Documente Academic
Documente Profesional
Documente Cultură
1 and software.
Networks
2. Computer hardware
Motherboard
The motherboard is the largest card with a printed circuit you see when you open a computer. All the other computer com-
ponents are inserted on it, as you will see. It includes connectors or communication ports with peripherals and can also incor-
porate video, audio and network devices, among others, depending on the characteristics of the computer.
EXTERNAL
PCI-E SLOTS CONNECTIONS
BIOS BATTERY
PCI SLOTS
MICROPROCESSOR
SOCKET
CHIPSET
SATA
CONNECTIONS MEMORY SLOTS
Microprocessor
The microprocessor is the most important part of the computer. It is responsible for
processing data, performing arithmetical-logical operations and controlling all the
other devices. It is characterised by its working frequency, measured in hertz, which
determines its operating speed.
A modern computer may have a 5 GHz processor, which means it can perform
5 billion basic operations every second.
In physical terms, it is a chip that contains a set of integrated circuits with millions of
transistors, plugged into a socket. It normally has a fan and heat sink above it to cool
it down, along with thermal paste, because if its temperature rises too high it can
block the computer.
The main microprocessor manufacturers are Intel and AMD.
Chipset This is a set of chips on the motherboard that carries out communi-
cations between the microprocessor and the different components
connected to the motherboard. It controls the operating mode of
the board and determines its performance and characteristics. The
most important chip normally has an aluminium heat sink above
it, smaller than the microprocessor.
RAM memory slots RAM memory modules are plugged into these. These differ from
other slots in that they include clips to hold the module in place
and in that there may be empty slots but there will always be a
RAM module inserted.
ATX connector This connector joins the power supply to the motherboard through
cables, as shown in the picture. It requires sufficient power to work.
IDE and SATA These are the connections for the storage units: the hard disk, the
connections DVD-ROM, the DVD recorder, etc. The boards can have two types
of connection, IDE or SATA, or just one, depending on the age of
the computer. SATA connections are the more modern ones. The
picture shows the SATA (red) and IDE (blue) cables that connect the
motherboard to the storage units.
Expansion slots These are for inserting expansion cards, such as the graphics card,
sound card, network card, etc. These cards are sometimes integrat-
ed into the motherboard so the slots might be empty. There are
various types: PCI, AGP and PCI Express (PCI-E).
External These are ports for connecting to the network (RJ45) and external
connections devices, such as the keyboard (purple PS2), the mouse (green PS2),
headphones (audio jacks), USB memory cards, etc.
Chip and battery The BIOS is an integrated circuit that stores the computer booting
for BIOS program. It can normally be distinguished from others as it gen-
erally has the word BIOS written on it, as shown in the picture. To
prevent specific setup parameters from being deleted, the BIOS
requires a battery.
Internal
connectors and ports
The internal connectors are the expansion slots connected to the motherboard, to-
gether with the internal ports or interfaces. There are two types of slots:
•• PCI (peripheral component interconnect): these do not have a default use, they
allow new components, such as video, sound and network cards, among others, to
be added.
•• AGP (accelerated graphics port): this is used for graphics and connectivity. Its trans-
fer rate can be as high as 2 GB/s.
•• IDE (integrated device electronics) or ATA (advanced technology attachment):
these control mass storage devices, such as hard disks, CD-ROM, DVD, etc.
•• SATA (serial advanced technology attachment): this is a transmission interface
(combination of commands, methods and hardware) between the motherboard
and certain devices, such as the hard disk. It will replace the other interfaces.
An external SATA, eSATA, for external hard disks and other components is gaining
popularity. It will become a competitor to USB. SATA connector
Micro USB
3.0
8.3 mm
(1) (2)
DVI-VGA (1) and HDMI (2) graphics Molex (3) and Molex-SATA (4) power
connectors connectors
(3) (4)
Memories
The smallest unit of information is There are several types of memory in a computer.
the bit, which represents a 1 or a 0.
Its multiples are powers of base 2:
•• RAM is the random-access memory, which means that any part of it can be accessed. It
2n. permits reading and writing. It is volatile: when the power supply is turned off, the infor-
mation stored in it is lost. It is the only one inserted into the motherboard.
byte 8 bits
kilobyte 1,024 bytes
Modern computers usually have between 8 and 16 GB (gigabytes) of RAM.
megabyte 1,024 KB •• ROM is read-only memory. It is not volatile: information is not lost when the computer is
gigabyte 1,024 MB turned off. It is ideal for storing basic hardware routines, such as the computer booting
terabyte 1,024 GB
petabyte 1,024 TB
program (BIOS) or memory testing.
