36
Fall semester 2011 Day 2: types of software, computing environments Professor: Giuseppe Sindoni ( [email protected] ) Microcomputer applications This material is distributed under the “Creative Commons “Attribution – NonCommercial – Share Alike 3.0” , available at http://creativecommons.org/licenses/by-nc-sa/3.0/

L2 cs110 jcu-sindonirev04092011

Embed Size (px)

DESCRIPTION

Slides for lesson 2 - CS110-3@JCU

Citation preview

Page 1: L2 cs110 jcu-sindonirev04092011

Fall semester 2011

Day 2: types of software, computing environments

Professor: Giuseppe Sindoni ([email protected])

Microcomputer applications

This material is distributed under the “Creative Commons “Attribution – NonCommercial – Share Alike 3.0” , available at http://creativecommons.org/licenses/by-nc-sa/3.0/

Page 2: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 2

What is Software (SW)?

The logical component of a computer

Set of instructions to solve a problem by processing data

Types of Software:- System software:

the operating system

- Application software

Page 3: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 3

Operating system

Set of procedures that manages the computer’s hardware; loaded into the main memory on booting up and remains there until computer is turned off.

Main components:- Resource manager: manages CPU, RAM, mass storage, input and output devices.

- Process manager: manages open programs. - User interface → see below... - File manager → see below...

Page 4: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 4

User interface

Allows users to input instructions to use the system.

Command line interface (CLI): the original interface mode, still in use for complex tasks. Based on text commands.

Graphical User Interface (GUI): graphics-based interaction to enable less expert users to use the computer. Usually based on an analogy of a working environment (Desktop, Folders, Trash, Notes, etc.).

Operating systems and their user interface: DOS, Windows, Linux, Mac OS, Android, iOS.

Page 5: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 5

File management File: set of homogeneous data stored as a single

item in a mass storage device. Files have attributes like name, type, creation or

last modification date, dimension. Each Operating System uses a specific file

organization called “File System”. Folders are logical containers of files (directory).

They can contain subfolders.

C:\Documents\Reports\Thesis.doc

Root Folder Subfolder File name Extension

Page 6: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 6

Application software - 1

Personal productivity programs are the main reason for the success and spread of PCs:

- Word processors, for editing of complex texts (Word, Writer, Pages, Google Documents).

- Spreadsheets, for complex calculations and simple data analysis (Excel, Calc, Numbers, Google spreadsheets).

- Presentation tools (PowerPoint, Impress, KeyNote, Google presentations).

- Databases for personal data management (Access, Base).

Currently available office suites: Microsoft Office, OpenOffice.org, StarOffice, iWork

Page 7: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 7

Application software - 2 Browsers: Internet Explorer, Mozilla Firefox,

Chrome, Safari Email clients: Outlook (Express), Mozilla

Thunderbird. Desktop Publishing Computer Aided Design (CAD) Enterprise Resource Planning (ERP) Media Players Graphics programs for drawing and retouching

photos, programs for composing music, editing film, etc

Computer games And many others...

Page 8: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 8

Algorithms

Algorithms solve problems by tackling them in a systematic way. Examples include recipes and search engines.

In IT, algorithms are methods to solve problems that can be implemented as programs.

A procedure is a series of steps (sequence) implementing an algorithm.

A flowchart provides a graphic representation of the algorithm (procedure). Broadly speaking, flowcharts are a graphic modeling language to represent algorithms.

Page 9: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 9

Example flowchart

Page 10: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 10

Programming languages

Used to control a machine’s behaviour.

In IT, they are used by programmers to instruct computers.

Machine language and assembly language, high level languages.

Program execution: compilation and interpretation

Sourcecode

Objectcode

Page 11: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 11

Phases of software implementation

Page 12: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 12

Computers in everyday life Computers are used in the office and at home, for work and

leisure. Services available on the Internet and the Web:

• E-commerce: transactions for selling goods and services between producers (supply) and consumers (demand).

• E-banking: management of bank accounts and financial transactions.

• E-government: IT-enabling of Public Administration (PA) services, aimed at optimizing organizations’ work and providing users (members of public and businesses) with newer, faster services (e.g. websites).

