You are on page 1of 26

Lesson Objectives:

In this lesson, you will learn about the features


and
functions of modern operating systems. You will
also
learn how to start the computer and how to
access
various features of the operating system. Upon
completion of this lesson, you will be familiar
with:
• the function of an operating system and
popular
desktop operating systems, and updates
• user accounts and profiles
• power on and power off procedures and
power
options
• using the Start button, navigating the
Windows
Desktop, and using the taskbar
• accessing the Settings app/ Control Panel
• customizing the Windows Desktop
• the features of mobile operating systems
WHAT IS OPERATING SYSTEM
PROPERTY and OPEN SOURCE OS
 A computer is essentially a collection of
electrical and mechanical parts referred
 Proprietary software- are commercial
to as hardware.
software programs that are owned by
 The operating system (or OS) is a
an Individual or a company, usually the
computer program.
person or company that created it.
 A program is a sequence of instructions
 When you install software you must
that guides the computer
agree to the terms of the end user
 through the performance of a specific
license agreement (EULA). In most cases
task or sequence of tasks.
the license agreement is quite
 The individual lines of instruction are
restrictive.
referred to as code.
 All versions (including mobile versions)
 The term software refers to any
and editions of Windows, Mac OS X and
program that makes a computer
UNIX are proprietary
Application programs, -allow you to be  Open-source software license makes
productive to create documents or complete the source code of the software freely
available and users are permitted to
specific tasks such as creating a budget, study, change, and distribute the
removing red-eye from a photograph, software to
searching the Internet or scheduling a meeting. anyone for any purpose.
 Linux, FreeBSD, Open BSD, and React
The operating system: OS are examples of open-source
• manages hardware devices, controls operating system.
communication among hardware devices,
DESKTOP OPERATING SYSTEMS
• controls communication between application
programs and hardware devices, and  A desktop operating system is one that
• manages files stored on the computer. is used on desktop and laptop
computers and It offers many features,
EVOLUTION OF MODERN 0S INTERFACE and provides a great deal of power
and control over how the computer
• An interface is a point where two systems (or
runs.
people, or networks, or
 An operating system version refers to
devices) meet and exchange information.
the specific code base that was used to
Anytime you use a computer, join
develop the operating system.
a network, or plug in a device, you
 The Desktop is the central place from
communicate with it through an interface.
which a user interacts with the
• Today’s modern operating systems
computer
communicate with you through a
graphical user interface (GUI), or “gooey.” A GUI
lets you use menus and
clickable buttons or icons to start programs,
move files, or perform other
tasks.
POPULAR DISKTOP OPERATING SYSTEM software and hardware, you can't delete files
that are required for the computer to work, you
WINDOWS can’t access other users' files stored on the
 Microsoft Windows 7 computer, and you can't change settings that
 Microsoft Windows 8 affect other users or the security of the
 Microsoft Windows 10 computer.
MAC OS X
 Version 10.9- Maverick COMMON OPERATING SYSTEM FEATURES
 Version 10.10- Yosemite
 Version 10.11- El Capitan  A user profile is a collection of settings
 Version 10.14- Mojave that make the computer look and
LINUX function in a particular manner. A
 Linux is a free and open-source profile includes settings for elements
operating system. You can find Linux such as the Desktop background, lock
installed on supercomputers – such as screen, screen saver, pointer
those used by Google and NASA. preferences, date and time format.
 Versions of Linux are called  In a Built-In Power Off Procedures, the
distributions – or “distros” for short computer runs a set of self-diagnostic
programs to ensure that critical
hardware is working properly, and then
COMMON OPERATING SYSTEM FEATURES
it loads the operating system into
memory.
 An account name (and usually a
 Power options affect the way your
password) is associated with each
computer uses energy.
account. Before you can run programs,
open files or use the
computer to accomplish any type of UNDERSTANDING WINDOWS POWER
work, you must log on using valid user OPTION ( Windows 10 several power option)
account.
Sleep- Clicking Sleep leaves the computer on,
 Account Types but puts it into a mode where it uses less power
than when it is awake.
Administrator account- Enables you to Hibernate- Hibernate mode uses no power.
make changes to the system that will affect Hibernate mode is
other users. Administrators can change security useful if you will not be using your laptop for an
settings, install and uninstall software and extended period of time, but you do not want
hardware and create or make changes to other to close your documents.
user accounts on the system. Shut down- The computer closes all files and
Standard User Account- Enables you to programs, closes the operating system and
use most of the capabilities of the computer. turns off the power.
However, you can't install or uninstall some Restart- Windows closes all open files and
programs, exits the operating system and
restarts the computer
without turning off the power.
SEARCH BOX/CORTONA The default view for Control Panel topics is
category view
Just to the right of the Start button is the search
box. System and Security- Provides options for
 Click in the search box and begin typing. firewall settings, power options and file
 When you first use Windows 10 the history (backups).
search box may display a circle icon and Network and Internet -Set up or modify how
the text “Ask me anything.” your system connects to a network or the
 These elements are part of Cortana, the Internet, and to share files with others.
Windows 10 personal assistant. If you Hardware and sound- Set up or modify devices
click in the box, the Cortana feature will such as printers, speakers and monitors.
open for initial setup. To use Cortana, Programs- Provides access to system
you must sign into the system with a management tasks such as installing
personal Microsoft and uninstalling programs.
account. User Accounts- Provides options for setting the
computer up to be used by more than one
THE SETTING APP person
Appearance and
Personalization- Customize your screen with
 You can configure several commonly-
screen savers, desktop backgrounds,
accessed settings through the Windows
and so on.
10 Settings app. Click Start, and then
Clock, Language, and
Settings to open the main window of
Region -Change the format of dates, times,
the Settings app.
currency, or numbers to reflect
 From this window, you can browse
regional standards or languages
the categories or use the search box at
Ease of Access-Provides options for changing
the upper right corner to find what you
accessibility specifications, such as turning on
are looking for, including advanced
voice recognition or altering visual displays.
options on specific pages in the Control
Panel.
MOBILE OPERATING SYSTEM

