Information Technology Code: GEN201 Lecture Notes: Prof. Dr. Mohamed Anwar
Information Technology Code: GEN201 Lecture Notes: Prof. Dr. Mohamed Anwar
Code : GEN201
Lecture Notes
BY
Concepts of Information
Technology (IT)
Contents
1. General concepts
2. Hardware
3. Software
4. Information networks
5. The use of IT in everyday life
6. Health, Safety and Environment
7. Security
8. Copyright and the law
9. Abbreviations and terminology
Grading System
• Attendance10
• Midterm Exam 1 15
• Midterm Exam 2 15
• Reports 10
Class
Work
Final
• 50
4
Introduction
What is a Mac?
• In the early days the thing which really
distinguished the Mac over the PC was the GUI
(Graphical User Interface), or in plain English
the way you could use the mouse to drive the
computer.
• In the early days of the PC, you really had to be
a bit of an expert to use and maintain your PC.
• Recently the differences between the PC and the
Mac have blurred, with Microsoft buying a
stake in Apple.
1.1 Types of Computers
7
25
1.2 Main parts of personal Computer
The System Unit
The "system unit" is the name given to the main PC
box which houses the various elements which go
together to make up the PC.
For instance within the system unit is the computer
system's motherboard, which contains all the main
components, such as the CPU.
1.2 Main parts of personal Computer
24
1.2 Main parts of personal Computer
The CPU
• Thus, a 2 GHz Pentium is much faster than say a
1 GHz Pentium CPU.
• It is the CPU which performs all the calculations
within the computer, when running programs
such as word-processors, spreadsheets and
databases.
1.2 Main parts of personal Computer
Memory (RAM)
• The RAM (Random Access Memory) within your
computer is where the operating system is loaded to
when you switch on your computer and also where your
applications are copied to when you start an application,
such as a word processor or database program.
1.2 Main parts of personal Computer
Memory (RAM)
• When you create data, (e.g. letters and pictures),
these are initially created and held in RAM and
then copied to disk when you save the data.
• As a rule of thumb, the more RAM you have
installed in your computer the better.
• These days you will commonly find over 1
Gigabytes of RAM installed.
1.2 Main parts of personal Computer
ROM-BIOS
• The ROM-BIOS (Read Only Memory - Basic Input
Output System) chip is a special chip held on your
computer's system (mother) board.
• It contains software which is required to make your
computer work with your operating system, for instance
it is responsible for copying your operating system into
RAM when you switch on your computer.
1.2 Main parts of personal Computer
Serial Port
• The serial port is a socket located at the back of
your computer which enables you to connect
items to the computer, such as a modem.
• They are commonly labelled as COM1 or COM2.
1.2 Main parts of personal Computer
Parallel Port
• The parallel port is a socket located at the back of
your computer which enables you to connect
items to the computer, such as a printer. It is
commonly labelled as LPT1 or LPT2.
1.2 Main parts of personal Computer
Universal Serial Bus (USB)
• The Universal Serial Bus is a relatively new item within
the PC.
• You will see one or more USB sockets at the back of the
system unit, allowing you to plug in devices designed
for the USB.
• These devices include printers, scanners and digital
cameras.
1.2 Main parts of personal Computer
What are input devices?
• Input devices allow you to input information to the
computer and include things such as the keyboard and
mouse.
What are output devices?
• Output devices allow you to output information from the
computer and include the printer and the monitor.
What is a peripheral device?
• A peripheral device is any device which you can attach
to your computer.
• Thus, you could attach a scanner or modem to the back
of your system unit.
1.2 Main parts of personal Computer
The Keyboard
• An Input device. The keyboard allows you to type
information into the computer.
• It has evolved over the years and many people now use a
Microsoft style keyboard, which has additional keys
designed to make Microsoft Windows easier to use.
The Mouse
• An Input device.
• When using an operating system, such as Microsoft
Windows, you use the mouse to select drop down
menus, to point and click on items, to select items and to
drag and drop items from one place to another.
1.2 Main parts of personal Computer
CD
• Most computers are now supplied with a CD-ROM
(Compact Disc - Read Only Memory) drive.
• CD-ROM discs look exactly like music CDs but contain
computer data instead of music.
• The advantage of a CD-ROM is that it can hold a vast
amount of data (equivalent to the storage capacity of
over 450 floppy disks).
• The other big advantage of CD-ROMs is that they are
interchangeable.
• This means that you can own a range of different CD-
ROMs and choose which one to insert into your CD-
ROM drive.
1.2 Main parts of personal Computer
DVD Drives
• Short for "Digital Versatile Disk”.
• Similar to CD-ROM drives but allows you to use DVD
disks, which contain vastly more information than a
traditional CD-ROM disk.
• These also transfer the data from the disk to the
computer far faster, allowing you to watch movies on
your computer screen.
• A CD-ROM can store 650 MB of data, while a single-
layer, single-sided DVD can store GB of data.
• The two-layer DVD standard allows a capacity of GB.
• A double-sided DVD increases the storage capacity to
17 GB (or over 25 times the data storage capacity of a
CD-ROM).
1.2 Main parts of personal Computer
Floppy disk
• Floppy disks are also known as diskettes.
• They are very slow compared to hard disks or
CD-ROMs, and hold relatively small amounts of
data (1.44 Mbytes).
• Sometimes people will backup (i.e. copy)
important data from their hard disk to floppy
disks.
• However, as diskettes are notoriously unreliable
this is not the best way of backing up valuable
data (but is better than nothing).
1.2 Main parts of personal Computer
Zip Disc
• A Zip disk is like a bigger version of the floppy
disk, the main difference being that a single Zip
disk can hold up to 250 Mbytes of data.
• They also offer increased speed compared to the
old floppy disk.
1.2 Main parts of personal Computer
Hard (Fixed) Disk
• Hard disks are the main, large data storage area within
your computer.
• Hard disks are used to store your operating system, your
application programs (i.e. your word processor, games
etc) and your data.
• They are much faster than CD-ROMs and floppy disks
and can also hold much more data.
• The picture shows the inside of a hard disk (which you
would not normally see).
• Hard disks are installed within the system unit of your
computer.
1.2 Main parts of personal Computer
Hard (Fixed) Disk
1.2 Main parts of personal Computer
The Monitor
• An output device.
• The monitor is the TV type screen on which you view your
programs.
• They are supplied in different sizes, common sizes range
from 15" to 21" screens.
• You should be aware that poor quality or badly maintained
monitors could harm your eyesight.
1.2 Main parts of personal Computer
Sound cards and speakers
• Many computers are now supplied with sound cards and
speakers which means that when you run 'multi-media'
programs, you can listen to sounds which are played
back via your computer.
• If you have a microphone and suitable software, you can
also record sounds.
1.2 Main parts of personal Computer
Sound cards and speakers
• You can even purchase special software which
will allow you to talk to your computer and get
the computer to type the words you have spoken
on your screen.
• In time, this type of software may replace the
keyboard.
1.2 Main parts of personal Computer
Modems
• A modem is a device which is used to attach your
computer to the telephone system.
• The modem converts data into sound which is
sent over the telephone line, the receiving modem
turns the sounds back into data.
1.2 Main parts of personal Computer
Modems
• If you wish to connect to the Internet, you will
need a modem (or equivalent device).
• Modems used to be large boxes that you had to
plug into the computer, but now modems boxes
have become very small and in many cases the
modem is actually inside the computer.
