0 ratings0% found this document useful (0 votes) 55 views43 pagesInformation and Communication Technology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
OVERVIEW
‘omputers and other forms of technology impact our daily lives in a multitude of
ways. We encounter computers in stores, restaurants, and other retail establish-
ments. We use computers and the Internet regularly to obtain information, experience
online entertainment, buy products and services, and communicate with others. Many
of us cary a mobile phone or other mobile device with us at all times so we can
remain in touch with others on a continual basis and can access Internet information
as we need it. We also use these devices to pay for purchases, play online games with
others, watch TV and movies, and much, much more.
Businesses also use computers extensively, such as to maintain employee and
customer records, manage inventories, maintain online stores and other Web sites,
process sales, control robots and other machines in factories, and provide business
‘executives with the up-to-date information they need to make decisions. The govern-
ment uses computers to support our nation’s defense systems, for space explora-
tion, for storing and organizing vital information about citizens, for law enforcement
and military purposes, and other important tasks. In short, computers and computing
technology are used in an endless number of ways.
Understanding Computers: Today and Tomorrow is a guide to computers and
related technology and how they are being used in the world today. It will provide you
with a comprehensive introduction to computer concepts and terminology and give you
«solid foundation for any future courses you may take that are related to computers or
their use in the world today. It will also provide you with the basic knowledge you need
founderstand and use computers in school, on the job, and in your personal le, as well
as give you an overview of the various societal issues related to technology, such as
security and privacy issues, ethical considerations, and environmental concerns.
Chapter 1 is designed to help you understand what computers are, how they
work, and how people use them. It introduces the important terms and concepts that
you will encounter throughout this text and in discussions about computers with oth-
ers, as well as includes an overview of the history of computers. It also takes a brief
look at how to use a computer to perform basic tasks and to access resources on the
lntemet and the World Wide Web in order to provide you with the knowledge, skils,
and tools you need to complete the projects and online activities that accompany this
textbook. The chapter closes with an overview of the societal impact of computers. i
COMPUTERS IN YOUR LIFE
Computers today are used in virtually every aspect of most individuals’ lives—at home,
school, at work, and while on the go, The next few sections provide an overview of the
importance of computers and some of the most common computer-related activities that
individuals may encounter every day.
Why Learn About Computers?
Fifty years ago, computers were used primarily by researchers and scientists. Today, com-
Puters are an integral part of our lives. Experts call this trend pervasive computing, in
Which few aspects of daily life remain untouched by computers and computing technol-
zy. With pervasive computing—also referred to. ubiquitous computing—computers are
na
‘Most of the computer concepts,
Introduced inthis chapter are
discussed in more detail in
‘subsequent chapters ofthis tox,
Scanned with CamScanner
OL6 mtRoDUCTION
C2
ore than half of all US.
mobile phone users today are
smartphone users; that is their
‘motile phones include Internet
‘capabiltios and the ability to en
mobile programs or apps.
y FIGURE 1-1
Convergence.
any devices today
include computing or
abiites.
Internet
‘TELEVSIONS
‘Cane used to access Web pages. e-mal,
‘Searing movies, and other Interet content
in cont viewing TV content
found Vramlly excyuhers and conguting ectnokeg? SOC Ine CaS
umber Of decocs gfe tres devies waitione rncsionlity sich 95 2S OS
communicate wih otter devices on an ongoing basis. ieause ofthe Prov ES A
: smputer is, Tittle about how a
puters in our society, itis important to understand what acon ay
Computer works, and the implications of living in a computer-onchiet ao
Prior about 1980, computers were large and expensive. a few Pee had access to
them, Most computers wed organizations were equipped 1. ite mors than yt
Hb-volums preaing ake, net as issuing bills and Keeping wack of inventors. The
trueage pone thd at peed > know haw to use a computer fo bist her J, ond oat
Uncommon to have scompute at home. Fureroore the se of COmPAte® Bea TEN!
1 otoftechnicl knowledge andthe use of the Fier was reserved primarily for Tveath
tre and educational institutions, Because there were few good reasons or opportunities fr
Tearing how to use computers, the average person was unfamiliar with them
‘Beginning in the early 1980s, things began to change. Microcomputers VNDSNSNS
personal computers that you will ead about later in this chapter—were invented and com
puter use increased dranaically. The creation of the World Wide Web (WWI) in the tae
TOS0s and the graphical Web Browser in the early 1990s started the trend of individuals
buying and using computers for personal use. Today, portable computers and mobile Phones
have brought personal computing toa whole nev level—nearly 90% ofall U.S. households
have a computer of mobile phone, and most individuals use some type of computer on the
job. Whether you become a teacher, attorney, doctor, engineer restaurant manager, salesper-
Son, professional athlete, musician, executive, or skilled tradesperson, you will likely use a
Computer to obtain and evaluate information to facilitate necessary on-the-job tasks, and to
‘Communicate with others. Today's computers are very useful tools for these purposes: they
gre also taking on new roles in our society, such as delivering entertainment on demand.
Tn fact, computers and the traditional communications and entertainment devices that we
use every day-—such as telephones, televisions, gaming devices, and home entertainment
systems_—are converging into single units with multiple capabilities. For instance, you can
Check your e-mail (electronic messages), watch videos, and view other Intemet content on
{your living room TV; you can make telephone calls via your personal computer; and you
Zan view Internet content and watch TV on your smartphone or other mobile device (see
Figure I-1). Asa result ofthis comergence trend, the computer is no longer an isolated pro-
i an integral part of our daily lives
Just as you can lear to drive a ear
‘out knowing much about ear engines, you can
Jeam to use a computer without understanding
the technical details of how a computer works.
However, a litle knowledge gives you a big
advantage. Knowing something about cars
can help you make wise purchasing decisions
and save money on repairs. Likewise, knowing
something about computers can help you buy
the right one for your needs, get the most eff-
cient use out of it beable to properly uperade it
as your needs change, and have a much higher
level of comfort and confidence along the Wa.
‘Therefore, basic computer literacy—knowing
about and understanding computers and their
‘uses—is an essential skill today for everyone.
‘SMARTPHONES
‘Can be used to access intemet
conten, play music and games, take
watch TV shows, and more,
in adtion to making phone cals.
> Computer literacy. The knowledge and understanding of basic computer fundamentals.
Scanned with CamScannerCHAPTER 1 INTRODUCTION To THE WORLD OF COMPUTERS
Computers in the Home
Home computing has increased dramatically over the
cers and Internet access have become less expensive and as a vast array of online
consumer activities have become available. Use of the Internet at home to look
up information, exchange e-mail, shop. watch TV and videos, download music
and movies. research products, pay bills and manage bank accounts, check
news and weather, store and organize digital photos, play games, make vacation
plans, and so forth is now the norm for many individuals (see Figure 1-2). Many
few years as comput-
individuals also use a computer at home for work-related tasks, such as toreview Sx
work-related documents or check work e-mail from home.
