Fundamentals of Computer Studies

Total Page:16

File Type:pdf, Size:1020Kb

Fundamentals of Computer Studies See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/258339295 FUNDAMENTALS OF COMPUTER STUDIES Book · November 2013 CITATIONS READS 0 411,143 1 author: Jeleel Adekunle ADEBISI University of Ilorin 47 PUBLICATIONS 48 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Effect of welding variables on mechanical properties of low carbon steel welded joint View project Preparation of Solar Grade Silicon Nanoparticles from Agricultural Wastes View project All content following this page was uploaded by Jeleel Adekunle ADEBISI on 21 May 2014. The user has requested enhancement of the downloaded file. EXPERT SOLUTION CONSULTS (ESC) FUNDAMENTALS OF COMPUTER STUDIES Computer Training Expert Solution Consults Fundamentals of Computer Studies TABLES OF CONTENTS TABLES OF CONTENTS ............................................................................................................................................................................. II AIMS AND OBJECTIVES OF THE COURSE .......................................................................................................................................... 1 INTRODUCTION ............................................................................................................................................................................................ 1 USES OF COMPUTERS .............................................................................................................................................................................. 1 HISTORY OF COMPUTING....................................................................................................................................................................... 2 GENERATIONS OF COMPUTERS ........................................................................................................................................................... 3 First Generation - 1940-1956: Vacuum Tubes....................................................................................................................................... 3 Second Generation - 1956-1963: Transistors......................................................................................................................................... 3 Third Generation - 1964-1971: Integrated Circuits............................................................................................................................... 3 Fourth Generation - 1971-Present: Microprocessors ........................................................................................................................... 3 Fifth Generation - Present and Beyond: Artificial Intelligence ............................................................................................................ 4 SOFTWARE AND HARDWARE ................................................................................................................................................................. 4 DIFFERENT PARTS OF A COMPUTER AND THEIR USES............................................................................................................... 4 The monitor............................................................................................................................................................................................... 5 The system box or computer console....................................................................................................................................................... 5 The keyboard (Pressing) .......................................................................................................................................................................... 5 The Mouse (Clicking and Dragging)....................................................................................................................................................... 6 The Peripherals......................................................................................................................................................................................... 7 Disk Size Conversion Chart (Bits, Bytes, Kilobytes, Megabytes and Gigabytes)................................................................................. 8 TYPES OF COMPUTERS.............................................................................................................................................................................. 8 ANATOMY OF COMPUTER SYSTEM ..................................................................................................................................................... 9 COMPUTER HARDWARE......................................................................................................................................................................... 9 THE CENTRAL PROCESSING UNIT (CPU)............................................................................................................................................ 9 INPUT DEVICES........................................................................................................................................................................................10 OUTPUT DEVICES....................................................................................................................................................................................11 STORAGE DEVICES.................................................................................................................................................................................11 SYSTEM MEMORY...................................................................................................................................................................................11 HARDWARE CONNECTIONS ..................................................................................................................................................................12 COMPUTER SOFTWARE ..........................................................................................................................................................................12 SYSTEM SOFTWARE...............................................................................................................................................................................12 OPERATING SYSTEM.....................................................................................................................................................................................13 Function of the OS..................................................................................................................................................................................14 Classification of OS................................................................................................................................................................................14 The Difference between Windows &Macs ............................................................................................................................................14 UTILITY SOFTWARE......................................................................................................................................................................................14 APPLICATION