Unit 1 Introduction to the Computer: Hardware and …people.umass.edu/bepi691f/outline/hardware and...

Preview:

Citation preview

hardware and software1_15.docx 1.1

Unit 1

Introduction to the Computer:

Hardware and Software

Unit Goals

1. To appreciate the distinction between micro, mini, and mainframe computers and to understand our emphasis on the micro-computer;

2. To gain a lay understanding of selected hardware components;

3. To gain a lay understanding of ways information is stored on a microcomputer;

4. To become skilled in the use of a “window”; and

5. To appreciate the importance of organization, backup, and virus protection.

Many of us have learned to use computers in a very haphazard manner. We pick up tips and shortcuts from friends and co-workers, learning what we need to know to accomplish the task at hand. While this approach can keep you functioning, there are often frustrating moments (or days) when the system isn’t working, or you find yourself with strange results or formatting that seems out of control.

My goal for this introductory unit is to fill in a few of the gaps you may have on computer terminology, the function of various components, and understanding of how information is stored on micro-computers as well as translated when stored in different software as well as hardware. This information may help you diagnose a problem when something does go wrong – or at least make it easier for you to talk with the technician you call for assistance. Shared terminology can work wonders in communicating your concerns and understanding the “techie”.

As a data manager, you may also be responsible for ordering new computer equipment – and you should know what you need so that your software works efficiently and you have the correct features for internet access and for ensuring data security and integrity.

hardware and software1_15.docx 1.2

Outline

Section Topic Page 1.

Micro versus Mini versus Mainframe Computers ………..

1.3

2.

Hardware Components …………………………………….

2.1 The CPU …………………………………………. 2.2 The Display (Monitor) …………………………… 2.3 Printers and Scanners…………………………… 2.4 Bits – How the Computer Stores Information … 2.5 ASCII, Unicode and Hexadecimal Codes……… 2.6 Computer Storage Terminology ……………….. 2.7 ROM, RAM, and Read/Write Storage………….. 2.8 The Hard Drive …………………………………… 2.9 CD’s, DVD’s and other Removable Storage .…. 2.10 Modem, Ethernet and Wireless …………………. 2.11 Ports and Cables ………………………………… 2.12 Care of Computers, Storage Devices, and

Printers……………………………………………..

1.4 1.5 1.5 1.7 1.9

1.10 1.14 1.14 1.17 1.18 1.20 1.21

1.22

3.

Software ……………………………………………………..

3.1 Disk Operating System ………………………….. 3.2 Windows …………………………………………… 3.3 The Mouse, Touchpad and Touchscreen ……… 3.4 The Anatomy of a Window ………………………. 3.5 Managing Files in Windows …………………….. 3.6 Some General Tips for Working on a PC……….

1.23 1.23 1.23 1.23 1.24 1.27 1.29

4.

The Internet and the World Wide Web (WWW) ………… 4.1 Browser Windows ………………………………… 4.2 Uploading and Downloading Files ………………

1.32 1.33 1.34

hardware and software1_15.docx 1.3

1. Micro versus Mini versus Mainframe Computers

Types of computers – micro-, mini- and mainframe differ basically in size and speed. As computers get larger, they usually get faster and better able to handle large files and programs. The distinction between micro- mini- and mainframe computers has blurred over time. More mini-computer type power is available on microcomputers, often called work stations, that are networked together. Networking of microcomputers (linking of computers through cable or wireless systems) allows for a distributed software environment, formerly available only on mini and mainframe computers. In a network setting, one computer is designated as a “server” that stores distributed software and licensing, and houses “network” drives for shared access to files, as well as secure back-up. Types of computers also differ in support required for maintenance. Maintenance of mainframe computers usually requires full time staff. Mini computers usually need a part- or full-time operator. Microcomputers typically have no operator other than the current user, and the maintenance responsibility falls on the user. A computer network typically requires part- or full-time staff. Micro-computers encompass everything from a PDA (personal digital assistant), a smartphone or tablet PC, to laptops, desktops, and “towers” that allow for multiple drives and cables. There are two common types of microcomputers: MAC and PC type (or IBM-compatible) computers. MAC computers have had traditional strengths in ease of use with a graphics interface. MAC computers popularized the mouse, with point and click instructions, and the pull-down menu, and more recently the touch screen. MACs were also the first to run more than one application at the same time – known as multi-tasking. The popularity and ease of use of these features prompted software manufacturers to develop products that mimic their features on other computer systems. The ability to do multi-tasking using the UNIX operating system developed by AT&T computers and other competitors prompted IBM to develop its own multi-tasking operating system, OS2. However, none of these operating systems had the same market share as DOS, the original operating system for IBM compatible computers. Although each computer type has strengths and weaknesses, the same issues may not prevail in the future. The personal computer industry is competitive, and one brand's advantage is often another brand's target for future development. Of special note in computing is the current market share and software usage. MAC’s are often felt to have advantages and superior software for music, photo and film editing as well as fewer problems with viruses; while PC’s have the reputation of stronger computational functioning. In this course we focus on the use of PC or IBM-compatible microcomputers – that is, our focus is on use of database and statistical software on a conventional laptop, desktop or networked PC environment.

hardware and software1_15.docx 1.4

2. Hardware Components

A computer consists of hardware and software. Hardware consists of the physical components of the computer, including such items as the Central Processing Unit (CPU), motherboard, disk drives, monitor, and keyboard. Software consists all of the programs that you and the computer use to perform tasks. An essential piece of software on all computers is the Operating System. We will use a WINDOWS operating system for communication between the computer and the user and a variety of specialized application software packages for word processing, data entry, management and statistical analyses. MAC computers can be operated in “WINDOWS” mode with specialized software such as Parallels or VMware, and can then operate all of the software used in this course. The BIOS (Basic Input/Output System) is a key piece of PC software that identifies the hardware on the computer. Current versions can be programmed, or altered as the hardware is changed or upgraded.

There are four main types of computer hardware.

Type Examples

1. The “Box” This is the central box and contains several components for processing, some optional

- CPU (central processing unit) - Hard disk (storage) - RAM (random access memory) - Video card

2. Input Devices

- Keyboard - Mouse - Scanner - CD-ROM - Microphone

3. Output Devices

- Monitor - Printer - Plotter - CD or CD/DVD “burner” - Projector - Speakers

4. Input / Output Devices

- Disk Drives - CD-Read/Write and DVD-R/W - Modem, Ethernet cable or Wireless card - LAN (local area network) - Printer/Scanner - Touch Screen

hardware and software1_15.docx 1.5

2.1 The CPU CPU stands for “central processing unit” and is actually a microprocessor. It is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output. Microprocessors operate on numbers and symbols represented in the binary numeral system. Microprocessors have evolved over time with a tremendous impact on the speed of processing. Associated with the microprocessor is a clock speed in mega-Hertz. This represents the number of calculations that can be processed per second; one mega-Hertz corresponds to the processing of 1 million calculations in one second. (1 MHz = 1,000,000 = 1 MIP processes/sec). Clock speeds of early PCs were slow, and have increased dramatically.

