Mainframe Computer

Total Page:16

File Type:pdf, Size:1020Kb

Mainframe Computer C Programming For Problem Solving Course Code :18CPS13/23 Semester :I/II CIE Marks :40 SEE Marks : 60 Prepared By Muzammil Dakhani Department of Computer Science Engineering ZEROETH GENERATION • Man used his fingers, ropes, beads, bones, pebbles and other objects for counting. • Abacus, Pascaline, Difference & Anylitical engines • Electricity was not yet invented FIRST GENERATION 1951 – 1958: The Vacuum Tube • The first generation of computers, characterized by vacuum tubes, started in 1951 with the creation of - UNIVAC (Universal Automatic Computer) – a tabulating machine which won the contest for the fastest machine which could count the US 1890 census. • The first computers used vacuum tubes for circuitry and magnetic drums for memory. • They were often enormous and taking up entire room. • First generation computers relied on machine language. • They were very expensive to operate and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions. The UNIVAC and ENIAC computers are examples of first- generation computing devices. VACUUM TUBES – electronic tubes about the size of light bulbs. Second generation computers (1956-1963) : The Transistor The year 1959 marked the invention of transistors, which characterized the second generation of computers. TRANSISTOR – was a three-legged component which shrunk the size of the first generation computers. Occupied only 1/100th of the space occupied by a vacuum tube More reliable, had greater computational speed, required no warm-up time and consumed far less electricity. • Transistors replaced vacuum tubes and ushered in the second generation of computers. • Second-generation computers moved from cryptic binary machine language to symbolic. • High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN. • These were also the first computers that stored their instructions in their memory. THIRD GENERATION : The Integrated Circuit (1964-1971) Third generation computers arose in 1964 with the invention of smaller electronic circuits called integrated circuits (IC’S) INTEGRATED CIRCUITS – are square silicon chips containing circuitry that can perform the functions of hundreds of transistors. • The development of the integrated circuit was the hallmark of the third generation of computers. • Transistors were miniaturized and placed on siliconchips, called semiconductors. • Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system. • Allowed the device to run many different applications at one time. ADVANTAGES • RELIABILITY – Unlike vacuum tubes, silicon will not break down easily. It is very seldom that you will have to replace it. • LOW COST – Silicon chips are relatively cheap because of their small size and availability in the market. It also consumes less electricity. Fourth generation computers (1971-present): The Microprocessor • The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. • The Intel 4004 chip, developed in 1971, located all the components of the computer. • From the central processing unit and memory to input/output controls—on a single chip. • Fourth generation computers also saw the development of GUIs, the mouse and handheld devices. • Marked by the use of microprocessor • MICROPROCESSOR – is a silicon chip that contains the CPU – part of the computer where all processing takes place. 4004 chip – was the first microprocessor introduced by Intel Corporation. Fifth generation computers (present and beyond) • is classified as fourth generation computers. • faster, more powerful, tremendous data storage and processing capacity • new brands and models would come out the market almost every other month. • many clones or imitations of the IBM have become even more powerful and a lot cheaper. • Fifth generation computing devices, based on artificial intelligence. • Are still in development, though there are some applications, such as voice recognition. • The use of parallel processing and superconductors is helping to make artificial intelligence a reality. • The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization. • computers became more affordable • computers can now be found in homes, schools, offices etc. • there has been a tremendous improvement in software technology. • different software applications to choose from: word processing, spreadsheets, database management, games and entertainment. • computer subjects are now being offered not just to college students but even to high school and elementary. • computers are now used as an aid in teaching math, science etc. Types of Computers • On the basis of configuration that is architecture, processing, power, size of main memory and other capabilities, computer can be divided in the following classes. • Super Computer • Mainframe Computer. • Mini Computer • Micro Computer. Super Computer These are the • Largest. • Fastest. • Expensive. • Can handle