Monday, December 09, 2013

Assignment Chapter 10 Part II

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan

Student ID : 1701338122


True/False
Mark T for True and F for False.

__T__  1. Data is a collection of unprocessed items, which can include text, numbers, images,
                    audio, and video. (514)
__T__ 2. A database management system allows users to create forms and reports from the
                    data in the database. (515)
__F__ 3. A range check ensures users enter only numeric data in a field. (523)
__T__ 4. A check digit often confirms the accuracy of a primary key value. (523)
__F__ 5. Databases require less memory, storage, and processing power than a file processing
                    system. (526)
__F__ 6. A report is a window on the screen that provides areas for entering or modifying
                    data in a database. (530)
__T__ 7. Continuous backup is a backup plan in which all data is backed up whenever a change
                    is made. (532)
__T__ 8. A relationship is a link within the data in a database. (533)
__F__ 9. Normalization is a process designed to ensure the data within the relations (tables) is
                    duplicated so that it is not lost. (534)
__T__ 10. The data in a distributed database exists in many separate locations throughout a
                    network or the Internet. (536)
Multiple Choice 
Select the best answer.

1. _____ information has an age suited to its use. (516)
(a.) Organized                   (b.) Timely                          (c.) Cost-effective                           (d.) Verifiable
Answer : (b.)
 2. In some tables, the primary key consists of multiple fields, called a _____. (519)
(a.) composite key          (b.) secondary key          (c.) key field                                       (d.) column
Answer : (a.)
 3. _____ procedures include adding records to, modifying records in, and deleting records from a file. (520)
(a.) Backup                         (b.) Range check              (c.) Validation                                    (d.) File maintenance
Answer : (d.)
 4. A range check _____. (523)
(a.) ensures that users enter only alphabetic data into a field
(b.) determines whether a number is within a specified range
(c.) ensures that users enter only numeric data into a field
(d.) v erifies that a required field contains data
Answer : (b.)
 5. All of the following are strengths of the database approach, except _____. (525)
(a.) less complexity         (b.) improved data integrity        (c.) easier access             
(d.) reduced development time
Answer : (a.)
 6. Because the _____ contains details about data, some call it metadata (meta means more comprehensive). (528)
(a.) data mart                    (b.) data dictionary                          (c.) data modeler             (d.) data warehouse
Answer : (b.)
 7. Many organizations adopt the _____ policy, where users’ access privileges are limited to the lowest level necessary to perform required tasks. (531)
(a.) golden rule                 (b.) principle of least privilege    (c.) principle of highest access    (d.) least order
Answer : (b.)
 8. The database analyst (DA) _____. (538)
(a.) decides on the proper placement of fields
(b.) creates and maintains the data dictionary
(c.) monitors the performance of the database
(d.) checks backup and recovery procedures
Answer : (a.)
Matching Match 

__E___ 1. field name (518)
e. uniquely identifies each field
__G___ 2. field size (518)
g. defines the maximum number of characters a field can contain
__C___ 3. data type (518)
c. specifies the kind of data a field can contain and how the field is used
__B___ 4. primary key (519)
b. field that uniquely identifies each record in a file
__J___ 5. query language (528)
j. consists of simple, English-like statements that allow users to specify the
   data to display, print, or store
__A___ 6. log (532)
a. listing of activities that modify the contents of a database
__I___ 7. recovery utility (532)
i. uses the logs and/or backups to restore a database when it becomes
   damaged or destroyed
__D___ 8. GIS (534)
d. database that stores maps and other geographic data
__H___ 9. data modeler (538)
h. person who focuses on the meaning and usage of data
__F___ 10. database administrator (538)
f. creates and maintains the data dictionary, manages security of the database,
   monitors the performance of the database, and checks backup and recovery
   procedures

Short Answer
Write a brief answer to each of the following questions.

1. What is validation?

Validation is the process of comparing data with a set of rules or values to find out if the data is correct.

What are five types of validity checks ?

Alphabetic checks, numeric checks, range checks, consistency checks, completeness checks.

2. Why is data redundancy a weakness of file processing systems?

In data redundancy each department or area in an organization has its own files in a file processing system, by duplicating data it wastes resources such as storage space and people’s time, also data redundancy can increase the chance of error.

Why is isolated data a weakness of file processing systems?

Isolated data often it is difficult to access data stored in separate files in different department. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires the experience of a computer programmer.

3. What is the database approach?

Database approach : programs and user share the data in the database.

Describe five strengths of the database approach :

• Reduces Data Redundancy, most data items are stored in only one file, which greatly reduces duplicated data.
•Improved data integrity, when user modify data in the database, they make change to one file instead of multiple files.
•Shared data, the data in a database environment belongs to and is shared, usually over a network, by the entire organization.
•Easier Access, the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges.
•Reduces Development Time, it often is easier and faster to develop programs that use the database approach.

4. Describe how you might use a Simple Query Wizard.

First, select the fields from the Available Fields list you want to be displayed in the resulting query.
Second, assign a name to the query, so that you can open it later.
Third, view the query result on the screen.

What is query by example?

Query by example is a feature that has a graphical user interface to assist users with retrieving data.

5. What are the advantages of object-oriented databases?

They can store more type of data, access this data faster, and allow programmers to reuse object.

Describe four examples of object-oriented databases.

•A multimedia database stores images, audio clips, and/or video clips, for example, a GIS database •stores maps and other geographic data.
•A groupware database stores documents such as schedules, calendars, manuals, memos, and reports.
•A computer-aided design database stores data about engineering, architectural, and scientific design.

•A hypertext database contains text links to other types of documents. A hypermedia database contains, text, graphic, video, and sound.

Assignment Chapter 10 Part I

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan

Student ID : 1701338122


1. What Is a Database, and How Does a Database Interact with Data and Information?

 A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. Database software, often called a database management system (DBMS), allows users to create a computerized database; add, modify, and delete the data; sort and retrieve the data; and create forms and reports from the data. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Computers process data into information. Information is processed data; that is, it is organized, meaningful, and useful. In addition to documents, information can be in the form of audio, images, and video.

2. What Is Data Integrity, and What Are the Qualities of Valuable Information?

Because data is used to generate information, many organizations realize that data is one of their more valuable assets. Data integrity identifies the quality of data. Data integrity is important because computers and people use information to make decisions and take actions. For a computer to produce correct information, the data that is entered in a database must have integrity. For information to be valuable, it should be accurate, verifiable, timely, organized, accessible, useful, and cost-effective. Accurate information is error free. Verifiable information can be proven as correct or incorrect. Timely information has an age suited to its use. Organized information is arranged to suit the needs and requirements of the decision maker. Accessible information is available when the decision maker needs it. Useful information has meaning to the person who receives it. Cost-effective information should give more value than it costs to produce.

3. What Is Meant by Character, Field, Record, and File? 

Data is classified in a hierarchy, with each level of data consisting of one or more items from the lower level. A bit is the smallest unit of data a computer can process. Eight bits grouped together in a unit form a byte, and each byte represents a single character, which can be a number, letter, space, punctuation mark, or other symbol. A field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses. A record is a group of related fields. A data file is a collection of related records stored on a storage medium such as a hard disk or optical disc.

 4. What Are File Maintenance Techniques and Validation Techniques?

File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records when new data is obtained, modifying records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed. Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

5. How Is a File Processing Approach Different from the Database Approach?

In a file processing system, each department or area within an organization has its own set of data files. The records in one file may not relate to the records in any other file. Two major weaknesses of file processing systems are redundant data (duplicated data) and isolated data. With a database approach, many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time. A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power than file processing systems. Data in a database also can be more vulnerable than data in file processing systems.

 6. What Functions Are Common to Most Database Management Systems?

 Database management systems (DBMSs) are available for many sizes and types of computers. Whether designed for a small or large computer, most DBMSs perform common functions.
A data dictionary, sometimes called a repository, contains data about each file in the database and each field in those files. A DBMS offers several methods to retrieve and maintain data in the database, such as query languages, query by example, forms, and report generators.
A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store. Query by example (QBE) has a graphical user interface that assists users with retrieving data.
 A form, sometimes called a data entry form, is a window on the screen that provides areas for entering or modifying data in a database
 A report generator, also called a report writer, allows users to design a report on the screen, retrieve data into the report design, and then display or print the report. To supply security, most DBMSs can identify different levels of access privileges that define the actions a specific user or group of users can perform for each field in a database. If a database is damaged or destroyed, a DBMS provides techniques to return the database to a usable form.
A backup is a copy of the database.
A log is a listing of activities that modify the contents of the database.
A recovery utility uses the logs and/or backups to restore the database using rollforward or rollback techniques. In a rollforward, also called forward recovery, the DBMS uses the log to reenter changes made to the database since the last save or backup. In a rollback, also called backward recovery, the DBMS uses the log to undo any changes made to the database during a certain period.  Continuous backup is a backup plan in which all data is backed up whenever a change is made.

