Sunteți pe pagina 1din 8

LECTURE 1 – INTRODUCTION TO COMPUTER  Digital Revolution – an ongoing process of social,

political, & economic change brought about by


COMPUTER HISTORY: BEFORE PERSONAL COMPUTERS digital technology
 Information Processing Cycle – collects  Digitization – process of converting text, numbers,
data(input), processing, storage, produces sound, photos, & video into data that can be
information(output) processed by digital devices
 Calculators – first computers of any kind; evolved
from mechanical to electronic digital DATA PROCESSING
o Mechanical Calculators – earliest calculating  1980s – beginning of the digital revolution
device is the abacus (China, 12th century),  Data Processing – based on an input-processing-
which is a simple wooden rack holding parallel output cycle
rods on which beads are strung
 Earliest Computing Devices: PERSONAL COMPUTING
o Abacus  Model for the 2nd phase of the digital revolution;
o Napier’s Bones – by John Napier; has 11 rods w/ characterized by small, standalone computers
numbers to obtain products & quotients of large powered by local software
numbers o Local Software – refers to any software that is
o Oughtred’s Slide Rule (17th century) – by William installed on a computer’s hard drive
Oughtred; has two rulers side-by-side
o Pascal’s Calculator (France, 1645) – by Blaise NETWORK COMPUTING
Pascal; has series of wheels capable of addition  3RD phase of the digital revolution; materialized as
& subtraction computers became networked and when the
o Leibniz’s Calculator (1694) – by Gottfried Leibniz; Internet was opened to public use
can add, subtract, multiply, divide, & extract  Computer Network – group of computers linked
square roots together to share data & resources
o Babbage’s Analytical Engine (19th century) – by  Internet – global computer network originally
Charles Babbage developed as a military project, & was then
 Father of Modern Computer handed over to the National Science Foundation
 Developed the Difference Engine (1822) for research & academic use
 Developed the Analytical Engine – has the  Web – a collection of linked documents, graphics,
Operation Card (for operations) & the & sounds that ca be accessed over the Internet
Variable Card (for actual data)  1995 – 2010 – computing was characterized by
 Lady Ada Byron – countess of Lovelace; the the Web, e-mail, etc.
first programmer
o Hollerith’s Punched-Card Machine (1880s) – by CLOUD COMPUTING
Herman Hollerith; used 3” x 5” punch cards  4th phase of the digital revolution; provides access
which holds the data; his company is the to info, apps, communication, & storage over the
forerunner of the IBM corporation Internet
 Early Computers:  Convergence – several technologies w/ distinct
o Z1 Computer (1936) – by Konrad Zuse, Henschel functionalities evolve to form a single product; it
Aircraft Company, in Berlin, Germany; First created sophisticated mobile devices whose
Binary Computer owners demand access to the same services
o Z2 Computer (1939) – First Fully-Functioning available from full-size computers on their desks
Electro-Mechanical Computer  Social Media – cloud-based applications
o Z3 Computer (1941) – First Fully Programmable designed for social interaction & consumer-
Digital Computer generated content
o Atanasoff-Berry Computer (1939-1942) – First
Electronic Digital Computer; by John Atanasoff DIGITAL SOCIETY
& Clifford Berry, in Iowa State University  Digital Technologies & Communications Networks
o Mark-1 (1944) – Automatic Sequence – make it easy to cross cultural & geographic
Controlled Calculator; by Howard Aiken; First boundaries
Automatic General-Purpose Computer  Intellectual Property – refers to the ownership of
o ENIAC (1946) – Electronic Numerical Integrator certain types of info, ideas, or representations
& Computer; First True General-Purpose  Digital Technology – important factor in global &
Electronic Computer; by Presper Eckert Jr. & national economies, affecting the economic
John Mauchly, University of Pennsylvania; nit a status of individuals; permeates the very core of
stored-program computer modern life
o EDVAC (1952) – Electronic Discrete Variable  Globalization – defined as the worldwide
Automatic Computer; First Stored Program economic interdependence of countries that