Clock speed does not provide a true measure of processing time. Benchmarks have been established, consisting of certain tasks performed by specific software to establish a machine’s speed. Different CPU’s can be compared with respect to the time taken to perform the benchmark task. 2.2 The Display (Monitor) The computer monitor or screen display has also undergone dramatic changes in recent years. Historically the monitor was called the “CRT” (cathode ray tube), but these bulky, heavy monitors have largely been phased out. “LCD” or liquid crystal display monitors are in more common use, particularly in laptop computers. They are thinner, lighter and use less energy than the historic CRTs. Even newer “LED” or light emitting diode monitors are also in use. These are believed to have advantages in more vivid colors and greater color gradations over LCD monitors. LED monitors are typically more expensive up front, but use less power to operate. Screen size is measured on the diagonal. For desktop machines large (wide) sizes are available; as well as setups with multiple screens; laptop screen sizes can be more limited, though wider screens have become more common. Screen resolution refers to the number of pixels that can be displayed. A pixel (a portmanteau word from picture element) is one of the many tiny dots that make up the representation of a picture in a computer's memory. Usually the dots are so small and so numerous that, when printed on paper or displayed on a computer monitor, they appear to merge into a smooth image. The color and intensity of each dot is chosen individually by the computer to represent a small area of the picture. For example, a resolution of 640 x 640 indicates that the screen can be covered by 640 dots wide and 640 dots high. Resolution determines the quality of graphic display on the screen, and also on the printed page. When an image is stretched or enlarged on the screen, fuzzing or blurring results from enlarging the pixels.

Graphic image enlarged to show fuzzing of image related to enlarging pixels.

hardware and software1_15.docx 1.6

Display settings for your monitor, including resolution, can be controlled through the Control Panel. Your hardware and commonly used software will determine the optimal settings. Higher resolution means more pixels in the same area – and can be important for detailed graphic images. To check or modify your settings, go to … (Start Control Panel and select Display Adjust Screen Resolution. Recommendations for optimal settings typically come with the original hardware and operating system setup. Many software application packages have suggested settings for optimal display of graphics. Only limited combinations (e.g., 1280x1024 or 1280x960, … 800x600) are available for screen resolution, and recommended setting depend on the type and size of the monitor. Higher resolution (typically recommended) will result in improved focus (less blur), but smaller icons and print on your desktop. However you can maintain the high resolution and select other options on the Display screen to enlarge or magnify the icons and print.

The notes under “What display settings should I choose?” provide tips for selection depending upon your type of monitor

hardware and software1_15.docx 1.7

2.3 Printers and Scanners

Like so many other electronic devices, a single piece of equipment now serves where many were required just a few years ago. Machines that serve as printers/copiers/scanners are in common use in many offices. 2.3.1 Printers The most common types of printers in current use are InkJet and Laser printers. InkJet Printers Inkjet printers transfer an image via magnetic charge. High quality graphics and a large variety of fonts are available. Inkjet printers tend to be relatively inexpensive to purchase, but can become costly to maintain (ink cartridges are pricey!). High quality color graphics and photo printing are available. Inkjet printers are often a good choice for home use. Print speeds are moderate, and color photo printing options are an advantage. Inexpensive printers (< $100) that can also function as a scanner and copier are also widely available.

Laser Printer On a laser printer, the image is produced by scanning a laser beam across an electronically charged drum. Toner, or ink, having an opposite charge and stuck to the drum, is then transferred to the paper by pressure and heat. High quality graphics and multiple font printing are readily available. Laser printers tend to be more expensive to purchase and relatively expensive to maintain. These are the best choice for high speed and large volume printing. Color laser printers are also available and in common use – again, these tend to be costly.

Printer supplies (paper, ink cartridges, toner, etc) are often considered to be a part of a data management budget. Keep this in mind! Some commonly used printing terms:

Buffer Size refers to the size of the storage device inside the printer. The buffer stores a portion of the document prior to printing.

PPM (pages per minute) describes print speed for inkjet or laser printers (8-12 is good).

PCL stands for "printer control language". Developed by Hewlett-Packard, it is a set of fonts and layout instructions.

Postscript is a set of fonts and layout instructions originally defined for MacIntosh computers only.

Computers and printers communicate using a set of codes (see section 2.5). When you purchase a new printer and first connect it to your computer you may need an accompanying disk to load information on the printer so that it is available to your software programs. Printers require PRINT DRIVERs. A PRINT DRIVER consists of a program that recodes output from the Software Program to suitable patterns of dots on the paper. Print drivers are written by the software manufacturers (not Printer manufacturers), since the software manufacturers determine the coding table for the output. You typically need to select a default printer to use with WORD and other software – which sets up the correct print drivers.

hardware and software1_15.docx 1.8

2.3.1 Scanners Scanners have become an important method of transferring printed information into digital format in recent years. Scanner technology has been improving rapidly and systems are available everywhere and used in many ways. The basic principle of a scanner is to analyze an image and record it in digital format. The most basic scanners essentially take a picture of the scanned document and save it as a digital picture or image file. Scanning of text (using Optical Character Recognition or OCR) allows you to save text to a file on your computer. You can then alter or edit the text, and incorporate it into a document or print it out. Note that scanned text takes a lot of effort to edit – while newer OCR programs are much improved over older versions, characters can be misread if there are variations in color, shading or font, and automatic features of word processors that we are accustomed to aren’t in effect in scanned text.

Types of Scanners:

• Flatbed scanners, also called desktop scanners, are the most versatile and commonly used home scanners. A single sheet placed on the scanner is read.

• Sheet-fed scanners are similar to flatbed scanners except the document is moved and the scan head is immobile. This model is useful in situations with large volumes of pages to be scanned. Operation is similar to a copier that feeds multi-page documents.

• Handheld scanners rely on the user to move them instead of a motorized belt. This type of scanner typically does not provide good image quality. However, it can be useful for quickly capturing text. These are most commonly seen for scanning bar codes, and can be useful in research studies for processing of samples.

• Drum scanners are used to capture incredibly detailed images, and are most commonly used in the publishing industry.

Quality of scanned images and text depends upon a combination of factors:

• Sharpness is a function of the quality of the optics used to make the lens and the brightness of the light source.

• Resolution is defined by the number of dots per inch (dpi). The scanner's dpi is determined by the number of sensors in a single row (x-direction sampling rate) by the precision of the stepper motor (y-direction sampling rate).