7. What Are Characteristics of Relational, Object-Oriented, and Multidimensional Databases?

 A data model consists of rules and standards that define how the database organizes data. Three popular data models are relational, object-oriented, and multidimensional. A relational database stores data in tables that consist of rows and columns. A relational database developer refers to a file as a relation, a record as a tuple, and a field as an attribute. A relational database user refers to a file as a table, a record as a row, and a field as a column. A relationship is a link within the data in a relational database. Structured Query Language (SQL) allows users to manage, update, and retrieve data in a relational database. An object-oriented database (OODB) stores data in objects. An object is an item that contains data, as well as the actions that read or process the data. Applications appropriate for an object-oriented database include a multimedia database, a groupware database, a computer-aided design (CAD) database, a hypertext database, and a hypermedia database. Object-oriented databases often use an object query language (OQL) to manipulate and retrieve data. A multidimensional database stores data in dimensions. These multiple dimensions, sometimes known as a hypercube, allow users to access and analyze any view of the database data. No standard query language exists for multidimensional databases. One application that uses multi dimensional databases is a data warehouse, which is a huge database that stores and manages the data required to analyze historical and current transactions. A smaller version of a data warehouse is the data mart, which contains a database that helps a specific group or department make decisions.

 8. How Are Web Databases Accessed?

To access data in a Web database, you fill in a form or enter search text on a Web page, which is the front end to the database. A Web database usually resides on a database server, which is a computer that stores and provides access to a database. One type of program that manages the sending and receiving of data between the front end and the database server is a CGI (Common Gateway Interface) script.

 9. What Are the Responsibilities of Database Analysts and Administrators?

A database analyst (DA), or data modeler, focuses on the meaning and usage of data. The DA decides on the placement of fields, defines data relationships, and identifies users’ access privileges. A database administrator (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages database security, monitors database performance, and checks backup and recovery procedures. In small companies, one person often is both the DA and DBA. In larger companies, the responsibilities of the DA and DBA are split among two or more people.

Assignment Chapter 9

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan

Student ID : 1701338122


1. What Is the Purpose of the Components Required for Successful Communications, and What Are Various Sending and Receiving Devices?

Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. Today, even the smallest computers and devices can communicate directly with one another, with hundreds of computers on a company network, or with millions of other computers around the globe — often via the Internet.
Some communications involve cables and wires; others are sent wirelessly through the air.
For successful communications, you need the following:
• A sending device that initiates an instruction to transmit data, instructions, or information.
• A communications device that connects the sending device to a communications channel.
• A communications channel, or transmission media on which the data, instructions, or information travel.
• A communications device that connects the communications channel to a receiving device.
• A receiving device that accepts the transmission of data, instructions, or information.
All types of computers and mobile devices serve as sending and receiving devices in a communications system. This includes mainframe computers, servers, desktop computers, notebook computers, smart phones, portable media players, handheld game consoles, and GPS receivers. One type of communications device that connects a communications channel to a sending or receiving device such as a computer is a modem. Two examples of communications channels are cable television lines and telephone lines.

2. How Are Computer Communications Used?

Communications technologies include blogs, chat rooms, e-mail, fax, FTP, instant messaging, newsgroups, RSS, video conferencing, VoIP, Web, Web folders, and wikis. Users can send and receive wireless messages to and from smart phones, cell phones, handheld game consoles, and other mobile devices using text messaging, picture messaging and video messaging, and wireless instant messaging. People connect wirelessly to the Internet through a wireless Internet access point. A hot spot is a wireless net- work that provides Internet connections to mobile computers and devices. A cybercafé is a coffeehouse, restaurant, or other location that provides computers with Internet access. A global positioning system (GPS) analyzes signals sent by satellites to determine an earth-based receiver’s geo- graphic location. Many software products provide a means to collaborate, or work online with other users connected to a server. Groupware is software that helps groups of people work on projects or share information over a net- work. Voice mail allows someone to leave a voice message for one or more people. Web services describe standardized software that enables programmers to create applications that communicate with other remote computers.

3. What Are the Advantages of Using a Network, and How Are LANs, MANs, and WANs Different?

A network is a collection of computers and devices connected together via communications devices and transmission media. Advantages of using a network :
 • Facilitating communications — Using a  network, people communicate efficiently and easily via e-mail, instant messaging, chat rooms, blogs, wikis, online social networks, video telephone calls, online meetings, video conferencing, VoIP,  wireless messaging ser- vices, and groupware. Some of these communications, such as e-mail, occur within a business’s internal network. Other times, they occur globally over the Internet.
• Sharing hardware — In a networked environment, each computer on the network can have access to hardware on the network. Business and home users network their hardware to save money. That is, it may be too costly to provide each user with the same piece of hardware such as a printer. If the computers and a laser printer are connected to a network, the computer users each access the laser printer on the network, as they need it.
• Sharing data and information — In a networked environment, any authorized computer user can access data and information stored on other computers on the network. A large company, for example, might have a database of customer information. Any authorized person, including a mobile user with a smart phone or other device connected to the network, has access to the database.  Most businesses use a standard, such as EDI (electronic data interchange), that defines how data transmits across telephone lines or other means. For example, companies use EDI to handle product catalog distribution, bids, requests for quotations, proposals, order placement, shipping notifications, invoicing, and payment processing. EDI enables businesses to operate with a minimum amount of paperwork.   Another popular data sharing standard is XML, briefly described earlier in this chapter. Using XML, Web programmers can create one version of a Web page that then can be displayed in a form appropriate for a variety of display devices. XML also is used in RSS, which is used to distribute content, such as news, to subscribers.
• Sharing software — Users connected to a network have access to software on the net- work. To support multiple users’ access of software, most vendors sell network versions or site licenses of their software, which usually cost less than buying individual copies of the software for each computer. A network license is a legal agreement that allows multiple users to access the software on a server simultaneously. The network license fee usually is based on the number of users or the number of computers attached to the network. A site license is a legal agreement that permits users to install the software on multiple computers — usually at a volume discount.
• Transferring funds — Called electronic funds transfer (EFT), it allows users connected to a network to transfer money from one bank account to another via transmission media. Both businesses and consumers use EFT. Consumers use an ATM to access their bank account. Businesses deposit payroll checks directly in employees’ bank accounts. Consumers use credit cards to make purchases from a retail Web site. Businesses use EFT to purchase and pay for goods purchased from vendors. Both businesses and consumers pay bills online, with which they instruct a bank to use EFT to pay creditors.

LANs, MANs, and WANs
Networks usually are classified as a local area network, metropolitan area network, or wide area network.
LAN
A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network, called a node, often shares resources such as printers, large hard disks, and programs. Often, the nodes are connected via cables.
A wireless LAN (WLAN) is a LAN that uses no physical wires. Computers and devices that access a wireless LAN must have built-in wireless capability or the appropriate wire- less network card, USB network adapter, ExpressCard module, PC Card, or flash card. Very often, a WLAN communicates with a wired LAN for access to its resources, such as software, hardware, and the Internet
MAN
A metropolitan area network (MAN) is a high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region. A MAN typically includes one or more LANs, but covers a smaller geographic area than a WAN. A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users. Local and state governments, for example, regulate some MANs. Telephone companies, cable television operators, and other organizations provide users with connections to the MAN.
WAN
A wide area network (WAN) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves. A WAN can be one large network or can consist of two or more LANs connected together. The Internet is the world’s largest WAN.

