Top Banner
Introduction to Computing Instructor: Yong-nian Tang Brookhaven National Laboratory Working on accelerator control 631-344-7022 (BNL Phone #) [email protected] [email protected]
103

Introduction to Computing

Feb 24, 2016

Download

Documents

annis@

Introduction to Computing. Instructor: Yong- nian Tang Brookhaven National Laboratory Working on accelerator control 631-344-7022 (BNL Phone #) [email protected] [email protected]. Text Book: Microsoft Office 2013 Illustrated by Beskeen et. al. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction  to Computing

Introduction to ComputingInstructor:

Yong-nian TangBrookhaven National LaboratoryWorking on accelerator control631-344-7022 (BNL Phone #)[email protected]@sunysuffolk.edu

Page 2: Introduction  to Computing

2

Building a Foundation w/ Office 2013 &

Essential Computing Skills2e w/ eLab CMS Key EditionIt’s relatively expensive.If possible, rent it.

Text Book

Page 3: Introduction  to Computing

3

Do we need to buy the text book?It is recommended. Having the

book will make your life much easier.

However, you can survive (barely?) without the book.

Text Book (cont.)

Page 4: Introduction  to Computing

4

USB drives to save files and transfer

data. Very cheap when they are on

sale. About $0.50 to $1 per GB, or

even less.

Every one should have one or two.

Supplies

Page 5: Introduction  to Computing

5

www2.sunysuffolk.edu/tangy Outline Announcements Slides Projects Data files for projects and exercises Answers to some exercises Attendance and project status

Course Web Pages

Page 6: Introduction  to Computing

6

[email protected] Informing the instructor your absence Submitting your projects’ work

and others Making requests and suggestions

Instructor’s Email

Page 7: Introduction  to Computing

7

Introduction to computer concepts, Windows 7, network security.

Basic concepts and usage of Office 2013, Word, Excel, Access, and PowerPoint. In addition to the contents of the text book, some advanced topics will be introduced.

Objective

Page 8: Introduction  to Computing

8

Attending classes is very important Firm but flexible policy

If you can not attend a class, • call 344-7022 or • email to [email protected]

10% goes to the final grade. Many absences more than 10% deducted.

Attendance Policy

Page 9: Introduction  to Computing

9

A student should go to registrar to formally withdraw from the class if quitting attending the class after some date. For example, one quits the class after the midterm exam.

If you forget to formally withdraw, W is usually assigned as your final grade if the College permits. However, if you need to get an F in order to get financial aid, please send me an email.

If the College does not allow professors to assign W, an F will be assigned.

Fail or Withdrawal

Page 10: Introduction  to Computing

10

Specified in the outline In general, if one attends the classes,

finishes lab work, exams and projects, one gets a relatively good grade.

Do not worry about grades, to learn something is more important.

There are no reasons not to get good grades in this class.

Grading Policy

Page 11: Introduction  to Computing

11

Part I (15%)• Overview of computer hardware and software

• Operating system and Windows 7GUIManipulation of filesOften-used short cuts

• Internet: security• Introduction to software development• Overview of Office 2013: GUI (Ribbon), backstage

Topics

Page 12: Introduction  to Computing

12

Part II --- Word 2013 (30%)• GUI (Ribbon)• Browsing and selection• Themes and styles• Formatting:

text, line, page, and documentTabs , sections and other breaks

• Inserting tables, hyperlinks, clip arts and graphics• Layouts• Tricks and tips• Advanced topics: TOC, index (if we have time)

Topics

Page 13: Introduction  to Computing

13

Part III --- Excel 2013 (30%)• GUI (Ribbon)• Basic skills• Formulas and functions• Relative and absolute references• Relational and logical operators and if function• Formatting and conditional formatting• Charts, plots, and graphics• Tricks and tips• Advanced topics: More about functions (if we have

time)

Topics

Page 14: Introduction  to Computing

14

Part IV --- PowerPoint 2013 (15% )• GUI (Ribbon)• Basic skills• Layout and placeholders• Themes and slide masters• Animations

Topics

Page 15: Introduction  to Computing

15

Part V --- Access (10%)• GUI (Ribbon)• Database concepts• Database objects: table and query

Topics

Page 16: Introduction  to Computing

16

Examine computer hardware and software.