Computer; by Mauchly & Eckert occurs as cross-border commerce increases and
o EDSAC (May 1949) – Electronic Delay Storage as money flows more freely among countries
Automatic Calculator; Cambridge University,  Digital Divide – gap between people who have
England; used symbolic programming instead access to technology and those who do not
of machine codes
o UNIVAC (1948) – Universal Automatic COMPUTER BASICS
Computer; based on EDVAC; UNIVAC I – was  Computer – multipurpose device that accepts
usually regarded as the most successful input, processes data, stores data, & produces
electronic data processor of its day output, all according to a series of stored
instructions
THE DIGITAL REVOLUTION
 Computer Input – whatever typed, submitted, or  Quantifying Bits & Bytes
transmitted to a computer system o Bit – one binary digit
 Output – result produced by a computer o Byte – 8 bits
 Data – refers to the symbols that represent facts,
objects, & ideas CIRCUITS & CHIPS
 Processing – computer manipulates data in many  Integrated Circuit (IC) – super-thin slice of
ways; Central Processing Unit (CPU) & semiconducting material packed with
Microprocessor microscopic circuit elements
 Memory – area of a computer that temporarily  Motherboard – electronic components of most
holds data waiting to be processed, stored, or digital devices are mounted on a circuit board
output called a system board or main board
 Storage – area where data can be left on a
permanent basis when it is not immediately PROGRAMS & INSTRUCTION SETS
needed for processing  Source Code – human-readable version of a
 File – named collection of data that exists on a program created in a high-level language by a
storage medium programmer
 Software – series of instructions that tells a  Compiler – converts statements written in a high-
computer how to carry out processing tasks is level programming language into object code
referred to as a computer program that the processor can execute
 Stored Program – a series of instructions for a  Interpreter – converts high-level statements one at
computing task can be loaded into a computer’s a time as the program is running
memory  Instruction Set – microprocessors are hard-wired to
o Allows you to switch tasks perform a limited set of activities, such as addition,
o Distinguishes a computer from other simples and subtraction, counting, & comparisons; has
less versatile digital devices sequences of 0s & 1s
 Application Software – set of computer programs  Machine Code – end product
that helps a person carry out a task; also called  OP Code (operation code) – command word for
apps an operation such as add, compare, or jump
 Operating Systems (OS) – primary purpose of  Operand – specifies the data, or the address of
system software is to help the computer system the data, for the operation
monitor itself in order to function efficiently
PROCESSOR LOGIC
COMPUTER TYPES & USES  Arithmetic Logic Unit (ALU) – part of the
 Personal Computer – microprocessor-based microprocessor that performs arithmetic
computing device designed to meet the operations; uses registers to hold data that is
computing needs of an individual being processed;
 Workstation  Instruction Cycle – refers to the process in which a
o Ordinary Personal Computer – connected to a computer executes a single instruction
network
o Powerful Desktop – computer used for high- AUTHENTICATION PROTOCOLS
performance tasks  Protocol – any method that confirms a person’s
 Server – serves computers on a network by identity using something the person knows,
supplying them with data possesses, or something the person is
 Mainframe Computer – a large & expensive o Biometrics – a person’s identification, such as,
computer capable of simultaneously processing fingerprint, facial features (photo), or retinal
data for hundreds or thousands of users pattern
 Supercomputer – falls into this category if at the o User ID – series of characters – letters, numbers,
time of construction, it is one of the fastest or special symbols – that become a person’s
computers in the world unique identifier
o Compute-Intensive Problem – requires massive o Password – series of characters that verifies that
amounts of data to be processed using you are the person you claim to be
complex mathematical calculations
PASSWORD HACKS
MICROCONTROLLERS  Identity Theft – when someone gains unauthorized
