Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COMPUTER TECHNOLOGY machines that you will be using to get your job
done. A computer is primarily made of the
Central Processing Unit (usually referred to as
CHAPTER 1 - INTRODUCTION the computer), the monitor, the keyboard, and
the mouse. Other pieces of hardware are
Computer as a revolution left no area of life commonly referred to as peripherals.
untouched in the present world. It is of
tremendous help in all field of life. Hence, the In everyday life activities, we process data
knowledge of computer is a necessity for or encounter cases of data processing. A
existence of everybody in this global village. The typical example of data processing is the
invention of computer has transformed our generation of statement of student result
simple manual works to sophisticated life of from the marks score in an examination and
automated works to meet the global demand continuous assessment. It is essential to
for the higher productivity and increased know that information is as good as the
efficiency with high precision. data from which it is derived, and the
transformation process which they are
subjected to. Meaningless data or
Computer is increasingly becoming compulsory inappropriate processing produces wrong
in nearly all fields of studies, not because of information. Thus computer gives you
anything but its accuracy and versatility in results corresponding to what data you
processing data. Many tasks at home or office supply and how you process it (i.e.
are being automated rapidly with computer. ëgabbage- in, gabbage-outí).
Thus it is becoming apparent that in whatever Summarily, the intelligent performance of a
discipline or working sector, the computer is computer depends on correctness of input data
now a very vital tool for efficiency improvement and the intelligence performance of the human
and precision of job or task execution. being that drives it.
This is designed to meet the prerequisite 1.1 USES OF COMPUTERS
need of everybody that are interested and
wish to know about computers science and People use computers in many ways; business,
computing in general. computers are used to track inventories with
bar codes and scanners, check the credit status
A computer is an electronic device, of customers, and transfer funds electronically,
operating under the control of instructions homes, tiny computers embedded in the
stored in its own memory. These electronic circuitry of most appliances control
instructions tell the machine what to do. the indoor temperature, operate home security
The computer is capable of accepting data systems, tell the time, and turn video cassette
(input), processing data arithmetically and recorders (VCRs) on and off, automobiles
logically, producing output from the regulate the flow of fuel, thereby increasing gas
processing, and storing the results for mileage, they also entertain, creating digitized
future use. Most computers that sit on a sound on stereo systems or computer-animated
desktop are called Personal Computers features from a digitally encoded laser disc.
(PCs).
Computer programs, or applications, exist to aid
every level of education, from programs that
teach simple addition or sentence construction 3. Slide Rule (1600AD) by William Oughtred
to programs that teach advanced calculus. (1575 - 660): He invented it in 1622 but
Educators use computers to track grades and announced it in 1632 this consist of rules on
communicate with students; with computer- which markings represent logarithms of
controlled projection units, they can add numbers and also permits calculation involving
graphics, sound, and animation to their exponents, trigonometric functions, etc.
communications.
4. Pascal mechanical calculator (1600) or
Computers are used extensively in scientific Numerical wheel calculator:-Blaise Pascal (1623
research to solve mathematical problems, -1664) in 1642 invented the first adding
investigate complicated data, or model systems machine called Pascaline. The brass rectangular
that are too costly or impractical to build, such box used eight moveable dials to add and sum
as testing the air flow around the next up of eight figures long using base 10. It can
generation of aircraft. The military employs perform all the four arithmetic operation with
computers in sophisticated communications to previous unheard speed.
encode and unscramble messages, and to keep
5. Leibnitz mechanical multiplier (1600): In 1694
track of personnel and supplies.
Gottfried Wilhem Von Leibnitz (1646 -1716)
improved upon the pascaline by creating a
machine that can also multiply using a system of
1.2 HISTORY OF COMPUTING
dials and gear
Since the creation of man, a significant amount
6 Colmarís Calculator (1820) by Charles Xavier
of human activities has been ascribed to
Thomas de Colmar: This presented a more
organizing and processing information so that it
practical approach to computing.
could be more easily presented for easy
comprehension. Many devices have been used 7. Punched-Card machine (Jacquardís loom)
in the past before the advert of computer. It is (1801): Joseph Marie Jacquard.
then necessary to vividly look into their
8. Mechanical computer: Charles Gabbage
evolution. Early computing machines:
(1792-1871) Father of the computer. Difference
1. Abacus (-2500BC): This is a hand- held device engine powered by steam and large as
made of beads stung on rods in a frame. The locomotive the machine has a stored program
rods correspond to positions of the digits while and could perform calculations and print the
the beads correspond to the digits. result automatically. We also have Analytical
engine credited to him.