• Software is then used to enhance images. Interpolation is a software process used to increase the perceived resolution of an image. Extra pixels are created in between the ones actually scanned. These extra pixels are an average of the adjacent pixels.

Once a document is scanned, you need software on your computer, called a driver that communicates with the scanner – analogous to printer drivers. Most scanners speak a common language, TWAIN, that can be interpreted by standard image editing software packages. In addition to the driver, most scanners come with other a scanning utility and some type of image editing application. Many scanners include Optical Character Recognition (OCR) software. OCR allows you to scan in words from a document and convert them into computer-based text. It uses an averaging process to determine what the shape of a character is and match it to the correct letter or number. This is a tremendous aid in scan data entry systems, which we will be discussing later in the course, though there are issues in recognition of handwritten characters which must be accounted for.

hardware and software1_15.docx 1.9

2.4 Bits and Bytes – How the Computer Stores Information The mechanics of computer function is essentially an enormous number of "on/off" switches. In actuality, computers know only “on”s and “off”’s. A single "on/off" switch is called a bit. The term “bit” comes from “binary digit”. The digit “1” is assigned to “on”, the digit “0” is assigned to “off”. A single bit can therefore show only one of two possible values: 0 or 1. Bits essentially operate like a Base 2 system. Two bits together can represent 4 different values of 0, 1, 2, and 3: 00 zero 01 one 10 two (a 1 in the 2’s column and zero in the one’s column) 11 three (a 1 in the 2’s column, and 1 in the one’s column). Bits are combined as bytes to obtain representations for numbers, letters, and special characters. A byte is a combination of 8 bits. There are 28 = 256 combinations of 8 bits, or 256 “characters” that can be represented by 1 byte, with ‘values’ from zero to 255. Base 10 Base 2

0 0 (1 bit) 1 1 2=21 10 (2 bits) 3 11 4=22 100 (3 bits) 5 101 6 110 7 111 8=23 1000 (4 bits) 9 1001 10 1010 11 1011 12 1100 13 1101 14 1110 15 1111 16=24 10000 (5 bits) ... … 255 11111111 (8 bits = 1 byte) Bit Binary digit

A bit is the smallest unit of information – an on/off switch. We use 1 to mean “on” and 0 to mean “off”.

Byte A set of 8 bits.

A byte is the basic unit of information for microcomputers. The number of possible values for a byte = (2)(2)(2)(2)(2)(2)(2)(2) = 28 = 256. The 256 values are assigned to represent different letters, numbers, and other characters and symbols.

hardware and software1_15.docx 1.10

2.5 ASCII, Unicode and Hexadecimal Codes

A byte is the basic unit of information used in computer coding. One commonly used system of assignment of bytes to symbols is known as ASCII coding. ASCII stands for American Standard Codes for Information Interchange. The ASCII codes corresponded to specific assignments of characters or icons (letters, number and symbols) to the 256 switch settings in a byte (8-bits). The ASCII “code number” is the decimal equivalent of the binary code used for the eight switch settings. While other systems, in particular Unicode have taken precedence, the standard set of codes incorporated in Unicode started with the ASCII codes. It is useful to know that some ASCII codes do not have standard assignments. Although there are 256 distinct ASCII codes, there are not an equivalent number of standard character or icon assignments from the keyboard. Different software programs assign some or all of these additional codes to specific icons or functions that differ from assignment in other software packages. Data or text saved in one program must then be translated, or exported- imported from one software package to another, to ensure proper translation of these codes.

ASCII codes translate the 256 numbers 0 to 255 to a standard set of symbols. The translation depends on the language you are using. The first 128 codes (0-127) are the standard ASCII codes. The next 128 codes (from 128-255) are called the Extended Standard ASCII codes. Examples of ASCII Code Assignments: Byte representation ASCII Code Assigned Character

01000001 065 A 01011010 090 Z 01100010 097 a 01111010 122 z 00110000 048 0 00110001 049 1 00110010 050 2 00111001 057 9 00001100 012 (page break) 00011001 027 � (end of file)

Each ASCII code has its own byte representation; i.e., its own set of eight 0/1 ‘bit’ switch settings. You can enter ASCII codes to get special symbols in your text in some software programs by:

1. setting the NumLock on your keyboard to “on” 2. holding down the ALT key while 3. typing the associated code on the number pad:

ALT <ASCII #>

For example, with Numlock “on” typing ALT-065 will result in ‘A’ appearing; while ALT-049 will result in a ‘1’ appearing in your document, and ALT-012 will move you to a new page.

hardware and software1_15.docx 1.11

Unicode The most common coding system in current use is Unicode. Unicode is an international standard assigning sets of bytes to letters, numbers and other characters which has a goal of providing the means to encode the text of every document people want to store in digital format. This includes all scripts in active use today, including many scripts known only by scholars, along with symbols used in mathematics, linguistics and other specialized fields. The creation of Unicode is an ambitious project to replace existing character sets, many of which are too small in size and problematic in multilingual environments. Despite technical problems and limitations and criticism on process, today Unicode is considered the most complete character set and one of the largest, and has become the dominant encoding scheme in internationalization of software and multilingual environments. Many recent standards such as XML, as well as systems software such as operating systems, have adopted Unicode as an underlying scheme to represent text.

Tables translating between different coding schemes can be easily found on the web. A list of scripts available can be found at http://unicode.org/charts/ . Unicode characters are represented in one of three encoding forms: a 32-bit form (UTF-32), a 16-bit form (UTF-16), and an 8-bit form (UTF-8). The 8-bit, byte-oriented form, UTF-8, has been designed for ease of use with existing ASCII-based systems.

If you look at the CHARACTER MAP on your computer you can see the Unicode code for special symbols:

(StartProgramsAccessoriesSystems ToolsCharacter Map):

Unicode number along with a

description of the selected character.

Select font, including specialized symbol fonts.

hardware and software1_15.docx 1.12

You can use the character map to select, copy and paste special characters into text, as needed.

Note that the character map will vary slightly with different versions of Windows. A handy feature allows you to easily find specialized symbols (in Advanced View) using the “Group by: Unicode Subrange” option. For example to find mathematical operators:

The character map is one way to include special characters in your text, in some software programs. Note that instructions for entering some non-keyboard symbols via ASCII code are given provided.

In addition some software programs offer their own set of special symbols. For example, within MS Word, special symbols can be added directly to your text from the Insert menu: Insert SymbolMore Symbols

Select font, including specialized symbol fonts.

Note the convenient “recently used symbols” feature.

