fundamentals of information technology€¦ · fundamentals of information technology hand book...

122
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/318491162 Fundamentals of Information Technology Book · January 2016 CITATIONS 0 READS 11,804 1 author: Salah Alkhafaji Sur University College 19 PUBLICATIONS 8 CITATIONS SEE PROFILE All content following this page was uploaded by Salah Alkhafaji on 18 July 2017. The user has requested enhancement of the downloaded file.

Upload: others

Post on 24-Jun-2020

30 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/318491162

Fundamentals of Information Technology

Book · January 2016

CITATIONS

0READS

11,804

1 author:

Salah Alkhafaji

Sur University College

19 PUBLICATIONS   8 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Salah Alkhafaji on 18 July 2017.

The user has requested enhancement of the downloaded file.

Page 2: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 1

Fundamentals of Information Technology Hand Book

English /Arabic Edition

By AssociAte Professor

Dr. engineer sAlAh AlkhAfAji

Page 3: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 2

Table of Contents Chapter 1: Computers Hardware

1.1What is a COMPUTER 1.1.1Types of Computers

1.1.2The Computer Family tree 1.2. Computer Architecture

1.2.1Computer hardware 1.2.2Peripherals 1.2.3Digital Computers 1.2.4Analog Computers 1.2.5Numbering Systems 1.2.6Coding Systems 1.2.7Parity 1.2.8Floating point notation

1.3. The Computer Brain 1. 3.1. Control Unit 1. 3.2. Arithmetic Logic Unit 1.3.3. Register 1.3.4. System Clock 1.3.5. Instruction Se 1.3.6- CPU Compatibility

1.3.6.1- Downwardly compatible 1.3.6.2- CPU Sockets 1.3.6.3- Data Bus Width and Word Size 1. 3.6.4-Word size 1. 3.6.5- Operation per Cycle 1.3.6.6- Complex & Reduced Instruction Sets 1.3.6.7- Math Coprocessors:

1.4. The MEMORY 1.4.1Random-Access Memory (RAM) 1.4.2Read-Only Memory (ROM) 1.4.3CMOS 1.4.3- Basic input output system (BIOS) 1.4.5Cache Memory 1.4.6Virtual Memory (VM)

1.5.System Bus & Expansion Bus 1.5.1- System Buses 1.5.2- Expansion Buses

1.6. Plug and play

Page 4: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 3

Chapter2: Storage Units 2.1- Storage devices characteristics 2.2- Formatting 2.3- . File Systems 2.4.Storage unit’s types:

2.4.1- Floppy Disks 2.4.2-Hard Disk 2.43- Removable Hard Disks 2.4.4- CD Discs & Drives

2.5- Storing Data in Files 2.5.1 Types of data files

Chapter3: Input / Output devices 3.1- INPUT DEVICES:

3.1.1 Typing devices: Keyboards 3.1.2 Pointing devices

3.1.2.1Mouse 3.1.2.2Trackball 3.1.2.3 Track point 3.1.2.4 Touchpad 3.1.2.5 Joysticks 3.1.2.6 Touch-sensitive 3.1.2.7 Pen-based system

3.1.3 Scanners 3.1.4 Sound card 3.1.5 Microphones

3.2- OUTPUT DEVICES

3.2.1- display device 3.2.1.1 The CRT monitor 3.2.1.2 The liquid crystal display (LCD) monitor 3.2.1.3The gas plasma monitor

3.2.2 Printers: 3.2.2.1 Impact Printers: 3.2.2.2 Non-impact printers 3.2.3 Plotter 3.2.4 Speakers

Page 5: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 4

Chapter 4: Systems and Application Software Model A SystemsSoftware

4.1- Operating System (O.S) 4.1.1- Managing Programs 4.1.2- Managing Memory 4.1.3- Handling Input & Output: 4.1.4- User interface:

4.2 Types of O.S 4.2.1 UNIX: 4.2.2 MSDOS: 4.2.3 Mac OS: For Macintosh PCs 4.2.4 Microsoft Windows 3.x: 4.2.5 Microsoft Windows NT: 4.2.6 Linux:

4.3 System Utilities Model B Application Software

4.4Applications software: 4.4.1 Programming Languages: 4.4.2 Special-purpose programs

CH 5: Multimedia & Virtual reality

5.1 Multimedia: 5.2 Paint programs: 5.3 Image Editors 5.4 Drawing programs: 5.5 Animation Programs 5.6 Video Editor 5.7 Audio Software

CH 6: Telecommunication& Network

Model A: Telecommunication 6.1-Computer communications?