2. Napierís Bone (2500BC): This was invented by
John Napierís (1550 - 1617). This consists of 9. Hermann Hollerith (1860-1929)
small rods with appropriate markings on them.
Hollerithís system punch-card reader
It is a mechanical aid to computation that
machine:-for counting census result in
consists of nine such rods (called bones) with
1890 in US.
one for each digit 1 through 9. He also invented
logarithms which made possible to do division formed tabulating machine company in
and multiplication by performing addition and 1896(TMC)
subtraction.
Automatic Tabulating Machine (ATM)-
1900
TMC was renamed to International They were very expensive to operate and in
Business Machines Corporation (IBM) in addition to using a great deal of electricity,
1924 after series of mergers. generated a lot of heat, which was often the
cause of malfunctions
In summary, the history of computing began
with an analog machine. In 1623 German First generation computers relied on machine
scientist Wilhelm Schikard invented a machine language to perform operations, and they could
that could add, and with the aid of logarithm only solve one problem at a time. Input was
tables, multiply and divide. Since then the based on punched cards and paper tape, and
development has pass through a lot of stages output was displayed on printouts. The UNIVAC
such as the invention of punched cards to and ENIAC computers are examples of first-
program patterns to create woven fabrics by generation computing devices. The UNIVAC was
Joseph-Marie Jacquard a French inventor in 19 the first commercial computer delivered to a
th century. business client. It was used in the 1951U.S.
Bureau Census.
Another early mechanical computer was the
Difference Engine, designed in the early 1820s 2. Second Generation - 1956-1963: Transistors
by British mathematician and scientist Charles
Transistors replaced vacuum tubes and ushered
Babbage. In the 1930s American mathematician
in the second generation of computers. The
Howard Aiken developed the Mark I calculating
transistor was invented in 1947 but did not see
machine, which was built by IBM. This
widespread use in computers until the late 50s.
electronic calculating machine used relays and
The transistor was a vast improvement over the
electromagnetic components to replace
vacuum tube, allowing computers to become
mechanical components.
smaller, faster, cheaper, more energy- efficient
To be sincere, the world has left the era of and more reliable than their first-generation
hearing stories about computer. We are now in predecessors.
the world of what you can use it for to serve its
Second-generation computers still relied on
desired purposes.
punched cards for input and printouts for
1.3 GENERATIONS OF COMPUTERS output. Second-generation computers moved
from cryptic binary machine language to
The history of computer development is often
symbolic, or assembly, languages, which
referred to in reference to the different
allowed programmers to specify instructions in
generations of computing devices. Each
words. High-level programming languages were
generation of computer is characterized by a
also being developed at this time, such as early
major technological development that
versions of COBOL and FORTRAN.
fundamentally changed the way computers
operate, resulting in increasingly smaller, These were also the first computers that stored
cheaper, more powerful, efficient and reliable their instructions in their memory, which moved
devices. from a magnetic drum to magnetic core
technology. The first computers of this
1 First Generation - 1940-1956: Vacuum Tubes
generation were developed for the atomic
The first computers used vacuum tubes for energy industry.
circuitry and magnetic drums for memory, and
were often enormous, taking up entire rooms.
3. Third Generation - 1964-1971: Integrated Fifth Generation - Present and Beyond: Artificial
Circuits Intelligence
The development of the integrated circuit was Fifth generation computing devices, based on
the hallmark of the third generation of artificial intelligence, are still in development,
computers. Transistors were miniaturized and though there are some applications, such as
placed on silicon chips, called semiconductors, voice recognition, that are being used today.
which drastically increased the speed and
efficiency of computers.
