Introduction to Computers
Introduction to Computers
1. What is Computer?
Defining the word Computer, you might have more than ten definitions depend on
how this computer is used and where this computer is used. But for our level we can
use the following general definition;-
“Data” is nothing but a mare collection of basic facts and figure without any
sequence. When the data is collected as facts and figure, it has no meaning at
that time, for example, name of student, names of employees etc.
PROCESSING
‘Processing’ is the set of instruction given by the user or the related data to
output the meaningful information. Which can be used by the user? The work
of processing may be the calculation, comparisons or the decision taken by the
computer.
it is called information
INFORMATION
‘Information ’is the end point or the final output of any processed work. When the
output data is meaning
Nowadays, we cannot imagine our life without computers and the fact is that they
have become so important that nothing can replace them. They seem to be everywhere
today. Since 1948 when the first real computer has been invented our life has changed
so much that we can call it real digital revolution.
First computers differed from today's ones. They were so huge that they occupied
whole rooms or buildings being relatively slow. They were not faster than modern
simple watches or calculators. Nowadays they are also used by scientist and they may
also be as huge as the old ones but they are millions times faster. They can perform
many complex operations simultaneously and scientist practically can't do without
them. Thanks to them people has access to enormous amount of information.
Gathering data has never been simpler than now. They are not only used in
laboratories but also in factories to control production. Sometimes it is computers who
manufacture other computers.
But not only in science and industry computers are being used. Thanks to them
modern medicine can diagnose diseases faster and more thoroughly. Also in banking
system computers have become irreplaceable. They control ATMs, all data is stored
on special hard disks and paper isn't used in accountancy any more. Furthermore,
ITCoEICT 1
architects, designers and engineers can't imagine their work without computers. This
machines are really everywhere and we depend on them also in such fields as
criminology. They help police to solve crimes and collect evidence.
Moreover, computers are wide-spread in education. Except their classic tasks such as
administration and accountancy they are used in process of learning. Firstly, they
store enormous amount of data which helps students to gain an information. Secondly,
thanks to special teaching techniques and programs they improve ours skills of
concentration and assimilation of knowledge. They have become so popular that not
knowing how to use those means to be illiterate.
ADVANTAGES:
2.1. Storage
Computers saves storage place. Imagine how much paper would have to be used,
how many trees would have to be cut just to store information which is today on
hard disks. Data stored on just one CD in paper form would use room of dozens
square meters and would weight thousands of kilos. Nowadays, techniques of
converting data from paper to digital form have also tremendously developed.
You can simply rewrite the text using a keyboard. If you are not good at it you can
use a scanner to scan necessary documents. At least there are special devices
which can transfer our voice into text. Thanks to computers banks, private and
government companies, libraries, and many other institutions can save millions of
square meters and billions of dollars. Nowadays we have access to billions of
information and due to the computer's capabilities we actually don't need to worry
not only how to store them but also how to process them.
Computers can calculate and process information faster and more accurate than
human. This to say computer can simplify our works, for example a job of which
you cam work for a week, with computer you can finish it within a day. They are
a lot of jobs you can simplify different types of jobs from designing to writing.
2.3. Entertain
Computers are user-friendly. We can watch videos and listen to the music having
only PC. We don't need video player, TV and stacking hi-fi any more.
Furthermore, we don't have to buy PC's which can take much room due to their
other necessary components and wires. We can always buy laptop or palm top
which is even smaller, and use them outside anywhere we want. Also can use
ITCoEICT 2
computers to play different games, so apart from watching TV or video or listen to
music, a user can also play games.
2.4. Communication
During the relative short era of computers we have developed languages and rules
for communication between them. Users can communicate among others using
computers via internet. Among other means of communications users can send
Emails to others, chatting and even browsing some information’s.
3. History of Computers
The computer as we know it today had its beginning with a 19th century English
mathematics professor name Charles Babbage. He designed the Analytical Engine
and it was this design that the basic framework of the computers of today are based
on. Generally speaking, computers can be classified into three generations.
Each generation lasted for a certain period of
time, and each gave us either a new and improved computer or an improvement to the
existing computer.
3.1. First Generation Computers (1940s – 1950s)
ITCoEICT 3
computers consumed far less power, produced far less heat, and were much
smaller compared to the first generation, albeit still big by today’s standards.
The first transistor computer was created at the University of Manchester in 1953.
The most popular of transistor computers was IBM 1401. IBM also created the
first disk drive in 1956, the IBM 350 RAMAC.
The invention of the integrated circuits (ICs), also known as microchips, paved the
way for computers as we know them today. Making circuits out of single pieces of
silicon, which is a semiconductor, allowed them to be much smaller and more
practical to produce. This also started the ongoing process of integrating an ever
larger number of transistors onto a single microchip. During the sixties microchips
started making their way into computers, but the process was gradual, and second
generation of computers still held on.
First appeared
minicomputers, first of which
were still based on non-
microchip transistors, and
later versions of which were
hybrids, being based on both
transistors and microchips,
such as IBM’s System/360.
They were much smaller, and
cheaper than first and second
generation of computers, also
known as mainframes. Minicomputers can be seen as a bridge between
mainframes and microcomputers, which came later as the proliferation of
microchips in computers grew.
4. Types of Computers
There are a lot of terms used to describe computers. Most of these words imply
the size, expected use or capability of the computer. While the term computer can
apply to virtually any device that has a microprocessor in it, most people think of
ITCoEICT 4
a computer as a device that receives input from the user through a mouse or
keyboard, processes it in some fashion and displays the result on a screen.
Some desktop computers have a built-in monitor to save space. These are often
called all-in-one desktop computers.