Explore networks and data communications

Learn about security threats on the internet and how to protect computer systems and personal information

Concepts Unit A: Objectives

Page 17: Introduction  to Computing

Defining Computers

A computer is an electronic device accepts input processes and stores data produces output

Page 18: Introduction  to Computing

Types of Computers

Personal computers• Desktop• Notebook (Laptop) • Tablet PC

Hand-helds: PDAs, MP3 players, Cell phones Mainframes Supercomputers Other computers (at home, in car…)

Page 19: Introduction  to Computing

Types of Computers Personal computers are used for general computing

tasks.

Hand-held computers fit in the palm of your hand and run on batteries.

Mainframes are used by companies to provide centralized storage, processing, and management for large amounts of data.

Supercomputers are the largest and fastest of computers, and can process an enormous volume of data.

Page 20: Introduction  to Computing

Types of Computers Desktop: (HP, Dell, IBM…)

• Usually more powerful and cheaper than laptops

• Needs separate monitor, not easy to move around

• Could be replaced by laptops and tablets in the near future?

Page 21: Introduction  to Computing

Types of Computers Notebook, Netbook &

iPad• Small & lightweight.• Portable• Netbook: browsing• Internet• Tablets (7” and 10”)

Page 22: Introduction  to Computing

Types of Computers

Supercomputers are the largest and fastest computers. BNL Bluegene

Mainframe s are very powerful computers, but not as powerful as supercomputers.

Clusters: consists of hundreds and more processors.

Page 23: Introduction  to Computing

Computer Systems

A computer system is made up of: Hardware — the physical

components. Can be touched. If kicking it, your toe will get hurt.

Software — the programs or lists of instructions. Can not be touched.

Software could be more expensive than hardware.

Page 24: Introduction  to Computing

Hardware: major components

Motherboard CPU (Central Processing Unit) Memory Storage devices I/O (Input/Output) devices Network devices Power supply, case, video card,

sound card…

Page 25: Introduction  to Computing

Hardware: Motherboard

Also called mainboard

Located inside the computer case

Holds and connects all essential components

Page 26: Introduction  to Computing

Hardware: CPU

CPU - micro processor• A silicon chip

designed to manipulate data

• The brain of a computer.

• 64-bit CPUs and 32-bit CPUs

Page 27: Introduction  to Computing

Hardware: CPU (cont.) Intel, AMD, Apple, IBM… make

CPUs. Its speed is determined by:

• Clock speed (Hz)• Word size (32-bit and 64-bit)• Processor type• Usually, motherboard and CPU are

the most expensive components in a computer. High-end video cards are not cheap either.

Page 28: Introduction  to Computing

Question

1. What are the two most expensive components in a computer?

Page 29: Introduction  to Computing

Hardware: Units of Memory and Storage Computer understands 0 and 1 only:

on/off state, N/S pole, 0/5 volts… 1 (“on”) and 0 (“off”) are referred to as

bits. Eight bits is a byte. Two bytes

represent a unique character (Unicode)

Decimal numbers and binary numbers.

Page 30: Introduction  to Computing

Hardware: Units of Memory and Storage Everything in the computer memory

and storage devices is a number! A computer understands only numbers.

Number number Character number (ASCII code) Grey level number ( usually 0 – 255) Color three numbers (R/G/B)

Page 31: Introduction  to Computing

Question

2. A byte can store 256 different numbers, why do we need two bytes to store an English character?

Page 32: Introduction  to Computing

Hardware: units of Memory and Storage

Kilobyte (KB) = one thousand (1024) bytes

Megabyte (MB) = one million (1024 KB) bytes

Gigabyte (GB) = one billion bytes Terabyte (TB) = one trillion bytes

Page 33: Introduction  to Computing

Hardware: Memory Computer memory is a set of

storage locations. Five types of memory:

• Random access memory (RAM)• Cache memory• Virtual memory• Read-only memory (ROM)• Complementary metal oxide

semiconductor memory (CMOS)

Page 34: Introduction  to Computing

Hardware: Memory RAM --- Random Access Memory

• Sits on motherboard and closes to CPU

• Also called volatile memory, primary memory, and main memory.

