Академический Документы
Профессиональный Документы
Культура Документы
The hardware are the parts of the computer itself including the Central
Processing Unit (CPU) and related microchips and micro-
circuitry, keyboards,monitors, case and drives (hard, CD, DVD, floppy,
optical, tape, etc...). Other extra parts called peripheral
components or devices include mouse, printers,modems, scanners, digital
cameras and cards (sound, colour, video) etc... Together they are often
referred to as a personal computer.
Central Processing Unit - Though the term relates to a specific chip or the
processor a CPU's performance is determined by the rest of the
computer'scircuitry and chips.
Currently the Pentium chip or processor, made by Intel, is the most common
CPU though there are many other companies that produce processors for
personal computers. Examples are the CPU made by Motorola and AMD.
With faster processors the clock speed becomes more important. Compared
to some of the first computers which operated at below
30 megahertz (MHz) the Pentium chips began at 75 MHz in the late 1990's.
Speeds now exceed 3000+ MHz or 3 gigahertz (GHz) and different chip
manufacturers use different measuring standards (check your local computer
store for the latest speed). It depends on the circuit board that the chip is
housed in, or the motherboard, as to whether you are able to upgrade to a
faster chip. The motherboard contains the circuitry and connections that
allow the various component to communicate with each other.
Some of the keys have a special use. They are referred to as command
keys. The 3 most common are the Control (CTRL), Alternate (Alt) and the
Shift keys though there can be more (the Windows key for example or the
Command key). Each key on a standard keyboard has one or two characters.
Press the key to get the lower character and hold Shift to get the upper.
Removable Storage and/or Disk Drives - All disks need a drive to get
information off - or read - and put information on the disk - or write. Each
drive is designed for a specific type of disk whether it is a CD, DVD, hard
disk or floppy. Often the term 'disk' and 'drive' are used to describe the same
thing but it helps to understand that the disk is the storage device which
contains computer files – or software - and the drive is the mechanism that
runs the disk.
Mouse - Most modern computers today are run using a mouse controlled
pointer. Generally if the mouse has two buttons the left one is used
to select objects and text and the right one is used to access menus. If the
mouse has one button (Mac for instance) it controls all the activity and a
mouse with a third button can be used by specific software programs.
One type of mouse has a round ball under the bottom of the mouse that rolls
and turns two wheels which control the direction of the pointer on the
screen. Another type of mouse uses an optical system to track the
movement of the mouse. Laptop computers use touch pads, buttons and
other devices to control the pointer. Hand held use a combination of devices
to control the pointer, including touch screens.
Monitors - The monitor shows information on the screen when you type.
This is called outputting information. When the computer needs more
information it will display a message on the screen, usually through a dialog
box. Monitors come in many types and sizes. The resolution of the monitor
determines the sharpness of the screen. The resolution can be adjusted to
control the screen's display..
Most desktop computers use a monitor with a cathode tube or liquid crystal
display. Most notebooks use a liquid crystal display monitor.
To get the full benefit of today's software with full colour graphics and
animation, computers need a color monitor with a display or graphics card.
Printers - The printer takes the information on your screen and transfers it
to paper or a hard copy. There are many different types of printers with
various levels of quality. The three basic types of printer are; dot
matrix, inkjet, and laser.
Modems are measured by the speed that the information is transferred. The
measuring tool is called the baud rate. Originally modems worked at speeds
below 2400 baud but today analog speeds of 56,000 are standard. Cable,
wireless or digital subscriber lines can transfer information much faster with
rates of 300,000 baud and up.
Modems also use Error Correction which corrects for transmission errors by
constantly checking whether the information was received properly or not
and Compression which allows for faster data transfer rates. Information is
transferred in packets. Each packet is checked for errors and is re-sent if
there is an error.
Anyone who has used the Internet has noticed that at times the information
travels at different speeds. Depending on the amount of information that is
being transferred, the information will arrive at it's destination at different
times. The amount of information that can travel through a line is limited.
This limit is called bandwidth.
Digital cameras allow you to take digital photographs. The images are
stored on a memory chip or disk that can be transferred to your computer.
Some cameras can also capture sound and video.
Case - The case houses the microchips and circuitry that run the computer.
Desktop models usually sit under the monitor and tower models beside. They
come in many sizes, including desktop, mini, midi, and full tower. There is
usually room inside to expand or add components at a later time. By
removing the cover off the case you may find plate covered, empty slots
that allow you to add cards. There are various types of slots including IDE,
ASI, USB, PCI and Fire wire slots.
Depending on the type notebook computers may have room to expand . Most
Notebooks also have connections or ports that allows expansion or
connection to exterior, peripheral devices such as monitor, portable hard-
drives or other devices.
Sound cards allow computers to produce sound like music and voice. The
older sound cards were 8 bit then 16 bit then 32 bit. Though the human ear
can't distinguish the fine difference between sounds produced by the more
powerful sound card they allow for more complex music and music
production.
Random Access Memory or RAM is the memory that the computer uses to
temporarily store the information as it is being processed. The more
information being processed the more RAM the computer needs.
RAM memory chips come in many different sizes and speeds and can usually
be expanded. Older computers came with 512 Kb of memory which could be
expanded to a maximum of 640 Kb. In most modern computers the memory
can be expanded by adding or replacing the memory chips depending on the
processor you have and the type of memory your computer uses. Memory
chips range in size from 1 Mb to 4 Gb. As computer technology changes the
type of memory changes as well making old memory chips obsolete. Check
your computer manual to find out what kind of memory your computer uses
before purchasing new memory chips
Software
The software is the information that the computer uses to get the job done.
