Professional Documents
Culture Documents
COURSE CONTENT
CONSTITUENT ELEMENTS OF DIGITAL LITERACY:
INTRODUCTION.
I) UNIT ONE: COMPUTER FUNDAMENTALS.
II) UNIT TWO: KEY APPLICATIONS
III) UNIT THREE: LIVING ONLINE
UNIT 1: COMPUTER FUNDAMENTALS:
1. Hardware
2. Network and mobile devices
3. Software
4. Operating system
5. File management
6. Security and maintenance
7. Cloud computing
UNIT 2: KEY APPLICATIONS
1. Apps and applications
2. Using Microsoft word
3. Using Microsoft Excel
4. Using Microsoft Access
5. Using Microsoft PowerPoint
UNIT 3: LIVING ONLINE
1. Internet
2. Media literacy
3. Digital communication
4. Understanding emails
5. Contacts and calendars
6. Life online
INTRODUCTION
Digital literacy means having the skills you need to live, learn, and work in a society where communication and
access to information is increasingly through digital technologies like internet platforms, social media, and mobile
devices.
Digital literacy is also the ability to navigate various digital platforms and understand, assess and
communicate through them.
DIGITAL LITERACY----- 1
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Developing your critical thinking skills (opens in new window) (PDF, 128 kB) is essential when you're confronted
with so much information in different formats – searching, sifting, evaluating, applying and producing information
all require you to think critically.
Communication is also a key aspect of digital literacy. When communicating in virtual environments, the ability
to clearly express your ideas, ask relevant questions, maintain respect, and build trust is just as important as when
communicating in person.
You'll also need practical skills in using technology to access, manage, manipulate and create information in an
ethical and sustainable way. It's a continual learning process because of constant new apps and updates, but your
future self will thank you if you keep your digital life in order!
Digital literacy is really important now, while you're a university student. It'll also be really important in the future
when you enter the professional world. In your workplace you'll be required to interact with people in digital
environments, use information in appropriate ways, and create new ideas and products collaboratively. Above all,
you'll need to maintain your digital identity and wellbeing as the digital landscape continues to change at a fast
pace.
Here you can learn more about the eight elements of digital capability as modelled.
2. Cognitive: how to do
The Cognitive element incorporates what we know of as computer literacy or IT skills with an understanding of the
key concepts.
Having the ability to use a range of devices, software platforms and interfaces.
Recognizing common features across digital tools such as navigation menus, settings, and profiles.
Understanding concepts such as tagging, hashtags, and sharing.
DIGITAL LITERACY----- 2
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
3. Constructive: how to use
The Constructive element involves knowing what it means to ‗construct‘ something in a digital environment; how
content can be appropriated, reused and remixed.
Knowing how to responsibly use and build upon someone else‘s work.
Respecting copyright and understanding the concepts of remix and reuse.
Being familiar with the various Creative Commons‘ licences.
Knowing the purpose of various online tools and how they are different or similar to each other.
Being familiar with the communication norms and expectations of various online tools.
Understanding what identity, sharing, influence and trust mean in digital spaces.
Understanding and capitalizing upon the ways in which the online world differs from the offline world.
Reflecting on one‘s learning in digital spaces.
Being part of an online community.
Learning how to do things in new ways using online tools and environments.
Imaginatively and critically thinking about how we create and share knowledge using digital technologies.
Knowing how to curate digital content to create value for readers.
Using reasoning skills to question, analyze, scrutinize and evaluate digital content, tools and applications.
Knowing how to search effectively.
Being able to distinguish credible sources from less credible ones.
DIGITAL LITERACY----- 3
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
The Civic element refers to individuals having the knowledge and ability to use digital environments to self-
organize; to be part of a movement bigger than themselves. For example:
In the next blog post I‘ll attempt to match these elements to a core library competency.
DIGITAL LITERACY----- 4
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
One of the most basic reasons why people want to get online and use digital technology in the first place is to get
(or keep) in touch with others. Knowing about the different ways you can interact with others through digital
technology is key to expanding your digital literacy skills. From email services to social media networks to Internet-
based messaging and chat apps, there are tons of ways you can make digital connections.
However, knowing how to make online connections is just the tip of the iceberg. There are several other very
important skills that contribute to a full understanding of online communication. These include knowing how and
when it‘s socially appropriate to contact people online, the proper etiquette for dealing with people online, and how
to avoid paying fees unnecessarily for online communication services.
3. Interconnectivity – how devices work together.
Interconnectivity is something that is often skimmed over or ignored altogether in lessons on technology, yet it is
extremely important to teach. How do actions I complete on a website then translate to a corresponding app on my
mobile device? How can I access stored data on different devices? The answers to these kinds of questions are not
always apparent to everyone, especially those who haven‘t had access to their own personal devices.
4. Storage and retrieval – saving information and finding it later.
Even the most talented navigation of the Internet is quite meaningless if you don‘t know how to store information
or find it later. In addition, anything you create on your own needs to be saved and stored for a later date. You need
to know not only how to keep something, but also how to keep it secure and safe so that other people can‘t use it
without your permission.
5. Creation – making your own content and presenting it.
Once you‘ve mastered some basic digital skills and concepts, creating your own digital content is a vital next step.
This can be something as simple as writing a word processing document, or a more complex operation such as
building your own functioning website
DIGITAL LITERACY----- 5
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Output devices.
A. INPUT DEVICE
An input device is essentially a piece of hardware that sends data to a computer. Most input devices either interact
with or control the computer in some way. Inputting is the process of sending in data or information into the
computer. Inputs are sometimes referred to as the materials sent into the computer The most common input devices
are the mouse and the keyboard, but there are many others.
Some common types of input devices include; Keyboard, Mouse, Touchpad, Scanner, Digital Camera,
Microphone, Game playing devices (Joystick, Graphic Tablet. Touch Screen), Webcam, Light pen, Optical
Mark reader (OMR), Optical character Reader (OCR), Magnetic Ink Character Reader (MICR), Magnetic
Card Reader (MCR).
1. Keyboard
Keyboards are the most common type of input device. Before keyboards, interaction with computers was generally
carried out using punch cards and paper tape. Most English language keyboards use the QWERTY layout for the
alphabetic keys, which are surrounded by number, symbol, function, and other key types. By pressing the relevant
keys, a user can feed data and instructions to the computer.
Input devices like keyboards and mice allow users to
interact with their computers by selecting icons and
entering text and commands.
The different types of the keyboard are grouped into; Alphanumeric keys, function
keys, Directional keys, N umber pad, Indicator lights and modifier keys.
2. Mouse
A mouse interacts with a computer through a process known as "point and click." Essentially, when a user moves
the mouse on the mouse pad, the pointer moves in a corresponding direction on the computer's monitor screen. It
has seven functions such functions such as; clicking, double clicking, right clicking, selecting, pointing, drag
and drop and scrolling.
The concept of a computer mouse has its roots in the trackball, a related pointing device invented in 1946 that used
a "roller ball" to control a pointer. Most modern computer mice have two buttons for clicking and a wheel in the
middle for scrolling up and down documents and web pages.
3. Touchpad
DIGITAL LITERACY----- 6
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
4. Scanner
A scanner is an input device of which its main function is to resnaps or take a picture of the document, digitize the
information and present it on the computer screen. *Note: The instructions for this scanner are specific to a brand
and may vary for other brands and products.
The word "scanner" can be used in a number of different ways in the computer world. There are two main categories
of scanners;
a) Flatbed Scanners
Flatbed scanners are among the most common and affordable digital scanners on the market. They feature a flat
pane of glass on which the user places a photograph, document or book. Beneath the glass, the scanner includes a
light to illuminate the document and a digital sensor to photograph the document in great detail.
Most flatbed scanners include adjustable settings via software that allow users to make quick, low-quality scans or
more detailed scans that take longer to produce and result in larger digital files. Some flatbed scanners also include
scanning elements on both the glass surface and the underside of the lid, allowing them to scan both sides of a
double-sided document at the same time.
b) Photo Scanners
Photo scanners are part of a class of specialty scanners that create digital copies of printed photographs. While a
flatbed scanner will scan a photograph, photo scanners are built especially for this task. The devices usually employ
a sheet-fed system with a slot into which the user inserts a photo. Sheet-fed photo scanners are fast and produce
very high-quality images for digital editing or archiving.
Drum scanners are another option popular with photo and publishing professionals. The devices use a rotating drum
that holds the photo in place and spins it past a stationary sensor. Drum photo scanners are expensive but they can
produce images suitable for printing in magazines or on billboards.
Physically, flatbed scanners look like image scanners, but their way of functioning are the different. They all use
their surfaces to capture information into the computer memory.
DIGITAL LITERACY----- 7
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
5. Digital Camera
Digital cameras are used to capture photographs and videos independently. Later, these photo and video files can
be transferred to a computer by connecting the camera directly with a cable, removing the memory card and slotting
it into the computer, or through wireless data transfer methods such as Bluetooth. Once the photos are on the
computer, they can be saved, edited, emailed, or printed.
6. Microphone
Microphones are input devices that allow users to record, save, and transmit audio using a computer.
A microphone captures audio and sends it to a computer where it is converted to a digital format. Once the audio
has been digitized, it can be played back, copied, edited, uploaded, or emailed. Microphones can also be used to
record audio or to relay sounds live as part of a video chat or audio stream.
c) Trackball
A small ball that is set in a holder and can be rotated by hand to move a cursor on a computer screen.
9. Graphic Tablet
Also known as digitizers, graphic tablets are input devices used for converting hand-
drawn artwork into digital images. The user draws with a stylus on a special flat surface
as if they were drawing on a piece of paper. The drawing appears on the computer screen
and can be saved, edited, or printed.
DIGITAL LITERACY----- 8
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
While scanners can only create digital images from drawings, graphic tablets offer greater control and versatility for artists
by allowing them to see their drawing appear live on their monitor as they create it.
Touch screens provide the same functionality as a mouse or trackpad by allowing users to make selections and commands
directly through a device's display screen.
MICR is used extensively in banking because magnetic-ink characters are difficult to forge and are therefore
ideal for marking and identifying cheques.
DIGITAL LITERACY----- 9
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Above are some commonly used input devices amongst many.
B) PROCESSING DEVICE
A processor (CPU) is the logic circuitry that responds to and processes the basic instructions that drive a computer.
The CPU is seen as the main and most crucial integrated circuitry (IC) chip in a computer, as it is responsible for
interpreting most of computers commands. CPUs will perform most basic arithmetic, logic and I/O operations, as
well as allocate commands for other chips and components.
The term processor is used interchangeably with the term central processing unit (CPU), although strictly
speaking, the CPU is not the only processor in a computer. The GPU (graphics processing unit) is the most notable
example, but the hard drive and other devices within a computer also perform some processing independently.
Nevertheless, the term processor is generally understood to mean the CPU.
Processors can be found in PCs, smartphones, tablets and other computers. The two main competitors in the
processor market are Intel and AMD.
The basic elements of a processor
The basic elements of a processor include:
C) Registers:
It holds instructions and other data temporally during processing. Registers supply operands to the ALU and
store the results of operations.
CPU Operations
The four primary functions of a processor are fetch, decode, execute and write back.
DIGITAL LITERACY----- 10
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Fetch- is the operation which receives instructions from program memory from a systems RAM.
Decode- is where the instruction is converted to understand which other parts of the CPU are needed to continue
the operation. This is performed by the instruction decoder
Execute- is where the operation is performed. Each part of the CPU that is needed is activated to carry out the
instructions.
