Documente Academic
Documente Profesional
Documente Cultură
Unit Goals
1. To appreciate the distinction between micro, mini, and mainframe computers and
to understand our emphasis on the micro-computer;
2. To gain a lay understanding of selected hardware components (e.g. cpu, ram,
modem, etc);
3. To gain a lay understanding of ways information is stored on a microcomputer;
4. To become skilled in the use of a window; and
5. To appreciate the importance of organization, backup, and virus protection.
Many of us have learned about computers and learned to use them in a very haphazard
manner. We pick up tips and shortcuts from friends and co-workers, learning what we
need to know to accomplish the task at hand. While this approach can keep you
functioning, there are often frustrating moments (or days) when the system isnt working,
or you find yourself with strange results or formatting that seems out of control.
My goal for this introductory unit is to fill in a few of the gaps you may have on computer
terminology, the function of various components, and understanding of how information
is stored on micro-computers. This information may help you diagnose a problem when
something does go wrong or at least make it easier for you to talk with the technician
you call for assistance. Shared terminology can work wonders in communicating your
concerns and understanding the techie.
As a data manager, you may also be responsible for ordering new computer equipment
and you should know what you need so that your software works efficiently and you
have the correct features for internet access and for ensuring data security and integrity.
1.1
Outline
Section
Topic
Page
1.
2.
Hardware Components .
2.1
The CPU .
2.2
The Display (Monitor)
2.3
Printers and Scanners
2.4
Bits How the Computer Stores Information
2.5
ASCII, Unicode and Hexadecimal Codes
2.6
Computer Storage Terminology ..
2.7
ROM, RAM, and Read/Write Storage..
2.8
The Hard Drive
2.9
CDs, Diskettes, and Zip Disks .
2.10 Modem and Ethernet .
2.11 Ports and Cables
2.12 Care of Computers, Storage Devices, and
Printers..
1.4
1.5
1.5
1.7
1.9
1.9
1.13
1.13
1.15
1.16
1.18
1.18
3.
Software
3.1
3.2
3.3
3.4
3.5
3.6
1.20
1.20
1.20
1.21
1.24
1.26
1.29
4.
..
Disk Operating System ..
Windows
The Mouse
The Anatomy of a Window .
Managing Files in Windows ..
Some General Tips for Working on a PC.
1.3
1.19
1.32
1.33
1.34
1.2
1.3
2. Hardware Components
A computer consists of hardware and software.
Hardware consists of the physical components of the computer, including such items as the
Central Processing Unit (CPU), motherboard, disk drives, monitor, and keyboard.
Software consists all of the programs that you and the computer use to perform tasks. An
essential piece of software on all computers is the Operating System. We will use a
WINDOWS operating system for communication between the computer and the user and a
variety of specialized applications software packages for word processing, data entry,
management and statistical analyses.
The BIOS - Sometimes the boundary between software and hardware is blurred. The BIOS
identifies the Hardware on the computer, and in early computers was part of the
HARDWARE. More recently, some BIOS are soft and can be programmed, or altered as
the HARDWARE is changed.
Examples
1. The Box
This is the central box and
contains several components,
some optional
CPU
Hard disk (storage)
RAM (random access memory)
Video card
Ethernet card
2. Input Devices
Keyboard
Mouse
Scanner
CD-ROM, DVD-R drives
Microphone
Touch screen
3. Output Devices
Monitor
Printer
Plotter
CD or CD/DVD burner
Slide or overhead projector
Speakers
Disk Drives
CD-Read/Write or DVD-R/W
Modem, Ethernet cable or Wireless card
LAN (local area network)
1.4
1.5
Display settings for your monitor, including resolution, can be controlled through the Control
Panel. Your hardware and commonly used software will determine the optimal settings.
Higher resolution means more pixels in the same area and can be important for detailed
graphic images.
To check or modify your settings, go to
(Start
Settings
Control Panel and select Display.
Use the Settings Tab to control screen resolution and color settings. Recommendations for
optimal settings typically come with the original hardware and operating system setup.
Many software application packages have suggested settings for optimal display of
graphics.
Only limited
combinations
are available
for screen
resolution.
Higher
resolution
often results in
smaller icons
and print on
your desktop.
Color quality
selection
depends upon
software and
hardware.