REFERENCE
[As the Internet, wireless technology, and devices such as computers, tele
Retieving information, obtaining news, viewing
visions, mobile phones, digital video recorders (DVRs), and gaming consoles
recipes, shopping onli
, and exchanging
continue to converge, the computer is al jing a central 7
ati re, the computers also becoming a central part ofhome enter- bes, shoppeg ane, eae,
tainment. Wireless networking allows the use of computers in virtually any loca
tion and both online and offline content to be sent wirelessly from one device to
another. Both voice and video telephone calls can be made over your Internet
connection, and your TV can display Internet content.
Computing technologies also make it possible to have smart appliances—
tcalitional appliances (such as refrigerators thermostats, oF ovens) with some type
of built-in computer or communications technology that allows them to be con-
olled by the user via a smartphone or the Internet, to access and display Internet
information, or to perform other computer-related functions. Smart homes—
iiomes in which household tasks (such as watering the lawn, turning the air condi-
\oning on or off, making coffee, monitoring the security of the home and grounds,
iment content) are controlled by a main computer
| managing home enterta
PRODUCTIVITY
i> the home or by the homeowner remotely via a smartphone—have arrived, and
Home computers are frequent used fr etng
the lawn) during nonpeak energy periods and to potentially transfer waste heat
from one appliance (such as an oven) to another appliance (such as a dishwasher)
asneeded.
Computers in Education
Today's youth can definitely be called the computing generation. From handiield
suming devices to mobile phones to computers at school and home, most
dren and tecns today have been exposed to computers and related technology all
their lives, Although the amount of computer use varies from school to school and
fiom grade level to grade level, most students today have access 10 computers at
-y are expected to be the norm in less than a decade. Some believe that one pri-
‘rcucof smart appliances and smart homes wile enerzyconseaton-—for Smaragd ps a taney,
{anc th abit perform asks Goch asruning the dishwasher and watering COMbant ate wns oes
Spence
‘choo! —and some schools have completely integrated computers into the curricu-
Jum, such as by adopting e-book (electronic) textbooks that run on school-owned ENTERTAINMENT
ome computers ano gaming consoles are
Portable
or allowing students to bring in devices to use in class (referred
puter . 4 ‘becaring a cena hub fo entertainment, suchas
to.as BYOD or Bring Your Own Device). Many schools (particularly college cam- ihe delivery of debate
pose) today aso hve wireless hotspots tha allow stadens to connect het et- TY saws, lan msoqe and so nein
sonal computers or mobile devices wirelessly to the Intemet from anywhere on updates.
campus, Today, students at all levels are typically required 10 use a computer to
some extent as part of their normal coursework—such as for preparing papers, practicing
Mills, doing Internet research, accessing Internet content (for instance, class Web pages or
their campus YouTube channel), or delivering presentations—and some colleges require a
Computer for enrollment.
‘Computers are also used to facilitate distance learning —an altemative to traditional class-
‘oom learning in which students participate, typically at their own pace, from their current
hheatin (via their computers and Internet connections) instead of physically going to class.
distance leaming gives students greater flexibility to schedule class time around
Consey
auent
fy FIGURE 1-2
Computer use at
home,
Scanned with CamScanner
Uy8 nTRopucTiON
COMPUTER LABS AND CLASSROOMS
‘Many schools today have computers and
Internet access avaiable inthe classroom
andlor a computer lab fr student use,
fy FISURENS
Computer use Tn
cedueation.
oy FIGURE 1-4
Computer use on
the job.
DECISION MAKING
‘Many individuals today use a computer to help
them make on-the-job decisions.
OFF-SITE contmuntcaTiONS
Hany individuals use portable computers oF
mobile devices to record dat, access data, or
onan win obs wen ey a0 oct
Poi,
‘CAMPUS WIRELESS HOTSPOTS. DISTANCE LEARNING
‘Many students can access the internet ‘vith stance leaning, students—such as these
US Army soldiers—can take classes from home
{tom anyutere on campus to co research
check e-mail and more va acampusotspat. wherever they happen toe a the moment.
nd work commitments, as well as allows individuals located in very
ke courses when they are not able to
shown in Figure 13.
their personal, fa
rural areas or stationed at military posts overseas (0 ta
attend classes physically. Some examples of computer use in education are
Computers on the Job
Although computers have been used on the job for years, their role is continually evolving.
‘Computers were originally used as research tools for computer experts and scientists and
then as productivity tools for office
workers. Today, computers are used
by all types of employees in all pes
of businesses—including corporate
executives, retail store clerks, trav~
cling sales professionals, artists and
musicians, engineers, police offi-
cers, insurance adjusters, delivery
workers, doctors and nurses, auto
mechanics and repair personnel, and
professional athletes. In essence, the
computer has become a universal
Proouciviry tool for on-the-job decision mak-
Hany indvidals today use acomputer to perform ‘ME productivity, and communica
on-the-job tasks eficenty and accurately. tions (see Figure 1-4). Computers
are also used extensively for access
control at_many businesses and
organizations, such as authentica-
tion systems that allow only autho-
rized individuals to enter an office
building, punch in or out of work,
OF access the company network via
aan access card or a fingerprint oF
hhand sean, as shown in Figure 1-4
and discussed in detail in Chapter
9. In addition to jobs that require
the use of computers by employ-
es, many new jobs have been cre
3
I
‘auTHeNTICATION ated simply because computers
Many individuals are required to use authentication Such as jobs in electronics man-
‘ystems to punch in and out of work, access ufacturing, online retailing, Internet
{aciltis, oF log onto cormpany computers. applications, and technology-related
‘computer support,
Scanned with CamScannerRestaurant iPad Ordoring Systems
‘You may have used your iPad or ether device to place a pickup
order at your local eatery; you may also have had a server use
an iPad to take your order at a restaurant. Nice innovations, but
guess what's next? Placing your order yourself at a restaurant
using an iPad,
This now trend of using iPads and e-menus to have cus-
tomers place their orders in restaurants is growing rapidly. In
addition to enabling customers to place their orders at their
convenience without waiting for a serve, it also allows the res
taurant to provide more resources to customers (such as pho-
tographs of menu items, pairing suggestions for appetizers and
drinks, and 0 forth). The overall goal is to allow customers to
contro their dining experience from the time they are seated
uti they choose to pay the check. And, yes, they pay via the
iPad as well (Gee the credit card reader at the top right of tho
iPad shown in the accompanying photo).
iPad ordering systoms work especialy well for restaurants
that offer customized menu items. For example, Stacked, one
of the fist large-scale adopters of restaurant iPad ordering sys-
toms, offers typical American food (such as pizza, burgers, and
salads) at its Southern California restaurants but everything on
tho menu is customizable—customors choose from a wide varoty
of ingredients, toppings, and sauces. The iPad systems enable
customers to build their selections, adding or removing ingredi-
nts, until they are satisfied with the order (the price adjust
they change their selections). This allows customers to build their
‘orders at a comfortable pace without having to remember them
Unt a server arrives, or having to make that many decisions with
a server waiting.