Materials
Just like cars or phones or anything else you buy, CPUs are made up of materials and some materials have a better
quality than others. The quality of materials that make up a processor will affect the reliability, speed and
performance of a CPU. A component in a CPU that is very slow and poorly made will slow down the overall
performance of the CPU.
Clock speed
CPUs have a clock inside them, ticking away. Instructions are carried out each time a tick of the clock happens.
Some instructions only need one clock tick whereas others will need more than one. The faster the clock, the more
instructions you can carry out in any second. A typical clock these days might be 4 Gigahertz or 4 billion ticks a
second, for example.
Cache
Although CPUs fetch instructions from RAM, there is another place in can get instructions from, called 'cache'.
Cache is just like RAM but much faster to read from and write to compared to RAM. The computer cleverly puts
data into cache that it needs again and again. It is a lot quicker for the CPU to get data from cache than RAM. The
more cache a computer has, the better the CPU will perform.
Cores
A CPU traditionally had one 'core' but processors these days might be dual-core or quad-core, for example. A core
is actually a processor with its own cache. So a dual-core CPU has not one but two processors. A quad core CPU
has four processors. Two brains (or four brains) are better than one! Each brain can be working on different parts
of a program at the same time and so this speeds up the overall CPU's performance.
Word size
Processors work on instructions and data, which it has fetched from RAM. These instructions and data are in binary.
DIGITAL LITERACY----- 11
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
If a processor can work on this number: 0111 0011 1111 1111 then it is said to be a 16 bit processor. But if a
processor can work on 32 bits (a 32bit processor) in one go or even on 64 bits (a 64 bit processor) in one go then it
can work on more data and more instructions for every tick of the CPU's clock. The word size simply refers to the
number of a bits a CPU can work on in one go. The bigger the word size, the better the CPU's performance will
be.
The processor in a personal computer or embedded in small devices is often called a microprocessor. That term
means that the processor's elements are contained in a single IC chip. Some computers will operate using a multi-
core processor—a chip containing more than one CPU. A CPU is typically a small device with pins on it facing
down in a motherboard. CPUs can also be attached to a motherboard with a heat sink and a fan to dissipate heat.
Types of processors
Most processors today are multi-core, which means that the IC contains two or more processors for enhanced
performance, reduced power consumption and more efficient simultaneous processing of multiple tasks
like parallel processing for example. Multi-core set-ups are similar to having multiple, separate processors
installed in the same computer, but because the processors are actually plugged into the same socket, the connection
between them is faster.
Most computers may have up to two-four cores; however, this number can increase up to 12 cores, for example. If
a CPU can only process a single set of instructions at one time, then it is considered as a single-core processor. If
a CPU can process two sets of instructions at a time it is called a dual-core processor; four sets would be considered
a quad-core processor. The more cores, the more instructions at a time a computer can handle.
Some processors use multi-threading, which uses virtualized processor cores. Virtualized processor cores are called
vCPUs. These are not as powerful as physical cores but can be used to improve performance in virtual machines
(VMs). However, adding unnecessary vCPUs can hurt consolidation ratios, so there should be about four-six vCPUs
per physical core.
When data is processed to information by the CPU, it can either be saved in the storage devices by the user through
output devices, or outputted from the computer through output devices.
C) STORAGE DEVICES
Alternatively referred to as digital storage, storage, storage media, or storage medium, a storage device is
any hardware capable of holding information either temporarily or permanently.
DIGITAL LITERACY----- 12
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
There are two types of storage devices used with computers: a primary storage device, such as RAM, for example
and a secondary storage device, such as a hard drive for example. Secondary storage can be removable, internal,
or external.
DIGITAL LITERACY----- 13
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
The contents of RAM can be changed at any time by overwriting it with other data and instructions. For example,
a user might close one document and open another or run a different program.
The more RAM a computer has, the more data and program instructions it can hold simultaneously. RAM can also
be upgraded easily, unlike other types of primary storage.
it is the main types of primary storage devices, stores information that is being processed and offload at a very fast
rate to the motherboard of the computer.
Then the information is used for GUI (Graphic User Interface), which allows the user to access the information with
the mouse, keyboard, monitor, etc.
3. Cache memory
Cache memory is a type of high-speed volatile random access memory (RAM) which is built into the processor. Its
high speed helps the RAM when its own speed is slow to catch up with the speed of the CPU.
Data can be transferred to and from cache memory more quickly than from RAM. As a result, cache memory is
used to temporarily hold data and instructions that the processor is likely to reuse. This allows for faster processing
as the processor does not have to wait for the data and instructions to be fetched from RAM.
The more cache memory a computer has, the faster it runs. However, because of its high-speed performance, cache
memory is more expensive to build than RAM. Therefore, cache memory tends to be very small in size.
To get around this issue, different types of cache exist - Level 1 (L1) cache and Level 2 (L2) cache.
L1 cache has extremely fast transfer rates, but is very small in size. The processor uses L1 cache to hold the most
frequently used instructions and data.
L2 cache is bigger in capacity than L1 cache, but slower in speed. It is used to hold data and instructions that are
needed less frequently.
4. Register Memory
The Bits in the computer are known as register memory. The processor register is the smallest Types of primary
storage services which holds the processor`s data temporally during processing.
Typically, it holds around 32 to 64 Bits which is good enough for doing regular tasks on the computer. The
processors are the Fastest primary storage device as well.
Secondary storage devices are non-volatile, long-term storage solid state storage devices.
It is also referred to as any non-volatile storage device that is external to the computer except the internal hard disk.
It can be any storage device beyond the primary storage that enables permanent data storage.
A secondary storage device is also known as an auxiliary storage device, backup storage device, tier 2 storage,
or external storage or multimedia storage device.
Some are magnetic storage devices like the hard disk for example, optical storage devices like the CD-ROM for
example etc.
There are many types of secondary storage devices. each with their own benefits and drawbacks.
Below are explanations about different storage devices.
Types of secondary storage devices: Hard Disk Drive (HDD), Solid State Drive, CD, DVD and Blu-Ray Discs,
DVD-RAM, USB Flash Memory etc.
DIGITAL LITERACY----- 15
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
DIGITAL LITERACY----- 16
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
CD DVD Blu-Ray
DIGITAL LITERACY----- 17
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
CD-R, DVD-R, BD-R
Recordable – blank discs that can be burnt (written to) once.
CD-RW, DVD-RW, BD-RE
Re-writable – blank discs that can be burnt (written to) over and over again (can be erased and reused many times).
DVD-RAM
What is DVD-RAM?
DVD-RAM is an optical media storage device.
It differs from a traditional DVD in that data is stored in concentric tracks (like a HDD) which allows read and
write operations to be carried out at the same time.
This means, for example, that when used in a personal video recorder you can record one television program whilst
watching a recording of another. This allows handy features such as ‗time slip‘ to be possible.
Typical applications for DVD-RAM include: Personal and digital video recorders, high-end CCTV.
Benefits of DVD-RAM include; Read and write at the same time, can be rewritten to many more times than a
traditional DVD-RW, has write-protect tabs to prevent accidental deletion when used in an optional cartridge, data
is retained for an estimated 30 years. This long life is great for archiving data, reliable writing of discs because
the verification done by the hardware, not by software.
Drawbacks of DVD-RAM include; Disc speeds higher than 5x are less common, less compatibility than DVD-
RW.
DIGITAL LITERACY----- 18
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
e. Paper storage
Early computers had no method of using any of the technologies above for storing information and had to rely on
paper. Today, these forms of storage are rarely used or found. In the picture is an example of a woman entering data
to a punch card using a punch card machine. They include: OMR and Punch card
Note
DIGITAL LITERACY----- 19
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
A hard copy is considered a form of paper storage, although it cannot be easily used to input data back into a
computer without the aid of OCR.
There are 2 categories of monitors, they are Monochrome & Colored Monitors. Monochrome monitors actually
display two colors, one for the foreground and one for the background. The colors can be black and white,
green and black, or amber and black. The Colored Monitor is a display device capable of displaying many
colors. The Color monitors can display anywhere from 16 to over 1 million different colors.
Monochrome display.
Types of Monitors
There are several types of monitors; some are as follows:
DIGITAL LITERACY----- 20
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
The CRT display is made up of pixels generated by phosphorescent dots. The sharpness and clarity of the image
depends upon the number and size of the pixels. Cathode-ray tubes work like vacuum tubes which produce images
in the form of video signals. The front surface of the screen is called face plate, which is made up of fiber optics
and displays images. There are three electron beams red, green and blue that beats the screen. So the colours which
you see on the screen are the blends of these three beams. Early TVs are an example of CRT display. The
disadvantage of CRT displays is that they were large in size and need high power.
3. LCD Monitor
The LCD Monitor is a flat panel screen that is smart in size and light weight. It consists of liquid crystal technology
which is used in the display of laptops, tablets, smart phones, etc. the LCD screen forms two layers of polarized
glass. Old LCDs had passive-matrix screens, while modern LCDs use active-matrix technology.
4. LED Monitor
The LED Monitor is an upgrade and improved version of LCD monitor. They are also flat-panel display and uses
liquid crystal technology having multiple LED panels. The main difference between LCD and LED is the source
of light to backlight the display. Modern LED displays produce more brilliance and greater
light intensity but also consume less power.
Comparison between LCD and LED monitors:
DIGITAL LITERACY----- 21
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
5. Plasma Monitor
The plasma monitor is also a flat panel display, which uses plasma display technology. It contains small tiny cells
between two glass panels. These cells are mixture of noble gasses and a small amount of mercury. When
electromotive force is applied, the gas turns into a plasma and releases ultraviolet light that creates images on the
screen. Plasma monitors offer a unique and excellent viewing experience.
II. Printer
Printer is another output device found in homes or workplace to collect softcopy information from the computer
and reproduce it on pieces of papers in the form of hard copy.
The computer conveys the processed data to the printer, which then physically print the pictures and content on
the paper.
Printers are divided into two categories:
Impact printers and non-impact printers.
A. Impact printers
An impact printer is a printing device in which a printing element directly strikes a surface.
There different types of impact printers. Impact printers these Printers use an Electro-mechanical mechanism. An
impact printer refers to all those printers whose printing heads touch the paper. His mechanism uses hammers or
pins to strike against a ribbon and paper to print the text or image.
2. Daisy-Wheel printers
Also known as Letter Quality Printer. These printers use a print wheel font, which is termed as daisy wheel.
Each petal or hammer of Daisy-Wheel has a character raised on it. A motor spins the wheel at a rapid rate.
When the desired character spins to the correct position, a print hammer strikes it to produce the output.
DIGITAL LITERACY----- 22
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
The speed of these Daisy-Wheel Printers normally ranged between 10-75 characters per second. The noise
levels of these printers are high. These printers are most commonly used in electronic typewriter.
b) Chain Printer
A chain containing characters is used for printing. The chain knows as print chain rotates very rapidly. With each
link of the chain is character font. Magnetically driven hammers are there in each print position and all the
characters which are to be printed are received by the printer through processor. When the desired character comes
in the print position the hammers strike the ribbon and paper against the character thus it prints one line at a time.
It is very noisy and its speed ranges from 400-24000 line per minute (LPM).
B. Non-impact printers
Non-impact printers use a method to place ink or another substance on the paper without physically touching it.