4. How Are a Client/Server and Peer-to-Peer Networks Different, and How Does a P2P Network Work?

Client/Server
On a client/server network, one or more computers act as a server, and the other computers on the network request services from the server. A server, sometimes called a host computer, controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information. The clients are other computers and mobile devices on the network that rely on the server for its resources.
Some servers, called dedicated servers, per- form a specific task and can be placed with other dedicated servers to perform multiple task. For example, a file server stores and manages files. A print server manages printers and documents being printed. A database server stores and provides access to a database. A network server manages network traffic (activity). A Web server is a computer that delivers requested Web pages to your computer. Although it can connect a smaller number of computers, a client/server network typically pro- vides an efficient means to connect 10 or more computers. Most client/server networks require a person to serve as a network administrator because of the large size of the network.
Peer-to-Peer
One type of peer-to-peer network is a simple, inexpensive network that typically connects fewer than 10 computers. Each computer, called a peer, has equal responsibilities and capabilities, sharing hardware (such as a printer), data, or information with other computers on the peer-to-peer network. Each computer stores files on its own storage devices. Thus, each computer on the network contains both the server operating system and application software. All computers on the network share any peripheral device(s) attached to any computer.
Another type of peer-to-peer, called P2P, describes an Internet network on which users access each other’s hard disks and exchange files directly over the Internet. This type of peer-to- peer network sometimes is called a file sharing network because users with compatible software and an Internet connection copy files from someone else’s hard disk to their hard disks. As more users connect to the network, each user has access to shared files on other users’ hard disks. When users log off the network, others no longer have access to their hard disks. To maintain an acceptable speed for communications, some implementations of P2P limit the number of users.

5. How Are a Star Network, Bus Network, and Ring Network Different?

A network topology refers to the layout of the computers and devices in a communications network. Three commonly used network topologies are star, bus, and ring.
Star Network
On a star network, all of the computers and devices (nodes) on the network connect to a central device, thus forming a star. Two types of devices that provide a common central connection point for nodes on the network are a hub and a switch. All data that transfers from one node to another passes through the hub or switch. Star networks are fairly easy to install and maintain. Nodes can be added to and removed from the network with little or no disruption to the network. On a star network, if one node fails, only that node is affected. The other nodes continue to operate normally. If the hub or switch fails, however, the entire network is inoperable until the device is repaired. Most large star networks, therefore, keep backup hubs or switches available in case the primary one fails.
Bus Network
A bus network consists of a single central cable, to which all computers and other devices connect. The bus is the physical cable that connects the computers and other devices. The bus in a bus network transmits data, instructions, and information in both directions. When a sending device transmits data, the address of the receiving device is included with the transmission so that the data is routed to the appropriate receiving device. Bus networks are popular on LANs because they are inexpensive and easy to install. One advantage of the bus network is that computers and other devices can be attached and detached at any point on the bus without disturbing the rest of the network. Another advantage is that failure of one device usually does not affect the rest of the bus network. The greatest risk to a bus network is that the bus itself might become inoperable. If that happens, the net- work remains inoperative until the bus is back in working order.
Ring Network
On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the ring. Data transmitted on a ring network travels from device to device around the entire ring, in one direction. When a computer or device sends data, the data travels to each computer on the ring until it reaches its destination. If a computer or device on a ring network fails, the entire network potentially could stop functioning. A ring network can span a larger distance than a bus network, but it is more difficult to install. The ring topology primarily is used for LANs, but also is used in WANs.

6. What Are Various Network Communications Standards?

A network standard defines guidelines that specify the way computers access a medium, the type(s) of medium, the speeds on different types of networks, and the type of physical cable or wireless technology used. Network communications standards include the following. Ethernet specifies that no central computer or device on the network should control when data can be transmitted. Token ring requires devices to share or pass a special signal, called a token. TCP/IP divides data into packets. Wi-Fi identifies any network based on the 802.11 standards for wireless communications.  Bluetooth uses short-range radio waves to transmit data. UWB specifies how two UWB devices use short-range radio waves to communicate at high speeds. IrDA transmits data wirelessly via infrared light waves. RFID uses radio signals for communications. WiMAX is a network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area. The Wireless Application Protocol (WAP) specifies how some mobile devices can display Internet content.

7. What Is the Purpose of Communications Software?

Communications software consists of programs that :
(1) help users establish a connection to another computer or network;
(2) manage the transmission of data, instructions, and information;
and (3) provide an interface for users to communicate with one another.

8. What Are Various Types of Lines for Communications over the Telephone Network?

The public switched telephone network (PSTN) is the worldwide telephone system that handles voice-oriented telephone calls.
Dial-Up Lines
A dial-up line is a temporary connection that uses one or more analog telephone lines for communications. A dial-up connection is not permanent. Using a dial-up line to connect computers costs no more than making a regular telephone call.
Dedicated Lines
A dedicated line is a type of always-on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used). The quality and consistency of the connection on a dedicated line are better than a dial-up line because dedicated lines provide a constant connection. Businesses often use dedicated lines to connect geographically distant offices. Dedicated lines can be either analog or digital. Digital lines increasingly are connecting home and business users to networks around the globe because they transmit data and information at faster rates than analog lines. Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM. Although cable television (CATV) lines and fixed wireless are not a type of telephone line, they are very popular ways for the home user to connect to the Internet. Fixed wireless Internet connections use an antenna on your house or business to communicate with a tower location via radio signals. Later sections in this chapter discuss the use of CATV lines and radio signals to connect to the Internet.
ISDN Lines
For the small business and home user, an ISDN line provides faster transfer rates than dial-up telephone lines. Not as widely used today as in the past, ISDN (Integrated Services Digital Network) is a set of standards for digital transmission of data over standard copper telephone lines. With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called multiplexing.
DSL
DSL is a popular digital line alternative for the small business or home user. DSL (Digital Subscriber Line) transmits at fast speeds on existing standard copper telephone wiring. Some DSL installations include a dial tone, providing users with both voice and data communications. These DSL installations often require that filters be installed to reduce noise interference when voice communications share the same line. ADSL is one of the more popular types of DSLs. As shown in Figure 9-25, ADSL (asymmetric digital subscriber line) is a type of DSL that supports faster transfer rates when receiving data (the downstream rate) than when sending data (the upstream rate). ADSL is ideal for Internet access because most users download more information from the Internet than they upload.
FTTP
FTTP, which stands for Fiber to the Premises, uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical permanent location. Two specific types of FTTP are FTTH and FTTB. FTTH (Fiber to the Home) provides home users with Internet access via fiber-optic cable. Similarly, FTTB (Fiber to the Building) refers to small businesses that use fiber-optic cables to access the Internet. With FTTP service, an optical terminal at your location receives the signals and transfers them to a router connected to your computer. As the cost of installing fiber decreases, more homes and  businesses will opt for this high-speed Internet access.
T-Carrier Lines
A T-carrier line is any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line. Whereas a standard dial-up telephone line carries only one signal, digital T-carrier lines use multiplexing so that multiple signals share the line. T-carrier lines provide very fast data transfer rates. Only medium to large companies usually can afford the investment in T-carrier lines because these lines are so expensive.
ATM
ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video, and multimedia at very high speeds. Telephone net- works, the Internet, and other networks with large amounts of traffic use ATM. Some experts predict that ATM eventually will become the Internet standard for data transmission, replacing T3 lines.

9. What Are Commonly Used Communications Devices?

A communications device is hardware capable of transmitting data between a sending device and a receiving device. A dial-up modem converts digital signals to analog signals and analog signals to digital signals so that data can travel along analog telephone lines. A digital modem sends and receives data and information to and from a digital line. An ISDN modem transmits digital data to and from an ISDN line, while a DSL modem transmits digital data to and from a DSL line. A cable modem, sometimes called a broadband modem, is a digital modem that sends and receives digital data over the cable television network. A wireless modem uses the cell phone network to connect to the Internet wirelessly from mobile computers and devices. A network card enables a computer or device that does not have built-in networking capability to access a network. A wireless access point allows computers and devices to transfer data wirelessly. A router connects multiple computers or other routers together and transmits data to its correct destination on the network. A hub or switch is a device that provides a central point for cables in a network.