4.3. Servers
ITCoEICT 5
Servers also play an important role in making the internet work: they are where
web pages are stored. When you use your browser to click a link, a web server
delivers the page you requested.
4.4. Other Types of Computers
Mobile Phones: Many mobile phones can do a lot of things a computer can do,
such as browsing the internet or playing games. These phones are often called
smartphones.
TVs: Many TVs now include applications (or apps) that let you access various
types of online content. For example, you can view your Facebook news feed or
watch streaming movies on Netflix.
The main and also basic function of a computer is to run programs. The programs
they run can help to improve humans' every day lives. But, there are four basic
functions of a Computer which are Input, Processing, Storage and Output.
5.1. Input
The input hardware allows you to enter data and instructions into the computer.
The primary devices used are the keyboard and mouse. Other input devices are
Scanner, Light pen, Joy Stick, Digital Cameras and Microphones.
5.1.1. Keyboard
ITCoEICT 6
this 65 is sent to CPU in the form of Binary language (i.e. 1000001). Then
operations are done on this data.
5.1.2. Mouse
5.1.6. Scanner
ITCoEICT 7
The scanner is an input device like the photocopier machine
which makes the electronic copy of the picture or document
which can be further edited
5.2. Processing
The central processing unit or (CPU) is the "brain" of your computer. It contains
the electronic circuits that cause the computer to follow instructions from ROM
(read only memory) or from a program in RAM (random access memory). By
following these instructions information is processed. The CPU contains three
parts Arithmetic Logic Unit, Memory and Control Unit.
ALU is where the "intelligence" of the computer is located. It can add and
compare numbers. To multiply 2 x 4 the computer would add 2 + 2 + 2 + 2.
The ALU makes decisions by determining if a number is greater, less, or equal
to the other number. Processing is completed in nanoseconds, which is a
billionth of a second.
5.2.2. Memory
Types of ROM
ITCoEICT 8
EPROM - Erasable Programmable Read Only Memory.
EEPROM - Electrically Erasable Programmable Read Only Memory.
Flash EEPROM memory.
This is the part of the unit, which directs information to the proper places in
your computer, such as calculation of information by the ALU unit or to store
and print material.
Storage Devices are the data storage devices that are used in the computers to
store the data. The computer has many types of data storage devices. Some of
them can be classified as the removable data Storage Devices and the others as the
non removable data Storage Devices.
The most important computational unit is the CPU, which requires a large amount
of data for executing various instructions. This data is in the form of bits and
bytes. This binary digital data is stored on the storage devices or memory.
Initially, all the storage devices were referred to as memory, but these days,
memory means the semiconductor storage device called the Random Access
Memory or RAM. Early computers used delay lines, magnetic drums, William
tubes etc. for storing data.
These devices provided an extremely low access rate. But with the invention of
transistors, radical changes were introduced in the memory implementation
techniques. Depending upon the storage capacity, access rate and volatility, data
storage can be divided into primary storage and secondary storage.
The memory is of two types; one is the primary memory and the other one is the
secondary memory.
The primary memory is the volatile memory and the secondary memory is the
non volatile memory. The volatile memory is the kind of the memory that is
erasable and the non volatile memory is the one where in the contents cannot
be erased. Primary storage or the commonly referred Random Access Memory
is the memory which is directly accessible to the CPU. The CPU constantly
reads instructions from this memory. The capacity of RAM in terms of data
storage is less, but it offers a very fast access rate, thus making it pretty
expensive. It offers minimum latency, hence suitable for transactional
environment databases. Primary storage also consists of processor registers
ITCoEICT 9
and processor cache.
Processor Registers:
Processor registers, located within the CPU are used to load instructions for
execution by the CPU. Registers hold data word of size 32 or 64 bits. They are
the fastest means of data storage. But they are capable of storing data of a very
small size.
Processor Cache:
Processor cache is the part of RAM and is used for speeding up the
executions. It copies the most frequently used data from the main memory and
stores it. When the CPU needs the particular data item, it can simply access
the cache memory which is closely located, instead of accessing the much
slower main memory.
The secondary memory is used to store the data permanently in the computer.
Secondary storage is commonly referred to as hard disk. It is a non-volatile
storage and is capable of storing large amounts of data. The term 'secondary'
refers to the inability of the CPU to access it directly. The data in the
secondary storage is accessed by the CPU through intermediary devices like
the processor cache. The computer uses its secondary storage via the various
input/ output channels. As secondary storage is non-volatile, it is used for safe
or offline storage of data. The data in secondary memory is organized into
files, directories and drives. The drives are periodically formatted to provide
the abstraction as required by the FileSystem.
The commonly used secondary storage devices
include flash drives, USB sticks, punch cards,
floppy disks, CDs, magnetic tapes,. Though,
secondary storage provides very slow access, it
is much cheaper than the primary storage and is
capable of storing much larger volumes of data.
After processing the data the computer displays the result, it gives an output. The
devices which are used to display the data to the user either in the form of hard
copy or soft copy are called output devices.
ITCoEICT 10
5.4.1. VDU (Visual Display Unit)
This is also called monitor. It is used to get the data in the form of soft copy.
Their functioning is exactly similar to the television. There are different types
of VDU
ITCoEICT 11
and consume as little as a third of the power of CRTs. However, LCD’s
feature a higher price and a smaller viewing angle than CRT screens.
5.4.1.3. Light Emitting Diodes (LED)
TFT LCD (Thin film transistor liquid crystal display) is a variant of liquid
crystal display (LCD) which uses thin-film transistor (TFT) technology to
improve image qualities such as addressability and contrast. TFT LCD is
an active matrix LCD, in contrast to passive matrix LCD’s or simple,
direct-driven LCD’s with a few segments.