They can spray ink, through vapour etc. Non-impact printers include inkjet printers, laser printers, snapshot
printers, plotters, wide-format printers, and thermal printers. These printer uses ink and special electrical
machines for producing outputs. Non – impact printers are all those printers whose printing heads do not touch
paper. A non-impact printer forms characters and image on a piece of paper without actually striking the paper.
An impact printer has mechanisms resembling those of a typewriter. It forms characters or images by striking a
mechanism such as a print hammer or wheel against an inked ribbon, leaving an image on paper. Impact
printers are dying out; however, you may still come in contact with a dot-matrix printer. A dot-matrix printer
contains a print head of small pins that strike an inked ribbon, forming characters or images. Print heads are
available with 9, 18, or 24 pins; the 24-pin head offers the best print quality.
DIGITAL LITERACY----- 23
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
2. Laser Printer
This is non-impact printer that uses laser lights to produce the dots to form the characters for printing. They utilize
toner drums that roll through magnetized pigment and transfer the pigment onto a paper. Laser printers use
powdered toner instead of liquid ink and produce high quality objects in very high speed. They are expensive and
cannot be used for multiple copies of printing in single session.
3) Thermal Printer
The printer that produces images by pushing electrically heated pins against special heat – sensitive paper, is
known as thermal printer.
This type of printer uses a special heat sensitive paper. These papers have a special heat sensitive coating. When
a spot on the special paper is heated, it becomes dark. A character is printed with a matrix of dots. The heating
element is heated by electric current. We can also say the heat sensitive paper ass chemically treated paper. In this
type of printer neither the ink nor the ribbon in involved.
To print a character the printing head is moved first to the correct character position. Then the heating elements
of desired character are turned on. After a short time, they are turned off. There after the print head is moved to
DIGITAL LITERACY----- 24
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
the next character. Such printers have a speed of about 200 characters per second.
Advantages of Thermal Printers
Low noise, can produce high quality color output.
Disadvantages of Thermal Printers
Expensive, slow Speed, required special paper.
III. Speaker
Speakers are most popular and portable output device used with computers to generate sounds. They receive
signals from the computer‘s sound card and produce audio in the form of analog sound waves that are audible to
the human hear.
Laptops and monitors often have built-in speakers. Sound cards are necessary in the computers for speakers to
function. Modern speakers come in range from two speaker output devices to multi-channel sound units. Some
computer speakers are remote these days, associating with the computers by means of Bluetooth.
IV. Headphones
Another common example of output device is a headphone, invented by Nathaniel Baldwin in 1910. Headphones
come in many different types and styles. Earbuds headphones is the most basic type, small in size and easily fit
inside the ear. Headphones are perfect for gaming and also ensure privacy when communicating via voice calls.
v. Projector
A projector or image projector is an optical device that receives a video signal and projects the corresponding
image onto a surface, commonly a projection screen using a lenses system. Some advanced projectors can project
the image directly, by using lasers.
Projectors can be connected to computers, VCRs, DVD players, CD players and storage device. In most cases the
projection screen is large, flat and lightly coloured.
2. Sound Card
Sound card is known as an extension card. It is an expansion component, used in computers to receive or send
audio that can be heard through speakers or earphones.
Although, a sound card is not necessary for computers, but they are included in every machine. The term sound
card is also used for professional audio application.
DIGITAL LITERACY----- 25
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Internal Peripheral Devices are generally located inside the computer system case and named internet because of
their location. Here is some internal peripheral device: CD-ROM, Floppy Disk, Graphic Card / Video Card,
Network Interface Card, TV Card, Sound Card.
External Peripheral Devices are located outside of the computer system case or chassis and connected different
types of connections and cables: External CD-ROM, External Floppy Disk, Keyboard, Mouse, Paint Device,
Printer, Scanner, External Hard Disk / USB Disk, Monitor (Except Laptops).
The motherboard is the backbone that ties the computer's components together at one spot and allows them to
talk to each other. Without it, none of the computer pieces, such as the CPU, GPU, or hard drive, could interact.
Total motherboard functionality is necessary for a computer to work well.
There are many components found in a motherboard. Some of them are major motherboard components while
DIGITAL LITERACY----- 26
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
10. ISA (Industry Standard Architecture) slot 16. Mouse and keyboard ports
13. IDE (Integrated Drive Electronics) controller 19. Heat sink/heatsink (cooling system)
20. Clock generator
3. Southbridge/north bridge
They are the two chips in the core logic chipset on the motherboard. Typically, the south bridge implements the
slower capabilities of the motherboard in a north bridge/south bridge chipset computer architecture.
The north bridge, also known as host bridge or Memory Controller Hub, is connected directly to the CPU via the
front-side bus (FSB). It is responsible for tasks requiring the highest performance. Together with the south bridge,
they manage communications between the CPU and other motherboard components.
5. I/O port
Input/output ports are the connections between the CPU and peripheral devices on a motherboard. There are two
complementary methods to perform input and output processes: memory-mapped I/O (MMIO) and port-mapped
I/O (PMIO). Alternatively, you can use dedicated I/O processors, called channels on mainframe computers, which
execute their own instructions.
DIGITAL LITERACY----- 27
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
7. CPU slot
A CPU slot, also called a CPU socket or Processor socket, contains one or more mechanical components that provide
mechanical and electrical connections between the PCB and a microprocessor (CPU). Therefore, you can install a
CPU on a motherboard without soldering.
DIGITAL LITERACY----- 28
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
DIGITAL LITERACY----- 29
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
18. Jumper
A jumper is a short length of conductor that is used to close, open or bypass part of an electronic circuit. Typically,
jumpers are used to set up or configure printed circuit boards like the motherboard.
After reading the above contents, you can figure out that the two main components on the motherboard are
CPU and RAM. They also list in the first two locations in the above. Actually, the above motherboard
components are listed mainly based on their importance on the motherboard. Yet, that is just our personal opinion.
Those components‘ importance is different in different situations.
DIGITAL LITERACY----- 30
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
CLASSIFICATION OF SOFTWARE
Computer software can be organized into categories based on common function, task, or field of use.
Classification of software based on task
Based on the kind of task they perform, software can be divided into two major
groups: System software and application software. The diagram below gives a
simplified hierarchical organization of the main parts of software in a general-
purpose computer. At the highest level of this hierarchy lies the application
software, whose services are carried out by the underlying system software.
Computers operate by executing software programs. This involves passing the
instructions from the application software, through the system software to the
hardware that ultimately receives the instruction as machine code. Each instruction
causes the computer to carry out an operation such as data transmission, data processing, data storage or
data control.
I. System software
System software is a type of computer software that controls the overall operations of the computer and
provides facilities that extend the general capabilities of the machine. This provides the basic functions
for computer usage and helps to run the computer hardware and system. It includes a combination of the
following:
1) Operating system
An operating system is a group of computer programs that coordinates all the activities among computer
hardware devices. This is the most important type of system software in a computer. A user can‘t run an
DIGITAL LITERACY----- 31
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
application program on the computer except it is self-booting without the Operating System. Operating
systems are contained in almost all devices including mobile phones. (to be extended in the next chapter)
1. Process management: - Process management helps OS to create and delete processes. It also provides
mechanisms for synchronization and communication among processes.
2. Memory management: - Memory management module performs the task of allocation and de-allocation of
memory space to programs in need of this resources.
3. File management: This is a function that manages data files. An operating system contains file management
programs that provide the ability to create, delete, enter, change, ask, and access of files of data. The operating
system keeps track of where files are located on the hard drive through the type of file system. The type two main
types of file system most used in windows OS are File Allocation table (FAT) or New Technology File system
(NTFS).
4. Device Management: Device management keeps tracks of all devices. This module also responsible for this task
is known as the I/O controller. It also performs the task of allocation and de-allocation of the devices.
5. I/O System Management: One of the main objects of any OS is to hide the peculiarities of that hardware devices
from the user.
6. Secondary-Storage Management: Systems have several levels of storage which includes primary storage,
secondary storage, and cache storage. Instructions and data must be stored in primary storage or cache so that a
running program can reference it.
7. Security:- Security module protects the data and information of a computer system against malware threat and
authorized access.
8. Command interpretation: This module is interpreting commands given by the and acting system resources to
process that commands.
9. Networking: A distributed system is a group of processors which do not share memory, hardware devices, or a
clock. The processors communicate with one another through the network.
10. Job accounting: Keeping track of time & resource used by various job and users.
11. Communication management: Coordination and assignment of compilers, interpreters, and another software
resource of the various users of the computer systems.
12. Resource Management: An operating system manages a collection of computer hardware resources by using a
variety of programs. It manages CPU, primary memory, virtual memory, secondary storage devices, input/output
peripherals, and other devices.
DIGITAL LITERACY----- 32
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
13. Task Management: The function of the operating system that controls the running of many tasks. It manages
one program or many programs within a computer system simultaneously. That is, this function of operating
system manages the completion of users' tasks.
14. User Interface: It is a function of an operating system that allows users to interact with a computer. The two
main types of user interfaces are: command line and a graphical user interface (GUI). With a command line
interface, the user interacts with the operating system by typing commands to perform specific tasks. An example
of a command line interface is DOS (disk operating system).
Examples of popular modern operating systems include Android, BSD, iOS, Linux (Ubuntu, Knoppix, Dream
Linux, …) OS X, QNX, Microsoft Windows(Windows 95, 2000, Vista, 7, 8, …), Windows Phone, and IBM z/OS.
All these, except Windows, Windows Phone and z/OS, share roots in UNIX.
3) Programming software
It is the type of software that is used for creating other software. Another name for programming software
is Integrated Development Environment (IDE). An IDE normally consist of a source code editor, a
translator (compiler or interpreter) and a debugger.
- Editor: It is a programming tool that is used for creating and modifying application programs. It helps the
computer user to enter, search, delete, replace, copy and insert text or sections of a text in a desired
position.
- Compiler: It is used to convert a complete program written in a high-level language (such as Pascal and
C) into a program in machine language in bulk. The output of a compiled program is usually larger than
the source, because compilation takes everything into account. But as compared to an interpreter, a
compiler takes a shorter time to compile.
DIGITAL LITERACY----- 33
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
- Interpreter: A program which translates the program statements into machine language one line at a
time as the program is running. The output of a compiled
program is usually smaller than the source, because
interpretation summarises the source code. But as compared to
a compiler, an interpreter takes a longer time to interpret.
- Assembler: A programming tool that convert a program in
assembly language into program in machine language.
- Debugger: It is a program that is used for locating and
correcting programming errors.
- Linker: A linker or link Editor is a program that takes one or
more objects generated by the compiler and combines them to
a single executable program...
- Loader: Loader is a kind of system software, which is
responsible for loading and relocation of the executable
program in the main memory. The functions of a loader include
assigning load time space for storage, that is, storage allocation
and assisting a program to execute appropriately.
4) A language translator:
It is a system program that is used to convert from one language to another and vice versa. That is, either from high
level language to low level language and vice versa. The compiler, interpreter and assembler are good examples
of computer language translators.
5) Device drivers
Device drivers are computer programs that allow higher level computer programs to communicate and interact
with a hardware device. All hardware devices have the devices drivers that communicate with them through the
computer bus to which the hardware is connected. Drivers are hardware dependent and operating system specific.
Some specific categories of device drivers are
Logical Device Drivers (LDD) which are written by the Operating System vendors
Physical Device Drivers (PDD) which are written and implemented by the hardware vendor. To solve device driver
crises, Microsoft has created the Windows Drivers Foundation (WDF) which collects and keeps all device drivers
as a database.