 Microcontroller – a special-purpose access to your personal data & uses it illegally
microprocessor that is built into the machine it  Dictionary Attack – helps hackers guess your
controls; can be embedded in all sorts of password by stepping through a dictionary
everyday devices containing thousands of the most commonly used
passwords
DATA REPRESENTATION BASICS  Brute Force Attack – uses password-cracking
 Data Representation – the form in which data is software, but its range is much more extensive
stored, processed, & transmitted than the dictionary attack
 Digital Data – text, numbers, sound, & video that  Sniffing – intercepts information sent out over
has been converted into discrete digits such as 0s computer networks
& 1s  Phishing – more sophisticated approach to
 Analog Data – represented using an infinite scale password theft
of values  Keylogger – software that secretly records a user’s
 Numeric Data – binary number system keystrokes & sends the info to a hacker
 Character Data – ASCII, EBCDIC, Extended ASCII,
Unicode SECURE PASSWORDS
 Password Manager (keychain) – stores user IDs w/ o USB Port – computer to peripheral devices
their corresponding passwords & automatically o Parallel Port – computer to peripheral devices
fills in login forms o Serial Port – computer to peripheral devices
 Expansion Slots
LECTURE 2 – FUNDAMENTALS OF COMPUTERS o Industry Standard Architecture (ISA) – 8-bit/16-
bit; older & seldom used
WHO IS IN CONTROL OF PC SOFTWARE & HARDWARE? o Extended Industry Standard Architecture (EISA)
 Microsoft – controls the OS used on PCs (software) – 32-bit; older & seldom-used
 Intel & AMD - controls & PC motherboard; supplies o Microchannel Architecture (MCA) – IBM-
vast majority of processors & motherboard proprietary 32-bit; older & seldom used
chipsets to other motherboard manufacturers o Peripheral Component Interconnect (PCI) – 32-
(hardware) bit/64-bit; standard slot used in most computers
o Advanced Graphics Port (AGP) – 32-bit;
BASIC PC COMPONENTS designed for video adapters
 Computer Case – provides protection & support o PCI-Express – serial bus expansion slot
for the internal components; all PCs need a power  Storage Drives – reads or writes info to magnetic
supply to convert AC to DC or optical storage media; store data permanently
o Contains the framework to support a or to retrieve info from a media disk
computer’s internal components while  Internal Cables – power cable & data cable
providing an enclosure for added protection  Ports & Cables – I/O ports connect peripheral
o Form Factor – size & layout of a case devices, such as printers, scanners, etc.
 Power Supply – converts AC power from wall  Input Devices – used to enter data/instructions
outlet to DC into a computer
 Motherboard – main printed circuit board;  Output Devices – used to present info to the user
contains the buses, or electrical pathways, found from a computer
in a computer; also known as the system board,
backplane, or main board LECTURE 3 – COMPUTER SOFTWARE
o Buses allow data to travel between the various
components that comprise a computer SOFTWARE CATEGORIES
o Accommodates the CPU, RAM, etc. 1. System Software – designed for computer-centric
 Central Processing Unit (CPU) – computer’s brain; tasks
processor; most calculations take place here; 2. Application Software – designed to help people
most important elements of a computer system accomplish real-world tasks
 Cooling Systems
 CPU Fans – heat sink draws heat away from the MUSIC SOFTWARE
core of the CPU; a fan on top of the heat sink  Offers many ways to work with music, sound
moves the heat away from the CPU effects, & narration (iTunes & audio editing
 Graphics Card Cooling System – video adapter software)
cards produce a great deal of heat; fans are
dedicated to cool the graphics-processing unit VIDEO SOFTWARE
(GPU)  Provides a set of tools for creating video
 ROM & RAM productions from raw footage
o Read-only Memory (ROM) – located on  Consumer-level video editing software:
motherboard; contain instructions that the CPU o Windows Movie Maker
can access directly; stores basic instructions for o Apple iMovie
booting the computer and loading the OS  DVD authoring software
o Random-access Memory (RAM) – temporary
storage for data & programs that accessed by GRAPHICS SOFTWARE