• If you are using ISDN or broadband then you will
use another device similar to a modem
1.2 Main parts of personal Computer
Printers
• Most data is printed once you have created it and
there are a vast number of different printers
available to accomplish this.
• Most common are ink jet and laser printers both
of which can now produce colored output (at a
cost).
1.2 Main parts of personal Computer
Multifunction Printer
Plotter
19
1.2 Main parts of personal Computer
Scanners
• Scanners allow you to scan printed materials into
your computer, which can then be stored within
the computer.
• These pictures can then be altered, resized and
printed as required.
1.2 Main parts of personal Computer
Recordable CDs
• CD-ROMs are read-only devices, but increasingly people are
purchasing a special type of CD drive unit which allows you to
record data, music or video to your own CDs.
• These devices require the purchase of special CDs to which you
can write, called CD-R (Compact Disc – Recordable).
Tape backup
• A tape backup unit allows for regular backing up of your data.
• These tapes can store a vast amount of data at a low cost.
• DAT (Digital Audio Tape) devices are commonly used for
backups.
• The DAT tapes which are used can backup enormous amounts of
data (i.e. over 4 GBytes per tape).
• The devices are also fast and reliable.
1.2 Main parts of personal Computer
What is PCMCIA?
• Portables by their very nature are very compact and
require smaller than standard parts such as hard disks
and CD-ROM drives.
• Many portables are supplied with special adaptor sockets
which enable what are called PCMCIA compatible
hardware to be connected to them.
• PCMCIA components tend to be more expensive than
standard computer parts which are designed for more
bulky desktop computers.
1.3 Computer Performance
Factors affecting performance
1. CPU Clock speed:
• The computer clock speed governs how fast the CPU
will run.
• The higher the clock speed the faster the computer will
work for you.
• The clock speed is given in megahertz (MHz).
• The original IBM PC ran at 4.77 MHz whereas modern
PCs will run at over 4000 MHz, which gives you an
idea of how far things have progressed.
• The higher the MHz speed the faster the computer.
1.3 Computer Performance
Factors affecting performance
2. RAM size :
• As a rule the more memory you have the faster the PC will
appear to operate.
• Windows also uses the hard disk a lot, so logically the faster the
hard disk can operate then again the faster the PC will appear to
run.
3. Hard disk speed and storage:
• Hard disks are also measured by their speed, defined by the disk
access time, which is measured in milliseconds.
• The smaller this access time the faster the hard disk will store or
retrieve data.
• The data storage capacity of hard disks continues to increase as
new products are released.
• The disk storage capacity is measured in Gigabytes (GBytes).
• 1 GByte is equivalent to 1024 Mbytes.
1.3 Computer Performance
Factors affecting performance
4. Free Hard Disk Space:
• To get the most out of your Windows based PC, you
not only need a fast hard disk but also a large hard disk
with plenty of "spare space".
• This is due to the fact Windows is constantly moving
data between the hard disk and RAM (Random Access
Memory).
• Microsoft Windows will create many so-called
“temporary files” which it uses for managing your
programs.
• In fact, if you have very little free hard disk space you
may find that Microsoft Windows will not be able to
run your programs at all.
1.3 Computer Performance
Factors affecting performance
5. De-fragmenting Files:
• If you are running Windows you may find that if you
click on the Start menu, select Programs, and then
select the Accessories / System tools group, there is a
de-fragmentation program.
• Running this periodically may noticeably speed up the
operation of your PC.
• When you use a PC, over a period of time the files get
broken up into separate pieces which are spread all
over the hard disk.
• De-fragmentation means taking all the broken up
pieces and joining them back together again.
1.3 Computer Performance
Factors affecting performance
6. Multitasking considerations:
• Windows is a multitasking system, which means that it
can run more than one program at a time.
• However the more programs which are running at the
same time, the slower each one will run.
• To some extent this slowing effect depends on what
each program is doing.
• Editing a large, full colour picture for instance can
take up a lot of CPU time.
2. Hardware
2.1 Central Processing Unit (CPU)
• The CPU is the brains within your computer.
• It performs most of the calculations within the
computer and is responsible for the smooth running of
your operating system (Microsoft Windows) as well as
your application programs, such as word-processors,
spreadsheets and databases.
• There is a small amount of memory associated with
the CPU, which it uses to perform these operations.
• It also accesses and uses the main memory (RAM -
Random Access Memory) within your computer.
2.1 Central Processing Unit (CPU)
• In many ways, the CPU is the single most important
item within your computer which governs the overall
speed of your computer.
• The CPU's speed is measured in MHz of GHz.
• This relates to the frequency at which the CPU runs
and the higher the MHz (or GHz) rating of your CPU
the faster your computer will run.
• To give you some indication of how PCs have
advanced over the years, the original IBM PC released
in 1981 ran at less than 5 MHz while modern PCs can
run at speeds well in excess of 4000 MHz (4 GHz).
• Note that 1000 MHz is the same a 1 GHz.
2.2 Memory
You can store data on your hard disk, while
data which is being processed is stored in RAM
(Random Access Memory).
Data which is stored on a hard disk can be
permanent, while data in RAM is only
temporary.
Normally when people talk about memory in
relation to a PC, they are talking about RAM.
2.2 Memory
What is RAM?
• Random Access Memory (RAM) is the main 'working' memory
used by the computer.
• When the operating system loads from disk when you first
switch on the computer, it is copied into RAM.
• The original IBM PC could only use up to 640 KB of memory
(just over half a megabyte), whereas a modern computer can
effectively house as much RAM as you can afford to buy.
Commonly modern computers are supplied with over 1GB of
RAM.
• As a rough rule, a Microsoft Windows based computer will
operate faster if you install more RAM.
• When adverts refer to a computer having 512 Mbytes of
memory, it is this RAM which they are talking about.
• Data and programs stored in RAM are volatile (i.e. the
information is lost when you switch off the computer).
2.2 Memory
What is ROM?
Read Only Memory (ROM) as the name
suggests is a special type of memory chip
which holds software which can be read but not
written to.
A good example is the ROM-BIOS chip, which
contains read-only software.
Often network cards and video cards also
contain ROM chips.
2.2 Memory
What is the ROM-BIOS?
• The 'Read Only Memory Basic Input Output
System' chip is a chip located on the computer's
system (mother) board, which contains software.
• This software performs a variety of tasks.
• When you first switch on the computer the
ROM-BIOS software performs a self-diagnostic
to check that the computer is working OK.
• This software then loads your operating system
from the disk into the RAM.
2.2 Memory
What is flash BIOS?
• Most modern computers are actually supplied
with a flash BIOS rather than a ROM-BIOS.
• This chip contains exactly the same type of in-
built software, but has the advantage that the
software on the chip can be upgraded.
• This upgrade is achieved by simply running a
small program supplied by the computer
manufacturer.
2.2 Memory
What is video (graphics) memory?
• The picture which you see on your screen is a
form of data and this data has to be stored
somewhere.
• The on-screen pictures are held in special
memory chips called video memory chips;
these chips are usually located on the video
card.
• A modern computer will be supplied with
several Megabytes of video memory.
2.2 Memory
Computer memory measurement
• Basic Units of Data Storage:
- It is important to realize that the term digital
computer refers to the fact that ultimately the computer
works in what is called binary.
- Humans work in tens (because we have 10 fingers).
To use the jargon humans work in base 10.
- A digital computer uses the numbers 0 and 1 (or on
and off if you prefer).
- When we talk about computer storage, either the
amount of memory (RAM) or the hard disk capacity
we are talking about numbers which are multiples of 0
or 1.