A general purpose application, sometimes known as ‗off-the-shelf’ is the sort of software that you use at home and
school. Examples include word processors, spreadsheets, databases, desktop publishing packages, graphics
packages etc.
DIGITAL LITERACY----- 34
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
This type of software tries to be a ‗jack-of-all-trades’. It provides many features that the majority of users will
want e.g. formatting text, creating charts, organizing tables. But it does try to be‘ all things to all people‘ and so
there will be a vast number of features that you may never use e.g. statistical functions, mail merge. This makes
the storage size of these applications fairly large.
TurboTax (a tax preparation package) is a special purpose application. Sure, it adds and subtracts numbers
like a spreadsheet, but you can't use it to plan your monthly budget. It does only one thing - prepare tax returns.
Other examples of special purpose application software are web browsers, calculators, media players, calendar
programs etc. Again, make sure that you don't use brand names!
Communications software: Used to send messages and emails Example software: MS Outlook Express. MS
Messenger.
Desktop publishing programs: Used to combine and control graphics and text in a single document. Example
software: Adobe PageMaker. MS Publisher.
Web browser: Computer program that enables internet users to access, navigate, and search World Wide
Web sites. It is also called browser. Ex: Mozilla Firefox, Internet explorer, Opera, Google chrome
Enterprise Software: It deals with the needs of organization processes and data flow. Customer relationship
management or the financial processes in an organization are carried out with the help of enterprise software. Ex:
Sage Saari
DIGITAL LITERACY----- 35
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Multimedia Software: They allow users to create and play audio and video files. They are capable of playing
media files. Audio converters, audio players, burners, video encoders and decoders are some forms of multimedia
software. Examples of this type of software include Real Player and Windows Media Player.
C) Bespoke software
It is a type of software designed and developed by the company for its used specifically. It is also called ‗tailor-
made’. Bespoke application software is tailor made for a specific user and purpose. For example, a factory may
require software to run a robot to make cars; however, it is the only factory making that car in the world, so the
software required would have to be specially built for the task.
DIGITAL LITERACY----- 36
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
The freedom to run the program, for any purpose.
The freedom to study how the program works, and modify it. (Access to the source code is a precondition for this)
The freedom to redistribute copies.
The freedom to improve the program, and release the improvements to the public. (Access to the source code is a
precondition for this)
1. Freeware
This is a Copyrighted software given away for free by the author. Although it is available for free, the author
retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author.
Usually, the author allows people to use the software, but not sell it.
You are also free to distribute it to anyone you want, provided the distribution is an unmodified version of what you
downloaded from the provider‘s web site. In fact, they encourage you to distribute their Freeware. Freeware is
provided on an "as is" basis and no technical support is usually available.
2. Shareware
This may be copyrighted software, regularly in trial version, but generally the developer allows users to make copies
without an initial charge. However, if the user intends to use it beyond a brief tryout, the developer requests that the
program be paid for. A marketing method for software, whereby a trial version is distributed in advance and without
payment. A user tries out the program, and thus shareware has also been known as 'try before you buy', demoware,
trial ware and by many other names.
3. Cripple ware:
The shareware version of a program whose most advanced and most desirable features have been disabled with the
intention of increasing user‘s appetite for the better version. If the fee is paid, a code is acquired, which uncrippled
the program.
4. Nagware:
Nagware (also known as annoy ware) is a type of shareware, that reminds —or nags— the user to register it by
paying a fee. It usually does this by popping up a message when the user starts the program or, worse, intermittently
while the user is using the application. These messages can appear as windows obscuring part of the screen or
message boxes that can quickly be closed. Some nagware keeps the message up for a certain time period, forcing
the user to wait to continue to use the program.
5. Adware:
Advertising-supported software is any software package which automatically plays, displays, or downloads
advertising material to a computer after the software is installed on it or while the application is being used.
6. Liteware:
This is the free version of a program, that does not contain those features that are attractive to frequent or heavy
user.
7. Vapourware:
Vaporware (or vaporware) is software or hardware which is announced by a developer well in advance of release,
but which then fails to emerge, either with or without a protracted development cycle.
DIGITAL LITERACY----- 37
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
1. Custom Software:
Software that is developed for a specific user or organization is custom software. Since it is built for a specific user,
its specifications and features are in accordance with the user's needs.
2. Off-the-Shelf Software:
As opposed to custom software, off-the-shelf software is standard software bought off the shelf. It has predefined
specifications that may or may not cater to any specific user's requirements. When you buy it, you agree to its
license agreement.
4. Retail Software:
While shareware is provided as a trial version to users, retail software is sold to end users.
5. Firmware:
Firmware is a combination of software (generally, system software) permanently stored in the memory (hardware).
As the name suggests, it is a program or data that has been written onto the read-only memory (ROM). For example,
the BIOS (which is installed inside a computer on a chip) checks different parts of the system before loading the
operating system into the memory.
6. Live ware:
People who write programs, operate and maintain the computers are collectively known as live ware, human ware
or people ware; for example, programmers, system analysts and hardware engineers.
EXERCISES ON SOFTWARE
Exercise 1: State whether each of the following operations is carried out by the operating system or by an
application software
delete a file, format a disk, play a game, load from a disk, write a letter, enter a list of names, create
a new folder, print a file, draw a picture, double click the mouse button, select from a
menu, carry out a single field sort, get a directory listing, do a calculation, select QUIT.
Exercise 2: State whether the following task is carried out by a word processor, a spreadsheet, a database
or a graphic software
1) Typing articles for a club newsletter 5) Designing a business card for a small firm
2) Keeping track of income and expenditure in a 6) Typing a letter to members of a youth club
shop 7) Making changes to a photograph
3) Storing information about members of a youth 8) Creating a 'No Smoking' sign
club 9) Preparing the year accounts for a small
4) Analysing sales figures and trends in sales business
DIGITAL LITERACY----- 38
DIGITAL LITERACY SOFTWARE ENGINERING—J.BERI
10) Storing details of 500 CDs in a music 13) Recording details of products in a
collection supermarket
11) Drawing a map for a treasure hunt 14) Drawing a picture of a house
12) Preparing an essay for English class 15) Scanning a picture in a book
Exercise 3: A secondary school has been using several versions of office automation software packages
which consist of a word-processing software and spreadsheet software. This years the school plans to
upgrade the office automation software packages so as to increase the use of information technology in
teaching, to improve daily communication among its staff, and students and to computerize students'
attendance record system.
1. Name three additional types of software that should be included in this upgrade exercise. State one
corresponding application for each type of software.
2. The teacher makes use of an upgraded word-processing software to prepare a computer test paper in
school. However, he cannot open the document at home with its old version of word-processing
software. Explain why the teacher cannot open the document and suggest one method the teacher can
use to avoid the problem without any additional cost.
Vocabulary: To upgrade = to improve what was old or outdated. Upgrade a software implies adding
new functionalities.
Exercise 4
1. ‗Hardware is of no use without software and software cannot be used without hardware.‘ Explain.
2. What is the difference between an Open Source Software and a Freeware. Write one example of each.
Descriptions
Used to combine and control graphics and text in a single document
DIGITAL LITERACY----- 39
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
2. Describe how bespoke software is different from the normal software packages purchased in
shops.
3. Give a short description (or definition) of the following words or expressions (no more than 2
lines per word): Loader, Cripple ware, Open source software
A mobile network is a communications network that is spread out over an immense land area around the world
and connected wirelessly by transceivers at fixed locations that are known as cell sites, or base stations.
Transceivers communicate wirelessly based on the old principle of radio signals. Radio signals are electromagnetic
radiation that includes light and infrared waves. These signals are considered to be transverse waves in that they
have a frequency and a wavelength.
Wavelengths are measured in the distance between the peaks of sequential waves, and the frequency is the
number of cycles per second. To calculate the speed of a transverse wave, you multiply the wavelength and
the frequency.
A wireless network does not indicate a physical device. Wireless means having access to a wireless network such
as a local area network (LAN), wide area network (WAN), or a 4G/3G cellular network. You take what used to
connect through a router and cable and make that connection wireless. These types of networks still require some
DIGITAL LITERACY----- 40
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
type of physical hardware within close proximity to have a physical connection to a power supply and a router or
network node in order to communicate.
A wireless network provides a fixed or portable endpoint to gain access to a distributed network. A mobile network,
on the other hand, provides access to the distributed networks, through a portable device that allows you to travel
anywhere, as long as there is sufficient coverage.
Global System for Mobile Communication means that cellular phones connect to it by searching for cells in the
immediate vicinity. GSM phones may be identified by the presence of a Subscriber Identity Module (SIM), it
contains a user‘s subscription information, as well as some contact entries. This allows a user to switch devices
without needing to contact the service provider thus significantly reducing roaming costs while experiencing no
reductions in service. GSM supports voice calls and data transfer of up to 9.6kbps.
GSM, is the most-employed mobile standard in the world. Carriers who operate on the GSM network include AT&T
and T-Mobile. Other technologies included within the GSM standard are GPRS and EDGE, which offer speedier
data transfers on 2g networks. HSDPA, or High Speed Downlink Packet Access, is the 2g GSM network.
Code Division Multiple Access is a form of multiplexing, which allows numerous signals to occupy a single
transmission channel, optimizing the use of available bandwidth. CDMA consistently provides better capacity for
voice and data communications than other commercial mobile technologies, allowing more subscribers to connect
at any given time, and it is the common platform on which 3G technologies are built. Provides maximum data rates
up to 300 kbps. Because it offers higher data transmission rate than GSM and GPRS, It is more expensive.
Carriers that use CDMA networks include Verizon and Sprint Nextel. The Evolution Data Optimized, or EV-DO,
is the 3g CDMA standard.
DIGITAL LITERACY----- 41
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
4) EDGE (Enhanced Data for Global Evolution)
Enhanced Data for Global Evolution is an extension to the GSM/GPRS networks. EDGE supports peak
theoretical network data rates of 474 kbps, with average throughput of 70 to 130 kbps on both the downlink and the
uplink. The average rates are fast enough to support a wide range of data services, including streaming audio and
video, fast Internet access and large file downloads. EDGE is considered a pre-3G radio technology and which
can also can support Push-to-Talk (PTT) services.
5) Mobitex
It is originally designed for text pagers with 512 bytes of data transmission rate. In a Mobitex network, a radio base
station, with one or more switches (called MX switches), serves as the transmitter for each single cell (area of
coverage) of up to 30 km. The base stations, among them, provide an area of coverage and determine the network
capacity. Users of wireless devices, such as mobile phones and personal digital assistants (PDAs), communicate
through the base station nearest to them and can move freely from one cell to another.
Long Term Evolution, or LTE, is the next generation of cellular technology known as 4g. LTE and LTE Advanced
Networks will be utilized by both AT&T and Verizon.
WiMAX is the other competing 4g technology. It is the first 4g network to enter operation and is run by Sprint,
with the HTC Evo being their first 4g phone.
DIGITAL LITERACY----- 42
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
3. Smartphones
A smartphone is a more powerful version of a traditional cell phone. In addition to the same basic features—phone
calls, voicemail, text messaging—smartphones can connect to the Internet over Wi-Fi or a cellular network (which
requires purchasing a monthly data plan). This means you can use a smartphone for the same things you would
normally do on a computer, such as checking your email, browsing the Web, or shopping online.
Most smartphones use a touch-sensitive screen, meaning there isn't a physical keyboard on the device. Instead,
you'll type on a virtual keyboard and use your fingers to interact with the display. Other standard features include a
high-quality digital camera and the ability to play digital music and video files. For many people, a smartphone can
actually replace electronics like an old laptop, digital music player, and digital camera in the same device.