Software needs to be accessed before it can be used. There are many terms
used for process of accessing software
including running, executing, starting up, opening, and others.
As well any document that you create, graphic you design, sound you
compose, file you make, letter you write, email you send or anything that
you create on your computer is referred to as software. All software is
stored in files.
There are millions of different pieces of software available for almost every
conceivable need. Software is available commercially through stores and
mail order and also available on the Internet. Software is also available
through an Open Source license which allows anyone to use the Open Source
software free of charge as long as the license is maintained. If you can't find
the application that you need software development companies can custom
design software for you.
The three basic types of software are; commercial, shareware and open
source software. Some software is also released into the public domain
without a license.
Operating Systems
All computers need some sort of Operating System (OS). The majority of
modern home computers use some form of Microsoft's operating systems.
The original Microsoft operating system was called DOS (Disk Operating
System) though most computers use Windows. Windows comes in various
versions beginning with version 3.x then 95, 98, ME, XP, Vista and currently
version 7. A few computers use IBM's O/S2. Apple's Mac use their own
operating system beginning with OS 1 though to OS 10.x. In the past large
companies and institutions would have an operating system design
exclusively for them but as the commercial operating systems become more
sophisticated the benefits of this practice is becoming less apparent. Some
computer professionals, Internet Service Providers (ISP) and mainframe
computer users use an operating system such as UNIX (or a variant such as
Linux), Windows NT or 2000 (Win2k) or one of the other network or server
based operating systems.
There are many smaller operating systems out there. The problem is that
software is currently being developed only for the main operating systems
and only the newest versions of these OS. Many older computers with unique
operating systems have lots of software already developed for them but
there is very little new software being developed for the older computers.
The older operating systems are less likely to offer technical support than
the more modern operating systems.
The operating system controls the input and output or directs the flow of
information to and from the CPU. Much of this is done automatically by the
system but it is possible to modify and control your system if you need to.
When you turn your computer on it first needs to load the operating system
sometimes referred to a booting up. Basically the computer starts from
scratch every time you turn the power on.
It checks all its components and will usually display a message if there is a
problem. Loading the system is usually automatic.
Once the system is loaded the user can start the application or program that
they are going to use.
Most computer users will run Microsoft Windows, Mac OS or Linux as their
operating system. These OS are Graphic User Interface (GUI) which allows
the user to control or run the computer using a Mouse and Icons. The user
simply moves the mouse on a flat surface, rolls the trackball, or moves their
hand over the touchpad to control a pointer. They then choose the option
they want by pressing a button or touching the pad.
Without a GUI the user controls the computer using the keys on the
keyboard. This is referred to as a Command Line Interface (CLI)
Disks and cards are used to store information. All information on computers
is stored in files. The size of a file is measured in bytes.
A byte is approximately one character (letter 'a', number '1', symbol '?'
etc....).
Compact disks or CDs can store large amounts of information. One disk will
store 650 Mb. One type is a CD-ROM which stand for Compact Disk Read
Only Memory. Another type is a CD-RW which stands for Compact Disk -
Read/Write. CD drives can copy information or burn information on to a
blank CD. Common Read Only CD blanks can only be written to once though
more expensive Read/Write CD's can be used over and over again.
DVD disks can store 4.5 Gb on standard disk, 8 Gb on a dual layer disk and
16 Gb on a blue-ray disk.
Digital recorders allow you to store large files, such as movies, on a single
disk.
Floppy disk or diskette comes in two basic sizes; 5.25 inch and 3.5 inch.
Both have a low and high density versions though 3.5 inch high density disks
are the most common though many modern computers are being sold
without floppy disk drives.
3.5 high
1.44 Mb 720 pages
density
There are many other storage devices including tapes, Panasonic's LS120
3.5 inch diskettes, Iomega's Zip & Jazz disks, VCR tape and many others.
Innovation in storage technology is advancing rapidly and some technologies
become obsolete..
Note: Keep disks away from strong electric or magnetic fields including x-
rays. Be aware of high electromagnetic areas in the room such as
televisions, speakers, high tension wires, etc... Use disks only at room
temperature and keep them out of direct sunlight. If possible avoid passing
electromagnetic storage devices through airport x-rays. In theory
information stored on a disk will last indefinitely but the physical storage
device will wear out with usage and time so be sure to back up(copy) your
important files to a second storage device.
ENTER or RETURN - Moves the cursor down one line and to the left margin.
Enter also process commands such as choosing an option in a dialog
(message) boxes and submitting a form.
BKSP or BACKSPACE - Deletes the character to the left of cursor and all
highlighted text.
SPACE BAR - Moves the cursor one space at a time to the right
SHIFT KEY - Use the shift keys to type capital letters and to type the upper
character on keys with two characters on them
CAPS LOCK - Locks the keyboard so it types capital letters (a light goes on
when caps lock is on)
TAB - Moves the cursor five spaces to the right (number of spaces are
usually adjustable). Tab moves to the next field in a form or table (Shift-Tab
for previous field).
ARROW KEYS - Moves the cursor around document without changing text
Some Notebook or Laptop keys are left out because of space limitations
and they usually have a Special function key which allows other keys to
double for the missing ones.
Place one space between each word, after a punctuation mark and at the
end of a sentence. Always start a sentence with a capital letter. Use
capitals for names, addresses, provinces and countries, places,
organizations, businesses, associations, schools, colleges, universities, days
of the week, months, holidays, nationalities, ethnic groups and languages.