the CPU; is volatile memory, contents are  Designed to help you create, manipulate, & print
erased when the computer is powered off graphics
o SRAM – cache memory to store the most o Paint software
frequently used data; gives the processor faster o Photo editing software
access to the data than retrieving it from the o Drawing software
slower DRAM, or main memory o 3-D graphics software
 Adapter Cards – increase a computer’s o CAD software
functionality by adding controllers for specific
devices or by replacing malfunctioning ports MAPPING & LOCATION-BASED SOFTWARE
o Network Interface Cards (NIC) – connects a  Mapping Application – Displays satellite, aerial, or
computer to a network using a network cable street maps used to locate places & get directions
o Wireless NIC – connects a computer to a (Google Maps)
network using radio frequencies  Location-based Software – accesses your current
o Sound Adapter – provides audio capability location and uses it to show you the closest shops,
o Video Adapter – provides graphic capability restos, & theaters, as well as info about each
o Modem Adapter – connects a computer to the location
Internet using a phone line
o SCSI Adapter - connects SCSI devices, such as BUSINESS & “NUMBER CRUNCHING” SOFTWARE
hard drive/tape drive, to a computer  Vertical Market Software – designed to automate
o Raid Adapter – connects multiple hard drives to specialized tasks in a specific market/business
a computer to provide redundancy & to  Horizontal Market Software – generic software
improve performance that just about any kind of business can use
o Payroll Software  Structure Query Language – provides a set of
o Accounting Software commands for locating & manipulating data
o Project Management Software o Presentation Software – supplies the tools for
 Businesses use it for planning & analysis. combining text, photos, clip art, & etc. into a
o Statistical Software series of electronic slides that can be shown on
o Mathematical Modeling Software a computer screen or projector

DESKTOP PUBLISHING SOFTWARE INSTALLING SOFTWARE & UPGRADES


 Word processing  next level by providing  Web Apps
professional tools for producing typeset-quality o Software Installation – process that places a
docs; available in consumer-level & prof-level program into a computer so that it can be
 Allows you to create a page using multiple frames run/executed
o Web Application – software that is accessed
PERSONAL FINANCE SOFTWARE with a Web browser (i.e. cloud computing)
 Money Management Software – variety of tools for  Mobile Apps – designed for a handheld device
tracking cash flow & investments o Can be purchased from an app store
 Personal Finance Software – like Intuit Quicken, o Jailbreak – unauthorized change to the
designed to keep track of income, expenses, device’s software
assets, & liabilities using simple checkbook-like UI  Local Applications
 Tax Preparation Software – specialized type of o Contains a setup program that guides you
personal finance software designed to help you through the installation process
gather your annual income & expense data,  Portable Software – designed to run from
identify deductions, & calculate tax payments removable storage
 Software Upgrades & Updates
UTILITY SOFTWARE o Software Update – small section of program
 Designed to help you monitor & configure settings code that replaces part of the software you
for your digital gear, its OS, or application software currently have installed (i.e. service packs)
 PDF Reader – like Adobe Reader, an essential that  Uninstalling Software
displays documents stored in PDF files o Uninstall Routines – delete the software’s files
 Adaptive Utilities – alter a device’s UI to create an from the various folders on your computer’s HDD
accessible environment (CC, text-to-text speech,
speech-to-text, or large screen text) BUYING SOFTWARE
 System Utilities – track down and fix disk errors,  Consumer Basics
repair corrupted files, & give your device a o System requirements specify the required OS &
performance-enhancement tune-up minimum hardware capacities for a software
product to work correctly
DEVICE DRIVERS  Copyright – form of legal protection that grants
 Software that helps a peripheral device establish the author of an original work exclusive rights (i.e.
