Cc100 Introduction To Computing
Cc100 Introduction To Computing
Marcelino S. Cerin III, Rhoel Anthony G. Torres, Johanna Mae Vasquez, Ellen Joy
Reyes, Christian Pena
TABLE OF CONTENTS
Introduction ........................................................................................................................i
Notebook Computers............................................................................ 4
Game Consoles...................................................................................... 8
Mainframe Computers.......................................................................... 9
Supercomputers.................................................................................... 9
. HARDWARE .......................................................................................... 12
Internal Component........................................................................ 30
Spreadsheets ................................................................................... 42
Desktop Publishing.......................................................................... 43
Multimedia ...................................................................................... 43
Interfaces ................................................................ 55
UNIX ............................................................ 57
OS/2 ............................................................ 58
Windows ..................................................... 58
Linux ............................................................ 68
Android ....................................................... 69
IOS ............................................................... 69
Power User............................................................................................ 72
Enterprise User .....................................................................................
INTRODUCTION TO COMPUTING (CC100)
INTRODUCTION
Computers are everywhere: at work, at school, and at home. People use all types
and sizes of computers for a variety of reasons and in a range of places. While some
computers sit on top of a desk or on the floor, mobile computers and mobile devices are
small enough to carry. Mobile devices, such as many cell phones, often are classified as
computers.
Computers are a primary means of local and global communication for billions of
people. Consumers use computers to correspond with businesses, employees with other
employees and customers, students with classmates and teachers, and family members
and military personnel with friends and other family members. In addition to sending
simple notes, people use computers to share photos, drawings, documents, calendars,
journals, music, and videos. Through computers, society has instant access to information
from around the globe. Local and national news, weather reports, sports scores, airline
schedules, telephone directories, maps and directions, job listings, credit reports, and
countless forms of educational material always are accessible. From the computer, you
can make a telephone call, meet new friends, share opinions or life stories, book flights,
shop, fill prescriptions, file taxes, take a course, receive alerts, and automate your home.
At home or while on the road, people use computers to manage
schedules and contacts, listen to voice mail messages, balance checkbooks, pay bills,
transfer funds, and buy or sell stocks. Banks place ATMs (automated teller machines) all
over the world, so that customers can deposit and withdraw funds anywhere at any time.
At the grocery store, a computer tracks purchases, calculates the amount of money due,
and often generates coupons customized to buying patterns.
Modern man can count or calculate small numbers with ease, but his requirement
for data processing is so enormous that he needs a machine that can instantly process
the data captured from source and provide real time response. The early devices such as
abacus and slide rule cannot keep pace with his needs. The progress of man from pebbles
to PCs is a great march in technological history of mankind. Every human activity is
becoming increasingly information intensive. There is a growing need to collect, process,
store, retrieve and exercise control over huge quantity of data. Computer is the tool that
performs these operations with great speed and efficiency. But computers took long years
to reach the present level of sophistication .
vi
The history of computers dates back to the age when man started using tools for
computations. The whole history of computing can be divided into two periods based on
the technology used in computing devices such as mechanical era and electronic era.
There are totally five computer generations known till date. Each generation has
been discussed in detail along with their time period and characteristics. Here,
approximate dates against each generation have been mentioned which are normally
accepted.
First Generation
The period of first generation was 1946-1959. The computers of first generation
used vacuum tubes as the basic components for memory and circuitry for CPU (Central
Processing Unit). These tubes, like electric bulbs, produced a lot of heat and were prone
to frequent fusing of the installations, therefore, were very expensive and could be
afforded only by very large organizations. In this generation, mainly, batch processing
operating system were used. Punched cards, paper tape, and magnetic tape were used
as input and output devices. Computers in this generation used machine code as
programming language.
vii
Second Generation
The period of second generation was 1959-1965. In this generation, transistors
were used that were cheaper, consumed less power, more compact in size, more reliable
and faster than the first generation machines made of vacuum tubes. In this generation,
magnetic cores were used as primary memory and magnetic tape and magnetic disks as
secondary storage devices. In this generation, assembly language and high-level
programming languages like FORTRAN and COBOL were used. The computers used batch
processing and multiprogramming operating system.
Third Generation
The period of third generation was 1965-1971. The computers of third
generation used integrated circuits (IC's) in place of transistors. A single IC has many
transistors, resistors and capacitors along with the associated circuitry. The IC was
invented by Jack Kilby. This development made computers smaller in size, reliable and
efficient. In this generation, remote processing, time-sharing, multi-programming
operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL
PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
viii
Fourth Generation
The period of fourth generation was 1971-1980. The computers of fourth
generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about
5000 transistors and other circuit elements and their associated circuits on a single chip
made it possible to have microcomputers of fourth generation. Fourth generation
computers became more powerful, compact, reliable, and affordable. As a result, it gave
rise to personal computer (PC) revolution. In this generation, time sharing, real time,
networks and distributed operating system were used. All the high-level languages like C,
C++, DBASE etc. were used in this generation.
Fifth Generation
The period of fifth generation is 1980-till date. In the fifth generation, the VLSI technology
became ULSI (Ultra Large Scale Integration) technology, resulting in the production of
microprocessor chips having ten million electronic components. This generation is based
on parallel processing hardware and AI (Artificial Intelligence) software. AI is an emerging
branch in computer science, which interprets means and method of making computers
think like human beings. All the high-level languages like C and C++, Java, .Net etc. are
used in this generation.
AlI includes:
• Robotics
• Neural networks
• Game Playing
• Development of expert systems to make decisions in real life situations.
• Natural language understanding and generation.
ix
• Notebook
• Ultra Book
• Chrome Book
DIGITAL REVOLUTION
The digital revolution is an ongoing process of social, political and economic
change brought about by digital technology, such as computer and internet. Technology
driving the digital revolution is based on digital electronics and the idea that electrical
signals can represents data, such as numbers, words, pictures and music. Without digital
electronics, computers would be huge machine. Digitization is the process of converting
text, numbers, sound, photos and video into data that can be processed by digital devices.
The digital revolution has evolved through four phases, beginning with big, expensive,
standalone computers a progressing to today’s digital world in which small, inexpensive
digital devices are everywhere.
➢ Personal Computing, the model for the second phase of the digital
revolution, is characterized by small, stand alone computers powered by
local software. Local software refers to any software that is installed on a
computer hard drive.
x
During this phase of the digital revolution, personal computers were not
connected to networks, so they were essentially self-contained units that allowed
users to interact with installed software
As the third phase of the digital revolution unfolded, network technology became
consumer-friendly; allowing homeowners to connected multiple computers,
exchanges files, and most importantly, share an Internet connection. Internet is a
global computer originally developed as a military project, and was then handed
over to the National Science Foundation for Research and academic use.