The first is called Touch Typing. The Touch Typist uses the Home
Keys (asdf for the left hand and jkl; for the right) and all the fingers on
both hands as well as the thumbs for the Space Bar while typing. There are
many commercial and public domain programs that are designed to teach
this method.
The other method is some times called 'Hunt and Peck' or depending on
finger strength 'Search and Destroy'. This involves using one or more fingers
on one or two hands to type. It is a perfectly acceptable way of using a
computer and many people get along fine with this technique.
Health and Safety
Health and Safety is crucial to the effective
operation of a computer. Stress is widely
accepted as a common and possibly the most
dangerous aspect of using a computer.
Eye strain can be caused by staring at a fix object for extended periods of
time (like a computer). People who use glasses may have to get their
prescriptions changed and people who use bifocals can find that the line
interferes with the screen and trifocals triple the problem. Regular users of
computers may develop focusing problems. Temporary colour distortion has
also been reported.
Time away from the computer during the work day is crucial! This gives
the body a chance to stretch and gives the eyes a chance to
rest. Breaks should be scheduled and followed with great discipline.
Computers, even more so than television, have a mesmerizing effect on the
user so that it is easy to work right through breaks without noticing.
There are many other issues to be discussed around computer health and
safety but it is important to understand that there are problems and
solutions to those problems that the user, administrator and manager must
address.
Using Software
As stated earlier software is anything created and/or stored on a computer
or computer storage device (like a disk). The work that is produced using an
application or program is also software and is usually referred to as a file or
a document.
Once you have typed or created a new document or file on your computer,
you will have to decide what to do with it. You could print it right away
using a Print command and then Exit or Quit your program without saving
it, but most of the time you will want to Save your document for future use.
The computer saves its information on a disk, most often the hard disk, and
the users determines where and when the file or document is saved.
top
Users can create and delete directories or folders as the need arises. Older
operating systems require that the directory be emptied of files before it
can be deleted. When removing a directory always check before deleting it
to make sure that it doesn't contain files you need.
You can easily move files from one folder or directory to another
using menu commands, drag & drop using the mouse or a file utility. It
is important to understand your computer's directory structure as a file
can be misplaced if it is saved in the wrong directory.
One of the main problems new users have is creating a filing system.
Modern operating systems address the 'filing problem' by automatically
creating a (My) Documents folder. By saving files or documents in this
folder you will always know where to look for your files. Create sub-folders
within this folder for your main projects. Examples could be a separate
folder for your correspondence called Letters or a folder for images called
Graphics or Pictures. The main Documents folder can also be renamed to
what every name you want it to be called. If your operating system doesn't
automatically create this folder simply create your own Documents folder to
save your documents in.
top
In order to save a new document or file you must first choose the Save
command. Most modern software place this command in a menu which you
access with the mouse button or Alt key. Each file must be given
a filename so it can be found easily the next time it is needed.
Computers using DOS 6.X or older followed the 8.3 rule: a filename can only
be 1 to 8 characters long followed by a 1 to 3
character extension separated by a dot. Three character extensions are
common because of this.
It is possible to save or move files anywhere that your computer can access.
This includes disk (or other storage devices) on your computer, to any
directory or sub-directory on your computer or on a network that your
computer is connected to. Always make sure that you have chosen the
correct directory and filename before pressing Enter or choosing Save.
top
Printing
When choosing a printer consider the peripheral equipment that you will
need as well as the actual printer. Peripherals include paper, ribbons or ink
cartridges, toner and occasionally print heads.
You may have to adjust some of the settings for the printer to get the
output you want. Density adjustments determine how much ink is placed on
the paper or how many dots per inch (DPI). Draft quality will printer
quicker but creates a fainter copy (less dense). Modern Software has
a Preview option which show what the page will look like when it is
printed. Portrait prints the document up and down. Landscape prints the
document on it's side. Most software allows the user to adjust the margin
width or the blank space at the top, bottom, left and right edge of the
paper.
top
Exit or Quit
Exiting properly also saves the program settings so that when you return to
the application many changes that were made will still be active.
top
Menus
The items on the menu are Commands or the features of the program. You
choose the command that you want with the keyboard, mouse, trackball or
touchpad. Commands control the operation of the software.
Menu bars are usually positioned at the top of the screen and are accessed
by moving the cursor to the menu and pressing the button (left button if
there are two). This displays a pull down menu with a number of commands
or features. Depending on how the program works either let go of the
button and move to the command you want then press the button again to
choose it or while holding down the button, move to the command and let
go to choose it.
Menus can also be controlled through the keyboard. The most common way
of accessing the menu through the keyboard is by pressing the Alt key and
using the Arrow or Cursor Movement keys to move through the menu
items, then pressing Enter to choose the item you want. Many menu items
can also be accesses using Hot key combinations. One common keyboard
combination is to first tap the Alt key and then press letter key for the
command you want.
Menus are created in a hierarchy. Some menu items branch out to give even
more choices. Some menu items open Dialog Boxes that allow you to choose
from a number of different options.
Windows has a context sensitive menu that is activated with the right
button. When the right mouse button is click over an object on the screen or
area of the screen, a specific menu with commands related to that object
will be displayed. Click the left mouse button on the command to choose it.
top
Older software many not have this option. The installation procedure is the
same though. First create a folder or drawer to store the program and it's
related files in. This makes it easy to find them and minimizes file clutter in
the main directory. Copy the files from the installation disk to the folder
that you will be running the program from. A lot of Software
is compressed and you may need to uncompress it before you can use it.