The use of parallel processing and
Instead of punched cards and printouts, users
superconductors is helping to make artificial
interacted with third generation computers
intelligence a reality. Quantum computation
through keyboards and monitors and interfaced
and molecular and nanotechnology will radically
with an operating system, which allowed the
change the face of computers in years to come.
device to run many different applications at one
time with a central program that monitored the The goal of fifth-generation computing is to
memory. develop devices that respond to natural
language input and are capable of learning and
Computers for the first time became accessible
self- organization.
to a mass audience because they were smaller
and cheaper than their predecessors.
INTRODUCTION
CHAPTER 3 - DIFFERENT PARTS OF A COMPUTER
Hardware is the term given to the physical
AND THEIR USES
components of a computer: e.g. keyboard,
monitor, system box or floppy disk drive.
Software, on the other hand, is electronic
INTRODUCTION
information: files, operating system, graphics,
computer programs are all example of software. The standard computer consists of a monitor, a
The difference between hardware and software keyboard, a mouse and the system unit. One
reflects the duality between the physical and can attach accessories such as printers and
mental worlds: for example, your brain is scanners by means of ports. Increasingly in the
hardware, whereas your mind is software. workplace, computers are connected to printers
and other computers by means of a network.
2.1 SOFTWARE
3.1 THE COMPUTER SYSTEM HARDWARE
Software is the stuff that makes your computer
do things for you. The computer without
software would be like a home entertainment
system with no tapes, CDís, or movies - you
have the machine, but thereís nothing to play
on it. Software is continually developed. Each
time the software maker (Microsoft, Adobe,
Corel, etc) develops a new version of their
software they assign it a version number.
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Application-Dependant Keys: The Mouse (Clicking and Dragging)
These are called function keys. They are F1, F2, This is another input device used to move a
F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12. small white arrow pointer-the Cursor (but the
Although the F1 key is usually used to get help shape will change depending on the context in
while working in Microsoft Windows, the use of which the mouse is being used) on the screen.
the other keys varies from one application to By pointing and clicking you can carry out
another. Eventually, the application you use will commands.
give you instructions on what to do and how to
The computer may ask you to verify that you
use the function keys.
are sure to rename a file, by clicking on the ëOkí
Key Combinations button. A mouse is primarily made of three
parts: the buttons, the handling area, and the
Some keys can be combined to produce
sensor (rolling object or light). There are either
uppercase letters or to access the upper
one, two or three mouse buttons. By default, a
symbols of some keys (i.e. the Shift and Control
mouse has two buttons: left and right. Most
keys). Keys are also combined for many other
mice nowadays are also equipped with a wheel
reasons. In some situations, you have to press
on top of the middle button called the Scroll
keys simultaneously, which means that you may
Button.
be expected to press two or more keys at the
same time, or almost at the same time. In some To use the mouse, the first decision you make is
other situations, you may have to press and to know which of your two hands you will be
release one key, followed by another. using to handle the mouse. By default, the
mouse is configured to work for the right hand.
Shortcuts
If you are left-handed, the settings can be
A shortcut is a quick action you ask a program changed to suit your needs: Start then Control
to perform when you press one particular key Panel then Double-click Mouse then on the
or a combination of keys. Some shortcuts are Buttons Tab, Check the Switch Primary and
universal or almost, that is, the computer Secondary Buttons check box.
responds regardless of what application is
You can also change the cursor from the default
running. Some other shortcuts depend on what
Up-Left Pointing to another but you should
you have on your screen. Some shortcuts are
know that this is best determined by the
already known to the computer (as part of the
computer as this varies from program to
operating system).
program. To change, click the Pointerís Tab.
Most other shortcuts are set by the Also click the other tabs to review the different
programmer of the particular application you properties.
are using. Yet some applications allow you to
Note: The expression "by default" means "if
create your own shortcuts. Some shortcuts are
everything is not (yet) changed from the original
readily obvious and can be seen from the main
or normal settings".