When historians look back on the digital revolution, they are certain to identify
the Web as a major transformative influence. The Web (short for World Wide
Web) is a collection of linked documents, graphics, and sounds that can be
accessed over the Internet.
xi
Republic of the Philippines
Nueva Ecija University of Science and Technology
Cabanatuan City
Activity # 1
STRICTLY NO ERASURE.
______________________3. It is the basic component for memory and circuitry for CPU
in the first generation.
xii
B. Give at least 4 computers used in the first generation
5.
6.
7.
8.
xiii
Chapter 1
ALL ABOUT COMPUTER
What Is a Computer?
Computer can be defined as an electronic device that performs rapid computations and
generates desired output for users based on input data and programs. Computer can
capture, store, retrieve and process data. The data may be numbers, characters, audio,
video, images etc. IT is an advanced electronic device that takes raw data as input from
the user and processes these data under the control of set of instructions (called program)
and gives the result (output) and saves output for the future use. It can process both
numerical and non-numerical (arithmetic and logical) calculations.
Computer allows users to store and process information quickly and automatically. It is a
programmable machine that allows user to store all sorts of information and then
‘process’ that information, or data, or carry out actions with the information, such as
calculating numbers or organizing words.
CHARACTERISTICS OF COMPUTER
Computer is a versatile device. It can be designed to do any kind of activity provided all
data and instructions are made available to it in digital form. The important characteristics
of computer are:
1. Speed
1
microcomputers, operate in nanoseconds and can carry out millions of instructions per
second (MIPS).
2. Accuracy
Computer has huge storage capability. For a personal computer, 128 MB RAM is almost a
standard today. The main memory can be upgraded further by inserting RAM chips that
are available in modules of 64 MB, 128 MB and so on. Cache memory is also available in
Pc. Cache memory is faster access memory device and hence it improves processor’s
performance.
Secondary or auxiliary storage devices are used for permanent storage. Modern
computers have enormous secondary storage capacity, e.g., a PC hard disk can store more
than 80 GB of data. Pen drives, DVDs, CD-ROMs, CD-Rs, magnetic tapes etc. are other
secondary storage devices. A CD-ROM can store 650 MB and more of data on a single
disk. Huge storage and fast retrieval capability makes computer a very special tool for
data processing and communications.
4. Versatility
Though computers are basically designed to carry out only arithmetic operations, yet they
are capable of performing almost any task that has a series of finite logical steps
5. Fatigue-free
Computer is free from fatigue. It does not get tired of work and never loses concentration.
It can perform basic arithmetic operations with the same degree of speed and accuracy
for any extent of time continuously, with the same amount of efficiency as the first
transaction.
6. Programmable
2
Computer can be programmed to function automatically and this differentiates it from
any other calculating device. It functions as programmed for any stretch of time until the
condition to terminate is satisfied.
7. Networking Capability
Categories of Computers
• Personal Computers
3
operating system (Mac OS). Two types of personal computers are desktop computers and
notebook computers.
Desktop Computer
Notebook Computers
4
A notebook computer, also called a laptop
computer, is a portable, personal computer often
designed to fit on your lap. Notebook computers are
thin and lightweight, yet they can be as powerful as
the average desktop computer. A netbook, which is
a type of notebook computer, is smaller, lighter,
and often not as powerful as a traditional notebook
computer. Most netbooks cost less than traditional
notebook computers. An ultra-thin is another type
of notebook computer that is lightweight and
usually less than one-inch thick. Some notebook
computers have touch screens, allowing you to interact with the device by touching the
screen, usually with the tip of a finger.
On a typical notebook computer, the keyboard is on top of the system unit, and the
monitor attaches to the system unit with hinges. These computers weigh on average from
2.5 to more than 10 pounds (depending on configuration), which allows users to transport
the computers from place to place. Most notebook computers can operate on batteries
or a power supply or both.
Tablet PC’s
5
Tablet PCs are useful especially for taking notes in lectures, at meetings, conferences, and
other forums where the standard notebook computer is not practical.
Mobile Devices
Mobile devices, which are small enough to carry in a pocket, usually do not have disk
drives. Instead, these devices store programs and data permanently on special memory
inside the system unit or on small storage media such as memory cards. You often can
connect a mobile device to a personal computer to exchange information between the
computer and the mobile device.
Some mobile devices are Internet-enabled, meaning, they can connect to the Internet
wirelessly. With an Internet-enabled device, users can chat; send e-mail and instant
messages, and access the Web. Because of their reduced size, the screens on mobile
devices are small, but usually are in color.
Popular types of mobile devices are smart phones and PDAs, e-book readers, handheld
computers, portable media players, and digital cameras.
6
Offering the convenience of one-handed
operation, a smart phone is an Internet-enabled
phone that usually also provides personal
information management functions such as a
calendar, an appointment book, an address book,
a calculator, and a notepad. In addition to basic
phone capabilities, a smart phone allows you to
send and receive e-mail messages and access the
Web — usually for an additional fee. Some smart
phones communicate wirelessly with other
devices or computers. Many also function as a
portable media player and include built-in digital
cameras so that you can share photos or videos
with others as soon as you capture the image.
Many smart phones also offer a variety of
application software such as word processing,
spreadsheet, and games, and the capability of
conducting live video conferences. Many smart
phones have keypads that contain both numbers
and letters so that you can use the same keypad to
dial phone numbers and enter messages.
7
E-Book Readers
Handheld Computers
8
A portable media player is a mobile device on which you can
store, organize, and play digital media. For example, you can
listen to music; watch videos, movies, and television shows; and
view photos on the device’s screen. With most, you download
the digital media from a computer to the portable media player
or to media that you insert in the device.
Digital Cameras
• Game Consoles
A game console is a mobile computing device designed for
single-player or multiplayer video games. Standard game
consoles use a handheld controller(s) as an input device(s);
a television screen as an output device; and hard disks,
optical discs, and/or memory cards for storage. Weighing on
average between two and nine pounds, the compact size of
game consoles makes them easy to use at home, in the car,
in a hotel, or any location that has an electrical outlet. Three
popular models are Microsoft’s Xbox 360, Nintendo’s Wii
(pronounced as wee), and Sony’s PlayStation 3.
9
A handheld game console is small enough to fit in one hand, making it more portable than
the standard game console. With the handheld game console, the controls screen, and
speakers are built into the device.