You then can create a new item, create a short cut to the program or add it
to your desktop menu or utility program.
top
Backing up Files
One simple way to backup your files is to copy them to a disk. If there are
only a few small files a floppy disk will work but if you are backing up lots of
large files a cd/dvd burner, a second hard drive or tape backup may be
needed. You can use a software program to automate backups or do it
manually. A manual backup usually involves dragging the files or folders to
the backup disk or tape to create the duplicate backup.
Store your backup files in a safe place out of the sun and away from electro-
magnetic devices such as speakers and wires with strong electrical currents.
Every file that you create and plan to keep should be backed up. This
includes word processing documents, financial information, databases,
photos, etc...
Some less obvious files that also need to be backed up are email, Internet
Favorites or Bookmarks, and Address Books. Check the help files in your
email program on how to back up email. Generally each folder name in your
email program is a file containing the individual email messages and copying
these files to the backup disk or tape will be sufficient. Software
preferences such as customized menus and settings can also be backed up.
Check your software's help files to find out where these files are located.
Most software you buy or get off the Internet is Compressed. Computers
store information in bytes which are made up of on or off signals. The
software applications that uses these files need to have all the on and off
signals (bytes) in place but when the file is stored they can be modified to
take up less space on the storage disk or tape.
There are commercial and shareware programs that will compress and
decompressed files for you. The most popular form of data compression is
called zip or stuff it but there are others available as well.
Programs are also available to compress and decompress your files as you or
the application you are using requires them. This can be a way of making
more space available on a hard drive. Windows comes with a program that
will compress part of your hard disk. Be sure to read the documentation
before embarking on a project like compressing a hard drive.
The Desktop
The Desktop offers many features that make using your computer easier.
You can easily start programs or applications, copy and move files from one
place to another and drag and drop files and program where you want them
on the computer or even on to a program's icon to open a file. Open and
Save menus are streamlined to allow all applications to have the same basic
features plus program specific features.
Desktop
Menu
The Start Button or Apple menu starts programs, opens documents, and
access most parts of the system. Windows Program and Apple Dock menus
can be customized as needed.
• Program or Dock displays a list of the programs that are installed
through Windows and available to use
• Documents displays a list of the last 15 documents used allowing the
user to open them directly from this menu
• Settings displays system components, such as printers, control panel
and taskbar
• Find/Search has search abilities to find files, folders and phrases in
documents on your computer
• Help displays help topics broken up into contents, index and find
components
• Run allows you to start a program from a command line
• Shut down shuts down the computer, restarts the computer or logs
you off a network
• Favorites and Active Desktop is an option available to Windows 98+
(or Internet Explorer 4x) users
Taskbar (Windows) or
Dock (Apple)
• used to change system settings like screen savers, time, screen colours
• also used to add and remove programs, fonts add and make changes to
hardware and software settings
Computer
• displays all the components of the computer including disk drives and
networks
• all parts of the computer can be accessed through My Computer's
hierarchical structure
• double click on any icon to view the contents of a disk, folder or run a
program
All programs, folders, tasks and most other operations open in a window.
Toolbar
Status bar
Favorites
Some Features
• Long file names - document names can now use names up to 255
characters including spaces using any character except \ / : * ? " < > |
• Plug and Play - many hardware devices like CDs, tape drives, upgrade
cards, etc... will automatically be detect and can be automatically
install on the system
• 32 bit Preemptive Multitasking - allows users to leave a task running
while working on another
• Right Mouse button - used to display event specific or context
sensitive menus (Microsoft)
• Drag and Drop feature allows files or other information to be dragged
from one area and dropped in a new location or into an other
application
• Active Windows - make your Desktop behave like a web site
(Microsoft)
• Software Update - automates updating software through the Internet
• System Information or Profile - provides information about the
computer system
Using Help
• to get help about a specific procedure click the help button in the top
right corner of the screen
• Contents list general topics grouped by subject
• Index list specific topics accessed by scroll bars or typing the topic
• Find creates an index of words in Help and allows searches by word or
phrase
• click Help Topics to return to the Help menu
• Troubleshooters will step you through a series of steps to solve
computer problems (Microsoft)
The right mouse button is a great feature of the Windows operating system
and can be a real time saver. Right click on;
Backing up files
Many backup options are done automatically by the computer which will
provide various options to recover them in a crisis but a hard drive error can
happen at any time and without warning. Be sure to back up all your
personal and business data on a regular basis. If you have a second hard
drive files can be backed up to that drive. A CD-R can also be used to make
a back up or a collection of floppy disks can also be used. When backing up
files don't forget your email and address book. Some people also have
extensive collections of favorites that can be backed up as well. Check your
email, address book and browser for information on backing up these files.
Some programs have an export feature that can be useful when making back
ups.
Different Methods of Opening Documents and Programs
• Open a program and use the Open command in the File menu
• Use the Documents command in the Start or Apple menu to open a
recently used document
• Use the Find command in the Start menu or the Sherlock program on a
Mac
• Double click on an icon in a Folder
• Right click and choose Open
• Choose Start, Run and type the application (and path)
Creating Folders
• Use the New Folder option in the File menu (or right click) to create a
folder in the active window
• Use Drag & Drop to drag the file or folder from one folder to another
o with the right button a menu will appear allowing you to Copy or
Move the file or folder (Windows)
o files on the same disk are moved (hold Ctrl to copy)
o files on another disk are copied (hold Ctrl to move)
Use the Edit menu to Cut the file and Paste it in the destination folder
Hold down Shift while Deleting a file to by pass the Recycle Bin and
permanently delete files
Multiple Selection
• to select files sequentially click on the first file and move to the last
file, hold down shift and click on the last file in the sequence
• to select files non-sequentially click on the first file and hold Ctrl
while clicking the rest
• the two methods can be used in combination
Troubleshooting
Database
A Database is a collection of information stored in a way that makes it easy
to retrieve, modify and search. A database can be stored in a single file
with all the information stored together in a single table which is called
a flat database or stored in multiple tables with some common access
information referred to as a relational database.