6.1.1- Telephone lines 6.1.2- Type of telephone

6.1.2.1 Local Exchange Carriers 6.1.2.2 Long-Distance Transmission Media

6.1.3- Wire Transmission: 6.1.3.1 Twisted pair: 6.1.3.2Coaxial cable: 6.1.3.3 Fiber-optic cable:

Page 6: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 5

6.1.4- Wireless Transmission: 6.2 Infrared 6.3 Microwave station 6.4 - MODEMS:

6.4.1- Types of modems: 6.4.2- Asynchronous communication: 6.4.3- Modulation Protocols: 6.4.4- Fax: 6.4.5- Bandwidth:

6.5- Digital transmission systems: 6.5.1- Integrated Services Digital Network (ISDN): 6.5.2 Digital Subscriber Line (DSL) or (ADSL) 6.5.3 SONET

Model B: Computers Networks

6.6- Types of computer networks: 6.6.1 Local Area Network (LAN): 6.6.2 Metropolitan Area Network (MAN): 6.6.3 Wide Area Network (WAN):

6.7- Switching and Routing Techniques:. 6.7.1 Circuit Switching: 6.7.2 Packet switch:

6.8- Protocols 6.8.1-Network protocol layers

6.9- Network H/W: Network interface card (NIC) 6.10- Network communications technologies 6.11- Network connections:

6.11.1- peer-to-peer network(P2P) 6.11.2 Client-server networks: 6.11.3 Local Area network (LAN): 6.11.4 Wide area network (WAN):

6.12- Network Topologies: 6.12.1 Bus topology: 6.12.2 Star topology 6.12.3- Ring topology:

6.13- LAN protocols: 6.14- WAN Protocols:.

6.14.1- WAN application: 6.14.2- Point of Presence (POP): 6.14.3-Backbones:

Page 7: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 6

Ch 7: The Internet (World Wide Web) & E-Commerce 7.1 The Internet 7.2 Hypermedia: 7.3- The Internet services 7.4- History of the Internet: 7.5- How the Internet Works

7.5.1- Access the Internet 7.5.2- connect to the Internet 7.5.3- Steps to Connect to the Internet 7.5.4- Internet protocol (IP) address 7.5.5- Domain name 7.5.6- The World Wide Web 7.5.7- The URL

7.6 The six basic types of Web pages 7.7- Electronic Commerce

7.7.1 Business to business(B-to-B or B2B): 7.7.2 Business to consumer(B-to-C or B2C): 7.7.3 Business to Government (B-to-G or B2G) 7.7.4 Government to Consumer (G-to-C or G2C) 7.7.5Consumer to consumer(C-to-C or C2C)

7.8 E-commerce features

Page 8: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 7

ACKNOWLEDGMENTS

Only one name appears on the cover of this work, but a great many people have

been indirectly involved in its production.

Firstly, I would like to express my sincere gratitude to my assistant Mr Sriram ,

for his assistance and great efforts. My work has benefited from his insight and

innumerable suggestions.

I would also like to thank my family, Lamia, Ahmed, Ali, and Sama for their

love and support,shared my worries and problems, and provided my mind and

my soul with their worm and lovely care.

Dr. SALAH M. K. ALKHAFAJI, PhD

Page 9: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 8

CH1

Computers Hardware (H/W)

1.1- What is a COMPUTER? ما ھو الكمبیوتر

• CMPUTER: Electronic machine operating under the control of instructions stored in its own memory

– Accepts data – Manipulates data – Produces results – Stores results

الكتروني یقوم بالسیطرة واالدارة على اربعھ عملیات اساسیھ وذلك باستخدام برامج معینة زجھا

- Input: accepting data that has been represented in a way the computer

can use. ادخال البیانات بصوره یستطیع الكمبیوتر ان یعمل معھا

Page 10: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 9

- Processing: performing arithmetic or comparison (Logical) operation on the represented data. معالجة البیانات الریاضیة والمنطقیة