SOFTWARE....................................................................................................................................................................15 CLASSIFICATION OF COMPUTERS ACCORDING TO SIZE ........................................................................................................15 COMPUTER VIRUSES AND SECURITY................................................................................................................................................16 COMPUTER VIRUSES..............................................................................................................................................................................16 TYPES OF VIRUSES .......................................................................................................................................................................................16 HOW VIRUSES ARE SPREAD .........................................................................................................................................................................17 PREVENTION OF COMPUTER VIRUS .............................................................................................................................................................17 VIRUS DETECTION........................................................................................................................................................................................18 COMPUTER SECURITY...........................................................................................................................................................................18 BASIC COMPUTER MAINTENANCE ....................................................................................................................................................19 MAINTENANCE........................................................................................................................................................................................19 PREVENTIVE MAINTENANCE........................................................................................................................................................................19
Recommended publications
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • CGI Scripts: Gateways to World-Wide Web Power
    Behavior Research Methods. Instruments. & Computers 1996,28 (2), 165-169 CGI scripts: Gateways to World-Wide Web power JAMES M. KIELEY Miyazaki International CoUege, Miyazaki, Japan The power of the hypertext-based information presentation system known as the World-Wide Web can be enhanced by scripts based on the common gateway interface (CG!) protocol. CG! scripts re­ siding on a Webserver permit the execution of computer programs that can perform a wide variety of functions that maybe useful to psychologists. Example applications are presented here, along with ref­ erence information for potential script developers. The majority ofinformation that people access via the permit users to input data by clicking on checkboxes, hypertext-based information presentation system known radio buttons, menus, reset buttons, and submit buttons, as the World-Wide Web (WWW) is actually stored in the and also by typing into text fields (Lemay, 1995). form of static files-that is, text and graphics files that COl was developed by the original programmers ofthe appear a certain way when viewed from a Web browser, UNIX-based CERN and NCSA HTTP Web servers to such as Netscape or Mosaic, because ofa command lan­ supersede a prior scripting environment called HTBIN. guage known as HTML. HTML, by its original design, is Other Web servers that support scripting, including those a simple command set used to present multimedia infor­ based on other operating systems, mayor may not use mation that can be accessed asynchronously. The capa­ the COl protocol. Early applications of COl scripts in­ bilities ofHTML, and, therefore, the WWW, can be im­ cluded using them to serve information to a browser that proved with scripts conforming to the common gateway is in a format that is otherwise unreadable, such as an SQL interface (COl) protocol.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • MXM-6410 Ubuntu Linux 9.04 (Jaunty Jackalope) User’S Manual V1.2
    MXM-6410/APC-6410 Linux User’s Manual v1.2 Computer on Module COM Ports Two USB Hosts LCD Ethernet SD MXM-6410 Ubuntu Linux 9.04 (Jaunty Jackalope) User’s Manual v1.2 1 MXM-6410/APC-6410 Linux User’s Manual v1.2 Table of Contents CHAPTER 1 MXM-6410/APC-6410 UBUNTU LINUX (JAUNTY JACKALOPE) FEATURES .. 5 1.1 BOARD SUPPORT PACKAGE (BSP) .................................................................................................. 5 1.2 DRIVERS ......................................................................................................................................... 5 1.3 DEFAULT SOFTWARE PACKAGES ..................................................................................................... 7 1.4 SPECIAL FEATURES ....................................................................................................................... 21 CHAPTER 2 SYSTEM INFORMATION .......................................................................................... 23 2.1 STARTING EVKM-MXM-6410 ..................................................................................................... 23 2.2 JUMPER SETTING .......................................................................................................................... 24 2.3 CONNECTORS ................................................................................................................................ 29 CHAPTER 3 USING UBUNTU JAUNTY JACKALOPE ................................................................ 33 3.1 BOOTING .....................................................................................................................................
    [Show full text]
  • Reference Manual
    Reference Manual Command Line Interface (CLI) HiLCOS Rel. 9.12 RM CLI HiLCOS Technical Support Release 9.12 05/16 https://hirschmann-support.belden.eu.com The naming of copyrighted trademarks in this manual, even when not specially indicated, should not be taken to mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone. © 2016 Hirschmann Automation and Control GmbH Manuals and software are protected by copyright. All rights reserved. The copying, reproduction, translation, conversion into any electronic medium or machine scannable form is not permitted, either in whole or in part. An exception is the preparation of a backup copy of the software for your own use. The performance features described here are binding only if they have been expressly agreed when the contract was made. This document was produced by Hirschmann Automation and Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right to change the contents of this document without prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the information in this document. Hirschmann can accept no responsibility for damages, resulting from the use of the network components or the associated operating software. In addition, we refer to the conditions of use specified in the license contract. You can get the latest version of this manual on the Internet at the Hirschmann product site (www.hirschmann.com.) Hirschmann Automation and Control GmbH Stuttgarter Str. 45-51 Germany 72654 Neckartenzlingen Tel.: +49 1805 141538 Rel.