• Mainframe Computers
A mainframe is a large, expensive, powerful computer
that can handle hundreds or thousands of connected
users simultaneously. Mainframes store tremendous
amounts of data, instructions, and information. Most
major corporations use mainframes for business
activities. With mainframes, enterprises are able to
bill millions of customers, prepare payroll for
thousands of employees, and manage thousands of
items in inventory. One study reported that
mainframes process more than 83 percent of
transactions around the world.
Mainframes also can act as servers in a network
environment. Servers and other mainframes can access data and information from a
mainframe. People also can access programs on the mainframe using terminals or
personal computers.
• Supercomputers
A supercomputer is the fastest, most
powerful computer — and the most
expensive. The fastest supercomputers are
capable of processing more than one
quadrillion instructions in a single second.
With weights that exceed 100 tons, these
computers can store more than 20,000
times the data and information of an
average desktop computer. Applications
requiring complex, sophisticated
mathematical calculations use
supercomputers. Large-scale simulations and applications in medicine, aerospace,
10
automotive design, online banking, weather forecasting, nuclear energy research, and
petroleum exploration use supercomputer.
• Embedded Computers
An embedded computer is a special-purpose computer that functions as a component in
a larger product. Embedded computers are everywhere — at home, in your car, and at
work. The following list identifies a variety of everyday products that contain embedded
computers.
Because embedded computers are components in larger products, they usually are
small and have limited hardware. These computers perform various functions,
depending on the requirements of the product in which they reside. Embedded
computers in printers, for example, monitor the amount of paper in the tray; check
the ink or toner level, signal if a paper jam has occurred, and so on.
STORE
11
✓ The computer accepts input. Computer input is whatever is entered or fed into a
computer system. Input can be supplied by a person (such as by using a keyboard)
or by another computer or device (such as a diskette or CD-ROM). Some examples
of input include the words and symbols in a document, numbers for a calculation,
and instructions for completing a process, pictures, and so on.
✓ The computer performs useful operations, manipulating the data in many ways.
This manipulation is called processing. Examples of processing include performing
calculations, sorting lists of words or numbers, modifying documents and pictures
according to user instructions, and drawing graphs. A computer processes data in
the CPU.
o Process: A systematic series of actions a computer uses to
manipulate data.
✓ The computer stores data. A computer must store data so that it is available for
processing. Most computers have more than one location for storing data (the
hard drive or C:\, and the floppy drive or A:\). The place where the computer
stores the data depends on how the data is being used. The computer put the data
in one place while it is waiting to be processed and another place when it is not
needed for immediate processing. The storage of data in the computer is called
‘online storage’ while the storage of data on computer tapes, diskettes or CD-
ROMs is called ‘offline storage’.
COMPONENTS OF A COMPUTER
Computer System
All of the components of a computer system can be summarized with the simple
equations.
12
COMPUTER SYSTEM = HARDWARE + SOFTWARE + USER
Hardware, Software and Peopleware. The physical units of a computer system excluding
the third component), constitute its hardware. Hardware consists of mechanical,
electrical and electronic parts of the system. Sets of programmed instructions constitute
the software. Peopleware is the people element in the system.
COMPUTER SYSTEM
.
Computer System
• HARDWARE
A computer, like human brain, receives data and instructions, stores them and
processes the data according to the instructions given to it. It receives data from
input devices, stores them in memory and displays them through an output
device. The physical devices that make up a computer are referred to as
hardware. Computer hardware can be broadly' classified into two: CPU and
peripherals. The CPU is perhaps the most important part of a computer. The other
hardware pieces like input devices, output devices, etc. are called peripherals.
HARDWARE
13
CPU PERIPHERALS
2. COMPUTER PERIPHERALS
The input/output and storage devices surround the central processing unit (CPU).
Hence, they are called the peripheral devices. They are usually the
electromechanical devices connected to the CPU that exchange data and
programs with the CPU. The users interact with the CPU through these devices.
Thus, they act as interface between users and the CPU. The interaction is difficult
because of the language barrier. The CPU uses machine language, which is difficult
for most users. The input- output (I/0) devices help in taking the translated version
of the input to the machine's memory and similarly, to render the processed
symbols into the language of the user. During the first two decades of commercial
use of computers, 110 operations were performed mostly by punching holes on
cards and paper tape with a special device. More direct and convenient I/0 devices
have been developed since then. The peripherals connected directly to the CPU
are called online devices and devices not directly connected are called offline
devices.
These peripherals can be further divided into input devices, output devices and
secondary storage devices.
▪ INPUT DEVICES
Input devices allow the user to input data and instructions to the computer. There
are a variety of input devices. Direct entry of data generally requires a keyboard.
Any resource required for the functioning of a process, in the course of which it
will be transformed into one or more outputs. It may also use other devices for
direct data entry like a touch sensitive screen, voice recognition system and
scanners.
o Keyboard
14
Keyboard is the most popular input device for direct entry of data and
instructions into computer. The standard QWERTY keyboard is used for
computer. The enhanced keyboard has 101 keys.
▪ Alt key – Short for Alternate, this key is like a second control key.
▪ Arrow Keys – Most keyboards have four arrow keys that enable
you to move the cursor (or insertion point) up, down, right, or left.
Used in conjunction with the Shift or Alt keys, the arrow keys can
move the cursor more than one position at a time, but this depends
on which program is running.
15
▪ Backspace key – Deletes the character just to the left of the cursor
(or insertion point) and moves the cursor to that position.
▪ Caps Lock Key – A toggle key that, when activated, causes all
alphabetic characters to be uppercase.
▪ Ctrl key – Short for Control, this key is used in conjunction with
other keys to produce control characters. The meaning of each
control character depends on which program is running.
▪ Esc Key – Short for Escape, this key is used to send special codes to
devices and to exit (or escape) from programs and tasks.
16
o Mouse
A mouse is a small hand-held 'point and click'
device that is connected to the CPU through a
cable.
Douglas Engelbart invented mouse in 1963 at
Stanford Research Institute. Xerox Corporation's
Palo Alto Research Center enhanced its capabilities by adding analogue to
digital conversion. In the early 1970's. With the adoption of Graphical User
Interface technology, mouse became an essential input device for
computer later in the 1980's.
17
the computer with a mouse. Mechanical sensors within the mouse
detect the direction the ball is rolling and move the screen pointer
accordingly.
• Optomechanical mouse is more or less the same as the mechanical
mouse, but it uses optical sensors to detect motion of the ball.
• Optical mouse uses a laser to detect the mouse movement. The
mouse requires to be moved along a special mat with a grid so that
the optical mechanism has a frame of reference. Optical mouse is
more expensive than the other two.