• Most important memory type.• 256 MB to many GBs.• Fast CPU + big memory + (fast

graphical card) a fast computer.

Page 35: Introduction  to Computing

Hardware: Memory Cache memory

• Special high-speed memory chip on the motherboard or CPU

• Stores frequently and recently accessed data and commands.

• Usually 1 to ??? MB.• The bigger, the better, also more

expensive.

Page 36: Introduction  to Computing

Hardware: Memory Virtual memory is extra memory that

simulates RAM if more is needed. Limited by the memory space (word size).

Read-only memory (ROM) is the permanent storage location for a set of instructions the computer uses.

CMOS memory is semi-permanent information about where essential software is stored.

Page 37: Introduction  to Computing

Hardware: Storage Media Magnetic storage devices

• Hard disks—several magnetic oxide covered metal platters usually sealed in a case inside the computer

• Tape—inexpensive, slow, archival storage for large companies who need to back up large quantities of data.

• Floppy disks: (almost) obsolete

Page 38: Introduction  to Computing

Hardware: Storage Media

Optical storage devices• CD-R - store 700 MB of data• CD-RW: not reliable• DVD—can store between 4.7 and 15.9

GB of data; Blue-ray discs and HD-DVD can store between 15 and 50 GB of data

Page 39: Introduction  to Computing

Hardware: Storage Media

Flash memory cards• Small, portable cards: rewritable• Used in digital cameras, handheld

computers, video game controllers, and other devices

• Most commonly-used: SD (HDSD) cards – Secure Digital.

Page 40: Introduction  to Computing

Hardware: Storage Media USB drive, USB

flash drive• from 32 MB to 16 GB

and more • Plug directly into the

USB port (hot operation)

• Rewritable• Best portable storage• Small and

inexpensive: $1.50/GB

Page 41: Introduction  to Computing

Hardware: Differences between memory & storage

Speed Persistent Size Location

Memory Fast No Limited On board

Storage Slow Yes Unlimited(?) External

Page 42: Introduction  to Computing

Question

3. When we talk about memory and storage, how do you compare computers and people?

Page 43: Introduction  to Computing

Hardware: Input/Output Input:

• Data you type• Data by reading files• Data through Internet.• Data from sensors……• Other sources

Output: The result of computer processing.

Page 44: Introduction  to Computing

Hardware: Input/Output Peripheral devices

• Accomplish the input, output, and storage functions.

• Not on the motherboard slow• I/O always is the slowest part of

any program execution

Page 45: Introduction  to Computing

Hardware: I/O Devices

Input devices: Keyboard Mouse Others

Page 46: Introduction  to Computing

Hardware: I/O Devices

Output devices:• Monitors

CRT monitors (almost obsolete) LCD and LED

• Printers• Others

Page 47: Introduction  to Computing

Hardware: I/O Devices

Monitor’s quality Screen Size

(diagonal in inches)

Resolution (in pixels)

Setting the screen resolution.

Page 48: Introduction  to Computing

Hardware: I/O Devices Types of printers

• Laser• Inkjet

B/W printing: buy laser printers

Color laser printer: very expensive cartridges. Inkjet printer

Page 49: Introduction  to Computing

Hardware: Printer

Turn OFF the printer when not printing to prevent the heat from drying the cartridges.

Use the power button to turn off the printer in order to make cartridges stay in the proper housing. Do not pull the power cord.

Page 50: Introduction  to Computing

Hardware: Video Card Integrated (on-board) and

dedicated video cards Gaming: needs high-end video

cards. High-end computers have

dedicated video-cards Usually, a video card has its own

memory; on-board video shares main memory.

50Microsoft Office 2007-Illustrated Introductory, Premium Video Edition

Page 51: Introduction  to Computing

Hardware: Network Devices Network cables (Ethernet cables)

Modems and routers Wireless cards and adapters Building a home wireless network:

Not as hard as one thinks. Just follow the instructions.

