from maintaining or keeping the physical components of your computer
clean. Now, we can discuss the maintenance of the data inside your computer.
There are three factors that will affect the data maintenance and that is Back-
ups, Privacy and Cyber Crime.
Most of the time, back-up is being neglected by home computer user and this
should be corrected in order to avoid future problem when data loss event
arrises. But for big institution, Backup is a must or it should be a routine since
they are processing a huge amount of data for their business transaction, that
should be accurate and real time.
There are two ways to do a backup, its either you backup locally or you use
internet also known as cloud to do the backup.
In doing a local backup, you can make use of different storage media and one
of the most inexpensive one is to use CD’s or DVD’s. This medium is
commonly used by user who wants to have a secure copy of their files, so that
when data loss events happen they have something to restore in their
computer. Another way to do the local backup is to use removable storage
such as flash drive or memory cards. This option is use if you are backing up
or copying a big amout of data from your computer.
Next is using the Internet or the Cloud backup. Cloud Backup is the process
of copying your local files into a cloud storage for future use. There are
several companies that offers cloud backup at a minimal amount of price.
backups, continuous backups, full disk backups, file sharing and folder
syncing.
CrashPlan offers online backup for $59.99 USD per year in each computer.
But the storage space of this company is unlimited compared to the 1Tb of
IDrive. It can do the same thing as IDrive can do except for the File Sharing,
Explorer Integration and Folder Syncing.
SOS Online Backup offers their service for only $59.99 USD per year in each
computer. Same as to CrashPlan it offers unlimited storage. It also has the
feature of IDrive except for Full Disk Backups and Explorer Integration.
SpiderOak is the company that offers online backup at a bit higher price.
SpiderOak offers 1Tb storage for unlimited computer at $129.00 USD per
year. It has the same feature as to the IDrive Company.
Those are the different companies that offers online or cloud backup services.
Let us now discuss the next topic of this lesson which is Computer Privacy.
Pharming, is a hacking activity that redirects the website visitor from their
legitimate website into a fraudulent website without them knowing it.
Malware, coming from its name Mal and Ware which means Malicious
Software. This malware is a software application that brings potential harm to
your computer because it disrupt your computer operation by installing
Trojan, viruses, worms, spyware, adware and other software that does
malicious intent.
3) Abuse
Software Maintenance
Your Computer systems won’t probably work without any software, programs
or applications inside it. And in order to maintain an efficient and good
running computer system we have to do some Software Maintenance. There
are several things we have to consider in order to do Software Maintenace like
maintaining the Operating System, doing some Software Updates and
knowing your BIOS.
According to OWU.edu “In order to keep your system running smoothly there
are few task you can perform. Regular maintenance will help your computer
up to speed and free of annoying problems.” Here are some of the routine that
you can follow:
First, go to All Programs under the Start Menu, click Accessories and look for
the System Tools. Find the Disk Cleanup button to proceed in the calculation
of how much space it can free up. After the calculation, Disk Cleanup will
give you a list of categories of files to delete. Make sure that the following
options are checked: 1) Downloaded Program Files 2) Temporary Internet
Files 3) Microsoft Office Temporary Files 4) Microsoft Error Reporting
Temporary Files 5) Recycle Bin 6) Setup Log Files 7) Temporary Files 8)
WebClient / Publisher Temporary Files 9) Temporary Offline Files 10)
Compress Old Files. Click OK and it will ask you to confirm you’d like to
delete the files. Usually it will take around 5 – 15 minutes depending on how
big the file is.
First, click the start menu and look for all programs. Under all programs
Figure 5.8 – Disk Cleanup choose accessories then system tools. From there you will see the Disk
and Defragmenter Defragmenter utilities. On the Disk Defragmenter options, it will ask you on
what disk to defragment and click the analyze button. After the analyzation
process it will recommend if you need to defragment or not. If it suggest to
defragment then click the defragment button otherwise cancel and close the
utility.
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 1 – PHYSICAL, DATA, AND SOFTWARE MAINTENANCE
Trojan Horses – if you know the story of Troy and the Greeks in the early
years. This type of virus or malware uses the same technique that Troy uses to
win the battle. Typically, Trojan Horse Virus are malicious codes that is
attached to infected application programs or software which will execute a
different set of actions that will bring harm to your computer like for example
loss of data.
Rootkits - special type of software that are use to hide malware, bots and
worms. And in order for the attacker or hacker to attack a computer using this
type of technique, he needs to have a full access to the computer system to
install the said rootkits.
RansomWare – a special type of application that prevents its user to access the
computer system without paying its creator or subscribing/buying to its
creator’s products or services.
when you need to update a program, you don’t need to do anything other than
let the update do its thing.”
Next and last thing for the software maintenance is what we called the BIOS.
BIOS stands for Basic Input Output System, which is a type of firmware
used for the boot-up process of a computer system. According to
ComputerHope.com, BIOS has four main functions:
1) POST (Power-On Self Test) – Test the computer hardware and make sure
no errors exist before loading the operating system.
3) BIOS Drivers – Low level drivers that gives the compute basic operational
control over your computer’s hardware.
Security
When we talk about security, it is more on protecting and securing. Like for
example in a bulding, they hire security guards and install security cameras to
protect and secure the premises from intruders and burglar. Computer
security is how we protect our computer systems including the data in it that
we use.
There are several terminologies and key terms that we need to discuss in order
to further understand what Computer Security is all abou like Firewalls,
Encryptions, Antivirus and Network Security.
Firewalls, this are hardware or software that serve as protection for the inside
network. Same as to the concept of house firewalls, that prevents the fire from
coming in your house. Firewall also prevents unauthorized entry to ones
network.
And last but very important topic for this lesson is the network security.
Network Security, according to SANS.org, is the process of taking physical
and software preventative measures to protect the underlying networking
infrastructure from unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure, thereby creating a secure platform for
computers, users and programs to perform their permitted critical functions
within a secure environment. There are several terminologies that has relation
to Network Security like Honeypots and Honeynets.
Honey Pots is a clone system or clone server that is used to contain the
intruder or attackers into that system so that the Network Security Team will
have a chance to learn or gather information about that specific hacker.
According to SANS.org, “Honey Pots can be setup inside, outsider or in the
DMZ of a firewall design or even in all of the locations although they are
most often deployed inside of a firewall for control purposes.”
Honey Pots have what we call the levels of tracking and the common tracking
levels include the firewall, system logs and some other sniffer-based tools.
Honeynet is somehow the same as Honeypot except to the fact that Honey Net
talks about the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders. Data gathered by Network
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 2 – SECURITY AND ETHICS
Security analyst from this Honey nets are used to correct the vulnerabilities of
the network system.
Ethics
According to Wikipedia.com, “Computer Ethics is a part of practical
philosophy which deals with how computing professionals should make
decision regarding professional and social conduct. This Computer ethics has
3 primary influences: 1) Individual’s own personal code. 2) Any informal
code of ethical conduct that exists in the work place. 3) Exposure to formal
codes of ethics.”
So, it only means that computer ethics is the norms or the behavior of a
computer professional or IT professional towards computing. There are
several terminologies that you as IT student should learn at this moment and it
is the Copyright and Plagiarisim.