•• Cache memory is faster and has a lower capacity than RAM. It serves as a bridge be-
tween the microprocessor and RAM. Computers include this memory in the micropro-
cessor chip.
A modern computer can have 6 MB (megabytes) of cache memory.
Internal
and external storage units
Storage units (or storage devices) are used to save information. They should not be confused
with the types of memory described in the previous section, which are not used to store data.
The internal storage units are hard disks. They can be of two types:
•• Hard disk drive (HDD). This uses a magnetic recording system to record digital data on
a series of platters or disks by means of a moving head. External communication can use
IDE or SATA.
Platters
Read
head
Motor
3. Computer software
We can define software as the computer’s logical support, consisting of a set of log-
ical components that make its operation possible. The operating system (Windows,
Linux, MacOS) and the programs and applications we use are all software.
When a computer is turned on, the first software to start working is the BIOS. Next,
the operating system is loaded and, finally the applications.
BIOS
The BIOS (basic input/output system) is the computer’s basic input and output sys- CR2032 battery and chip for BIOS
tem. It is a special program stored on a small device on the motherboard, as we have
seen. Once the hardware components start to boot up, the BIOS takes control of the
computer. When the BIOS has finished its task, it hands control of the computer over
to the next level: the operating system.
Operating
system
This is a program, already installed in the software or in the static memory, which
makes the hardware usable. Its purpose is to act as an interface between the user
and the computer, interpreting the user’s instructions and transmitting them to the The main menu for the BIOS setup program
hardware. In addition, it is responsible for controlling and operating all the computer
hardware and programs. Other functions include:
•• Enabling users to share the hardware
•• Enabling users to share data
•• Enabling users to plan resources
•• Facilitating data input and output
The most commonly used operating systems are Windows (in its different versions,
such as Windows 10, 8, 7, Vista, XP, etc.), Linux (Debian, Ubuntu, Red Hat, MAX, Linex,
Molinex, Guadalinex distributions among others) and Mac OS, Symbian OS and WAP.
Programs
and applications
A computer application is a program designed to facilitate a given type of work, while a program can be defined as a sequence
of instructions that a computer is capable of interpreting and executing. For example, the BIOS (the software stored in the ROM
that enables the computer to boot up and operate) is a program, as is the chip firmware. However, a word processor or a video
player are, technically speaking, computer applications.
Features
and advantages of Linux
The main features of the Linux system are:
•• The programs are free, accessible from a public repository on the Internet, although some
applications are paid. These repositories ensure that all the packages work together and
that they fit and complement each other; this structure ensures a high level of security.
•• It is a multi-tasking, multi-threaded, cross-platform and portable system.
•• It is a multi-user system; this means that it can be used by several users simultaneously.
•• It is a robust, stable and fast system.
•• It is a free software system that can be modified by anyone and which has many applica-
tions on the Internet.
Main
distributions of Linux
The main distributions of Linux are:
Distribution Characteristics
Red Hat This is characterised by the use of RPM packages (Red Hat Package Manager). It
was one of the most popular distributions. Some of its more modern derivative
distributions, such as Mandrake, Fedora, Red Hat Enterprise and CentOS, are
used a lot in companies.
SUSE This has an installation tool called YaST, which is one of the easiest to use for
installing and managing Linux. Its development is ongoing and it is very much
geared towards the business world.
Debian The most characteristic feature of this distribution is that it is not owned by a
company; instead, it is developed by a large community of people all working
on the idea. It is one of the most stable and complete versions, and possibly the
most widespread one.
Ubuntu This distribution is very popular. It is based on Debian and usually geared towards
personal computers, but it provides support for servers too. Its objective is free
and easy use, smooth installation and regular update launches.
Arch Linux One of the heavyweights of the world of GNU/Linux distributions. To add compo-
nents to this modular distribution, we must install them all from scratch, so it is
more suited to advanced users. It is mainly open source and free software.
Lots of Linux distributions have been developed in Spain sponsored by public institutions such
as universities and governments of the autonomous communities. These distributions have
been developed to be used in education and infrastructure. Initially, most of these distributions
were based on Debian Woody but many have now adopted Ubuntu as their foundation.
Examples include:
A hard disk
The
logical structure of the hard disk
partitioned into 2
and 4 drives
In terms of logic, hard disks consist of a boot sector and one or more partitions.