10. How Can a Home Network Be Set Up?

Many home users are connecting multiple computers and devices together in a home  network. Home networking saves the home user money and provides many conveniences. Each networked computer in the house has the following capabilities:
• Connect to the Internet at the same time
• Share a single high-speed Internet connection
• Access files and programs on the other computers in the house
 • Share peripherals such as a printer, scanner, external hard disk, or optical disc drive
• Play multiplayer games with players on other computers in the house
• Connect game consoles to the Internet
• Subscribe to and use VoIP
Many vendors offer home networking packages that include all the necessary hardware and software to network your home using wired or wireless techniques. Some of these packages also offer intelligent networking capabilities. An intelligent home network extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. You no longer need extensive knowledge of networks to set up a home network. For example, the latest version of Windows allows you to connect all computers in your house to a home network easily.
Wired Home Networks
As with other networks, a home network can use wires, be wireless, or use a combination of wired and wireless. Three types of wired home networks are Ethernet, powerline cable, and phoneline.
Ethernet Network
As discussed earlier in this chapter, traditional Ethernet networks require that each computer have built-in network capabilities or contain a network card, which connects to a central network hub or similar device with a physical cable. This may involve running cable through walls, ceilings, and floors in the house. For the average home user, the hardware and software of an Ethernet network can be difficult to configure.
Powerline Cable Network
A home powerline cable network is a network that uses the same lines that bring electricity into the house. This network requires no additional wiring. One end of a cable plugs in the computer’s USB port and the other end of the cable plugs in a wall outlet. The data transmits through the existing power lines in the house.
Phoneline Network
A phoneline network is an easy-to-install and inexpensive network that uses existing telephone lines in the home. With this network, one end of a cable connects to an adapter card or PC Card in the computer and the other end plugs in a wall telephone jack. The phoneline network does not interfere with voice and data transmissions on the telephone lines. That is, you can talk on the telephone and use the same line to connect to the Internet.
Wireless Home Networks
To network computers and devices that span multiple rooms or floors in a home, it may be more convenient to use a wireless strategy. One advantage of wireless networks is that you can take a mobile computer outside, for example in the backyard, and connect to the Internet through the home network, as long as you are in the network’s range. Most home networks use a Wi-Fi network, which sends signals through the air at distances of up to 1,500 feet in some configurations. Wi-Fi networks are fairly easy to configure. Each computer accessing the network must have the appropriate built-in wireless networking capabilities (such as Intel’s Centrino technology) or a wireless network card, which communicates either with a wireless access point or a combination router/wireless access point. Even in a wireless home network, one desktop computer usually connects to the router/wireless access point using a cable. Wireless networks do have the disadvantage of interference. Walls, ceilings, and electrical devices such as cordless telephones and microwave ovens can disrupt wireless network communications.

11. What Are Various Physical and Wireless Transmission Media?

Transmission media consist of materials or substances capable of carrying one or more signals. Physical transmission media use tangible materials to send communications signals. Twisted-pair cable consists of one or more twisted-pair wires bundled together. Coaxial cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating. Fiber-optic cable consists of thin strands of glass or plastic that use light to transmit signals. Wireless transmission media send communications signals through the air or space. Infrared (IR) sends signals using infrared light waves. Broadcast radio distributes radio signals through the air over long and short distances. Cellular radio is a form of broadcast radio that is used widely for mobile communications. Microwaves are radio waves that provide a high-speed signal transmission. A communications satellite is a space station that receives microwave signals from an earth-based station, amplifies the signals, and broadcasts the signals back over a wide area.

Assignment Chapter 8

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan

Student ID : 1701338122


1. What Is System Software, and What Are the Two Types of System Software?

When you purchase a personal computer, it usually has system software installed on its hard disk. System software consists of the programs that control or maintain the operations of the computer and its devices. System software serves as the interface between the user, the application software, and the computer’s hardware. Two types of system software are operating systems and utility programs.
An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Most operating systems perform similar functions that include starting and shutting down a computer, providing a user interface, managing programs, managing memory, coordinating tasks, configuring devices, establishing an Internet connection, monitoring performance, providing file management and other utilities, and automatically updating itself and certain utility programs. Some operating systems also allow users to control a network and administer security.
A utility program, also called a utility, is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. Most operating systems include several built-in utility programs. Users often buy stand-alone utilities, however, because they offer improvements over those included with the operating system. Functions provided by utility programs include the following: managing files, searching for files, viewing images, uninstalling programs, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen s avers, securing a computer from unauthorized access, protecting against viruses, removing spyware and adware, filtering Internet content, compressing files, playing media files, burning optical discs, and maintaining a personal computer.

 2. What Are the Functions of an Operating System?

The operating system starts and shuts down a computer, provides a user interface, manages  programs, manages memory, coordinates tasks, configures devices, establishes an Internet connection, monitors performance, provides utilities, updates automatically, controls a network, and administers security. The user interface controls how data and instructions are entered and how information is displayed on the screen. Two types of user interfaces are a graphical user interface (GUI) and a command-line interface. Managing programs refers to how many users, and how many programs, an operating system can support at one time. An operating system can be single user/single tasking, single user/multitasking, multiuser, or multiprocessing. Memory management optimizes the use of random access memory (RAM). If memory is insufficient, the operating system may use virtual memory, which allocates a portion of a storage medium to function as additional RAM. Coordinating tasks determines the order in which tasks are processed. Tasks include receiving data from an input device, processing instructions, sending information to an output device, and transferring items between storage and memory. Configuring devices involves loading each device’s driver when a user boots the computer. A driver, short for device driver, is a small program that tells the operating system how to communicate with a specific device. Establishing an Internet connection sets up a connection between a computer and an Internet access provider. A performance monitor is an operating system program that assesses and reports information about computer resources and devices. Operating systems often provide the capability of managing and searching for files, viewing images, securing a computer from unauthorized access, uninstalling programs, and other tasks. Most operating systems also include an automatic update feature that provides updates to the program. A server operating system is an operating system that organizes and coordinates how multiple users access and share network resources. Network administrators typically have an administrator account that enables them to access files, install programs, and specify network set- tings, including creating user accounts and establishing permissions.

3. What Is the Startup Process on a Personal Computer?

Booting is the process of starting or restarting a computer. When a user turns on a computer, the power supply sends a signal to the system unit. The processor chip finds the ROM chip(s) that contains the BIOS (basic input/output system), which is firmware with the computer’s startup instructions. The BIOS performs the power-on self test (POST) to check system components and compares the results with data in a CMOS chip. If the POST completes successfully, the BIOS searches for the system files and the kernel of the operating system, which manages memory and devices, and loads them into memory from storage. Finally, the operating system loads configuration information, requests any necessary user information, and displays the desktop on the screen. The operating system executes programs in the Startup folder, which contains a list of programs that open automatically when you boot the computer.

4.  What Are Features of Windows 7, Mac OS X, UNIX, and Linux Operating Systems?

A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.

Windows 7
In the mid-1980s, Microsoft developed its first version of Windows, which provided a graphical user interface (GUI). Since then, Microsoft continually has updated its Windows operating system, incorporating innovative features and functions with each subsequent version. Windows 7 is Microsoft’s fastest, most efficient operating system to date, offering quicker program start up, built-in diagnostics, automatic recovery, improved security, enhanced searching and organizing capabilities, and an easy-to-use interface. Windows 7 includes several programs to enhance user experiences. Home and small office users easily can set up a network and secure it from hackers with Windows Firewall. With Windows DVD Maker, users easily can create DVDs from digital videos. Windows Media Player allows users to listen to Internet radio stations, play MP3 and other music formats, copy music and data to CDs, and watch movies. Using the Desktop Gadget Gallery, users can display a variety of gadgets on the Windows desktop. A gadget, also known as a widget, is a mini-program with minimal functionality that connects to another program or provides information. Examples of gadgets included with Windows 7 include a calendar, clock, CPU meter, currency converter, news headlines,  picture puzzle, picture slide show, weather, and a Windows Media Center gadget. Most users choose one of these Windows 7 editions: Windows 7 Starter, Windows 7 Home Premium, Windows 7 Ultimate, or Windows 7 Professional.
• Windows 7 Starter, designed for netbooks and other small notebook computers, uses the Windows 7 Basic interface and allows users easily to search for files, connect to printers and devices, browse the Internet, join home networks, and connect to wireless networks. This edition of Windows typically is preinstalled on new computers and not available for purchase in retail stores.
 • Windows 7 Home Premium includes all the capabilities of Windows 7 Starter and also includes Windows Aero with its Aero Flip 3D feature. It also provides tools to create and edit high-definition movies, record and watch television shows, connect to a game console, and read from and write on Blu-ray Discs.
• Windows 7 Ultimate, which includes all features of Windows 7 Home Premium, provides additional features designed to keep your files secure and support for 35 languages.
• With Windows 7 Professional, users in all sizes of businesses are provided a secure operating environment that uses Windows Aero where they easily can search for files, protect their computers from unauthorized intruders and unwanted programs, use improved backup technologies, securely connect to Wi-Fi networks, quickly view messages on a powered-off, specially equipped notebook computer, easily share documents and collaborate with other users, and watch and record live television.