• E-learning: learning over the Internet by long-distance access to teaching materials and tools.

• Teleworking: use of ICT to overcome office boundaries and enable staff to work from home. Teleworking has both benefits and limitations.

• Leisure time services…

Page 13: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 13

Your health and the environment Ergonomics. Suggestions for protecting the

health of computer users:-Pay attention to back, wrist and eye discomfort;-Use a suitable chair (adjustable seat height, armrests, lower back support, 5-pedestal base);

-Right keyboard position, wrist support;-Screen: straight in front of you, eliminate reflections, don’t stare at it too long, use a big screen;

-Take frequent breaks: alternate computer and paper work as much as possible.

Environmental protection:-Reduce use of paper and toner/cartridges. Recycle waste where possible;

-Use low-energy devices and energy saving options (PC configuration parameters).

Page 14: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 14

Computer security: user identification

Security encompasses 3 aspects:- Confidentiality: data, services and devices can be

accessed by enabled users only.

- Integrity: security of data, services and devices; tracking every change.

- Availability: those who have the right to use data, services and devices must be able to do so.

User identification is crucial. Authentication: general rules for creating

passwords. Identification and personal data: each country

has specific laws on protection of privacy.

Page 15: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 15

Data security

Many causes of data and information loss or damage:

- Failure of mass storage devices (e.g. hard disks);

- Intrusion of external agents (e.g. viruses);

- Theft (laptop, PDA, smartphone).

Many precautions to prevent data loss:

- Backups. Compression techniques;

- Firewalls and modern antivirus programs;

- Mechanical blocking devices, disk encryption.

Page 16: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 16

Computer viruses

Viruses are programs containing potentially harmful instructions. Main types:

True viruses: portions of a program which are activated when the program is executed. They can reproduce and cause trouble.

- Worms: programs which exploit the net to infect other computers. They propagate via email and the Web.

- Trojans: programs behaving in unexpected ways or opening doors to the “enemy”.

Where they hide:- Infected programs; they also spread as email attachments or are

downloaded from “fake” websites.- Infected documents (MacroVirus).

Defence:- Antivirus programs. Keep them and operating systems updated. - Defence systems limiting access to local resources (e.g. Firewall).- Common sense: do not open email attachments if you are not sure of

their content; do not download software from unsafe websites.

Page 17: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 17

Legal aspects: copyright Copyright: software is usually protected by

copyright laws. The user license is called EULA (End User License

Agreement). Proprietary software can generally only be used

on an individual basis: duplication and improper use are prohibited.

Other types of licence:- Freeware: usually downloaded from the Internet. Free,

unrestricted use, can be freely copied and distributed.- Shareware: trial version usually downloaded from the

Internet. The licence to continue using it or to access and use all its functions is usually cheap.

- Open Source software → day 5... Most internet content - images, music, video, etc

– is protected by copyright.

Page 18: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 18

ICT history in a nutshell1946 ENIAC, the first electronic computer: valve technology,

programs written in machine code, physical connections between circuits.

1959 First transistors.1965 IBM introduces 360 mainframe series: integrated circuit

technology.1969 ARPA-Net, the precursor of the internet.1977 First Apple II microcomputer.1981 First IBM Personal Computer with MS-DOS and Intel 8088.1984 Apple Macintosh, mouse and graphical environment, laser

printers.1991 First Linux version.1992 Microsoft Windows 3.11994 World Wide Web. First version of Netscape. Intel Pentium

processor.1998 AMD Athlon processor.2001 Windows XP, rise of Linux.2004 Rise of Google and spread of ADSL.2006 Web 2.0: Wikipedia, Flickr, YouTube, Facebook, etc.2007 iPhone2008 Android

Page 19: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 19

Local computing

So far… PC as a self-contained world Software seen as something aimed at

making a single PC work

Principle… One person, one PC, a bunch of

dedicated software programs running on it

Page 20: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 20

Computer networks

Connect computers (millions of them). Communication network: a system of

computers, telephones or other connected devices, able to communicate with each other and share applications and data. Main types:

- Local or LAN: Local Area Network. WLAN (Wireless LAN);

- Geographic or WAN: Wide Area Network. MAN (Metropolitan Area Network);

- Networks of networks or Networking. Internet.