The boot sector stores the table of partitions and a small boot-up program called the master
boot record (MBR).
The partitions act as zones or divisions of the disk. There are various reasons for creating more
than one partition. For example, separate partitions can be created to make data accessible to
different users, or to have more than one operating system on the same disk. Nowadays, it is
also common for the computer manufacturer to include a partition for recovering the computer
factory settings.
C Primary Partitions can be primary (containing the operating system) or extended.
drive partition
D The
file system
drive
E
The file system is a structure that permits both the storage of information in a partition and its
drive Extended modification or recovery. For the partition and its drives to be usable, it must first be assigned a
partition
file system. This operation is called formatting. Generally, each file system has been designed
F to obtain maximum performance with a specific operating system or medium.
drive
Files and folders
Files and folders are sets of information that are stored on the disk drive and identified by a
representative name (file name). Files can be created by users to store their work or they can be
C drive
(root)
part of the operating system or users’ application for their operation.
Each file is unique in its directory or folder and is identifiable by a name and an extension,
which usually indicates its content type. File names are subject to specific rules, depending on
Work
the operating system. As well as its name and extension, the system also saves the creation, last
modified and last accessed dates for each file. They can also have attributes such as “hidden”
Ana Carlos “system” or “read-only”, among others. Files can be categorised into two large groups: execut-
able and non-executable. An executable file is a file that contains a program or application.
Folders are file containers and are required to organise information in an orderly and efficient
manner. Given that a drive can hold thousands of files, it is necessary to group them to make
Letter.txt
them easy to access. Folders are also identified by name and form a tree structure. Starting with
the disk drive (root directory), we can create a series of folders at the first level (or parent fold-
ers); these can then contain other folders (subfolders or daughter folders of the parent folders)
Path in Windows:
and so on, creating a tree-like structure.
c:\work\ana\Letter.txt The path designates the exact position of a file or folder in the tree structure. Different operat-
Path in Linux: ing systems use different rules to write the path of a given file or folder (as shown in the figure).
/work/ana/Letter.txt
3G or 4G modem
Wi-Fi and
Battery Bluetooth
Flash controller
memory
Microphone
Processor
Power
manager Battery
Mobile device operating systems
The operating system is the software that enables us to use the phone or tablet hard-
ware and applications.
The two dominant operating systems in the mobile device market are:
•• Android. Developed by Google; it is open source, based on Linux. It is the most
widely used.
•• iOS. Apple’s operating system, for devices such as iPod, iPhone, iPad, etc. It is
notable for its simplicity and reliability.
Mobile device applications
Programs or applications (apps) installed on mobile devices must be specially designed
for them because, as we have seen, these devices have numerous specific characteristics
(lower consumption, smaller screen, touchscreen user interaction, etc.).
Apps can be free or purchased; some require an Internet connection to work; they take
up little space and are easy to download (they can be downloaded from online stores, App Store
such as Google Play or the App Store, or accessed by writing their URL address in the
device browser).
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 19
Hardware and software. Networks
1
Learn
8. Network size
Local area networks (LAN)
The maximum coverage is one building. These are the most
common networks and can be found in many offices and
installations of all kinds.
9. Network ownership
Depending on their level of access or privacy, networks can be:
•• Public networks. These are networks whose access is public and global, thus letting users communicate and share
information and services within the public area covered. The best example of a global public network is the Internet.
•• Private networks. These are networks restricted to the owner or its users (most commonly LANs). When typical Inter-
net public network tools (web, e-mail, FTP, etc.) are used in these networks, they are termed intranets.
•• Virtual private network (VPN). These are a type of network produced by the interconnection of various private net-
works, using the infrastructure of a global network.
11. Topologies
The topology is the way in which we can connect different work stations and transmission hardware (cables and other net-
work devices) in a local area network. There are a variety of topologies, almost all are based on three types: bus, star and ring.
Bus topology. The networks share the Ring topology. The information circu- Star topology. All computers are con-
same channel, called a bus, with a single lates in one direction and each compu- nected to a hub or a switch which
cable. No longer used. ter analyses whether it is the target for transmits the information.
the information.
Terminator Terminator
Ring topology
Bus topology
Star topology
Optical fibre
An optical fibre cable consists of a group of very thin wires made of a transparent material (glass
or plastic) over which pulses of light representing transmitted data are sent. The light source can
be laser or LED.