18
Most current models of the PC mouse have
left and right buttons. Different menus
become available if you “click” or “right-
click” on a file or pull-down menu. The user
has options to set which menu appears
with a left or right click, as well as the
appearance of the pointer on the screen,
the speed of scrolling, etc. The cursor
typically takes the shape of an arrow when
you use it to point and click, and an
hourglass to indicate a program is loading
or operating. The cursor returns to an
arrow when you can take the next step.
Again, the user has the option of resetting
the shape of the mouse pointer.
o Light Pen
Light pen consists of a stylus connected by a cable
to the computer terminal. When the stylus is
brought into contact with the screen, a dot appears
there on the screen. By moving the stylus on the
screen, lines and curves can be drawn on the screen
that can be stored and used as input.
o Trackball
Trackball was originally built into the keyboard. Running a
hand over the trackball made the cursor on the screen to
move. The cursor is used to make selection from a menu
displayed on the computer screen.
o Joystick
19
Joystick is a small vertical stick attached to a trackball for
easier mechanical movements. It is used mainly in game
programs.
o Scanners
Scanners are direct-entry input devices. As the data entry is
automatic, the scanners ensure more accurate data entry.
These scanners include optical scanners and magnetic ink
character readers. The optical scanners use light for sensing
input and they include OCR, OMR and Barcode reader.
o Barcode Reader
Barcode is a set of small bars of varying thickness and
spacing printed on the packages of products, on the back
cover pages of books, tags etc. The barcode reader uses
an optical scanner to read product code and converts it
into electrical pulses. The device is connected to a
computer and the information read is passed to the
computer in digital form for automatic bill generation
and updating of files.
o Digital Cameras
20
Digital cameras are used to capture images and they can
record the images on reusable floppy disks. Images are
used with a digitizer for input to the computer. Once the
image input is stored in computer, the image can be
used in any application.
▪ OUTPUT DEVICES
Output device displays result of the computer processing for user. These are the
devices that allow information to be represented that is given out to the user, such
as a display screen or printer.
Visual display units (VDUs) are television-like screens that provide the
user-interface in the form of display of text, numbers and images. The
VDUs may be monochrome or color. The support of monochrome or color
and clarity of display depend on the type of video monitor and the video
adapter installed in the microcomputer.
Computer can produce verbal output where the output or response can be
standardized as replies to special requests for information. The unit
analyses the input and delivers the verbal reply by assembling the
responses from pre-recorded words and phrases.
o Printers
Printers are purely output devices. They produce hard copy output.
Computer printers vary widely in their technologies and capabilities. They
can be classified in a number of ways. First, they can be classified into three
broad groups: character printers, line printers and page printers. The
character printers print one character at a time. Dot matrix printer (DMP),
daisy wheel printer, thermal printer and inkjet printer are the various types
of character printers. Drum printer and chain printer are line printers.
Laser printer and magnetic printer are page printers.
21
They can also be classified into impact and non-impact printers based on
the basis of the printing mechanism. The impact printing technology uses
some mechanical pressure to produce images on paper. The impact
printers include dot matrix printer, daisy wheel printer and chain printer.
It is possible to take multiple copies of output with impact printers. Non-
impact printers do not use mechanical force to produce output on paper
and hence they can produce only single copy output.
• Inkjet Printer
22
• Laser Printer
• Drum Printer
• Magnetic Printer
23
• Graphic Plotters
▪ STORAGE DEVICES
Types of Memory:
o Random Access Memory (RAM) This means that any location in memory
may be accessed in the same amount of time as any other location.
Memory access means one of two things, either
the CPU is reading from a memory location or
the CPU is writing to a memory location. When
the CPU reads from a memory location, the
contents of the memory location are copied to
a CPU register. When the CPU writes to a
memory location, the CPU copies the contents
of a CPU register to the memory location,
overwriting the previous contents of the
location. The CPU cannot carry out any other
operations on memory locations.
24
It is also known as temporary holding area for data, application program
instructions, and the operating system. It is also known as a “Waiting
Room” for the computer’s processor. It holds raw data waiting to be
processed as well as the program instructions for processing that data.
• Static RAM (SRAM) The word static indicates that the memory retains its
contents as long as power is being supplied. However, data is lost when
the power gets down due to volatile nature. SRAM chips use a matrix of 6-
transistors and no capacitors. Transistors do not require power to prevent
leakage, so SRAM need not have to be refreshed on a regular basis .
25
• Read-Only-Memory (ROM) is used to store programs that are
essential for the proper operations of
computer system. ROM is non-volatile.
Many computers especially
microcomputers come equipped with ROM
chips that contain the operating system and
application programs. Programs stored in
ROM chips are often called firmware; that
is, software built into the hardware.
Note: RAM is empty and doesn’t contain any instruction for the microprocessor to execute. Now
ROM plays its parts. ROM contains a small set of instruction called the ROM BIOS (basic
input/output system). These instructions tell the computer how to access the hard disk, find the
operating system, and load it into RAM. After the operating system is loaded, the computer can
understand your input, display output, run software, and access your data .
o Magnetic Disks
Magnetic disks are made of rigid metals or synthetic plastic material. The
disk platter is coated on both the surfaces with magnetic material and both
the surfaces can be used for storage. The magnetic disk provides direct
access and is popular for both small and large computer systems. The
magnetic disk comes in two forms: hard disks and floppy disks.
26
• Hard drive: The storage area within the computer itself, where
megabytes of space are available to store bits of
information. Also known as a hard disk.
o Magnetic Tape
Magnetic tape is serial access storage medium. It can store large volume
of data at low costs. The conventional magnetic tape is in reels of up to
3600 feet made of mylar plastic tape. A continuous plastic strip covered
with magnetic oxide; the tape is divided into parallel tracks onto which
data may be recorded by selectively magnetizing parts of the surface, or
spots, in each of the tracks.
o Optical storage
Optical storage technology uses light as the medium for representing data.
It uses reflecting surfaces and laser technology to read and write data on
a disk. Also known as a laser disk. Commonly used optical storage devices
include CD-ROM, CD-R, CD-RW and DVD.
27
single side. Double-sided or dual layer DVDs are also available with
much larger storage capacity. DVD uses a 5-inch disc for storage.
Single layer, single-sided DVD has a storage capacity of 4.7 GB. With
double-layer, double sided disc, it can store 17 GB of data on a
single disk.
28
Chip: A small piece of semi-conducting material
(such as silicon) about 1 centimeter (¼ inch)
square on which an integrated circuit is
embedded. An integrated circuit is a number of
electronic components joined together to form
a path for electricity. Central processing unit
chips contain the circuits representing the CPU.
These features are designed to lessen the work of the CPU and produce
faster video and graphics.