1.6
1.7
2.3.1 Scanners
Scanners have become an important method of transferring printed information into digital
format in recent years. Scanner technology has been improving rapidly and systems are
available everywhere and used in many ways. The basic principle of a scanner is to
analyze an image and process it in some way. Scanning of images and text (using Optical
Character Recognition or OCR) allow you to save information to a file on your computer.
You can then alter or enhance the image, or edit text, and incorporate it into a document or
print it out.
Types of Scanners:
Flatbed scanners, also called desktop scanners, are the most versatile and
commonly used home scanners.
Sheet-fed scanners are similar to flatbed scanners except the document is moved
and the scan head is immobile. This model is useful in situations with large volumes
of pages to be scanned.
Handheld scanners rely on the user to move them instead of a motorized belt. This
type of scanner typically does not provide good image quality. However, it can be
useful for quickly capturing text. These are most commonly seen for scanning bar
codes, and can be useful in research studies for processing of samples.
Drum scanners are used to capture incredibly detailed images, and are most
commonly used in the publishing industry.
Sharpness is a function of the quality of the optics used to make the lens and the
brightness of the light source.
Resolution is defined by the number of dots per inch (dpi). The scanner's dpi is
determined by the number of sensors in a single row (x-direction sampling rate) by
the precision of the stepper motor (y-direction sampling rate).
Once a document is scanned, you need software on your computer, called a driver, that
knows how to communicate with the scanner analogous to printer drivers. Most scanners
speak a common language, TWAIN, that can be interpreted by standard image editing
software packages. In addition to the driver, most scanners come with other a scanning
utility and some type of image editing application. Many scanners include Optical Character
Recognition (OCR) software. OCR allows you to scan in words from a document and
convert them into computer-based text. It uses an averaging process to determine what the
shape of a character is and match it to the correct letter or number. This is a tremendous
aid in scan data entry systems, which we will be discussing later in the course, though there
are issues in recognition of handwritten characters which must be accounted for.
1.8
Base 10 Number
0
1
1
2=2
3
2
4=2
5
6
7
3
8=2
9
10
11
12
13
14
15
4
16=2
...
255
Base 2 Number
0
1
10
11
100
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111
10000
11111111
(1 bit)
(2 bits)
(3 bits)
(4 bits)
(5 bits)
(8 bits = 1 byte)
Binary digit
A bit is the smallest unit of information an on/off switch.
Recall - we use 1 to mean on and 0 to mean off.
Byte
A set of 8 bits.
A byte is the basic unit of information for microcomputers.
1.9
ASCII Code
065
090
097
122
048
049
050
057
012
027
Assigned Character
A
Z
a
z
0
1
2
9
(page break)
(end of file)
Each ASCII code has its own byte representation; i.e., its own set of eight 0/1 bit switch
settings.
You can enter ASCII codes to get special symbols in your text in some software programs
by setting the NumLock on your keyboard to on, holding down the ALT key while typing
the associated code on the number pad:
Unicode
The most common coding system in current use is Unicode. Unicode is a newer coding
scheme, also derived from assigning sets of bytes to letters, numbers and other characters.
It is an international standard which has a goal of providing the means to encode the text of
every document people want to store in computers. This includes all scripts in active use
hardware and software1_11.docx
1.10
today, including many scripts known only by scholars, and symbols which are used in
mathematics, linguistics and other specialized fields. The creation of Unicode is an
ambitious project to replace existing character sets, many of which are too small in size and
problematic in multilingual environments. Despite technical problems and limitations and
criticism on process, today Unicode is considered the most complete character set and one
of the largest, and has become the dominant encoding scheme in internationalization of
software and multilingual environments. Many recent standards such as XML, as well as
system software such as operating systems, have adopted Unicode as an underlying
scheme to represent text.
Tables translating between different coding schemes can be easily found on the web. A list
of scripts available can be found at http://unicode.org/charts/ .
If you look at the CHARACTER MAP on your computer you can see the Unicode code for
special symbols:
Systems Tools
Character Map):
(Start
Programs
Accessories
Select font, including
specialized symbol
fonts.
1.11
You can use the character map to select, copy and paste special characters into text,
as needed. Note that the character map will vary slightly with different versions of
Windows.
The character map is one way to include special characters in your text, in some software
programs. Other programs offer their own set of special symbols.
For example, within MS Word, special symbols can be added directly to your text from the
Insert menu:
Insert Symbol
Select font,
including specialized
symbol fonts.
