Escolar Documentos
Profissional Documentos
Cultura Documentos
Content
Instructor
Course Description
The goal of the unit is to give the student an understanding of information technology including basic
concepts of computer science and a networked study environment. This includes:
After completing the unit, the student has acquired the ability to use computers and information
networks as efficient tools in basic and professional studies. The student has the capability to apply
requirements for information security, the ability to use main PC applications software, and the ability
to apply knowledge and strategies to enhance information technology related skills.
Course Topics
Core knowledge:
Additional knowledge
Learning Materials
Books:
Long, Larry: Computers, 12th (or earlier) edition, Prentice-Hall, 2005. Chapters 1-10.
Snyder, Lawrence: Fluency with Information Technology. Skills, concepts, capabilities. Pearson 2011.
site: http://www.aw.com/snyder
Suggested reading (some part of these lecture notes is not up-to-date, please compare with the
material presented in the class and distributed through the Tube portal):
Web Resources:
http://www.electricteacher.com/
Learning methods
For advanced students who have previous studies, a pre-course test is optional. This has to be
completed by 16 September.
Class Procedures
Attendance to the lectures is highly recommended. Sessions in the laboratory are devoted to practical
exercises. All work has to be completed and handed in to the teacher by posting it on the student
home page, and if asked, showing it on a PC. Two students can work together, but also in that case,
both names have to appear in all documentation and both submit all the work. Make sure your work is
registered by the teacher! Keep all your work until you have received the credits.
Please, get yourself a USB memory stick for the exercises, in order to have backups. Note: labs may
have different versions of some software from what you have on your home computer. You are
allowed to use Microsoft office or LibreOffice but check the versions for compability, especially if you
do part of the work home.
Assessment
The course work is assessed based on the quality of laboratory work, and the report and learning log.
All deliverables have to be handed in before you can get credit. Weight of different components is as
follows:
Assessment
Max points
component
Powerpoint presentation 5
Home page 5
CSS 2
Grading
Your grade will be calculated on the basis of total points from assignments. All components must be
passed to get credit for the course (one may be exempted). 20 points are required for a 1, and 37 for
a 5.
Administration
Due Dates
Deliverables which are late or missing will be penalized. This applies to the assessed components as
well as all the other exercises.
Due dates may be changed on request for compelling reasons like illness or late arrival to Finland. The
students are responsible for making change of arrangements with the instructor before the work is
due.
Academic Integrity
Dishonesty is not part of academic and professional work. Dishonesty includes e.g.:
Students are adviced to pay close attention to the intellectual property rights in their work, also when
creating home pages. Copyright can be violated e.g. through plagiarism (i.e. intentional or
unintentional presentation of another person's text, findings, or interpretations as one's own), or
copying proprietary images, animations, video clips or sounds.
If caught for academic fraud, you will receive 0 in this course and a referral to the disciplinary board of
the Institute.
Schedule
The preliminary weekly schedule is indicated in the table below. The practice work for the whole term
is available, but some changes may still take place.
Please remember that you hand in all work through Tuubi and by posting it on your home pages, not
by email! We discuss the work in the classroom, not through email (unless you are not able to come
to the school for some weeks).
38 History of Excel basics: tables and graphs Excel continues: formulas and
computing references (loan table);
Data and encoding Linear regression and Signal
analysis
42 Examination week,
no classes
43 "Project week", no
classes
Calculating devices:
Jacquard's loom 1801: weaving loom was controlled by paper cards with holes in them.
Hollerith: punched card machines for US census 1890, electromechanical, start of calculation
machines and IBM
- 1928 subtraction
- 1931 multiplication
1940s
both commands and numerical data were expressed and processed in the same
form and in the same devices
early 1950s
stand-alone computers
1956
magnetic disks
VLSI and so on
HISTORY OF AUTOMATIC DATA PROCESSING: software and systems
1950s
1960s
1970s
databases
division of labor: operators, systems analysts, data analysts, data entry clerks, programmers, output
handlers
1980s
robotics
Links:
Web history timeline, BBC
integration of applications
multimedia
Personal workstation, PC
word processing
calculations
graphics, image processing
voice processing
telecommunications: network workstation
Input:
Output:
Monitor or display
Printer
Disk
Other systems through network.
hardware
Types of computers
PC, Macintosh
Workstation
terminal
Main frame (statistics, insurance, banks)
Host computer
Supercomputer (Physics, Airplane design, Meteorology)
PC varieties:
Palmtop
Laptop (portable)
Desktop
Tower, Server
4. finally you see a dialogue box for logging onto the LAN
The status of programs is often saved on the disk during execution, that's why it is important to close
all programs properly before quitting
the computer does not start: check all connections and power
File not found From time to time you may lose files or you have saved them elsewhere than
you believed. Use the Find property, or check the default directory for saved files in your
software. To be prepared for loss of files, always remember back-ups!