communication with a computer copyright notice)
 Software Licenses – also called license
OFFICE SUITES agreements, define the ways in which you may
 Office Suite – collection of programs that include use a computer program (i.e. EULA)
word processing, spreadsheet, presentation, &  Freeware – copyrighted software that is available
database modules for free
o Word Processing Software – replaced  Product Activation – means of protecting
typewriters for producing documents, etc.; software from illegal copying by requiring users to
displays a work area, called a workspace, that enter a product key or activation code before the
represents a blank piece of paper; software can be use
 Word Wrap o Hash Value – unique number derived from
 Search & Replace encoding one or more data sets, such as
 Thesaurus names, serial numbers, & validation codes
 Grammar Checker
 Spelling Checker SECURITY SOFTWARE
 Final Format:  Designed to protect computers from various forms
» Page Layout – physical position of each of destructive software & unauthorizes intrusions
element on a page  Malicious Software/Malware – any computer
» Paragraph Style – alignment of text within program designed to surreptitiously enter a
the margins & the space between each computer, gain unauthorized access to data, or
line of text disrupt normal processing operations
» Font – set of letters that share a unified  Rootkit – software tools used to conceal malware
design & backdoors that have been installed on a
o Spreadsheets Software – uses rows & columns of victim’s computer
numbers to create a model or representation of  Virus Hoax – email message containing dire
a real solution warnings about a supposedly new virus on the
 Formula – tells the computer how to use the loose
contents of cells in calculations  Security Suite – integrates several security
o Databases Software – collection of data; helps modules to protect against the most common
you enter, find, organize, & etc. information types of malware, unauthorized access, & spam;
stored in database costs less than purchasing standalone security
modules
 Antivirus Modules WHAT IS UNIX?
o Antivirus Software – type of utility software that  A multi-task & multi-user OS
looks for & eradicates viruses, etc.  Developed in 1969 at AT&T’s Bell Labs by Ken
o Virus Signature – section of program code, used Thompson (UNIX), Dennis Ritchie (C), & Douglas
to identify a known malicious program Mcilroy (Pipes).

LECTURE 4 – POWER SUPPLY WHAT IS LINUX?


 A clone of Unix
CELL & BATTERY  Developed in 1991 by Linus Torvalds (Finnish)
 It is the fundamental source of electrical energy  Inspired & replacement of Minix
develop through the conversion of chemical or  Linus’ Minix became Linux
solar energy a battery.  Originally developed for 32-bit x86-based PC
 They have the advantage of being portable and
ripple-free. OPERATING SYSTEM
 2 Major Divisions:  Program of software that governs the functioning
o Primary Cells of other programs; interface between the User &
o Secondary Cells the Hardware; allocates resources for tasks,
allocates tasks to programs; manages space &
POWER SUPPLY time; controls the devices
 It is a device that converts the available power  Types:
source into a form that is suitable by a particular o Tasks – Uni & Multi
system; converts AC signal to fixed DC (e.g. o Users – Single & Multi
unregulated & regulated) o Processing - Uni & Multi
o Unregulated - one whose dc terminal voltage is o Timesharing
affected significantly by the amount of load;
load draws more current, the dc terminal FREE OPEN SOURCE SOFTWARE (FOSS)
voltage becomes less  Free – means liberty, & not related to prices/cost
o Regulated - is a dc power supply whose terminal  Open-Source Code – available & anybody can
voltage remains almost constant regardless of contribute to the development; organization-
current drawn from it independent
 Transformer - either to step up or (mostly) step  4 Freedoms:
down the ac supply voltage to suit the o Freedom to run the software anywhere
requirement of the solid-state electronic devices o Freedom to study how the programs work
and circuit fed by the dc power supply; provides o Freedom to redistribute copies
isolation form the supply line-an important safely o Freedom to improve the software
consideration (e.g. transformer w/ center-tap &