5.4.2. Printer
These devices give the hard copy of the output. There are in different types of
printers depending on their mechanism. Impact - Have mechanical contact in
between paper & printing head. Non Impact - No mechanical contact between
paper & printing head
Impact printers
Line printers
Dot – matrix printers.
Daisy – wheel printers
Drum printers
Chain printers
Band printers
Non – impact printers
Ink – jet printers
Laser printers
ITCoEICT 12
with the appropriate character, dot, line, or symbol. Common examples of
impact printers include dot matrix, daisy-wheel printers, and ball printers.
While impact printers still have some uses (such as printing carbon
copies), most printers are now non-impact printers. These printers, such as
laser and inkjet printers are much quieter than impact printers and can print
more detailed images.
Early printers, such as dot matrix and daisywheel printers were called
impact printers, since they operated by striking an ink ribbon against the
paper. Most modern printers, including inkjet and laser printers, don't
include an ink ribbon and are considered to be non-impact printers.
5.4.2.3. Speakers
Speakers receive the sound in the form of electric current from the sound
card & convert it to sound format. These are used for listening music,
chatting, seminars for presentations etc.
ITCoEICT 13
most modern ones can correct any curves, blurriness, and other inconsistencies
through manual settings. Video projectors are widely used for many
applications such as, conference room presentations, classroom training, home
theatre and concerts. Projectors are widely used in many schools and other
educational settings, sometimes connected to an interactive whiteboard to
interactively teach pupils.
5.4.4. Plotter
6. Memory of a computer
The computers use code based on ones (1) and zeros (0) numbers called Binary
numbers. The hard disk and other storage devices are basically disks with hundreds of
thousands of tiny magnets. When you "save" the hard drive "writes" in computer code
what needs to be saved. There is a needle like device that hovers over the hard disk
and changes the polarity of the magnets, where a + polarity is a 1, and a negative
polarity is a 0. I may have the polarity and numbers backwards, but the idea is the
same. Your computers basic systems can read these codes and processes them to what
you see on the screen. This is why you don't ever want to get magnets near your
computer or attach "non-shielded" speakers to your computer.
Bit=a 1 or 0
Byte=8 bits
Kilobyte=1024 bytes
Megabyte=1024 kilobytes
Gigabyte=1024 megabytes
Terabyte=1024 gigabytes
ITCoEICT 14
Computer hardware equals the collection of physical elements that comprise a
computer system. Computer hardware refers to the physical parts or components of a
computer such as monitor, keyboard, hard drive disk, mouse, printers, graphic cards,
sound cards, memory, motherboard and chips, etc all of which are physical objects
that you can actually touch.
Computer software, or just software, is a collection of computer programs and
related data that provides the instructions for telling a computer what to do and how to
do it. Software refers to one or more computer programs and data held in the storage
of the computer. In other words, software is a set of programs, procedures,
algorithms and its documentation concerned with the operation of a data processing
system. Program software performs the function of the program it implements, either
by directly providing instructions to the digital electronics or by serving as input to
another piece of software
Software includes all the various forms and roles that digitally stored data may
have and play in a computer (or similar system), regardless of whether the data is
used as code for a CPU, or other interpreter, or whether it represents other kinds
of information. Software thus encompasses a wide array of products that may be
developed using different techniques such as ordinary programming languages,
scripting languages, microcode, or an FPGA configuration.
Practical computer systems divide software systems into three major classes:
a) System software,
b) Programming software and
c) Application software
ITCoEICT 15
3. CENTRAL PROCESSING UNIT or CPU: Where all of the information you put into the
computer is stored.
4. CLICKING: Pointing to something on the screen and then pushing the button on
the mouse is called clicking.
5. CURSOR: The line or arrow that you control by moving the mouse.
6. DESKTOP: The screen you see first when your computer turns on. This screen has
many icons.
7. DIALOGUE BOX: A window that opens and asks you questions.
8. DISK DRIVE: The place where you put your floppy disk so that you can save files on
it.
9. DISKS: One way to save your work, like recording on a video tape.
10. DOCUMENT: Anything you create in Microsoft Word is called a document.
11. FILE: A piece of computer information such as a document or part of a computer
program.
12. FOLDER: Like a file folder in a filing cabinet, a file is where documents (letters,
spreadsheets, etc.) are kept.
13. FONT: The way letters and words look.
14. FORMAT: Changing the way that text looks on the page.
15. This is not formatted.
16. HARDWARE: All the parts of the computer that you can touch: the monitor, CPU,
printer, mouse, and keyboard.
17. HARD DRIVE: The place inside your computer where programs and files are
stored.
18. HEADSET: Earphones and a microphone that you wear on your head.
19. HIGHLIGHT/SELECTING: Click and drag across a word or sentence to highlight it.
When it is highlighted you can make changes to it.
20. ICON: Symbols or pictures that you can click on to perform an action. Each
program has its own icon.
21. ITALICS: A font style that slants words to the right.
22. KEYBOARD: Like a typewriter, it’s where you type and enter numbers. It is one
way to tell the computer what you want it to do.
23. LAPTOP: A portable computer that you can carry with you.
24. Mac or MACINTOSH: A computer that is made to use the Macintosh operating
system. There are two basic kinds of computers: PCs and Macs.
25. MENU BAR: The words at the top of the screen. Click on these words and you see
menus of other things you can do.
26. MENU: A list of other things you can do. You see a menu when you click on one of
the words on the Menu Bar.
27. MICROSOFT: A software company owned by Bill Gates.
28. MICROSOFT POWERPOINT: A software program for making presentations that you
can show to others.