2.2 Memory
Computer memory measurement
• Bit: All computers work on a binary numbering
system, i.e. they process data in ones or zeros. This 1
or 0 level of storage is called a bit. Often hardware is
specified as a 32-bit computer, which means that the
hardware can process 32 bits at a time. Software is
also described as 16 bit, 32 bit or 64 bit software.
• Byte: A byte consists of eight bits.
• Kilobyte: A kilobyte (KB) consists of 1024 bytes.
• Megabyte: A megabyte (MB) consists of 1024
kilobytes.
• Gigabyte: A gigabyte (GB) consists of 1024
megabytes.
• Terabyte: A terabyte (TB) consists of 1024 gigabyte
2.2 Memory
Computer memory measurement
• Files: Data and programs are stored on your disk as files. There
are different types of files, such as the files in which you store
your data, the files which contain your programs and also files
used to store your operating system (such as Microsoft
Windows).
• Directories (folders): Directories or folders are used to group
files with a similar theme together. For example, you could
have a folder called “Accounts” containing all your accounting
related files, or a folder called “Customers” containing
correspondence with your customers. Folders can also contain
sub-folders to further divide files. The uppermost level folder is
often referred to as the “root” folder (or directory). Sometimes
you may see a diagrammatic representation of folders, as
illustrated below.
2.2 Memory
Computer memory measurement
• Directories (folders):
In this example, we have the root folder at the top. Below this
are three sub-folders called Data, Programs and Games.
• Records: A record is a collection of data held within a file. It
is the sort of storage unit used by a database. For more
information, please see the ICDL module concerned with
databases.
2.3 Input Devices
The Mouse
• The mouse came into common use on a PC with the
introduction of the Microsoft Windows operating
system.
• Before this, the operating system (DOS) would
normally be controlled via the keyboard.
• These days it is vital to be a competent mouse user.
• There are many different types of mice, a commonly
used model now has a small wheel on it which when
combined with the correct software allows additional
functionality and fine control over the use of your
applications.
2.3 Input Devices
The Keyboard
• The keyboard is still the commonest way of entering
information into a computer.
• There are a number of different types, including those
specially designed for use with Microsoft Windows.
• The quality of the keyboard is often overlooked when
buying a PC; it should be robust and easy to use.
2.3 Input Devices
Tracker Balls ()كرة التتبع
• A tracker ball is an alternative to the traditional mouse
and favored by graphic designers.
• Tracker balls often give much finer control over the
movement of the items on the screen.
• They may take a while to get used to if you are used to
the traditional mouse, but offer a lot in terms of added
flexibility.
2.3 Input Devices
Scanners
• A scanner allows you to scan printed material and convert it
into a file format which may be used within the PC.
• You can scan pictures and then manipulate these inside the PC
using a graphics application of your choice.
• In addition, you can scan printed text and convert this not just to
a picture of the text but also to, actual text which can be
manipulated and edited as text within your word-processor.
There are a number of specialist programs, generically called
OCR (Optical Character Recognition) programs which are
specifically designed for converting printed text into editable
text within your applications.
2.3 Input Devices
Touch Pads
• A touch pad is a desktop device and responds to
pressure.
• Used in conjunction with a special pen they can
be used by graphic artists wishing to create
original, digital artwork.
2.3 Input Devices
Light Pens
• A light pen is used to allow users to point to
areas on a screen and is often used to select
menu choices.
2.3 Input Devices
Joysticks
• Many games require a joystick for the proper playing of the
game.
• There are many different types, the more sophisticated respond
to movement in 3 axis directions, as well as having a number of
configurable buttons.
• Like most things in life you get what you pay for with joysticks
and it is worth investing in a good, strongly constructed model,
especially bearing in mind that children will hammer these
devices whilst playing games.
2.3 Input Devices
Voice input for PCs (microphones)
• Early voice recognition systems offered very poor results, due
to the limitations of the software combined with hardware
limitations.
• It takes an awful lot of CPU processing power to convert the
spoken word into text which appears on the screen.
• Things are changing rapidly however and recent systems allow
you to talk to a PC and see text appear on the screen.
• Most of these systems require an initial training period, where
you train the software to respond to your particular voice.
2.3 Input Devices
Web Cams
• Ever since it was invented, the Web has become
increasingly interactive.
• You can now use a small digital movie camera (a Web
cam) mounted on the PC monitor to allow two-way
communication involving not just text communication
but sound and video communication as well.
• While not yet considered a standard piece of PC kit, it
is only a matter of time.
2.3 Input Devices
Digital Cameras
• A digital camera can be used in the same way a
traditional camera can, but instead of storing images
on rolls of film which require developing, the images
are stored digitally in memory housed within the
camera.
• These pictures can easily be transferred to your
computer and then manipulated within any graphics
programs which you have installed on your computer.
• Currently they are limited by the quality of the image
recorded and the number of pictures which you may
store within the camera.
2.4 Output Devices
The VDU (computer monitor or screen)
• The VDU (Visual Display Unit) is the computer
screen used for outputting information in an
understandable format for humans.
• Remember that at the end of the day the
computer works in binary code (a series of
on/off impulses).
2.4 Output Devices
Flat screen monitors
• Traditional computer monitors are based on the same sort of
technology which is used within a television screen.
• More recently, flat screen computer monitors have become
available.
• These take up a lot less room on a desk and use less energy than
the traditional, more bulky monitors.
• You should be aware that often if you specify a screen of a
certain size, say a 17-inch screen, this is the size measured
diagonally, not horizontally across the screen.
2.4 Output Devices
Computer presentation projection devices
• These are projection devices which can be attached to your
computer and are useful for displaying presentations to a group
of people.
• They are best used in combination with presentation programs,
such as Microsoft PowerPoint.
• They are used within education and are also very popular for
sales presentations.
• The price of these devices has dropped dramatically recently.
• When purchasing one of these devices the two things to look
out for are the resolution and the brightness of the lamp.
2.4 Output Devices
Printers
• There are many different types of printers.
• Laser printers, dot matrix printers, inkjet printers,…etc.
• In large organizations, laser printers are most commonly used
because they can print very fast and give a very high quality
output.
• In most organizations, the printers are connected to the
computers via a network.
• This means that each person with a computer does not require
his or her own printer.
• Each computer connected to the network can print using a
particular shared printer.
2.4 Output Devices
Plotters
• A plotter is an output device similar to a printer, but
normally allows you to print larger images.
• Their use is common in the design and research sector.
Speakers
• Most computers are sold with the capability to add a
pair of speakers to your system unit.
• In fact, in some cases, the monitor may have speakers
built directly into the unit.
• This enhances the value of educational and
presentation products and can now be considered a
standard PC component.
2.4 Output Devices
Speech synthesizers )(المحوالت الصوتية
• A recent development is the ability not only to display
text on a monitor but also to read the text to you.
• Thus, you could receive a text email from a colleague
and the system could read that email to you.
• This is of enormous benefit to the visually impaired
when using a computer.
• On the flip side, it is now possible to use a microphone
to talk to the computer and for the computer to directly
convert the spoken word into text which will be
displayed within say your word-processor.
2.5 Input/Output Devices
Some devices are both input and output devices.
A modem can be used for downloading
information from web sites and receiving
emails.
It can also be used for uploading and sending
emails.
A touch screen can display a menu system
(output device), and accept input when people
touch the menus displayed on the screen.