Mac OS X
 Since it was released in 1984 with Macintosh computers, Apple’s Macintosh operating system has set the standard for operating system ease of use and has been the model for most of the new GUIs developed for non-Macintosh systems. The latest version, Mac OS X, is a multitasking operating system available only for computers manufactured by Apple. Mac OS X includes features from previous versions of the Macintosh operating system such as large photo-quality icons, built-in net- working support, e-mail, chat, online shopping, enhanced speech recognition, optical disc burning, and enhanced multimedia capabilities. In addition, Mac OS X includes these features:
• New desktop search technology
• Dashboard, a desktop area for mini-programs called widgets
• Built-in, fast Web browser
• Parental controls
• Improved backup utility, called Time Machine
• Accessibility interface reads e-mail messages
• 3-D personal video and audio conferencing
• Filter to eliminate junk e-mail messages
• Contact lists synchronized with Bluetooth- enabled smart phone or other mobile device
• Latest version of QuickTime to listen to music and view videos on the Internet
 • Easy networking of computers and devices
• Windows network connection and shared Windows documents

UNIX
 UNIX (pronounced YOU-nix) is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories. Bell Labs (a subsidiary of AT&T) was prohibited from actively promoting UNIX in the commercial marketplace because of federal regulations. Bell Labs instead licensed UNIX for a low fee to numerous colleges and universities, where UNIX obtained a wide following. UNIX was implemented on many different types of computers. After deregulation of the telephone companies in the 1980s, UNIX was licensed to many hardware and software companies. Several versions of this operating system exist, each slightly different. When programmers move application software from one UNIX version to another, they sometimes have to rewrite some of the programs. Although some versions of UNIX have a command-line interface, most versions of UNIX offer a graphical user interface. Today, a version of UNIX is available for most computers of all sizes. Power users often work with UNIX because of its flexibility and power. Manufacturers such as Sun and IBM sell personal computers and workstations with a UNIX operating system.

Linux
Linux is one of the faster growing operating systems. Linux (pronounced LINN-uks), introduced in 1991, is a popular, multitasking UNIX- type operating system. In addition to the basic operating system, Linux also includes many free programming languages and utility programs. Linux is not proprietary software like the operating systems discussed thus far. Instead, Linux is open source software, which means its code is provided for use, modification, and redistribution. It has no restrictions from the copyright holder regarding modification of the software’s internal instructions and redistribution of the software. Many programmers have donated time to modify and redistribute Linux to make it the best possible version of UNIX. Promoters of open source software state two main advantages: users who modify the software share their improvements with others, and customers can personalize the software to meet their needs.
The two most popular GUIs available for Linux are GNOME and KDE. Some companies such as Red Hat market software that runs on their own distribution of Linux. Many application programs, utilities, and plug-ins have Linux distributions, including OpenOffice.org, StarOffice, Mozilla, Yahoo! Messenger, RealPlayer, QuickTime, and Acrobat Reader. Users obtain Linux in a variety of ways. Some download it free from the Web. Others purchase it from vendors such as Red Hat or IBM, who bundle their own software with the operating system. Linux optical discs are included in many Linux books and also are available for purchase from vendors. Some retailers such as Dell will preinstall Linux on a new computer’s hard disk on request. If you want to preview the Linux operating system, you can obtain a Live CD or Live USB.

5.  What Are Various Server Operating Systems?

A server operating system is an operating system that is designed specifically to support a network. A server operating system typically resides on a server. Examples of server operating systems include Windows Server 2008, UNIX, Linux, Solaris, and NetWare.
Windows Server 2008
Windows Server 2008 is an upgrade to Windows Server 2003. Windows Server 2008, which includes features of previous Windows Server versions, offers the following capabilities:
• Improved Web server management, enabling users to share data
• Enhanced server security
• Network Access Protection restricts computers that do not meet specified requirements
• Protection against malicious software attacks
• Shares many technologies with Windows
• Client support using Windows, Mac OS, UNIX, and Linux
Most editions of Windows Server 2008 include Hyper-V, which is a virtualization technology. Virtualization is the practice of sharing or pooling computing resources, such as servers. Through virtualization, for example, operating systems such as Windows Server 2008 can separate a physical server into several virtual servers. Each virtual server then can perform an independent, separate function, such as running a different operating system.
UNIX
 In addition to being a stand-alone operating system, UNIX also is a server operating system. That is, UNIX is capable of handling a high volume of transactions in a multiuser environment and working with multiple processors using multiprocessing. For this reason, some computer professionals call UNIX a multipurpose operating system because it is both a stand-alone and server operating system. Many Web servers use UNIX as their operating system.
Linux
Some network servers use Linux as their operating system. Thus, Linux also is a multi- purpose operating system. With Linux, a net- work administrator can configure the network, administer security, run a Web server, and process e-mail. Clients on the network can run Linux, UNIX, or Windows. Distributions of Linux include the Mozilla Web browser.
Solaris
Solaris, a version of UNIX developed by Sun Microsystems, is a server operating system designed specifically for e-commerce applications. Solaris manages high-traffic accounts and incorporates security necessary for Web transactions. Client computers often use a desk- top program, such as GNOME desktop, that communicates with the Solaris operating system.
NetWare
Novell’s NetWare is a server operating system designed for client/server networks. NetWare has a server portion that resides on the network server and a client portion that resides on each client computer connected to the network. NetWare supports open source software and runs on all types of computers from mainframes to personal computers. Client computers also can have their own stand-alone operating system such as a Windows, Mac OS, or Linux.

6.  What Are the Features of Several Embedded Operating Systems?

Mobile devices and many consumer electronics have an embedded operating system that resides on a ROM chip. Popular embedded operating systems include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. Windows Embedded CE is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality. Windows Mobile, an operating system based on Windows Embedded CE, provides a user interface designed for specifi c types of smart phones and PDAs. Palm OS is an operating system used on smart phones and PDAs. iPhone OS, developed by Apple, is an operating system for the iPhone and iPod touch. The BlackBerry operating system runs on handheld devices supplied by RIM. Google Android is an operating system developed by Google for mobile devices. Embedded Linux is a scaled-down Linux operating system for smart phones, PDAs, portable media players, and other devices requiring an embedded operating system. Symbian OS is an open source multitasking operating system designed for smart phones.

7.  What Is the Purpose of Several Utility Programs?


Most operating systems include several built-in utility programs. A file manager performs functions related to file management. A search utility attempts to locate a file on your computer based on criteria you specify. An image viewer displays, copies, and prints the contents of a graphics file, such as photos. An uninstaller removes a program and any associated entries in the system files. A disk cleanup utility searches for and removes unnecessary files. A disk defragmenter reorganizes the files and unused space on a computer’s hard disk. A backup utility is used to copy, or back up, selected files or an entire hard disk to another storage medium. A restore utility reverses the backup process and returns backed up files to their original form. A screen saver displays a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. A personal firewall detects and protects a personal computer from unauthorized intrusions. An antivirus program protects computers against a virus, or potentially damaging computer program, by identifying and removing any computer viruses. A spyware remover detects and deletes spyware and other similar programs. An adware remover detects and deletes adware. Internet filter programs can include Web filtering software, an anti-spam program, a phishing filter, and a pop-up blocker. A file compression utility shrinks the size of a fi le so that it takes up less storage space. A media player allows you to view images and animation, listen to audio, and watch video files on a computer. Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable CD, DVD, or Blue-ray Disc. A personal computer maintenance utility identifies and fixes operating system problems and improves a computer’s performance.

Assignment Chapter 6

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan



Student ID : 1701338122


1. What Are the Four Types of Output?

Output is data that has been processed into a useful form. That is, computers process data (input) into information (output). The form of output varies, depending on the hardware and software being used and the requirements of the user.
Very often, a single form of output, such as a Web page, includes more than one of these types of output :
 • Text — Examples of output that primarily contain text are memos, letters, press releases, reports, classified advertisements, envelopes, mailing labels, and text messages. On the Web, users view and print many other types of text- based output. These include blogs, news and magazine articles, books, television show transcripts, stock quotes, speeches, and lectures.
• Graphics — Many forms of output include graphics to enhance visual appeal and convey information. Business letters have logos. Reports include charts. Newsletters use drawings, clip art, and photos. Users print high-quality photos taken with a digital camera. Many Web sites use animated graphics, such as blinking icons, scrolling messages, or simulations.
• Audio — Users download their favorite songs from iTunes and listen to the music while working on the computer. Software such as games, encyclopedias, and simulations often have musical accompaniments for entertainment and audio clips, such as narrations and speeches, to enhance understanding. On the Web, users tune into radio and television stations and listen to audio clips, podcasts, or live broadcasts of interviews, talk shows, sporting events, news, music, and concerts. They also use the Internet to conduct real- time conversations with friends, coworkers, or family members, just as if they were speaking on the telephone.
• Video — As with audio, software and Web sites often include video clips to enhance understanding. Vodcasts and video blogs, for example, add a video component to the traditional podcast and blog. Users watch a live or prerecorded news report, view a replay while attending a live sporting event, observe weather conditions, or enjoy a live performance of their favorite musician or musical group on a computer or mobile device. Instead of renting a movie, users can download movie content from a Web site for a fee and then watch the entire movie on a computer or mobile device. Attaching a video camera to the computer allows users to watch home movies on the computer. They also can attach a television’s antenna or cable to the computer and watch a television program on the computer screen.
An output device is any hardware component that conveys information to one or more people. Commonly used output devices include display devices; printers; speakers, headphones, and earbuds; data projectors; interactive whiteboards; and force-feedback game controllers and tactile output.