29. MICROSOFT WINDOWS: An operating system made by the Microsoft company.
29. MICROSOFT WORD: A word- processing program for typing letters, resumes,
school papers and more.
ITCoEICT 16
30. MINIMIZE: To move a window to the bottom of the screen without closing the
window.
31. To expand a window to the full size of the screen.
32. RESTORE: To make a window smaller so that you can change the size or position.
33. MONITOR: Your computer’s screen
34. MOUSE: The tool you can use tell the computer what to do. For example you can
open programs and files by clicking or double clicking.
35. OPEN: A command on the File Menu that brings files onto the screen so that you
can see them.
36. OPERATING SYSTEM: The most important program in your computer. This
program is like the “manager” of all of the other programs.
37. PC = PERSONAL COMPUTER: A computer that is made to use the Windows
operating system. There are two basic kinds of computers: PCs and Macs.
38. POINT: The size of text. 12 point 16 point 24 point
39. PROGRAMS: Another word for software or applications.
40. SCREEN SAVER: A design on the screen that turns on if you don’t use your
computer for a few minutes.
41. SCROLL BARS: The bars on the sides of the screen that allow you to move up or
down the page.
42. SOFTWARE: Another word for programs, instructions in the computer that help it
do different tasks.
43. SPELL CHECK: When you’re using Microsoft Word, you can click on this button to
look for spelling and grammar mistakes.
44. SPREADSHEET: Organizes information into rows and columns and often uses math
and numbers.
45. TOOL BARS: The bars across the top of the screen that have icons you click on to
do different things.
46. USB DRIVE: A disk that you can save information on. Also called a flash drive,
jump drive, or thumb drive.
47. WORD PROCESSING: Typing documents on a computer. Word processing also
allows you to format, save, and edit your writing.
Microsoft Windows is a
family of proprietary
operating systems designed
by Microsoft Corporation
and primarily targeted to
Intel architecture based computers, with an estimated 88.9 percent
ITCoEICT 17
total usage share on Web connected computers. Microsoft Windows
originated in 1985 as an operating environment running on top of
MS-DOS, which was the standard operating system shipped on most
Intel architecture personal computers at the time
OS X
OS X (formerly "Mac OS
X") is a line of open core
graphical operating systems
developed, marketed, and
sold by Apple Inc., the
latest of which is pre-
loaded on all currently
shipping Macintosh computers. OS X is the successor to the original
Mac OS, which had been Apple's primary operating system since
1984. Unlike its predecessor, OS X is a UNIX operating system built
on technology that had been developed at NeXT through the second
half of the 1980s and up until Apple purchased the company in early
1997. The operating system was first released in 1999 as Mac OS X
Server 1.0
ITCoEICT 18
Google Chromium OS
Chromium is an operating
system based on the Linux
kernel and designed by
Google. Since Chromium
OS targets computer users
who spend most of their
time on the Internet, it is mainly a web browser with limited ability
to run local applications, though it has a built-in file manager and
media player. Instead, it relies on Internet applications (or Web
apps) used in the web browser to accomplish tasks such as word
processing, as well as online storage for storing most files.
Word Processing Software: This software enables users to create and edit
documents. The most popular examples of this type of software are MS-
Word, WordPad, Word Perfect and Notepad among other text editors.
ITCoEICT 19
database users to perform database operations. Database software allows
users to store and retrieve data from databases. Examples are Oracle, MS
Access, etc.
Spreadsheet Software: Excel, Lotus 1-2-3 and Apple Numbers are some
examples of spreadsheet software. Spreadsheet software allows users to
perform calculations using spreadsheets. They simulate paper worksheets
by displaying multiple cells that make up a grid.
Multimedia Software: They allow users to create and play audio and
video files. They are capable of playing media files. Audio converters,
audio players, burners, video encoders and decoders are some forms of
multimedia software. Examples of this type of software include Real
Player and Media Player.
ITCoEICT 20
Application Suites: An application suite is an important type of
application software. It consists of a group of applications combined to
perform related functions. OpenOffice.org and Microsoft Office are the
best examples of this type of application software. These application
suites, as you know, come as bundles of applications like word processors,
spreadsheets, presentation software, etc. Applications in the suite can work
together or operate on each other's files.
The mouse sometimes features other elements, such as "wheels", which allow the user
to perform various system-dependent operations, or extra buttons or features that can
add more control or dimensional input. The mouse's motion typically translates into
the motion of a pointer on a display, which allows for fine control of a graphical user
interface.
ITCoEICT 21
There three types on how to use a mouse while working, Click, Right Click, Double
Click and Drag. Click or clicking is used to pick or select items. Right Click is used to
display a shortcut menu on different item. Double click is used to open Files, Folders,
Driver destinations and programs.
Mechanical mice
Optical mice
With the advance of computing power, optical mice became cheap to produce and
have since become far more popular than their mechanical predecessors. Optical
mice have the advantage of featuring no moving parts and no large openings to
collect dust – meaningless all-round wear and tear. Optical mice are also more
accurate and – depending on the surface - don’t require a mouse mat.
Laser mice
ITCoEICT 22
By using an infrared laser, these mice are able to capture images at a far-greater
resolution (denoted as dots per inch or dpi), consequently resulting in greater
accuracy and improved precision.
A laser mouse, then, clearly has its advantages – but be aware that it’s a device
that targets certain markets. The precision of a laser pointer is ideal for
professionals working with computer graphics, or indeed gamers. For the
everyday user, an optical mouse is likely to be cheaper and plenty sufficient.