It has a very high bandwidth: with speeds of 10 Gbps per fibre, it can reach total transmission
speeds of 10 Tbps. The main disadvantage is cost.
Wi-Fi technology
Wi-Fi is a computer network data transmission system that uses radio waves. Wi-Fi networks
operate at a frequency band of 2.4 GHz with a speed of up to 11 Mbps (for the 802.11b speci-
fication), 54 Mbps (for 802.11g) and 150 Mbps (for 802.11n). The newest Wi-Fi signal (802.1AC)
reaches 450 Mbps in the 2.4 GHz band and 450 Mbps at 5 GHz. There are a variety of devices that
permit interconnection of Wi-Fi elements.
•• Wi-Fi routers receive the signal from the line offered by the telephone operator and
share it with Wi-Fi reception devices within its range. The router is frequently supplied
by the Internet provider to homes or companies that already have Wi-Fi technology.
•• Access points act as remote transmitters, i.e. in places where the router Wi-Fi signal is
not strong enough. They are also used in facilities where the router lacks this technology
and it is required.
There are three types of reception devices: Wi-Fi cards integrated into computer motherboards,
PCI network cards and USB cards.
The network card
Network cards are devices that connect computers to the network. They are usually integrated
into the motherboards of modern computers.
Each network card has a unique identifier known as a MAC (media access control) address. No
two cards can have the same MAC address. This is useful for configuring safety systems in net-
works (e.g. to identify which computers can access a given Wi-Fi network), among other things.
The switch
This device centralises the cabling for a star network and is thus the central node. The switch
receives the signal from a transmitting work station and redirects it to the port of the target
station. A switch can also act as a device for interconnecting networks or segments of LAN net-
works, connecting in turn to another switch.
The router
This is a computer network interconnection device. Its main function is to send information
along the optimum route, i.e. it decides on the network address to which the information is
directed.
Generally, in most LAN networks, the router is the device that connects the network to the Inter-
net. Routers normally incorporate Wi-Fi technology.
Static port servers: HTTP, FTP, POP3, etc.
TCP/IP supports the most popular Internet applications, such as file transfer (FTP), e-mail, WWW,
etc. When a computer wants to transmit data from one of these applications to another, the
TCP/IP transmits the destination address (IP) and the application identification port. This combi-
nation of IP address and port is known as a socket.
The ports for some of the most commonly used applications are:
Exercise
1. Know your computer
In this exercise, you are going to learn about the characteristics of the
computer you are working on and the components installed in it. To do
this, you’ll first open a document with a template containing shaded cells
that you have to fill in, after which you’ll investigate what your computer
is like.
1. Open exercise P1_E1_yourcomputer.doc on the virtual CD.
2. On your computer, go to Mi PC and, in the window on the left, select
Ver información del sistema.
3. Select the Hardware tab and click on Administrador de disposi-
tivos. A drop-down menu will appear, as shown in the figure. Click on
the + sign for each and complete the grey shaded cells in the docu-
ment that ask for information on these components.
4. Save the file with the name P1_E1_namesurname.doc.
Exercise
2. Analysis of the components of a computer
In this exercise, you will complete a table which shows a list of the main
components required in a computer. You’ll need to do an online search to
find the most desirable characteristics for each component.
1. Open exercise P1_E2_components.doc on the virtual CD.
2. Carefully read the instructions to the practical, especially the first col-
umn, and note the elements you need to find information on.
3. Search for the information and answer the questions
•• What is it for? How does it work?
•• What are its approximate measurements or size?
•• What type of connection does it use?
•• Characteristics: speed, capacity, bit width.
4. Do an online search for photos of each component and paste them in
the last column. Use the Paint program to crop the images if necessary.
5. Save the file with the name P1_E2_namesurname.doc.
Exercise
3. Comparing and buying to suit your requirements
Imagine you have €350 to buy a computer. Logically, you will want to
get one with the best characteristics on the market. To do this, you must
search various online stores and compare all the computer components.
1. Open exercise P1_E3_comparing.doc on the virtual CD.
2. Complete the table with the price and store you choose for each com-
ponent. Remember that the final price (with VAT) must not exceed
€350.
3. Save the file with the name P1_E3_namesurname.doc.
Exercise
1. Finding out how to enter the BIOS on your computer
A computer’s BIOS is a firmware program that resides in a special memory
inserted in a chip on the computer motherboard. The word BIOS is an ac-
ronym for basic input/output system.