- Output: Displaying results. اظھار نتائج العملیات

- Storage: Storing results for later reuse. خزن النتائج Programs: A computer program is a list of instruction, written in a programming language, that tell the computer who to perform that four simple operation in order to accomplish a task

ن التعلیم ة م ن مجموع اره ع وتر عب رامج الكمبی ھ ب ذي یوج ة ال ات البرمج دى لغ ة باح ات مكتوب . الكمبیوتر كیف یطبق وینفذ الفعالیات االربعھ اعاله

Figure (1.1): Computer components

Why we use computer:

1- Increase Speed زیاده سرعھ العملیات 2- Reduce Costs تقلیل التكالیف 3- Improve Quality تحسین النوعیة 4- Storage and Retrieve Dataخزن واسترجاع البیانات

Page 11: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 10

1.1.1- Types of Computers:

- Micro Computers واع غر ان ة ،وھي اص الحواسیب المصغرة او الدقیقةوھي التي استخدمت المعالجات الدقیق

الحاسبات حجما واكثرھا شیوعا وتسمى بالحواسیب الشخصیة -Work-Station:

ل ات العم غرمحط یب المص ا بالحواس مى احیان ر ة،وتس رعتھا الفائق.ةالكبی ز بس ةوتتمی كبیرة وذواكر ذات سعھ

-Mini Computers: ي تخدم ف ا وتس یب وطاقتھ م الحواس ي حج طا ف ا وس كل نوع الحواسیب المتوسطةتش

االعمال التجاریة الكبیرة المعقدة - Mainframes:

ي نفس ةب الكبیرةكبیرالحواسی ات المستخدمین ف ثمن ،تخدم مئ ة ال وقویة وسریعة وغالی الوقت وتنفذ مالیین التعلیمات في الثانیھ الواحده

-Super Computers: ة ي الثانی ات ف ین التعلیم ذ بالی یب وتنف واع الحواس رع ان ةھي اس یب العمالق الحواس

الواحدة وغالیة جدا

1.1.2- The computer family tree شجرة عائلة الكمبیوتر 1- First generation: In 1950s used vacuum tubes, and difficult to

programmed, used only machine language

ا عب برمجتھ ط تستخدم الجیل األول وكان یستخدم األنابیب المفرغة خالل الخمسینیات، من الص فق لغة الماكنة

2- Second generation: early 1960s used transistor, was easier to program using high level languages

الجیل الثاني في بدایھ الستینیات استخدمت الترانزستور وتستخدم لغات البرمجة ذات المستوى العالي

3- Third generation: mid 1960s-mid 1970s used integrated circuits (SSI, MSI, LSI), timesharing, minicomputer

الجیل الثالث منتصف الستینات ومنتصف السبعینات ، استخدم الدوائر المتكاملة 4- Fourth generation: mid-1970s to present used VLSI and

microprocessor, personal computers, networks, LANs. دقیق الج ال ع والمع ھ الموس دوائر المتكامل الجیل الرابع من منتصف السبعینات ولحد االن استخدم ال

على الحواسیب الشخصیة

Page 12: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 11

1.2-Computer architecture: الحاسب ةمعماری

A computer includes hardware (CPU, input devices, output devices, memory,

etc) and software (operating system, application programs) غیلي ام تش راج، نظ ال واالخ دات االدخ ذاكرة ، وح ة، ال ة المركزی ده المعالج ن وح ون م وب یتك الحاس

وبرامج التطبیقات

1.2.1- Computer hardware: الحاسب دعتا

1.2.1.1 System Unit: ة ة المركزی دقیق أو وحدة المعالج الج ال ى المع وي عل ذاكروحدة النظام وتحت تخدم وال ي تس الت

راص الخزن لخزن البرامج والبیانات بصوره مؤقتة ومعدات الكترونیھ أخرى مثل مشغالت أق وغیرھا ) الباصات(ووسائط النقل

Includes the following وحده النظام تتضمن ما یلي o CPU (central processing unit): the circuitry that processes the

data, today we call it o Microprocessor (a complex electronic circuit fabricated on a

chip of silicon).