ITCoEICT 23
OPERATING SYSTEM
Operating System (OS) is a program that acts as an interface between the user and
the computer hardware and controls the execution of all kinds of programs.
OR
Operating System (OS) is system software that manages computer hardware and
software resources and provides common services for computer programs. The
operating system is a component of the system software in a computer system.
Application programs usually require an operating system to function.
Time-sharing operating systems schedule tasks for efficient use of the system and
may also include accounting software for cost allocation of processor time, mass
storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between programs and the computer hardware,
although the application code is usually executed directly by the hardware and
frequently makes system calls to an OS function or is interrupted by it. Operating
systems are found on many devices that contain a computer from cellular phones and
video game consoles to web servers and supercomputers.
Include BlackBerry, BSD, iOS, Linux (Android, Chrome OS, Debian, Fedora,
Gentoo, PCLinuxOS, RHEL ), OS X, QNX, Steam OS, Microsoft Windows (and
variant Windows Phone),[3] and z/OS
ITCoEICT 24
The basic Function Of Operating System.
i. Booting the computer
ii. Performs basic computer tasks eg managing the various peripheral devices eg
mouse, keyboard
iii. Provides a user interface, e.g. command line, graphical user interface (GUI)
iv. Handles system resources such as computer's memory and sharing of the
central processing unit (CPU) time by various applications or peripheral
devices
v. Provides file management which refers to the way that the operating system
manipulates, stores, retrieves and saves data.
The operating system performs basic computer tasks, such as managing the
various peripheral devices such as the mouse, keyboard and printers. For example,
most operating systems now are plug and play which means a device such as a
printer will automatically be detected and configured without any user
intervention.
iii. Provides a user interface
A user interacts with software through the user interface. The two main types of
user interfaces are: command line and a graphical user interface (GUI). With a
command line interface, the user interacts with the operating system by typing
commands to perform specific tasks. An example of a command line interface is
ITCoEICT 25
DOS (disk operating system). With a graphical user interface, the user interacts
with the operating system by using a mouse to access windows, icons, and menus.
An example of a graphical user interface is Windows Vista or Windows 7.
The operating system is responsible for providing a consistent application
program interface (API) which is important as it allows a software developer to
write an application on one computer and know that it will run on another
computer of the same type even if the amount of memory or amount of storage is
different on the two machines.
iv. Handles system resources
The operating system also handles system resources such as the computer's
memory and sharing of the central processing unit (CPU) time by various
applications or peripheral devices. Programs and input methods are constantly
competing for the attention of the CPU and demand memory, storage and
input/output bandwidth. The operating system ensures that each application gets
the necessary resources it needs in order to maximize the functionality of the
overall system.
v. Provides file management
The operating system also handles the organization and tracking of files and
directories (folders) saved or retrieved from a computer disk. The file
management system allows the user to perform such tasks as creating files and
directories, renaming files, coping and moving files, and deleting files. The
operating system keeps track of where files are located on the hard drive through
the type of file system. The two main types of file system are File Allocation table
(FAT) or New Technology File system (NTFS).
Types of file system
File Allocation table (FAT)
ITCoEICT 26
Single- and multi-user
Single-user operating systems have no facilities to distinguish users, but may allow
multiple programs to run in tandem.[4] A multi-user operating system extends the
basic concept of multi-tasking with facilities that identify processes and resources,
such as disk space, belonging to multiple users, and the system permits multiple users
to interact with the system at the same time. Time-sharing operating systems schedule
tasks for efficient use of the system and may also include accounting software for
cost allocation of processor time, mass storage, printing, and other resources to
multiple users.
Distributed
A distributed operating system manages a group of distinct computers and makes
them appear to be a single computer. The development of networked computers that
could be linked and communicate with each other gave rise to distributed computing.
Distributed computations are carried out on more than one machine. When computers
in a group work in cooperation, they form a distributed system.[5]
Templated
In an OS, distributed and cloud computing context, templating refers to creating a
single virtual machine image as a guest operating system, then saving it as a tool for
multiple running virtual machines (Gagne, 2012, p. 716). The technique is used both
in virtualization and cloud computing management, and is common in large server
warehouses.[6]
Embedded
Embedded operating systems are designed to be used in embedded computer systems.
They are designed to operate on small machines like PDAs with less autonomy. They
are able to operate with a limited number of resources. They are very compact and
extremely efficient by design. Windows CE and Minix 3 are some examples of
embedded operating systems.
Real-time
A real-time operating system is an operating system that guarantees to process events
or data within a certain short amount of time. A real-time operating system may be
single- or multi-tasking, but when multitasking, it uses specialized scheduling
algorithms so that a deterministic nature of behavior is achieved. An event-driven
system switches between tasks based on their priorities or external events while time-
sharing operating systems switch tasks based on clock interrupts.[citation needed].
Types of real time operating system.
ITCoEICT 27
Soft real-time systems
Soft real time systems are less restrictive. Critical real-time task gets priority
over other tasks and retains the priority until it completes. Soft real-time
systems have limited utility than hard real-time systems.For example,
Multimedia, virtual reality, Advanced Scientific Projects like undersea
exploration and planetary rovers etc.
Library
A library operating system is one in which the services that a typical operating system
provides, such as networking, are provided in the form of libraries. These libraries are
composed with the application and configuration code to construct unikernels —
which are specialised, single address space, machine images that can be deployed to
cloud or embedded environments.
MICROSOFT WINDOWS.
These are operating systems designed and produced by Microsoft windows that make
a computer system user friendly by providing graphical displayed and organizing
information so that it can be easily accessed.
