Sunteți pe pagina 1din 63

Digital Planet: Tomorrow’s Technology

and You 10th Ed

Week 2 Hardware & Software Basics


Pengantar Teknologi Informasi
Management Universitas Pertamina
1st Semester 2019/2020

Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall


Course Objectives
• Explain in general terms how computers store and manipulate information
• Describe the basic structure and organization of a computer
• Discuss the computer system’s main internal components and the ways they
interact
• Explain why a computer typically has different types of memory and storage
devices
• Describe three fundamental categories of software and their relationships
• Compare and contrast PC applications and Web applications
• Describe the role of the operating system in a modern computer system
• Outline the evolution of user interfaces from machine-language programming to
futuristic interfaces
• Describe some challenges of applying intellectual property laws to software

2
Hardware Basic

3
What Computers Do

Four basic operations:


• Receive input: Accept information from outside world
• Process information: Perform arithmetic or logical
operations on information
• Produce output: Communicate information to outside
world
• Store information: Store and retrieve information from
memory and storage devices

4
What Computers Do (cont.)
Hardware components
• Input devices
• Output devices
• Microprocessor (CPU)
• Memory and storage
devices
• Primary storage
• Secondary storage
• Peripherals
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5
Bit Basics

• Bit: From Binary digit


– Smallest unit of information computer can process
– Can have one of two values: 0 or 1
• Byte
– Collection of 8 bits
– Can represent 256
different messages
(256 = 28)

6
Bits as Numbers

• Denotes all numbers with combinations of 0s and 1s


• Decimal numbers automatically converted to binary
• Binary number processing hidden from user
Decimal Binary Decimal Binary
0 0000 5 0101
1 0001 6 0110
2 0010 7 0111
3 0011 8 1000
4 0100 9 1001

7
Bits as Codes

• Codes represent each letter,


digit, and special character
• ASCII: Most widely used
• Each character is a unique 8-bit
code
• 256 unique codes for 26 letters,
10 digits, special characters
• Unicode: Supports more than
100,000 unique characters
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 8
The World’s Languages

• ASCII character set was originally designed to include


only English-language characters from 0 to 127

• Unicode’s international standard character set


allows for more than 100,000 distinct codes to
include Chinese, Korean, Japanese, and Arabic
characters
9
Bits, Bytes, and Buzzwords

Byte = 8 bits or one character in ASCII


• Kilobyte (KB, K) ≈ 1,000 bytes
• Megabyte (meg, MB) ≈ 1,000 KB or 1 million bytes
• Gigabyte (gig, GB) ≈ 1,000 MB or 1 billion bytes
• Terabyte (TB) ≈ 1 million MB or 1 trillion bytes
• Petabyte (PB) ≈ 1 quadrillion bytes

10
The Computer’s Core:
CPU and Memory
• A digital computer is a collection of on/off switches
designed to transform information from one form to
another.
• The user provides the computer with patterns of
bits—input—and the computer follows instructions
to transform that input into a different pattern of
bits—output—to return to the user.

11
The CPU: The Real Computer

• CPU often called “processor”


• Performs transformations of input into output
• Interprets and executes instructions in programs
• Performs arithmetic and logical data manipulations
– ALU – Arithmetic and Logic Unit
• Communicates with other parts of the computer
system indirectly through memory

12
The CPU: The Real Computer
(cont.)
✓ Modern Microprocessor
• Complex collection of
electronic circuits
• CPU housed with other
chips on circuit board
• Circuit board containing
computer’s CPU is called
motherboard

Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 13


The CPU: The Real Computer
(cont.)
• Choosing a Computer
– Type of CPU is important part of decision
– Two important factors to consider:
• Compatibility
• Performance

14
Compatibility

• Not all software is compatible with every CPU.


• Every processor has built-in set of instructions.
• CPUs in same family are generally backward compatible.
– Designed to process instructions handled by earlier models
• AMD processors made to be compatible with Intel.
• Also, software compatible with one operating systems
won’t work on a different operating system
– Programs written for Linux can’t run on Windows.