Access , Corel Paradox, FileMaker, IBM DB and others. There are also an
Each person or item in a database has it's own Record. Each piece of
information about that person or record are stored in Fields. All the
information in all the records makes up the Database.
Each Field can have information typed into it. Use the Tab key to move
forward through the Field and the Shift-Tab to move backwards. Many
databases also allow users to use the arrow keys to move around as well.
Though many fields only allow a single line of input some allow multiple
lines. When the cursor reaches the bottom of a field with multiple lines the
text will scroll upwards to show any information that is below the line of
sight. If there is more text in the field than there is room on the screen use
the arrow keys to move the cursor through the text.
The data can be arranged to create reports and print the information in a
specific format.
The data can also be used by other programs for things like invoicing and
form letters. The data from a database can be merged with forms created
in other programs for a wide range of uses.
When setting up a database make sure to take a bit of time to decide what
fields are needed and how they relate to other information. For instance, if
an address is required does it need to be broken down into a number of
fields such as street, apartment, city, etc? Does the street need to be
broken down into house number, street name, street type, etc? Does a
phone number need a separate field for the area code? Taking time to
decide what is needed before beginning a database project is better than
spending many frustrating hours modifying the data in the future.
Spreadsheet
Spreadsheets are used to work with financial information. Spreadsheet
charts are laid out in numbered rows and lettered columns. Where the row
and column intersect is called a cell. The cell is referred to by the letter
and number of the intersection called the cell address. The first cell in a
chart is at the intersection of column A and row 1 and is referred to as Cell
A1.
Use the plus sign (+) to add; the minus (-) sign to subtract; the asterix (*) to
multiply; and the back slash (/) to divide.
Most of the standard editing features are available in the spreadsheet such
as Bold, Italics, Underline, Move, Copy and Paste.
Computer graphics are anything that can be displayed on the screen except
the text and sometimes even text falls into the graphics category if it is save
in a graphics format.
Macromedia
Macromedia Freehand
Fireworks
LView ULead
Each type of graphic has it's own advantages and disadvantages. Older
versions of HTML were only able to recognizes bitmapped graphics so most
graphics created for the Internet, using standard HTML, are created or
converted to a bitmap format. The newest version of HTML or XHTML is able
to display vector graphics but not all browsers are able to display these
graphics.
Within each of the two main types there are dozens of different formats.
Graphics formats are distinguished by their filename extensions.
Some of the structured formats are .ai, .cmx, .eps, .wpg, .cgm and
a host of others.
Sound
You may have heard .mid files play when visiting various websites. Musical
Instruments Digital Interface (MIDI) files are basically sound tracks which use
a collection of sounds contained in the .mid file to play a tune.
To create a sound file you will need an audio program. You can then record
with a microphone or off of a prerecorded medium. Your computer will need
to have a sound card properly installed and a speaker to hear your
recording. You can save the sound file to play back later.
Animation
You may have seen .gif animations on this website. A GIF animation is a
series of separate images or frames that display one after the other to give
the impression of movement. Other formats are Audio Visual
Interleaves’ .avi, the before mentioned mpg, Microsoft's Media
Player .wmv, Apple's Quick Time .qt, .aif(*) &.mov, Real Network's
RealVideo .rm(*), Macromedia's Flash creates Shockwave.swf,
and JavaScript as well as various others.
To create animations, sounds or graphics you will need a program that has
the capabilities you want. Visit the various multimedia company websites to
read up on their product to see if they can do what you want. (Hint: to find
a company website type "www.'replace this with the companies
name'.com"). Most companies offer free trials that you can download from
their website.
You should also be aware that most media content placed on the Internet is
considered published material and therefore copyright unless explicitly
stated otherwise.
Desktop Publishing
Desktop publishing (dtp) uses both word processing and graphics to produce
publications and presentations.
Some common dtp programs are MS Publisher and Quark Express. Both
Adobe and Corel have a number of programs that work like dtp programs.
Internet
Once you have purchased an account with an ISP you will be given
an account name. This is often your email address as well. You will also be
given a password and should also be provided with instructions on how to
change the password to a unique and personalized. The generic password
provided with your account should be change to one of your own. Protect
your password as you would any personal identification number (PIN)
number.
top
The ISP will also provide information on how to configure your software.
This can be simple or difficult depending on your Operating System. Once
configured you simply run the software to connect your computer's modem
to the ISP's modem, giving you access to the Internet.
There are a number of pieces of software that work together to connect you
to the Internet.
top
The first and most complicated is the dialer or socket software. This is the
software that makes the physical connection with the ISP's computer and
the internet. This needs to be configured only once but you will need
instructions from your ISP on how to do this as each ISP has a different
setup.
top
The second piece is an Internet browser. This is the program that locates
websites for you and allows users to maneuver around (surf) the World
Wide Weband view web pages. Some of the more popular browsers are
as dozens of others. Before graphic browsers Lynx was the most popular
browser and is still available for text browsing. New browser are being
developed and current browsers are constantly updating there programs. It
is extremely important to update your browser every once in a while. Some
ISP have a proprietary type of browser though most have given up this
practice as it limits the users abilities to browse the Internet.