THE WINDOWS CONTROL PANEL


 Smart phones (and some tablets)
use mobile operating systems.
 The Control Panel is the area in  Mobile operating systems are
Windows where you can access optimized for touch screen
features to customize settings for technology, small screen size, fast file
devices on your system. You can access transfer, and accessing cellular
the Control Panel by: networks.
 type in search box the word Control  These can accomplish an amazing
Panel array of tasks including phone
calling, video calling, streaming
audio and video, Internet browsing,
texting, connecting to Wi-Fi, and
pairing with Bluetooth devices.
Touch Screen Navigation on Mobile
Android - is from Google, is based on OS
Linux and is open-source. Android
releases are named for sweet Various phones and mobile operating
confections; for example, version 4.3 is systems recognize specific actions and
Jelly Bean, 4.4 is KitKat, 5.x is gestures for navigating and performing
Lollipop, and 6.x is Marshmallow. tasks on a touch screen. Generally, you
Releases prior to 2.0 were used can use
exclusively on mobile phones. It has the the following motions and gestures to
largest install base in the world and interact with a smart phone or tablet:
runs on phones manufactured by a wide  Tap (lightly tap items with your
variety of vendors including Samsung, finger tip)
HTC, Google, Sony, Motorola and LG.  Touch and Hold (touch an item
with your finger and maintain
OIS- (previously known as iPhone OS) - contact)
is from Apple. It is closed-source  Drag (touch and hold on an
and proprietary and is derived from OS item, and then move it to a new
X. The Apple iPhone, iPod Touch,  Pinch and Spread (pinch the
iPad, and second-generation Apple TV screen using your thumb and
all use iOS. In previous versions, you forefinger, or spread by
had to “jail break” your phone in order  moving your fingers apart)
to install third-party apps.
 To turn on a smart phone or
Windows 10 Mobile- (formerly called tablet, press
Windows Phone) - is from Microsoft. It and hold the power button until
is closed-source and proprietary and it the device
is integrated with Microsoft services starts up. On most phones the
such as OneDrive and Office, Xbox power key is also the lock key –
Music, Xbox Video, Xbox Live and Bing. you can press it to lock the
Most Windows phone devices are made device.
by Nokia, HTC and Samsung.
A lock screen displays until the
BlackBerry 10 - is from BlackBerry and user performs the required
is closed-source and proprietary. It runs gesture, or enters the correct
only on phones and tablets information (similar to entering
manufactured by BlackBerry. your user account password in
Windows).
 Swipe - unlock the phone by
swiping the screen. This option
provides no security.
 Pattern – you create a pattern
by dragging your finger across
a grid of dots, and you re-enter piece of hardware and controls how the
that pattern to unlock the device functions. Firmware is device-
phone. This is considered a specific: it is developed for one particular
medium-level security setting. model and release of a device. (ex:
 PIN – set and then enter a
Android version 5.1.1 (Lollipop) w/
personal identification number
firmware G920VVRU48OK7).
(PIN) of at least four digits. This
option provides medium to
high security.
Software apps (and mobile apps) run on a
 Password – you create a hardware device within an
password for unlocking the environment created by the operating
screen.This option provides system. All the measurements revolve
high security. around the binary digit or bit.
 Fingerprint – you can use
fingerprint recognition to A bit is the smallest unit of data a computer
unlock the screen. This option can understand. A bit can have one of two
provides medium to high values: a 0 or a 1. Bits are grouped in
security.
sequences of 0s and 1s to represent data.
 None – you can set your phone
A group of eight bits is called a byte.
to never use a lock screen

Storage capacity (that is, the amount of


LESSON 2 space available to store data either on disk
or
in memory) is measured in bytes.
What Makes Hardware Tick?
Software programs (including operating Bit
systems, application programs, and
device drivers) control the hardware and
make it useful, and within the device
itself, firmware provides basic functionality.
Operating systems use small programs
called device drivers to
communicate with installed hardware
devices. Device drivers are software
that allows your computer to communicate
with and control the devices
connected to it.
Firmware is built-in programmable logic
(software) that is embedded in a
Measuremen Abbreviation Equal to
t
Bit A single
binary digit
Byte B Eight Bits
Kilobyte KB 1,024 bytes
(a
Thousand
bytes)
Megabyte MB 1,024 KB (a
Million
Bytes)
Gigabyte GB 1,024 GB (a
Billion
bytes)
Terabyte TB 1,024 TB (a
Trillion
bytes)
Petabyte PB 1,024 GB (a
Quadrillion
bytes)

The microprocessor is a silicon chip that millio


performs calculations and logical n
operations in the computer. The Mega MHz One 1,000,000
microprocessor is also referred to as the hertz Millio cycle per
n second
Central Processing Unit (CPU) or simply as
GigaH GHz One 1,000,000,0
the processor.
ertz Billion 00 cycle per
• Different CPUs process information and
second
instructions at different speeds, and
Terah THz One 1,0000000,0
processor speed is measured in units called ertz trillio 00,000
hertz. n cycles per
• One hertz is equal to 1 cycle (or second
oscillation) per second.
Measu Abbrevia Multi Equal to Network connections (for example,
remen tion plies those in a cellular network
ts By or in an IP network such as the Internet)
Hertz Hz 1 cycle per move data from one
second
location to another at a particular volume
Kilohe KHz One 1,000 cycle
per unit of time.
rtz thous per second
and • The measurement of this volume is called
bandwidth, and it is
expressed in bits per second (bps).
Memory and Storage
Measurement Equal to
Bps Bits per second In order to run programs and create and
Kbps Thousand bits per
use files, a computer
second
needs both memory and storage space.
Mbps Million bits per
Every file used by a
second
computer has a specific byte size, and there
Gbps Billion bits per
second must be sufficient
memory to “hold” the file when it is in use,
and sufficient storage
System Board/Mother Board - this is a
space to store the file when it is not in use
printed circuit board that contains most of
the computer's circuitry and provides
pathways for communication among all the
Random Access Memory (RAM)
components and connected devices.
“Gigabyte Aorus Intel Z370 Gaming 5 For a computer to process information, it
motherboard” must include a certain amount of installed
system memory. This type of memory is
also called Random Access Memory (RAM).
Processor - the silicon chips that control the RAM is used for the temporary storage of
hardware information. Data and programs are read
components and manage the flow of data and into memory from a storage location and
instructions then passed from memory to the CPU.
Without RAM, a computer could not run
Input Devices - these allow you to send programs or be used to create or edit files.
information to the
computer. Examples include a keyboard, or
touchscreen.