2.6 Storage Devices
Internal hard disks
• Speed: Very fast. The speed of a hard disk is often
quoted as "average access time" speed, measured in
milliseconds. The smaller this number, the faster the
disk is.
• Capacity: Enormous. Measured in Gigabytes. A
Gigabyte is equivalent to 1024 Megabytes.
• Cost: Hard disks costs are falling rapidly and normally
represent the cheapest way of storing data.
2.6 Storage Devices
External hard disks
• Speed: Normally slower than internal disks, but
more expensive versions offer the same
performance as internal hard disks.
• Capacity: Same as internal disks.
• Cost: More expensive than internal disks.
2.6 Storage Devices
Zip drives
• You can install a Zip drive into your computer and
then you can insert Zip disks into that drive.
• The great thing about these disks is that you can
remove one disk and replace it with another, in exactly
the same way that you can place different diskettes in
your diskette drive.
• They are great for backing up data and exchanging
data between non-networked computers.
2.6 Storage Devices
Zip drives
• Speed: Slower than normal hard disks but ideal for
backups.
• Capacity: 100 or 250 Megabytes.
• Cost: You have to consider both the cost of the drive,
plus the cost of each disk which you wish to use in the
drive. Often suppliers will sell the drive plus a pack of
5 disks at a bundled discount price.
2.6 Storage Devices
Jaz drives
• A Jaz drive is similar in concept to a Zip drive.
• The main difference between them is that a Jaz drive can hold a
lot more data. Also, the disks are not the same as used in a Zip
drive and as a result, you cannot use a Zip disk in a Jaz drive or
a Jaz disk in a Zip drive.
• Speed: Slower than normal hard disks but ideal for backups
• Capacity: Around 2 Gigabytes (2048 Megabytes).
• Cost: You have to consider both the cost of the drive, plus the
cost of each disk which you wish to use in the drive. Often
suppliers will sell the drive plus a pack of 5 disks at a bundled
discount price.
2.6 Storage Devices
Diskettes (floppy disks)
• Speed: Very slow.
• Capacity: Normally 1.44 Mbytes.
• Cost: Very cheap.
2.6 Storage Devices
CD Disks
• Speed: Much slower than hard disks. The original CD-ROM
specification is now given a value of 1x speed, and later, faster
CD-ROMs are quoted as a multiple of this value. Thus, a 50x
CD-ROM is 50 times as fast as the original 1x speed CD-ROM
specification.
• Capacity: Around 650 Mbytes.
• Cost: CD drives are becoming very inexpensive. The disks
themselves are so cheap that they are often given away when
they contain samples or demo software (i.e. free versions).
2.6 Storage Devices
DVD Drives
• Speed: Much faster than CD drives but not as
fast as hard disks.
• Capacity: Up to 17 GBytes.
• Cost: Slightly higher than CD drives.
2.6 Storage Devices
What is the difference between internal and external
hard disks?
• Internal hard disks are located inside your main
computer unit, while external hard disks are joined to
the main computer unit via a lead which you plug into
the back of your computer unit.
• Some external hard disks will plug into the USB port
(connector) located at the back of your computer.
• Other external hard disks require the installation of a
special card (mobile rack) within your computer which
allows the connection of the external hard disk to the
computer unit.
2.6 Storage Devices
Why format a disk?
• Originally when you purchased a pack of floppy disks
(diskettes), you had to format them prior to use.
• Today, most floppy disks are supplied pre-formatted.
• Formatting a disk is like putting lines on a blank sheet of paper,
so that you can write on that paper.
• Formatting allows the operating system (i.e. Windows) to read
information stored on the disk and also to store information on
the disk.
• The manufacturer will have formatted your hard disk for you
prior to delivering the PC to you.
• You should be very careful about formatting a disk, as any data
on the disk will be lost after re-formatting.
• You would not normally format a hard disk, this should only be
done by a qualified person.
• You do not even need to know how to format a hard disk!
3. Software
3.1 Types of Software
What is an Operating System?
• The operating system is a special type of
program which loads automatically when you
start your computer.
• The operating system allows you to use the
advanced features of a modern computer
without having to learn all the details of how
the hardware works.
3.1 Types of Software
What is an Application Program?
• An application program is the type of program
which you use once the operating system has
been loaded into memory (RAM).
• Examples include word processing programs
(for producing letters, memos etc), spreadsheets
(for doing accounts and working with numbers),
databases (for organizing large amounts of
information), games and graphics programs (for
producing pictures, advertisements, manuals
etc).
3.1 Types of Software
Why are new versions of software released year after year?
• A cynic might say 'so that the companies which
manufacture software can continue to make money
each year'.
• Another cynic may say ' so that you can pay to have
the unfinished version you bought last year patched up
a little, so there are less bugs in it this year'.
• The software manufactures claim that each new
release has less bugs, greater flexibility and more
features.
• Often if you wish to see the version of software you
are using, you can click on the product’s Help drop
down menu, and then click on the About (or similar)
command.
3.2 Operating System Software
What is an Operating System?
• There are a number of different types of operating
system in common use.
• The IBM PC (Personal Computer) was introduced way
back in 1981 and was originally supplied with an
operating system called DOS (Disk Operating System).
• This operating system was very basic, and you had to
be a bit of a computer expert just to understand how to
use it. It was NOT user-friendly.
• Later on, Microsoft introduced Windows and this is
the operating system which is most widely used on
PCs today.
3.2 Operating System Software
What is an Operating System?
• To complicate matters further, there are a number of
different types of Windows.
• The first widely used version of Windows was called
Windows 3.1.
• This was more powerful than DOS and far easier to
use.
• It had a Graphical User Interface (GUI), i.e. you could
'drive' it using a mouse and drop down menus.
• Later, different releases of Windows were introduced.
3.2 Operating System Software
What is an Operating System?
• The good news is that later versions of Microsoft
Windows look almost identical to each other and are
all much easier to use than Windows 3.1.
• IBM produced an operating system called OS/2 but
this was largely ignored and is only used by a few
companies.
• UNIX and Linux are other examples of operating
systems which may be run on PCs.
• Other types of computers, such as those manufactured
by Apple have a completely different operating system.
3.3 Applications Software
Word processing
• A word processing program (such as Microsoft
Word) allows you to produce letters, memos,
etc., easily.
• You can easily mail merge a list of names and
addresses to produce mass mailers, individually
addressed to customers or subscribers.
3.3 Applications Software
Spreadsheets
• A spreadsheet program (such as Microsoft Excel)
allows you to work out a company’s income,
expenditure and then calculate the balance.
• It enables you to make 'what if' type projections of
how the company will fair in the future and to forecast
how changes in prices will affect profits.
3.3 Applications Software
Databases
• A database program (such as Microsoft Access) allows
you to compile information and then to search this
information to extract just the information you require.
• For instance, if you have a database of all the
equipment housed within an office you can very
simply produce a report listing only the equipment
above a certain value.
3.3 Applications Software
Presentation
• A presentation program (such as Microsoft
PowerPoint) allows you to produce professional
looking presentations, which can be printed out
directly onto slides for use with an overhead projector.
• Alternatively, you can display your presentations
directly on a computer screen or via a computerised
projector.
3.3 Applications Software
Accounts / Payroll
• In most large organizations, the accounts are
maintained by a computerized system.
• Due to the repetitive nature of accounts, a computer
system is ideally suited to this task and accuracy is
guaranteed.
Web browsing
• Applications used to view and interact with the World
Wide Web (WWW).
Web authoring
• These applications allow almost anyone to create a
web site, quickly and easily.