Page 52: Introduction  to Computing

A Desktop Computer

Page 53: Introduction  to Computing

Motherboard and others

Page 54: Introduction  to Computing

The Back of a Computer

Computer ports and connections

Power connection

Mouse port

FireWire port

Network port

Phone line connection

Speaker and microphone connections

USB ports

Monitor port

Audio connection

Keyboard port

Page 55: Introduction  to Computing

Hardware: How to fix it? Blue screen, won’t boot… If under warrantee, let

manufacturer fix it Diagnostics

• Run diagnostic program• Go to web to search solutions

Hardware problem: DIY in many cases. It is easier than you think

Page 56: Introduction  to Computing

Hardware: How to fix it? Motherboard ($300-500):

expensive, buy a new computer or fix it?

CPU ($100 and up): relatively expensive. Installation: 30-60 minutes.

Memory ($50 for 4GB): Installation: 10 - 30 minutes.

Page 57: Introduction  to Computing

Hardware: How to fix it? Hard drive ($50 for 500GB): Need

the system reinstallation CD to build a system drive. Installation: 10 - 30 minutes.

CD/DVD drive ($30): Installation: 10-30 minutes.

Laptop display screen ($200 and up): installation: one-hour delicate job. Professional help?

Page 58: Introduction  to Computing

Hardware: How to fix it? Important: Always rub your hands

with the computer metal frame at first to get rid of the static electricity.

Do it carefully, but with confidence.

Page 59: Introduction  to Computing

Software: major Components Operating system

• Windows• Unix & Linux (open and free)• MacOS

System utilities Application software

Page 60: Introduction  to Computing

Software: Introduction

Software manipulates and processes data

Data:Strings, numbers, figures, sounds, images, and graphics…

Page 61: Introduction  to Computing

Software: Introduction

File --- named collection of stored data.• Executable file can be run to perform

a specific task.• Data file contains data.

Everything in a computer is represented by a number on disk and in memory.

Page 62: Introduction  to Computing

Software: Data Representations Every English

character is represented by an ASCII number.

ASCII numbers defined by ANSI. ANSI standard sample ASCII code

Page 63: Introduction  to Computing

63Microsoft Office 2007-Illustrated Introductory, Premium Video Edition

Software: Data Representations

ASCII --- American Standard code for Information Exchange

ANSI --- American National Standards Institute

Page 64: Introduction  to Computing

Software: System Software System software helps the computer

carry out it s basic operating tasks.• Operating systems• Utilities• Device drivers• Programming languages

Page 65: Introduction  to Computing

Software: System Software Operating system

• Executes programs• controls the input and output (I/O)• allocates system resources and priorities• Schedules tasks• manages files on storage devices• guards against equipment failure• provides a graphical user interface

(GUI)• Others

Page 66: Introduction  to Computing

Software: System Software Operating system

• Programmer: develop and write the system

• System administrator (SA): configure and maintain the system

• End user: use the system Using GUI (Graphical User Interface) Manipulating files

Page 67: Introduction  to Computing

67

Software: System Software Major Operating systems

• Windows by Microsoft: most recent version is Windows 7.

• Unix/Linux: many flavors (Sun Solaris, HP-UX, IBM AIX, Redhat, Debian, Ubuntu…)

• MacOS: only for Apple computers.

Page 68: Introduction  to Computing

68

Software: System Software Which OS is better?

• Windows: most popular. Easy to use. Many applications. Hardware/software installation is easy. Prone to virus attacks.

• Unix/Linux: free. Popular in academic world. Hardware/software installation needs effort and expertise. More secure than Windows.

• MacOS: nice GUI, stable and reliable. Pay a premium because it’s Apple.

Page 69: Introduction  to Computing

69

Software: System Software

We are users and we learn• Basic knowledge of file systems.• To use GUI of the system• To configure the system• To maintain the system

Page 70: Introduction  to Computing

Software: System Software Utilities

• Analyze, configure, optimize and maintain computer system: disk defragmenter, system restore…

Device drivers• “Drives” a specific device (drive). • The main task to install a device is to

install its driver.

Page 71: Introduction  to Computing

71Microsoft Office 2007-Illustrated Introductory, Premium Video Edition

Software: System Software Programming languages

• Used by a programmer to develop programs.