Brief History of OS
The first operating systems were developed in the 1950s, when computers could only run one program at a time.
Later in the following decades, computers began to include more and more software programs, sometimes called
libraries, that came together to create the start of today‘s operating systems.
In the late 1960s, the first version of the Unix operating system was developed. Written in programming language
C, and available for free during its early years. Unix easily adapted to the new systems and quickly achieved wide
acceptance.
Many modern operating systems, including Apple OS X and all different versions of Linux, date back or rely on
the Unix OS.
DIGITAL LITERACY----- 43
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Microsoft Windows was developed in response to an IBM request for an operating system to run its range of
personal computers or PCs.
The first operating system created by Microsoft was not called Windows, it was called MS-DOS and it was built in
1981 when it bought the 86-DOS operating system from Seattle Computer Products and modified it to meet
IBM requirements.
The Windows name was first used in 1985 when a graphical user interface was created and paired or joined with
the MS-DOS.
Today Apple, OS X, Microsoft Windows and the various forms of Linux (including Android) dominate the vast
majority of the modern operating systems market, as we saw earlier.to summarize, it can be said that:
Operating systems were first developed in the late 1950s to manage tape storage
The General Motors Research Lab implemented the first OS in the early 1950s for their IBM 701
In the mid-1960s, operating systems started to use disks
In the late 1960s, the first version of the Unix OS was developed
The first OS built by Microsoft was DOS. It was built in 1981 by purchasing the 86-DOS software from a Seattle
company
The present-day popular OS Windows first came to existence in 1985 when a GUI was created and paired with
MS-DOS.
DIGITAL LITERACY----- 44
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
A disk operating system is a computer operating system that resides on and can use a disk storage device, such as a
floppy disk, hard disk drive, or optical disc. A disk operating system must provide a file system for organizing,
reading, and writing files on the storage disk. The Microsoft Disk Operating System (MS-DOS) is an operating
system developed for PCs with x86 microprocessors. It is a command-line-based system, where all commands
are entered in text form and there is no graphical user interface. MS-DOS was the most commonly used member of
the family of disk operating systems.
2) Single-tasking and multi-tasking
A single-tasking system can only run one program at a time, while a multi-tasking operating system allows more
than one program to be running in concurrency.
3) Single user and multi-user
Single-user operating systems have no facilities to distinguish users, but may allow multiple programs to run
in tandem. A multi-user operating system extends the basic concept of multi-tasking with facilities that identify
processes and resources, such as disk space, belonging to multiple users, and the system permits multiple users to
interact with the system at the same time. Time-sharing operating systems schedule tasks for efficient use of the
system and may also include accounting software for cost allocation of processor time, mass
5) Real time OS
A real time operating system time interval to process and respond to inputs is very small. Examples: Military
Software Systems, Space Software Systems are the Real time OS example.
6) Distributed Operating System
Distributed systems use many processors located in different machines to provide very fast computation to its users.
7) Network Operating System
Network Operating System runs on a server. It provides the capability to serve to manage data, user, groups,
security, application, and other networking functions. storage, printing, and other resources to multiple users.
DIGITAL LITERACY----- 45
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
8) Embedded
Embedded operating systems are designed to be used in embedded computer systems. They are designed to
operate on small machines with less autonomy (e.g. PDAs). They are very compact and extremely efficient by
design, and are able to operate with a limited amount of resources. Windows CE and Minix 3 are some examples
of embedded operating systems.
9) Real-time
A real-time operating system is an operating system that guarantees to process events or data by a specific moment
in time. A real-time operating system may be single- or multi-tasking, but when multitasking, it uses specialized
scheduling algorithms so that a deterministic nature of behavior is achieved. Such an event-driven system switches
between tasks based on their priorities or external events, whereas time-sharing operating systems switch tasks
based on clock interrupts.
10) Library
A library operating system is one in which the services that a typical operating system provides, such as networking,
are provided in the form of libraries and composed with the application and configuration code to construct a uni-
kernel: a specialized, single address space, machine image that can be deployed to cloud or embedded
environments.
Advantage of using Operating System
Allows you to hide details of hardware by creating an abstraction
Easy to use with a GUI
Offers an environment in which a user may execute programs/applications
The operating system must make sure that the computer system convenient to use
Operating System acts as an intermediary among applications and the hardware components
It provides the computer system resources with easy to use format
Acts as an intermediator between all hardware‘s and software‘s of the system
DIGITAL LITERACY----- 46
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Features of Kennel
Low-level scheduling of processes
Inter-process communication
Process synchronization
Context switching
Types of Kernels
There are many types of kernels that exists, but among them, the two most popular kernels are:
1. Monolithic
A monolithic kernel is a single code or block of the program. It provides all the required services offered by the
operating system. It is a simplistic design which creates a distinct communication layer between the hardware and
software.
2. Microkernels
Microkernel manages all system resources. In this type of kernel, services are implemented in different address
space. The user services are stored in user address space, and kernel services are stored under kernel address space.
So, it helps to reduce the size of both the kernel and operating system.
The shell acts as an interface between the user and the kernel. When a user logs in, the login program checks the
username and password, and then starts another program called the shell. The shell is a command line interpreter
(CLI). It interprets the commands the user types in and arranges for them to be carried out. The commands are
themselves programs: when they terminate, the shell gives the user another prompt (% on our systems). The adept
user can customize his/her own shell, and users can use different shells on the same machine. Most accounts on
our clusters have the bash shell by default.
DIGITAL LITERACY----- 47
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Operating systems usually come pre-loaded on any computer you buy. Most people use the operating system that
comes with their computer, but it's possible to upgrade or even change operating systems. The three most common
operating systems for personal computers are Microsoft Windows, mac OS, and Linux. There are other different
types of operating systems, but either for bigger computers such as supercomputers, mainframes minicomputers or
mobile devices.
Modern operating systems use a graphical user interface, or GUI (pronounced gooey). A GUI lets you use your
mouse to click icons, buttons, and menus, and everything is clearly displayed on the screen using a combination
of graphics and text.
Each operating system's GUI has a different look and feel, so if you switch to a different operating system it may
seem unfamiliar at first. However, modern operating systems are designed to be easy to use, and most of the basic
principles are the same.
2) Microsoft Windows
Microsoft created the Windows operating system in the mid-1980s. There have been many different versions of
Windows, but the most recent ones are Windows 10 (released in 2015), Windows 8 (2012), Windows 7 (2009),
and Windows Vista (2007) etc. Windows comes pre-loaded on most new PCs, which helps to make it the most
popular operating system in the world.
Since 1985 Microsoft Windows has been in one form or another and remains the most common home and office
software operating system. The latest versions are also used in some devices, including Windows 10, and the OS is
also used on some internet and server computers. Windows may be used by machines from a variety of companies.
Windows ‗original versions worked with a previous Microsoft OS called MS-DOS modern interface on top of
traditional DOS text-driven commands. Microsoft Windows UI‘s signature features include windows themselves
– panel-screens that represent individual applications in a rectangular shape. The start menu of Windows helped
generations of users to find their programs and files.
DIGITAL LITERACY----- 48
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
According to Stat Counter Global Stats, Mac OS users account for less than 10% of global operating systems—
much lower than the percentage of Windows users (more than 80%). One reason for this is that Apple computers
tend to be more expensive. However, many people do prefer the look and feel of Mac OS over Windows.
3) Linux
Created by the Finnish programmer Linus Torvalds, Linux is today developed by programmer collaborators across
the world who submit tweaks to the central kernel software. Linux is popular with programmers and corporate
servers. It is available for free online.
Linux is a computer operating system which is similar to Unix built under the development and distribution model
of free and open-source software. Linux‘s popular feature is the Linux kernel, the first operating system kernel
released by Linus Torvalds on September 17, 1991. The operating system is loading itself into memory and begins
to control the computer‘s resources. After that, it offers certain tools for other applications that the client wants to
run. Most of the embedded systems run Linux today. Electronic gadgets such as internet router, washing machine,
TV, refrigerator, etc can be run on Linux. Hence Linux is also one of the most popular operating systems nowadays.
The advantages of Linux are that it is free, and there are many different distributions—or versions—you can
choose from.
4) UNIX
UNIX is an operating system which was first developed in the 1960s, and has been under constant development
ever since. By operating system, we mean the suite of programs which make the computer work. It is a stable,
multi-user, multi-tasking system for servers, desktops and laptops.
UNIX systems also have a Graphical User Interface (GUI) similar to Microsoft Windows which provides an easy
to use environment. However, knowledge of UNIX is required for operations which aren't covered by a graphical
program, or for when there is no windows interface available, for example, in a telnet session.
There are many different versions of UNIX, although they share common similarities. The most popular varieties
of UNIX are Sun Solaris, GNU/Linux, and Mac OS X. Linux in its turn is packaged in a form known as a Linux
distribution. There are several Linux distributions, both free and commercial.
5) UBUNTU
Ubuntu is a complete Linux operating system, freely available with both community and professional support. The
Ubuntu community is built on the ideas enshrined in the Ubuntu Manifesto: that software should be available free
of charge, that software tools should be usable by people in their local language and despite any disabilities, and
that people should have the freedom to customize and alter their software in whatever way they see fit.
6) FLORA etc.
DIGITAL LITERACY----- 49
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
DIGITAL LITERACY----- 50
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
1. File Management: This is process and act of creating an organized structure in which you store information for
easy retrieval. Basically, it means you store your work in a location where you know that you can find it again at
a later date if needed.
2. Drive: A drive is a computer storage device that holds information. It is the top-level location (or "Root"
directory) for file storage. Drives are usually designated with a letter such as C:\ (which is typically the hard drive
of the computer you are working on). Other examples of drives would be the network drive on campus (which is
the Z:\ drive) and external USB drives that you may use such as a Flash or Thumb Drive. The letters of these drives
vary depending on the computer that you are using.
3. File system: This is a sub-system of the operating system that provides services to users and applications in the
use of files. The file system consists of two distinct parts: a collection of files, each storing related data, and a
directory structure, which organizes and provides information about all the files in the system. A file system is
normally organized into directories for easy navigation and usage. These directories may contain files and other
directories. In respect to file management, the operating system performs the following activities;
Keeps track of information, location, uses, status etc. The collective facilities are often known as file system.
Decides who gets the resources (files).
Allocates the resources (files) to both programs and users.
De-allocates the resources (files) to both programs and users of the computer system.
4. A File: This is a named collection of related information that is recorded on secondary storage.
From user‘s perspective, a file is the smallest allotment of logical secondary storage, i.e. data cannot be written
to secondary storage unless they are within a file. Information stored in a file is defined by the creator of the file
and such information may be of different types, which may include, source or executable programs, numeric
or text data, music, videos, photos etc. Depending on the type of a file, files have certain defined structures.
For example:
A text file is sequence of characters organized into lines (and possibly pages).
DIGITAL LITERACY----- 51
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
A source file is a sequence of functions, each of which is further organized as declarations followed by executable
statements.
An executable file is a series of code sections that the loader can bring into memory and execute. The purpose of
file is to hold data required for providing information and therefore, files can be viewed as logical and physical
files.
A Logical file is a file viewed in terms of what data items its records contain and what processing operations may
be performed on the file.
A Physical file is a file viewed in terms of how the data is stored on storage device such as magnetic disc and
how processing operations are made possible.