3.4 Graphical User Interface (GUI)
What is a Graphical User Interface?
• A Graphical User Interface (GUI) is simply an
additional part of the operating system which displays
windows and drop down menus, and also enables you
to drive your computer using a mouse.
• Examples of operating system which use a GUI
include Windows and IBM's OS/2.
• If you used an old operating system like the original
version of DOS, there was no GUI and the screen
would look like this.
• As you can see there are no menus, no icons and
nothing for the mouse to click on.
• You had to know a special language which you then
typed into the computer to make it do anything!
3.4 Graphical User Interface (GUI)
3.4 Graphical User Interface (GUI)
The advantages of using a GUI (Graphical User
Interface)
• All programs look similar and when you switch from a
program supplied by one manufacturer to a different
program supplied by another manufacturer, you will
find the transition very easy.
• Application programs work in the same way as the
underlying operating system, and also look very
similar, which means that they are easier to learn and
use.
• The GUI also allows programmers to easily write
consistent looking programs.
3.5 Systems Development
This is a general term used to describe the way new software is
specified, written by programmers, tested and then delivered to
the user.
What is a systems development cycle?
• Most IT projects work in cycles.
• First, the needs of the computer users must be analysed.
• This task is often performed by a professional called a 'Systems
Analysts' who will ask the users exactly what they would like
the system to do, and then draw up plans on how this can be
implemented on a real, computer based, system.
• The programmer will take the specifications from the Systems
Analyst and then convert the broad brushstrokes into actual
computer programs.
3.5 Systems Development
What is a systems development cycle?
• Ideally at this point there should be testing and
input from the users so that what is produced by
the programmers is actually what they asked for.
• Finally, there is the implementation process,
during which all users are introduced to the new
systems, which often involves an element of
training.
• Once the users start using the new system, they
will often suggest new improvements and the
whole process is started all over again.
3.5 Systems Development
What is a systems development cycle?
• These are methodologies for defining a systems
development cycle and often you will see four
key stages, as detailed below.
-Analysis
- Design
- Programming
- Testing
3.5 Systems Development
4. Information Networks
4.1 LAN and WAN
What is a LAN (Local Area Network)?
• A LAN (Local Area Network) is a system whereby
individual PCs are connected together within a
company or organization.
• For instance if ten people are working together within
an office it makes sense for them all to be connected.
• In this way, the office can have a single printer and all
ten people can print to it.
• In a similar way, other devices such as modems or
scanners can be shared.
• Even more useful is the ability to share information
when connected to a network.
4.1 LAN and WAN
4.1 LAN and WAN
What is a WAN?
• A WAN (Wide Area Network) as the name implies
allows you to connect to other computers over a wider
area (i.e. the whole world).
What does client/server mean?
• This term relates to the type of network where
resources are kept centrally on the server and used
locally by the client.
• The server tends to be a very powerful PC (or group of
PCs), while each client workstation, which the users
have, is less powerful.
4.1 LAN and WAN
4.1 LAN and WAN
What is workgroup computing?
• The idea of a workgroup is that groups of people
working together can share their resources with each
other.
• People within the workgroup can share information on
their hard disks as well as sharing printers, modems
and scanners.
• The workgroup is connected via a computer network.
This network can simply consist of a few computers at
a single location physically connected to each other via
a network cable, or it may be a workgroup of
computers connected globally via the Internet.
• The networked nature of computers means that the
physical distance between workgroups members is fast
becoming irrelevant.
4.1 LAN and WAN
What is workgroup computing?
Many programs are designed to be used within a
workgroup.
For instance when using a word-processor you may
use what are called templates.
Your organization might want to use a standard Fax
header sheet.
If a template for this header sheet is held on a single
computer but available to all the other computers then
this has the advantage that when you need to make a
change to the Fax header you only have to change one
file, rather than change the files on each computer.
4.1 LAN and WAN
Advantages of workgroup computing
• As there is no reliance on a central computer, there is
less chance of major disruption if one computer goes
down for a while.
• Provided members of the workgroup have the
authority and access rights, they can share data on a
temporary basis with colleagues, as required, without
the need for a network administrator to get involved.
• In small offices there may be no need for a dedicated
network administrator, and this can result in
considerable cost savings.
4.1 LAN and WAN
Disadvantages of workgroup computing
• If you share files on your PC with many other
people, this can slow down the running of your
PC.
• The security of the computer network may not
be as good as the traditional client/server
network arrangement.
• You may give total access to the files on your
PC, which may then be damaged or even
deleted, by other members of the workgroup.
4.2 Intranet and Extranet
What is the difference between the Internet and an
Intranet?
• An Intranet is a smaller, closed version of the Internet,
which can only be accessed by authorized members of
an organization.
• Intranets are becoming an increasingly popular way to
share information within a company or other
organization.
• An Intranet uses Internet technologies to allow users to
access company documents, search databases,
schedule meetings and of course send emails.
• Once a company has installed a comprehensive
Intranet many users need only one piece of software
on their PC, a web browser.
4.2 Intranet and Extranet
What is the difference between an Intranet and
an Extranet?
• An Extranet is an Intranet which is partially
accessible to authorized outsiders.
• An Intranet is normally only accessible by
members of the same company or organisation;
an extranet also allows outsiders who have been
issued with a password to gain limited access to
information held on a company network.
• Extranets are being used as a way for business
partners to share information.
4.3 The Internet
What is the Internet?
• A collection of networks started by and for the US
military to enable them to 'survive' a nuclear war.
• Later adopted by the educational system, and now
exploited by the commercial world.
• The Internet is a global network of interconnected
networks.
• The unique thing about the Internet is the sheer
amount of information which you can access from it.
• Whatever your interest, you can search for and find
information on the most obscure topics.
• For research the Internet is an incredibly valuable tool.
4.3 The Internet
What is the Internet?
• Whether you are gathering information about a rival company
on the other side of the world, or are looking for information
about your family tree, you will find there is plenty of
information available.
• If you publish material on the Web, it can be accessed by
everyone on the Web (providing they can find it.).
• As a marketing tool, this has interesting possibilities.
• It is possible for a small company to sell products and services
worldwide, without the need for a single sales-person.
• These days the problem is often not finding information but
rather dealing with the sheer amount of information which is
available.
• Also, you have no idea how accurate or up to date a lot of the
information you access really is.
4.3 The Internet
What is the difference between the World Wide Web
(WWW) and the Internet?
• The World Wide Web (WWW) is just a small part of
the Internet as a whole.
• The Internet relates to all the hardware and software
involved, as well as the WWW, it also includes FTP
(File Transfer Protocol), email and newsgroups.
• The WWW is basically the text and pictures which
you can view using your web browser, such as
Microsoft Internet Explorer, or Netscape Navigator.
4.4 The Telephone Network in Computing
How is the telephone line used in computing?
• If you use a modem to connect to the Internet,
then this connection is made via the telephone
network.
What is PSTN?
• PSTN (or Public Switched Telephone Network)
is the technical name for the public telephone
system.
• It is based on traditional 'copper wire'
technology and can transmit analogue voice
data.
4.4 The Telephone Network in Computing
What is PSDN?
• PSDN (or Public Switched Data Network) is
simply the technical name for the telephone
system in use today.
What is ISDN?
• Stands for "Integrated Services Digital
Network."
• ISDN dates back to 1984, and allows much
faster transfer rates than when using modems.
• Using ISDN, you can transfer 64 Kbit or 128
Kbit of data per second.