29
Generally the GPU is connected to the CPU and is completely separate
from the motherboard. The random access memory (RAM) is connected
through the accelerated graphics port (AGP) or the peripheral component
interconnect express (PCI-Express) bus. Some GPUs are integrated into the
north bridge on the motherboard and use the main memory as a digital
storage area, but these GPUs are slower and have poorer performance.
Internal Component
o Motherboard
30
It is the main circuit board of a microcomputer. The motherboard contains
the connectors for attaching additional boards. Typically, the
motherboard contains the CPU, BIOS, memory, storage
interfaces, serial and parallel ports, expansion slots, and all the
controllers required to control standard peripheral devices, such as
the display screen, keyboard, and disk drive. Collectively, all these chips
that reside on the motherboard are known as the motherboard's chipset.
o Expansion Slots
The expansion card has an edge connector that fits precisely into the
expansion slot as well as a row of contacts that is designed to establish an
electrical connection between the motherboard and the electronics on the
card, which are mostly integrated circuits .
31
An interface specification developed
by Intel Corporation. AGP is based
on PCI, but is designed especially for
the throughput demands of 3-D
graphics. Rather than using the PCI
bus for graphics data, AGP introduces
a dedicated point-to-point channel so
that the graphics controller can
directly access main memory. The AGP channel is 32 bits wide and runs at
66 MHz. This translates into a total bandwidth of 266 MBps, as opposed to
the PCI bandwidth of 133 MBps. AGP also supports two optional faster
modes, with throughputs of 533 MBps and 1.07 GBps. In addition, AGP
allows 3-D textures to be stored in main memory rather than video
memory.
o Network Card
o Graphic Card
o Memory Slots
32
A memory slot, memory socket, or RAM slot is what
allows computer memory (RAM) to be inserted into
the computer. Depending on the motherboard, there
may be 2 to 4 memory slots (sometimes more on
high-end motherboards) and are what determine the
type of RAM used with the computer.
The most common types of RAM are SDRAM and DDR for desktop
computers and SODIMM for laptop computers, each having various types
and speeds. The picture above is an example of what memory slots may
look like inside a desktop computer. In this picture, there are three open
available slots for three memory sticks.
o Cooling Fan
o Power Supply
33
electrical systems. Not all power supplies, however, do an adequate voltage-
regulation job, so a computer is always susceptible to large voltage
fluctuations.
o Ports
34
Republic of the Philippines
Nueva Ecija University of Science and Technology
Cabanatuan City
Activity # 1
STRICTLY NO ERASURE.
35
______________________7. It is a mobile computing device designed for single-
player or multiplayer video games.
A. Characteristics of a Computer
1.
2.
3.
4.
5.
6.
7.
B. Categories of Computer
8.
9.
10.
11.
12.
13.
36
17.
Activity # 2
STRICTLY NO ERASURE.
___________________2.A device that allows the user to input data and instructions to
the computer.
___________________3. Inventor of mouse.
37
___________________6. A device that displays the result of the computer processing for
user.
___________________7. It produces hard copy output
38
________ 1. It is used for plotting graphs and designs A.
on paper.
39
Name: ______________________________ Score: __________
Yr. & Sec. ________________ Date: ___________
Activity # 3
STRICTLY NO ERASURE.
40
___________________9. It is a storage technology that stores data in erasable,
rewriteable circuitry, rather than on spinning disks or streaming tape.
___________________10. An optical disk with double-layer, double sided disc, that can
store up to 17 GB of data on a single disk.
1. RAM - ________________________________________________________.
2. NIC - _________________________________________________________.
3. DVD - _________________________________________________________.
4. CMOS - ________________________________________________________.
5. AGP - ________________________________________________________.
41
6. CD-R - _________________________________________________________.
7. CPU - __________________________________________________________.
8. PSU - __________________________________________________________.
9. GPU - ______________________________________________________.
42
Chapter 2
Computer Software
Computer needs to be given instructions to perform any task. A set of instructions for a
specific task is termed a routine and a complete set of instructions to execute a related
set of tasks is a program.
Software, also called a program, consists of a series of related instructions, organized for
a common purpose, that tells the computer what tasks to perform and how to perform
them. You interact with a program through its user interface. The user interface controls
how you enter data and instructions and how information is displayed on the screen.
Software today often has a graphical user interface. With a graphical user interface (GUI)
(pronounced as gooey), you interact with the software using text, graphics, and visual
images such as icons. An icon is a miniature image that represents a program, an
instruction, or some other object. You can use the mouse to select icons that perform
operations such as starting a program. Computer programs or software can be divided
into two major categories: systems software and applications software.
Computer Software
Application Software
Application software consists of programs designed to make users more productive and/
or assist them with personal tasks. A widely used type of application software related to
communications is a Web browser, which allows users with an Internet connection to
access and view Web pages or access programs. Other popular application software
includes word processing software, spreadsheet software, database software, and
presentation software. Many other types of application software exist that enable users
43
to perform a variety of tasks. These include personal information management, note
taking, project management, accounting, document management, computer aided design,
desktop publishing, paint/image editing, photo editing, audio and video editing,
multimedia authoring, Web page authoring, personal finance, legal, tax preparation, home
design/landscaping, travel and mapping, education, reference, and entertainment (e.g.,
games or simulations, etc.).
✓ Spreadsheets
✓ Data Management
✓ Word Processing
Word processing software allows the user to manipulate text rather than just
numbers. Modern word processors contain many productive writing and
editing features. A typical word processing software package consists of an
integrated set of programs including an editor program, a formatting
program, a print program, a dictionary, a thesaurus, a grammar checker, a
mailing list program, and integrated graphics, charting, and drawing
44
programs. WYSIWYG (an acronym for What You See Is What You Get,
pronounced “wiz-e-wig”) word processors have the added advantage of
displaying the text material on the screen exactly—or almost exactly—as it
will look on the final printed page (based on the type of printer connected to
the computer). Word processing software enables users to be much more
productive because the software makes it possible to create and modify the
document electronically in memory.
✓ Desktop Publishing
✓ Multimedia
Multimedia software combines at least two media for input or output of data.
These media include audio (sound), voice, animation, video text, graphics,
and images. Multimedia can also be thought of as the combination of spatial-
based media (text and images) with time-based media (sound and video).
✓ INTERNET BROWSER
45
A web browser is a software application which enables a user to display and interact with
text, images, videos, music, and other information that could be on a website. Text and
images on a web page can contain hyperlinks to other web pages at the same or different
website. Web browsers allow a user too quickly and easily access information provided on
many web pages at many websites by traversing these links. Web browsers format HTML
information for display so the appearances of a web page many differs between browsers.