1. Windows Easy Transfer : One of the first things you might want to do is to transfer
your files and settings from your old computer to the brand new computer. You can
do this using an Easy Transfer Cable, CDs or DVDs, a USB flash drive, a network
folder, or an external hard disk.
3. Windows Basics : If you are new to Windows or want to refresh your knowledge
about areas such as security or working with digital pictures, this features will help
ITCoEICT 28
you to get started. Here you can learn how to help keep your computer more secure,
work with digital pictures, use the mouse and keyboard, work with files and
programs, use email, connect to and explore the internet and many more.
4. Searching and Organizing : Most folders in Windows have a search box in the
upper- right corner. To find a file in a folder, type a part of the file name in the search
box. You can also use this feature when you don't know where a files is actually
located or when you want to do an advanced search. Since its will be an indexed
searching the results will be very quick and very close to your search entries.
5. Parental Controls : Parental Controls give you the means to decide when your
children use the computer, which website they visit, and which games they are
allowed to play. You can also get reports of your children's computer activity as well.
6. Ease of Access Center : Ease of Access Center is the place to find and change
settings that can enhance how you hear, see and use your computer. You can adjust
text size and the speed of your mouse. This is also where you can go to set up your
screen reader and find other helpful tools.
7. Default Programs : This is a features of your Windows Operating System where you
can adjust and set your default programs, associate a file type or a protocol with a
program, change and set auto play settings, set program access and computer defaults.
8. Remote Desktop Connection : This features helps a user with a graphical user
interface to another computer. It is a proprietary protocol developed by Microsoft
specially for Windows Operating System. Basically by entering the IP address of the
other computer you can directly see that computer's desktop right on to your desktop.
ITCoEICT 29
a) Check peripheral device connections.
b) Turn on power at the power outlet.
c) If the monitor has a separate switch, turn it on.
d) Switch on the printer.
e) Check to see if there is a floppy disk in the floppy disk drive if
your computer has one. Eject the disk to ensure the computer starts
from the hard drive.
f) Switch on the system unit. If using a desktop PC the power switch
is usually a button on the front or side of the system unit. If using a
laptop the power switch is usually at the top of the keyboard.
g) The computer will perform a start-up routine. When the start-up
routine has completed then the operating system will start.
9.2. Logging on
The computer you are using may have been set up so that you need to log on to
the computer in order to be able to access the software and stored data, and
commence using it. This is a security feature that is often in place for computers in
the workplace, school, college or other large organisation.
When you log on you are connecting the
computer with a network of other
computers in the organisation.
If you need to log on you will see a box
on the screen asking you for two items of
information that you need to type in:
a) username
b) Password
Usernames and passwords are set (for each authorised user) by the IT
Administrator for the organisation. You are a teacher or IT Department (in an
organisation) will provide you with these details.
Your username and password determines what information and features of the
computer and network you have access to, and this is determined by the IT
security policy of the organisation.
Therefore, it is important to note the conditions of use that apply to you when you
log on to a computer with your username and password. These conditions appear
on the screen before you are asked to enter your name and password. You must
click on the OK button after you have read the conditions. This enables you to get
to the log on screen where you enter your name and password.
ITCoEICT 30
It is good practice to use the correct shut down procedure when you want to turn
off your computer so that you do not lose data. If you still have any software
applications or files open they will be displayed at the bottom of the screen. Each
of the applications and files must be closed. You may get a message asking you to
confirm whether files need to be saved. Make sure you save any work you have
done before you turn off the computer.
Depending on whether or not you have had to log on to start using a computer,
you will need to follow a different sequence shutting down the computer.
ITCoEICT 31
You can now switch off the computer and the power outlet if you want to shut
down the computer.
f) Click on OK to confirm.
Your computer may automatically turn the power off but if not you will
get a message like ‘It is now safe to turn off your computer.’
g) Switch off the computer and the power outlet.
A user account defines the actions a user can perform in Windows. On a stand-
alone computer or a computer that is a member of a workgroup, a user account
establishes the privileges assigned to each user.
There are two types of user accounts available on your computer: computer
administrator and limited. The guest account is available by default for users
with no assigned account on the computer.
ITCoEICT 32
• Can create and delete user accounts on the computer.
• Can change other users' account names, pictures, passwords, and
account types.
• Cannot change his or her own account type to limited unless there is
at least one other user with a computer administrator account. This
ensures that there is always at least one user with a computer
administrator account on the computer.
• Can manage his or her network passwords, create a reset password
disk, and set up his or her account to use a .NET Passport.
Limited account
The limited account is intended for someone who should be prohibited from
changing most computer settings and deleting important files. A user with a
limited account:
• Generally cannot install software or hardware, but can access
programs that have already been installed on the computer.
• Can change his or her account picture and can also create, change, or
delete his or her password.
• Cannot change his or her account name or account type. A user with a
computer administrator account must make these kinds of changes.
• Can manage his or her network passwords, create a reset password
disk, and set up his or her account to use a .NET Passport.
Note
Some programs might not work properly for users with limited accounts. If so,
change the user's account type to computer administrator, either temporarily or
permanently.
Guest account
The guest account is intended for use by someone who has no user account on
the computer. There is no password for the guest account, so the user can log
on quickly to check e-mail or browse the Internet. A user logged on to the
guest account:
• Cannot install software or hardware, but can access applications that
have already been installed on the computer.
• Cannot change the guest account type.
• Can change the guest account picture.
Note
You might see an account with the name "Owner" when you first log on. The
owner account, with computer administrator privileges, is created during
installation if no user accounts are set up at that time. You can rename this
account with a user's name.
ITCoEICT 33
10. Working with Windows Desktop
Windows XP is an operating system that lets you use different types of applications or
software. For example, it allows you to use a word processing application to write a
letter, and a spreadsheet application to track your financial information.