over 10,000 users. • Parallel Processing. USE OF SUPERCOMPUTER • Super computers are used for solving complex application such as Global Weather Forecasting. Creating graphic images, engineering design and testing, space exploration and other problems where it is necessary to process huge quantities of data quickly. • Cost: Several million dollars. • Speed: 60 billion instructions per second. • Size: Automobile Sized. Mainframe Computer • Mainframe computer is usually slower, less Powerful and less expensive than super Computer. • Mainframe computer can handle over hundreds of users . USE OF MAINFRAME COMPUTER • Mainframe Computer are useful for dealing with large over changing collection of data that are accessed by many users Simultaneously such as banks, airlines, railways. • Cost: Several hundred thousands dollars. • Speed: 250 million instructions per second. • Size: Refrigerator Sized. Mini Computer • Mini computers are lower to mainframe computers in terms of speed and storage capacity. They are also less expensive than mainframe computers. Some of the features of mainframes will not be available in mini computers. Hence, their performance also will be less than that of mainframes. USE OF MINI COMPUTER • Tele communications. • Cost: 25000 Dollars to Over 150,000 Dollars. • Speed: 150 million instruction per second • Size: Filling Cabinet size. Micro Computer • The invention of microprocessor (single chip CPU) gave birth to the much cheaper micro computers. They are further classified into • Personal Computers • Laptop Computers • Handheld Computers(PDAs) Personal Computer • They are usually easier to use and more affordable. They are normally intended for individual users for their word processing and other small application Requirements. • Desktop • Tower What is a bit? • Bit is short for 'binary digit.' It's a single digit in a binary number, and it can be either 1 or 0.Inside a computer, you can think of a bit as being a mechanical switch, which can be either switched on or off. • Now if you only have one of these switches, you can only store two different states, on or off. This is useful in itself, you can record that something is either true or false... • But if you have, say, eight of them, you can store 256 different combinations of on and off states between the eight switches. What is a byte? • A byte is 8 bits. That's the definition. With 8 bits you can store any number between 0 and 255, since there are 256 different combinations of 1 and 0 to choose from. • Why eight bits? The original intention was that, when storing text, 8 bits would be enough to assign a unique number every possible language character you might want to use in your document. The idea was that each character in a file would take up one byte of memory (in most cases, this is still true). • Let's see: there are 26 uppercase letters (A-Z), 26 lowercase (a-z), 10 numerical digits(0-9), 32 punctuation characters and other symbols on a US keyboard, the space character That's already 94 different characters. Then there's a few characters for creating newlines, a tab character for indentations, there's even a 'bell' character which programs would output in order to make the user's terminal beep. You can see how it all adds up What is a word? • You often hear about 32-bit or 64-bit computer architectures. A word is basically the number of bits a particular computer's CPU can deal with in one go. • It varies depending on the computer architecture you're using. Imagine looking at an imaginary computer's circuitry very closely. On a 32-bit machine, you would see 32 wires running parallel to each other between the computer's memory controller and the CPU, for the purpose of giving the CPU access to one particular word of memory. • Actually, there would be an additional 32 wires (perhaps less) for the CPU to select a particular memory address to access. If a CPU can access 32 bits of memory in one go, then it turns out that it makes a lot of sense to address the computer's memory using ≤32 bits. (This happens to be why the 32-bit version of Windows can't deal with more than 2GB of RAM, but the 64-bit version can.) Bits ,Bytes and Words Definitions • Bit = Binary digit = 0 or 1 • Byte = a sequence of 8 bits = 00000000, 00000001, ..., or 11111111 • Word = a sequence of N bits where N = 16, 32, 64 depending on
Recommended publications
  • ISSN: 2320-5407 Int. J. Adv. Res. 5(4), 422-426 RESEARCH ARTICLE