The file format for a web page is usually HTML (hyper-text markup language) and is identified
in the HTTP protocol. Most web browsers also support a variety of additional formats, such
as JPEG, PNG, and GIF image formats, and can be extended to support more through the use
of plug ins. The combination of HTTP content type and URL protocol specification allows web
page designers to embed images, animations, video, sound, and streaming media into a web
page, or to make them accessible through the web page.
POPULAR BROWSERS
▪ Firefox
46
Some of Firefox’s most prominent features include: tabbed browsing, a spell
checker, incremental find, live bookmarking, a download manager, and an
integrated search system that uses the user’s favorite search engine. Like
mentioned before, one of the best things about Firefox is its vast amount of
plug ins/add-ons.
▪ Internet Explorer
IE almost fully supports HTML 4.01, CSS Level 1, XML 1.0, and DOM Level 1.
It has introduced a number of proprietary extensions to many of the
standards. This has resulted in a number of web pages that can only be
viewed properly using IE. It has been subject to many security vulnerabilities
just like Windows has. Much of the spyware, adware, and viruses across the
Internet are made possible by exploitable bugs and flaws in the security
architecture of IE. These are drive-by downloads come into play
(see computer security lesson for more details on that).
▪ Safari
▪ Opera
47
Opera (created by the Opera
Software company) is another
fairly popular web browser. It
handles common Internet-
related tasks. Opera also
includes features such as tabbed
browsing, page zooming, mouse
gestures, and an integrated
download manager. Its security
features include phishing and
malware protection, strong encryption when browsing secure web sites, and
the ability to easily delete private data such as cookies and browsing history.
Opera runs on Windows, OS X, and Linux.
There are many Internet browsers, all with a number of versions each.
Therefore, it is difficult to show steps for all of them. The following sections
contain information on how to change the homepage for those that are the
most popular. With a little intuition, you should be able to change your the
default home page; even if your version isn't listed. To proceed, select your
browser from the list below and follow the steps.
o Internet Explorer
1. Open the Microsoft Internet Explorer browser.
48
o Mozilla Firefox
1. Open the Mozilla Firefox browser.
o Chrome
1. Open the Chrome browser.
Tip: If you would like the page you have open set as your home page, click the Use Current button.
Tip: To see if your new home page has en set correctly, click Home icon.
SYSTEM SOFTWARE
System software is consists of programs that control or maintain the operations of the
computer and its devices. System software serves as the interface between the user, the
application software, and the computer’s hardware. It comprises programs designed to
coordinate the operations of the computer system. It manages the hardware, software
and data resources of the computer system. It includes three types of programs: system
management programs, system support programs and system development programs.
49
These are programs that support efficient operation of a computer. They provide a
variety of support services to users and management of computer system. These
support services include utility programs, security monitors and performance
monitors. Utility software consist of programs that are very frequently requested by
many application programs like programs for transferring data from one medium to
another, formatting disk, backing up and sorting of files.
❖ Utility Software
A utility program allows a user to perform maintenance-type tasks usually
related to managing a computer, its devices, or its programs. For example, you
can use a utility program to transfer digital photos to an optical disc. Most
operating systems include several utility programs for managing disk drives,
printers, and other devices and media. You can also buy utility programs that
allow you to perform additional computer management functions.
Examples of utility programs are antivirus software, backup software and disk
tools. Let's look at each of these in a bit more detail.
✓ Antivirus or anti-virus software (often abbreviated as AV),
sometimes known as antimalware software, is computer software
used to prevent, detect and remove malicious software. Antivirus
(or anti- virus)software is used to safeguard a computer from
malware, including viruses, computer worms, and Trojan horses.
Antivirus software may also remove or prevent spyware and
adware, along with other forms of malicious programs. Free
antivirus software generally only searches your computer using
signature-based detection which involves looking for patterns of
data that are known to be related to already-identified malware.
Paid antivirus software will usually also include heuristics to catch
new, or zero-day threats, by either using genetic signatures to
identify new variants of existing virus code or by running the file in
a virtual environment (also called a sandbox), and watching what it
does to see if it has malicious intent.
Definition of computer virus A computer virus is a program or piece
of code that is loaded onto your computer without your knowledge
and runs against your wishes. Viruses can also replicate themselves.
All computer viruses are man-made. A simple virus that can make a
50
copy of itself over and over again is relatively easy to produce. Even
such a simple virus is dangerous because it will quickly use all
available memory and bring the system to a halt. An even more
dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems.
In computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. A computer virus is a
program designed to harm or cause harm on an infected computer.
Its spreads through e-mail attachments, portable devices, websites
containing malicious scripts and file downloads. A computer virus
attaches itself to the host files and always activate whenever you
open the infected files. The virus can replicate itself and then infect
the other files on your computer causing more damage.
Types of computer virus
o Resident Viruses This type of virus is a permanent
which dwells in the RAM memory. From there it can
overcome and interrupt all of the operations
executed by the system: corrupting files and
programs that are opened, closed, copied, renamed
etc.
o Multipartite Viruses Multipartite viruses are
distributed through infected media and usually hide
in the memory. Gradually, the virus moves to the
boot sector of the hard drive and infects executable
files on the hard drive and later across the computer
system.
o Direct Action Viruses The main purpose of this virus
is to replicate and take action when it is executed.
When a specific condition is met, the virus will go into
action and infect files in the directory or folder that it
is in and in directories that are specified in the
AUTOEXEC.BAT file PATH.
This batch file is always located in the root directory
of the hard disk and carries out certain operations
when the computer is booted.
51
o Overwrite Viruses Virus of this kind is characterized
by the fact that it deletes the information contained
in the files that it infects, rendering them partially or
totally useless once they have been infected.
The only way to clean a file infected by an overwrite
virus is to delete the file completely, thus losing the
original content.
o Boot Virus This type of virus affects the boot sector
of a floppy or hard disk. This is a crucial part of a 34
disk, in which information on the disk itself is stored
together with a program that makes it possible to
boot (start) the computer from the disk.
o Directory Virus Directory viruses change the paths
that indicate the location of a file. By executing a
program (file with the extension .EXE or .COM) which
has been infected by a virus, you are unknowingly
running the virus program, while the original file and
program have been previously moved by the virus.