Page 21: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 21

Example of LAN

Page 22: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 22

Client-Server architecture Computers in a network can provide or use services. Server: central computer connected with clients.

- Contains collections of data and programs for clients - Servers can be general purpose or File Server, Database

Server, or Printer Server, according to the services they offer. Client: uses services made available by servers.

- Connected via a wired or wireless network.- PC, workstation and other devices requesting services.

Web surfing example: browser and web server.

Page 23: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 23

Network data transmission Communication channels are the

paths along which information travels:

- Wired channels: telephone duplex cable, coaxial cable, optical fiber cable.

- Wireless channels: radiofrequency, cell, satellite.

Transmission rate is measured in bits per second (bit/sec or baud). Multiples: Kbit/sec, Mbit/sec.

Communication protocols regulate communication between devices.

Network devices: Hub, Switch, Router, Bridge, Gateway

Page 24: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 24

Home connections To access the Internet from home we need:

- An access device (modem, terminal, router, etc).- A physical connection to a telephone, digital or mobile

network.- An Internet Service Provider (ISP).

Types of connection:- “Dial-up” with modem on a telephone network up to 56

Kbit/sec. Less and less used, available everywhere there’s a home telephone.

- Digital network ISDN up to 128 kbit/sec: simultaneous data and voice transmission.

- ADSL (Asymmetric Digital Subscriber Line) network: up to 24Mbit/sec, very widespread, AKA broadband. “Always on” connection.

- Optical fiber: no telephone line needed.- Cell: Radio-Modem USB.

Page 25: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 25

What is the Internet? The largest computer network. Created in the 60s from an USA ARPA-DoD project. A network of networks, based on the TCP/IP (TCP, IP, UDP,

FTP, NNTP, HTTP). They are public and open. The original objective was to share and exchange data

between research laboratories. 1969: first connection between two computers (UCLA-

Stanford). The oldest services are email, file and document

transmission (ftp), newsgroup (nntp), remote control (telnet).

Modern services include web, chat, voip, etc. Main internet organizations: ICANN, ISOC, IETF, IESG and

W3C, managed by companies, selected users and nations. Internet technologies in the business world: Intranet and

Extranet.

Page 26: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 26

Internet history in a nutshell1969: ARPANet, initially connecting 4 American universities with remote connection

services and file exchange. Originally also the backup for the US military network. 1971: First email service.1972: ftp protocol: ARPANet connects 37 hosts (nodes)1982: ARPANet adopts the Tcp/Ip protocol and recommends use of Unix.1983: The “military” part of ARPANet spins off and becomes MilNet.1984: ARPANet offers the first DNS services, creation of NSFnet (56Kbps).1989: ARPANet closes down. 100,000 hosts on NSFnet.1990: Internet starts spreading in Europe.1992: Public release of the WWW at CERN, Geneva. Rise of the internet society (Isoc).1993: Mosaic, the first graphical browser.1995: Non-USA nodes amount to 50% of the total. New backbone carrying 155 Mbps.

Creation of Netscape.1997: One million hosts on the Internet1999: Backbone upgraded to 2.5 Gbps. European backbone: 1 Gbps2004: Continental backbones beyond 10 Gbps, national ones beyond 2.5 Gbps2009: 43 million hosts and more than a billion Internet users2011: 2,100,000,000 Internet users and rising…

Page 27: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 27

The World Wide Web (web) 1989: Web project began at CERN, Geneva, led by Tim

Berners-Lee Goal: promote collaboration among scientists by exploiting

the Internet. Web standards:

- HTTP: hypertext document transfer protocol on Internet.

- HTML: web document format (tag language).- URL: standard protocol to assign a unique address to

each web document. 1993: Mosaic, the first browser with graphic color display of

photos, text, images, etc. developed by Marc Andreesen of NCSA (Illinois). Mosaic was the precursor of Netscape, itself the precursor of Mozilla, which became Firefox.

Page 28: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 28

What is the Web? A distributed hypertext network. Hypertexts differ from other texts in the way information is

accessed by users: each page provides links to other pages, which can be accessed in whatever order the user prefers.