الج مى المع ات وتس ھ البیان وؤلة عن معالج ة المس دائرة اإللكترونی وحده المعالجة المركزیة وھي ال .الدقیق والتي ھي عبارة عن دوائر إلكترونیة معقده على شكل جب من السیلیكون

Memory: The circuitry that store information temporarily.

الذاكرة وھي الدائرة اإللكترونیة المسوؤلة عن خزن البیانات والتعلیمات بصوره مؤقتة1.2.1.2 Input devices I/p: such as (keyboard, mouse, microphone, scanner,

etc)

1.2.1.3 Output devices o/p: such as (screen, printer, plotter, speakers, etc)

1.2.14 ther electronic devices ( controller, Buss, etc) معدات الكترونیھ وكھربائیة أخرى

1.2.2-Peripherals:

ل وحدات ذاكرة مث الج وال ول المع ودة ح ون موج ي تك دات واألجھزة الت ل المع الملحقات وھي ك اإلدخالواإلخراج

All the additional hardware components grouped around the CPU and the memory. These are I/O devices (input, output devices), storage devices, and communication devices. As shown in figure (1.2)

Page 13: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 12

The system unit is the case that houses the computer main components including the CPU and the memory. Also includes the following:

النظام ھي الصندوق الذي یحتوي معدات الحاسب هوحد

Figure (1.2): System Unit and its peripherals Power supply: this component transfer alternating current into the

direct current needed for the computer operation. مجھز القدرة الكھربائیة Ports: are receptacle that enables you to plug in peripherals such as a

printers, keyboard, and mouse to the connectors. وحدات الربط الخارجي لربط األجزاء الخارجیة مع الحاسبة

Mother board: (main board) this is a large printed circuit board, a flat

piece of plastic or fiber-glass to which complex patterns of copper pathways link the semiconductors chips, including the microprocessor and the memory chips

Page 14: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 13

مستطیلة (pcb = printed circiut borad) هي عبارة عن لوحة الكترونیة مطبوعة: اللوحة األم، تحتوي على مقابسمتعددة وذلك لتوصیل جمیع أجزاء الحاسب باللوحة ، الشكل و أحیانا مربعة الشكل

.كما أنها تقوم بوصل جمیع األجزاءمع بعضها وتنظم العمل ونقل البیانات فیما بینها

Expansion slots: are receptacles designed to fit expansion boards

(adapter cards) الفتحات التوسعیة التي یثبت علیھا الكارتان الخارجیة

Figure (1.3): Mother Board&Expansion cards Drive bays: to accommodate the computers floppy disk drive, CD-

ROM, DVD-ROM, and etc. مثل القرص ةمواقع تثبیت مشغالت األقراص الخز نی الصلب والمرن والمضغوطة

Computers used code to represent characters (letters, numbers, and punctuation symbols).

1.2.3- Digital computers: Represent data as digit. In electronic computers digits can be represented in high-power circuit (1) and a low- power circuit (0)

تستخدم األرقام لتمثیل البیانات وذلك بتحویلھا إلى أرقام ثنائیة ثم یتم معالجتھا ةحاسبات رقمی. داخل وحده المعالجة المركزیة مثال ذلك الحاسب الشخصي الذي نقتنیھ

Page 15: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 14

1.2.4- Analog computers: Use a continuously variable scale such as mercury in a thermometer to measure an ongoing process; they are used in scientific labs and commercial devices such as computerized bas pumps. ات ل درج تمر مث كل مس ارجي بش ن الوسط الخ یة م ة أو القیاس ارة التماثلی تخدم اإلش حاسبات تس

ین الحرارة ھ ب اس ومقارن ات قی وم بعملی ن الحاسبات تق وع م ذا الن ث أن ھ وي ،حی غط الج والض الدرجة الخارجیة ودرجھ مخزنھ فیھا مسبقا

1.2.5- Numbering systems النظم الرقمیة

Every number system has a base also called radix like decimal numbers have a base of 10 (from 0 to 9). The Binary numbers أرقام ثنائیة are the numbers that represent information in computer by means of two state called binary digits (Bit for short). A bit is the smallest unit of information that a computer can work with. البت ھي اصغر وحده من المعلومات تتعامل معھا الحاسبةBinary numbers are difficult to work with because so many digits are required to represent even small numbers ( decimal 14 is 1110 binary)also it’s tedious to translate binary numbers into their decimal equivalents. That’s why the programmers like to translate binary number into hexadecimal numbers (hex). Hexadecimal numbers: A numbering system with base of 16 (use symbols 0 through 9 and A through F to make total of 16 symbols).