• Most commonly used computer language: C, C++, Java, C#, Visual Basic, Fortran…

Page 72: Introduction  to Computing

72Microsoft Office 2007-Illustrated Introductory, Premium Video Edition

Software: System Software Drive and Driver

• Drive --- Hardware• Driver --- software to “drive” a

specific drive. Examples:

Hard (disk) drive --- Hard (disk) driverUSB drive --- USB driverPrinter --- Printer driver

Page 73: Introduction  to Computing

Software: System Software

Windows Vista starting screen

Icons (you might see additional icons on

your screen)

Start button

Taskbar

Quick Launch toolbar

Gadgets (small programs; you might see additional or different gadgets on your screen)

Page 74: Introduction  to Computing

Software: Application Software

Enables you to perform specific computer tasks

Examples: web browsers, Microsoft Office, DBMS, ……

Page 75: Introduction  to Computing

Software: Application Software Document production software

• Word processing, desktop publishing…

• Microsoft Word, OpenOffice Spreadsheet software (Excel)

• Creates spreadsheets composed of a grid of columns and rows

• Numerical calculations of cell data

Page 76: Introduction  to Computing

Software: Application Software

Database management software (Access)• Collects and manages data

Database• Contains many tables to store data in

a uniform format of records and fields• record—a collection of data items in a

database• field—one piece of information in the

record

Page 77: Introduction  to Computing

Software: Application Software

Presentation software (PowerPoint)• Makes slides to be presented.

Many other types of application software.

Page 78: Introduction  to Computing

Data Communications

Data communications --- Transfer data between computers

The four essential components• Sender• Channel• Receiver• Protocols

Page 79: Introduction  to Computing

Data Communications

A sender is the computer that originates the message.

The message is sent over a channel. The receiver is the computer that

receives the message. Protocols are the rules that governs the

data transfer. Data bus: the data path.

Page 80: Introduction  to Computing

Data Communications

Components needed to connect a printer to a computer

Page 81: Introduction  to Computing

Data Communications

PCs have several types of ports:• Parallel• Serial• SCSI• USB• MIDI• Ethernet

Page 82: Introduction  to Computing

Data Communications

Parallel port—transmits data eight bits at a time

Serial port—transmits data one bit at a time

SCSI (small computer system interface, pronounced “scuzzy”) port—provides an interface for one or more peripheral devices at the same port

USB (Universal Serial Bus) port—a high-speed serial port which allows multiple connections at the same port

Page 83: Introduction  to Computing

Data Communications Sound card port—usually includes

jacks for speakers and a microphone, which are designed to work with a MIDI (Musical Instrument Digital Interface, pronounced “middy”) card

Ethernet port—used to connect to another computer, a LAN, a modem, or sometimes directly to the Internet; allows data to be transmitted at high speeds.

Page 84: Introduction  to Computing

Data Communications

Computer ports and connections

Page 85: Introduction  to Computing

Networks Network

• connects one computer to other computers and peripheral devices

Network interface card (NIC) • creates a communications channel

between the computer and the network

• a cable connects the NIC port to the network

• Ethernet card Network software

• establishes the communications protocol

• controls the traffic flow

Page 86: Introduction  to Computing

Networks Server - central storage location

for programs Client- computers on a network

dependent on and connect to a server

Client/server network—a network with server and many clients.

Peer-to-peer network• a network without a server • all of the computers are equal

Page 87: Introduction  to Computing

Networks

Standalone computer—a personal computer that is not connected to a network

Workstation—a personal computer that is connected to a network

Node—any device connected to the network

Page 88: Introduction  to Computing

Networks LAN (local area network) WAN (wide area network)

• more than one LAN connected together• the Internet is the largest example of a

WAN WLAN (wireless local area network)

• Computers and peripherals that use high-frequency radio waves instead of wires to communicate and connect in a network

• Wi-Fi (wireless fidelity) describes WLANs connected using a standard radio frequency established by the Institute of Electrical and Electronics Engineers (IEEE)