    [Show full text]
  • How to Use Codemeter Licenses
    CodeMeter License Management ● Installing and Managing Software Licenses User Manual Version 020 NMR Innovation with Integrity Copyright © by Bruker Corporation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means without the prior consent of the publisher. Product names used are trademarks or registered trademarks of their re- spective holders. © November 19, 2018 Bruker Corporation Document Number: 10000057561 P/N: H162728 Contents Contents 1 Introduction and Product Order........................................................................................................ 5 2 Installing the License - Online Activation ........................................................................................ 7 2.1 Troubleshooting ................................................................................................................ 11 2.1.1 CodeMeter Installation on CentOS 5 ................................................................................ 11 2.1.2 Supported Browsers for License Activation ...................................................................... 11 2.1.3 CodeMeter Installation on not Supported Linux Distributions........................................... 12 3 Offline Activation.............................................................................................................................. 13 4 Moving an installed license to a different computer - Re-Hosting .............................................
    [Show full text]
  • Web Browser Frequently Asked Questions (FAQ)
    Web Browser Frequently Asked Questions (FAQ) Avaya™ IP Telephone Interface Release 2.2 for 4610SW, 4620/4620SW, 4621SW, and 4622SW IP Telephones Release 2.5 for the 4625SW IP Telephone Issue 2.5 April 2005 Copyright 2005, Avaya Inc. • Theft (such as, of intellectual property, financial assets, or toll All Rights Reserved facility access) Notice • Eavesdropping (privacy invasions to humans) Every effort was made to ensure that the information in this • Mischief (troubling, but apparently innocuous, tampering) document was complete and accurate at the time of printing. However, information is subject to change. • Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent) Be aware that there may be a risk of unauthorized intrusions Trademarks associated with your system and/or its networked equipment. Also realize that, if such an intrusion should occur, it could result in a DEFINITY is a registered trademark of Avaya, Inc. MultiVantage variety of losses to your company (including but not limited to, is a trademark of Avaya, Inc. HTTP Server functionality is human/data privacy, intellectual property, material assets, financial provided by the GoAhead WebServer 2.1, Copyright © 2004 resources, labor costs, and/or legal costs). GoAhead Software, Inc. All Rights Reserved. Responsibility for Your Company’s Telecommunications Disclaimer Security Avaya is not responsible for any modifications, additions or The final responsibility for securing both this system and its deletions to the original published version of this documentation networked equipment rests with you - Avaya’s customer system unless such modifications, additions or deletions were performed administrator, your telecommunications peers, and your managers.