15
Performance

• Some processors faster than others


• Performance is determined by:
– Speed of internal clock—measured in gigahertz (GHz)
– Architecture of processor
– Number of bits processor can process at one time
• Typically 32 or 64 bits—called word size

• Heat generated increases with clock speed

16
Performance (cont.)

✓ Multicore Processors
• Single chip contains
multiple CPUs (cores)
• Run simultaneously
• Divide work
• Most new PCs have at
least two cores.
• Quad core becoming
common
• Manycore – hundreds of
CPUs per chip.
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 17
From Multicore to Cluster

• Performance enhancing techniques aren’t confined


to the insides of CPU chips.
• Instead of adding more cores, a large system might
simply add more machines to a network.
• Parallel processing has been used in high-end
servers and workstations for some time.
• Threaded processing in multicore CPUs is like a
microscopic version of parallel processing used in
some of the world’s biggest computing networks.

18
The CPU

• Typical CPU is divided into several functional units:


– Control unit
– Arithmetic logic unit (ALU) includes registers
– Decode unit – About 100 distinct main instructions
• Programs often consist of millions of instructions
– Bus unit
– Prefetch unit
• These units work together to complete the execution
of program instructions.

19
The CPU (cont.)

20
Green Computing

• When compared to other industries the computer


industry is relatively easy on the environment.
• The manufacture and use of computer hardware and
software does have a significant environmental
impact.
• You have some control over the environmental
impact of your computing activities.

21
Green Computing (cont.)

• Buy green equipment – Print only once


• Use a laptop – Use a green font
• Take advantage of energy – E-cycle your waste
saving features products
• Turn off your computer – Pass it on
when you are away – Send bits not atoms
• Save energy, not screens – Consider hidden
• Avoid moving parts environmental costs

Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22


The Computer’s Memory

• Random access memory (RAM)


– Most common type of primary storage
– Stores program instructions and data temporarily
– Memory locations have unique addresses
– Volatile—disappears when power is turned off

23
The Computer’s Memory (cont.)

• Read-only memory (ROM)


– Information is etched on chip when manufactured
– Stores start-up instructions and other critical information
• Complementary metal-oxide semiconductor (CMOS)
– Special low-energy type of RAM
• Flash memory
– Can be written and erased repeatedly
– Used for digital cameras, cell phones, handheld computers

24
Memory

1. When you turn on the computer, the CPU automatically


begins executing operating system instructions stored in
ROM.
2. The executing instructions help the system start up and tell
it how to load the operating system—copy it from disk into
RAM.
3. Once instructions for the
operating system are
loaded into RAM, the CPU
is able to execute them.

25
Peripherals

• Slots and ports make it easy to add peripherals to


computer system.
• Some peripherals, such as keyboards and printers,
serve as communication links between people and
computers.
• Other peripherals link computer to other machines.
• Still others provide long-term storage media.

26
How Memory Works

• Memory can be thought of as millions of tiny storage


cells in a row with successive addresses.
• Each tiny cell contains 8 bits or one byte of
information.
• The information my include program instructions,
numbers (integers, reals, extended precision reals),
text characters, digital code for pictures, and other
data.

27
Memory (cont)

• RAM chips are usually grouped on small circuit


boards called dual in-line memory modules (DIMMs)
• These are plugged into the mother board.
• RAM memory is volatile and is lost when the power
is turned off.

28
ROM and Operating System

• ROM contains permanent programs (called


firmware) that include part of the operating system.
• When the computer is started, the CPU starts
executing the operating system instructions in ROM
• These ROM instructions are used to start up the
system and to copy the rest of the operating system
from disk into RAM.
• Once the instructions from the operating system are
in RAM, the CPU can start executing them.
29
Software Basic

30
Processing with Programs

• Software enables people to communicate certain


types of problems to the computer. Software makes
it possible for computers to communicate solutions
back to people.
• An algorithm is a set of step-by-step procedures for
accomplishing a task.
• Programmer’s job is to turn the algorithm into a
program by adding details, testing procedures, and
debugging or correcting errors.