Storage devices - these include memory


How Much RAM Do You Need?
chips and other storage
All software (including operating systems)
Media
requires RAM, and lists the
minimum amount required to run the
Power Supply - converts AC current from
program successfully. Some
a wall outlet into low-voltage DC power for
programs use very little memory (for
the components. In portable devices, the
example, Notepad can run with
DC power is stored in a rechargeable
less than 1MB of memory), while some
battery.
programs require significant
amounts. For example, Adobe Photoshop Hard Disk (SSDs)
requires a minimum of 2GB Solid state drives (SSDs), which
(although 8GB is recommended); AutoCAD do not have any moving parts. A
2016 requires a minimum of solid state drive stores data on a
4GB (8GB is recommended). set of interconnected flash
Determining how much RAM you will need memory chips that save the data
depends on which even when the power is off.
programs you want to run. The general rule
of thumb is, the more External Drives
RAM, the better. External drives are hard drives contained in
a case and attached to a computer with a
Storage cord as a peripheral device. External drives
A computer loads software programs into provide extra storage capacity for user
RAM while you are working; however, documents, pictures, video, etc. You do not,
the software programs must be stored on however, install software on external
the computer when they are not in use. drives.
Additionally, any files that you create using
a software program must also be stored Flash Drives
if you want to be able to retrieve them in Flash drives (also called jump drives or
the future. thumb drives) are portable
mass storage devices that use flash memory
chips. Flash drives are small (averaging
Common Storage Devices between 21⁄2” (60mm) and 23⁄4” (70mm) long
Commonly-used storage devices include and around 1⁄2” (16mm) to 3⁄4” (20mm)
hard disks, external drives, flash wide), weigh less than 1 oz. (28g)
drives and memory cards. and can store gigabytes of information.
They are durable and reliable
Hard Disk (HDDs) because they do not contain moving parts
Some computers use magnetic hard disk and can last for several
drives years.
(HDDs), which include moving parts. A Secure Digital Cards (SD cards)
magnetic hard drive stores data on platters, SD cards are small, high-capacity flash
which are metal or plastic disks that are memory storage devices. You use an SD
coated with magnetic material. A motor card
spins the platters around a spindle, while in the same way you would use a flash drive
read/write heads (small recording/playback – insert it into the designated slot on
devices) hover close to the surface of the your device. A card reader/writer is
platters and read or write data to the integrated into the device that uses the SD
magnetic coating. card. You can write (store) data on the card,
and then retrieve (read) it. You can
also pop the card out of one device and • A server runs an operating system
insert it into a reader on another device designed specifically for use on a
for the purpose of transferring files from server. Examples of common server
one device to another. SD cards are operating systems include Windows
popular storage devices for digital cameras, Server 2012, Mac OS X Server, or Linux
camcorders, cell phones, tablets, MP3 Server.
players, and GPS systems.
Common Configurations
Optical Discs and Drives Three basic designs or “Form Factors”
Optical disc drives are designed to read Tower Server - look like desktop PCs. These
Compact Discs (CDs) and were the original model
Digital Versatile/Video Discs (DVDs). The and they require individual monitors,
drive spins the disc and a keyboards, network cards and
laser reads the data stored on the disc. cabling. Usually found in small businesses
A CD-ROM (Compact Disc Read Only where perhaps only one or
Memory) or DVD-ROM drive is two servers are required.
similar to a player in an audio/video
entertainment system. The Rack Server - designed to be installed into
information is written (or burned) onto the a framework called a rack, which
surface and retrieved contains multiple slots into which servers
with a laser beam and you can only read the can be inserted. The server is secured
data. into the rack system using mounting screws.
The rack system enables you to stack
Identifying Types of Computers multiple servers vertically.

Servers Blade Server - are stripped down servers


• In contrast to the other types of designed to minimize power
computers (desktops, laptops, tablets, consumption and to take up very little
and smart phones) which are used for physical space. This type of server must be
personal computing, servers are inserted into a blade enclosure which can
used to support other computers for hold multiple blade servers, and which
business purposes. provides electrical power, cooling, and
• A server is a computer that provides files networking connections.
or services to other systems on
a network. For example, a server may Desktop computers are designed to sit
provide email services, or host a on or beneath a desk. They
web site, or store databases or documents are fairly large, although many are available
for everyone in a school or in compact
business, or provide telecommunications or configurations so that they require less
transaction services. space.
Macintosh PCs - produced by Apple. on system resources and streamlined for
These machines feature a sleek accessing the Internet. They can be set up in
design in which the monitor and processing minutes and will boot up in two to three
unit are housed within seconds (much faster than
the same case. Only Apple produces the Windows or Mac operating systems).
Mac. Macs are designed to
run the Mac OS X operating system. Tablets