2. What Are the Characteristics of Various Display Devices?

A display device, or simply display, is an output device that visually conveys text, graphics, and video information and consists of a screen and the components that produce the information on the screen. Information on a display device, sometimes called soft copy, exists electronically and appears for a temporary period.
Desktop computers typically use a monitor as their display device; most mobile computers and devices integrate the display into the same physical case. LCD monitors, LCD screens, and plasma monitors are types of fl at-panel displays. A flat-panel display is a lightweight display device with a shallow depth that typically uses LCD or gas plasma technology. An LCD monitor is a desktop monitor that uses a liquid crystal display to produce images. A plasma monitor is a display device that uses gas plasma technology, which substitutes a layer of gas for the liquid crystal material in an LCD monitor. A CRT monitor is a desktop monitor that contains a cathode-ray tube (CRT). CRT monitors take up more desk space and thus are not used much today.

3. What Factors Affect the Quality of an LCD monitor or LCD screen?

The quality of an LCD monitor or LCD screen depends primarily on its resolution, response time, brightness, dot pitch, and contrast ratio.
 • Resolution is the number of horizontal and vertical pixels in a display device. For example, a monitor that has a 1440 3 900 resolution displays up to 1440 pixels per horizontal row and 900 pixels per vertical row, for a total of 1,296,000 pixels to create a screen image. Recall that a pixel (short for picture element) is a single point in an electronic image. A higher resolution uses a greater number of pixels and thus provides a smoother, sharper, and clearer image. As you increase the resolution, however, some items on the screen appear smaller. With LCD monitors and screens, resolution generally is proportional to the size of the device.
 • Response time of an LCD monitor or screen is the time in milliseconds (ms) that it takes to turn a pixel on or off. LCD monitors’ and screens’ response times range from 3 to 16 ms. The lower the number, the faster the response time.
• Brightness of an LCD monitor or LCD screen is measured in nits. A nit is a unit of visible light intensity equal to one candela (formerly called candlepower) per square meter. The candela is the standard unit of luminous intensity. LCD monitors and screens today range from 250 to 550 nits. The higher the nits, the brighter the images.
• Dot pitch, sometimes called pixel pitch, is the distance in millimeters between pixels on a display device. Text created with a smaller dot pitch is easier to read. Advertisements normally specify a monitor’s dot pitch or pixel pitch. Average dot pitch on LCD monitors and screens should be 30 mm or lower. The lower the number, the sharper the image.
• Contrast ratio describes the difference in light intensity between the brightest white and darkest black that can be displayed on an LCD monitor. Contrast ratios today range from 500:1 to 2000:1. Higher contrast ratios represent colors better.

 4. What Are the Various Ways to Print?

A printer is an output device that produces text and graphics on a physical medium such as paper. Printed information, called hard copy, exists physically and is a more permanent form of output than that presented on a display device (soft copy). A hard copy, also called a printout, is either in portrait or landscape orientation.
 Users can print by connecting a computer to a printer with a cable that plugs in a port on the computer. Bluetooth printing uses radio waves to transmit output to a printer. With infrared printing, a computer or other device communicates with the printer via infrared light waves. Some digital cameras connect directly to a printer via a cable; others store images on memory cards that can be removed and inserted in the printer. Networked computers can communicate with the network printer via cables or wirelessly.

 5. How Is a Nonimpact Printer Different from an Impact Printer? 

A nonimpact printer forms characters and graphics on a piece of paper without actually striking the paper. Some spray ink, while others use heat or pressure to create images. Commonly used nonimpact printers are ink-jet printers, photo printers, laser printers, thermal printers, mobile printers, label and postage printers, plotters, and large-format printers.  A printout in portrait orientation is taller than it is wide, with information printed across the shorter width of the paper. A printout in landscape orientation is wider than it is tall, with information printed across the widest part of the paper. Letters, reports, and books typically use portrait orientation. Spreadsheets, slide shows, and graphics often use landscape orientation.
An impact printer forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper. Impact printers characteristically are noisy because of this striking activity. These printers commonly produce near letter quality (NLQ) output, which is print quality slightly less clear than what is acceptable for business letters. Companies may use impact printers for routine jobs such as printing labels. Impact printers are ideal for printing multipart forms because they easily print through many layers of paper. Factories, warehouses, and retail counters may use impact printers because these printers withstand dusty environments, vibrations, and extreme temperatures. Two commonly used types of impact printers are dot-matrix printers and line printers.

6. What Are Ink-Jet Printers, Photo Printers, Laser Printers, Multifunction Peripherals, Thermal Printers, Mobile Printers, Label and Postage Printers, and Plotters and Large-Format Printers? 

An ink-jet printer is a type of nonimpact printer that forms  characters and graphics by spraying tiny drops of liquid ink onto a piece of paper. One factor that influences the quality of an ink-jet printer is its resolution. Printer resolution is measured by the number of dots per inch (dpi) a printer can print. A photo printer is a color printer that produces photo-lab-quality pictures. A laser printer is a high- speed, high-quality nonimpact printer that operates in a manner similar to a copy machine, creating images using a laser beam and powdered ink, called toner. Laser printers usually print at faster speeds than ink- jet printers. A multifunction peripheral (MFP), or  all-in-one device, is a single device that looks like a printer or a copy machine but provides the functionality of a printer, scanner, copy machine, and perhaps a fax machine. Some MFPs use color ink-jet printer technology; others include a black-and-white or color laser printer. The primary disadvantage of these devices is that if the device breaks down, you lose all four functions. A thermal printer generates images by pushing electrically heated pins against heat-sensitive paper. They are inexpensive, but the print quality is low and the images tend to fade over time. A mobile printer is a small, lightweight, battery-powered printer that allows a mobile user to print from a notebook computer or other mobile device. A label printer is a small printer that prints on an adhesive-type material that can be placed on a variety of items. Most label printers also print bar codes. A postage printer is a special type of label printer that has a built-in scale and prints postage stamps. Plotters are sophisticated printers used to produce high-quality drawings, such as blueprints, maps, and circuit diagrams. A large-format printer uses ink-jet technology on a large scale to create photo-realistic- quality color prints.

7. What Are the Uses and Characteristics of Speakers, Headphones, and Earbuds? 

An audio output device is a component of a computer that produces music, speech, or other sounds, such as beeps. Three commonly used audio output devices are speakers, headphones, and earbuds. Most personal computers and mobile devices have a small internal speaker that usually emits only low-quality sound. Thus, many users attach surround sound speakers or speaker systems to their computers, including game consoles and mobile devices, to generate higher-quality sounds for playing games, interacting with multimedia presentations, listening to music, and viewing movies. Most surround sound computer speaker systems include one or two center speakers and two or more satellite speakers that are positioned so that sound emits from all directions. Speakers typically have tone and volume controls, allowing users to adjust settings. To boost the low bass sounds, surround sound speaker systems also include a subwoofer. When using speakers, anyone in listening distance can hear the output.
With headphones or earbuds, only the individual wearing the headphones or earbuds hears the sound from the computer. The difference is that headphones cover or are placed outside of the ear, whereas earbuds, or earphones, rest inside the ear canal. Both headphones and earbuds usually include noise-cancelling technology to reduce the interference of sounds from the surrounding environment.
The difference is that headphones cover or are placed outside of the ear, whereas earbuds, or earphones, rest inside the ear canal. A headset is a device that functions as both headphones and a microphone, so that users’ hands are free for typing or other activities while listening to audio output.

8. What Are the Purposes and Features of Data Projectors, Interactive Whiteboards, and Force-Feedback Game Controllers and Mobile Devices?