Unicode values are written in hexadeximal code. Hexadecimal codes are written in Base
16. A set of 4 binary switches (bits) forms one hexadecimal number. Unicode values are
written as 4 digit values, or requiring 4x4=16 bits, or the equivalent of 2 bytes for each
letter or symbol. As base 10 numbers require 10 distinct characters (0, 9), Base 16
requires 16 characters. We add A F to represent values of eleven through fifteen.
Examples of binary, decimal, and hexadecimal code are given below.
Decimal Equivalent
0
3
5
128
168
255
Hexadecimal Codes
0000
0003
0005
0080
00A8
00FF
1.12
=
210 Bytes
= 1024 Bytes
=
213 Bits
= 8192 Bits
210 Kilobytes = 1024 Kilobytes
=
220 Bytes
= 1048576 Bytes
=
223 Bits
= 8388608 Bits
=
=
=
=
210 Megabytes
220 Kilobytes
230 Bytes
233 Bits
= 1024 Megabytes
= 1048576 Kilobytes
= 1073741824 Bytes
= 8589934592 Bits
The amount of storage space available on a disk is usually described in terms of bits, bytes,
KB, MB, or GB.
(RAM)
(ROM)
Hard Disk, Floppy Disk, CD, DVD, Zip disk, plug-in
drives
Random Access Memory (RAM) is a major component of personal computers. RAM is the
fastest storage device, and is accessed at the speed of the microprocessor. Most software
has a minimum RAM requirement.
Random Access Memory can be installed on the motherboard (the motherboard is the
CPU), or installed in expansion slots in a computer.
1.13
Special software is needed to access RAM. WINDOWS serves this purpose, allowing
access to as much RAM as is available. Most WINDOWS programs require 16 or more MB
of RAM. SAS 9.x recommends minimally 32 MB of RAM for operation. WINDOWS XP
suggests that it be operated with at least 128 MB of RAM and 1.5 GB of hard drive space
and a computer speed of minimally 300 MHz.
To check on your system:
Physically, RAM is a chip installed on a circuit board inside the computer box. You can
purchase additional RAM for your computer if required for newer software you are using, or
to improve operating speed and multi-tasking.
A major limitation of RAM is that it is temporary. When the computer is turned off, the
information stored in RAM is lost.
Every time you run an application (e.g., MSWord or SAS), the CPU uses RAM for retrieval
and storage of information as the application is running. This is efficient because RAM is
accessed at a high clock speed, usually close to the same clock speed as the CPU.
However, until you hit SAVE, any work that is only current in RAM will be lost if you lose
power or have some other glitch or malfunction.
Consider using the autosave feature of your software programs, so that you are at less risk
of losing your work. An autosave feature automatically saves current work in a temporary
hardware and software1_11.docx
1.14
file at regular intervals, which can be recovered after a power loss. You can set the
frequency with which automatic saves occur:
Too frequent auto saves can interfere with smooth workflow, but too infrequent (e.g., set at 1
hour) can mean drastic loss of work. When you do lose power or a program shuts down on
you, as you restart the software application, the auto-saved version of the file with most of
your recent work can be accessed.
1.15
The amount of information that can be stored on a hard disk has increased substantially
over time:
Machine (Year)
80286 (1982)
80486 (1990)
P5
(1995)
Current PCs
Note that I say permanently in quotes disks can be broken or destroyed; data can be
destroyed or rendered inaccessible by viruses or worms; additionally magnetic storage
may deteriorate over time.
Use My Computer
1.16
as you are in the process of editing and updating files. They are more suited to saving
final copies of data files and reports, especially those you dont want re-edited.
DVD (Digital Video Display) drives are a common option on computers. They are commonly
read only drives, often in combination with a CD-R/W drive; DVD-R/W drives are also
available. More and more software, especially with complex graphics (particularly games) is
distributed on DVD.
Other removable storage devices are known as diskettes or floppy disks have been pretty
much phased out.
5- " Floppy Diskette (Pretty much phased out) An electronic medium storage
device. Reading from and writing to are both possible. Storage capacity 360K - 1.2
MB.
3.5" Diskette (Typically referred to as the a: drive) also pretty much phased out.
An electronic medium storage device. Reading from and writing to are both possible.
Storage capacity 720K - 1.44 MB. Less easily damaged than 5.25" floppy diskette.