When a program hangs (it is stuck with an operation) or the system locks up: press Ctrl-Alt-
Del to get the task list, in Close Program dialogue, select the application and click End Task.
if a network connection is not created, you may have entered a wrong user ID/ password; or
there is a network problem
if something really odd goes on e.g. during the start, there may be a virus
to avoid viruses: never download programs from unknown source, never use pirated software,
use only checked diskettes
printer does not print: check the default printer, check network connection, sometimes it is
needed to restart the printer to create a network connection
finally some error jokes: poetic error messages
programs,
documents,
images
data bases
Technically, files contain characters of information. Size of a file is expressed in bytes: one byte is 8
bits long (8 zeroes and ones). Also hexadecimal system is used in PC addressing and character
names. 1 KB is actually 1024 bytes: 1 k = 1000, but 1 K = 1024.
1 b (bit)
1 B (byte) = 8 b
One page of text takes basically 2 KB, but the codes of the software need extra space, e.g. a short
Word file takes 19 KB
Data is organized in
files
directories, folders, which make a tree structure
File names
old DOS: 8 characters plus an extension of 3 characters; No spaces are accepted, no special
characters; You can select any file name except reserved DOS words.
Windows XP, 2000, 98, 95: 255+4 characters, also spaces
choose descriptive, unique names
file names are not case sensitive in Windows, but in Unix they are!
remember compatibility!
Most programs like Excel, Word, and Paint automatically give the extension to file names.
DOS calls disk drives by letters: for diskettes A: and B:, from C: onwards hard drives, D: or F: for a
CD drive. In a network, F: is usually the first drive located on servers.
When a file is called and saved, a complete specification is used to identify it. A file specification
includes the letter of the drive and the directory path, like
E:\QUEST\QUESFORM.FRM.
A hard disk is installed inside the case of the computer and it has a capacity starting of 60 GB
(thousands of millions of characters)
3" DS/DD 720 kB; very old ones (but not the oldest)
HD 1.44 MB or 2.88 MB
DVD
ZIP disks (100 or 250 MB); was used at EVTEK at one point
USB memory devices or PC cards emulate disk storage, capacity starting from 256 MB to 6 GB, USB
disks even over 200 GB
Formatting
Formatting wipes the contents of the disk. It also checks disk for bad sectors. It can be used
to clear a disk, as well.
PC s
Year Processor word RAM OS Speed
bits MHz
1981 IBM Personal Computer, with Intel 8088 processor & PC DOS, MS DOS
clones
Macintosh
Electronic signals:
analog
digital
Encodings
BMP, TIFF
pixel
number of colours RGB (B/W, 16, 256, 24-bits)
compressed:
o GIF (interlaced, animated)
o JPG
Vector graphics
Postscript, EPS
WMF
CMX (Corel)
HPG
Bezier curves
processor (CPU):
ALU arithmetic- logic unit
control unit
registers
Cache: internal and external
memory RAM (SIMM, DIMM)
BIOS (Basic Input Output System), ROM, PROM or Flash BIOS
Buses: within the processor and external
ISA, PCI, USB
expansion slots
connectors
battery
parallel
serial
USB (up to 127 devices chained, fast, 12 Mbps)
infrared
firewire IEEE 1394
Bluetooth
SCSI (max 15 devices)
Hard disk connection: IDE, SCSI, ATA/33, Ultra ATA/66
AGP, accelerated graphics adapter
PCMCIA card in portable computers
Installation:
Processor, CPU
The instruction time includes: fetch and decode; the execution time includes execute,
and place result in memory.
Machine instructions
Step 1: Get the value from memory location 6C and place it in a register. =LOAD
Step 2: Get the other value to be added from memory location 6D and place it in another register. =LOAD
Step 3: Activate the addition circuitry with the registers used in steps 1 and 2 as inputs with another register
designated to store the result. =ADD
Code:
Step 1: 156C
Step 2: 166D
Step 3: 5056
Step 4: 306E
Step 5: C000
Note: Data and programs are contained in memory, thus the machine alone has no way of knowing what is data and
what is program. It allows one program to manipulate other programs as it would data.
Machine architectures
I/O alternatives:
2) memory mapped I/O: ports are disguised as memory cells; data is read from ports with LOAD-instruction and
written with STORE
Communication control:
e.g. CPU produces data faster than peripheral device (printer) can receive: handshaking allows the
peripheral device to transmit its status back to the computer
duplex (two-way) communication lines:
half-duplex, only one direction of communication at a time
full-duplex, both directions at the same time (telephone)
Controllers (channels)
Parallel communication
all bits of a character transferred at the same time, each on a separate line, connector wide (36, 50 pins)
used for printers, short distance, simple, LPT1
Serial communication
Input devices:
keyboard, mouse, pointing pen, touch screen, joystick, finger pad, bar code reader, scanner, microphone,
digital camera, video camera
Output devices:
Visual images expressed with matrix method: character matrix and bit map for graphics.