menu of the application. Some other shortcuts
are either part of Microsoft Windows (and can
be applied in your program) or are not easily
3.2 PARTS OF THE COMPUTER SYS. HARDWARE
displayed, you might have to search the Help
documentation of the program you are using The tip of the mouse pointer must be
positioned on the item you want to use
(Pointing). To select an item, point to the item Disk Size Conversion Chart (Bits, Bytes,
and click once (Selection ñ Left Clicking). Kilobytes, Megabytes and Gigabytes)
Double-clicking (left button) on an icon invokes
Bit - Binary digit:-a single elements in the
a command or launches an application
computer memory that can store either 1 or 0
The Peripherals
These systems were the first type to be A computer is referred to as "desktop" when it
produced. It is an electronic machine capable of is relatively small enough to be positioned on
performing arithmetic functions on numbers top of a table where a person is working. Such a
which are represented by some physical computer can also be placed on the floor or
quantities such as temperature, pressure, somewhere under, or aside of, the table, in
voltage, etc. Analog refers to circuits or which case the monitor would be placed on top
numerical values that have a continuous range. of the table. This is the most common type of
Popular analog computer used in the 20 th computers used in the office or at home. A
century was the slide rule. desktop computer is made of different parts
that are connected with cables.
Digital Computers
2. The Laptop
Virtually all modern computers are digital.
Digital refers to the processes in computers that A computer is called laptop when it combines
manipulate binary numbers (0s or 1s), which the CPU, the monitor, the keyboard, and the
represent switches that are turned on or off by mouse in one unit to be so small that you can
electrical current. A bit can have the value 0 or carry it on your laps when traveling or
the value 1, but nothing in between 0 and 1. A commuting. A laptop is also called a notebook.
desk lamp can serve as an example of the Other parts, such as an external mouse, an
difference between analog and digital. external keyboard, or peripherals such as a
printer or a projector, can be connected to the
If the lamp has a simple on/off switch, then the
laptop. A laptop is only physically smaller than a
lamp system is digital, because the lamp either
desktop but, everything considered, it can do
produces light at a given moment or it does not.
anything that a desktop can do.
If a dimmer replaces the on/off switch, then the
lamp is digital, because the amount of light can 3. The Server
vary continuously from on to off and all
A server is a computer that holds information
intensities in between. Digital computers are
that other computers, called workstations, can
more common in use and it will be our focus of
retrieve. Such workstations are connected to
discussion.
the server using various means. This means that
they could be connected using cable, wireless
connection, etc. Only computers that maintain a
Hybrid Computer
type of connection with the server can get the
This is when a computer make is of both analog information that is stored in the server.
and digital components and techniques. Such Normally, although not particularly
computer require analog to digital and digital to recommended, any computer, including a
analog converter which will make analog and desktop or even a laptop can be used as a
digital data palatable to server, as long as it can do the job required. A
server is more defined by the program (called
an operating system) that is installed in it, not
how the machine looks. Any type of computer,
including a desktop, a laptop, a CD or DVD
machine, etc can be connected to a server. The It is quite easy and simple for the
person who sets up a server also defines the viruses to sneak into a computer by
types of connections it is made for. dodging the defense systems.
The virus design purpose tends to vary The Resident virus implants itself in the
and Overwrite Viruses are memory of a computer. Basically, the
predominantly designed to destroy a original virus program is not required to
file or application’s data. As the name infect new files or applications. Even
says it all, the virus after attacking the when the original virus is deleted, the
computer starts overwriting files with version stored in memory can be
its own code. Not to be taken lightly, activated. This happens when the
these viruses are more capable of computer OS loads certain applications
targeting specific files or applications or or functions. The resident viruses are
systematically overwrite all files on an troublesome due to the reason they can
infected device. run unnoticed by antivirus and
antimalware software by hiding in the
On the flipside, the overwrite virus is
system’s RAM.
capable of installing a new code in the
files or applications which programs #Rootkit Viruses:
them to spread the virus to additional
The rootkit virus is a malware type
files, applications, and systems.
which secretly installs an illegal rootkit
#Polymorphic Viruses: on an infected system. This opens the
door for attackers and gives them full
More and more cybercriminals are
control of the system. The attacker will
depending on the polymorphic virus. It
be able to fundamentally modify or
is a malware type which has the ability
disable functions and programs. Like
to change or mutate its underlying code
other sophisticated viruses, the rootkit
without changing its basic functions or
virus is also created to bypass antivirus
features. This helps the virus on a
software. The latest versions of major
computer or network to evade
antivirus and antimalware programs
detection from many antimalware and
include rootkit scanning.
threat detection products.