31
Categories of Software

• Compilers and translator programs


• Translate high level language (java, C++, etc) to

machine language
• Enable programmers to create other software
• Software applications
• Serve as productivity tools to help users solve problems
• System software
• Coordinates hardware operations

32
Software Applications: Tools for Users
Software applications enable users to control
computers without having to think
like programmers.

33
Consumer Applications

• Thousands of software titles are available:


• Publishing programs
• Accounting software
• Graphics programs
• Educational titles
• Games
• Personal-information managers
• And more

34
Consumer Applications (cont.)
• Documentation: Instructions for installing and using
software—may be printed manuals or digital files (read
me or help)
• Updating (minor) and upgrading (major) software
• Compatibility: Read system requirements
• Disclaimer—an end-user license agreement (EULA)—
protects companies from errors in programs
• Licensing: Buy software license not program
• Distribution by direct sales or download from Web
• Includes public-domain software (free for taking) and
shareware (free trial)
35
Web Applications

• Growing trend toward using applications that run on


remote Internet servers instead of local PCs.
• Typically require web browser to work
• Google Docs
• Photoshop.com
• Webmail programs: Gmail, Hotmail, Yahoo! Mail
• Multiplayer games
• Wikis: Wikipedia
• Retail sites: Amazon.com and online auctions, eBay
• Online communities: Facebook 36
Web Applications (cont.)

• Mashups: Web applications that provide new


services by combining data or functionality from two
or more external sources
• Web site might combine crime statistics from a police
Web site with maps from Google to create visual
representations of where crimes are occurring
• Another might combine language translation with
Web search to allow a user to search for terms in
another language
• Example woozor.com

37
Vertical-Market and Custom Software

• Basic office applications are used in homes, schools,


government offices, and all types of businesses.
• Other applications are job specific:
• Medical billing software
• Library cataloging software
• Legal reference software
• Restaurant management software
• Tend to cost far more than mass-market applications

38
System Software:
The Hardware-Software
Connection
• System software: Class of software that includes the
operating system and utility programs
• Handles low-level details and hundreds of other
tasks behind the scenes
• User does not need to be concerned about details
39
What the Operating System Does

• Every computer depends on an operating system to:


• Keep hardware running efficiently
• Make process of communication with hardware easier
• Maintains file system
• Supports multitasking
• Manages virtual memory
• Operating system runs continuously when computer
is on

40
What the Operating System Does

The User’s View

41
Utility Programs

• Serve as tools for doing system maintenance and


repairs not handled by operating system
• Utilities make it easier for users to:
• Copy files between storage devices
• Repair damaged data files
• Translate files so different programs can read them
• Guard against viruses and other harmful programs
• Compress files so they take up less space

42
Device Drivers

• Small programs that enable input/output devices to


communicate with the computer, such as:
• Keyboards
• Mice
• Printers
• Many device drivers are bundled with peripherals
• Others are sold as separate products

43
Where the Operating System Lives

• Some computers store operating systems in ROM


• Most modern PCs hold only a small portion of the
operating system in ROM
• Remainder of operating system is loaded during
booting, when computer is turned on
• Handheld devices may store operating system in
flash memory

44
The Operating System
When you turn on the computer, the CPU automatically begins executing instructions
stored in ROM. The operating system (OS) loads from the disk into part of the
system’s memory.

45
The Operating System (cont.)
The OS loads the application program into memory and remains in memory,
so it can provide services to the application program—display on-screen
menus, communicate with the printer,
and perform other common actions.

46
The Operating System (cont.)

To avoid losing your data file when the system is turned off,
save it to the disk. When you reopen the file, the OS locates it on the disk
and copies it into memory.

47
The User Interface:
The Human–Machine Connection
• User interface: Critically important component of
software
• Early users spent tedious hours writing and
debugging machine-language instructions.
• Later users programmed using easier languages that
were still challenging.
• Now, most users work with preprogrammed
applications.

48
Desktop Operating Systems

• MS-DOS: Standard on IBM-compatible computers in


1981
• Used command-line interface that required users to
type commands
• Apple Macintosh introduced windows, icons, and
mouse-driven, drop-down menus in 1984.
• Windows and Mac OS started as single-user
operating systems but today support multiple users.