1. Create a text document and in it explain what the fundamental pur-
pose of the BIOS is, after using the Internet to help you find out.
2. Save the document with the name P2_E1_namesurname.
To enter your computer’s BIOS (also known as “entering setup”), you have
to press a key or combination of keys when the computer is booting up.
This key or combination of keys depends on the computer manufacturer.
Find out how to enter the BIOS on your computer at home.
Exercise
2. Comparison of operating systems
By way of introduction, in this exercise we are going to compare operat-
ing systems, their differences, versions, etc.
1. Open exercise P2_E2_os.doc on the virtual CD.
2. The first column in the table contains the names of different operat-
ing systems. Do an online search for sufficient information to com-
plete the other columns. The following websites might be useful:
•• es.wikipedia.org/wiki/Portal:Linux
•• historiade.org/windows
•• www.android.com/intl/es_es/history
3. Save the file with the name P2_E2_namesurname.doc.
Exercise
3. Identifying partitions and disk units
1. Open exercise P2_E3_partitions.doc on the virtual CD. This doc- Primary
Extended
ument shows three figures with different distributions of hard disk
partitions. Answer the questions that come after it and save the doc-
ument with the name P2_E3_namesurname.
2. Right-click on the Mi PC or Equipo icon and choose the option Ad-
ministrar. In the new window, select Administración de discos.
This is the Windows tool for viewing and managing your comput-
er’s physical and logical units. In the second part of the document
P2_E3_namesurname, describe the type of units found and their
corresponding file systems.
Exercise
1. Installing and uninstalling programs
The control panel tool Programas y características (Agregar o quitar
programas, in Windows XP) shows all the programs installed on the com-
puter. However, the method for installing an application consists of exe-
cuting its installation program. For example, to install the Firefox browser
follow these steps:
1. Go to Google (www.google.es) and type “firefox” in the search box.
2. Click on the first link found, which is for the official download site
(www.mozilla.org/es-ES), then click on Descarga gratuita.
3. If your browser blocks the download, click on the pop-up label indicat-
ing the protection and choose Descargar archivo. When the installa-
tion execution window opens, click on the Ejecutar button, wait for
the download and start the installation.
Link to Firefox download
4. Follow the steps in the installation wizard and then check that the
In general, a program is installed when a file with a name such as
Setup, Instalar, Install, or similar is executed. program appears in Inicio / Todos los programas. Execute it to make
sure it works.
5. Go back to Programas y características in the control panel. Locate
the installation of Mozilla Firefox and click on Quitar to uninstall the
program.
Exercise
2. Scheduling and restoring backup copies
Windows includes a utility for scheduling when backup copies are made.
Backups are created and restored in different ways depending on the
Types of scheduled backup copies: version of Windows you are using. In any event, you should bear in mind
•• Total. A complete copy of all selected data. these three key aspects:
•• Differential. Only new or modified data since the last •• Determine what to backup: documents, configurations or even the
time a total copy was executed are copied.
whole system.
•• Incremental. Only new or modified data since the last
time a total or differential copy was executed are copied. •• Specify the storage format or target for the copy: you should select
the most appropriate medium for the amount of data to backup.
•• Choose the schedule or frequency for making the copy.
1. In Windows XP, go to Inicio / Todos los programas / Accesorios /
Herramientas del sistema / Copia de seguridad. (In Windows Vista
and Windows 7, this option is in the group of programs called Man-
tenimiento.)
2. Follow the steps of the wizard to schedule a backup of any folder in
Mis documentos, to be saved onto an external USB drive every Friday
at 3 pm.
3. You can temporarily change the date and time on your computer to
check that it works or access the system task scheduler to force exe-
cution. Next, delete the folder you have selected for a backup copy and
then restore it by executing the backup copy and restore utility.
Exercise
1. Identifying network range and ownership
1. Open exercise P4_E1_networkrange.doc on the virtual CD.
2. Complete the range column by writing “LAN”, “MAN” or “WAN” depend-
ing on the extension covered by each proposed network. Write “Pri-
vate”, “Public” or “VPN” in the ownership column, as required.
3. Find information on the concepts of PAN and CAN networks and give
a brief description of them in the corresponding sections at the end of
the document.
4. Save the document with the name P4_E1_namesurname.
Exercise
2. Voice and data installations
Do an online search for information on structured cabling installations
(voice and data). Next, open the file P4_E2_structuredcabling.doc in
Unit 1 of the virtual CD and identify each of the elements, which are indicat-
ed by a letter in the following illustration.