    ISSN: 2320-5407 Int. J. Adv. Res. 5(4), 422-426 Journal Homepage: - www.journalijar.com Article DOI: 10.21474/IJAR01/3826 DOI URL: http://dx.doi.org/10.21474/IJAR01/3826 RESEARCH ARTICLE CHALLENGING ISSUES IN OSI AND TCP/IP MODEL. Dr. J. VijiPriya, Samina and Zahida. College of Computer Science and Engineering, University of Hail, Saudi Arabia. …………………………………………………………………………………………………….... Manuscript Info Abstract ……………………. ……………………………………………………………… Manuscript History A computer network is a connection of network devices to data communication. Multiple networks are connected together to form an Received: 06 February 2017 internetwork. The challenges of Internetworking is interoperating Final Accepted: 05 March 2017 between products from different manufacturers requires consistent Published: April 2017 standards. Network reference models were developed to address these challenges. Two useful reference models are Open System Key words:- Interconnection (OSI) and Transmission Control Protocol and Internet OSI, TCP/IP, Data Communication, Protocol (TCP/IP) serve as protocol architecture details the Protocols, Layers, and Encapsulation communication between applications on network devices. This paper depicts the OSI and TCP/IP models, their issues and comparison of them. Copy Right, IJAR, 2017,. All rights reserved. …………………………………………………………………………………………………….... Introduction:- Network reference models are called protocol architecture in which task of communication can be broken into sub tasks. These tasks are organized into layers representing network services and functions. The layered protocols are rules that govern end-to-end communication between devices. Protocols on each layer will interact with protocols on the above and below layers of it that form a protocol suite or stack. The most established TCP/IP suite was developed by Department of Defence's Project Research Agency DARPA based on OSI suite to the foundation of Internet architecture.
    [Show full text]
  • RT-ROS: a Real-Time ROS Architecture on Multi-Core Processors
    Future Generation Computer Systems 56 (2016) 171–178 Contents lists available at ScienceDirect Future Generation Computer Systems journal homepage: www.elsevier.com/locate/fgcs RT-ROS: A real-time ROS architecture on multi-core processors Hongxing Wei a,1, Zhenzhou Shao b, Zhen Huang a, Renhai Chen d, Yong Guan b, Jindong Tan c,1, Zili Shao d,∗,1 a School of Mechanical Engineering and Automation, Beihang University, Beijing, 100191, PR China b College of Information Engineering, Capital Normal University, Beijing, 100048, PR China c Department of Mechanical, Aerospace, and Biomedical Engineering, The University of Tennessee, Knoxville, TN, 37996-2110, USA d Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China article info a b s t r a c t Article history: ROS, an open-source robot operating system, is widely used and rapidly developed in the robotics Received 6 February 2015 community. However, running on Linux, ROS does not provide real-time guarantees, while real-time tasks Received in revised form are required in many robot applications such as robot motion control. This paper for the first time presents 20 April 2015 a real-time ROS architecture called RT-RTOS on multi-core processors. RT-ROS provides an integrated Accepted 12 May 2015 real-time/non-real-time task execution environment so real-time and non-real-time ROS nodes can be Available online 9 June 2015 separately run on a real-time OS and Linux, respectively, with different processor cores. In such a way, real-time tasks can be supported by real-time ROS nodes on a real-time OS, while non-real-time ROS nodes Keywords: Real-time operating systems on Linux can provide other functions of ROS.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • Fedramp Master Acronym and Glossary Document
    FedRAMP Master Acronym and Glossary Version 1.6 07/23/2020 i​[email protected] fedramp.gov Master Acronyms and Glossary DOCUMENT REVISION HISTORY Date Version Page(s) Description Author 09/10/2015 1.0 All Initial issue FedRAMP PMO 04/06/2016 1.1 All Addressed minor corrections FedRAMP PMO throughout document 08/30/2016 1.2 All Added Glossary and additional FedRAMP PMO acronyms from all FedRAMP templates and documents 04/06/2017 1.2 Cover Updated FedRAMP logo FedRAMP PMO 11/10/2017 1.3 All Addressed minor corrections FedRAMP PMO throughout document 11/20/2017 1.4 All Updated to latest FedRAMP FedRAMP PMO template format 07/01/2019 1.5 All Updated Glossary and Acronyms FedRAMP PMO list to reflect current FedRAMP template and document terminology 07/01/2020 1.6 All Updated to align with terminology FedRAMP PMO found in current FedRAMP templates and documents fedramp.gov page 1 Master Acronyms and Glossary TABLE OF CONTENTS About This Document 1 Who Should Use This Document 1 How To Contact Us 1 Acronyms 1 Glossary 15 fedramp.gov page 2 Master Acronyms and Glossary About This Document This document provides a list of acronyms used in FedRAMP documents and templates, as well as a glossary. There is nothing to fill out in this document. Who Should Use This Document This document is intended to be used by individuals who use FedRAMP documents and templates. How To Contact Us Questions about FedRAMP, or this document, should be directed to ​[email protected]​. For more information about FedRAMP, visit the website at ​https://www.fedramp.gov​.