ASCII code entry instructions (when Numlock is on).

hardware and software1_15.docx 1.13

Hexadecimal Coding Unicode values in 16-bit or 32-bit format are written in hexadecimal code. Hexadecimal codes use Base 16 coding. A set of 4 binary switches (bits) are used to form one hexadecimal number. UTF-16 values are written as 4 digit values, requiring 4x4=16 bits, or the equivalent of 2 bytes for each letter or symbol. Just as base 10 numbers require 10 distinct numeric characters (0, … 9) that we are accustomed to, Base 16 requires 16 distinct characters. We add A – F to represent values of ten through fifteen (e.g., A=10, B=11, …, F=15). Using 16 bits, there are 216 = 65,536 different symbols that can be represented using UTF-16 coding; using 32 bits there are 232 = 4,294,967,296 different symbols that can be represented using UTF-32 coding.

Note on the previous page the UTF-16 code for a ‘Plus-Minus Sign’ (±) is 00B1, which is 177 in its decimal equivalent.

Examples of binary, decimal, and hexadecimal code are given below.

Examples of Binary, Decimal, and Hexadecimal Codes

Binary Decimal Hexadecimal Code Equivalent Code (UTF-16) 00000000 0 0000 00000011 3 0003 00000101 5 0005 00101011 43 002B 10000000 128 0080 10101000 168 00A8 10110001 177 00B1 11111111 255 00FF

Why do we care about the underlying code? As computer files are shared across platforms, we may encounter strange characters or a file apparently full of gibberish if correct translation been coding systems has not occurred. Within databases, for each field we need to define data type as either ‘text’ or ‘numeric’. When we see the image ‘1’ on a screen, it might be stored in text format using UTF-16 coding as ‘0031’ using 2 bytes, or it might be stored in numeric byte format using binary code as ‘00000001’. So the same image can have different underlying structure, which influences how it can be used. We’ll take this issue up in a later unit.

hardware and software1_15.docx 1.14

2.6 Computer Storage Terminology We consider next how units of bits and bytes of information are used to define storage space on a computer.

One bit represents one "0/1" switch. One byte represents 23 bits = 8 bits.

After that, we increment bytes by powers of 10. One Kilobyte (KB) = 210 Bytes = 1024 Bytes

= 213 Bits = 8192 Bits

One Megabyte (MB) = 210 Kilobytes = 1024 Kilobytes = 220 Bytes = 1048576 Bytes = 223 Bits = 8388608 Bits

One Gigabyte (GB) = 210 Megabytes = 1024 Megabytes = 220 Kilobytes = 1048576 Kilobytes = 230 Bytes = 1073741824 Bytes = 233 Bits = 8589934592 Bits

One Terabyte (TB) = 210 Gigabytes = 220 Megabytes

= 230 Kilobytes = 240 Bytes = 243 Bits

The amount of storage space available on a disk is usually described in terms of bits, bytes, KB, MB, GB or TB. Next come petabytes, exabytes, zettabytes and yottabytes.

2.7 RAM, ROM, and Read/Write Storage

Other major components of the microcomputer are the storage devices. All microcomputers have systems for getting data into the computer, saving information on the computer, and getting data back out of the computer. Data are stored on disks that may be removable or fixed in the computer. There are different kinds of storage:

(1) Random Access Memory (RAM) (2) Read Only Memory (ROM) (3) Read/Write storage: Hard Disk, CD, DVD, Zip disk, plug-in drives

Random Access Memory (RAM) is a major component of personal computers. RAM is the fastest storage device, and is accessed at the speed of the microprocessor. Most software has a minimum RAM requirement.

Random Access Memory can be installed on the motherboard (the motherboard is the CPU), or installed in expansion slots in a computer.

hardware and software1_15.docx 1.15

Special software is needed to access RAM. WINDOWS serves this purpose, allowing access to as much RAM as is available.

To check on your system speed and RAM:

Start Control Panel System

Physically, RAM is a chip installed on a circuit board inside the computer box. You can purchase additional RAM for your computer if required for newer software you are using, or to improve operating speed and multi-tasking. A major limitation of RAM is that it is temporary. When the computer is turned off, the information stored in RAM is lost.

Every time you run an application (e.g., MSWord or SAS), the CPU uses RAM for retrieval and storage of information as the application is running. This is efficient because RAM is accessed at a high clock speed, usually close to the same clock speed as the CPU. However, until you hit SAVE, any work that is only current in RAM will be lost if you lose power or have some other glitch or malfunction.

Check the autosave feature of your software programs, to minimize risk of losing your work. An autosave feature automatically saves current work in a temporary file at regular intervals, which can be recovered after a power loss or software shutdown. You can set the frequency with which automatic saves occur:

hardware and software1_15.docx 1.16

Example – using the autosave feature in MS Word 2010 …

File Options Save

You will find an option to set the frequency of auto saves, under: “Save AutoRecovery info every: ”

Too frequent auto saves can interfere with smooth workflow, but too infrequent (e.g., set at 1 hour) can mean drastic loss of work when a problem occurs. When you do lose power or a program shuts down on you, as you restart the software application, the “auto-saved” version of the file with most of your recent work can be accessed, and is typically made available when you restart the program.

hardware and software1_15.docx 1.17

2.8 The Hard Drive

In contrast to RAM, information can be stored “permanently” on a hard disk. Note that I say stored “permanently” in quotes – disks can be broken or destroyed; data can be destroyed or rendered inaccessible by “viruses” or “worms”; additionally magnetic storage may deteriorate over time.

Physically, a hard disk is a magnetic medium which can be either:

a device inside the computer box (most common) a card in an expansion slot an external device

The amount of information stored on a hard disk has increased substantially over time: Machine (Year) Storage Capacity of Hard Drive 80286 (1982) 10-20 MB 80486 (1990) 200-540 MB P5 (1995) Gigabyte+ Current PC’s Many GB, or even Terabytes

The hard drive or local disk is typically referred to as the C: drive.

Large capacity computers can optionally have the hard drive sectioned to act as 2 drives; typically C: storing software applications, and D: storing data.

Use “Windows Explorer”

To look at total, used and free storage on your local hard drive,

1. Right-click on Local Disk (C:) 2. select “Properties” from the

menu. This computer has 465 GB total storage for software and other files.

hardware and software1_15.docx 1.18

2.9 CD’s, DVD’s and other Removable Storage

Removable storage comes in a variety of formats that have changed dramatically over time, and continue to be a moving target. Removable storage devices known as diskettes or floppy disks and ZIP disks have been pretty much phased out.

5-¼ " Floppy Diskette (Pretty much phased out) An electronic medium storage device. Reading from and writing to were both possible. Storage capacity 360K - 1.2 MB.

3.5" Diskette (Typically referred to as the “a:” drive) – also pretty much phased out. An electronic medium storage device. Reading from and writing to were both possible. Storage capacity 720K - 1.44 MB. Less easily damaged than 5.25" floppy diskette.