Compute
navigational purpose
are also used extensively by military personnel for commt
as well as to control missiles and other weapons,
CHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 9
Mote than 7,000 e-menu-enabled Pads are also artving at
airport restaurants in threo airports in North America. They will
bo usod not only for placing ordors but also for providing travel-
crs with ree access to Facebook, Twitlor, e-mail, games, nows,
‘and fight updates while thoy wait (for security purposes. all pr-
onal information is wiped trom the device as soon as the home
button is pressed).
‘The two biggest risks for restaurants introducing iPad order-
ing systoms is customer acceptance (most offer assistance from
servers ifthe customer dosires to holp alleviate any customer
concerns about using the devices) and technology issues. To
avoid network of Intomet outage issues, some restaurants aro
implementing redundant systems, such as multiple routers that
‘can be used i the main router goes down or a 4G Intornot con-
roction that the systom ean use to access tho Intornot via a cot-
{ular connection if the main lntornet source goos down
ists and other potential enemies, and perform other necessary national security tasks. To
"update their computer skills, many employees in all lines of work peri
ically take com-
puter training classes or enroll in computer certification programs
Computers on the Go
and use alltypesof computersinother aspects of day-to-day
1ousingcomputersinthe home, at school, ndonthejob, most people encounter
fe. Forexampleitiseommon
for consumers to use consumer kiosks (small self-service computer-based stations that
ation oF other services to the public, including those used for ATM transae-
stems, and more), point-of-sale (POS) systems (such as
‘onder at restaurants), and self-
Provide i
tions, bridal ri keting
those found at most retail stores to check customers out—see the Technology and You
box for a look at how you may soon be using iPads ne
chectout systems (which allow 1
ail store customers to sean their purchases and pay
Scanned with CamScannertTRODUCTION
PORTABLE DEVICES
‘Many people today carry a potable computer or
smartphone with them at all times or when they
travel in order to remain in touch with others and
to access intemet resources.
MOBILE PAYMENT SYSTEMS
tow incidals to pay for purchases using a
mariphone or other Gevice.
fy FIGURE 1-5
© Computer use while
fon the go.
for them without a salesclerk) while
in retail stores and other public loca.
tions, Individuals may also need
to use a computer-based consumer
authentication system to gain access
to a local health club, theme park,
or other membership-based facility
(see Figure 1-5)
In addition, many individuals
carry a portable computer of mobile
device with them on a regular basis
to remain electronically in touch with
‘others and to access information (such
‘as stock quotes, driving directions, 3
Tine flight updates, movie times, news
headlines, and more) as needed while
con the go. These portable devices
are also commonly used to watch
TV, download and listen to music,
access Facebook pages and other
social networking sites, and perform
other mobile entertainment options.
Smartphones can also be used to pay
for products and services (refer again
to Figure 1-5), as well as remotely
deposit checks, transfer money 10
others, pay bills electronicially, and
perform other mobile banking applica-
tions. GPS (global positioning system)
capabilities are frequently built into
smartphones, cars, and other devices
to provide individuals with driving
directions and other navigational aids
while traveling or hiking.
‘CONSUMER KIOSKS
‘lectronc kiosks ae widely availble to view con-
ference or gift registry information print photo
‘Graphs, order products or services, and more.
‘CONSUMER AUTHENTICATION SYSTEMS
‘low only auborized members, such as theme
park annual pass holders as shown here, access to
facies.
WHAT IS A COMPUTER AND WHAT DOES IT DO?
‘A computer can be defined asa programmable, electronic device that accepts dat, pet
forms operations on that data, presents the results and stores the data or results as needed
“The fact that a computer is programmable means that a computer will do whatever the
ir uetions_-called the program—tell to do. The programs used with a computer dete
re the tasks the computer is able to perform.
“The four operations described in this definition are more technically referred to as
input, processing, output, 3nd storage. These four primary operations of a compute can be
defined as follow
> Input—entering data into the computer,
» Processing—performing operations on the data,
min
‘Computer, A programmable, electronic device that accepts data input, perfoms processing operations on thay
at data, and outputs and stores
the resuite. > Input. The process of entering data into a computer; can also refer to the data ise, >Processing, Pers, tpt aa i
that hasbeen input into computer to convert that input 0 ute sou Oeeacoe
Scanned with CamScanner(CHAPTER 1 INTRODUCTION To THE WoRLo OF comPuTERS.
"
24507
eS
cE
put PROCESSING
User types inthe Compute aids | mEENPD] computer stays
numbers 2 and 6, 2ands, the resus (utp. utp torture use. | $
FIGURE 1-6
w
The information
processing cycle.
» Output—presei
1 the results.
» Storage—saving data, programs, or output for future use
For example, assume that you have a computer that has been programmed to add two
numbers. As shown in Figure 1-6, input occurs when data (in this example, the numbers 2
and 5) is entered into the computer, processing takes place when the computer program
adds those two numbers, and output happens when the sum of 7 is displayed on the com-
puter screen, The storage operation occurs any time the data, a change toa program, or the
output is saved for future use.
For an additional example, look at a supermarket barcode reader to see how it fits this
‘definition of a computer. First, the grocery item being purchased is passed over the bar-
code reader—input. Next, the description and price ofthe item are looked up—processing.
‘Then, the item description and price are displayed on the cash register and printed on the
receipt—output. Finally, the inventory, ordering, and sales records are updated—storage.
This progression of input, processing, output, and storage is sometimes referred to as
the JPOS excle or the information processing cycle. In addition to these four primary com-
puter operations, today's computers almost always perform communications functions, such
4s sending or retrieving data via the Intemet, accessing information located in a shared com-
pany database, or exchanging data or e-mail messages with others. Therefore, communica-
tions—technically an input or output operation, depending on which direction the information
is going—is often considered the fifth primary computer operation.
Data vs. Information
As just discussed, a user inputs data into a computer, and then the computer processes it
‘Almost any kind of factor set of facts can become computer data, such as the words in a
letter toa fiend, the numbers in a monthly budget the images in a photograph, the notes in
‘song, or the facts stored in an employee record. When data is processed into a meaningful
form, it becomes information.
the results of processing; can also refer othe results themselves, >Storage. The operation of saving dats,
Output. The process of pres
‘Communications. The transmission of data from one device to another. >Data. Raw, unorganized facts.