without center-tap) KERNEL
 Rectifier - is a circuit which employs one or more  Core/nucleus of an OS
diodes to convert ac voltage into pulsating dc  Interacts with the hardware
voltage  First program to get loaded when the system starts
o Half-wave - the alternating secondary voltage & runs until the session gets terminated
is applied to a diode connected in series with a  Different from BIOS, which is hardware-
load resistor RL; let the equation of the dependent
alternating secondary voltage be V s = Vsm  Software-dependent
o Full-wave - both half-cycle of the input is utilized  Types:
with the help of two diodes working alternately o Monolithic – OS-related code stuffed in a single
 Filter - is a circuit used to smoothen out the module; single file; adv: faster functioning
voltage ripple or to minimize the ripple content at o Micro – OS components are isolated; supports
the output of the rectifier modularity; lesser in size
o Shunt Capacitor Filter - a suitable single
capacitor (C) is connected across the rectifier SHELL
and in parallel with the load to achieve filtering  Program that interacts with kernel
action; the sole function of the diode is to  Bridge between kernel & the user
recharge C and the sole function of C is to  Command interpreter
supply load current by discharge
 Voltage Divider - its function is to provide different COPYLEFT
dc-voltages needed by different electronic  Termed by Richard Mathew Stallman
circuits; it consists of a number of resistors  Liberates info from the proprietary legal
connected in series across the output terminals of encumbrances associated with conventional
the voltage regulator copyright
 Bleeder Resistor – placed across the filter output
 Voltage Regulator - used to maintain constant DC MULTICS (1964)
voltage level regardless to the change of input  Multiplexed Information & Computing Service
voltage and load resistance  Timesharing OS
o Adjustable IC – allows the user to set the output  Last version shutdown on October 30, 2008
voltage to a preferred regulated value  Monolithic Kernel

UNICS (1969)
LECTURE 5 – LINUX OS CONCEPTS  Uniplexed Information & Computing System
 Renamed as UNIX
 Ken Thompson, Dennis Ritchie o Operating System – type of system software that
 Multi-user, Multi-tasking, & Timesharing acts as the master controller for all activities that
 Monolithic Kernel take place within a computer system
o Multitasking – provides process & memory
MINIX (1990) management services that allow two or more
 Minimal Unix tasks, jobs, or programs to run simultaneously
 Tanenbaum developed this OS o Multithreading – allows multiple parts, or thread,
 Mainly for educational purpose to run simultaneously
o Multiprocessing – supports a division of labor
LINUX (1991) among all the processing units
 Developed by Linus Torvalds o Memory Leak – when an app requests memory
 Multi-user, Multi-tasking, & Timesharing but never releases it; causes an app not to
 Monolithic Kernel function properly
 The Boot Process
FREE SOFTWARE FOUNDATION o The operating system is loaded into RAM; the
 Founded by Richard Stallman in 1983 kernel provides essential OS services
 Organization that started developing copylefted  User Interfaces
programs o Combination of hardware & software that helps
 GNU Project – GNU Not Unix people & computers communicate with each
other
BROWSERS o Menus, submenus, & dialog boxes
 Mozilla – first open source browser; released from
Netscape group TODAY’S OPERATING SYSTEMS
 Firefox – high performance, feature rich,  iOS – OS for the Apple iPhone & was derived from
standards-based web browser the Mac OS X code
 Sea Monkey – integrated web application suite  Android – a mobile OS that is a popular platform
derived from the mozilla source code for tablet computers, smartphones, & e-book
readers
FILE MANAGEMENT COMMANDS  UNIX & Linux
o UNIX (1969) – at AT&T’s Bell Labs; dependable in
COMMANDS multiuser environments
 File management o Linux – OS distributed along with its source code
o mkdir – creating directory under the terms of a General Public License
o rmdir – removing directory & its contents (GPL)
o cd – change directory  Linux Distribution – download that contains
o cp – copying files the Linux kernel, system utilities, GUI, apps, &
o mv – moving/renaming files and installation routine