Once infected it becomes impossible to locate the
original files.
o Encrypted Viruses This type of viruses consists of
encrypted malicious code, decrypted module. The
viruses use encrypted code technique which make
antivirus software hardly to detect them. The
antivirus program usually can detect this type of
viruses when they try spread by decrypted 35
themselves.
o Network Virus Network viruses rapidly spread
through a Local Network Area (LAN), and sometimes
throughout the internet. Generally, network viruses
multiply through shared resources, i.e., shared drives
and folders.
o Worms A worm is technically not a virus, but a
program very similar to a virus; it has the ability to
self-replicate, and can lead to negative effects on
52
your system and most importantly they are detected
and eliminated by antiviruses.
o Trojans or Trojan Horses Another unsavory breed of
malicious code (not a virus as well) are Trojans or
Trojan horses, which unlike viruses do not reproduce
by infecting other files, nor do they self-replicate like
worms.
These programs help users and system developers in designing and building
systems. They help in developing programs and procedures and prepare programs for
computer processing. These include language translators, programming tools and
Computer Aided Software Engineering (CASE) packages. Language translator is a piece
of system software that translates application programs written in a high level
language such as C,C++ and FORTRAN into machine language. The language translators
53
may be assemblers, compilers or interpreters. It has made programming easier, more
enjoyable, and portable across computers.
❖ Compiler and Interpreter: High level languages are widely used. They have
been developed to enable the users to program the machines in a language
similar to the language of the users. For example BASIC, Pascal, C and Java use
scientific notations and subroutines in programming formats that are similar to
mathematical formulas and equations. On the other hand, COBAL contains
business jargons widely used in business.
54
Comparisons of Compiler and Interpreter:
Compiler Interpreter
Compiler prepares an object program from Interpreter translates and immediately executes
source program each instruction of the source program
It is a debugging tool and is useful during program
Debugging is complex and time consuming
developing stage
Lower execution time Higher execution time
Requires higher program development Requires less program development effort and
effort and time time
These programs manage the hardware, software and data resources of the computer
system. It includes operating system, database management system (DBMS) and
telecommunication monitors. An operating system is a set of programs that
coordinates all the activities among computer hardware devices. It provides a means
for users to communicate with the computer and other software. DBMS is a set of
programs that controls creation, maintenance and use of database. It allows different
applications to share data and programs concurrently. It also secures data in the
database from misuses. DB2, Oracle, MS SQL Server etc. are some of the examples of
database management systems.
❖ OPERATING SYSTEM
55
Tasks performed by an operating system:
o Process Management
o Memory Management
o Device Management
✓ Single-user OS expects to deal with one set of input devices those that can be
controlled by one user at a time
56
✓ Server OS provides tools for managing distributed networks, e-mails servers,
and Web hosting sites.
It can be defined as the combination of hardware and software that helps people
and computer communicate with each other. A computer’s user interface includes a
display device, mouse, and keyboard that allow viewing and manipulating computing
environment. Originally, computers had a command-line interface that required users
to type memorized commands to run programs and accomplish tasks. Command-line
user interface can be accessed from most operating systems, including Windows and
Mac OS.
Most computer today feature a graphical user interface, abbreviated as GUI and
pronounced as “gooey” or “gee you eye”. A graphical user interface provides a way to
point and click a mouse to select menu options and manipulate graphical objects
displayed in the screen.
57
communicate with the CPU, the disk drives and the printer, and manage these
resources efficiently.
Lay out:
Directory
C:\ CICT
A
Root Directory
Sub-directories
B
Commands in DOS
▪ Dir This command lists the contents of a directory in the hard disk
or floppy disk.
✓ Dir/p The /p option is used to list the contents page wise, one
screen at a time.
✓ Dir/w This option lists contents width wise.
✓ Dir [drive] to list the contents of another directory.
Example dir a: This command lists all the files in drive A while
remaining in drive C.
✓ Dir *. <extension> This lists all files with the extension specified
Example dir *.exe lists all files with extension 'exe'.
58
If you create a subdirectory in the directory EMPLOYEE such as salary by giving
the command: MD EMPLOYEE
and then typing
CD EMPLOYEE
MD SALARY
CD SALARY
Now, DOS will show the prompt as: C:\EMPLOYEE\SALARY>
If you want to go back one directory, the command is: CD..
But this command will work only if the subdirectory SALARY is empty and the
command is issued from outside the Salary subdirectory; that is, all files should
be deleted before removing the subdirectory by DEL command and move to its
parent directory.
▪ UNIX
UNIX was developed by AT&T's Bell Labs in 1969 by Kenneth Thompson and Dennis
Ritchie, system engineers at AT&T's Bell Labs. It went through many revisions and
gained in popularity until 1977, when it was first made commercially available by
Interactive Systems Corporation. It is widely used in multi-user systems. It is a
powerful operating system with multitasking, 78 Computer Software
multiprogramming and interactive features.
59
▪ OS/2
OS/2 Warp is bundled with a bonus pack that includes a number of applications like
a word processor, a spreadsheet, personal information manager and easy Internet
access and other online services.
▪ Windows
60
Microsoft Windows uses DOS operating system. It employs graphic user
interface (GUI) technology. A GUI acts as a translator allowing the user and the
computer to communicate with each other in a way that is easy for both to
understand. The users can activate programs from windows by clicking on icons or
symbols appearing on the monitor. An icon is a picture appearing on the screen
that represents an action or application that the computer can implement. It
requires a mouse to run. Multiple windows open multiple applications that are
invoked. Windows is a highly integrated environment in which different
applications have the same 'look and feel', so users familiar with one application
can easily work in other applications. Example, the icons for printing and saving file
are the same in Excel, Word, Access and PowerPoint.
Windows Versions
61
• 1990 – 1994 Windows 3.0 – Windows NT
This is the era of fax/modems, email, the new online world, and
dazzling multimedia games and educational software. Windows 95
has built-in Internet support, dial-up networking, and new Plug and
Play capabilities that make it easy to install hardware and software.
The 32-bit operating system also offers enhanced multimedia
capabilities, more powerful features for mobile computing, and
integrated networking.
62
• 1998 – 2000 Windows 98 , Windows 2000, Windows ME
With Windows 98, you can find information more easily on your PC
as well as the Internet. Other improvements include the ability to
open and close programs more quickly, and support for reading DVD
discs and universal serial bus (USB) devices. Another first
appearance is the Quick Launch bar, which lets you run programs
without having to browse the Start menu or look for them on the
desktop.
63
updates. Consumers begin to understand warnings about suspicious
attachments and viruses. There’s more emphasis on Help and
Support.
64
• 2012 – 2013 Windows 8
Windows 8 is a re-imagined
operating system, from the chipset
to the user experience, and
introduces a totally new interface
that works smoothly for both touch
and mouse and keyboard. It
functions as both a tablet for
entertainment and a full-featured PC
for getting things
done. Windows 8 also includes enhancements of the familiar
Windows desktop, with a new taskbar and streamlined file
management.