Type the url or web address of the website that you want to visit in
the address bar of your browser and press Enter or click Go. Collect your
favorite websites by adding them to your Favorites or Bookmarks. To go to
a Favorite or Bookmark, click on the menu and click on the link.
There are many different ISPs. If you attend a university or college or belong
to a military or government organization you can most likely get Internet
access through your school or work. If not you will most likely buy access
from a commercial provider.
Another option, if you are in a major center, is the Free net. Many major
cities have groups devoted to making the Internet accessible to the greater
majority of people and create Free nets which allowing members free
access to the Internet. They run on private and public donations. It is an
excellent way of learning about the Internet in a helpful environment.
Once you are connected you will have access to Email, Newsgroups,
the World Wide Web (WWW), File Transfer Protocol (ftp), Internet Relay
Chat (irc),Search Engines, ICQ and other Internet Services.
Internet - Email
Email is the electronic equivalent of sending a letter through the mail.
There are many different mail reading programs or clients that control email
but the basic functions are all the same. An email address directs a message
to the recipient.
• the account name (often the users first initial and then the last name
(sometimes only 8 characters)
• then the @ symbol
• then the name of the user's ISP
• the last 3 characters describe the type of service for the top level
domain (TLD) name. For example .com stand for commercial
site, .mil - U.S. military, .gov - U.S. government, .net - network,
etc...
• when an address has 2 characters it is a geographical top level domain
(gTLD). For example .ca - is a site registered in Canada, .au - is a site
registered in Australia, .tv - is a site registered in Tuvla
• new TLDs are occasionally added including; .biz, .info, .name,
.asia, .mobi
Email can be composed and sent as plain text or HTML. Plain text messages
can be read by any email client but most modern email clients can compose
and display email documents containing formatting such as bold, different
font size and colour, images, etc.
Many ISP's also offer web mail programs so that you can logon to check and
send email using any internet accessible computer.
Some companies offer free email service that you can sign up for. These
free services rely on advertising for revenue so your recipient will also be
receive an advertisement with the email. Most free email accounts are
accessed through a web browser where the user composes and reads their
mail online. The benefit is that you can easily access your mail from any
internet terminal and the address is easily disposable (if it gets added to a
junk mail list for instance).
You can also attach files to email messages to send picture, sound,
documents, videos and other types of file with your email. Some email
programs automatically open attachments such as photos and html code.
Change the program's properties or options to turn this feature on or off.
Email Attachments
An attachment is a computer file or files place inside an email
message.
These lines are all printable or lower-ASCII characters and can be sent via
email. When it gets to your computer and you want to view the document,
it first must be decoded or converted back to it's binary format before it
can be opened. Today this is typically handled by your Email program.
There are several common encoding standards, the most popular being
encoding, mime, and binhex. Not all email packages support even these
three, let alone all the non-standard ones. If someone sends you a document
encoded in a format that your email program doesn't support the email
program will not decode the attachment.
The attached file must be loaded into a program to be viewed. For example,
if the attached document was originally created in Microsoft-Word you need
Word, Open Office or another modern word processor on your computer to
work with the document. Most modern software
suites can import documents from other suites.
Most modern email programs work hand-in-hand with your operating system
to try and open the correct program required to view the document sent as
an attachment. This is done by matching the file extension such as .jpg,
.gif, .doc, etc... with a registered file type.
Viruses can also be transferred via email attachments. Because your email
software handles the decoding of programs sent as attachments it is easy to
infect your computer simply by opening an infected attachment. Always
check email attachment with an anti-virus program before opening them.
There are several reasons why an attachment will not display properly or at
all:
When sending an attachment you should think about whether the intended
recipient has the same program on their computer. When you are sending an
attachment to someone you should always use a standard encoding process
(the one that comes with your email program is usually best) and send the
document in a format that the recipient can view. If in doubt, ask them first
by email.
Macs users should be aware that most Windows user won't be able to decode
a binhex file.
If the formatting isn't important it's better to copy your the text from the
original program and then paste it into the body of a plain text email
message rather than sending an attachment. Everybody's email software can
read this 'plain text' ASCII format.
There are thousands of news groups covering as many topics. Some are
moderated, meaning that a person who has knowledge or an interest in a
certain topic will receive the message and read it before posting it. This
keeps the discussion on topic. Most are not moderated and the discussion
can go anywhere but it can be a great way to get a quick reply to your
questions.
Internet - Navigation
World Wide Web (WWW) is a collection of web pages connected together
with hyperlinks. Each document or page has a unique address that allows
you to find it among the millions of other documents on the Web. The
address is called a Uniform Resource Locator (URL) or sometimes
a Uniform Resource Indicator(URI). When you chose a new link by clicking
on it or by typing it into the address field your browser sends a request for
that document and displays it on the screen. That link can be to a different
section of the current document, another document on the same website as
the original or on another website anywhere in the world. Web pages are
designed using hypertext markup language or HTML.
Designing a basic HTML page is not difficult after mastering a few simple
codes or if you are planning a website you can have a Web Developer (send
me an inquiry)create one for you. The key to the web are the links to
different, useful or interesting pages. Internet user collect links to their
favorite sites or web pages and add them to a bookmark or favorites list.
Internet - Other
File Transfer Protocol (ftp) allows users to transfer files and documents
from one computer to another. There are a few different software programs
that will make this process quite simple. If you are designing a website you
can use ftp to update your website.