Vertical cabling (backbone)
Fibre-optic link
11. Click on Agregar, write the name “User1” and click on Aceptar. For
this user, activate all permissions (total control, change and read).
12. Also add User2. However, for this user you are only going to activate
the read permission. Finally, click on Aceptar.
13. On PC-B, start a session as User1 and enter Windows Explorer. The shared folder Contenedor is shown as a
dependent element on computer PC-A, in the
14. Click on the Red icon in the folder tree (on the left). Also click on the Red (Network) environment.
name of the computer sharing the folder (PC-A).
15. The Contenedor resource will appear in PC-A. Now you can access
the files created in this folder. You can modify them and change their
name, as well as add new files.
16. Close the session for User1 on PC-B and open the session for User2.
17. Go to the shared folder in PC-A again. Now check that you can only
open the files, but not alter or delete them, given that you have re-
stricted the permissions for User2.
Exercise
2. Sharing a printer
1. On PC-A, go to Inicio / Dispositivos e impresoras.
2. Right-click on the printer icon for this computer and choose the op-
tion Propiedades de la impresora.
3. In the next window, choose the Compartir tab, check the Compartir
esta impresora box and write “Imp_com” as the name to share. The
full name is proposed by default. Next click on Aceptar.
4. On PC-B, start a session as User1, who has full permissions.
5. On this computer, go to Inicio / Dispositivos e impresoras. We are
now going to install the printer shared on PC-A on this computer.
6. Click on the Agregar una impresora button (in the command bar
at the top of the window) and then choose the option Agregar una
impresora de red, inalámbrica o Bluetooth.
7. Windows will find the shared printer on PC-A in the network and then
automatically select it. Click on Siguiente.
8. On the following wizard screen, click on Siguiente to accept the pro-
posed name, which is the same as that of the printer on the computer
to which it is connected.
9. As a last step, you can print a test page. Click on Finalizar.
Exercise 3. The tracert command
The tracert command sends packets and shows the route they take on
the network. Every time there’s a hop, it means the packet has moved to a
different computer, which can be in any part of the world. In this case, the
server, IP address and times are shown.
1. Open the command console as in the previous exercises.
2. Type “tracert www.museoreinasofa.com” and press Intro.
3. If you repeat the process with various addresses you’ll see that the
first hops are repeated, as these are the output from the router.
4. Open the document P6_E3_tracert.doc and complete the table in-
dicating how many hops are required for each address.
5. In the last column, type the IP addresses common to all hops.
6. Save the file with the name P6_E3_namesurname.doc.
activities menu
notification
area
shortcuts
top bar
dash
Rejilla button
Try to reboot the system and create a new user with your name.
Directory Description
Binary files that are essential for sys-
/bin
tem operation
Files used to boot the system before
/boot
running the kernel Exercise
2. How Linux structures information
/dev Configurations of installed devices
Linux structures the information on the hard drive in a different way to
This directory stores the configuration
/etc Windows. The Linux file system follows all the UNIX conventions. Among
files of the installed programs
other things, this means that it is not directly linked to the hardware struc-
/home Personal directories of users
ture.
Shared libraries needed by the system
/lib For example, this system does not use assign letters (C, D, E, etc.) to logical
and the different programs
drives in the way that Windows does. This means that there is no C drive;
Directory usually used for temporary
/mnt
drive mountings
instead, we have the hda device.
Application files that are not strictly The entire UNIX file system has a unique origin: the root, which is repre-
/opt sented by the symbol / (this root directory is not assigned a letter). All the
necessary for the system
Virtual file system where the memory files that the operating system can access are located within this directory.
/proc and kernel processes are stored and These files are organised into different directories. The mission and the
information is obtained from them name of these files are standard for all UNIX systems. The table on the left
The private directory of the superuser shows this structure.
/root
or root user The file path idea that we saw in the Windows system also applies to Li-
/sbin
Binary files that are essential to boot nux. Remember: the path is the complete sequence of directories that we
the system need to navigate through to reach a given file. The difference in Linux is
/sys
Files containing the system configura- that the different directories are separated by slashes (/). For example, the
tion parameters complete path to the file work.txt contained in the James directory of
Temporary files that are lost when the home is: /home/James/work.txt.
/tmp
computer is shut down
In Linux, extensions can also be used at the end of file names to indicate
The directory where the applications the type of file. Examples .txt (text files); .htm and .html (HTML files);
/usr
are stored
.png, .jpg and .jpeg (PNG or JPEG images).