    [Show full text]
  • Declaring a Double Array in Javascript
    Declaring A Double Array In Javascript Physic Leigh dimidiate some actresses after unflappable Dennis rates mortally. Ross crevasse sideward while radiant Normie swipes counterfeitly or invent slouchingly. Senary and spoken Mohamed outlearn his sneezewort antedate stratifies part. How small create two dimensional array in JavaScript dynamically. What methods in javascript? It in javascript, one number in some method! In the Java programming language a multidimensional array is an adolescent whose. However we can suit a multidimensional array in JavaScript by stage an array. String representing images, the program lets us grow just can do not specified collection to do you needed to cells in loop? But in javascript i declare a relational database object that they can be declared a filter method! To declare it in javascript array like below are. Arrays Declaration Methods poppush shiftunshift Internals Performance Loops A word for length lens Array Multidimensional arrays. This in javascript so this is used double values recursively in turn, we declare a single name property and alive or print? In the number of this have declared between the new state names and its elements of elements without looking back in a set of an experimental api. How they Create use Manage Multidimensional Arrays Using. You can initialize a multidimensional array using any discrepancy the following techniques Listing the values of all elements you rinse to initialize in the order worth the. Use in javascript does not. In JavaScript how do however create an empty 2D array Quora. How sometimes I sweat a 2d NumPy array? Array in javascript code. Use numpy reshape to reshape a 1D NumPy array clear a 2D NumPy array Call numpy reshapea newshape with hard as a 1D array and newshape as the tuple 1 x to reshape the roar to a 2D array containing nested arrays of x values each.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Dive Into Accessibility Table of Contents Dive Into Accessibility
    Dive Into Accessibility Table of Contents Dive Into Accessibility..................................................................................................................................1 Introduction....................................................................................................................................................2 Day 1: Jackie..................................................................................................................................................3 Day 2: Michael................................................................................................................................................4 Day 3: Bill.......................................................................................................................................................5 Day 4: Lillian..................................................................................................................................................6 Day 5: Marcus................................................................................................................................................7 Day 6: Choosing a DOCTYPE.......................................................................................................................8 Who benefits?......................................................................................................................................8 How to do it..........................................................................................................................................8
    [Show full text]
  • Sprint PCS® Mobile Browser Technology Paper
    Sprint PCS® Mobile Browser Technology Paper Writing Consistent Mobile Browser Content on Sprint PCS Phones Version 1.0 July 2004 ©2004 Sprint and Metrowerks. All rights reserved. Sprint, Sprint PCS, Web, Sprint PCS Phone, Sprint PCS Vision, and the diamond logo are registered trademarks of Sprint Communications Company L. P. All other trademarks are property of their respective owners. Table of Contents Table of Contents..............................................................................................................2 1 Introduction.............................................................................................................3 1.1 Target Audience.....................................................................................................3 1.2 About this document...............................................................................................3 2 Document Conventions..........................................................................................3 3 Overview of Wireless Application Protocol (WAP) 2.0 Markup Language .............3 3.1 XHTML Basic and Mobile Profile............................................................................4 3.2 Key Differences between WML 1.x and XHTML ....................................................5 4 Overview Of Sprint WAP 2.0 Phones and Browsers..............................................7 5 Writing Consistent WAP 2.0 Applications Across Sprint PCS Phones...................8 5.1 Commonly used XHTML Mobile Profile Tags ........................................................8
    [Show full text]
  • August 6Th Addresses to Distributed Name Word Document to a Record
    Service (DNS), which delegated has a glorious Web interface, the responsibility of assigning and a user can even attach a August 6th addresses to distributed name Word document to a record. servers. In its present form the system Postel’s law is "Be conservative manages roughly $1.3 trillion in Peter Jay in what you do; be liberal in obligations and 340,000 what you accept from others." It contracts. It runs on an IBM Weinberger comes from RFC 761 , where he 2098 model E-10 mainframe, Born: Aug. 6, 1942; summarized desirable that can carry out 398 million Pennsylvania (??) interoperability criteria for the instructions per second. Internet Alfred Aho [Aug 9], Weinberger, There have been several and Brian Kernighan [Jan 1] Postel attended the same high attempts to replace MOCAS, but developed the AWK language school (Van Nuys in Los they’ve floundered due to cost, (he's the “W”) in 1977, which Angeles) as two other Internet complexity, and transition was first distributed in UNIX pioneers, Steve Crocker [Oct 15] planning. Version 7. The acronym is and Vint Cerf [June 23]. pronounced in the same way as the "auk " bird, which also acts The WWW Virtual as the language's emblem. In 1985 they extended the Library language, most significantly by adding user-defined functions. Aug. 6, 1991 This version is sometimes called “new awk” or nawk. The WWW Virtual Library ( http://vlib.org/) is the When Weinberger was oldest Web directory, able to promoted to be the head of trace its venerable heritage back Computer Science Research at to Tim Berners-Lee’s [June 8] Bell Labs [Jan 1], his picture was WWW overview page [next merged with the AT&T “death entry] at CERN.
    [Show full text]