Zip Disks – 100 or 250 MB ZIP disks, designed for use in 100 or 250 MB ZIP drives, which could be an external drive, or part of the box. Note that the device size (100 or 250 MB) and disk size (100 or 250 MB) must be compatible.

In current use: Compact Flash drives, also known as Thumb drives or USB drives are portable, erasable and re-writable data storage devices. They are small and easily transportable – can fit in your pocket or wallet or on a keychain, and tend to be tough – not too easily damaged. They attach to your computer through USB ports. Prices vary with the capacity (amount of storage space); you can get a relatively inexpensive one that can hold a lot of data. Early versions had capacity of 8 MB; today, 8-64 GBs are typical. Warning! Back-up important files from flash drives on regular basis – once they are broken files are non-recoverable. Memory sticks and other compact media (e.g., micro SD cards, more common to phones, e-readers and cameras) are increasing versatile and vary in capacity. New gadgets, including a drive that reads micro SD cards and can be inserted like a USB flash drive are now available. CD-ROM stands for "Compact Disk-Read Only Memory. CD-ROM is a storage medium based on laser technology. Read only means that the hardware to write or save to a CD is not included in the drive. It is not possible to write to a CD without special hardware, a CD writer, popularly known as a “CD burner”. CDs typically hold up to one GB. CD-R/W stands for Compact Disk-Read/Write. However, care must be taken in selection of type of CD and method of “writing” to the CD – which can also depend upon the type of drive available in your computer. Some CD’s can only be written to once, and cannot be erased and overwritten. Other CD’s are designed for re-writing. Even re-writable CD’s are not designed for continual saving and overwriting as you are in the process of editing and updating files. They are more suited to saving final copies of data files and reports, especially those you don’t want re-edited. The disks are “re-writable” in that you can add additional files on subsequent occasions. CD’s tend to be inexpensive and are an excellent choice for saving and archiving final data, analysis and report files.

hardware and software1_15.docx 1.19

DVD (Digital Video Display) drives are currently a common option on computers. They often come in combination with a CD-R/W drive; DVD-ROM and DVD-R/W drives are both available. More and more software, especially with complex graphics (particularly games) is distributed on DVD, which have larger storage capacity than CD’s. Blank recordable DVD discs (DVD-R and DVD+R) can be recorded once using a DVD recorder and then function as DVD-ROM. Rewritable DVDs (DVD-RW, DVD+RW) can be recorded and erased multiple times.

Other Options for data storage and retrieval

Network drives: In a network environment, the designated “server” typically houses “network” drives that allow for both for shared access to files among network users, as well as secure back-up. Computers can be attached to the network physically through cable connections, or via wireless connection. Online or internet storage houses data on computers that act as web servers. Data stored online can then be accessed from any computer with internet access. UMass offers online storage in a facility known as the “Udrive”. “Cloud” storage is a model of networked storage where data is stored in virtualized pools which are generally hosted on one or more web servers. Hosting companies operate large data centers, and users buy or lease storage capacity from them. Physically, the data storage resource may span across multiple servers. The security of the files depends upon the hosting websites. “Dropbox” is one well known example of a cloud storage company. VPN or a Virtual Private Network provides a secure connection via the internet from any computer to a networked computer. Essentially, this is a service that allows you to operate one computer from another through the internet. When the VPN type software is housed on a network, you can log in to a computer on the network through the internet, allowing remote access to networked resources.

Data security is an important issue in management of data in public health and medical research, especially in the complex computing environment in which we now work. Understanding the implications of where data is stored, and where and how it can be accessed must be given due consideration. Using and documenting use of secure storage must be demonstrated. This topic is taken up in detail in a later unit.

hardware and software1_15.docx 1.20

Accessing Data

Access Time is the time required by the CPU of the computer to access one byte of information on a device (e.g, a hard-drive, CD, DVD, flashdrive, etc.). It is good to have fast access time. Access time is measured in milliseconds. Early machines (e.g., 80286) had access times of 88 msec. Today, hard disk drives have access times of 14 msec or less. In general, the higher the storage device, the faster the access time.

Access time is always faster from a hard-drive than from network drive, or other drive attached to the system. This can have real-time implications for analytic processing of large databases – it can matter where your data are stored.

2.10 Modem, Ethernet and Wireless Connections

"Modem" is shorthand for Modulate and Demodulate. It enables two computers to exchange data over standard telephone lines. Use of a modem requires communications software, which performs several functions, among them:

Dialing and redialing Logging on (connecting) to system being called Transmission of information.

The transmission speed of a modem is expressed as the baud rate. Baud rate = # bits that can be transferred in 1 second. The standard for a good, high-speed modem is 56K. Modems and phone line connections are currently only used in areas without cable or wireless options available. An Ethernet connection is a cable connection to a system, rather than a phone line. MIPS = Million Instructions per Second. Ethernet wiring – connection through a “hardwire” or cable system, transmits at 10 MIPS. The backbone fiber optics network at UMASS transmits at 100 MIPS. Wireless connection is the current standard, and requires the appropriate “card” in your computer, as well as working within a wireless environment, known as a “hot spot”. Most buildings and areas on the UMass-Amherst campus have been established as wireless zones, which means that if your device has the capability, you can establish an internet connection when in those areas. Check on the OIT website for wireless zones on campus: http://www.oit.umass.edu/wireless .

hardware and software1_15.docx 1.21

2.11 Ports and Cables

Port: A port is a physical location through which the computer exchanges information with an external device (e.g., printer, scanner or flash drive). A port has an address so that the computer knows where to send or receive information. There are three types of ports and associated cables: parallel, serial, and USB ports.

1. Parallel 8 bits are simultaneously transmitted over 8 wires (or transmitted in parallel). Most commonly used for printers. Also commonly used for external disk drives.

2. Serial Each bit is transmitted one after the other (in serial) over a single wire. Most commonly used for modems.

3. USB – Universal Serial Bus Port Currently most common method of attaching peripheral hardware; USB are the

standard method for most current laptop computers, and increasingly on newer desktop computers, also. Most tablet PC’s have only USB ports (if any), and otherwise depend upon wireless connections for communicating with other devices.

USB ports are typically available on rear and front (for easy access) of box, as well as on the side of monitors.

USB ports supply power to the “peripherals” (attached devices), reducing the need for additional power sources. In fact some devices with internal batteries can recharge through USB connections (e.g., ipods, phones, e-readers).

Full speed devices communicate with the PC at 12Mbps. Mice and keyboards etc. can communicate at a lower 1.5Mbps rate.