PCs - produced originally by IBM, and later


A tablet is a portable computer small
produced by several
enough to hold in your hands. The
manufacturers. Traditionally, in a desktop
computer circuitry, a battery, and a flat
PC, the processing unit is
touch screen display are all rolled
housed within a case, and an external
into a single hand-held device. Tablets come
monitor, keyboard, and mouse
with a microphone, speakers,
are attached with cables. The fully
and sensors that let the tablet “sense”
assembled combination is
which direction is up.
sometimes referred to as a work station.
Two types of operating systems are used in
Laptop (or notebook) Computer tablets – desktop-based
and mobile-based.
Laptop (or notebook) computers are • Tablets that run a desktop-based
designed to be portable. They operating system are thicker and
are small and light enough to sit on your heavier than the other type. They require
lap. They are also self-contained; everything more cooling and they
you need (display, keyboard, camera, have a shorter battery life.
speakers, • Tablets that run a mobile-based operating
pointing device) is included in one unit. system are lighter, run
cooler, and offer much longer battery life.
However, these tablets
run only mobile apps. (Mobile-based
Chromebooks operating systems are also
used on smart phones.)
A Chromebook is a specialized laptop
designed primarily to run cloud- 2-in-1s
based applications instead of programs that Tablets have become so popular
are installed on the hard drive. that many laptops now offer
Instead of running the Windows or Mac OS tablet style features These 2 in1 “convertible”
X operating system, these portables run the devices are laptops with special touch screen
Chrome OS operating system, which is easy displays that you can fold all the way back (360
degrees) so that you can use the laptop like a
tablet Such devices offer the power, comfort,
and document editing capability of a laptop
with the high-definition, high-speed streaming, Connections
touch screen capabilities of a tablet Keyboards are connected to desktop systems
using a USB connection. This connection can be
wired or wireless. Although a keyboard is
Smart Phones integrated into laptops, you can also connect a
separate keyboard via USB. You can also
purchase Bluetooth keyboards which connect to
Smartphones are hand-held devices that a system using Bluetooth technology. Most
combine the features of a laptops, tablets and smart phones support
standard cell phone with those of a Bluetooth. Some tablets include special
personal computer. You can use connections that allow you to use them with
them to make calls, send text messages, detachable physical keyboards designed
download music or electronic books from specifically for the tablet. In some models, the
the web, take pictures or video, check your keyboard is part of a tablet case that doubles as
a stand so that you can set up the tablet as a
email, browse the Internet, access cloud
viewing screen to work on a document or to
storage, open and edit documents, use GPS
watch streaming media.
navigation, make mobile payments and
watch movies – all in the palm of your hand. Pointing Device
A pointing device enables you to select or
Keyboard, Mice, and Touch Screen activate items on the screen by placing the
pointer arrow on the item and performing the
Keyboards required action; for example, you can click to
The keyboard is the primary tool for sending select a file or click and drag to select text.
information to the computer. You use Pointing devices come in many forms but the
it to enter data or to run commands in an traditional pointing device is a mouse.
application. Keyboards can by physical
or virtual. In computing, a virtual device is one Mouse
that does not physically exist, but is A mouse moves the pointer around on the
made to appear and act as if it exists by monitor. Sliding or dragging the mouse
software. across a flat surface such as a desk or a mouse
pad causes the mouse pointer on the
screen to mirror the movement. The traditional
mouse used a ball that rotated to
initiate this movement as you moved the mouse
device on the desk. Newer mouse
models use an optical light or diode technology
to move the pointer on the screen. A trackball
has a ball on the side where your thumb rests;
you rotate the ball to
move the pointer.
functionality