5. File attributes: Each file is given a specific name and therefore, a file is referred to by its name. A name is usually
a string of characters, e.g., example.doc. Once a file is named, it becomes independent of the process, the user, and
even the system that created it. For example, one user might create a file example.doc and another user might edit
that file by specifying its name. The file owner might write the same file to a USB disk, copy it, send it across a
network and it could be still called example.doc on the destination system.
File attributes vary from one operating system to another but typically a file consists:
Name: the symbolic file name is the only information kept in human readable form. Identifier: this unique tag,
usually a number, identifies the file within the file system; it‘s a non-human readable name of file.
Type: this information is needed for systems that support different types of files.
Location: this information is a pointer to a device and to the location of the file on that device.
Size: the current size of the file (in bytes, words, or blocks) and possibly the maximum allowed size are included
in this attribute.
Protection: access-control information determines who can do reading, writing, executing, and so on.
Time, date and user identification: this information may be kept for creation, last modification and last use.
These data can be useful for protection, security and usage monitoring.
6. File Access Methods: When the information stored in file is used, that information must be accessed and read into
computer memory. There are several ways for accessing this information and choosing the right method for a
particular application poses the major design problem:
1. Sequential access This is the simplest access method in which, information in the file is processed in order, one
record after the other. This method of access is by far the most common. For example, editors and compilers usually
access files in this fashion.
2. Indexed sequential access This mechanism is built upon the base of sequential access. An index is created for
each file. Index contains pointer to a block. To find a record in the file, the index is first searched and then the
DIGITAL LITERACY----- 52
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
pointer is used to access the file directly and to find the desired record. NB: index is searched sequentially and its
pointer is used to access the file directly.
3. Direct access This method is also referred to as relative access. In this method, a file is made up of fixed-length
logical records that allow programs to read and write records rapidly in no particular order. A file is viewed as a
numbered sequence of blocks or records. As a result, there are no restrictions on the order of reading or writing for
this method of access. Direct access files are of great use for immediate access to large amounts of information. A
good example is a database in which, when a query concerning a particular subject arrives, the block containing the
answer is computed and then that block is read directly to provide the desired information.
7. Directory structure organization There are typically thousands, millions, and even billions of files within a
computer which are stored on random access storage devices. Files are usually segregated into groups which are
easier to manage and act upon. This organization involves the use of directories. A directory contains a set of files
or subdirectories. In modern operating systems, directories are tree- structured which allow users to create their own
subdirectories and to organize their files accordingly. In this tree structure, the tree has a root directory and every
file in the system has a unique path name.
In normal use, each process has a current directory, i.e. the directory containing most of the files that are of current
interest to the process. When reference is made to a file, the current
directory is searched. If a needed file is not in the current directory, then the user must either specify a path name
or change the current directory to be the directory holding that file. Path names can be of two types:
Absolute and relative. An absolute path name begins at the root and follows a path down to the specified file,
giving the directory names on the path. A relative path name defines a path from the current directory.
The two key components of File Management that must be mastered are:
1. Having an Understanding of the "Big Picture" of File Management and...
2. Mastering the specific "how-to's" of carrying out the Management of Your Files
How Do I Determine the Structure of My File Management System?
Planning out and thinking about how you want to organize your files is probably the most important step of File
Management and is really no different than the planning process that is used when setting up a physical file cabinet.
If you think about a file cabinet, the typical components you might find these:
1. The Cabinet
2. Hanging File Folders
3. Manilla Folders
The Cabinet is the main housing structure for everything you are filing.
The Hanging File Folders group items in the cabinet based on broad categories.
DIGITAL LITERACY----- 53
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Finally, the Manilla Folders are used and kept within the Hanging file folders to house items of an even
more specific nature.
For example, you may want to organize your pile of paperwork at home into a logical structure within a file cabinet.
One category of paper that you have are your bills. Another category you need to file are your bank statements.
To the left is a graphical representation of how you could organize these items. The structure contains two hanging
file folders -- one for bills and one for bank statements. To further organize your bills, you have chosen to insert
two manilla folders, one for each type of bill that you pay. Doing this will make it easier to find a particular bill in
the future.
How Does This Apply to Files on My Computer?
The same file management principles apply to the electronic files stored on your computer. In the previous
document, we learned the terms drive, folder and file. Here, we will use our previous illustration regarding the file
cabinet and our paperwork and see what the same management structure would look like electronically. In other
words, we are going to be "filing" our e-bills, and e-statements on our computer rather than in a physical file cabinet.
On your USB drive, you should create a folder called cas111d. On your storage device (either USB or hard drive),
create a NEW FOLDER titled cas111d. Inside this folder, create the following subfolders:
Name your files with short, memorable names so that if you have to tell someone an address that includes a file
name, it will be easy to remember. Also, keep all your file and folder names in lower case with no spaces.
INSTRUCTION NOTE:
Avoid mixed case or upper case letters in all file and folder names used on the Web. Upper case letters are frequently
seen as different letters than their lower case counterparts in most operating systems.
This has major implications when you tell someone a Web address. For example, if you say an address that includes
a page name, like; www.whatever.com/WhateverPage.html. you will then have to explain which letters in the
page name are also upper case so it doesn't generate an error in their browser when they type it in. This makes it
much harder to remember the address.
DIGITAL LITERACY----- 54
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
File Management Goodness
To be established properly files and folders should contain names that are in all lower case with no spaces.
Underscores can be used, but avoid unusual characters and extra periods or punctuation in file and folder names. It
is preferable to use dashes instead of underscores in most cases when you are trying to improve your search engine
ranking.
File management chaos is a disease which can infect even the most knowledgeable computer user. Don't let it infect
you.
I. Maintenance
Computer maintenance is the practice of keeping computers in a good state of repair. A computer containing
accumulated dust and debris may not run properly.
DIGITAL LITERACY----- 55
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
every computer requires regular service maintenance to keep the big problems away and maintain optimal
performance.
The only really effective form of backup is one that happens with no user input; it must be automatic with no need
to remember to initiate the backup.
Be sure to back up all your personal and business data on a regular basis. Using an external hard drive (connected
via USB, cloud computers etc) is usually the best way of backup.
There are also online backup systems that provide space to store your backup files using the Internet. iCloud is a
cloud storage and cloud computing service from Apple launched in 2011. As of January 2013, the service has more
than 250 million users. The service allows users to store data on remote computer servers for download to multiple
devices such phones, tablets and personal computers. It also acts as a data-syncing center for email, contacts,
calendars, bookmarks, notes, reminders (to-do lists), documents, photos and other data.
Dropbox is another free service that allows users to save copies of their files on online servers for backup purposes,
or to be able to share files easily with other computers connected to the Internet.
DIGITAL LITERACY----- 56
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Updating Software is very important to update your software regularly. When a program is released, particularly
Internet browsers, it may contain flaws (bugs). These bugs may be invisible to the user, however wrongdoers will
exploit these flaws for their own use. Ensuring your software is up to date is a very important step in keeping your
computer secure.
DIGITAL LITERACY----- 57
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
For individual home users, the most popular firewall choice is a software firewall (both Windows and Macintosh
operating system software include a software firewall). A good software firewall will protect your computer from
outside attempts to control or gain access your computer.
It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but
when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will
add some extra security and protection for your computer or network.
DIGITAL LITERACY----- 58
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is usually a small piece of data sent
from a website and stored in a user‘s web browser while a user is browsing a website. When the user browses the
same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the
user‘s previous activity. Cookies were designed to be a reliable mechanism for websites to remember the state of
the website or activity the user had taken in the past. Cookies perform essential functions in the modern Web,
including authentication cookies to verify a user‘s identity and if they are logged in.
Although cookies cannot carry viruses, and cannot install malware on the host computer, tracking cookies and
especially third-party tracking cookies are commonly used as ways to compile long-term records of individuals‘
browsing histories — a major privacy concern that prompted European and US law makers to take action in 2011.
3. Passwords
A password is a secret word or string of characters that is used for user authentication to prove identity, or to gain
access. A typical computer user has passwords for many purposes: logging in to accounts, retrieving e-mail,
accessing applications, databases, networks, web sites, and even reading the morning newspaper online.
Most organizations specify a password policy that sets requirements for the composition and usage of passwords,
typically dictating minimum length, required categories (e.g. upper and lower case, numbers, special characters),
and prohibited elements (e.g. own name, D.O.B., address, telephone number, etc.).
Passwords are the most common form of security, but they are really not very secure. How do our online passwords
fall? In every imaginable way: They‘re guessed, hacked from website‘s database, cracked by brute force, stolen
with a key logger, or reset completely by conning a company‘s customer support department.
Reuse passwords on different sites. If you do, a hacker who gets just one of your accounts will own them
all.
Use a dictionary word as your password. If you must, then string several together into a pass phrase.
Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now
have those built in.
Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like
“h6!r$q” are quickly crackable. Your best defense is the longest possible password.
But here‘s the problem: the more services used = more passwords needed = more user trouble in remembering all
those difficult passwords! Security and practicality are in conflict. Obviously, we need something that is both secure
and which we can remember. Using meaningless sequences of letters, numbers, and characters is more secure but
not practical.
DIGITAL LITERACY----- 59
DIGITAL LITERACY SOFTWARE ENGINERING—IUGET
Summary Advice for maintaining computer security.
Always make sure your firewall is turned on. Update computer operating systems as necessary. With Microsoft or
Apple, this can happen automatically if you enable it.
Use complex passwords. Don‘t make it easy for hackers to guess passwords you might pick. Install a filter designed
to ensure that the emails that get into your computer don‘t intend you any malice.
Use anti-malware and anti-virus programs, but don‘t rely on any one solely.
Avoid pirated software, which is not only illegal but can't be upgraded and offers no support.
Be especially wary of unsecured Wi-Fi sites. Save sensitive transactions for home, office or places where you know
your computer is protected. You don‘t have to make financial transactions, for example, in a restaurant or café.
Don‘t disclose sensitive information online. Phishing attacks are the computer equivalent of someone contacting
you by phone purporting to represent your credit union and asking for key data, such as your Social Security number.
That is something your credit union would never do. Nor would it do the same thing by computer. Always have the
antennae up for suspicious behavior such as this. If you receive this kind of request by email and wonder if it has
any credibility, call the credit union or whoever is initiating the contact and ask. Don‘t click onto a link in the email.
Turn your computer off when you‘re done.
Cloud computing is Internet-based computing, whereby shared resources, software, and information are
provided to computers and other devices on demand, like the electricity grid.
A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized
computers that are dynamically provisioned and presented as one or more unified computing resources based on
service-level agreements established through negotiation between the service provider and consumers.
DIGITAL LITERACY----- 60
Properties & Characteristics
Fault tolerance: A process that permits a software to response to responds to a fault in a software or
hardware and still continue to operate without failure.
System resilience: The ability to recover quickly and continue operating normally after the failure.
And system security: The act of being free from online danger around the system.
DIGITAL LITERACY----- 61
4) Accessibility and portability
Activities in cloud computing are;
Uniformly accessed: that is whether implemented or not, all services in cloud computing are uniformly
available.
Thin client: Computers are using resources housed inside a cloud computing server, as opposed to the hard
drive where most of the resources are found on the environmental host.
The capability provided to the consumer is to provision processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications.
Application Deployment (also referred to as Software Deployment) is the process of installing, configuring,
and enabling a specific application or set of applications, usually through an application manager (app
manager) or software management system, to a specific URL on a server. That is, the completion of software
and complete delivery to end users.