Programs or output for future use.
Information, Data that has been processed into a meaningful form.
Scanned with CamScannerace Some
inTropuction
= Se
Sgro Rob Bredow, CTO, Sony Pictures Imageworks
‘What position might a college student
graduating with a computer degree qualify for
at Sony Pictures Imageworks?
We employ a number of talented engineers (typically
computer science or computer engineering majors)
at Sony Pictures Imageworks whose specialties
range from developing completely new computer
graphics techniques to focusing on our high perfor-
mance networking and disk configurations. A recent
graduate with experience in computer graphics
rendering might, for example, help write shaders to
simulate the lighting in the surface of a new challeng-
ing material ike skin or cloth used for both animated
and live-action films. We recently hired an engineer
‘who first joined us as an intern and, because of her
‘enthusiastic attitude and technica! abilities, is now on
the front lines of our Linux support team deploying
new hardware and supporting artists working on our
films. In summary, a great attitude—along with strong
‘computer, math, and engineering skils—are qualities
‘we love to see in our technology teams at Sony
Pictures Imageworks.
Information is frequently generated 1
answer some iype of question, Such as hoy,
staurant’s employees work less than
many of are
sa hours per week, How muny Seats Bre avail
apie on a particular Might from Los Angeles tg
San Francisco, of what is Hank Aaron's lifetine
home run total. OF course, you don't need g
ompater system t0 process data into informa
Jon, for example, anyone can go through time
ards or employee files and make alist of peo.
ple who work a certain number of hours this
ork is done by hand, however, it could take
ft lot of time, especially for a company with a
Tange number of employees. Computers, ho
‘ever, can perform such tasks almost instantly
swith accurate results. Information processing
he conversion of data into information) is a
vital activity today for all computer users, as
‘well as for businesses and other organizations.
Computers Then and Now
“The basic ideas of computing and calculating
are very old, going back thousands of years
However, the computer in the form in which itis
recognized today is a fairly recent invention. In
fact, personal computers have only been around
since the late 1970s. The history of computers
is often referred to in terms of generations, with
each new generation characterized by a major
technological development. The next sections
summarize some early calculating devices and
the different computer generations.
Precomputers and Early Computers (before approximately 1946)
Based on archeological finds, such as notched bones, knotted t
ine, and hieroglyph
ies, experts have concluded that ancient civilizations had the ability to count and com
pute. The abacus is considered by many to be the earliest recorded calculating device:
jt was used primarily as an aid for basic arithmetic calculations, Other early comp
devices include the slide rule, the mechanical calculator, and Dr. Herman Hollerth’s
Punch Card Tabulating Machine and Sorter. Ths later device (see Figure 1-7) was the
first electromechanical machine that could read punch cards—special cards with holes
punched in them to represent data. Hollerith’s machine was used to s the 1890 US.
Census data and it was able to complete the task in two and one half years instead Of
the decade it usually took to process the data manually. Consequently. in fe considered
to be the first successful case ofan information processing systen’y a sig 0 pape
and-pen-based system, Hollerith’s company eventually eee replacing a La
Machines (IBM). International Busine
irst-Generation Computers (approximately 19,
‘The first computers were enormous, offen taking up eee eo
by thousands of vacuum 1ubes—glass tubes that
ceded replacing constantly, required a great d
First-generation computers could solve only one problem at .
be physically rewired with cables to be reprogrammed (aes ry. tM’ because they needed
several days (sometimes even weeks) t0 complete ang ser ly wet
sever before
Ty wely 1846-1957)
uP tie rooms. They were power!
{29% similar to large ght butbs—ieh
electricity, and generated a lot of best
ture 1-7), which typi
all more days to che
Scanned with CamScannerthe computer could be used. Usually paper
punch cards and paper tape were used for
input, and output was printed on paper.
‘Two of the most significant examples
‘of first-generation computers were ENIAC
and UNIVAC. ENIAC, shown in Figure 1-7,
way the World's first large-scale, general=
purpose computer. Although it was not com=
pleted until 1946, ENIAC was developed
ring World War IL to compute artllery=
firing tables for the U.S. Army. Instead of
the 40 hours required for a person to com-
pute the optimal settings fora single weapon
under a single set of conditions using man-
vial calculations, ENIAC could complete the
same calculations in less than two minutes.
UNIVAC, released in 1951, was initially
built for the U.S. Census Bureau and was
in the 1952 US. pres-
Interestingly, its correct
Eisenhower victory only
45 minutes after the polls closed was not
publicly aired because the results were not
‘rusted, However, UNIVAC became the first
computer to be mass produced for general
commercial use.
Second-Generation Computers
(approximately 1958-1963)
‘The second generation of computers began
when the sransistor—a small device made
of semiconductor material that acts like
& switch to open or close electronic cir-
‘uits—started to replace the vacuum tube
Transistors allowed _second-generation
computers to be smaller, less expensive,
‘more powerful, more energy-efficient, and
more reliable than first-generation com-
puters. Typically, programs and data were
input on punch eards and magnetic tape,
‘output was on punch cards and paper print
cots, and magnetic tape (see Figure 1-7)
was used for storage. Hard drives and pro-
gramming languages (such as FORTRAN
and COBOL) were developed and imple-
‘mented during this generation
CHAPTER 1 iNTROD!
PRECOMPUTERS AND EARLY COMPUTERS
Dr. Herman Holrit’s Punch Card Tabuatng
Machine and Sorter isan example ofan early
computing device. twas used to process
the 1890 US. Census data
‘SECOND-GENERATION COMPUTERS
‘Second: generation computers, such as
the IBM 1401 mainframe shown here,
sed transistors instead of vacuum
‘tubes so they were smaller, faster,
‘and more reliable than first-generation
‘computers.
-FOURTH-GENERATION COMPUTERS
Fourth-generation computers, such as
the criginal BM PC show here, are
‘based on microprocessors. Most of
today’s computers fal into tis catogry
Third-Generation Computers (approximately 1964-1970)
The
the third
electronic circuits on a single
‘even smaller and more reliable than comput
of punch
rds and paper printouts, keyboards and monitors we
lr drives sere typically used for storage. An example of a widely used third-
computer is shown in Figure 1-7.
Jacement of the transistor with integrated circuits (ICs) marked the beginning of
eration of computers. Integrated circuits incorporate many transistors and
ny silicon chip, allowing third-generation computers to be
in the earlier computer generations,
roduced for in
UCTION TO THE WORLO OF comPuUTERS
2
FIRST-GENERATION COMPUTERS.
Frst-generaton computers, suchas EMAC
shown hee, were large and bly, used
vacuum tubes, and had tobe physically wired
and reset to run programs,
THIRD-GENERATION COMPUTERS
‘Third-generation computers used integrated
circuits, which allowed the introduction of
‘smaller computers such asthe IBM System
360 mainframe shown here.