Power Plans

Working with Power Plan Settings

Touch Pad A Windows power plan is a collection of


A touchpad device enables you to use your hardware and system settings that manage
finger to move the mouse pointer how your computer uses power. Power plans
around on the screen. This is common on a will automatically adjust the screen
laptop, although these devices can be brightness, turn off the display, or put the
purchased separately for use with a desktop computer to sleep after a specified amount
computer. A touchpad has two buttons of time. Advanced settings in a power plan may
that work in the same manner as the left and also turn off the wireless networking
right buttons on a mouse. card or hard disk after a certain period of
inactivity.
Stylus
A stylus is an input device that looks similar to a
pen and can be used instead of
your finger to select or activate an item on a
touch screen. Press the stylus lightly on
the option on the screen you want to select or
activate. For example, on a smart
phone or a tablet you may use the stylus to
“dial” the digits of a phone number, start
an application, or write text. Depending on the
system and the programs available
for that device, you can also use the stylus to
draw shapes or diagrams.
Pointing devices of this type are typically
designed in a pen format but are also
available in various designs and can also be
referred to as a digital writer.
Windows includes three customizable built-in
power plans:
Touch Screens
Balanced – provides full performance when you
A touch screen is a display device that
need it and saves power during
allows you to interact with a computing
periods of inactivity.
device by touching areas on the screen.
Power saver – saves power by reducing screen
Tablets and smart phones rely on touch
brightness and system performance.
screens for receiving user input. These
You might use this plan to get the most from a
devices present virtual keyboards and dial
single battery charge.
pads to the user, and the user “types” by
High performance – this plan maximizes screen
tapping the appropriate on-screen keys.
brightness and may increase system
Some laptops feature touch screen
performance. This plan uses a lot more energy
displays, and you can also purchase
than the other plans.
standalone monitors with touch screen
To choose what the power buttons do or what Video Ports and Connectors – Video ports allow
happens when you close the lid of the you to connect a monitor,
laptop, click the Choose what the power projector, or television to a computer in order
buttons do or Choose what closing the lid to display video output. Most
does option from the panel at the left of the desktop systems include at least two video
main Power Options window. Options ports. High performance systems and
set here determine what happens with the gaming systems often include more.
power for Standby/Sleep, Hibernation, or • Video Graphics Adapter (VGA) - is an analog
Shut Down mode interface
between a PC and monitor that was widely used
Peripheral devices are connected to a computer prior to
system by a cable or by using DVI, HDMI and DisplayPort.
wireless technology. • Digital Video Interface (DVI) - is a video
Cables are attached to the devices at one end, connection
and the “free” end is terminated in a standard created by the Digital Display Working
specialized connector designed to attach to the Group
system unit through a special socket (DDWG).
called a port. Most computer systems include • High-Definition Multimedia Interface (HDMI) -
(at least some of) the following ports: is
Video ports – these allow you to connect a proprietary audio/video interface for
monitors, projectors, and even televisions transmitting uncompressed video data and
to the computer for the purpose of displaying compressed or
output. uncompressed digital audio data from an HDMI-
compliant
source device (display controller, computer
Network ports – these allow monitor, video
your computer to connect to projector, digital television, digital audio.
various networks.
Monitors – The monitor is an output device that
Audio ports – deliver sound enables you to view information
from the sound card to external the computer displays. Monitors come in a wide
speakers or headphones. These variety of sizes, resolutions, and
ports are sometimes called types; the larger the screen, the larger the
jacks. image will be on the screen and the
more expensive the monitor will be. Resolution,
Universal Serial Bus (USB) ports – these allow or the monitor’s ability to display
you to attach a wide images, is a measurement based on particular
variety of devices (printers, scanners, cameras, mathematical levels of sharpness
flash drives, and clarity, and is also a factor in the price.
keyboards, mouse devices, and so on) to the Some monitors include touch screen
computer. Because technology.
USB ports also deliver electrical power, they can
be used to power Connecting a Second Display Device – Physically
peripheral devices or to re-charge the batteries connecting a second
of connected display device to a laptop or desktop system is a
devices. simple matter of
connecting the correct video cable. You can
then configure the
appropriate settings for how you want to use A typical sound card for a desktop system
the additional display. includes 3.5mm audio
In Windows 10, you can use the Settings app or ports called “jacks” for various types of audio
the Control Panel. devices and game
adapters (joysticks). Audio jacks may be marked
If you click Identify, Windows will display a with an icon, or are
number “1” on the first display, and a identified by color coding:
number “2” on the second one so that you • Pink – Microphone
know precisely which display each • Light blue – Line In (for example, a tape player
number refers to. Scroll further down to access or CD player)
the Multiple displays drop-down list. • Lime green – Line Out (speakers or
The choices include: headphones)
• Duplicate these displays – this option sends
the same output to monitor 1 and Universal Serial Bus (USB) connections make it
monitor 2. possible to connect a wide array of
• Extend these displays – this option allows you peripheral devices to a computer. USB is used
to show different output on each for mass storage (such as in flash
monitor. For example, you can look at your drives), and for connecting human interface
email on monitor 1, and work on a devices (such as mice, keyboards,
spreadsheet on monitor 2. Or you can display a joysticks, tablets, etc.). Because it also delivers
large spreadsheet across both power, it is used as a charging
monitors. standard for devices with re-chargeable
• Show only on 1 – this option shows output batteries. The following figure shows two
only on the monitor designated as USB 3.0 ports.
number 1. Monitor 2 goes blank.
• Show only on 2 – this option shows output The USB standard has been in use for several
only on the monitor designated as years, with versions 2.0 and 3.0 in
number 2. Monitor 1 goes blank. widespread use today, and version 3.1
(Generation 1 and 2) breaking onto the
A network port on a computer allows you to scene.
connect to a local area network (LAN) USB Version 2.0 can transfer data at a top speed
using a network cable. The port (technically an of 480Mbps. The usual color
RJ-45 jack) is known by several coding for USB 2.0 ports and connectors is black
names, including: Ethernet port, network port, or white.
and LAN port. An Ethernet port USB Version 3.0 (called SuperSpeed USB) has a
(which looks like an over-sized telephone jack) theoretical top speed of 5Gbps
and an Ethernet cable (although this speed is seldom realized in real-
world use). Version 3.1 Generation
A network port allows you to connect to a wired 1 is almost identical to USB 3.0, except that it
network using a network cable (also supports new connectors. The usual
called an Ethernet cable). You connect one end color coding for USB 3.0 ports and connectors is
of the cable into the port on your blue.
computer, and the other end into a LAN port in
a wall jack or into a LAN port on a USB Version 3.1 Generation 2 promises speeds
networking device such as a network switch or of up to 10Gbps. The usual color
network router. coding for USB 3.1 ports and connectors is teal
blue
ISE Enhanced Discovering Computers ©2017 system for moving objects or information.
(Shelly In computing, a network is simply an
Cashman Series) arrangement of computers (and additional
Vermaat, Misty E.; Sebok, Susan L.; Freund, computing devices) that are connected in
Steven
such a way that they can communicate and
M.; Campbell, Jennifer T.; Frydenberg, Mark
share information. Individual networks can
ISBN 10: 1305657454 ISBN 13: 9781305657458
also be connected to other networks, and
Guide to Computer User Support for Help Desk this practice is referred to as
A guide to managing and Maintaining your PC internetworking. A network can consist of
Gmetrix – Digital Literacy – Living Online. two or three computers in a single room,
while an internetwork can consist of
millions of computers connected across the
globe.

Infrastructure is the basic underlying


physical structure or framework needed for
the operation of a service or an enterprise.
In the case of networking, infrastructure
is the hardware that supports high-speed
communications and data transfer.

Networks are in wide use today because


they are practical and useful.
They enable users to share many things,
including:
Files – for example, Betty can create and
store a file on her computer,
and her fellow network user Barney can
open and work with Betty’s
file without having to obtain a copy of the
file.
Resources – printers and scanners are
commonly shared on a
LESSON 3 network. An entire office can share one or
two printers, eliminating
the need to purchase and attach a printer to
What is a network? each computer.
Internet connections – networks within
There are networks all around us – a home or office allow several
transportation networks, cellular users to share an Internet connection.
networks, data networks, cable television
networks, and the telephone network. At its Internet Connection Sharing
very simplest definition, a network is a
• Stream audio and video to various prepared for transport through a process
devices. called packetization
• Share stored media (such as audio files, or – that is, the data is broken down into
photographs) among your multiple pieces called
devices. packets. These individual packets are sent
• Share and backup files (including across the
documents, pictures, scans, and so network, and when they arrive at their
on.) destination, they are
• Play games online. re-assembled into their original form.