Windows XP is a graphical user interface (GUI). It has pictures (graphical) that you
use (user) to communicate (interface) with the computer. This type of system is
popular because it's logical, fun and easy to use.
This operating system has multitasking capabilities, meaning it can run several
applications at the same time. Multitasking allows you to view this lesson on the
Internet at the same time that you practice using other applications with Windows XP.
Like previous versions of Windows, Windows XP uses a desktop for the standard
interface. Think of the desktop as workspaces where you can access everything
you need to operate your computer, such as system components, applications, the
Internet, etc.
Start button: one of the most important tools you will use while working
with Windows XP. The Start button allows you to open menus and start
applications.
Taskbar: primarily used to switch between open windows and
applications. Learn more about using the Taskbar in a later lesson.
Icons (or graphical pictures): represent applications, files, and other parts
of the operating system. By default Windows XP provides you with one
desktop icon, the Recycle Bin. Learn more about the Recycle Bin in a later
lesson.
ITCoEICT 34
Your desktop's appearance may vary from the example shown below, especially if
you bought a computer with XP preinstalled.
When you click the Start button, the Start menu appears. The Start menu is
your gateway to the applications that are on your computer. The left side of the
Start menu lists programs, and the right side allows access to common Windows
folders (My Documents, for example). It also provides access to Help and
Support, Search, and Run.
ITCoEICT 35
If you select All Programs, a pop-up menu appears. Pop-up menus like this are
called cascading menus. If a cascading menu is available, a small black triangle
appears next to the name of the application or function.
The Start menu remembers items you've recently opened and places the icon
on the Start menu so you can easily open it next time you open the Start menu.
For example, if you recently opened Microsoft Word using Start All
Programs Microsoft Word, the next time you open the Start menu, simply
click the Word icon on the left side of the Start menu.
ITCoEICT 36
10.5. Understanding Icons
The small pictures on the desktop are called icons. One type of icon is
an object icon. Examples of object icons are My Computer, Recycle
Bin, and Internet Explorer. These icons allow you to open files and
programs on your computer.
The taskbar is the small blue bar you see at the bottom of your desktop. It
contains the Start menu and the Quick Launch bar, which contains icons for
Internet Explorer, Windows Media Player, and Show Desktop. Click an icon to
open a program. Click Show Desktop to quickly view your desktop without
closing any programs or windows.
The box on the right is called the Notification Area. Here, you'll find the clock
and several other icons depending on what you have installed on your computer.
Other icons appear in the Notification Area detailing the status of your activity.
For example, when you're printing a document, a printer icon appears. Microsoft
also uses the Notification Area to remind you when software updates are
available for download.
More than one person may use your computer. For example, many family
members may use the same computer at home while several coworkers may be
able to access your computer on a computer network. Windows XP allows
everyone who uses your computer to have separate computer accounts. A
ITCoEICT 37
computer accounts tracks each person's unique settings, documents, and email
accounts.
Windows XP even enables you to log off the computer so someone else can log
on without having to restart the computer.
Wallpapers are images that appear in the background on your Desktop, behind all
your icons. To change your Desktop wallpaper, do the following:
ITCoEICT 38
This is the Display Properties dialogue box. As you can see, there are tab strips for
Themes, Desktop, Screensaver, Appearance, and Settings. Click on the Background
tab strip and the dialogue box will change to this one:
There is a list of wallpapers we can use. Click on one, and you get a preview of what
it will look like. Scroll down to see more wallpapers. If you're satisfied, click the OK
button to set your wallpaper.
You can use your own images. You are not limited to the ones on the list. If you have
an image somewhere on your computer, and you want to use that instead of the ones
on the list, you can click the Browse button, in the image above. Doing so will bring
up the Browse Dialogue box:
ITCoEICT 39
On the image above, no background files are showing. You can click one of the
folders on the left to search for a picture, or use the "Look In" drop down box at the
top. When some background image are showing, click on one to select it. The name of
the file you have selected will then appear in the File name text box.
Click the "Open" button to return to the Display Properties dialogue box. A preview
of your image will be displayed. If you're happy with your selection, click the
"Apply" button then OK. Your desktop will change to your selected image.
Windows Explorer displays the hierarchical structure of files, folders, and drives on
your computer. It also shows any network drives that have been mapped to drive
letters on your computer. Using Windows Explorer, you can copy, move, rename, and
search for files and folders. For example, you can open a folder that contains a file
you want to copy or move, and then drag the file to another folder or drive.
There are other places in Windows where you can view and work with files and
folders. My Documents is a convenient place to store documents, graphics, or other
files you want to access quickly. You can also view My Network Places, which lists
other computers that are connected to your local area network (LAN) When you
delete files or folders from your hard disk, Windows places them in the Recycle Bin,
where you can retrieve them, until you empty the Recycle Bin. Files or folders deleted
from a floppy disk or a network drive are permanently deleted and are not sent to the
Recycle Bin.
a) Open My Documents
ITCoEICT 40
If the file or folder you want to copy is not located in My
Documents or its subfolders, use Search to find it. To open Search,
click Start, and then click Search.
b) Click the file or folder you want to copy.
c) Under File and Folder Tasks, click Copy this file or Copy this
folder.
d) In Copy Items, select the drive or folder you want to copy to, and
then click Copy
a) Open My Documents
b) To select consecutive files or folders, click the first item, press and
hold down SHIFT, and then click the last item.
c) To select nonconsecutive files or folders, press and hold down
CTRL, and then click each item.
d) To select all the files and folders in the window, on the Edit menu,
click Select All
a) Open My Documents.
b) Under File and Folder Tasks, click Make a new folder.
c) A new folder is displayed with the default name, New Folder,
selected
d) Type a name for the new folder, and then press ENTER
ITCoEICT 41
c) Make sure the destination for the file or folder you want to move is
visible. For example, if you are moving a file from the My
Documents folder to the desktop, you might need to resize
Windows Explorer so the desktop is visible.
d) Drag the file or folder to the destination
Note:
If you are deleting files or folders from all location from a Hard
Disk, files are stored in a Recycle bin folder, so later if you want
can restore them by opening recycle bin folder , click to select a
file or folder and choose Restore from a menu.