FIFTH-GENERATION COMPUTERS
Some aspects of ith-generaton computers,
such as the natural language input and artfcial
inteligence used by the IBM Watson computer
shown competing on Jeopardythere already exist. 5
nny Capt res Caen US dr Care Capon
IGURE 1-7.
A brief look
at computer
generations.
o
Instead
put and
Scanned with CamScanner
QOINT14 INTRODUCTION
For a more detailed timeline i
regarding the development of
‘computers, se the “Computer
History Timeline” located in
the Roterences and Resources
Guido at tho end of thi book.
and the Internet,
Fourth-Generation Computers (aP
A technological breakthroug! ly
umber of transistors on a single ¢h
cessor in 1971, which ushered in the fot
nlerprocenor contain the core procesing canst ple Alacintosh compute,
single chip. The origi
and most of today's traditional compute!
computers typically use a keyboard
output, and hard drives, flash memory me
cration also witnessed the development of
ly 1971-present)
Pere made it possible to place an increas,
in the early ee red 10 the invention of the micropro.
Frreeneration of computers. In essence, g
Aa pa ilities of an entire computer on one
proximate!
IBM PC (see sgory. Fourth-generation
monitor and printer for
.cs for storage. This gen.
dia, and optical dis
rs, fall into this cate’
‘and mouse for input.
d the future)
- an
Fifth-Generation Computers (now the tps that re based on ari
Fifii-generation computers are most commonly
cial intelligence, allowing them to think, reason. 3
‘Some aspects of fifth-gener
recognition—are being used today. In the future,
to be constructed differently than they are today,
that process data using light instead of electrons.
‘ogy, of as entire general-purpose computers buil
everyday de
Hardware
FIGURE
Common hardware
listed by operation.
INPUT PROCESSING
_cPu
output
ridieplay
Mouse
Microphone
Printer
Digital Speakers
penfatyus
STORAGE
___Data pe
Touch padiouch sreen
Gaming controler —_
Fingerprint vender
communications
Modem oo
“Network adapter _
Router
USB Hash drive
ind learn (see one example in Figure 1-7).
+h as voice and touch input and speech
ifth-generation computers are expected
‘such as in the form of optical computers
ny computers that utilize nanotechnol-
19 desks, home appliances, and other
‘computers—suc
‘The physical parts of a computer (the parts you can touch and discussed next) are called
hardware. The instructions or programs used
ith a computer—called software—sate
discussed shortly. Hardware components can be internal (located
inside the main box or system unit of the computer) of external
(located outside the system unit and connected to the system
reless connection). There are hardware
devices associated with each of the five computer operations
previously discussed (input, processing, output, storage, and
Sommunieations), as summarized in Figure 1-8 and illustrat
in Figure 1-9.
Input Devices
Av inpur device is any pice of equipment that is used t0 inp
2a othe computer. The input devices shown in Figure 93
incom aaeios,Oe coon np
pad eh cl mers. distal pens and tases.
fers. Input doves ce tse ePrtt readers, and gaming coo
iscussed in more detail in Chapter 4.
Processing Devices
The main processing devi
performs the calculating oq.) /eated inside the system unit 34
ms and comparisons needed for process
> Hardware. The physical parts ofa computer syste
such asthe keyboard, monitor, printer, and eo torn
Scanned with CamScanner(CHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 15
FLASHMEMORY DVD DRIVE HARD DRIVE ‘SYSTEM UNIT MONITOR PRINTER
CARDREADER Reads and Laeatdinsitethe—Caeatcatane be CU,menany, Les youser your Proaes pine
feossandwrtes | wries CD and systemunt stores | powersuply, tape devces and work oso go; the copies of eamputer
flash memory cards. OVD discs. programs and most data. all other internal hardware. primary output device. output. J
z
ororHone | | 2)
capases :
spoken >
input Gi f=" T
! :
ff
rams | H
Prost aca f nomea FF
aut Comers devices sothey
+, canshare an internet aly
4, \_ connection and data BEE
usa Ponts ie
Comet ete @. ;
. one za
cess Comers theconputr FF
interface. tote tenet. ie
Hy
KEYBOARD COANDDVDDIScS MOUSE FLASH MEMORY CARDS sa FLASH oAIVE fe
Used ote Usedto deve pogams Used tomate on. eed se otal pts, Uesossecrimens fF
intuctonsintothe andlor ge screenslezions: muse fe, ard ber cote Gil poo, mst les ana = 2
cmoeraninay ufone, oar Wot Otero temovel
lpi ee sever fromerePCtoarater 332
FIGURE 1-9
itso controls the computer's operations. For thee reasons, the CPU soften considered" Wes computer
ardware,
the “brain” of the computer. Also involved in processing are various types of memory that
are located inside the system unit and used to store data and instructions while the CPU is
working with them, as well as additional processors such as the graphics processing unit
(GPU). The CPU, GPU, memory, and processing are discussed in detail in Chapter 2.
Output Devices
An ouiput device accepts processed data from the computer and presents the results
to the user, most of the time on the display screen (monitor), on paper (via a printer),
or through a speaker. Other common output devices include headphones and headsets
(used to deliver audio output to a single user) and data projectors (used to project com-
puter images onto a projection screen). Output devices are covered in more detail in
Chapter 4
Storage Devices
Storage devices (such as DVD drives and flash memory card readers) are used to
store data on of access data from storage media (such as DVD discs and flash memory
cards). Some storage hardware (such as a hard drive ot a USB flash drive) includes
ih a storage device and storage medium in a single piece of hardware. Storage
Vices are used to save data, program seltings, or output for future use; they can
be installed inside the computer, attached to the computer as an external device, or
accessed remotely through a network or wireless connection. Storage is discussed in
n Chapter 3,
Scanned with CamScanner16 intropuction
Communications Devices oe
ae T ie Pa Internet or a home, _ M, Sachin comput
vork, Communications hardware includes m¢ eee
tt ces (ted euita seal eee ot set ri og
connection and data). A variety of modems and network a eee idem used to connect
< ia of ynnections— ce
ardent pec nrc and network em
ines ned eless connection and that also contains a built-in wireless route,
inst merece munications hardware and computer networks = discussed
il in Chapter 7; connecting to the Internet is covered in Chapt
ate electronically with others ang yy
eel refers to the programs of instructions used to tell the computer hand.
RR what to do. Software is wadtionally purchased on a CD or DVD ot is downloaded
{om the Intemet: in ether case, the software typically needs to be installed on a computer
before it can be used. Software can also be run directly from the Internet (via Web Pages)
without being installed on your computer; this is referred to as cloud software, Web-based
Software, Software as a Service (SaaS), and cloud computing and is discussed in more
detail in Chapter 6,
Fae use two basic types of software system software and application software
The differences between these types of software are discussed next.