Examples: Microsoft Windows Azure, Google App Engine, Hadoop (High Availability Distributed
Object Oriented Platform) … etc.
DIGITAL LITERACY----- 62
C. Software as a Service (SaaS)
The capability provided to the consumer is to use the provider‘s applications running on a cloud infrastructure.
The applications are accessible from various client devices through a thin client interface such as a web
browser (e.g., web-based email).
The consumer does not manage or control the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application capabilities, with the possible exception of limited
user-specific application configuration settings.
Examples : Google Apps (e.g., Gmail, Google Docs, Google sites, …etc)
Cloud deployment models indicate how the cloud services are made available to users. The four deployment models
associated with cloud computing are as follows:
1. Public cloud:
As the name suggests, this type of cloud deployment model supports all users who want to make use of a computing
resource, such as hardware (OS, CPU, memory, storage) or software (application server, database) on a subscription
basis. Most common uses of public clouds are for application development and testing, non-mission-critical tasks
such as file-sharing, and e-mail service.
With public clouds, the cost is typically low for the end user and there is no capital expenditure involved.
2. Private cloud:
True to its name, a private cloud is typically infrastructure used by a single organization. Such infrastructure may be
managed by the organization itself to support various user groups, or it could be managed by a service provider that
takes care of it either on-site or off-site. Private clouds are more expensive than public clouds due to the capital
expenditure involved in acquiring and maintaining them. However, private clouds are better able to address the
security and privacy concerns of organizations today.
Use of private clouds involves capital expenditure, but the expenditure is still lower than the cost of owning and
operating the infrastructure due to private clouds' greater level of consolidation and resource pooling. Private clouds
also offer more security and compliance support than public clouds. As such, some organizations may choose to use
private clouds for their more mission-critical, secure applications and public clouds for basic tasks such as application
development and testing environments, and e-mail services.
DIGITAL LITERACY----- 63
3. Hybrid cloud:
In a hybrid cloud, an organization makes use of interconnected private and public cloud infrastructure. Many
organizations make use of this model when they need to scale up their IT infrastructure rapidly, such as when
leveraging public clouds to supplement the capacity available within a private cloud. For example, if an online retailer
needs more computing resources to run its Web applications during the holiday season it may attain those resources
via public clouds.
4. Community cloud:
This deployment model supports multiple organizations sharing computing resources that are part of a community;
examples include universities cooperating in certain areas of research, or police departments within a county or state
sharing computing resources. Access to a community cloud environment is typically restricted to the members of the
community.
TIP
Using hypervisor-based virtualization software to provide isolation between different customer environments can
lead to increased utilization of system resources such as CPU and memory. Using native virtualization
technologies offered by hardware vendors, such as Solaris Zones when using the Oracle Solaris operating system,
can be much more effective and efficient depending on the customer environment. Native virtualization technologies
offered by hardware vendors are more restrictive in terms of what is supported than hypervisor-based virtualization
software.
Change Control
Changes to an operational environment are inevitable as a system undergoes routine maintenance. However, some
changes may cause significant impacts to the security posture of the cloud service.63 Therefore, the CSP is
required to report ―changes in the CSP‘s point of contact with FedRAMP, changes in the CSP‘s risk posture, changes
to any applications residing on the cloud system, and/or changes to the cloud system infrastructure‖ and submit any
residual artifacts associated with significant changes such as the SSP, security impacts analysis, and a re-assessment
by a 3PAO to the FedRAMP PMO.
DIGITAL LITERACY----- 64
Cloud Logging
▪ SIEM in the cloud: MSSPs have supported this model for years. Traditional Shrink-wrapped SIEM vendors are
starting to realize the value in this model and are scrambling to build cloud capabilities and offerings into their
products.
▪ Security concerns: Be sure you understand how the provider approaches IT security. Also, make sure you
understand your responsibility when it comes to legislative and regulatory compliance when operating in a cloud
environment.
DIGITAL LITERACY----- 65
And if any of the raw numbers you put into your spreadsheet should change – like if you obtain final figures to
substitute for preliminary ones for example – the spreadsheet will update all the calculations you‘ve performed based
on the new numbers. Examples includes; MS Excel, Lotus1-2-3 etc. (Go to practical for details).
LESSON 1: INTERNET
The simplest definition of the Internet is that it's a network of computer networks. The Internet is a vast
network that connects computers all over the world. Through the Internet, millions of computer are
connected all over the world by people to share information and communicate from anywhere.
Header Sequence ID
Provides the complete destination ID‘s where the information belongs in
address for the packet. relation to the rest of the information.
End of Message
ID‘s the end of the packet
Data Block
The portion of the overall
information carried by the packet.
DIGITAL LITERACY----- 66
When you connect to a Web site through an ISP and start exchanging information, there isn't a fixed
connection between your computer and the Web server computer hosting the Web site. Instead, information
is exchanged using the best possible path at that particular time. Special computers called routers determine
these paths, avoiding slow links and favoring fast ones.
1. Access
Access rests on a dynamic and social process, not a one-off act of provision. Once initial access is established,
developing literacy leads users to alter significantly and continually the conditions of access (updating, upgrading and
extending hardware and software applications). Problematically, given socio-demographic inequalities in material,
social and symbolic resources, inequalities in access to online knowledge, communication and participation will
continue.
2. Analysis
People‘s engagement with both print and audiovisual media has been shown to rely on a range of analytic
competencies. In the audiovisual domain these include an understanding of the agency, categories, technologies,
languages, representations and audiences for media.
At present, not only is a parallel account of internet-related analytic skills highly underdeveloped but the public has
yet to develop such skills and so to make the most of online opportunities.
DIGITAL LITERACY----- 67
3. Evaluation
There is little point in access or analysis without judgement, but a stress on evaluation raises, rightly, some difficult
policy questions when specifying and legitimating appropriate bases of critical literacy – aesthetic, political,
ideological and/or economic. The scope and purpose of evaluation is also disputed: is media literacy intended to
promote a democratized, diverse, anti-elitist approach to online representations or should it underpin a more traditional,
hierarchical discrimination of good from bad, authoritative from unauthorized, information and communication?
4. Content creation
Although not all definitions of media literacy include the requirement to create, to produce symbolic texts, it is argued
first, that people attain a deeper understanding of the conventions and merits of professionally produced material if
they have direct experience of content production and second, that the internet par excellence is a medium which offers
hitherto unimagined opportunities for ordinary people to create online content. To exclude this from a definition of
media literacy would be to greatly under-utilized the potential of the internet for the public.
Children
In relation to children, a population of specific concern, their evident expertise in relation to the internet may often
exceed that of their parents. However, it is considerably less strong in relation to evaluation skills and content creation
skills. Thus children and young people are much better at accessing and finding things on the internet than they in
relation to other aspects of media literacy. Thus they are as yet insufficiently competent at judging the merits
of information they find, at avoiding some of the risks posed to them by the internet, and at contributing actively
themselves to content or participatory fora online.
Issues to be addressed
Having advocated this skills-based approach to media literacy in relation to the internet, there are some outstanding
issues for new media literacy, crucial to any policy of promoting media literacy among the population.
DIGITAL LITERACY----- 68
Public understanding of science: The public understanding of science model is a sizeable research program used
specifically to evaluate adults‘ knowledge of science. Since it seems that OFCOM will be required to promote adults‘
understanding of the systems and processes by which electronic media are made available, regulated and received, the
survey methods established to measure aspects of public understanding and knowledge in the scientific domain may
provide an appropriate methodology.
Print literacy: Measurement of print literacy among the adult population has a long history (with the most recent
OECD figures showing "between one-quarter and three-quarters of adults fail to attain literacy level 3, considered by
experts as a suitable minimum level skill for coping with the demands of modern life and work"; OECD, 2000). This
model would suggest extending the measurement of print literacy to include audiovisual and screen-based media.
Health promotion: Public communication to improve health-related practices (eg the safe sex campaign, the anti-
smoking campaign) seek to evaluate public knowledge and understanding following a particular campaign. Assuming
OFCOM engages in specific activities – including information campaigns - to promote media literacy, parallel methods
could be employed to evaluate take-up of the messages thereby promoted across different sectors of the population.
DIGITAL LITERACY----- 69
types of instant messaging like SMS and web chats. Even blogs, podcasts, and videos are considered forms of digital
communication.
The conventional or traditional methods of communication used analog signals for long distance
communications, which suffer from many losses such as distortion, interference, and other losses
including security breach.
In order to overcome these problems, the signals are digitized using different techniques. The digitized
signals allow the communication to be more clear and accurate without losses.
The following figure indicates the difference between analog and digital signals. The digital signals consist
of 1s and 0s which indicate High and Low values respectively.
Source
The source can be an analog signal. Example: A Sound signal
DIGITAL LITERACY----- 70
Input Transducer
This is a transducer which takes a physical input and converts it to an electrical signal (Example: microphone). This
block also consists of an analog to digital converter where a digital signal is needed for further processes.
A digital signal is generally represented by a binary sequence.
Source Encoder
The source encoder compresses the data into minimum number of bits. This process helps in effective utilization of
the bandwidth. It removes the redundant bits unnecessaryexcessbits,i.e.,zeroesunnecessaryexcessbits,i.e.,zeroes.
Channel Encoder
The channel encoder, does the coding for error correction. During the transmission of the signal, due to the noise in
the channel, the signal may get altered and hence to avoid this, the channel encoder adds some redundant bits to the
transmitted data. These are the error correcting bits.
Digital Modulator
The signal to be transmitted is modulated here by a carrier. The signal is also converted to analog from the digital
sequence, in order to make it travel through the channel or medium.
Channel
The channel or a medium, allows the analog signal to transmit from the transmitter end to the receiver end.
Digital Demodulator
This is the first step at the receiver end. The received signal is demodulated as well as converted again from analog
to digital. The signal gets reconstructed here.
Channel Decoder
The channel decoder, after detecting the sequence, does some error corrections. The distortions which might occur
during the transmission, are corrected by adding some redundant bits. This addition of bits helps in the complete
recovery of the original signal.
Source Decoder
The resultant signal is once again digitized by sampling and quantizing so that the pure digital output is obtained
without the loss of information. The source decoder recreates the source output.
Output Transducer
This is the last block which converts the signal into the original physical form, which was at the input of the
transmitter. It converts the electrical signal into physical output (Example: loud speaker).
Output Signal
This is the output which is produced after the whole process. Example − The sound signal received.
This unit has dealt with the introduction, the digitization of signals, the advantages and the elements of digital
communications. In the coming chapters, we will learn about the concepts of Digital communications, in
detail.
DIGITAL LITERACY----- 71
Essential Digital Communication Channels for Business
A) Social Media
Social media are internet based platforms and applications that enable users to create and share content or to
participate in social networking. Social media marketing is the use of social media platforms to connect with your
audience to build your brand, increase sales, and drive website traffic.72% of U.S. adults use social media, with
Facebook, YouTube, Twitter, Instagram, and LinkedIn being the most popular platforms. Social media allows
people worldwide to connect with friends, family, celebrities, and brands through bite-sized textual and visual
content. Social media is the top-ranked channel for connecting with customers, and 57% of customers will increase
their spending if they feel connected to a brand. Some common examples of social medial include: YouTube,
Facebook, Instagram, Twitter, WhatsApp etc
B) Email Marketing
Emails are messages distributed by electronic means from one computer user to one or more recipients via a
network. Email marketing is the use of email within your marketing efforts to promote a business's products and
services, as well as incentivize customer loyalty. Email marketing is a form of marketing that can make the
customers on your email list aware of new products, discounts, and other services.