But if you are deleting files or folders from a any movable storage
device like Flash Disk or External Hard Disk, the files and folders
will be permanently deleted from a system.
a) Open My Documents
If the file or folder you want to rename is not located in My
Documents or its subfolders, use Search to find it. To open Search,
click Start, and then click Search.
b) Click the file or folder you want to rename.
c) Under File and Folder Tasks, click Rename this file or Rename
this folder
Note:
Some programs cannot interpret long file names. The limit for
programs that do not support long file names is eight characters. File
names cannot contain the following characters: \ / : * ? " < > |. You
can also rename a file or folder by right-clicking it and then clicking
Rename.
ITCoEICT 42
13. Save a file
When you save a file, you can save it to a folder on your hard disk drive, a network
location, disk, DVD, CD, the desktop, flash drive, or save as another file format.
You should save the file frequently while you are working on it to avoid losing
data because of an unexpected power failure or other problem.
By default, the Microsoft Office programs save a file in a default working folder. To
save the copy in a different location, click a different folder in the folder list. See Save
as a copy or to a different location to learn more.
a) Click the Microsoft Office Button , and then click Save, or press
CTRL+S.
b) If you don't see the Microsoft Office Button , click Save on the File
menu.
c) If you are saving the file for the first time, you are asked to give it a name.
Malware, short for malicious (or malevolent) software, is software used or created
by attackers to disrupt computer operation, gather sensitive information, or gain
access to private computer systems. It can appear in the form of code, scripts, active
content, and other software. 'Malware' is a general term used to refer to a variety of
forms of hostile or intrusive software.
Malware includes computer viruses, worms, Trojan horses, spyware, adware, and
other malicious programs. Malware is not the same as defective software, which is
software that has a legitimate purpose but contains harmful bugs that were not
corrected before release. However, some malware is disguised as genuine software,
and may come from an official company website. An example of this is software used
for harmless purposes that is packed with additional tracking software that gathers
marketing statistics.
Malware has caused the rise in use of protective software types such as anti virus,
anti-malware, and firewalls. Each of these is commonly used by personal users and
corporate networks in order to stop the unauthorized access by other computer users,
as well as the automated spread of malicious scripts and software.
Two of the most common types of malware are viruses and worms. These types of
programs are able to self-replicate and can spread copies of themselves, which
might even be modified copies. To be classified as a virus or worm, malware must
have the ability to propagate. The difference is that a worm operates more or less
ITCoEICT 43
independently of other files, whereas a virus depends on a host program to spread
itself. These and other classes of malicious software are described below.
14.1.1. Viruses
14.1.2. Worms
Computer worms are similar to viruses in that they replicate functional copies
of themselves and can cause the same type of damage. In contrast to viruses,
which require the spreading of an infected host file, worms are standalone
software and do not require a host program or human help to propagate. To
spread, worms either exploit vulnerability on the target system or use some
kind of social engineering to trick users into executing them. A worm enters a
computer through vulnerability in the system and takes advantage of file-
transport or information-transport features on the system, allowing it to travel
unaided.
14.1.3. Trojans
A Trojan is another type of malware named after the wooden horse the Greeks
used to infiltrate Troy. It is a harmful piece of software that looks legitimate.
Users are typically tricked into loading and executing it on their systems. After
it is activated, it can achieve any number of attacks on the host, from irritating
the user (popping up windows or changing desktops) to damaging the host
(deleting files, stealing data, or activating and spreading other malware, such
as viruses). Trojans are also known to create back doors to give malicious
users access to the system.
Unlike viruses and worms, Trojans do not reproduce by infecting other files
nor do they self-replicate. Trojans must spread through user interaction such as
opening an e-mail attachment or downloading and running a file from the
Internet.
ITCoEICT 44
Antivirus or anti-virus software is software used to prevent, detect and remove
malware (of all descriptions), such as: computer viruses, Trojan horses, worms,
adware and spyware.
There is a lot of computer antivirus around, but these are just few of them, AVG,
kaspersky, Avast, Microtrend Avira, NORTON, Mcafee and others
After you unpack your new computer, you may need help with its setup. Your
computer comes with a monitor, keyboard, and mouse. You should connect these
items before you turn on your new computer.
Your computer will offer several types of connection ports, but USB ports are
becoming the most common. Wireless keyboards and mouse use a small transmitter
that you insert into a USB port, for example.
Use the following table in conjunction with the figure to identify device-to-PC
connector ports.
VGA Cable
head (Male)
ITCoEICT 45
15.2. USB port
USB stands for Universal Serial Bus, an industry standard for short-distance
digital data communications. USB allows data to be transferred between devices.
USB ports can also supply electric power across the cable to devices without their
own power source.
In a Personal Computers USB Ports are used to connect devices like USB Mouse
and USB Printers. Other devices like Flash Disk and Cameras also can use USB
Connectors.
USB Ports
ITCoEICT 46
Sound card, ports for left and right speakers and the microphones
ITCoEICT 47