‘System Software
The programs that allow a computer to ope
ware. The main system software is the oper:
controls its operation. Common operatin;
allowi
Tale are collectively referred to as system sofi-
ating system, which starts up the computer and
i system tasks include setting up new hardware,
ig users {0 run other software, and allowing users to Manage the documents stored
on their computers. Without an operating system, 4 computer cannot function. Common
desktop operating systems designed for personal
: : Somputers are Windows, Mac OS, and
‘Limes: these and other operating systems (such ay Android, iOS, and other mobile operat-
Cie sestems used with mobile phones and other mobite in detail i
ix Naren ted with mobile phones and other mobile devices) are discussed in detail in
To use a computer, first turn o:
nthe power to
button, and then the computer will begs ne boot, Dene by pressing the pone
the computer's operating system is loaded imto memory, the eomoy eee Pat of
sliggnostic of itself, and then it launches any progam hs COMPuIEr does a quick
Gzsitnated to run each time the computer si Up. You mah #8 Security software —
cy ‘00g on 0 your computer ora computer nc toting supply a pasword
Whee ri ene Most evar tag ans Come pat Be usd and wag oe rece
Widows 8 not inte the that are selected withthe mouse gos eee Objects (Such ag jay np from the usr.
a sre neees (the basic workspace for at 10 do. F Puter that suppor
lo
: computers running th ¢ Windows desktoj
ace ase Place where documents, folders, Programs, and. y
S Operating system, th
being used), along with some cot Mother objec feet: that is, the
- 8 MMO graph; m S are dis I y are
Software programs, is shown in Figure lige ORI sea in Win ded When they are
‘indows and many other
instance, th
hon
> Operatis
ter. > 'SOUrCES in
Wins deshop. he pea et eeriteee 9 system. The min
SUE Work area get” ication
onthe screen
Scanned with CamScanner(CHAPTER 1 INTRODUCTION To THE WoRLD OF COMPUTERS.
7
ToOwAR Icons. wanoows DIALOG Box
Contans butions Represent oder, Rectangular areas containing Displayed when needed to
cr cons tat ean documents, or other programs, documents or oter
bewsedto sue ems tat Can Be data. The active window the S
commands. opened ne crrenty beng used,
re
START SCREEN NOTIFICATION AREA
THUMBNAIL Represent programs Carespondo open windows; Shows he cock and
‘pens he Stat thatcanbe opened canbeused preview ater ideas.
‘screen thatis directly from the ‘thumbnails of open windows Eee...
eed tolounch taskbar. aswellas to change the The Windows
programs active window. desktop.
Application Software
Application software (sce Figure 1-11) consists of programs designed to allow people to
perform specific tasks using a computer, such as creating letters, preparing budgets, manag-
ing inventory and customer databases, playing games, watching videos, listening to music,
scheduling appointments, eiting digital photographs, designing homes, viewing Web pases,
burning DVDs, and exchanging e-mail. Application software is launched via the operating Appization sofware programs are
system. such as by using the Windows Start screen for Windows 8 computers (or the Windows ics aide age
Start menu for older versions of Windows), and is discussed in greater detail in Chapter 6.
‘There are also application programs that help users write their own programs in a form
the computer can understand using a programming language like BASIC, Visual Basic,
COBOL, C++, Java, or Python. Some languages are traditional programming languages
for developing applications; others are designed for use with Web pages or multimedia
programming. Markup and scripting languages (such as HTML, XHTML, and JavaScript)
tused to ereate Web pages are covered in Chapter 10; traditional programming languages
are discussed in detail in Chapter 13.
Computer Users and Professionals
In addition to hardware, software, data, and procedures (the predetermined steps to be
carried out in particular situations), a computer system includes people. Computer users,
‘or end users, are the people who use computers to perform tasks or obtain information
Application software. Programs that enable users to perform specific tasks on a computer, such as writing letters or playing games; also
called opps.
Scanned with CamScanner18 INTRODUCTION
FitMWarcu Division = 2
MARKETING PLAN 2016 :
tueeeeteetescat ¢y
WORD PROCESSING PROGRAMS
‘ow users to create written documents,
‘such as reports, letter, and memos.
E-MAIL PROGRAMS
wee BROWSERS — ‘low users to compose, send, receive, and manage electronic
fa users view Web pages and messages; some aso include calendars, to-do st, and
+ information located on ther eaues
| FIGURE 1-11
® Ezamples of
spatication
software. Anyone who uss compute isa computer wes nciing an aeeountant electronical
aiming clon taxes, a fc worker Sing a werd proessing progr aa
eien a supervisor sing a computer to check and see whether oF not smanufactoning
soccer ave met the day’s quotas, a. parent e-mailing his or her child's teacher 2)
oven researching atopic online, a doctor updating a patient's electronic medical
sant playing a computer game, and a person shopping ontine,
reyes. onthe oer Rand, are computer professionals who write the progres
that computers use. Other computer professionals include systems analysts (8H sl
einputer system 10 be used within their companies as discussed in Chapter 12) com
pur operations personnel wo are responsible for the day-to-day eomputet operate
ria company, such as maintaining systems or troubleshooting user-related problems
atti apecalss (who are responsible for securing the eompany computers 24
se fast hackers and ober intders who are diseussed in ors detail in CO
Computer professionals ae discussed in more detail in Chapter 12 eae
Scanned with CamScannerCHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 19
COMPUTERS TO FIT EVERY NEED
The types of computers available today vary from the tiny computers embedded in con-
sumer products, t0 the mobile devices that do a limited number of computing tasks, to the
powerful and versatile desktop and portable computers found in homes and businesses, 10
the superpowerful computers used to control the country's defense systems. Computers are
generally classified in one of six categories, based on size, capability, and price.
Embedded computers—tiny computers embedded into products to perform speci
functions or tasks for that product,
» Mobile devi
contain bui
mobile phones, small tablets, and other small personal devices that
in computing o Internet capabilities.
» Personal computers—fully functioning portabl
designed to be used by a s
or desktop computers that are
ingle individual ata time,
» Servers—computers that host data and programs available to a small group of users.
» Mainframe computers—powerful computers used to host a large amount of data and
programs available to a wide group of users.
» Supercomputers—extremely powerful computers used for complex computations,
and processing.