Email is the currency of the web, and anybody online has an active email address. And when it comes to
conversions, there isn‘t a more powerful channel than email. The average click-through rate of an email campaign is
around 3% of total recipients, whereas the average click-through rate from a tweet is around 0.5%.
This means you are 6x more likely to get someone to click through to your website via email than you are from
Twitter.
C) Blogs
A blog a regularly updated website or web page, typically one run by an individual or small group, that is written
in an informal or conversational style. It is possible to build a cycle of publications with blogs and create new ways
of approaching your audience. The idea of the blog is to expose your knowledge showing not only the subject in
which you have recognized authority but also covering general topics of interest to your audience.
It is crucial to keep the blog constantly updated. In this way, you create a dynamic since your audience knows that
you will always publish texts. That increases your visibility, loyalty to your visitors and conquers the confidence of
your client.
D) Websites
A website is a set of related web pages located under a single domain name, typically produced by a single
person or organization. And 69% of Americans have purchased an item from the website. Information, products and
servi8ces are disposed on websites.
E) Videos
Nowadays, videos aren‘t only used to entertain or promote products and services. They are produced and also used
for didactical and educational purposes.
Your audience needs to have an authentic experience that is interesting to guide them to the video‘s primary
objective, which is either selling or informing something.
DIGITAL LITERACY----- 72
In addition to being fast and attractive, this type of content facilitates the understanding of the message.
F) Phone calls
One of the most common communication channels in business is a phone call. A quick phone call can clear up
confusion or convey new information across long distances, and conference calls can allow multiple people to take
part and elaborate on their perspectives
DIGITAL LITERACY----- 73
LESSON 4: UNDERSTANDING EMAILS
Introduction to Email
Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
started, you'll see that with a little bit of practice, email is easy to understand and use.
In this lesson, you will learn what email is, how it compares to traditional mail, and how email addresses are
written. The various types of email providers and the features and tools they include with an email account will be
highlighted here too.
Advantages of Email
1) Privacy: Your email is delivered to your own personal and private account with a password required to
access and view emails.
2) Communication with multiple people: You can send an email to multiple people at once, giving you the
option to include as few as or as many people as you want in a conversation.
3) Accessible anywhere at any time: You don‘t have to be at home to get your mail. You can access it from
any computer or mobile device that has an Internet connection.
4) Productivity tools: Email is usually packaged with a calendar, address book, instant messaging, and more
for convenience and productivity.
5) Access to web services: If you want to sign up for an account like Facebook or order products from services
like Amazon, you will need an email address so you can be safely identified and contacted.
6) Easy mail management: Email service providers have tools that allow you to file, label, prioritize, find, group,
and filter your emails for easy management. You can even easily control spam, or junk email.
DIGITAL LITERACY----- 74
The domain name is (.com) which is the field under which the account is dealing with. some example of
domain names includes: .com, .org, .net, .cm, .edu etc
Webmail providers
Today, the top three webmail providers are Yahoo!, Microsoft's Outlook.com (previously Hotmail), and Google's
Gmail. These providers are popular because they allow you to access your email account from anywhere with an
Internet connection. You can also access webmail on your mobile device.
Visit the links below to compare the features of the three top webmail providers:
DIGITAL LITERACY----- 75
Email Etiquette and Safety
Introduction
Like any form of online communication, it's important to practice good etiquette and safety when using email.
Etiquette is a set of rules and guidelines that people use to communicate more effectively. You should also know
how to protect yourself from certain risks, like malware and phishing.
In this lesson, we'll discuss how to write good email etiquette, both for personal use and in the workplace, different
strategies for using email safely.
DIGITAL LITERACY----- 76
EMAIL SAFETY
Email is not totally secure, so you should avoid sending sensitive information like credit card numbers, passwords, and
your Social Security Number. In addition, you may receive emails from scammers and cybercriminals. The first step
in dealing with email safety concerns is understanding them so you know what to look for:
a) Spam: Spam is another term for junk email or unwanted email advertisements. It's best to ignore or delete these
messages. Luckily, most email services offer some protection, including spam filtering.
b) Phishing: Certain emails pretend to be from a bank or trusted source in order to steal your personal information.
It's easy for someone to create an email that looks like it's from a specific business. Be especially cautious of any
emails requesting an urgent response.
c) Attachments: Some email attachments can contain viruses and other malware. It's generally safest not to open any
attachment you weren't expecting. If a friend sends you an attachment, you may want to ask if he or she meant to
send it before downloading.
Spam filters
Whenever you receive an email, most email providers will check to see if it's a real message or spam. Any likely
spam messages will be placed in the spam folder so you don‘t accidentally open them when checking your email.
Spam-blocking systems aren‘t perfect, though, and there may be times when legitimate emails end up in your spam
folder. We recommend checking your spam folder regularly to make sure you aren‘t missing any important emails.
Many email services also have a feature you can use to mark emails as spam. In Gmail, for example, you can
select the message and click the Mark as Spam button. This helps your email provider filter out these types of
messages in the future.
DIGITAL LITERACY----- 77
Other common email scams
Spam and phishing are common problems, but there are many other types of email scams you may encounter. Some
will promise to give you a lot of money if you advance a small amount upfront. Others may pretend to be from people
you know in real life, and they'll often ask you to send money or download an attached file. As with spam and phishing
scams, remember to trust your best judgement:
You should never send someone money just because you've received an email request.
You should also never download email attachments you weren't expecting because they might contain malware that
could damage your computer and steal your personal information. Spam, scams, and phishing schemes will continue
to evolve and change. But now that you know what to look for and what to avoid—you can keep your inbox and
computer that much safer.
I. CONTACTS BASICS
Online contacts lists help you organize contact information for your friends, family, and coworkers, just like an
address book. Once people are added to your contacts list, it's easy to access their information anytime and
anywhere.
Adding contacts
It's easy to add people to your contacts list. When you create a new contact, you should (at the very least) enter a
first and last name, as well as an email address. However, you can also enter other information, like a phone
number, home address, and more. In most email accounts, the name and email of anyone you correspond with
will be added to your contacts list automatically.
Selecting contacts
Once you've added people to your contacts list, you'll never have to worry about remembering an email address.
Whenever you create a new email, you can select to add Recipients button.
Then choose recipients from your contacts list. The contacts' email addresses will be added automatically to the
message. You'll even be able to use the same contact information for other webmail services, like instant messaging
and calendar sharing. Most email services will also autocomplete or suggest an email address when you start typing,
as long as it's an address that's already been saved in your contacts.
DIGITAL LITERACY----- 78
Linking contacts
If you already have a lot of contacts saved in another web-based service, such as Facebook or LinkedIn, it's easy
to link them between accounts, which can save you a lot of time. For example, you could import your Facebook
contacts to your webmail service or use your existing contacts list to search for friends on Facebook.
Contact groups
If you frequently connect with the same group of people, you can create contact groups for quick access. This
allows you to quickly sort your contacts by type. For example, you might use one group to organize your personal
contacts and another for professional contacts.
DIGITAL LITERACY----- 79
LESSON 6: LIFE ONLINE
Introduction: Digital Footprints
The scientific and public policy relevance of the digital divide is based on the assumption that those who are able to
effectively use the Internet might increase their social, economic, cultural, and human capital, and this could exacerbate
social inequalities. But individuals‘ digital footprints, the sum of their digitally traceable behavior and online
presence—can also lead to beneficial and adverse outcomes, short-term or long-term, individual or societal.
What users do online matters; however, what is online about them also has consequences. Digital footprints entail
results both in the sense of immediate gratifications (e.g., enjoyment) and of outcomes (e.g., finding a job). This
study should consider how online traces and their consequences vary according to socio-demographic variables and
traditional markers of inequalities. From this premise, we develop the concept of ―digital footprint gap,” which
suggest viable methods to investigate it, and reflect on action plans that could connect research, policy, and practice.
Digital footprints are not only the product of active participation through content production and sharing, but also of
―passive participation‖. This includes low-involvement forms of participation, algorithmically generated data, and
information made available by other users. Social media platforms afford many simple user actions, such as liking,
favoring, following, or commenting, which are not necessarily considered active participation, but nonetheless
contribute to a digital footprint.
Platforms and online services even generate data without active user involvement. Just turning on an Internet-enabled
device means that an IP address is revealed; clicking a like button is not only a social signal to another userbut also
informs the platform‘s advertising profiles; and publishing a blog post is not only a service to its readers but also
influences search engine indexing.
Finally, Internet users can ―be participated‖ without their knowledge or against their will. Examples include tagging,
endorsements, ratings, and comments on the visible end of the spectrum, searches (e.g., googling someone) and various
automated data analyses on the less visible end. With the increasing pervasiveness of networked technology (e.g.,
Internet of Things, social robotics) we expect such passive participation to increase.
The term describes differences in the amount of online traces between individuals or population groups.
We extend this concept, considering not only the quantity, but also the quality and, most importantly, the implications
of online traces. How are users with different socio-economic backgrounds aware of and able to manage their
footprints? Do the outcomes of quantitatively and qualitatively varying digital footprints exacerbate inequalities?
Despite the prominence of privacy as a research topic, little scholars use a digital inequalities perspective to study
digital footprints.
The literature on inequalities in online content creation has shown that age is a decisive factor, with young users
creating more online content than older adults.
Socio-economic status and gender effects are less clear for online participation and it is important to differentiate types
of online content produced. However, such findings do not necessarily apply to the digital footprint gap. For example,
can we assume that because young users create more content online than older users they are also better represented in
big data?
Analysis of digital footprint gaps needs to consider not only active online participation, but also low-involvement
forms, algorithmically generated data, and data posted by other users.
DIGITAL LITERACY----- 80
Research and Policy Recommendations
Future research investigating digital footprint gaps should combine different methodological approaches. While big
data analyses offer benefits compared with self-reported data, disadvantages of digital traces include
overrepresentation of certain sources due to data accessibility (e.g., Twitter API), noise (e.g., through bots),
engagement invisible to machines (e.g., sub tweeting), and neglect of human self-awareness as well as the
ecological context (Tufekci, 2014).
When broader representativeness is important, most digital trace data is inadequate and traditional social science
methods are better suited.
Representative surveys could measure digital skills related to platform algorithms and privacy settings.
Qualitative interviews combined with social media profile analysis could also be a valuable method interviews,
respondents could discuss content they have posted, but also what has been posted by others (comments, likes,
retweets), as well as by the platform itself (a news item in the feed).
Moreover, interviews could be enriched by search engine use so that respondents could look for their digital traces and
discuss the results with the interviewer.
Finally, interviews with social groups particularly affected by digital traces could investigate how digital footprints
gaps are perceived and enacted. Young users and micro-celebrities (e.g., Instagram influencers) would be groups to
scrutinize. Such actor-focused methods could inform ―social analytics,‖ i.e., how users make sense of their own digital
footprints or how they ―reflect upon, and adjust, their online presence and the actions that feed into it, through the
use of analytics‖.
Beyond this, media content analyses of negative passive participation, for example in the form of doxing and online
harassment, could help case study selection. Finally, digital methods and software studies could offer useful insights
to understand how platforms generate data and the implications for digital inequalities.
Although the concept of the digital footprint gap has not been thoroughly investigated, the right to be forgotten
currently presents a way for individuals to control (access to) their footprints.
DIGITAL LITERACY----- 81