    [Show full text]
  • A Comparative Evaluation of OSI and TCP/IP Models
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 A Comparative Evaluation of OSI and TCP/IP Models P. Ravali Department of Computer Science and Engineering, Amrita Vishwa Vidhyapeetham, Bengaluru Abstract: Networking can be done in a layered manner. To reduce design complexities, network designers organize protocols. Every layer follows a protocol to communicate with the client and the server end systems. There is a piece of layer n in each of the network entities. These pieces communicate with each other by exchanging messages. These messages are called as layer-n protocol data units [n-PDU]. All the processes required for effective communication are addressed and are divided into logical groups called layers. When a communication system is designed in this manner, it is known as layered architecture. The OSI model is a set of guidelines that network designers used to create and implement application that run on a network. It also provides a framework for creating and implementing networking standards, devices, and internetworking schemes. This paper explains the differences between the TCP/IP Model and OSI Reference Model, which comprises of seven layers and five different layers respectively. Each layer has its own responsibilities. The TCP/IP reference model is a solid foundation for all of the communication tasks on the Internet. Keywords: TCP/IP, OSI, Networking 1. Introduction Data formats for data exchange where digital bit strings are exchanged. A collection of autonomous computers interconnected by a Address mapping. single technology is called as computer networks.
    [Show full text]
  • Studioraid™ Manual
    StudioRAID™ Manual Tabletop FireWire 800, USB 3.0 and eSATA enclosure with RAID 1 and RAID 0 Proprietary Notice and Disclaimer Unless noted otherwise, this document and the information herein disclosed are proprietary to Glyph Technologies, 3736 Kellogg Rd., Cortland NY 13045 (“GLYPH”). Any person or entity to whom this document is furnished or having possession thereof, by ac-ceptance, assumes custody thereof and agrees that the document is given in confidence and will not be copied or reproduced in whole or in part, nor used or revealed to any person in any manner except to meet the purposes for which it was delivered. Additional rights and obligations regarding this document and its contents may be defined by a separate written agreement with GLYPH, and if so, such separate written agreement shall be controlling. The information in this document is subject to change without notice, and should not be construed as a commitment by GLYPH. Although GLYPH will make every effort to inform users of substantive errors, LG YPH disclaims all liability for any loss or damage resulting from the use of this manual or any software described herein, including without limitation contingent, special, or inci- dental liability. © 2015 Glyph Technologies. All rights reserved. Specifications are subject to change without notice. Glyph and the Glyph logo are registered trademarks of Glyph Technologies. All other brands and product names mentioned are trademarks of their respective holders. Contacting Glyph Please use the following contact information to contact Glyph and its distributors. Glyph USA offers phone support Monday through Friday, 8:00 am to 5:00 PM Eastern Time.