Contains the data that continuously
/var change in the system, such as system
The mouse techniques for copying and moving files from one folder to
logs, print queues, mail, etc. another are similar to Windows too.
Exercise
2. Managing files and folders
Look at the figure in the margin. Let’s create the file and directory structu-
re in it. Click on the Archivos icon to go to your user’s working directory
that hangs from home (Carpeta personal). Inside your personal folder,
go to Documentos.
1. To create the Language folder, right-click and choose Carpeta nueva.
Type the name “Language” and press Intro. Do the same to create the
other folders until you have completed the tree in the figure.
2. To create the four text files (.odt extension), go to Mostrar aplicacio-
nes / LibreOffice Writer. For the presentation files (.odp extension),
do the same using LibreOffice Impress.
3. To create the image files (.png extension), we will take some screen-
shots. To do this, in Mostrar aplicaciones, simply click on the Captura
de pantalla application.
4. Once you have completed the file and directory tree, copy all the files
from the Language folder to the Office automation folder. Use the
same techniques for selecting and copying files as you do in Windows.
5. Rename the file photo1 in the Multimedia folder to landscape1. You
can do this by right-clicking the mouse.
6. Delete the file work1 in the Multimedia folder in one step by right-
clicking and selecting the Mover a la papelera option.
7. Take a screenshot of its final appearance and save it with the name
P9_namesurname.png.
Captura de pantalla application
Exercise
3. Mounting and unmounting removable (USB) devices
Before graphical environments such as GNOME, if we wanted to read from
an external device, we had to mount and unmount the drive (to discon-
nect it).
None of these operations are required now.
1. Connect the device (e.g. a flash drive) and wait for the system to re-
cognise it.
2. Once connected, a window will automatically open displaying the
contents of the device.
3. When we have finished working with the files, we need to unmount
the device.
4. In the left dock, open the Archivos application, go to volume and click
on the Desmontar icon (marked with an arrow). Now you can safely
disconnect it. You can also right-click on the USB icon on the desktop
and select Expulsar.
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 33
Hardware and software. Networks
1 Step-by-step practical
Exercise
1. Compressing files
1. Go to the Documentos folder. Select several files at once (if there are
no files, create them as you did in Practical 9).
2. Right-click and select Comprimir.
3. Type the name P10_namesurname. Select the extension .zip. Click
on Create.
Exercise
2. Decompressing files
1. There are different compressed file formats, such as ZIP, TAR.XZ or 7Z.
In Ubuntu, they all have a distinctive icon.
2. Double-click on the compressed file that you created earlier. A window
will open, displaying everything that it contains.
3. We can use the files in this window as though it were a normal folder.
We are going to extract all the files; to do this, click on the Extraer
button, select where you want to put them from the menu on the left
and then click on Extraer.
Exercise
1. Installing an application
1. Click on the Software de Ubuntu icon that appears when we click
on the Rejilla button or when we click on the Actividades icon. Then
type “Software de Ubuntu” in the search menu.
2. In the top right, click on the magnifying glass to type the name of the
application that you want to find. Once you have located it, select it to
display all the details of the application: size, website, version, license,
etc. Reviews are also shown (these are comments that people make
about the application).
3. For example, search for the GIMP image editor, or Audacity, or VLC, etc.
4. Click on the Instalar button. The appli-
cation will download and install auto-
matically.
Exercise
2. Uninstalling an application
To uninstall an application, we perform the same operation but in reverse:
1. Click on the Software de Ubuntu icon.
2. Select an application that you know is already installed (for example,
one that you installed in the last exercise).
3. Now, the Iniciar, Desinstalar and Per-
misos options will appear on the menu.
Click on Desinstalar to uninstall it.
Extension 3. Testing more than 200 Linux distributions without installing them
As you know, Windows is the most popular operating system, but Linux has the
advantages of freedom of distribution and security.
On one website, Distrotest.net, we can simulate more than 200 different distri-
butions of Linux without installing the software. On the Linux distribution that we
are simulating, we can test the installed programs and install (and uninstall) other
programs. Note: you only have 1 GB of total space and your session cannot last
more than 30 minutes.
Go to https://distrotest.net and test two distributions (for example, Debian and an
educational version from an autonomous community of your choice). Talk to your
classmates to make sure that you all choose different ones. Discuss the main appli-
cations and their differences with your classmates or write them down in a docu-
ment and save it with the name A3_namesurname.