#System or Boot-record Infectors:
Since virus removal programs depend
on identifying signatures of malware, The Boot-record Infectors infect
these viruses are carefully designed to executable code found in specific
escape detection and identification. system areas on a disk. As the name
When a security software detects a implies, they attach to the USB thumb
polymorphic virus, the virus modifies drives and DOS boot sector on diskettes
itself thereby, it is no longer detectable or the Master Boot Record on hard
using the previous signature. disks. Boot viruses are no more
common these days as the latest
devices rely less on physical storage
media.
How To Avoid Email Viruses And Worms and from, contact the service in question and file a
How To Be Safe From Email Viruses And formal complaint.
Worms
Do’s
Don’ts
1. Use a professional, email service such as
1. Do not open an email attachment unless you
Runbox. Subscription services provide higher
were expecting it and know whom it’s from.
levels of security and support.
2. Do not open any unsolicited executable files,
2. Make sure that your Runbox virus filter is
documents, spreadsheets, etc.
activated.
3. Avoid downloading executable or documents
3. Use the Webmail interface at
from the internet, as these are often used to
www.runbox.com to read your email, or don’t
spread viruses.
download all your email to an email client
4. Never open files with a double file extension,
unseen. Screen your email first, and delete
e.g. filename.txt.vbs. This is a typical sign of a
suspicious-looking and unwanted messages
virus program.
before downloading the legitimate email to
5. Do not send or forward any files that you
your local email client.
haven’t virus-checked first.
4. Make sure your computer has updated anti-
6. Viruses and spam
virus software running locally. Automatic
updates are essential for effective virus 7. Virus-makers and spammers often cooperate
protection. Combined with server-side in devious schemes to send as much spam as
scanning, you now have two layers of security. possible as efficiently as possible. They create
5. Disable message preview in your email client, viruses that infect vulnerable computers around
especially on Windows platforms. Otherwise, the world and turn them into spam-generating
malicious programs attached to incoming “robots”. The infected computers then send
messages may execute automatically and infect massive amounts of spam, unbeknownst to the
your computer. computer owner.
6. Ignore or delete messages with attachments
appearing to be sent from official Runbox email
addresses. Runbox rarely sends email to our How To Get Rid Of Computer Virus
users, aside from replies to inquiries and Never the neglect to take action on a computer
payment reminders. We practically never send virus residing in your system. There are chances
an email with attachments to users. that you might end up losing important files,
7. Take caution when opening graphics and programs, and folders. In some cases, the virus
media attachments, as viruses can be disguised damages the system hardware too. Thereby, it
as such files. becomes mandatory to have an effective anti-
8. Maintain several independent email virus software installed on your computer to
accounts. If a virus infects your only business steer clear of all such threats.
email address, you’ll be in trouble. Also, keep
backups of your most important email and files
separately.
9. If any valid message headers of a virus-email
indicate what server the message was sent
Signs of Virus Infection The Disk Cleanup tool helps in deleting
your temporary files on the computer.
It is vital for any computer user to be
aware of these warning signs – Here is how you got to go about
accomplishing it – Start menu then
• Slower system performance
select All Programs, now you click on
• Pop-ups bombarding the screen
Accessories, System Tools, and then
• Programs running on their own
click Disk Cleanup.
• Files multiplying/duplicating on their own
• New files or programs in the computer
• Files, folders or programs getting deleted or
Download Virus/Malware Scanner
corrupted
• The sound of a hard drive If you are under the impression that a
virus scanner cleanups the bad stuff
If you come across any of these above-
from your computer then sadly, that’s
mentioned signs then there are chances that
not true! It helps in eliminating
your computer is infected by a virus or
standard infections and not sufficient to
malware. Not to delay, immediately stop all the
remove the latest harmful infections.
commands and download an antivirus software.
The virus/malware scanner helps to
If you are unsure what to do, get the assistance
narrow down on the issue, so,
of an authorized computer personnel. If you are
download it now. In order to better
confident enough, start investigating on your
protect go for a real-time anti-virus
own by following the below mentioned step-by-
program, since it automatically keeps
step procedures.
checking in the background for viruses.
In order to free the disk space, delete The reason for running both is that one
temporary files before starting to run of them will effectively eliminate your
the virus scan. This approach helps computer virus or malware.
speed up the virus scanning process.
#Reinstall the Software or Damaged Files