    [Show full text]
  • Cisco DX80 Cable Installation
    Device Descriptions • Cisco DX70 Hardware, page 1 • Cisco DX80 Hardware, page 3 • Cisco DX650 Hardware, page 5 • No Radio Hardware, page 6 Cisco DX70 Hardware 1 Source button 6 Mute button 2 Speaker 7 Mini jack 3.5 mm output 3 Microphone 8 USB charging port 4 Power button 9 microSD card slot 5 Volume button 10 Camera with privacy shutter Cisco DX Series Administration Guide, Release 10.2(4) 1 Device Descriptions Cisco DX70 Cable Installation Cisco DX70 Cable Installation 1 micro-B USB port 5 Computer port 2 USB ports 6 Network port 3 HDMI in 7 Power port 4 HDMI out Cisco DX Series Administration Guide, Release 10.2(4) 2 Device Descriptions Cisco DX80 Hardware Cisco DX80 Hardware 1 Source button 5 USB port 2 Speaker 6 Volume button 3 Microphones in each leg 7 Mute button 4 Power button 8 Camera with privacy shutter Cisco DX80 includes an Acoustic Echo Canceller (AEC) and laptop shadowing. Users at the far end of a call experience clear audio quality even if the user puts an obstacle, such as a laptop, in front of one of the microphones. If the current microphone is blocked by an object, the device automatically switches to the other microphone array in the other foot. Cisco DX80 also includes two microphone array beam forming. If the user moves out of the beam (that is, out of the camera view), the sound sent to the far end weakens. All sound sources that are not located within the pickup beam (in front of the unit) attenuate.
    [Show full text]
  • Internet of Things (Iot): Protocols White Paper
    INTERNET OF THINGS (IOT): PROTOCOLS WHITE PAPER 11 December 2020 Version 1 1 Hospitality Technology Next Generation Internet of Things (IoT) Security White Paper 11 December 2020 Version 1 About HTNG Hospitality Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the development of next-generation systems and solutions that will enable hoteliers and their technology vendors to do business globally in the 21st century. HTNG is recognized as the leading voice of the global hotel community, articulating the technology requirements of hotel companies of all sizes to the vendor community. HTNG facilitate the development of technology models for hospitality that will foster innovation, improve the guest experience, increase the effectiveness and efficiency of hotels, and create a healthy ecosystem of technology suppliers. Copyright 2020, Hospitality Technology Next Generation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. For any software code contained within this specification, permission is hereby granted, free-of-charge, to any person obtaining a copy of this specification (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the above copyright notice and this permission notice being included in all copies or substantial portions of the Software.
    [Show full text]
  • User Manual 2/4-Port Displayport KVMPTM Switch with USB 3.0 Hub and Audio
    User Manual 2/4-Port DisplayPort KVMPTM Switch with USB 3.0 Hub and Audio GCS1902 / GCS1904 PART NO. M1434-b / M1435-b www.iogear.com ©2019 IOGEAR. All Rights Reserved. Part No. M1434 -b/ M1435-b. IOGEAR, the IOGEAR logo is trademarks of IOGEAR. Microsoft and Windows are registered trademarks of Microsoft Corporation. IOGEAR makes no warranty of any kind with regards to the information presented in this document. All information furnished here is for informational purposes only and is subject to change without notice. IOGEAR. assumes no responsibility for any inaccuracies or errors that may appear in this document. Table of Contents Introduction 4 Package Contents 4 Features 5 Requirements 6 Operating Systems 6 Overview 7 Hardware Setup 10 Basic Operation 13 Hotkey Operation 14 Advance Configuration 1 Keyboard Operating Platform 20 Keyboard Emulation 20 Firmware Upgrade Utility 23 Specification 26 Troubleshooting 27 Compliance Information 28 Limited Warranty 29 Contact 30 3 Introduction IOGEAR’s GCS1902/1904 2/4-Port DisplayPort KVMP with USB 3.0 Hub and Audio takes a giant leap forward in KVM switch functionality by combining KVM switch with a DisplayPort video interface, and 2-Port USB 3.0 hub. DisplayPort technology provides up to 4K UHD - 3840 x 2160 @30Hz resolution that displays the most vivid high definition images available while delivering premium sound for music, movies, and gaming. GCS1902/1904 allows users to access two or four DisplayPort computers from a single USB keyboard, USB mouse, and DisplayPort monitor console. In addition to the front panel pushbuttons and hotkeys, IOGEAR’s GCS1902/1904 offers the latest mouse port-switching functionality to change ports.