Computer users can also use an ftp program to download files and software
off the internet. Many companies and universities offer ftp sites that contain
software which can be downloaded and used on your computer. A search for
'ftp' will display dozens of ftp programs that can be used to download
software.
top
Along the same theme are online game sites where Internet users can
compete against other users on the Net.
top
Internet - Search
If you are looking for a specific company or organization try
typing www.company name.com into the address bar first (e.g.
www.grassrootsdesign.com). If it is a "country specific" organization try
ending with the specific, 2 character country code rather than .com (click
here to display countries and their code).
Search Engines make finding things on the Internet relatively easier. Search
engines are run by companies that collect information from the Internet,
sort and categorize it and present the information to the user based
on keyword searches or through directory listings.
Different search engines will display different results and sort those results
differently. If you don't find the information you want on one search site try
another. Some search companies offer meta searches which are compiled
from a number of different search engines' results.
The results from a search are a list of pages with links to the documents
that match your search. Each search engine has a different way of displaying
the results but generally you will see a list with the name of the
organization or title of the page. You may also see a short description of
that web page. Clicking on the title will take you to that page.
Though there are hundreds of search engines on the Internet there are only
a couple dozen that the majority of people use. If you choose "customize" in
your browsers search tool you will see a list of some of these search engines.
Website Search
Computer Viruses
A virus is a program designed by a computer programmer (malicious
hacker) to do a certain unwanted function. The virus program can be simply
annoying like displaying a happy face on the user's screen at a certain time
and date. It can also be very destructive and damage your computer's
programs and files causing the computer to stop working.
The reason why hackers create viruses are open for speculation. The most
quoted reason is simply to see if it can be done. Other reasons are Ludite
based "smash the machine" motivations, antiestablishment/anti-corporate
actions, criminal intent, and various others that range into the "conspiracy
theory" realm.
One is a boot sector viruses which infect the section of a disk that is first
read by the computer. This type of virus infects the boot or master section
of any disks that it comes in contact with. The second is
a program virus that infects other programs when the infected program is
run or executed. Some viruses infect both and others change themselves
(polymorphic) depending on the programs they encounter.
Viruses can cause a great deal of damage to the computers it infects and
can cost a lot of time and money to correct it.
Computer viruses have been around for a long time, even before computers
became widely used and they will likely remain with us forever. For that
reason computer users will always need ways to protect themselves from
virus programs. The main, common feature of a virus is that it
is contagious! Their sole purpose is to spread and infect other computers.
Modern email programs provide the ability to allow users to format email
messages with HTML and attach scripts to them for various purposes and it is
possible for a malicious hacker to attempt to spread a virus by building a
virus script into an HTML type of email message.
When you are accepting software or scripts on Internet sites or reading mail
from unknown senders it is best not to run a program from that site or
sender without checking it with an anti-virus program first.
Protect yourself
You can take safeguards against virus infection. The first thing is to get an
anti-virus program. Most reputable companies that create virus protection
programs release an evaluation copy that an Internet user can download for
free and use for a certain amount of time. This anti-virus program will be
able to check your computer for viruses and repair damage or delete
files that are infected with viruses. You may have to replace infected files
that cannot be repaired.
The second thing you can do is purchase a copy of the program. The reason
for this is that viruses are constantly being created. When you purchase an
anti-virus program you are also purchasing periodical updates which keep
your anti-virus program up-to-date and able to deal with new viruses as they
are encountered. Commercial virus programs also allow the user to
customize when and how the program will check the computer for viruses.
You will need to renew this updating service periodically.
If you find that your computer has been infected with a virus use an anti-
virus program to clean your computer and make sure to check all the
disks that you use. This includes all the hard drives on your computer(s) and
all your floppy disks and CDs as well as any media that you save information
on. Remember that the virus can easily re-infect your computer from one
infected file!
If you have to reload your computer programs, use the original program
disks. You may want to check your original disks before reinstalling the
software. If your original disks are infected contact the distributor to get
replacements.
Always take the time to ensure that your computer is properly protected.
Spending money on a good virus checking program could save you hundreds
of dollars and lots of time later.
Computer Security
There is a lot of discussion these days about computer security as more
people use email and more services such as banking, mail orders and
subscriptions become available through the Internet. But how secure is the
Internet and what is computer security?
Updating Software
With the advent of the Internet, computers users can now work in an 'open
system' and security has become much more complicated. Even though you
can now connect your home or office computer to the Internet and
perform remote transactions without leaving the building you still want to
be sure that the transaction is secure. The transaction takes place through
the Internet by bouncing the information through various computers before
it reaches, for example, the bank's computer. You want to be sure that no
one observes the transaction along the way and collects or modifies your
transaction information.
This is where computer security comes in. There are many different types of
security systems though most use a process called encryption. When you
connect to your bank or other service to make a transaction you are often
required to send your account number or user name as well as a Personal
Identification Number (PIN) or password for verification. This information
should only be sent after establishing a secure connection. If you are using
an Internet browser you will see a small closed lock appear in the window of
the browser. Once you are connected to a secure server any information
you send or receive is scrambled or encrypted using a mathematical formula
and then reassembled or decrypted at the other end. The computer user
usually will not notice this happening as they perform their secure
transaction. Anyone with criminal intent who intercepts your transaction
will be treated to a stream of garbled nonsense -
(e.g..qANQR1DBwU4D560EJv6XqrMQB)!
If this is the first time you use a new service you most often will need
to setup an account and possibly download a small piece of software called
a plug in which allows your computer to create the secure connection or
link.
The transaction often involves the exchange of a small file that keeps track
of the transaction and can act a flag or bookmark when you next visit that
website. These small files are called cookies and are set by the website you
are visiting. They can contain information such as the type of server you are
connecting from, the type of browser you are using, the last site you visited
and any information you volunteer. You can view the information stored in
the cookie. Try a search for 'cookie' to find the cookies folder. Windows
users can view any cookies they are storing in the
folder C:\Windows\Cookies\.