49
UNIX and Linux

• UNIX: Command-line, character-based OS


• Internet is populated with computers running UNIX
• Enables timesharing computer to communicate with
several other computers at one time
• OS of choice for workstations and mainframes in
research and academic settings
• Favored by many who require an industrial-strength,
multiuser OS
• Linux, a UNIX clone, is distributed and supported free

50
Hardware and Software Platforms

• Microsoft Windows 7: Introduced in 2009 is latest


version
• Microsoft Windows Server: Runs on small servers to
the mightiest hardware
• Windows Embedded CE: Designed for devices such
as robots, voting machines, music players, etc.
• Windows Phone 7: New OS for mobile phones
• Mac OS X (10): Standard for the Mac

51
Hardware and Software Platforms (cont.)

• iOS: Used for iPhone, iPad, and iPod


• Linux, Sun Solaris, and other Unix variations
• Google Chrome OS: Linux based OS for low-cost PCs,
netbooks, and tablet devices
• Google Android: Designed for smart phones
• Blackberry OS: Proprietary multitasking OS
• Palm WebOS: Proprietary smart phone OS

52
Compatibility Issues

• Operating systems are


designed to run on
particular hardware
platforms.
• Applications are designed
to run on particular
operating systems.
• Most cloud applications
are designed to run on
multiple platforms.

53
Software Piracy and
Intellectual Property Laws
• Software piracy: Illegal duplication of copyrighted
software—is rampant
• Few software companies use physical copy
protection methods and that makes copying easy
• Many people unaware of laws
• Others simply look the other way

54
The Piracy Problem

55
Intellectual Property and the Law

• Intellectual property: Includes the results of intellectual


activities in the arts, science, and industry
• Copyright laws: Protects books, plays, songs, paintings,
photographs, and movies
• Trademark law: Protects symbols, pictures, sounds,
colors, and smells.
• Patent law: Protects mechanical inventions
• Contract law: Covers trade secrets
• Under the law, software does not fit in these categories.
56
Summary

• A computer manipulates patterns of bits


represented by two symbols: 0 and 1.
• Bits can be grouped into coded messages that
represent alphabetic characters, pictures, colors,
sounds, and other kinds of information.
• The microprocessor follows software instructions to
perform calculations and logical manipulations that
transform input data into output.

57
Summary (cont.)

• Not all CPUs are compatible with each other.


• Modern CPUs employ multicore or many core
processing systems that speed calculations.
• The CPU uses RAM (random access memory) as a
temporary storage area.
• ROM (read-only memory) contains unchangeable
information.

58
Summary (cont.)

• The CPU and main memory are housed in silicon


chips on the motherboard and other circuit boards
inside the computer.
• Buses connect to slots and ports that enable the
computer to communicate with internal devices and
external peripherals.

59
Summary (cont.)

• Software provides communication link between


humans and computers.
• Three main categories: translator programs,
applications, and system software.
• Applications and documentation can be delivered on
physical media or downloaded from the Web.
• Programmers develop vertical-market and custom
packages when general commercial programs won’t
do the job.

60
Summary (cont.)

• Computer’s operating system functions behind the


scenes, translating software’s instructions into
messages hardware can understand.
• Popular operating systems include: Microsoft
Windows, Mac OS X, UNIX, and Linux.
• Operating system manages programs and data files.
• Utility programs handle problems that operating
system can’t solve.

61
Summary (cont.)

• Well-designed user interface shields user from bits


and bytes.
• Computer industry has moved towards friendlier
graphical user interfaces.
• Future interfaces are likely to depend more on voice,
3D-graphics, and animation.
• Computers use hierarchical file system.
• Software piracy has flourished in many countries.

62
All rights reserved. No part of this publication may be reproduced,
stored in a retrieval system, or transmitted, in any form or by any
means, electronic, mechanical, photocopying, recording, or
otherwise, without the prior written permission of the publisher.
Printed in the United States of America.

63

S-ar putea să vă placă și