Downloading is the process of copying a Transmission Control Protocol/Internet


file (any type of Protocol or TCP/IP- is a
file) from a server on the Internet to your networking protocol that controls the
device. When you process of breaking data down into
download a file, you can access it (play it) packets, sending it across the network, and
any time you like, re-assembling it when it reaches
even when you do not have an Internet its destination.
connection. • All major operating systems (Windows,
Mac OS X, Linux and UNIX) use
• Streaming is the process of having a file TCP/IP as their networking protocol. TCP/IP
delivered to your is the international standard
device in a constant and steady stream. protocol for both local and wide area
Streaming is like networking, and it is the networking
listening to a song on the radio – you can protocol used on the Internet.
listen to it as soon
as the stream starts (no waiting). Streaming LANs and WANs
requires an • Local area network (LAN) is a private, local
Internet connection. set-up. Your home network, or a small
office or school network is a LAN. LANs are
private networks. LANs come in different
sizes, but are generally confined to one
geographic location.
• Wide area networks (WANs) are networks
that connect computers in multiple
Basic Technology locations using communication lines owned
by a public carrier (such as the phone
Home networks, school networks, business company or an Internet Service Provider).
networks, and
even the Internet are data networks. They IP Addresses
transport data In order for the computers connected to a
from one location (computing device) to network to communicate with one another,
another. This data is each computer requires a unique address.
This address is called an Internet Protocol
(IP) address. Each computer on the local You can also view your IP address from the
network (and each computer on the Windows Network and Sharing Center.
Internet) Right-click Start, Control Panel, then click
has an IP address that distinguishes it from View network status and tasks to open
all other computers on the network. the Network and Sharing Center. Your
connection(s) display in the right side of the
A typical LAN IP address looks like this: screen.
192.168.1.104
Finding Your IP Address
On the Internet, each web site has its own Click a connection to open a connection
IP address which is associated with an easy status dialog box.
to remember text address called a URL
(Uniform Resource Locator). For example, Click the Details button to view specifics
the about the connection, including the IP
URL www.yahoo.com is associated with the address.
IP address 98.138.252.30.
Obtaining Internet Service
IPv4 and IPv6
IPv4 addresses are written in decimal form Accessing the Internet from your school or
as a series of four decimal numbers, office is easy because the Internet
separated by periods. The LAN IP address service is already running, and you can
shown previously is an IPv4 address. access it either through Ethernet or Wi-Fi.
IPv6 addresses are written in hexadecimal However, at some point, someone at your
form as a series of 8 hexadecimal school or office had to decide which
numbers separated by colons. A typical IPv6 service to purchase, and then arrange to
address looks like this: have it set up.
805B:2D9D:DC28:0000:0000:FC57:D4C8:1FF
F Service Providers
If you want to access the Internet from
Since 2011, all major operating systems for within your home, you must obtain Internet
personal computers and servers include service from an Internet Service Provider
built-in support for IPv6. Cellular providers (ISP). An ISP is a company that provides
use IPv6 addresses in all their 4G Internet connections to the public for a fee.
networks, which means that all cell phones Typical service providers include:
(and other computing devices) with 4G • phone companies
capability, operate using IPv6 addressing • cable TV companies
(with optional support for IPv4). • satellite TV companies

Finding Your IP Address The term “broadband” is used to describe a


Run Command Prompt (window + r) then fast Internet connection (technically, at
type “cmd” then enter. speeds of 1.544 Mbps or higher). A
broadband connection is considered a
Finding Your IP Address permanent network connection.
Digital Subscriber Line (DSL) – provided by from your computer to a server (uploading),
the phone company. This service runs and the process of receiving
over copper telephone wiring and provides information from a server (downloading).
speeds of up to 3Mbps. Most users download much more
Broadband Cable – provided by cable TV information than they upload. Accordingly,
companies. This service runs over the most service providers offer service
copper coaxial cable that is part of the cable with two speeds:
TV (CATAV) system. Cable provides Downstream (download) – Data moves
speeds up to 30Mbps, depending on the downstream as it reaches you from a web
provider, and monthly subscription rates. server. When your browser loads a web
Fiber Optic Service (FiOS) – provided by page, or when you stream a movie to your
several telecom companies (such as laptop, you are downloading. Downstream
Verizon FiOS, AT&T and CenturyLink). This services are usually tremendously
technology runs over fiber optic cable. faster than upstream services.
This service is also called Fiber to the Home Upstream (upload) – Data moves upstream
(FTTH) and is just starting to become when you send or upload information.
available. FiOS offers speeds of 3Mbps up to When you enter a URL into your browser
50Mbps address bar or you fill in and then submit
an online form, you are uploading.
Satellite Internet – this technology is
provided by satellite
communications providers such as
HughesNet and ViaSat, Inc. This
technology involves three satellite dishes;
one at the service
provider’s hub, one in space, and one
attached to your home.
Wireless signals are sent from the ISP to
outer space to you; or from
you to outer space to the ISP. Satellite
providers offer speeds from
5Mbps to 15Mbps
How Much Speed Do You Need?
If you want to stream HD movies from
Netflix, for example, Netflix
recommends that you use a 5Mbps
connection for a good quality
Which service should you use? 1080-pixel stream. This amount of
bandwidth is sufficient for one
user; however, if you have multiple users
Upload Speed and Download Speed streaming video to different
The terms uploading and downloading refer
to the process of sending information devices, then you need more. If you want to
stream ultra-high-
definition (UHD) videos, then you need a the router.
25Mbps connection.
Public and Private IP Addresses
Connecting Internet to your LAN
There are two types of IP addresses. A
public IP address (also called an Internet-
Regardless of the technology used to get
addressable address) is one that will be
the Internet connection to your premises,
unique on the Internet. You must use a
the setup inside your home is pretty
public
standard: you use a modem to connect to
the
IP address to participate on the Internet.
service provider’s network.
Broadband Modems (Modulator/
A private IP address is one that is used
demodulator)
within the LAN. There are three ranges of
A broadband modem converts the incoming
IPv4
signal (from your phone line, cable
addresses that are reserved for private use.
line, fiber optic line, or satellite dish) into a
The most commonly-used range is
digital signal that can be sent to a
192.168.0.0 to 192.168.255.255.
computer (if you do not have a home
network), or to a broadband router (if you
Private addresses within a LAN must be
have set up a home network).
unique – but only within the LAN itself. That
means, any network can use these
The modem is the place where the private
addresses. Systems within your private LAN
LAN connects to the public WAN. The
may
modem is a connection point which has two
use the exact same addresses as those in
sides or “faces.”
your next-door neighbor’s private LAN
without causing any problem because these
Broadband Routers
are not the addresses that your network
If your broadband modem provides only a
actually uses to access the Internet.
single Ethernet port (and does not
support wireless connections), and you
want to share your Internet connection I Have a Private Address – How do I
among multiple systems in your LAN, then Connect to the Internet?
you must add a broadband router to On the WAN side, the modem/router gets
your network. the public WAN-IP address when it
Most broadband routers include at least connects to the ISP. (You can find your
four Ethernet ports for wired connections, public IP address by visiting a Web-based IP
and they have built-in wireless functionality, address lookup service, such as
allowing additional systems to connect WhatIsMyIPAddress.com.)
wirelessly. In setups where you use a On the LAN side, the modem/router
broadband router, you would plug the performs several functions, including (but
router not
into the Ethernet port on the modem, and limited to) the following:
then connect the computer systems to
• It assigns private network addresses to cable grade is referred to by its category
the systems connected to it (usually and number, for example, Category 5 or
192.168.1.x), thus establishing an internal “Cat” 5. Ethernet cables can reliably
LAN transmit signals over a cable length of about
• It uses a technology called network 300 feet (100 meters).
address translation (NAT) to replace the • Cat 5 – supports data transfer at 10Mbps,
private and 100Mbps
IP address used by a system on the LAN • Cat 5e – supports data transfer at
with the Internet-addressable IP address 10Mbps, 100Mbps, and 1Gbps
that was provided with the purchase of
Internet service. • Cat 6 – supports data transfer at 10Mbps,
Viewing Your Public IP Address 100Mbps, 1Gbps, and 10Gbps
you can visit http://get-site-ip.com or you
can visit www.myipaddress.com. • Cat 6a – same as Cat 6 but designed for
reduced signal interference
Wired Connection- Ethernet
Network Interface Card (NIC)
A wired connection to a LAN is called an An NIC (network interface card) sends and
Ethernet connection because it uses a receives data back and forth between
networking cable called an Ethernet cable. your computer and the network, and it
Using a wired connection provides the includes its own Ethernet port.
fastest, and most secure connection NICs are manufactured to support various
possible within the LAN. data transfer rates, such as 10Mbps,
100Mbps, and 1Gbps.
Ethernet Standards and Cables
Ethernet is a network-cabling protocol for Advantages and Disadvantages of
transmitting data across a LAN. You use Wired Connections
Ethernet cables to connect computers and • On the plus side, wired connections are
other devices to wired connection points faster than wireless connections, they
in your network, such as LAN ports in a wall are secure, and they are reliable. Wired
plate, or on a router. connections are ideal for handling a
• Gigabit Ethernet moves data at 1Gbps large volume of traffic.
• Fast Ethernet moves data at 100Mbps • The main drawbacks to using wired
• 10Base-T Ethernet moves data at 10Mbps connections are that they require cabling –
and cabling can get messy and can get in
the way.