    [Show full text]
  • The OSI Model: Understanding the Seven Layers of Computer Networks
    Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “extra layers”, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports the same functions and features in a differently layered arrangement. An Overview of the OSI Model Copyright ©2006 Global Knowledge Training LLC. All rights reserved. Page 2 A networking model offers a generic means to separate computer networking functions into multiple layers.
    [Show full text]
  • Ultra-Mini 4-Port Superspeed USB 3.0 Hub Quick Start Guide – Model 202045
    Ultra-Mini 4-Port SuperSpeed USB 3.0 Hub Quick Start Guide – Model 202045 Thank you for your purchase from Cable Matters Inc., the ‘Reliable Connectivity” company. If you have any questions or comments, please send an email to: [email protected] This ultra-lightweight and portable hub transforms an existing USB port on a computer or tablet into a hub that supports 4 USB peripherals LED simultaneously. Plug & Play function requires no external power supply or software drivers. The following Quick Start Guide is a resource for usage and troubleshooting tips. USAGE TIPS: Your computer should instantly recognize the hub when it is connected to a USB port. The blue LED should be lit indicating that is can receive power and communications. Windows User Note: Connect the USB hub and wait momentarily until the driver software is automatically installed. The hub is now ready for use. Always use the ‘Safely Remove Hardware and Eject Media’ when unplugging USB peripheral devices from the hub. Important Notes: • This hub is not a stand-alone charger for charging devices like a tablet. • The power to all connected devices is limited by the host computer USB port. Devices such as external hard drives may exceed that limit. • The SuperSpeed USB 3.0 data transfer speed is limited by the power rating of the host computer USB port and any directly connected cables or extension cables. • Some 2.4 GHz wireless devices such as a keyboard or mouse may cause interference with the hub. They should be connected to a different USB port. • The hub is backwards compatible with USB 1.1/2.0 devices.
    [Show full text]
  • 2016 SENIOR COMPUTER CLASS 2016 SENIOR COMPUTER CLASS – JGAPL Table of Contents INTERNET TERMINOLOGY 2
    2016 SENIOR COMPUTER CLASS 2016 SENIOR COMPUTER CLASS – JGAPL Table of Contents INTERNET TERMINOLOGY 2 HARDWARE TERMINOLOGY 10 Bits and Bytes 69 Page | 1 Patrick Landers | Judge George W. Armstrong Library|220 S. Commerce St, Natchez, MS 39120 http://www.armstronglibrary.org | http://ebooks.armstronglibrary.org | http://catalog.armstronglibrary.org INTERNET TERMINOLOGY INTERNET = The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs. In order to connect to the Internet, you must have access to an Internet service provider (ISP), which acts the middleman between you and the Internet. Most ISPs offer broadband Internet access via a cable, DSL, or fiber connection. When you connect to the Internet using a public Wi-Fi signal, the Wi-Fi router is still connected to an ISP that provides Internet access. Even cellular data towers must connect to an Internet service provider to provide connected devices with access to the Internet. The Internet provides different online services. Some examples include: Web – a collection of billions of webpages that you can view with a web browser Email – the most common method of sending and receiving messages online Social media – websites and apps that allow people to share comments, photos, and videos Online gaming – games that allow people to play with and against each other over the Internet Software updates – operating system and application updates can typically downloaded from the Internet In the early days of the Internet, most people connected to the Internet using a home computer and a dial-up modem.
    [Show full text]