4.4 The Telephone Network in Computing
What is ADSL?
• Short for 'Asymmetric Digital Subscriber Line'.
• A more recent technology which allows more data to
be sent over existing copper telephone lines, but
requires a special ADSL modem.
• ADSL allows data transfer rates of ranging from to 8
Mbps when receiving data (called the downstream rate)
and from 16 to 640 Kbps when sending data (called
the upstream rate).
What is DSL?
• Refers collectively to all types of 'Digital Subscriber
Lines', the two main categories being ADSL and
SDSL.
• DSL technology allows faster data transfer while still
using copper wires (as opposed to optic fibre cables).
4.4 The Telephone Network in Computing
Digital vs. analogue
• A digital system uses 1 or 0 to transmit data
or to represent data.
• Thus, a digital clock will display whole
seconds, whole minutes and whole hours.
• An analogue system, such as a traditional
clock, does not use multiples of 1 or 0, but
rather uses the full range of numbers,
including fractions.
• In this way, an analogue clock can display
fractions of a second.
4.4 The Telephone Network in Computing
Modem
• Modem stands for “MODulate / DEModulate”.
• The modem sends information from your computer
across the telephone system.
• The modem at the other end of the phone line,
converts the signal back into a format which can be
used by the receiving computer.
Baud rate
• The baud rate tells you how fast a modem can
send/receive data.
• Most modern modems have a maximum baud rate of
56 Kilobits per second (Kb/sec).
5. The Use of IT in Everyday Life
• Education
• National Security
• Transport
• Finance
• Government
• Home
• Medicine
• Robotics
• Scientific Research
• Energy
• Retails
140
5. The Use of IT in Everyday Life
5.1 Computers at Work
Where computers might be more appropriate than
people
• Repetitive tasks: In the past, many repetitive jobs
were performed by low skilled, poorly paid workers.
Now is it more common to use computers instead.
• Easily automated tasks: The phone system is now
largely automatic, while in former times all calls were
made through an operator. Many other examples exist.
How many can you think of?
5.1 Computers at Work
Where computers might be more appropriate than
people
• Mathematical calculations: A computer is ideally
suited to performing mathematical calculations.
Before computers were widely available accountants
used to work on manual, paper-based spreadsheets.
Within a spreadsheet, a common task would be
adding up a column of figures, and then taking the
total, which is added to other columns of figures. If
you change one number within a column which is
being summed, there can be a knock-on effect on
many other calculations within the spreadsheet. Re-
calculating a spreadsheet could take hours (or days).
On a computer, this re-calculation can take seconds.
5.1 Computers at Work
Where computers might be more appropriate than
people
• Dangerous situations: Monitoring of polluted or
radioactive environments is suited to computer-
based robots, where the use of a human would
expose that person to unacceptable risks. Unmanned,
computer-controlled machines almost exclusively
carry out serious space exploration. A recent
exploration of Mars involved a computerized ‘car’,
which had to make decisions on its own. It could not
be remotely controlled from earth, as the time taken
for the signal to reach Mars is just too long.
5.1 Computers at Work
Where people might be more appropriate than
computers
• Computers have their limits.
• When you are unwell and visit your doctor, it is
often a person to whom you want to talk, as there
might well be other factors affecting your health
(maybe personal problems) which you would not
feel happy typing into a computer, but would feel
comfortable describing to your local doctor, whom
you may well have known for years.
• In most of the caring professions, the same is true,
whether it be doctors, nurses or social workers.
• The human touch is important.
5.1 Computers at Work
Where people might be more appropriate than
computers
• Despite the uptake of e-commerce, (selling on the
Net, banking on the Net and so on), there are many
people (myself included) who still like to have the
option of a real person to whom you can talk, be it
the local bank manager or a real person on the end
of a telephone sales line.
• Does anyone like ringing a large organization and
being greeted with a range of buttons to press, in
order to communicate with a computerized
telephone system?
• Even ordering cinema tickets can now involve a
lengthy phone call, listening to a synthetic voice
describing many films you do not want to see, and
pressing many buttons.
5.1 Computers at Work
Where people might be more appropriate than computers
• For many years, science fiction has portrayed images of a
thinking, sentient android (Lieutenant Data from Star Trek
for instance).
• In reality this is a long way from present capabilities and
when it comes to anything requiring creative thought, a
human wins every time.
• Computers in their present form would gain little from
studying philosophy for instance.
• They can memorize the facts, but cannot make the creative
leaps which humans can.
• On a more mundane level, when it comes to even a simple
task such as cleaning your home, a human can deal with
mess, clutter and items (such as chairs) which have changed
their position recently.
• Even this simple task is beyond a small computer.
5.1 Computers at Work
Where people might be more appropriate than
computers
• Computers are very bad at recognizing and
interpreting shapes.
• They can take photographs and record images on
video, but they have no understanding of the
meaning of shapes, and will be easily confused
when presented with two overlapping shapes.
• The human process of pattern recognition, as recent
research had demonstrated, is vastly more
complicated than we used to think.
• For these reasons it is humans, not computers who
will examine tissue smears for signs of abnormality
within hospitals.
5.1 Computers at Work
Examples of large scale computer applications
in business
• Business administration systems
• Airline booking systems
• Insurance claims processing
• Online banking
5.1 Computers at Work
Uses of large scale computers applications
within government
• Census
• Vehicle registration
• Revenue collection
• Electronic voting
5.1 Computers at Work
Uses of computer applications within hospitals
and the health care system
• Patient record systems
• Ambulance control systems
• Diagnostic tools and specialist surgical
equipment
5.1 Computers at Work
Uses of computer applications in education
• Student registration and timetabling
• Computer Based Training (CBT)
• Using the Internet as a homework resource
• Distance learning systems
5.1 Computers at Work
What is tele-working?
• Tele-working is a broad term which refers to
people working at home connected to the rest
of the organization via a computer network.
• Communication is via email or the telephone.
• This arrangement has advantages and
disadvantages to both the employer and the
employee.
5.1 Computers at Work
Some of the advantages of tele-working
• Reduced or zero commuting time
• Greater ability to focus on one task
• Flexible schedules
• Reduced office desk space requirements
5.1 Computers at Work
Some of the disadvantages of tele-working
• Lack of human contact
• Negative impact on teamwork
• Self-discipline
• Possible Employee Exploitation
5.2 Electronic World
What is email?
• Email allows you to send a message to
another person almost instantly, anywhere in
the world.
• It requires both computers to be connected to
the Internet.
• As well as sending a text message, files can
be sent as email attachments.
5.2 Electronic World
What is E-commerce?
• The phrase e-commerce is a buzzword which relates
to buying or selling via the Internet.
• Increasingly you can purchase directly via a Web
site by selecting the goods or services which you
require and entering your credit card details.
• When you send your credit card details these
SHOULD be encrypted by the site operators so that
no one can intercept your details.
• Most sites which accept credit card payment are on
secure services and your Internet browser program
(i.e. Microsoft Internet Explorer or Netscape
Communicator) will normally inform you (via a
popup) when you are entering or leaving a secure
server.
5.2 Electronic World
What is E-banking?
• The phrase e-banking relates to managing your
money online.
• Instead of having to go to the local branch, or
telephoning them, you can pay your bills online and
move money from one place to another.
• Some online banks have no physical branches at all,
making it a very profitable operation for the bank.
• There are security considerations relating to online
banking, with numerous examples of poor security
coupled with sloppy operations.