In practice, classifying a computer into one of these six categories is not always easy
or straightforward. For example, some high-end personal computers today are as powerful
as servers, and some personal computers today are the size of a mobile phone or smaller gy FIGURE 1-12
(see the Trend box). In addition, new trends impact the categories. For example, small \” Embedded
tablet devices (often called mobile tablets, media tablets, ot just tablets) are typi computers, This car's
sidered mobile devices because they are only slightly larger than a mobile phone, are typi- embedded computers
cally used primarily for viewing Web content and displaying multimedia content instead of control numerous
encral-purpose computing, and usually run a mobile operating system. However, larger, features, such as
‘more powerful tablet computers running a desktop operating system are typically consid- _notilying the driver
«red personal computers. So even though the distinction between some of the categories whon a car onters his
(Particularly mobile devices and personal computers) is blurring, these six categories are
commonly used today to refer to groups of computers designed for
similar purpose
or her blind spot.
Embedded Computers
An embedded computer is a tiny computer embedded into a product
esigned to perform specific tasks or functions for that product, For
cxample, computers are often embedded into household appliances
(such as dishwashers, microwaves, ovens, coffeemakers, and so forth),
4s well as into other everyday objects (such as thermostats, answer.
‘ng machines, treadmills, sewing machines, DVD players, and televi-
“0n5) to help those appliances and objects perform their designated
sts. Typically, ears also use many embedded computers to assist
Wc: 19 notiy the ser of important conditions (such as
‘inflated tire or an oil filter that needs changing), to control the
1 its stg and ter safety devices (uch as camera that ay ACACIA dere
«tl ig and irr dees
“sstashiceisin sore ind spot—see Figue I12-er ages man ies
Alightincicates that a
‘moving vehicle isin the
‘river's blind spot.
“ed compute
Scanned with CamScanner20 INTRODUCTION
Tiny PCs,
Computers have shrunk again, Forget tiny notebooks or even
media tablets if you want portabilty—today’s newest tiny PCs
aro the sizo of a USB flash driv
Some of these new computers actually do look just like a
USB flash drive; others are just a small circuit board, some-
sn HOTV via its builtin HDMI and USB
1 computer oF 2
to snathes oom via USB or Bluetooth, and to the
ports, to peripheral devices
internet via WiFi.
tere remit of ese devices and the apps that can be sed
witn inom vary from device 19 device, based on the operating
wan on ah
om na nt cpa
Grave wth a USB port typically support USB flash dives or
(arg genes for additional storage if needed), But for turing a
Fy at any location into your own personal computer, gaming
dence, or video player tiny PCs are definitely the way t0.go,
times enclosed in a case. Whatever their appearance, the idea
is similar—you connect them to a display device and an input
device (if needed) and you are good to go.
‘These emerging tiny PCs are designed to connect in differ-
cent ways and have different capabilities. For example, Google's
Chromecast (shown in the accompanying photo) plugs directly
into an HDTV using its built-in HMDI connector. After connect-
jing Chromecast, you can stream online content (such as videos, FF
movies, and music) via Wi-Fi from your smartphone, tablet, or a
laptop to that HDTV. The Raspberry Pi tiny PC can connect
to an HOTV via HDMI, as well as to a standard TV via RCA »
jacks. Instead of being used in conjunction with another device
like Chromecast, however, the Raspberry Pi is a stand-alone -
‘computer that can be used with USB input devices (such as chromecast oe
‘a keyboard and mouse) and connects to the Internet via an for
§
z
| ;
Ethernet port. Another tiny stand-alone PG is the Cstick Cotton 5 Sg 8}
Candy. This device, the size of a USB flash drive, can connect
auto braking systems that engage when a front collision is imminent, as discussed in tht
Chapter 5 Technology and You box), to facilitate the car's navigational or entertainmett
systems, and to help the driver perform tasks, Embedded computers are designed fr
i tasks and specific products and so cannot be used as general-purpose computers.
7
Mote than half of all US. adults
ccany a0 Intemetenabled mabile
thom to provide
‘cous while on the G0.
Mobile Devices
‘A mobile device is loosely : :
‘ery small (ypically pocket-sized) device that
ee eal 7 tpicaly be wa omake telephone calls, send ext messages (short text
ITV atone, and eecess clear a ee pe) 8 downoad and play mus 9S
that include computing and Inemet capatatieg en Peductivty features. Mobile ree
setnones (cs capable noble pats eh asthe one in Figure 1-13) ae
Handld gaming devices (sich asthe Newey attimes referred. to as feature ph,
asthe iPod Touch), smart yates. and other 05) Portable digital media players
Sina bercfoned ost dance ae sed nae ere ca
- s!y mentioned, media tablets (sich 3"
sess acai aac ea acne wn Somes ao ema
hone, ee
es - A mobile device based on a Lee
iy larger than a ‘smartphone, that is 14
E be
smartphones that can
aie9 function as smal tablets
times referred 10 38
~ mobile device. A very small dovice that has built-in computing o Internet caput, > Sma
thutiochades internat capabilities and can run mobile apps. > Media tablet. & mobile deve
toed to accezs the Intemet and display mutimedia content. *.
Scanned with CamScannerCHAPTER 1 INTRODUCTION TO THE WORLD OF compuTERS
‘one shown in Figure 1-13) designed for Web browsing. playing mov-
ies and other multimedia content, gaming, and similar activities are
alvo typically considered mobile devices. Mobile devices are almost
always powered by a rechargeable battery system and typically
include wireless connectivity to enable the device to connect toa wire-
less hotspot or toa cellular provider for Internet access.
‘asday's mobile devices typically have small sereens and some,
but not all, have keyboards, Because of this, mobile devices are most
appropriate for individuals wanting continual access to e-mail, brief
checks of Web content (such as doing a quick Web search, check-
ing movie times oF weather forecasts, looking up driving directions,
or getting updates from Web sites like Facebook), and music eollee-
jons rather than for those individuals wanting general Web browsing
an computing capabilities. This is beginning to change, however,
as mobile devices continue to grow in capabilites, as wireless com-
munications continue to become faster, and as mobile input options
(uch as voice and touch input, and mobile keyboards) continue 10
improve. For instance, many mobile devices can perform Internet
searches and other tasks via voice commands, some ean be used 0
pay for purchases while you are on the go, many can view virally any Web content, and
some can view and edit documents stored in a common format, such as Microsoft Office docu-
a
@ INT
‘SMARTPHONES MEDIA TABLETS
gy FIGURE 1-12
Mobile devices.
‘ments. For a look at how tech clothing can be used to organize your mobile devices while you
are on the go, see the Inside the Industry box.
Personal Computers (PCs)
A personal computer (PC) or microcomputer is a small computer designed to be
used by one person at a time, Personal computers are widely used by individuals and
businesses today and are available in a variety of shapes and sizes, as discussed next.
For tips on buying a personal
‘computer, se the "Guide to Buying
aPC" inthe References and
Resources Guide located at the end
‘ofthis book.