A data projector is a device that takes the text and images displaying on a computer screen and projects them on a larger screen so that an audience can see the image clearly. Some data projectors are large devices that attach to a ceiling or wall in an auditorium. Some operating systems allow projectors to be mobile user, are small portable devices that can be transported easily. Two types of smaller, lower-cost units are LCD projectors and DLP projectors. An LCD projector, which uses liquid crystal display technology, attaches directly to a computer, and uses its own light source to display the information shown on the computer screen. A digital light processing (DLP) projector uses tiny mirrors to reflect light, which produces crisp, bright, colorful images that remain in focus and can be seen clearly even in a well- lit room.
An interactive whiteboard is a touch-sensitive device, resembling a dry-erase board, that dis- plays the image on a connected computer screen. A presenter controls the computer program by clicking a remote control, touch- ing the whiteboard, drawing on or erasing the whiteboard with a special digital pen and eraser, or writing on a special tablet.
Joysticks, wheels, gamepads, and motion-sensing game controllers are input devices used to control movement and actions of a player or object in computer games, simulations, and video games. Today’s joysticks, wheels, gamepads, and motion-sensing game controllers also include force feedback, which is a technology that sends resistance to the device in response to actions of the user.
Some input devices, such as a mouse, and mobile devices, such as a smart phone, include tactile output that provides the user with a physical response from the device.

9. What Output Options Are Available for Physically Challenged Users? 

For users with mobility, hearing, or vision disabilities, many different types of output devices are available. Hearing-impaired users, for example, can instruct programs to display words instead of sounds. With the latest Windows operating systems, users also can set options to make programs easier to use. The Magnifier, for example, enlarges text and other items in a window on the screen.
Visually impaired users can change Windows settings, such as increasing the size or changing the color of the text to make the words easier to read. Instead of using a monitor, blind users can work with voice output via Windows Narrator. That is, the computer reads the information that is displayed on the screen. Another alternative is a Braille printer, which prints information on paper in Braille.

Assignment Chapter 5

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan



Student ID : 1701338122


1. What Is Input, and What Are the Differences among a Program, a Command, and a User Response?

•Input is any data or instructions entered into the memory of a computer, to provide or give something to the computer, in other words the state or act of a computer or a component of computer or relevant device being accepting something from the user or from a device or from a software either automatically or manually.
• A program is a series of related instructions that tells a computer what tasks to perform and how to perform them. When a programmer writes a program, he or she enters the program into the computer by using a keyboard, mouse, or other input device. The programmer then stores the program in a file that a user can execute (run). When a user runs a program, the computer loads the program from a storage medium into memory. Thus, a program is entered into a computer’s memory.
•Programs respond to commands that a user issues. A command is an instruction that causes a program to perform a specific action. Users issue commands by pressing keys on the key- board, clicking a mouse button, speaking into a microphone, or touching an area on a screen.
• A user response is an instruction a user issues by replying to a question displayed by a program. A response to the question instructs the program to perform certain actions. Assume the program asks the question, Is the time card correct? If you answer Yes, the program processes the time card. If you answer No, the program gives you the opportunity to modify the time card entries.

 2. What Keys Are Commonly Found on Desktop Computer Keyboards, and How Do Keyboards for Mobile Computers and Devices Differ from Desktop Computer Keyboards?

A keyboard is an input device that contains keys users press to enter data and instructions into a computer. Desktop computer keyboards typically have from 101 to 105 keys. All desktop computer keyboards have a typing area that includes the letters of the alphabet, numbers, punctuation marks, and other basic keys. Many desktop computer keyboards also have a numeric keypad on the right side of the keyboard. A keyboard also contains other keys that allow users to enter data and instructions into the computer.
Most of today’s desktop computer keyboards are enhanced keyboards. An enhanced keyboard has twelve or more function keys along the top; it also has two ctrl keys, two alt keys, and a set of arrow and additional keys between the typing area and the numeric keypad.
On notebook computers and some handheld computers, smart phones, and other mobile devices the keyboard is built in the top of the system unit. To fit in these mobile computers and devices, the keyboards usually are smaller and have fewer keys than desktop computer keyboards. A typical notebook computer key- board usually has only about 85 keys. To provide all of the functionality of a desktop computer keyboard, manufacturers design many of the keys to serve two or three purposes.


3. What Are Different Mouse Types, and How Do You Use a Mouse?

A mouse is a pointing device that fits under the palm of your hand comfortably. The mouse is the most widely used pointing device on desktop computers.
Optical mouse, which uses devices that emit and sense light to detect the mouse’s movement.
Some use optical sensors, and others use a laser. The latter, often referred to as a laser mouse, usually is more expensive than the former. You can place an optical mouse on nearly all types of flat surfaces. Some newer models combine both optical sensors and laser, enabling users to place the mouse on rougher surfaces such as carpeting and park benches. Further, some mouse devices are more sensitive than others for users requiring more precision such as graphic artists, engineers, or game players.
The mobile user who makes presentations may prefer a mouse that has additional buttons for running a slide show and controlling media, similar to a remote control. A newer type of mouse, called an air mouse, is a motion-sensing mouse that, in addition to the typical buttons, allows you to control objects, media players, and slide shows by moving the mouse in predetermined directions through the air.
A mouse connects to a computer in several ways. Many types connect with a cable that attaches to a USB port or a mouse port on the system unit. A wireless mouse, or cordless mouse, is a battery-powered device that transmits data using wireless technology, such as radio waves (Bluetooth) or infrared light waves (IrDA). Some users prefer a wireless mouse because it frees up desk space and eliminates the clutter of a cord.
As you move a mouse, the mouse pointer moves on the screen. You then press a mouse button (usually the left) to click objects. Some programs support mouse gestures, where users can per- form certain actions by holding a mouse button while moving the mouse in a particular pattern.

4. What Are the Various Types of Touch Screens, and How Does a Touch-Sensitive Pad Work?

A touch screen is a touch-sensitive display device. Touch screens that recognize multiple points of contact at the same time are known as multi-touch. Users can interact with touch screens by touching areas of the screen. Because touch screens require a lot of arm or hand movements, you do not enter large amounts of data using a touch screen. Instead, you touch words, pictures, numbers, letters, or locations identified on the screen. Some touch screens also respond to finger motions such as sliding your finger to drag an object or pinching your fingers to zoom in or out. The latest version of the Windows operating system provides increased support for computers with touch screens. Support for touch screen makes it easier for users to interact with the operating system.
A kiosk, which is a freestanding computer, usually includes a touch screen. For example, travelers use kiosks in airports to print tickets ordered online and in hotels for easy check in and check out. To allow easy access of your bank account from a car, many ATMs have touch screens.
A recently developed touch screen, called Microsoft Surface, is a 30-inch tabletop display that allows one or more people to interact with the screen using their fingers or hands.
Portable media players that do not have touch screens typically have a touch-sensitive pad, which is an input device that enables users to scroll through and play music, view pictures, watch videos or movies, adjust volume, and/or customize settings. Touch- sensitive pads typically contain buttons and/ or wheels that are operated with a thumb or finger. For example, users rotate a Click Wheel to browse through the portable media player’s song, picture, or movie lists and press the Click Wheel’s buttons to play or pause media, display a menu, and perform other actions.

 5. What Are the Various Types of Pen Input, and What Are Other Types of Input for Smart Phones?

With pen input, you touch a stylus or digital pen on a flat surface, such as a screen on a monitor or mobile device, a signature capture pad, or a graphics tablet, to write, draw, or make selections. A stylus is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink. A digital pen, which is slightly larger than a stylus, features electronic erasers and programmable buttons. Handwriting recognition software is a program that translates handwritten letters and symbols into characters a computer or mobile device can process. A signature capture pad captures signatures written with a stylus or pen attached to a device. Some smart phones have digital cameras that have touch-sensitive pads. Others have a portable keyboard or optical keyboard built in.