UNIT SUMMARY
Computer hardware
The internal components of a computer are:
•• Motherboard. This is a printed circuit board into which the other computer components are inserted.
•• Microprocessor. This performs all calculation operations and controls all the other devices.
•• Internal connectors. These are all the expansion slots connected to the motherboard.
•• Ports. These are used to connect input/output peripherals to the motherboard.
•• Memories. There are various types, such as RAM, ROM, cache, etc.
•• Graphics card. This transmits information to the screen.
•• Storage units. These are used to store information. The most important one is the hard disk.
•• Power supply. This supplies electricity to the other components.
Computer software
We can define software as the computer’s logical support, consisting of a set of logical components that make its opera-
tion possible. The operating system (Windows, Linux, MacOS) and the programs and applications we use are all software.
The advantages of the Linux system are: the programs are available for free from a secure repository; it is a multi-tasking,
multi-threaded and cross-platform system; it can be used by several users; it is robust, stable and fast, and it is free and
modifiable by anyone.
Computer networks
A computer network is a set of computers and devices that are interconnected with the aim of sharing information and
resources: hard disks, printers, etc.
The most commonly used protocol (common rule system) nowadays in computer networks is TCP/IP, which is that of the
Internet network.
Networks can be classified using different categories:
Local area network (LAN), wireless LAN (WLAN)
By extension Metropolitan area network (MAN)
Wide area network (WAN)
Public network
By ownership Private network
Virtual private network (VPN)
Guided (wired)
By connection method Unguided (wireless)
Client-service network
By functional relationship Point-to-point network
Bus topology
By topology Ring topology
Star topology
COMPREHENSION ACTIVITIES
When you have completed the topic, do the following exercises. You can complete them online by going to the relevant
unit on the publisher’s website (www.editorialdonostiarra.com) and hand them in as PDFs.
Computer hardware
1. Briefly explain the function of each of the following computer components: hard disk, RAM memory card, expansion
card, microprocessor.
2. Draw the back of a computer CPU and identify the ports you know.
3. Explain the difference between ATX, IDE and SATA connectors.
4. What is connected in the expansion slots and what is connected in the RAM slots?
5. Indicate which element you would connect to each of the following connections on the motherboard: socket, memory
slot, AGP slot, PCI slot.
6. How does memory differ from a storage device?
Computer software
1. What does the program stored in the computer’s BIOS do when the computer is booted?
2. What are the two most important versions of Linux, from which the main distributions are derived? Which two package
formats are used?
Computer networks
1. Explain what a computer network is. List the computer networks you use in your daily life.
2. Explain the different areas of coverage of a LAN, MAN and WAN network. Give an example of each.
3. Draw a diagram representing the connection in different types of network: bus, ring and star.
4. What is a twisted-pair cable? And an RJ45 connector?
5. What are the minimum elements required to set up a LAN network?
6. Explain what the gateway and DNS are.
7. In relation to Practical 6, document the computer network in your computer room, drawing a table of the setup of all
the computers (IP, subnet mask, gateway, DNS). To do this, go to the setup menu of your local network. You can also use
screen shots. Include the work group you belong to and the shared folders and printers.
8. In relation to Practical 6, explain the MS-DOS ping and ipconfig commands. Open the command window and write
the command ipconfig/all. What differences can you see compared to the ipconfig command?
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 39
Hardware and software. Networks
1 Review
MULTIMEDIA ACTIVITIES
When you have studied the topic, test your knowledge by doing the following online exercises, which you can find in the
relevant unit on the publisher’s website (www.editorialdonostiarra.com). You can hand them in as PDFs.
3. Test on the physical and logical structure of information and hardware and
software on mobile devices
Open exercise Unit01 03 Test on the physical and logical structure of information
and hardware and software on mobile devices in Unit 1 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark that you obtained.
MOBILE APPS
ONLINE ACTIVITIES
Buying and assembling computers
1. Open a word processor and create a new blank document. Do an online search for information on computer prices.
Choose two comparable computers (both laptops or desktops) but with very different prices. Draw a table to compare
the specifications of each. Giving your opinion and using technical arguments, explain the reason for the price differ-
ence.
2. Next, go to a website that allows you to build your own computer by parts (e.g. the website www.pccomponentes.com/
configurador.php). Download images of the parts you need and paste them into the text document.
3. Next, in a spreadsheet, write the name of each component and its individual price and calculate the total price.
4. Save both files with the name Internet1_namesurname.