5.2 Electronic World
The process of shopping online
• There are numerous web sites from where you can
purchase online, the most famous of all being
amazon.com as illustrated.
• Most Internet based shopping sites use a virtual
“shopping cart” system.
• As you browse the site you can add any products
you want to purchase to your cart.
• Once you have placed items in the cart you can then
move to the checkout stage.
• At the checkout you enter your name & address,
select the type of delivery you want and enter your
payment details.
6. Health and Safety, Environment
6.1 Ergonomics )(البيئة
Good working practices
Includes the following:
• Your chair:
Your chair should be fully adjustable, and be able to
be moved up or down. It should have an adjustable
back.
• Your screen:
Your screen should be fully adjustable so that your
eyes are at the same height as the top of the screen.
You may wish to use a filter attached to the screen
to reduce glare. If the screen is badly focused, too
bright or appears to flicker, then get a qualified
technician to take a look at it.
6.1 Ergonomics
Good working practices
• Your keyboard:
Use a good keyboard and you may also wish to use a
wrist pad to relieve pressure on your wrists.
• Your feet:
You may wish to use a footpad to rest your feet
while using the computer.
• Your mouse:
Use a mouse mat to make the mouse easier to use.
Ensure that you have enough space to comfortably
use the mouse.
• Breaks:
Take frequent breaks when using a computer.
6.2 Health Issues
• Using a computer incorrectly can damage
your health
• Repetitive Strain Injury (RSI)
• Glare from screens
• Bad posture
6.3 Precautions
• Make sure that cables are safely secured
• Make sure that power points are not
overloaded
6.4 The Environment
Computers and the environment
• You should have a separate bin for paper which can
be sent for recycling (be sure that sensitive material
is first shredded).
• Printer toner cartridges can be sent for recycling; in
fact some charities now collect spent toner cartridges,
and send them for recycling.
• You may also wish to consider the use of recycled
toners in your printers (but be aware that in some
cases this may invalidate the printer’s guarantee).
• Many monitors and other peripherals will
automatically switch into 'sleep' mode after a period
of inactivity.
• This means that even though the computer is still
switched on, it will consume less power.
7. Security
7.1 Information Security
This is a general term which covers all aspects of
computer security.
It covers protection against viruses and hackers,
password and access control policies as well as
procedures for the regular backing up of your data
(to guard against computer failure)
A proactive information security policy anticipates
problems and attempts to guard against future
problems, as opposed to discovering a problem and
then trying to deal with the problem 'on the fly'.
7.1 Information Security
Passwords
• If your computer has a password which prevents
other users from accessing it then do NOT give this
password to anybody else.
• Do not write the password on a card and prop this up
next to the monitor and above all do not attempt to
hide your access passwords on the underside of your
desk (this is the first place most criminals would
look if trying to break into your system).
• Make sure you do not forget your passwords; in
many cases, data cannot be recovered once the
password is lost.
7.1 Information Security
The Importance of shutting down your computer
• When you are using a Windows based system it is
important to remember that just switching off the
computer or losing power due to a power cut (power
outage) can cause loss of data.
• To protect against this you should save your work
regularly.
• Many programs have a facility which automatically
saves your work; say every 10 minutes (or any time
interval which you specify).
7.1 Information Security
The Importance of shutting down your computer
• Some operating systems, such as most versions of
Windows have a facility which will automatically
detect that the computer was not properly shut down
the last time it was used.
• If this situation is detected, then a special recovery
program will be run which will attempt to fix any
damage caused by the power cut.
• When using Windows you MUST always use the
shutdown command (located on the Start menu) to
close down the operating system, before switching
off the power.
7.1 Information Security
What is a UPS?
• A UPS (Un-interruptible Power Supply) is a device
which you can attach to your computer which will
guard against power cuts (or indeed someone tripping
over your power cable and pulling the plug out).
• It contains batteries which will keep your computer
alive long enough for you to use the shutdown
command and turn off the computer in the proper
way.
• This is especially important for PCs on a network
which might provide data for many users on the
network.
7.1 Information Security
Electrical surge protection
• The voltage which is supplied to your computer via
the power cable can vary from time to time, and
there are occasional power surges.
• Power surge protection devices are readily available
and offer low cost protection again these occasional
power surges.
Things computers like
• Good ventilation
• Clean environment
• Stable, vibration free surface
7.1 Information Security
Things to avoid
• Dust
• Drinking and eating over the keyboard
• Heat, Cold
• Moisture
• Do not move the system while it is switched on.
• Do not just switch the computer off at the mains.
• Follow the correct shutdown procedure or data could
be lost.
• Do not place objects on top of monitors. This could
block the ventilation holes and cause it to overheat.
• Do not place floppy disks near monitors. Monitors
produce a strong electromagnetic field, which can
damage floppy disks.
7.1 Information Security
Dealing with security problems
• In any organization there should be clearly defined
policies for the detection of security problems, and
what to do if a problem is noticed.
• Security problems may range from the physical
presence of unauthorized persons in an office,
through to suspicion of attempted unauthorized
electronic entry to your computer networks.
• In all cases you should know whom to contact, and
how to contact the relevant person, so that the matter
can be investigated further.
7.1 Information Security
Responsibilities for dealing with security
problems
• If you are reporting a security problem, you
should do so without delay, to the relevant
person within your organization.
• If you are responsible for dealing with reports of
security incidents, you should always take
action immediately, and follow the correct
procedure within your organization for
investigating any problems.
7.1 Information Security
Security rights and obligations
• If you are working for a large organization you have
both rights and obligations to the organization.
• For instance does an employer have the right to
video film and record employees without their
permission?
• Can an employer read all email sent and received by
employees?
• Can an employer monitor what Internet sites an
employee is accessing?
• The employer must make clear the security
obligations of employees, such as keeping network
ID and logon passwords secure and how to report
security incidents.
7.1 Information Security
Why do you need to back up your computer?
• The most important thing which you store on
your computer is information.
• Often the contents of a hard disk can
represent years of work.
• If the hard disk stops working one day you
could lose all those years of work.
• For this reason it is VITAL that you take
regular backups of the information which is
stored on the computer.
7.1 Information Security
Why do you need to back up your computer?
• In large organizations this backup procedure is
normally performed automatically by your computer
support team, where the data is normally held on a
centralized, networked computer.
• In smaller organizations, it is often up to the
individual to organize some sort of data backup.
• If nothing else is available, copy your files to a
floppy disk and make sure that these backup disks
are stored away from the computer, ideally off-site.
• If there is a fire and your office burns down, if your
backup disks are stored next to the computer they
too will be incinerated.
7.2 Computer Viruses
What are computer viruses?
• Viruses are small programs which hide themselves
on your disks (both diskettes and your hard disk).
• Unless you use virus detection software, the first
time that you know that you have a virus is when it
activates.
• Different viruses are activated in different ways.
• For instance, the famous Friday the 13th virus will
activate only when it is both a Friday and the 13th of
the month.
BEWARE: Viruses can destroy all your data.
7.2 Computer Viruses
7.2 Computer Viruses
How do viruses infect PCs?
• Viruses hide on a disk and when you access the disk (either a
diskette or another hard disk over a network) the virus program
will start and infect your computer.
• The worst thing about a computer virus is that it can spread
from one computer to another, either via use of infected floppy
disk, or over a computer network.
• The Internet allows you to access files from all over the world
and you should never connect to the Internet unless you have a
virus-checking program installed on your computer.
• It is vital to keep your virus monitoring software up to date.