Zip Disks 100 or 250 MB ZIP disks, designed for use in 100 or 250 MB ZIP drives,
which can be an external drive, or part of the box. Note that the device size (100 or
250 MB) and disk size (100 or 250 MB) must be compatible.
Other Options
Compact Flash (USB drives), memory sticks and other compact media (e.g., micro
SD cards) are increasing versatile and vary in capacity. They are very useful to have
and can fit in your wallet or on a keychain. These attach through USB or special
drives. Prices vary with the capacity (amount of storage space); you can get a
relatively inexpensive one that can hold a lot of data.
Infra-red communication and wireless interfaces are increasingly valuable and
available.
(Tip: I recommend using USB flash drives you can fit most of your coursework on
a single, inexpensive flash drive, and back-up your work to the U: drive.)
Access Time is the time required by the CPU of the computer to access one byte of
information on a device. It is good to have fast access time. The access time is measured
in milliseconds.
1.17
The transmission speed of a modem is expressed as the baud rate. Baud rate = # bits
that can be transferred in 1 second. The standard for a good, high-speed modem is 56K.
An Ethernet connection is a cable connection to a system, rather than a phone line.
MIPS = Million Instructions per Second. Ethernet wiring connection through a hardwire
or cable system, transmits at 10 MIPS. The backbone fiber optics network at UMASS
transmits at 100 MIPS.
Wireless connection is increasingly available, and requires the appropriate card in your
computer, as well as working within a wireless environment. Many buildings and areas on
campus have been established as wireless zones, which means that if your laptop has the
capability, you can establish an internet connection when in those areas. Check on the OIT
website for wireless zones on campus.
1.18
Ports are typically available on rear and front (for easy access) of box, as well
as on the side of monitors.
USB supplies power to the peripherals, reducing the need for additional
power sources.
Full speed devices communicate with the PC at 12Mbps. Mice and keyboards
etc. can communicate at a lower 1.5Mbps rate.
PlugNPlay - The PC recognizes each device that is plugged in and loads the
appropriate driver. If it's a new device for which it has no driver, and doesn't
run with a generic driver, it prompts for a driver to be loaded.
First, computers must be kept clean. This means insisting on no food or drink
near the computer, and regular cleaning of dust and debris.
1.19
Third, computers and disks must be kept clear of static. Since information is
stored via magnetic fields, static electricity can destroy stored information. Similarly,
static electricity can destroy RAM prior to installation in a computer. Computer
memory, when shipped, comes packed in static proof wrap. Special care and
grounding will minimize the chance that memory will be destroyed during installation.
Low static carpeting may be a good investment.
Finally, all computers should be connected to surge protectors. The surge
protector will prevent voltage surges from damaging the system.
3. Software
3.1 Disk Operating System
The CPU, storage devices, and other devices in a personal computer communicate with
each other via an operating system. Examples of IBM compatible operating systems
include UNIX, DOS, and OS2.
The DOS operating system was basic for most IBM compatible computers. In the past, as
recently as 1996, learning DOS commands to manage files and access to application
software was important.
Originally, WINDOWS functioned as a layer above the disk operating system, though in
new versions Windows serves as the operating system.
3.2 Windows
Windows is a Graphical User Interface (GUI) a more intuitive way to interact with a
computer. Instead of typing a command in DOS, tasks can be performed in an intuitive,
visual manner via point and click, with the help of a mouse or other input device.
Tasks such as copying a file from one disk to another can be accomplished by dragging an
icon representing the file from the icon representing one disk to the icon of another.
A GUI acts as a translator allowing the user and the computer to communicate with each
other in a way that is easy for both to understand.
1.20
Point:
Click:
Double Click:
Drag:
Select:
Rollover:
Most current models of the PC mouse have left and right buttons. Different menus become
available if you left-click or right-click on a file or pull-down menu. The user has options
to set which menu appears with a left or right click, as well as the appearance of the pointer
on the screen, the speed of scrolling, etc.
The cursor typically takes the shape of an arrow when you use it to point and click, and an
hourglass to indicate a program is loading or operating. The cursor returns to an arrow
when you can take the next step. Again, the user has the option of resetting the shape of
the mouse pointer.
Mouse properties, including speed of action, type of movement and screen appearance can
be reset using:
1.21
Everything that can be done with the mouse can also be done with
the keyboard.