No page sequences: a concept can be explored or expanded with just a click.

In a hypertext network each hypertext links to other, related hypertexts.

Called a distributed network because hypertexts are located in various computers, connected through the Internet.

Hypertext links (URLs) on the WWW are network addresses pointing to web documents or pages (usually in HTML format), transmitted from a server to a browser via the HTTP protocol.

Web pages contain hypertext and much more: images, video, music, etc.

Page 29: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 29

Web browsing Browser: application software to surf and display web

documents. Website: a collection of documents managed by an

organization (on one or more computers). Home page: a site’s access page.

URL syntax: http://www.w3.org/TR/html401/intro/intro.html#h-2.1.3

- http protocol: base protocol for the Web. - Domain name (www.w3.org): the name assigned to a

computer that is permanently connected to the Internet. Formed by 3 parts:

www: world wide web w3: organisation/company/institute name org: organization type, top level domain. Other domains: com

(commercial); edu (university and research); gov (governments); mil (military); net (ICT networking organizations). National domains: it, uk, fr, jp. European: eu.

- File path (/TR/html401/intro/intro.html), with file name: intro.html

- Fragment identifier (#section3): name of a part of a document

Page 30: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 30

Browser and Web use

Direct browsing, using URL and back&forward buttons.

Page download: page stop and refresh. Bookmarks and history. Browser settings. Save/download files locally: web pages and PDF

(Portable Document Format) documents. Not just display: filling out forms and sending

data.

Page 31: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 31

Search engines Developed alongside the Web to allow data and information

searches across the Web. They search and store information on all websites and

related pages and keep it updated. The aim is to allow users to retrieve and be directed to information.

A search engine, like any other page, is accessed via its URL. The service is free.

The home page contains a form where a query can be entered to drive the research.

The simplest query example is a keyword. Result: site ads and web pages ranked according to their

“importance”. Search engines are differentiated by their search and ranking algorithms.

The most popular are Google, Yahoo, Baidu, Live Search (Bing).

Conditional and advanced search, image search.

Page 32: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 32

Search engine market share

Copyright NetMarketShare 2006-2011

Page 33: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 33

Internet communication tools

Chat: first internet applications for real time text message exchange between several users.

VoIp (Voice Over IP): use of internet data connection to transmit voice. Microphone needed.

Instant Messaging (IM) programs are currently very popular. They integrate chat (and video from a webcam), email and vocal communication: ICQ, Skype, MSN and Yahoo! Messenger.

An “old faithful”: email

Page 34: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 34

Internet security Web security:

- https protocol (secure http): encrypted. - Public key cryptography: public and private keys.

Digital signature.- Certified sites, CA (Certification authorities).

Internet threats, troubles and drawbacks:- Malware hidden in executable downloadable programs or

message attachments: viruses, spyware.- Dangerous and unwanted email messages: fraud attempts,

hoaxes, spam.

Defence:- Antivirus: check of files downloaded while browsing or reading

emails.- Firewall: filtering of incoming and outgoing data packets from

and to a network or another computer by applying rules to enforce network security.

Page 35: L2 cs110 jcu-sindonirev04092011

CS110 Microcomputer applications – G. Sindoni 35

Net etiquette: netiquette Always read FAQs

(Frequently Asked Questions) before asking new questions.

Keep messages short. DO NOT SHOUT! Delete unnecessary

parts of original message when replying.

Do not argue in “public”.

Do not publish other people’s private stuff without their permission.

Do not send mass emails unless strictly necessary.

Do not spread spam or chain letters.

Always use a clear and meaningful subject in email messages.

Keep subject in “reply” messages.

Always sign your messages.

Do not send over-large attachments.

Page 36: L2 cs110 jcu-sindonirev04092011

Homework

1. Choose one of the topics discussed so far (eg. “The CPU”, “The World Wide Web”,…)

2. Spend about an hour finding more information about it on the Internet

3. Synthesize your findings in a page-long document describing the topic. Use MS Word or any other word processor you know

4. Share your document on MyJCUCS110 Microcomputer applications – G. Sindoni 36