1.2.6- Coding Systems نظم الترمیز العالمیة ركات ل الش ن قب ممت م نظم ص ذه ال ات وھ ل البیان ة لتمثی ز الرقمی م الترمی تخدم نظ بات تس الحاس

المختصة مثل آي بي أم Computers usually use a character code رمز العنصر that can translate between the numerical word of the computer, and the letters, numbers, and symbols. The most widely used character code is the American Standard Code for Information Interchange (ASCII) which is used in microcomputers and personal computers? IBM mainframe computers and some other systems use a different code called Extended Binary Coded Decimal Interchange Code (EBCDIC).

Originally ASCII & EBCDIC used a total of 7 bits to represent characters which is enough to encode 128 characters (numbers 0-9, letters A-Z and few punctuation symbols) only for English-speaking users. Both IBM

Page 16: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 15

&Apple expanded the amount of space reserved for character code to 8bits (Byte) but this extended character sets are not standardized; Macintosh is differ.

وحدات من قبل شركھ أي بي أم 8ى وحدات وطور ال 7ایة كان نظام الترمیز مكون البد يف

Unicode وحده لیشمل جمیع أحرف وأرقام ورموز اللغات 16نظام الترمیز الموحد ویتكون من في العالم It’s a new character code that solves the problem of the foreign languages symbols by expanding the number of available bits to 16. Because 16 bit is enough to code more than 65,000 characters.

1.2.7- Parity التماثاللتكافؤ أو ھوھو عنصر الكشف عن األخطاء التي تحدث في النظم الترمیز ی

No matter which coding system is used to represent characters in the computer’s memory the code must be stored correctly in order to avoid errors, an additional bit is add to each character code called parity code. If one of the bits in the code has been changed due to a storage error, the computer generates a parity error.

Page 17: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 16

1.2.8- Floating-point notation الكسور واألرقام الغیر الصحیحة ترمیز A character code that represent numbers with fractional points (1.25) or large numbers, the computer use floating point notation which is not a fixed number of digits before or after the decimal point. The floating point notation required special processing circuitry provided in a separate unit called floating point unit (FPU). 1.3-THE COMPUTER BRAIN (CPU) وحده (المعالج الدقیق )المعالجة المركزیة

Central Processing Unit isthe element of a computer that determines its

performance it contain two subcomponents, the control unit )ةوحد )السیطرة and the arithmetic-logic unit (ALU) ( وحدة المعالجة الریاضیة والمنطقیة (

كل معلومات ھو العقل المدبر للح : المعالج ى ش ا عل ا نتائجھ ا ویعطین وب ، یستقبل االوامرویعالجھ اسر نستفید منھا ، من الناحیة العتادیة ھوقطعة مربعة الشكل وخفیفة الوزن یخرج من أسفلھا عدد من االب

(pins) وبین ات بینھ ادل البیان ك لتب ة االم وذل ى اللوح الج عل بس المع ع مق التي تسمحللمعالج باالتصال من اللوح دا م غیرة ج ي شریحةص ة ف تورات المجموع ین الترانزس ن مالی ل م ي االص ون ف ة األم ، یتك

الج ى غالفالمع ع للمعالج عل ة (السلیكون ، وھذه الشریحة تثبت من قبل المصن ة المربع ا ) القطع او داخلھ .وذلك الیصالھا باالبر التي تكون أسفل غالفالمعالج

Page 18: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 17

Figure (1.4): The CPU

CPU Components: یتكون المعالج من عدد من الوحدات الرئیسیة هي

1.3.1 Control Unit: Also called processing device: It coordinates and control all the parts of computer system, it manages four basic operations as shown in Figure (2).these four operations are:

ات داخل : (cu=control unit) حدة التحكم والسیطرةو تحكم بمسیر البیان ؤولة عن ال وھي الوحدةالمس