For example, while there are many ways to select text, cut, copy and paste using the
mouse, these can also be accomplished with keyboard strokes. A few of the more useful
ones to know are:
Function
Select all
Cut
Copy
Paste
Keyboard Strokes
Ctrl-A (this means hold Ctrl Key and tap the A)
Ctrl-X
Ctrl-C
Ctrl-V
If you are ever having trouble copying/pasting between different software applications (e.g.,
from a webpage to a word processor), try using keyboard strokes in place of menu choices
and mouse actions.
Excessive mouse use can cause fatigue and repetitive strain injury and it is valuable to learn
to do some frequently performed tasks on the keyboard. Some examples are copy, cut,
paste, select all, as shown above. Other common actions include use of
ctrl <S> or F10 to save
F12 to save as etc.
hardware and software1_11.docx
1.22
Within a software program you can often customize these commands by creating MACROS,
or programs to assign functions to keyboard strokes.
Many operations are faster and sometimes more precise with the keyboard than with a
mouse. You can also use mouse actions and keyboard controls together some examples:
Selecting a section of a document to copy can be done with the Shift key and the
mouse. Use the mouse to position the cursor at the start of the section you wish to
copy. Hold down the shift key, and use the mouse to move the cursor to the point in
the document that marks the end of the section you wish to copy and click on it.
Select columns of text to cut or copy by positioning the cursor at the start of the
columns to be selected; holding down the Alt key, and dragging the mouse over the
section of text you wish to select. This is particularly useful when editing computer
output into Word documents.
Special electronic pads and pens are available for those with wrist or other problems
making a mouse difficult to use; in addition voice recognition systems are in use and further
development to give commands and enter information orally.
1.23
Title Bar
Menu
Bar
Minimize
Button
Maximize
Button
Close Button
Vertical
Scroll Bar
Workspace
Window Corner
While the type of window seen at any given time depends upon the individual
application in use many of these features are common to all windows.
1.24
Title Bar at the top of the window, this shows the name of the program and
type of window or software.
o This is highlighted in color (usually in blue with white text) when
the window is active.
o The title bar appears in gray (or a gray-blue) when the window is inactive
when another document or program window is currently in front, and
active.
Menu Bar the horizontal bar below the title bar listing the available categories
of commands or actions which can be performed in this window.
Scroll Bars vertical and horizontal bars along the right hand and bottom edge
of a window: buttons on the scroll bar move you quickly through a window.
Close Button the button with the X used to close a window. This actually
closes the document and/or application program, and removes it from active
memory (from RAM).
The TASKBAR at the bottom of the screen indicates which windows are currently open.
The highlighted window is currently active.
1.25
(1)
(2)
My Computer
The Windows Explorer.
Each of these programs gives a picture of the files documents, data and program files that
are stored on the various computer disks. You have a choice of VIEWS or ways of
displaying the information, using large or small icons, with or without details.
Either program can be used to copy, move, delete and open programs and documents.
My Computer looks at a particular location on the computer and displays all the folders and
files.
Windows Explorer provides, in addition, a tree diagram structure to indicate the storage
relationships among files and folders.
Windows HELP and Support can be accessed from the Start Menu on the Task Bar. It
provides a tutorial with exercises for practice on use of Windows as well as help on specified
tasks, such as copying and moving files, and creating shortcuts to programs and files.
TIP - You can learn to use both My Computer and Windows Explorer through the HELP
tutorials. I suggest you pick one or the other and get comfortable with it.
My Computer:
Views button
1.26
In this example of My Computer, the disks and folders are displayed as large
icons. You can switch the type of display using the VIEWS button on the menu
bar.
By right-clicking on a drive and selecting Properties you get the following:
Take advantage of the feature that allows you to name a disk or flash drive. This name will
appear next to the drive designation in My Computer or the Windows Explorer a great
advantage when you leave your flash drive in the computer lab!
1.27
1.28
The first level before the dot can be a long descriptive title including most of the
keyboard characters (exceptions include / * ? > < and perhaps others).
The 3+ letter extension after the dot is determined by the file type. For
example MS Word files all have the extension .doc, while MS Excel files use the
extension .xls and text files have the extension .txt.
Each software package has one or more extensions used to indicate the type of file.
Other icons and extensions are used for other software packages, many packages having
different icons for each type of file the package recognizes. These icons are recognized
by the computer once that software is installed on your machine. On rare occasion
you will have a conflict 2 software packages use the same extension with different
meaning. Youll have to choose a default.
Be careful when you rename a file; do NOT change the file extension (the part of the
name after the dot). If you rename a file and change the extension, then the software
package will not recognize the file type, and you will not be able to access the file properly.