PlugNPlay - The PC recognizes each device that is plugged into a USB port and loads the appropriate driver. If it is a new device for which it has no driver, and doesn't run with a generic driver, the computer prompts for a driver to be loaded. This may require an internet connection to download device drivers. In rare cases you will need to supply a CD to load a driver.

No special cables are required for USB connections – no null modem cables, handshaking lines to mess with etc.

Attaching Peripheral Hardware

When you first attach new hardware (a modem, printer, disk drive, …) to your computer, you need to set up the communications systems for the new hardware component – so that it can communicate appropriately with your computer. This communication system is known as a “driver.” While much of this has been automated – a disk or internet connection which steps you through the process is typically included with new hardware – you are occasionally asked to make choices, and unless you are using a USB port, you will need to know which port you are using.

hardware and software1_15.docx 1.22

When you attach hardware to a serial or parallel port, or hook-up a computer cable or modem connection, you typically need to restart the computer. Until you restart, the newly attached component is not recognized or “not found.” In contrast, hardware that can be attached through a USB port does not require restarting the computer; it will be recognized without a reboot. However, it is recommended that you take time to “Safely Remove Hardware” that is connected through a USB port, before switching to another piece of equipment on the USB drive. Failure to “safely remove hardware” may result in lost or non-readable files; or your computer may not appropriately ‘recognize’ another thumb drive or piece of hardware that you subsequently attach to that port.

2.12 Care of Computers, Storage Devices, and Printers

Micro computers and storage disks will perform better, require less maintenance, and last longer if several simple rules are followed.

First, computers must be kept clean. This means insisting on no food or drink near the computer, and regular cleaning of dust and debris.

Second, computers should be kept at moderate temperature (between 45 and 85 degrees F). High or low temperatures may damage motherboard memory and disk drive memory.

Third, computers and disks must be kept clear of static. Since information is stored via magnetic fields, static electricity can destroy stored information. Similarly, static electricity can destroy RAM prior to installation in a computer. Computer memory, when shipped, comes packed in static proof wrap. Special care and grounding will minimize the chance that memory will be destroyed during installation. Low static carpeting may be a good investment.

Finally, all computers should be connected to surge protectors. The surge protector will prevent voltage surges from damaging the system.

hardware and software1_15.docx 1.23

3. Software

3.1 Disk Operating System

The CPU, storage devices, and other devices in a personal computer communicate with each other via an operating system. Examples of IBM compatible operating systems include UNIX, DOS, and OS2. The DOS operating system was basic for most IBM compatible computers. In the past learning DOS commands to manage files and access to application software was important.

Early versions of WINDOWS functioned as a layer “above” the disk operating system, though in current versions Windows serves as the operating system.

3.2 Windows

Windows is a Graphical User Interface (GUI) – a more intuitive way to interact with a computer. Instead of typing a command in DOS, tasks are performed in a more intuitive, visual manner via point and click, with the help of a “mouse” or other input device. Tasks such as copying a file from one disk to another can be accomplished by “dragging” an icon representing the file from the icon representing one disk to the icon of another. A GUI acts as a translator allowing the user and the computer to communicate with each other in a way that is easy for both to understand.

3.3 The Mouse, Touchpad and Touchscreen

The mouse is a pointing and selecting device. It plays a major role in a graphical user interface. A touchpad is another type of pointing device featuring a specialized surface that can translate the motion and position of a user's fingers to a relative position on screen. Touchpads are a common feature of laptop computers. A touchscreen is an electronic visual display that the user can control through simple or multi-touch gestures by touching the screen with one or more fingers. Some touchscreens can also detect objects such as a stylus or ordinary or specially coated gloves. The touchscreen allows the user to interact directly with the display, rather than using a mouse, touchpad, or any other intermediate device (other than a stylus, which is optional for most modern touchscreens). Note that everything that can be done with a mouse, touchpad or touchscreen can also be done with the keyboard, although this defeats the purpose of the GUI. For example, while there are many ways to select text, cut, copy and paste using the mouse, these can also be accomplished with keyboard strokes. A few of the more useful ones to know are:

Function Keyboard Strokes Select all Ctrl-A (this means hold Ctrl Key and tap the A) Cut Ctrl-X Copy Ctrl-C Paste Ctrl-V

hardware and software1_15.docx 1.24

If you are ever having trouble copying/pasting between different software applications (e.g., from a webpage to a word processor), try using keyboard strokes in place of point and click menu choices and mouse actions. Excessive mouse use can cause fatigue and repetitive strain injury and it is valuable to learn to do some frequently performed tasks on the keyboard. Some examples are copy, cut, paste, select all, as shown above. Other common actions include use of

• ctrl <S> or F10 to save • F12 to “save as”

Within a software program you can often customize these commands by creating MACROS, or programs to assign functions to keyboard strokes.

Many operations are faster and sometimes more precise with the keyboard than with a mouse. You can also use mouse actions and keyboard controls together – some examples:

• Selecting a section of a document to copy can be done with the Shift key and the mouse. Use the mouse to position the cursor at the start of the section you wish to copy. Hold down the shift key, and use the mouse to move the cursor to the point in the document that marks the end of the section you wish to copy and click on it.

• Select columns of text to cut or copy by positioning the cursor at the start of the columns to be selected; holding down the Alt key, and dragging the mouse over the section of text you wish to select. This is particularly useful when editing computer output into Word documents.

Special electronic ‘pads’ and ‘pens’ are available for those with wrist or other problems making a mouse difficult to use; in addition voice recognition systems are in use and undergoing further development to give commands and enter information orally.

3.4 The Anatomy of a Window

Windows uses a desktop metaphor:

Computer Screen == Electronic Desktop Graphical objects on the screen are like objects on your desk – they can be moved around to get something out of the way, or they can be covered up by a file you are currently working on.

Keeping the desktop metaphor in mind will help make the concepts and techniques about using windows easier to grasp. Just as you shift papers around on your desk, cover papers allowing only the important parts to show, stack papers on top of one another and file papers, etc. – all this can be accomplished with different windows and information within them. Each application program on your computer can run its own window or, more commonly, its own set of windows. Each window operates in a similar manner, although the tasks performed may be very different.

hardware and software1_15.docx 1.25

While the type of window seen at any given time depends upon the individual application in use – many of these features are common to all windows.

• Title Bar – at the top of the window, this shows the name of the program (Microsoft

Word) and icon for the program ( ), along with a few other features that are common to the operating system.

• Menu Tabs – a horizontal bar below the title bar listing the available categories of commands or actions which can be performed in this window. The Ribbon shows the particular set of actions available when a particular menu tab is selected.

• Scroll Bars – vertical and horizontal bars along the right hand and bottom edge of a window: buttons (arrows) on the scroll bar move you quickly through a window.