الج ، ل المع ي عم ة ف ذه الوحدة ھي المتحكم ا ھ ة ، طبع المعالج وتنسیق تبادلھا بین أجزاء المعالجالداخلی .یمكن تطویرھا لذلك فھي ضروریة الوجودفي كل معالج ، كما أنھا جزء ال یتجزأ من المعالج وال

ل الج : (bus interface unit) وحدة االتصال بالناق ین المع ات ب ل البیان ي نق تحكم ف وھي الوحدةالتي تین ات ب یر البیان نظم مس ا ت وائیة ، أي أنھ ةالذاكرة العش وب ، وخاص ة للحاس رى المكون اء االخ واالعض

للحاسب .المعالج واألجزاء األخر1- Fetch: Getting the next program instruction from the computer’s memory.

والمخزنة في الذاكرة العشوائیة یقوم المعالج بجلب االوامر المراد تنفیذھا2- Decode: Figuring out what the programis telling the computer what to do.

.البیانات الالزمة لتنفیذ ھذھاالوامر بعد أن جلب المعالج االوامر فانھ یقوم بتحدید3- Execution: Performing the requested action. Such as adding two numbers.

.قوم المعالج بتنفیذ االوامرومن ثم ارسال نتائجھاالى الذاكرة العشوائیةی4- Write-Back (Store): Writing the result to an internal register or memory.

خزن النتائج أما في مسجالت المعالج أو في الذاكرة

CPU

Page 19: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 18

Figure (1.5): machine cycle or processing cycle The four processes are called the machine cycle or processing cycle and consist of two phases: The instruction cycle or instruction time (I-time),which represented by

the fetch and decode processes. The execution cycle or execution time (E-time), which represented by

the execution and store or write-back processes.

1.3.2 Arithmetic logic unit (ALU): The unit that performs arithmetic and logical operations. The ALU is a fundamental building block of the central processing unit(CPU) of a computer, and even the simplest microprocessors contain one for purposes such as maintaining timers. The processors found inside modern CPUs and graphics processing units (GPUs) accommodate very powerful and very complex ALUs; a single component may contain a number of ALUs.

تتكون من وحدة معالجة الریاضیات والمنطقتقوم بمعالجة العملیات الحسابیةالتي تتكون من أعداد صحیحة ال : وحدة األعداد الصحیحة -أ

ات الثن ات فیالتطبیق ذه العملی ى فاصلة عشریة ، تستخدم ھ وي عل لتحت اد مث ة االبع word ائی,powerpoint ات ل التطبیق ذه الوحدة تستخدم من قب أن ھ ومعظم البرامج التي نستخدمھا ، أی

.الثنائیة االبعاد ، لذلك ھي مھمة جدا النمعظم البرامج التي نستخدمھا تعتمد على ھذه الوحدةة -ب ة : (fpu=floating point unit) وحدة الفاصلة العائم ات الحسابیة تقومبمعالج العملی

وع من ذا الن ى ھ التي تحوي فاصلة عشریة ، تستخدم ھذه الوحدة من قباللبرامج التي تعتمد علل ي مث میم الھندس رامج التص ةاالبعاد وب اب الثالثی ل االلع ابیة مث ات الحس ، autocad العملی

د ى أصبحت ھذه الوحدة مھمة جدا في أیامناھذه نظرا الن االلعاب الحدیثة تعتم ي سرعتھا عل ف

Page 20: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 19

ذه الوحدة وم بتخفیف . ھ ع مسرع یق ة بوض ات الشاش ت الشركات المصنعة لبطاق دیثا قام حوحدة الفاصلة العائمة من قبل االلعاب الحدیثة .االعتماد عل

1.3.3 Registers: Small temporary storages locations in the CPU

توجد داخل المعالجوذلك لحفظ االرقام المراد ذواكر صغیرة جدا وسریعة جدا ، : المسجالت.2معالجتھا من قبل وحدة الحساب و المنطق ، حیث أنھ ال یتمتنفیذ أي عملیة في المعالج اال بحفظ

ذھا ین تنفی جالت لح ي المس ا ف ة. معطیاتھ ر مؤقت جالت ذواك وع (ram) طبعاالمس ن الن ، ماج ، وھذا ھو السرفي (sram=static ram) الستاتیكي ا ال تحت ث أنھ دا ، حی ا سریعة ج كونھ