Setting up security
As the most people won't be setting up their own secure server the scope of
this section is limited to the topics of protecting email and small business or
organizational transactions.
Both methods use key pairs of public and private keys. Your public keys is
sent to everyone that you communicate through email with. Your public key
can be sent through various methods including posting it to an internet
service or sending it as part of an email message. Public keys can also be
post on your website in a file. Your friends and associated can add your
public key to a file called a key ring). When someone wants to send you a
secure email the sender encrypts their messages with your public key. When
you receive the email you must decrypt it using your private key. Many
email programs will automatically verify that the message is authentic. You
will need to type in your password to view the message.
Encryption also involves using the key pair but in reverse. Once your
message is completed you encrypt the file using the recipient's public key
ensuring that only the recipient can ever access that message with their
private key. (Editor's note: Don't lose your private key!).
Small businesses and organizations that wish to offer transactions over the
Internet or Ecommerce can take their chances and set up an unsecured
system, set up their own secure server or purchase a service from a third
party. There are various types including service that take a percentage of
the transaction and/or charge a service fee and/or charge for each
transaction. Some organizations are more reliable and you should always
shop around before committing to a service. Because this type of service is
so new the length of time a company has been operating is not always a way
to decide. Things to watch for is downtime. If your companies website is
operating properly yet the customer or user can't access the transaction
server because it is down, too busy or misconfigured they will easily be put
off perhaps entirely. Watch for contracts that lock you in as the market is
still developing and prices tend to fluctuate. It is easy to switch services by
simply changing the address on your website's order forms.
As was stated at the beginning of this document the nature of the Internet is
an open system. Having said that there are many reasons and many ways to
set up a secure or closed system with in this open framework. Private or
member based discussion groups, private files or folders, protected
databases, copyright material to name a few all need some way of allowing
them to be distributed to the intended recipient only. Also many businesses
are creating Intranets which are closed systems only accessible to
registered users. An Intranet can provide a way of making company
information easily accessible and allow branch offices to communicate with
each other easier.
Account Security
Your website itself is protected by your ISP's software. When you attempt to
access your web space to change or modify a file using a shell or ftp you are
challenged to send your username and password. This is the first line of
protection and adequate for many website administrators.
Server Security
The server that your website is installed on is the second line of protection.
Most servers have security features built in to them allowing users to
password protect folders or build scripts to send a username/password
challenge to a user trying to access a file or folder. This allows website
administrators the ability to create discussion groups within their site or to
place confidential documents or information that is made available only to
registered users on their own website. Unfortunately some ISP either don't
make this option available, charge a premium to use them or only allow
their own employees to set them up.
Software Security
Copyright
Copyright is protect using the same process as any original material (books,
artwork, film, etc...). Anything that a user gets off the Internet should be
treated as privately owned information unless otherwise noted. Anyone
posting private information to the Internet should be aware that copyright
law is not the same in every country and may be difficult to enforce. It is
possible to set up a page that won't be stored on the users computer once
they leave the site but that will only slow down not stop users who want to
obtain information posted on a website. Notices of copyright are often
added to the main page of a website sometimes with a link to a page
describing the details of how the content can be used.
Is Security Necessary?
Though you may think that it is not necessary to setup security systems
there are many reason to consider it. I have come across a number of
examples of people forging documents and email. A digital signature will be
the only way to verify whether a document is genuine or not.
I would be remiss to not point out and as all articles on the subject also
point out mining the Internet with malicious intent is also possible. One
common malicious acts is to search websites for email addresses and then
add them to spam distribution lists. Unfortunately there is very little that
can be done to counter this other than removing your email address from
your web site but this makes it difficult for your customers to contact you.
Whether you decide to add a security component to your web site project
initially it is a good idea to think about or have a discussion about web site
security when planning the site. You should also review your security
systems periodically whether that is changing your password or reviewing
and updating your security system.
Networks
Most people working in office with more than a couple of computers will be
using some form of network. As networks become easier to setup and
maintain more home users are also setting up networks to share resource
such as disk space, printers, Internet connections and access to software.
If all goes well this is all you need but often there will be a conflict that can
be resolved by establishing exactly how the computer will communicate. To
solve these types of conflict your network needs a set DNS server
address and each computer in the network needs to be assigned a unique IP
address. The addresses usually are in the range of 192.168.x.x where x
means any number between 0 and 255. Once these numbers have been
entered your network should be functioning with each computer able to see
the other computers on the network.
You must also decide which resources you want to share. You may want to
make a disk or folder available, a printer or tape backup system so that
everyone can use it. You may also want to have parts of the network that
are either not accessible or accessible only through a password. File and
print sharing must be enable on the computer that will share it's resources
or host computer and they determine how they are accessed by other
computers or clients.
A computer with an Internet connection can also share that connection with
other computers on the network but you should check with your ISP what
their policy on sharing Internet connections is. Sharing an Internet
connection also raises some serious security issues. Many cable high speed
Internet connections use the Network Neighborhood settings to create the
Internet connection and connecting your home or office network to this
existing system can cause problems. Though you may want to allow a
computer in another room of the house to access files or run programs on
your computer you probably don't want the kid down the block to have that
same access.
Unlike server/client networks where the server must be running before the
computers can communicate the peer-to-peer network that comes
packaged with Windows allow any computers that are turned on to
communicate with other. Other computers in the network become
accessible as user turn them on.