When Should You Use an Ethernet


Connection?
Cables • If your computer (or other Internet-
Ethernet cables are manufactured in enabled device) does not include wireless
different numbered grades or categories. capability, then the only way you can
Each participate in a network is to use a wired
connection. router. This mode of communication can be
• If you require the fastest speed possible, secured, and it
wired connections are faster. A provides Internet access.
Gigabit Ethernet connection is more than
twice as fast as the fastest wireless Adapters, Signals and Bands
connection. Devices that participate on WLANs must
• If you require guaranteed reliability, wired include a wireless adapter,
connections are not subject to the which is the device that transmits and
type of interference that wireless signals receives the radio signals.
encounter. When you power on a wireless device, it
• If you require security for transmitting picks up signals from all the
sensitive and/or private information, wireless networks within the vicinity and
wired connections are secure. displays the name of each
available network.
Adding a Shared Printer to the Wired LAN Most handheld devices like smart phones
Sharing a printer is a simple matter of and tablets have a wireless
enabling printer sharing on adapter built in. For computers and laptops
the host computer. To activate printer that do not contain one,
sharing in Windows 10, you can either install one in a slot on the
navigate to the Network and Sharing system board, or you can
Center, then click the Change connect one through a USB port.
advanced sharing settings link.
Wireless Standards
Adding a Shared Printer to the Wired LAN Wi-Fi (short for wireless fidelity) is the
consumer-friendly name we
Wireless networking is a form of networking use to refer to a family of standards for
wherein systems use wireless equipment and
their Wi-Fi capability to send and receive transmission technologies. These standards
radio transmissions over the are part of the 802.11
air instead of over wired cabling. Wireless wireless networking standard.
networking occurs in two
distinct modes:
• Ad-hoc – systems communicate with one
another directly using Wireless Security
their Wi-Fi capability. This mode is highly Because wireless networks use radio waves
insecure, and it does not to send and receive
provide access to the Internet. information, they are susceptible to
• Infrastructure – systems connect to the eavesdropping, interception, and
network through a wireless unauthorized access. For this reason, it is
router (or access point), and communicate highly recommended that
with each other and you secure your wireless transmissions and
with other systems on a wired Ethernet use secure wireless
network through the networks whenever possible.
are using your phone while traveling in a
Cellular Networks car).
• LTE / 4G LTE – fourth generation. LTE
stands for Long Term Evolution. LTE devices
Wireless Security were originally marketed as 4G technology.
Cellular networks carry voice, text, and They are, however, significantly faster
digital data through the transmitting and than 3G. LTE is the fastest cellular
receiving of radio frequency (RF) signals. At technology currently available.
its heart, a mobile phone is a two-way
radio, and it sends and receives signals as it Cellular Carriers
moves through a network of A cellular carrier is a cell phone company
transmitters and receivers. Think of all the that provides cellular
cell towers you see as you travel to and service to mobile phone users. In the USA,
from work or school each day. These towers the four biggest cell
are part of the cellular network carriers are AT&T, Sprint, T-Mobile, and
infrastructure. Cellular carriers (or Verizon.
providers) own and operate these towers Carrier Types:
and • GSM Carriers – (Global System for Mobile
the networks they form. communication)
these cell companies use GSM networks,
Each cellular network is divided into and their phones
thousands of overlapping geographic areas identify with the carrier network through
called cells. You can think of it as a mesh of the use of a SIM card.
hexagonal cells (like honeycomb). Each • CDMA Carriers – (Code-Division Multiple
cell has its own base station at the center Access) these cell
and the cells overlap at the edges to companies use CDMA networks, and CDMA
ensure that users always remain within phones use an ESN
range of a base station. (Electronic Serial Number) to identify with
the carrier network
Cellular Generations – All About the G’s • Pre-Paid Carriers – these are carriers that
• 3G – third generation. These transfer data charge an up-front
at up to 2Mbps (almost as fast as DSL), fee for services, and are run by either a
CDMA or GSM carrier,
which makes it practical to use a mobile or by a third party carrier who “piggybacks”
phone to surf the Internet and use web- services off a major
based applications. 3G is considered the carrier network.
minimum requirement for using a smart