• Minimize Button – The leftmost of 3 boxes in the upper right-hand corner of a window. The Minimize button effectively hides the window – the window appears only on the task bar at the bottom of the screen when minimized. Note this does not close the window – the program and/or document are still open and held in active memory, just folded up, out of the way.

Title Bar

Menu Tabs

Minimize Button

Close Button

Maximize / Restore Button

Workspace Vertical Scroll Bar

Horizontal Scroll Bar Window Corner To shrink or stretch window

Ribbon

hardware and software1_15.docx 1.26

• Maximize/Restore Button – the middle of the 3 buttons in the upper right-hand corner of a window. This shifts between maximizing a window (filling the whole screen) and shrinking the window to fill only part of the screen so that other open windows or the desktop may be viewed.

• Close Button – the button with the X – used to close a window. This actually

closes the file and/or application program, and removes it from active memory (from RAM).

• Window Corner – can be used to resize/reshape a window by dragging to the

desired size/shape. The TASKBAR across the bottom of the computer screen can optionally contain icons for commonly used programs, and also indicates which windows programs are currently open.

At the left of the taskbar the Start button (Windows

icon ) can be used to access all the software.

At the right-hand side of the taskbar, icons for features running in the background are displayed. These vary with your computer setup. Typically if you roll the cursor over the icon, information about its function will appear.

Closest to the Start button, you can optionally place icons for commonly used Software.

Software and files that are “open” in RAM (active memory) show on the taskbar.

To add icon to taskbar: right-click on taskbar icon of open software and select:

You can switch between active windows by clicking on the icon you wish to view in the taskbar.

hardware and software1_15.docx 1.27

3.5 Managing Files in Windows

The key program for file management in Windows 7 is The Windows Explorer. This program gives a picture of the files – documents, data and program files that are stored on the various computer disks.

This program can be used to copy, move, delete and open programs and documents. The Windows Explorer:

Use to set the view of files.

The left-hand side of the explorer window displays a list of the available disk drives, with folders displayed.

Clicking on the beside a folder or disk drive will display all subfolders.

A highlighted bar on the left shows the drive or folder whose contents are displayed on the right-hand side of the screen. Details about the selected folder or drive are in the lower left corner of the window.

The right-hand side of the explorer lists the files and sub-folders in the selected drive\directory. In this example, the VIEW has been set on “Details.” A small icon to represent the file application type is followed by the full file name. The file size, type and date/time saved are also listed. In Details View clicking a column heading (Name, Date Modified, Type or Size,) sorts the file listing alphabetically by filename, by Size, by type of file, or by date/time last saved. A second click reverses the order. This feature makes it easy to find files!

hardware and software1_15.docx 1.28

You can switch the type of display using the “VIEWS” button on the menu bar.

By right-clicking on a drive and selecting “Properties” you get the following:

This screen allows you to:

• label or name your disk – Take advantage of the feature that allows you to name a disk or flash drive. This name will appear next to the drive designation in the Windows Explorer – a great advantage when you leave your flash drive in the computer lab!

• look at the amount of free

and used space on the disk

• perform disk clean-up using the ‘Tools’ tab.

hardware and software1_15.docx 1.29

3.6 Some General Tips for Working on a PC Naming Files

Filenames have 2 levels in Windows, separated by a dot (.) or period.

• The first level before the dot can be a long descriptive title including most of the keyboard characters (exceptions include / * ? > < and perhaps others).

• The 3+ letter “extension” after the dot is determined by the software used to create and work with the file. For example

o MS Word files all have the extension “.docx” (or .doc for older versions)

o MS Excel files use the extension “.xlsx” (or .xls for older versions)

o text files have the extension “.txt”.

• Each software package has one or more extensions used to indicate the type of file.

The type of file is also indicated by the icon. For example:

is used for Word files, for Excel for text files.

Other icons and extensions are used for other software packages, many packages having different icons for each type of file the package recognizes. These icons are recognized by the computer once that software is installed on your machine. On rare occasion you will have a conflict – 2 software packages use the same extension with different meaning. You will have to choose a default.

Be careful when you rename a file; do NOT change the file extension (the part of the name after the dot). If you rename a file and change the extension, then the software package will not recognize the file type, and you will not be able to access the file properly.

If the 3 letter extension does not show in the Windows Explorer, it’s a good idea to turn this feature on: Organize Folder and Search Options and selecting the View tab:

Uncheck “Hide extensions for known file types” to make sure that extensions are visible. I recommend having this Apply to All Folders by clicking the appropriate button.

hardware and software1_15.docx 1.30

The first part of a file name is up to you, as the user. I recommend keeping it relatively short and simple. Occasionally part of a long name is lost when you send a file as an email attachment – it depends on both your email system and computer operating system, as well as the recipient’s system. This was a greater problem in the past, but you may still run into it. Take care when naming files that you will be posting to the Web:

• Web file names are CASE SENSITIVE (UPPER vs. lower case). While capitalization is ignored in filenames in Windows, UPPER and lower case letters are read as different characters in Web-file names.

This means that “CASE” and “Case” and “case” would all be read as different file names in a web environment; on a PC using Windows, they are equivalent.

• In naming files to be posted on the web, use only letters, numbers, the underscore (_), and NO SPACES. Once a space is encountered in a name on a file posted to the web, the rest of the name is lost (so use an underscore in place of a space). For example in place of “Personal Page.html” which contains a space (allowed in Windows!) use the name “Personal_Page.html” when creating a personal webpage.

Deleting Files When you delete files or folders from the hard drive (by dragging to the Recycle Bin or using the delete button on the keyboard or on a menu), the file (all the bits of info) is not deleted from the disk, rather information on its physical location is “moved” to the Recycle Bin. This gives you the chance to retrieve the file if you have deleted it in error. Until you empty the recycle bin, files are retrievable – simply click to open the recycle bin and drag the file icon back to another location. Note: files deleted from a removable disk, USB drive or network drive are deleted from the list of files, and location information is NOT moved to the recycle bin – and therefore these files are not readily retrievable. However, even when a file has been “deleted” and the recycle bin emptied, it may still be retrievable. Deleting a file merely removes its name from the directory, and indicates that the space is available for re-use, but the information is still stored on disk until it is over-written by another file. Programs such as Norton Utilities can be used to recover deleted files, as long as new files haven’t overwritten the old files. This is both good and bad news: Good news for the day you make that awful mistake and delete something important –

you may be able to find and retrieve it; Bad news when you think you have deleted confidential information from a computer.