o ln – creating links between files  BlackBerry OS – proprietary OS produced by RIM;
 man, pinfo, info – help about commands key feature: ability to work with corporate e-mail
 cat – viewing file’s content software systems produced by Microsoft & IBM
 Viewing users, processes
o who – lists all users FILE BASICS
o who am I – lists the current user  File Names & Extensions
o pstree – displays all processes running in the o File-naming Conventions:
system in tree format  Case-sensitivity
o ps – displays processes owned by the current  Maximum Length
user  Spaces Allowed
 Changing file permission/owner  Numbers Allowed
o chmod – changes file permission  Characters Not Allowed
o chown – changes file owner  File Names Not Allowed
 Listing files o File Extensions – provide clues to the file
o ls – lists all files in a directory contents
o ls—a – lists all files (including hidden files)  File Directories & Folders
o ls—l – lists filesi n a directory along with the o File’s Location – first specify the device where
owner info, permission, etc. the file is stored; main HD is referred to as drive
 Terminal Emulator C; macs do not use drive letters
o xterm – generates a terminal o Disk Partition – section of hard disk drive that is
o xterm —fg color | —bg color | —rightbar – treated as a separate storage unit; partitions –
generates a terminal with the specified can be assigned drive letters & are not the same
background & foreground color & a scroll bar as folders
on the right side o Directories:
 Root Directory
LECTURE 6 – OPERATING SYSTEMS & FILE  Subdirectory – depicted as folders
MANAGEMENT o File Specification/Path – computer’s file location
 File Formats
o File Format – organization & layout of data that
OPERATING SYSTEM BASICS is stored in a file
 Operating System Tasks  Usually includes a header, data, & possible an
end-of-file marker
 File Header – section of data at the beginning o Disk Image – bit-by-bit copy of the data from all
of a file that contains info about a file sectors of a disk
 File Extension – doesn’t really define the
format of a file EVALUATION OF EXPERIMENTS
FILE MANAGEMENT EXPERIMENT #1
 File Management Metaphors 1. Which type of memory transfers data twice as fast
o File Management Utility – helps you manage as SDRAM & increases performance by
files in your OS transferring data twice per cycle? DDR-SDRAM
o Storage Metaphors – help you visualize & 2. Which type of video connector has a 24-pin or 29-
mentally organize the files on your disks & other pin female connector & provides compressed
storage devices (logical storage models) digital output to a monitor? DVI
 File Explorer – makes it easy to drill down through 3. How many universal serial bus (USB) devices can
the levels of the directory hierarchy to locate a be connected to a USB port? 127
folder/file; helps you manipulate files & folders 4. What is the purpose of a heat sink installed on a
 Physical Storage Model – describes what processor? To cool the processor
happens on disks & in the circuits 5. Which device is designed specifically to protect
o Formatting – prepares the surface of a disk to computers and electrical devices from excess
hold data in storage areas called sectors electrical voltage? Surge Protector
o File System – keeps track of the names & 6. Which condition refers to a sudden and dramatic
locations of files increase in voltage, which is usually caused by
 NTFS lighting? Spike
o Fragmented Files – stored in non-contiguous 7. A technician is installing a new power supply in a
clusters & decrease performance computer. Which type of power connector
o Defragmentation Utilities – rearrange files so that should be used to connect to a CD-ROM? Molex
they are stored in contiguous clusters 8. A technician is installing a new power supply in a
computer. Which type of power connector
BACKUP SECURITY should be used to connect to an ATX
 Backup – stores the files needed to recover data motherboard? 20-pin connector
that’s been wiped out by operator error, viruses, 9. When installing adapter cards in a computer, how
or hardware failures should a technician properly secure the card?
 Synchronization – compares the content of files Install the card, and secure it to the case with a
on two devices & makes them the same screw
 Time Machine – supplied with Mac OS X is a good 10. Which connector is used to external peripherals?