Printers: laser, ink jet, dot matrix, plotter, thermal, line printer, daisy wheel
Display
red = (255, 0, 0)
purple = (255, 0, 255)
light yellow = (255, 255, 128)
black = (0, 0, 0)
white = (255, 255, 255)
grey = (196, 196, 196)
Printers
Laser printer
Modem
Transfer time for a text file of 1 MB (about 500 A4- pages) with some modems:
Modem speed (bps) 1 MB file
2400 Ca 1 hour
9600 Ca 15 min
14 400 Ca 10 min
19 200 Ca 7 min
33 600 Ca 4 min
Algorithm
Mathematics
algorithms in computers
programs
the intelligence required to solve a problem or to perform a task is
encoded in the algorithm
to follow the directions of an algorithm is merely mechanical
Computer science
study of algorithms
which problems can be solved by algorithmic processes?
how can the discovery of algorithms be made easier?
how can the techniques of representing and communicating algorithms
be improved?
how can our knowledge of algorithms and technology be applied to
process better machines?
Programming Languages
Machine Language
Assembler (mnemonic)
Procedure-Oriented Languages
o Fortran, Pascal
o Cobol
o BASIC
Object-Oriented and Visual Languages
C ++
Java, C#
Visual Basic
Visual C etc.
Delphi
Oracle
Natural Languages
Operating systems
The first program loaded when the computer is turned on, its main part, the
"kernel," resides in memory at all times.
The operating system sets the standards for all application programs that run
in the computer. The applications "talk to" the operating system for all user
interface and file management operations.
Functions:
2) Provide for efficient device access. Includes routines needed to use the
peripheral devices attached to the machine. To facilitate communication
among computer system components, and to maximize throughput.
Batch processing
- execution of jobs which are collected together with their data in a single
batch without interaction with the user
- job queue: jobs waiting before being executed. FIFO (first-in-first-out) and
priorities
Interactive processing
- multitasking systems
- time-sharing
Command processor
Scheduler
File manager
Resource allocator
Dispatcher
Utility software
various routines for device control, file manipulation, etc, editors (for
programming)
library
Interrupt handling
Interrupt signal:
Interrupt requests:
allowed only at the end of machine cycle, before fetching the next
instruction
Time-sharing
Resource allocation
"Let's review a little how multitasking works: At any time, there may be
multiple threads of execution running under the system. (A thread is a series
of sequential machine code instructions that are associated with a unique
CPU register state and stack.) The operating system periodically receives a
hardware timer interrupt. Under Windows NT, the timer interrupt is
programmed to occur every 15 milliseconds. When the system receives a
timer interrupt, it is then free to switch execution from one thread to another;
this procedure is known as time slicing.
Every thread of execution has a certain priority which governs how NT divides
the time slices among the threads. Threads can also be suspended for
various reasons, such as waiting on keyboard input or waiting on a
semaphore (a flag for a memory unit)."
1) start signal: all controllers, starting registers and program counters are set
in start-state, initialized
2) program counter reads the pre-determined address from memory (ROM
program, bootstrap) before starting its first machine cycle
Unix
Kernel
Memory allocation
timing
I/O
File system management
Shell
Commands
ls -f list all files including files starting with a dot (.login .forward etc)
exit
Programs in Unix
pine email
tin News
pico index.html
editor <file>
emacs letter.txt
telnet evitech.fi
Communications channel
Topology
star
ring
bus
Workstations
Servers
Software
communications protocols:
access method(token access, Ethernet)
protocol (TCP/IP, Novell IPX/SPX)
LAN access: NetBIOS
network operating system: Novell Netware, Windows 2000
network management software
Services
Internet
Intranet/ Extranet
Common carriers:
Other options:
Services
E-mail
MIME (Multipurpose Internet Mail Extensions)-standard:
address, subject, distribution, attachments, message; sender's e-mail address
Pine, Eudora, Lotus Notes, Netscape Mail, MS Outlook, Novell Groupwise etc.
Hypertext in Internet: Gopher
HTTP: hypertext transfer protocol
hypermedia (world-wide web)
Internet services
shopping, mail order, travel and seat reservations, postcards, etc
Chat, discussion forums, "ICQ" instant messaging
Internet Phone
work group programs (Lotus Notes, Novell GroupWise)
cookies
Evitech Introduction to Computing
| HOME | SYLLABUS | CALENDAR | TOPICS | EXERCISES |
Lecture notes 4
Hexadecimal notation 24=16
Binary addition:
00111010
+00011011
---------------
Logical operations in binary format:
AND result
0 0 0
0 1 0
1 0 0
1 1 1
OR result
0 0 0
0 1 1
1 0 1
1 1 1
NOT result
0 1
1 0
Data files may include viruses: any file extension could be deceiving
never open e-mail attachments unless you are sure they are OK
never insert a diskette of unknown source, or suspected to be infected
never download and install programs, plug-ins or other files you are not sure about from internet
Be smart:
In EVTEK