Académique Documents
Professionnel Documents
Culture Documents
How Your Computer Boots In a cold boot, the computer system runs a series of programs that includes a self-testing process called POST (power-on self test). This test verifies that certain hardware components are operational. Next, the computer searches for the operating system programs, which are typically stored on the computer's internal hard disk. Once located, select operating system files are copied into the computer's memory. Some of these files are called the kernel of the operating system and include programs that perform basic operations such as assigning computer resources and starting application programs. The kernel is memory resident, which means that it remains in memory as long as the computer is on. Finally, the operating system displays the user interface on the monitor.
BROWSERS
How Browsers Work A browser helps you open and transfer files, display text and images, and provide in one tool an uncomplicated interface to the Internet and Web documents. Four well-known browsers are Microsofts Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome. For a browser to connect to resources on the Web, the location or address must be specified. These addresses are called uniform resource locators or URL's (see figure 1). Once connected to a Web site, an HTML file is sent back to your computer which your browser interprets and displays as a Web page (see figure 1). This page presents information about the site as well as references and hypertext links or links (see figure 1) that connect to other documents containing related information.
FILE COMPRESSION
How File Compression Works File compression reduces the size of files making them more efficient to store and to transport across the Internet. There are two types of file compression: lossy and lossless. With lossy file compression some of the data in a file is discarded. This type of compression is typically used with pictures and music files. For example, in an image file, data elements that record subtle color changes or shading may be eliminated without seriously degrading the image. Lossless file compression does not discard any data. This approach looks for repeated patterns in the data and creates a table of the repeated patterns. The repeating patterns in the uncompressed file are replaced in the compressed file with a pointer to the appropriate location in the table. You may have received compressed files in an email attachment or downloaded them from the Internet. Frequently, these files have a .zip file extension and are called zip files. Before you can use the files, they must be decompressed or unzipped. Some files can be decompressed by simply clicking on them and others require special compression/decompression utilities such as WinZip or PKZip. Lossy discards some data. Lossless uses repeated patterns. WinZip, IZArc, and 7-zip are file compression/decompression utilities.
INTERNET TELEPHONY
How Internet Telephony Works Internet telephony is the transmission of telephone calls over computer networks. One of the most common applications involves computer-to-traditional telephone communications. This process uses a special Internet phone service provider and typically involves four steps. Request. Using the software provided by the Internet phone service provider, the caller enters a telephone number and requests a connection. Relay. The request is relayed to the provider's Internet server that is located closest to the requested number. Connect. Using traditional local telephone communication lines, the server connects to the requested telephone. Talk. The requested telephone rings, the party answers, and communication begins using the local telephone communication line and the Internet.
VIRTUAL MEMORY
How Virtual Memory Works Virtual memory expands the capability of a computer system to run programs that exceeds the systems memory capacity. This process typically involves three steps. Request. The system unit receives a request to run a program that requires more RAM than is available. Store. The operating system recognizes the problem, divides the program into parts, and stores the parts on the hard disk. Execute. The first part of the program is read into RAM and the program begins to execute. As the program executes, the other parts are moved back and forth between RAM and the hard disk as needed.
IDENTITY THEFT
What Is Identity Theft? Identity theft is a growing problem, and can be financially devastating if you are a victim. Here are some steps to protect your identity. Never give personal information on the Internet or in response to an e-mail. One common scam known as phishing involves e-mail that has been forged to appear to come from your bank or school. Only do business on the Internet with companies you know to be legitimate, or large companies with a solid reputation. When selling a computer, be sure to completely remove all personal information from the hard drive. Many programs are available to ensure data is completely removed. Check your credit reports from the three major bureaus for unusual activity or inaccuracy at least once a year.
STREAMING MEDIA
How Streaming Media Works Downloading a file transfers the entire contents to your computer. Streaming a file transfers packets that are stored temporarily in a buffer. Almost all information sent over the Internet is contained in files. For example, when your browser connects to a Web site, the site sends a document file back to your computer. Once the entire file has been received, your browser interprets the file and displays a Web page. This process works very well for small files because the time required to deliver the file over the Internet is short. It does not work as well for large media files such as audio and video files. There are two basic ways in which file content is delivered via the Internet to your computer: downloading and streaming. Downloading a file transfers the entire contents of the file to your computer. After the file has been downloaded, it can be used. For example, to download an MP3 music file, you right click on the link, choose Save as, and specify the location on your computer to save the file. Downloading a file can take a few minutes or in the case of video files it can take hours. Once the file has been stored onto your computer, you can play the music or the video Streaming a file does not transfer the entire contents of the file to your computer. Rather, the file is broken down into parts or data packets. These data packets are temporarily stored in a buffer or special part of your computer's RAM. Once the buffer has received several packets, these packets can be used at the same time more data packets are being received. For example, a streaming MP3 music file can be listened to at the same time it is being downloaded. A streaming audio or video file can begin playing within seconds and continue to play until the entire contents have been delivered.