65
Bing Smart Search so you can find what you're looking for across the
PC or the web, a Start button to navigate between the desktop and
Start Screen, and more flexible options for viewing multiple
applications at once on one or all screens. There are also several
new built-in apps such as Bing Food & Drink, Bing Health & Fitness,
and great utility apps like Reading List, Calculator, and Alarms. Many
of the great apps shipped in Windows 8 are back and even better,
making your experience more enjoyable right from the start.
Windows desktop
The windows desktop is the base of operations for using your computer. It
displays small pictures called icons that helps you access software,
documents and the components of your computer system.
Two key programs for file management are available with windows:
(1) My Computer
(2) The Windows Explorer.
Each of these programs gives a picture of the files – documents, data and
program files that are stored on the various computer disks. You have a choice of
“VIEWS” or ways of displaying the information, using large or small icons, with or
without details. Either program can be used to copy, move, delete and open
66
programs and documents. My Computer looks at a particular location on the
computer and displays all the folders and files.
My Computer:
View button
In this example of My Computer, the disks and folders are displayed as large
icons. You can switch the
67
type of display using the
“VIEWS” button on the
Menu bar.
By right-clicking on a drive
and selecting “Properties”
you get the following:
68
The left-hand side of the explorer window The right-hand side of the explorer lists the files and
displays a tree-diagram of the disk drives, sub-folders in the selected drive\directory.
with folders displayed.
In this example, the VIEW has been set on“Details.” A
Clicking on the + beside a folder or disk drive small icon to represent the file application type is
will display all subfolders. followed by the full file name.The file size, type and
date/time saved are also listed.
An open folder on the left indicates the
folder whose contents are displayed on the By clicking a column heading bar (Name, Size, Type or
right-hand side of the screen. Modified) you can sort the file listing alphabetically
(Name), by Size, by type of file, or by date/time last
saved. A second click reverses the order. This feature
makes it easy to find files.
69
▪ Linux
The Linux OS is frequently packaged as a Linux distribution for both desktop and
server use, and includes the Linux kernel (the core of the operating system) as well as
supporting tools and libraries. Popular Linux OS distributions include Debian, Ubuntu,
Fedora, Red Hat and openSUSE.
▪ Android
70
Android applications. Android OS version varies from 1.0 to 4.2 Jellybean (July 2012).
Notice carefully you can see all the OS names are desserts, but still the naming reason
is not released by Google and the names are alphabetically ordered, starting from 1.5
Cupcake to 5.0 Lollipop (C-L).
▪ IOS
71
Originally known as the iPhone OS, the iOS is the
name of the operating system that runs on Apple
iPhone, iPad, and le iPad Touch devices given to
the devices by Steve Jobs during the 2010 WWDC.
The iOS is one of the most used platforms for
mobile devices, only slightly edged out
by Android from Google. The user interface of iOS
is based on the concept of direct manipulation,
using multi-touch gestures. Interface control
elements consist of sliders, switches, and buttons.
Interaction with the OS includes gestures such
as swipe, tap, pinch, and reverse pinch, all of
which have specific definitions within the context
of the iOS operating system and its multi-touch
interface. Internal accelerometers are used by
some applications to respond to shaking the
device (one common result is the undo command)
or rotating it in three dimensions (one common result is switching from portrait to
landscape mode).
Apple provides major updates to the iOS operating system approximately once a
year via iTunes and also, for devices that came with iOS version 5.0 or later, over the
air. The latest version is iOS 8, which is available for the iPhone 4S, iPhone 5,iPhone
5C, iPhone 5S, iPhone 6, iPhone 6 Plus, iPad 2, the third and fourth generation iPad,
the first and second generation iPad Air, the first, second and third generation iPad
Mini, and the fifth generation iPod Touch. The OS update was released on September
17, 2014.
People ware
Every day, people around the world rely on different types of computers for a variety
of applications. To illustrate the range of uses for computers, this section takes you on a
visual and narrative tour of five categories of users:
• Home user
• Small office/home office (SOHO) user
72
• Mobile user
• Power user
• Enterprise user
❖ Home User
In an increasing number of homes, the
computer no longer is a convenience. Instead,
it is a basic necessity. Each family member, or
home user, spends time on the computer for
different reasons that include personal
financial management, Web access,
communications, and entertainment.
73
services and may provide a means for taking orders. Small business Web
sites sometimes use a Web cam to show the world a live view of some
aspect of their business.
❖ Mobile User
Today, businesses and schools are
expanding to serve people across the
country and around the world. Thus,
increasingly more employees and
students are mobile users, who work
on a computer or mobile device
while away from a main office, home
office, or school. Examples of mobile
users are sales representatives, real
estate agents, insurance agents,
meter readers, package delivery
people, journalists, consultants, and
students.
❖ Power User
Another category of user, called a power user,
requires the capabilities of a workstation or
other type of powerful computer. Examples of
power users include engineers, scientists,
architects, desktop publishers, and graphic
artists. Power users often work with
multimedia, combining text, graphics, audio,
and video into one application. These users
74
need computers with extremely fast processors because of the nature of
their work.
❖ Enterprise User
An enterprise has hundreds or thousands of
employees or customers that work in or do
business with offices across a region, the
country, or the world. Each employee or
customer who uses a computer in the
enterprise is an enterprise user. Many large
companies use the words, enterprise
computing, to refer to the huge network of
computers that meets their diverse computing needs. The network
facilitates communications among employees at all locations.
75
Republic of the Philippines
Nueva Ecija University of Science and Technology
Cabanatuan City
Activity # 1
STRICTLY NO ERASURES
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
__________________________2.
2 types of Software
__________________________3.
76
__________________________10. A software that helps protect a computer system from
viruses.
C. Types of Software
8.
9.
77
Republic of the Philippines
Nueva Ecija University of Science and Technology
Cabanatuan City
Activity # 2
I. Identification: Identify the following.
__________________4. It is also the native browser on the iPhone and iPod touch.
78
Republic of the Philippines
Nueva Ecija University of Science and Technology
Cabanatuan City
Activity # 3
I. Identification: Identify the following. Write your answer on the space provided
before each number. (20 pts.)
________________5. Part of a window that contains the start button and notification
area.
________________6. It provides a tree diagram structure to indicate the storage
relationships among files and folders.
________________7.
Two type of User interface
________________8.
________________9. Interface that provides a way to point and click a mouse to select
menu options and manipulate graphical objects displayed on the screen.
79
II. Enumerate the following
A. Example of OS
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
C. Types of Malware
16.
17.
18.
19.
20.
80
REFERENCE :
81