Internet, securing those devices against computer viuses and hackers~as introduced later inthis
chapter and d'scussed in detain Chapter ©—is essential for both individuals and businesses,
Desktop Computers
Conventional personal computers that
ae designed 1 it on or next 1 a desk
jgure I-14) are often referred to
as desktop computers. Desktop com
puters can use a tower ease (designed
to sit vertically, typically onthe floor),
«desktop case (esigned to be placed
Novizontally on a desk's surface), oF
sv allin-one ease (signed to incor:
the monitor and system unit
insle piece of hardware).
y FIGURES
Desktop computers.
computer (PC)./ ype of computer based on a microprocessor and designed 1o be used by one person at a time; aso called 8
ccrmputer. > Desktop computer. A personal computer designed to ft on or next toa desk
Scanned with CamScanner22 intRopuction
Tech Clothing
‘The extreme popularity of mobile phones, portable digital media
players, media tablets, and other mobile devices has led to the
need to easily and securely carry these devices with you while
fon the go. While a single device can typically just go in your
pocket, individuals carrying multiple devices may find it easier to
use fech clothing.
Similar to the way many backpacks today have builtin pockets
for portable digital media players along with internal channels to
run earbud cords, clothing manufacturers are increasingly design-
ing products with mobile devices in mind, such as including clear
pouches for storing and using dovices while on the go. The jacket
shown in the accompanying illustration goes a step further—it has
24 pockets, including some clear pockets to hold devices as they
‘are being used and a pocket large enough to hold an iPad, as well as
‘a wire management system to organize earbuds and other cords. To
Use this jacket, first put your devices in the appropriate pockets and
then run your cables through the appropriate internal channels—
the devices then can be used in the normal fashion. Other items,
‘such as keys, a wallet, a digital camera, or aiine tickets, can also be
‘stored securely in a pocket. In addition to just helping you carry your
devices, using a tech jacket or vest also has additional advantages.
For instance, your devices cannot be accidentally dropped and they
wearing the garment.
mm thieves as long as you are wearing t =
BF Sale oa toch garment can simplify YOU atport secur,
forgetting items atthe
fxpatienee and prevent you fom losing
srry checkpoint becouse you can jut take ofthe gament nd
are zaminod as a single item. So, with tech clothing, at eatin
the area of mobie devices, you can take it with you.
Desktop computer systems typically cost between $300 and $1,500 and usually coo
form to one of two standards or plarforms: PC-compatible or Mac. PC-compatible compu
RON Teas
= Information Officer, Jack in the Box Inc.
Inthe box
purcl
2 The techn
hurdles, primarily the a
cell phone provi
Michael Verdesca, Vice President and Chief
How long will it be until paying for fast-food
‘hases by mobile phone is the norm?
‘ology exists today to allow for the pay-
ment of fast-food purchases by mobile phone and
it's being used in Europe and Japan. Though its
being tested in the United States, there are still some
.doption of the technology by
iders and retailers, and consumers’
willingness to use it. Another hurdle is consumers’
‘concerns about the technology being secure. It will
likely be a fow years before there is widespread use,
ers (sometimes referred to as Windows PCS 0
IBM-compatible PCs) evolved from the origi!
IBM PC—ihe first personal computer widel
accepted for business use. They are made by
companies such as Dell, Hewlett-Packarl.
NEC, Acer, Lenovo, Fujitsu, and Gateway 2%!
{ypically nin the Microsoft Windows ope
8 system, although some run an alteratie
‘operating system (such as Linux). Mac 60
Duters are made by Apple and use the Mae OS
‘operating system, Windows, Linux, and Me
‘Computers all use different software. Althov'
PC-compatible computers are by far the me
widely used in the United States, the Mae
{rationally the computer of choice for a
cofeners, and others who requite advan!
Eraphics capabilities. Extra powerful de
ears designed for computer users rui®=
SRPAIGS, music, film, architecture,
ther powerful applications are somet"™
referred t0.a8 workstations.
Scanned with CamScannerCHAPTER 1 INTRODUCTION TO THE WORLO OF COMPUTERS 23
QINT
NOTEBOOKS HYBRID NOTEBOOK-TABLETS
5 FIGURE 1-15
Portable computers.
Portable Computers
Portable computers are Fly functioning computer designed to he cried ound eas
il. This ponitiy makes them ery eb They canbe sed t home o in the of
they ean so be wea schol, while on vacation at elf te mestings, and ee lo
lots Like motile devises, potable computers ae designed be powered) recharge
ae tates they canbe wed while onthe go. While portable computers xen
for many workers such 3s salespeople who need to make presentations ore ede
fom into agents who need io collet data tenis lection, and anager
‘who ee computing and communications nsoures as they travel thy ae pial le
the computer of choice today for stuns and for indvieals ying anew home cone
puter. Teac. porable computers now outsell dskop computes in the United Sts. Tena eect onset
Portable computers are stale in varety of configurations. asUseused nat and ee
stown in gue 13
+ Notebook computers (aso called laptop computers) are about the sizeof a
Paper notebook and open to reveal a seen onthe top half ofthe computer and a
Keyboard on the bottom, They are typically comparable to deskiop compte
features and capabilites, Very thin and very ight notebooks are often referred to 38
subnotebooks or ultraportable; ultraportables conforming to Intel's standards can ‘Computers that allow pen or touch
inputmaich as tbl computre~are
bbe marketed as Ultrabooks.
Conveniont in crowded situations, as,
» Tablet computers are typically about the size of « notebook computer and are designed wal asin places whore the clicking
to be used with a digital pen/stylus or touch input. Unlike notebooks, they don’t have ofa hatsand Would eamayieg
a physical keyboard but they typically can use an on-screen or attached keyboard as eben
needed.
» Hybrid notebook-tablet computers (also called convertible tablets) can funetion as
cither a notebook or a tablet computer. Some (such as the one in Figure I-15) have a
display screen that folds shut to resemble a tablet; others are designed to separate the
Netbooks are similar to notebook computers but are smaller and hi
features, such as relying on cloud software and extemal DVD drives.
Portable computers (typically
ze that while a portable computer offers the convenience Of —gotbooks) that un the Chron
mobility, it typically isn’t as comfortable to use for a primary home or work computer (pareieg Grain a ther o
ss desktop computer is, without additional hardware, For instance, many individu- to os Cleoristcons,
ial monitor, keyboard, and
\ it more convenient to connect and use a conver
le computer, A em perzonal computer, such asa notebook or tablet, that is designed tobe cared around easy,
"Potebook computer. ful functioning portable computer that opens to reves a screen and keyboard; also called a laptop computer.
Computer about the sie ofa notebook thats designed to be utod with a digital pen. > Hybrid notebook-tablet
\esgned to function as both a ntabook anda tablat PC. >Netbook. A computer that i smaller and has move
18 than a notebook computer
fot computer. A por.
Scanned with CamScanner