 6. What Are the Purposes of Gamepads, Joysticks and Wheels, Light Guns, Dance Pads, and Motion-Sensing Game Controllers?

Gamepads
A gamepad, which is held with both hands, controls the movement and actions of players or objects in video games or computer games. On the gamepad, users press buttons with their thumbs or move sticks in various directions to trigger events. Gamepads communicate with a game console or a personal computer via wired or wireless technology.
Joysticks and Wheels
Users running game software or flight and driving simulation software often use a joystick or wheel to control an airplane, vehicle, or player. A joystick is a handheld vertical lever mounted on a base. You move the lever in different directions to control the actions of the simulated vehicle or player. The lever usually includes buttons, called triggers, that you press to initiate certain events. Some joysticks also have additional buttons you press to perform other actions. A wheel is a steering-wheel-type input device. Users turn the wheel to simulate driving a car, truck, or other vehicle. Most wheels also include foot pedals for acceleration and braking actions. Joysticks and wheels typically attach via a cable to a personal computer or game console.
Light Guns
A light gun is used to shoot targets and moving objects after you pull the trigger on the weapon. Instead of emitting light, most light guns work by detecting light. When the user pulls the trigger, the screen uses one of several techniques to send light, which is received by a receptor in the barrel of the gun. Light guns typically attach via a cable to a game console or personal computer.
Dance Pads
A dance pad is a flat electronic device divided into panels that users press with their feet in response to instructions from a music video game. These games test the user’s ability to step on the correct panel at the correct time, following a pattern that is synchronized with the rhythm or beat of a song. Dance pads communicate with a game console or a personal computer via wired or wireless technology.
Motion-Sensing Game Controllers
 Motion-sensing game controllers allow the user to guide on-screen elements by moving a hand- held input device in predetermined directions through the air. Some are sold with a particular type of game; others are general purpose. Sports games, for example, use motion-sensing game controllers, such as baseball bats and golf clubs, as their input device. These types of controllers communicate with a game console or a personal computer via wired or wireless technology. A popular general-purpose, motion-sensing game controller is Nintendo’s Wii Remote. Shaped like a television remote control and operated with one hand, the Wii Remote is a motion-sensing input device that uses Bluetooth wireless technology to communicate with the Wii game console. Users point the Wii Remote in different directions and rotate it to control on-screen players, vehicles, and other objects.
Other Game Controllers
Other popular game controllers include musical instruments and balance boards. Controllers that resemble musical instruments, such as guitars, drums, and keyboards, work with music video games that enable game players to create sounds and music by playing the instrument. Fitness games often communicate with a balance board, which is shaped like a weight scale and contains sensors that measure a game player’s balance and weight .Musical instrument and balance board controllers communicate with game consoles via wired or wireless technology.

7. How Does Resolution Affect the Quality of a Picture Captured on a Digital Camera?

A digital camera allows users to take pictures and store the photo- graphed images digitally. One factor that affects the quality of digital camera photos is its resolution. Resolution is the number of horizontal and vertical pixels in a display device. A pixel (short for picture element) is the smallest element in an electronic image. The greater the number of pixels the camera uses to capture a picture, the better the quality of the picture. Thus, the higher the resolution, the better the picture quality, but the more expensive the camera.
Many digital cameras provide a means to adjust the ppi to the desired resolution. With a lower ppi, you can capture and store more images in the camera. For example, a camera set at 1280 3 960 ppi might capture and store 61 photos, if it has sufficient storage capacity. The number of photos may reduce to 24 on the same camera set at 2592 3 1944 ppi, because each photo consumes more storage space.

8. How Are Voice Recognition, Web Cams, and Video Conferencing Used?

Voice recognition, also called speech recognition, is the computer’s capability of distinguishing spoken words. Other popular voice recognition programs for personal computers include IBM ViaVoice and Dragon Naturally Speaking. Voice recognition programs recognize a vocabulary of preprogrammed words, which can range from two words to millions of words. The auto- mated telephone system at your bank may ask you to answer questions by speaking the words Yes or No into the telephone. A voice recognition program on your computer, by contrast, may recognize up to two million words. Some cur- rent cell phones and other mobile devices allow you to store voice commands such as “Call Tom at home.” Operating systems, such as Windows, also include voice recognition capabilities. Keep in mind that the best voice recognition pro- grams are 90 to 95 percent accurate, which means the software may interpret as many as one in ten words incorrectly.
A Web cam, also called a PC video camera, is a type of digital video camera that enables a home or small business user to capture video and still images, send e-mail messages with video attachments, add live images to instant messages, broadcast live images over the Internet, and make video telephone calls. During a video telephone call, both parties see each other as they communicate over the Internet. The cost of Web cams usually is less than $100.
A video conference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data. To participate in a video conference using a computer, you need video conferencing software or use a video conferencing Web application, along with a micro- phone, speakers, and a video camera attached to or built in to a computer. Examples of video conferencing software include CUworld, Live Meeting, and WebEx. As you speak, members of the meeting hear your voice on their speakers. Any image in front of the video camera, such as a person’s face, appears in a window on each participant’s screen. A whiteboard is another window on the screen that displays notes and drawings simultaneously on all participants’ screens. This window pro- vides multiple users with an area on which they can write or draw.

9. How Do the Various Types of Scanners and Reading Devices Work?

A scanner, or optical scanner, is a light-sensing input device that reads printed text and graphics and translates the results into a form the computer can process. A flatbed scanner works in a manner similar to a copy machine except it creates a file of the document. An optical reader uses a light source to read characters, marks, and codes and converts them into digital data that a computer can process. Optical character recognition (OCR) reads characters from ordinary documents. Optical mark recognition (OMR) reads hand-drawn marks such as small circles or rectangles. A bar code reader, or bar code scanner, is an optical reader that uses laser beams to read a bar code, or identification code. RFID (radio frequency identification) uses radio signals to communicate with an embedded tag placed in or attached to an object, an animal, or a person. A magnetic stripe card reader, also called a magstripe reader, reads the magnetic stripe on the back of credit cards and other similar cards. MICR (magnetic-ink character recognition) reads text printed with magnetized ink.

10. What Are Various Biometric Devices?

Biometrics is the technology of authenticating a person’s identity by verifying a personal characteristic. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier. A biometric identifier is a physiological (related to physical or chemical activities in the body) or behavioral characteristic. Examples include fingerprints, hand geometry, facial features, voice, signatures, and eye patterns.
The most widely used biometric device today is a fingerprint reader. A fingerprint reader, or scanner, captures curves and indentations of a fingerprint.
A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms.
Biometric devices measure the shape and size of a person’s hand using a hand geometry system. Because their cost is more than $1,000, larger companies use these systems as time and attendance devices or as security devices.
A voice verification system compares a person’s live speech with their stored voice pattern. Larger organizations sometimes use voice verification systems as time and attendance devices.
A signature verification system recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion used to write the signature. Signature verification systems use a specialized pen and tablet. High security areas use iris recognition systems.
The camera in an iris recognition  system uses iris recognition technology to read patterns in the iris of the eye.

11. How Do POS Terminals, Automated Teller Machines, and DVD Kiosks Work?

A terminal is a computer,  usually with limited processing power, that enables users to send data to and/or receive information from a host computer. POS terminals, ATMs, and DVD kiosks are special-purpose terminals. A POS (point-of-sale) terminal records purchases, processes credit or debit cards, and updates inventory. An automated teller machine (ATM) is a self-service banking machine that connects to a host computer through a network. A DVD kiosk is a self-service DVD rental machine that connects to a host computer through a network.

12. What Are Alternative Input Devices for Physically Challenged Users?


The ever-increasing presence of computers in everyone’s lives has generated an awareness of the need to address computing requirements for those who have or may develop physical limitations. The Americans with Disabilities Act (ADA) requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers. Besides voice recognition, which is ideal for blind or visually impaired users, several other input devices are available. A keyguard is a metal or plastic plate placed over the keyboard that allows users to rest their hands on the keyboard without accidentally pressing any keys. A keyguard also guides a finger or pointing device so that a user presses only one key at a time. Keyboards with larger keys also are avail- able. Still another option is the on-screen keyboard, in which a graphic of a standard keyboard is displayed on the user’s screen. Various pointing devices are available for users with motor disabilities. Small trackballs that the user controls with a thumb or one finger can be attached to a table, mounted to a wheelchair, or held in the user’s hand. Another option for people with limited hand movement is a head-mounted pointer to control the pointer or insertion point. To simulate the functions of a mouse button, a user works with switches that control the pointer. The switch might be a hand pad, a foot pedal, a receptor that detects facial motions, or a pneumatic instrument controlled by puffs of air. Two exciting developments in this area are gesture recognition and computerized implant devices. Both in the prototype stage, they attempt to provide users with a natural computer interface. With gesture recognition, the computer will detect human motions. Computers with gesture recognition capability have the potential to recognize sign language, read lips, track facial movements, or follow eye gazes. For paralyzed or speech impaired individuals, a doctor will implant a computerized device into the brain. This device will contain a transmitter. As the user thinks thoughts, the transmitter will send signals to the computer.