example of synchronization software USB
 Windows Backup – windows 8 has a
synchronization utility called File History EXPERIMENT #2
o Full System Backup – includes a copy of every 1. You are installing Windows XP Professional on a
file stored on your computer’s hard drive system. The first step in the installation process is:
o Boot Disk – removable storage medium Start the computer from CD/USB
containing the OS files needed to boot your 2. In Windows XP, which disk properties can you view
computer w/o accessing the hard disk with Disk Management EXCEPT? Compression
o Recovery Disk – bootable CD, DVD, or other that’s been applied to the drive
media that contains a complete copy of your 3. Identify the functions you can perform with the
computer’s hard disk as it existed when the Task Manager. Identify processes associated with
computer was new an application
o Recovery Partition – located on the computer’s 4. Which of the following statements characterize
hard disk & contains the necessary files to the Standby power consumption options? The
restore a computer to its original state operating system continues to run
o Windows Registry – important group of files used 5. Certain services on a computer running Windows
by the Windows OS to store configuration about XP Professional will not load when the computer
all the devices & software installed on a boots. You would like to track the progress of the
computer system boot process. How should you do this in Windows
o Restore Point – snapshot of your computer XP Professional? Enable Boot Logging on the
settings Advanced Boot Options page accessed through
 Backup Software – set of utility programs designed F8 at startup
to back up & restore some or all of the files on a 6. One of your users is visually impaired and requires
computer’s primary storage device assistance with his display. What Windows XP
o Full Backup – a backup made by copying all Professional option can you offer this user? Use the
the files to a backup device Accessibility Wizard to configure the Magnifier
o Differential Backup – makes a backup of only option for this user
those files that were added/changed since 7. You are working on a computer that will not boot
your last full backup normally. You try to boot into safe mode, but the
o Incremental Backup – backup of the files that computer is still unable to start. At this point, how
were added/changed since the last backup – can you diagnose the computer? Run the
not necessarily the files that changed from the recovery console from CD to diagnose the
last full backup computer
o Bare-metal restore – restores the computer in a 8. You wish to set the compression state of a file in
single step Windows XP Professional. How would you
accomplish this? Open the Properties of the file. In
Advanced Attributes, select the option to 9. What PowerShell command would you use to
compress/decompress the file activate a sideloading product key? Slmgr /ipk
9. You wish to convert a FAT32 file system to NTFS <sideloading product key>
after you’ve installed Windows XP Professional. 10. Apps that are installed in the Windows image are
Identify the ways in which you can do this. Use the called _____. These apps are staged in the image
CONVERT command and are scheduled to be installed for every user
10. Which partition type is available on a basic disk? of the Windows image at first logon or the next
Primary Partition logon, if the user account is already created.
11. Support program files for PC application often Provisioned apps
have a(n) _____ extension. .dll
12. A service pack _____. Provides updates to the
operating system
13. A security suite will typically include all of the
following EXCEPT _____ software. Browser
14. During product activation, you must _____. Enter
a product key
15. _____ is typically available as a trial version.
Demoware

EXPERIMENT #4
1. What command is used to count the total number
of lines, words, & characters contained in a file?
wc
2. What command is used to remove files? rm
3. How would you switch to virtual terminal 1? Ctrl +
Alt + F1
4. To display information about the processor itself –
display the contents of which file? /proc/cpuinfo
5. What is the purpose of the following operator? It
appends data to a file without overwriting it
6. How do you create a crontab entry? crontab –e
7. Every command in Linux is a executable program
8. What is the shortcut to the login directory? cd +
enter key
9. Which command is used to find data files,
programs, directories that match the search
argument? Locate
10. Which of the following Linux commands could be
used to find what processor was detected on
boot, when a laptop system is slow? POST

EXPERIMENT #5
1. Software can be removed and installed through
control panel
2. You want to create a Family group in Windows 10
and add adults & children. Which of the following
must you have to create this group? Microsoft
account
3. Which of the following is a Windows feature that
enables the computer to use a USB flash drive as
a memory expansion device? ReadyBoost
4. The Windows 10 Store app is linked to which of the
following? The user’s Microsoft account
5. Which feature works with both Microsoft Explorer
& Microsoft Edge & monitors websites, pages, &
downloads for known issues? Blocker
6. By default, Windows 10 automatically turns the
Battery Saver feature on when the battery charge
of a laptop falls below which of the following?
20%
7. _____ is a part of the operating system that relies
on the UEFI specification’s secure boot
functionality to help prevent malicious apps from
loading during the system start-up process.
Trusted Boot
8. Windows 10 has a Refresh recovery option that
helps you recover a PC that isn’t behaving well.
Using this recovery option, you keep your personal
files such as Music, Photos, etc. but which of these
will you lose? User installed apps

S-ar putea să vă placă și