You must take some other action, such as reformatting an empty disk, or “cleaning up” a hard disk, so deleted data is no longer accessible, even by specialized software.

hardware and software1_15.docx 1.31

Opening Application Programs and Files Application programs can be opened by using the Start Menu, e.g.,

Start All Programs Microsoft Office Microsoft Word 2010

This opens the program into RAM, to a blank document or empty file. You can then open a stored file from within the software package from the File menu or a toolbar icon, or create a new file.

An alternative way to open both a particular file and a software application simultaneously is to double click on a previously saved file in Windows Explorer. Additional files can be opened from within the software package using the menu or toolbar options; or additional files can be opened from the Windows Explorer.

File Management It is always a good idea to have some organized structure to storing files, otherwise you can end up with endless lists of files to look through to find the one you want. You can – and should – create FOLDERS on your disks, analogous to file folders for storing actual papers that you are filing. Depending upon the scope of your project you may want to organize folders by file type, date, user, or topic – and various combinations of the above. While you are allowed by the system to give folders and files long, descriptive multi-word titles in Windows, it is a good idea to be relatively brief. Some applications have limits internally to file name lengths, so part of a name can get lost. If you will be sharing a file with other users, think about using a name that clearly identifies you and/or the project. For example, rather than a using name like “draft1.doc” a name such as “Pekow_Biostat691f_v1.doc” is much more informative, and less likely to be overwritten by another document with an identical name created by another user. Shutting Down the Computer Microcomputers should not be turned off without first “shutting down” the computer. This is a process that closes down shared files and programs that are running in the background before the computer is turned off. Failing to shut down will leave unnecessary temporary files on your computer that can hamper effective operation over the long term. In addition, if you fail to “shut-down” and simply turn off the power, the start-up will take longer when you next turn on the machine, as the system works through a scan for disk errors. It is a good idea to shut down your computer on a regular basis so that this clean-up of temporary files will take place.

hardware and software1_15.docx 1.32

Computer Protection A computer virus or worm is a file or segment of computer code that is designed to “infect” files or systems – by destroying required system files, copying endlessly and clogging up systems or various other methods. Virus protection software is particularly important in an environment where files are shared through the web, email, and use of common computers in a lab. McAfee Virus protection software is available to the UMass community once you have an OIT account. This is distributed by CD when you obtain your account, or can be downloaded from the OIT website. PLEASE TAKE ADVANTAGE of the availability of the software, and update regularly.

4. The Internet and the World Wide Web

“The Internet” is the vast collection of inter-connected computer networks that use a specified set of protocols for transmission known as the TCP/IP (Transmission Control Protocol/Internet Protocol).

Any set of computers connected together form an “internet”, also known as a network. We typically speak of a local area network (LAN) for a set of computers connected within a company or organization. Such an “intranet” may also be connected to “The Internet.”

The “World Wide Web” is a system of Internet servers that support specially formatted documents. A Web Server is a computer connected to the Internet that has a specified IP (Internet Protocol) address, so that it can be located to provide documents via the Web. Web documents are formatted in HyperText Markup Language (HTML). HTML is a standardized language of computer code that lies behind all Web documents, containing the text you see, images, links to other documents, as well as formatting instructions for display on the screen. If you copy or save material from a web page, and try to edit it in a word processing package such as MS Word, you might find strange things happening with formats and spacing, and also find occasional unusual characters in the document. These are remnants from the HTML coding. While Word has features that allow you to create an HTML version of a document you are writing, there are specialized software packages designed for creating and managing web pages and websites.

Each “Web page” has a specific address, known as a URL for Uniform Resource Locator. Web addresses begin with http:// which stands for hyper-text transfer protocol. The first part of the name indicates the particular server where the web document is stored. Each “web page” is a single document on the World Wide Web. This means it is an HTML document stored on a web server, with an “address”. Each Web page is identified by a unique URL. You may type a URL into the address box and hit the enter key to access a page. Or, more often, you will click on a Link provided in another web page. A link is a URL imbedded in another document that allows you move directly to the new page.

A “website” is a set of interconnected web pages. A site can consist of a single page, or many pages typically connected by embedded links.

hardware and software1_15.docx 1.33

In addition to the World Wide Web, there are other systems using the Internet. Email is one example of another type of connection made through the Internet that allows you to send messages and files. Another example is FTP or “File Transfer Protocols” for moving files from one computer to another without an email connection.

To connect your PC to the Internet, you need a either a modem (for a phone line connection), an Ethernet card (for a cable connection), or wireless capability, along with software to make the connection, an ISP (Internet Service Provider), and a web browser. A browser is a software program that lets you view web documents. Browsers translate HTML-encoded files into the features (text, images, sound, motion) that you see on your screen. Commonly used browsers are the Internet Explorer, Firefox and Chrome. Some ISP’s (e.g., AOL) provide their own browser.

4.1 Browser Windows

Once you connect to the Web, and open your browser, you see a Browser Window similar to the Windows you usually work with.

Example Webpage Window:

Icon in Title Bar indicates an Internet Explorer window.

Menu bars allow you to navigate, or use other special web features.

Address box indicates the “URL” or web address of the page you are viewing.

As you move the cursor over a “link” the URL of the page linked to appears in this lower left bar of the browser window.

hardware and software1_15.docx 1.34

4.2 Uploading and Downloading Files Each time you access a new page (identified by a new URL) this page must be read and transferred to your local PC through your connection – by phone line or cable or wireless transmission. A web page can take from a fraction of a second to many, many minutes to be read. Images or graphics tend to use many bytes – and make pages load much more slowly. The time of transfer depends upon both the size of the file, and the “speed” of your connection. A cable or wireless connection seems instantaneous, while a slow modem (phone connection) can seem interminable. You will often want to download information from the web. This is the process of copying a file or part of a file from an online server to your own computer. When you have downloaded a file you have saved it, and made it available to use on your own computer, without taking the time to connect to the web to locate and read the file again. You can also edit and cut and paste from your saved file into reports or other documents you are creating. You will also want to upload files to the web. This is the process of taking a file or part of a file that you have stored on your own computer, and loading it onto a server or bulletin board, so that it becomes available to other users of The Internet. Using the UMass Udrive Once you activate your UMass email account, in addition to email access you have space available for use on a webserver for storing files, referred to as the Udrive. Information for using this space is available at http://www.oit.umass.edu/udrive . A few words of caution on use of the Udrive: Do not use the Udrive in the same manner as a USB Flash drive or other local drive on your computer. In other words, do not open files directly from the Udrive, do not edit/save files while working from the Udrive. Instead, treat the Udrive as a back-up storage drive. If you work with the Udrive as if it is a local computer drive, errors related to brief loss of connections can render files unusable; some file types (such as .accdb database files, or .sas program files) are not directly usable and will give you an error message, and may corrupt the file. Always download files to your local computer; work, edit, save – then close the file and upload to the Udrive for use at another time, another computer.

Recommended