• Many anti-virus programs, such as Norton Anti Virus allow
you to update the program so that the program can check for
recently discovered viruses.
7.2 Computer Viruses
7.2 Computer Viruses
How to prevent virus damage
• There are a number of third party anti-virus
products available.
• The main thing about your virus checker is that
it should be kept up to date.
• Many companies supply updated disks on a
regular basis or allow you to receive updates
automatically via the Internet.
7.2 Computer Viruses
To password protect your computer
• You can set a power-on password on your computer.
• The mechanism for setting this will vary from one
computer to another, and is determined by the makers
of the computer, rather than by Windows.
• The advantage of a power-on password is that the
computer will not boot to Windows until you supply
the correct password.
• This means that no one else can play around with your
computer and in the process accidentally infect it with
a virus.
7.2 Computer Viruses
How do your protect computers from attack?
• The safest way to use a computer is to not connect it
to a Local Area network or the Internet.
• This is called a 'stand-alone' computer, providing that
you do not use floppy disks on that PC which have
been used in other computers, this type of computer is
virtually immune from any form of intrusion.
• Unfortunately it is the ability to connect to other
computers or indeed the Internet, which makes the
modern computer so versatile and so useful.
• Always make sure that all computers require an ID
and password to access them.
7.2 Computer Viruses
How do your protect computers from attack?
• Make sure that all relevant 'security patches' from
Microsoft have been applied.
• Make sure that the password is long enough, contains
a random mixture of numbers and letters, and that the
passwords are changed on a regular basis.
• There are many examples, where people have used
passwords which relate to something personal, such as
a partner’s first name, the dog’s or cat’s name, etc.
7.2 Computer Viruses
How do your protect computers from attack?
• For a determined, serious computer hacker, these are
easy to guess.
• If you have a system, where lots of different
passwords are required to access the system, then
security often breaks down and computer users will
sometimes keep a list of these passwords in their disk.
• This defeats the whole object.
• If you forget your network access password, the
network administrator should be able to assign you
with a new one.
7.2 Computer Viruses
What to do if you discover a virus on your computer
• If you discover a virus on your computer don’t panic.
• If your virus checker alerts you to a virus, then the chances are
that it has caught the virus before the virus could infect your
computer and cause damage.
• For instance you may insert a diskette into your computer and
the virus checker should automatically scan the diskette.
• If the diskette contains a virus, a message will be displayed
telling you that the diskette is infected, and it should
automatically remove the virus.
• The other common method of infection is via emails.
• If you work within a larger company, you should have a
company IT support group which will come and rid your
computer of viruses.
• Be sure that you are familiar with your company’s policy
regarding viruses.
7.2 Computer Viruses
The limitations of anti virus software
• Anti virus software can only detect viruses (or types
of viruses) which the software knows about.
• As such it is vital that you keep your anti virus
software up to date so that it can detect new viruses
which are constantly appearing.
What is virus disinfecting?
• Running a virus checker on a machine which contains
a virus is known as disinfecting the PC, as the virus
program will detect, and then eliminate the virus.
7.2 Computer Viruses
Anti-virus Precautions
• You should have an anti-virus program installed on your
computer.
• This should be updated on a regular basis, so that the anti-virus
program is aware of new viruses which are in circulation.
• Even the best anti-virus program will only offer protection
against known viruses or viruses which work in a particular
way.
• New types of viruses are constantly being developed which
may attack your computer in new and novel ways.
• Your anti-virus program may not be able to defend you against
every possibility.
• Be warned, if you are connected to a Local Area Network
(LAN), or to the Internet you are vulnerable.
7.2 Computer Viruses
Anti-virus Precautions
• Make sure that your virus checker is configured so that as well
as scanning your computer for viruses when you first switch on
your PC, it remains active in the computer’s background
memory, constantly looking for signs of virus attack.
• This is very important when connecting to the Internet.
Hexadecimal: 1D63A7A
0-213
Division Algorithm
Convert 67 to its binary equivalent:
6710 = x2
Step 1: 67 / 2 = 33 R 1 Divide 67 by 2. Record quotient in next row
1 0 0 0 0 1 12
Binary to Decimal Conversion
• The easiest method for converting a binary
number to its decimal equivalent is to use the
Multiplication Algorithm
• Multiply the binary digits by increasing powers
of two, starting from the right
• Then, to find the decimal number equivalent,
sum those products
Multiplication Algorithm
Convert (10101101)2 to its decimal equivalent:
Binary 1 0 1 0 1 1 0 1
Positional Values x x x x x x x x
27 26 25 24 23 22 21 20
Products 128 + 32 + 8+ 4+ 1
17310
BINARY TO DECIMAL CONVERTION
24 23 22 21 20 = 16+8+2+1
= 2710
Example 2 :
Convert 101101012 to decimal value
Solve:
1 0 1 1 0 1 0 1
2 7
2 6
2 5
2 4
2 3
22 21 20
= 128 + 32 + 16 + 4 + 1
= 18110
= 62 3 balance 0
= 32 1 balance 1
= 12 0 balance 1 MSB
Solve = 35910 = ?8
= 359 44 balance 7 LSB
8
= 44
8 5 balance 4
= 58 0 balance 5 MSB
... Answer = 5478
Octal Binary
OCTAL TO BINARY CONVERTION
• Convert from octal to binary by converting each octal digit to a
three bit binary equivalent
Octal digit 0 1 2 3 4 5 6 7
Binary 000 001 010 011 100 101 110 111
Equivalent
51 / 16 = 3 R3
3 / 16 = 0 R3
33E16
Hexadecimal to Decimal Conversion
Convert 3B4F16 to its decimal equivalent:
Hex Digits
3 B 4 F
x x x x
Positional Values
163 162 161 160
Products 12288 +2816 + 64 +15
15,18310
Hexadecimal Binary
Binary to Hexadecimal Conversion
• The easiest method for converting binary to
hexadecimal is to use a substitution code
• Each hex number converts to 4 binary digits
Binary Arithmetic
The binary addition facts
0-238
Binary Arithmetic
• The individual digits of a binary number are referred to as
bits
– Each bit represents a power of two
01011 = 0 • 24 + 1 • 23 + 0 • 22 + 1 • 21 + 1 • 20 = 11
00010 = 0 • 24 + 0 • 23 + 0 • 22 + 1 • 21 + 0 • 20 = 2
00010 2 Equivalent
Binary
+ 01011 + 11 decimal
addition
01101 13 addition
Part 3
LOGIC GATES
Introduction
• Basic Logic Gates
• Truth Tables
• Logical Functions
Truth Tables
Logical Expression
Graphical Form
Most Difficult Reading Topics
• Logic gates and figuring out how to read them
• Logical Circuit Equivalence
• NAND NOR and XOR truth tables
• Using the rules to create and read the logic
gates using 0's and 1's
• Transistor implementation
• Difference between positive logic and negative
logic
Logic
• Formal logic is a branch of mathematics that
deals with true and false values instead of
numbers.
• In the mid-19th century, George Bool
developed many Logic ideas.
• Boolean logic deals with equations where the
operators are “AND” or “OR” instead of “add”
and “multiply”.
Electric Logic
• Logical values can easily be expressed by an
electrical circuit.
• “True” or “1” can be defined as voltage on a
wire while “False” or “0” can be defined as no
voltage. We will use positive logic.
• Analog values can be anything while digital
only has discrete values, 0 or 1.
• Electrical devices called “gates” can implement
the logical.
Logic Gates and Symbols