Page 89: Introduction  to Computing

Networks PAN (personal area network)—a network that

allows two or more devices located close to each other to communicate or to connect a device to the Internet• infrared technology—uses infrared light waves to

beam data from one device to another• Bluetooth—uses short range radio waves to connect

a device wirelessly to another device or to the Internet

WiMAX (Worldwide Interoperability for Microwave Access)• allows computers to connect over many miles to a

LAN• a WiMAX tower sends signals to a WiMAX receiver

built or plugged into a computer

Page 90: Introduction  to Computing

Networks

Using modems to send and receive data

Sending site

Digital signal

Modem

Analog signal

Modem

Digital signal

Receiving site

Page 91: Introduction  to Computing

Security Threats: virus (malware) Software programs infesting

computers: Worms, Trojan horse, spyware, adware…

Replicates itself and fill up disks Damages computer systems Erases files and wipes out disks Ties up network and computers.

Slows down program execution

Page 92: Introduction  to Computing

92

Security Threats: viruses Pops up ads Keylogger: steals personal

information Creates a back-door and lets

remote users access your computer

A bad virus spreads very fast and affects millions computers.

Page 93: Introduction  to Computing

93

Security Threats: Sources of viruses

Downloading virus-infected files Opening malicious emails and their

attachments Infected disks and CDs Worst incidents: Melissa, ILOVEYOU

Page 94: Introduction  to Computing

Security Threats: Anti-virus Firewall

• Stop unwanted and unsolicited incoming network messages and data.

• Can be either hardware or software. Antivirus software

• Every computer must equip with an antivirus software.

System and software update:• Automatic update

Page 95: Introduction  to Computing

95

Security Threats: Antivirus Microsoft: security_essentials (free) Paid: Norton, MacAfee, Trend Micro Free:

• ClamAV: open source. For Unix/Linux , also for Windows

• Clamwin: variant of ClamAV for Windows• Stopzilla• Avast!• AVG Anti-Virus

Page 96: Introduction  to Computing

96

Security Threats: AntivirusThere is no excuse not to install an antivirus software, at least it should have security_essential installed fromwww.microsoft.com/security_essential

SE is free and works well!

Page 97: Introduction  to Computing

Security Threats: Spoofed sites Spoofed site

• A Web site set up to look like another Web site, but which does not belong to the organization portrayed in the site

• The URL (address on the Web) looks similar to a URL from the legitimate site www.citibank.com and www.citybank.com

• Usually set up to try to convince customers of the real site to enter personal information

Page 98: Introduction  to Computing

Security Threats: Phishing Phishing

• Sending e-mails to customers of a legitimate Web site (banks and institutions) asking them to click a link in the e-mail because of Security upgrade Account update Account compromised Other reasons

• If the customer does not click the link, his/her account will be suspended or closed

• the link leads to a spoofed site and asks personal and/or login information.

Page 99: Introduction  to Computing

Security Threats: Other tricks Nigerian scams

• Lottery winner, request processing fee• Unclaimed treasure: needs your account

number to deposit Over-payment scam

• You sell an item (a car…)• A far-away guy will buy it and send you a

bank check larger than your asking price• He asks you to mail the extra to himself

or someone else through western union…• You deposit the check and send the extra

back (real money). Several weeks later, the check bounced.

Page 100: Introduction  to Computing

Security Threats: Phishing Too good to be true >>> not true Never open an unsolicited email,

especially, its attachments Never reveal your personal information

(SSN, bank account number, credit number…) unless you initialize the communication

Never make any payment to a (faraway) stranger.

Wait for the check cleared, then take action.

If someone specifically ask you to send money through Western Union or Money Gram most likely it’s a scam.

Page 101: Introduction  to Computing

Security Threats: Phishing To clear a bank check needs one

to several weeks, especially foreign checks.

Payment by Western Union… is not traceable.

101Microsoft Office 2007-Illustrated Introductory, Premium Video Edition

Page 102: Introduction  to Computing

Security Threat: Strong password At least eight characters long

Consists of upper- and lowercase letters and numbers

Does not include common personal information

Page 103: Introduction  to Computing

Security Threats: Encryption

Encrypt important files especially when files are on a USB drive.

TrueCrypt: free and easy to use for Unix, Linux, and Windows.