If the 3 letter extension does not show in My Computer or the Windows Explorer, its a
good idea to turn this on:
Uncheck
Hide extensions for known file types
to make sure that extensions are visible.
I recommend having this Apply to All
Folders by clicking the appropriate button.
1.29
The first part of a file name is up to you, as the user. I recommend keeping it short and
simple. Occasionally part of a long name is lost when you send a file as an email
attachment it depends on both your email system and the recipients system. This was a
greater problem a few years ago, but you may still run into it.
Take care when naming files that you will be posting to the Web:
Web file names are CASE SENSITIVE (UPPER vs. lower case). While capitalization
is ignored in filenames in Windows, UPPER and lower case letters are read as
different characters in Web-file names.
This means that CASE and Case and case would all be read as different file
names in a web environment; on a PC they are equivalent.
In naming files to be posted on the web, use only letters, numbers, the
underscore (_), and NO SPACES. Once a space is encountered in a name on a
file posted to the web, the rest of the name is lost (so use an underscore in place of a
space). For example in place of Personal Page.html which contains a space
(allowed in Windows!) use the name Personal_Page.html when creating a
personal webpage.
Deleting Files
When you delete files or folders from the hard drive (by dragging to the Recycle Bin or
using the delete button on the keyboard or on a menu), the file (all the bits of info) is not
deleted from the disk, but information on its physical location is moved to the Recycle
Bin. This gives you the chance to retrieve the file if you have deleted it in error. Until you
empty the recycle bin, files are retrievable simply click to open the recycle bin and drag the
file icon back to another location. Note: files deleted from a removable disk, USB drive
or network drive are deleted from the list of files, and location information is NOT
moved to the recycle bin and therefore these files are not readily retrievable.
However, even when a file has been deleted and the recycle bin emptied, it may still be
retrievable. Deleting a file merely removes its name from the directory, and indicates
that the space is available for re-use, but the information is still stored on disk until it
is over-written by another file. Programs such as Norton Utilities can be used to recover
deleted files, as long as new files havent overwritten the old files.
This is both good and bad news:
Good news for the day you make that awful mistake and delete something important
you may be able to find and retrieve it;
Bad news when you think you have deleted confidential information from a
computer. You must take some other action, such as reformatting an empty disk, or
cleaning up a hard disk, so deleted data is no longer accessible, even by
specialized software.
1.30
File Management
It is always a good idea to have some organized structure to storing files, otherwise you can
end up with endless lists of files to look through to find the one you want.
You can and should create FOLDERS on your disks, analogous to file folders for
storing actual papers that you are filing. Depending upon the scope of your project you may
want to organize folders by file type, date, user, or topic and various combinations of the
above.
While you are allowed by the system to give folders and files long, descriptive multi-word
titles in Windows, it is a good idea to be brief. Some applications have limits internally to file
name lengths, so part of a name can get lost.
If you will be sharing a file with other users, think about using a name that clearly
identifies you and/or the project. E.g., rather than a using name like draft1.doc a name
such as Pekow_691f_v1.doc is much more informative, and less likely to be overwritten
by another document with an identical name.
1.31
Virus Protection
A computer virus or worm is a file or segment of computer code that is designed to infect
files or systems by destroying required system files, copying endlessly and clogging up
systems or various other methods.
Virus protection software is particularly important in an environment where files are shared
through the web, email, and use of common computers in a lab. McAfee Virus protection
software is available to the UMass community once you have an OIT account. This is
distributed by CD when you obtain your account, or can be downloaded from the OIT
website.
PLEASE TAKE ADVANTAGE of the availability of the software, and update regularly.
1.32
A browser is a software program that lets you view web documents. Browsers translate
HTML-encoded files into the features (text, images, sound, motion) that you see on your
screen. Commonly used browsers are Netscape and MS Internet Explorer and Firefox.
Some ISPs (e.g., AOL) provide their own browser.
1.33
Each web page is a single document on the World Wide Web. This means it is an HTML
document stored on a web server, with an address. Every Web page address is identified
by a unique URL (Uniform Resource Locator). This provides the unique address of the web
page. You may type a URL into the address box and hit the enter key to access a page.
Or, more often, you will click on a Link provided in another web page. A link is a URL
imbedded in another document that allows you move directly to the new page.
A website is a set of interconnected web pages.
1.34