phone today.
• 4G – fourth generation. This standard How Cellular Service Differs from Internet
promises speeds in excess of 1Gbps when Service
you are stationary and 100Mbps when you • Internet service comes to your home (or
are highly mobile (such as when you school or office) and that is where it stays.
You may connect to it from different areas Text – refers to the sending and receiving of
of your house or office or campus, but the text messages (SMS) and picture and video
service comes to your premises at one messages (MMS). Some plans allow for a
location, and you must be on the premises certain number of text messages per
to month, and
use it. For all intents and purposes, Internet charge a fee for each text message that
service is stationary. exceeds the allotment.
• Cellular service, by its very design, travels Data – refers to information that you
with you and is available anywhere your upload and download to and from the
provider has a cell network. When you Internet. This
wander outside of your carrier’s cell includes app updates, notifications, GPS
coverage information, as well as email, uploading or
area, your phone can roam and use services downloading large files, streaming audio
from another carrier. Cellular service is and streaming video.

Pre-Paid Services Basic Cell Phones - The basic cell phone


Pre-paid carriers provide cellular service on (think of the old model
a month-to-month basis and do not require flip phone) is designed primarily for making
users to sign a contract that obligates them and receiving voice
to continue to pay for service for a certain calls. The call quality is sometimes better
number of months. than what you can find
• There are no overage fees – you buy your on a smart phone.
minutes, and when you use them up, you A cellular-enabled tablet looks and feels like
cannot make any more calls or send/receive a standard tablet,
any more texts until you purchase more and it can even connect to Wi-Fi just like a
minutes. “regular” tablet. But it
• Leftover minutes from one month has the extra capability of connecting to
(usually) roll over to the next month. your carrier’s cellular
• If you use a cell phone only occasionally, network.
you do not need to purchase a large When a smart phone, cell phone, or
quantity of cellular-enabled tablet access
minutes. the Internet using the cell carrier’s network,
all data that is
Cellular service provides three elements in uploaded and downloaded is referred to as
their pricing points, depending on which mobile data.
plan you
choose. Generally, these are referred to as: Hard- Wired Phones
Talk – refers to sending and receiving voice
calls. Some plans allot a certain number of A hard-wired phone (or “landline” phone) is
free connected to a
talk minutes per month, and then charge a telephone jack in the wall using a standard
specific amount per minute for every telephone line (copper
minute that
exceeds the allotted number of minutes.
wiring). The telephone jack is connected to accessing the voice mailbox through a PC,
a local telephone switch, or from a landline phone or
which is connected to the rest of the even a mobile phone.
telephone network. The phone
may be fixed or cordless. (A cordless phone Configuring Your Voice Mail
is different than a mobile A suitable business voice mail greeting
phone – a cordless phone handset sends should include the following information:
and receives wireless signals • Your name, department, and company
from the cordless phone base station, but name
the base station itself is • A brief apology that you cannot take a call
connected by a wire to a telephone jack.) right now
• An invitation to leave a message
Advantages and Disadvantages • An indication of when the caller can
• Landline phones require voltage for expect a return call
ringing and dialing, and this power is • Any additional options that might be
delivered from the telephone network available to a customer, such as your web
through the phone line itself. site address or the name and number of an
• VoIP phones, which use the Internet, are associate within your company
dependent upon routers and modems
(which all require AC power). You cannot Personal or Business - a voice mail
use a VoIP phone during a power greeting for a personal phone number can
outage. be less formal than one that you use for a
• Another advantage of landline service is business number. However, if you use
that the service is extremely reliable and your mobile phone for both business and
provides excellent sound quality. personal calls, you should ensure that
• Landline phone is that the service is not your greeting is suitable for both types of
portable. The phone must be connected callers.
to the telephone jack. Retrieving Messages - Your mobile
phone will display an icon when you have
Voice Mail new, unheard voice messages waiting for
you. You must call the voice mail system
A voicemail system is a centralized system and log in (enter your password) to access
used in businesses for your mailbox. You can play your unheard
sending, storing, and retrieving audio messages, discard them, or archive them.
messages. Residential and cell You can also record greetings, and
phone service plans also often include voice configure pager settings from within the
mail capabilities. voice mail system.
Voice mail systems also provide Mailbox Full - If you receive a high quantity
notifications to the user to alert them of voice mail messages and do not
when they have received new voice mail clear out your voice mailbox, the mailbox
messages. Most systems will become full and callers will not be
provide multiple ways for users to check able to leave new messages. The mailbox
their voice mail, including will remain full until you listen to and
clear out the existing messages.

Leaving a Clear Voice Mail Message


Many people freeze up when prompted to
leave a voice mail
message (especially when making a
business call), and hang up the
phone instead! A little preparation can help
alleviate this issue.
Before you place your call, prepare in
advance a sentence or two that
summarizes the nature and purpose of your
call. A clear and
understandable voice mail message is much
more likely to get a
response than one that rambles on and on.

Additionally, plan to include the following


items in your voice mail message:
• Identify yourself by first and last name,
and if appropriate, state the name of
your company.
• State the number (or numbers) at which
you can be reached, and if appropriate,
during which time frames. You might also
provide your email address if you are
willing to accept a response via email.
• Mention the date and time you are
calling.
• Briefly describe the nature and purpose of
your call.
• Ask the person to call you back at their
earliest convenience (or in whatever time
frame is required).
• Repeat the number at which you can be
reached.
• Thank them for their time.

You might also like