ة ( الى معدل انعاش ات"االنعاش ھو اعادة تقویةاالشارة الكھربائی ي ھي البیان إن " الت ، واال ف الذاكرة ستفقد محتویاتھا ، وھذھالعملیة تبطىء الذاكرة

1.3.4 System Clock: ساعة النظام an electronic circuit that generate pulse at a

rapid rate to control every event happened in the computer, measured in millions of cycles per second (MHZ). The processor‘s clock rate is called its clock speed and the dingle beat of the clock is called a clock tick. • Clock speed: electronic pulses affecting machine cycle time

– Hertz: one cycle (pulse) per second – Megahertz (MHz): millions of cycles per second

• Microcode: internal, predefined elementary operations in a CPU

Figure (3): Clock speed a faster clock speed means that more microcode instruction can be executed in a given time period

الج رعة المع ات ، وتقاسس ائج التعلیم ى نت ول عل رعة الحص ي س ر ف ر كبی ا أث الج لھ رعة المع ا س طبع : ، والمعالج لھ سرعتین (mhz=mega hertz) بالمیجاھیرتز

الج ، : (internal clock) السرعة الداخلیة -أ ات داخل المع النبضات أي عدد(وھي سرعة تباداللبیان التي تستطیع أن تصدرھا أي وحدة داخاللمعالج

ة -ب مى : (external clock) السرعة الخارجی ي تس ات system bus والت ادل البیان وھي سرعة تببین المعالج وبین الساوث طبعا سرعة المعالج الداخلیة والخارجیة لیست كل شىء ، ألنھ كلما تقدم الزمن

Page 21: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 20

ادة السرعةللمعالج ، یضافعلى المعالج بعض المی ى زی ة ال الج دون الحاج د من سرعة المع زات التي تزی : بعض ھذه المیزات

1.3.5-Instruction Set: التعلیمات عمجا می Every processor has a fix set of operations; each of these operations has its

own unique numbers called an instruction set.

تعلیمات خاصة بھ تستخدم لغرض تنفیذ األوامر والفعالیات علكل معالج دقیق مجا می

1.3.6- CPU COMPATIBLITY مج المعالج مع البرا توافقیھ The programs written for apple Macintosh will not run on an IBM PC because they are not compatible. So compatibly is that a program that can run on a given computer is compatible with that computer processor. توافق البرنامج التنفیذي مع أوامر المعالج Physical Characteristics of the CPU

• Digital circuits on chips دوائر الكترونیھ رقمیة متكاملة مبنیة على شرائح من مادة السیلیكون

• Electrical current flows through silicon

Moore’s Law - transistor density of chips will double every 18 months Figure (1.6) Moore’s law

Page 22: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 21

1.3.6.1- Downwardly compatible: A chip can run the programs designed to run with earlier chips.

التوافق التراجعي أي توافق المعالج لتشغیل برامج مصممھ لمعالجات قدیمھ

1.3.6.2- CPU Sockets: Microprocessors are designed to fit into a socket on

the motherboard, A variety of socket design are available قاعدة المعالج على الكار أالم

1- Zero-force insertion(ZIF) enables you to place the CPU on the socket without press 2- Single-edge contact (SEC) is designed to accept a processor module with heat sink, fan, and additional component. Some motherboards have upgrade socket that enable you to add upgrade processor.

1.3.6.3- Data Bus Width and Word Size أو حجم الكلمة الناقلسعة الباص

The first element that determines a CPU’s speed is its data bus width, which is measured in bits (8, 16, 32, or 64).

1.3.6.4-Word size: وھي عدد البت التي تستطیع الحاسبة العمل معھا في :حجم الكلمة الوقت الواحد

Is the number of bits tat the computer can work with at a time (a 16-bit CPU works with a 16-bit word size).all the component of the computer are connected by a data bus which is a highway of parallel wires, the bus is a pathway for the electronic impulses that form Bytes. The more lanes this highway has, the faster data can travel.

1.3.6.5- Operation per Cycle

The number of operations per clock tick (one pulse of the system clock) also affects performance of the computer. هعدد العملیات في النبضة ألوا حد Any CPU that can execute more than one instruction per clock is called superscalar, and its design is called a superscalar architecture. Today’s fastest CPU such as Pentium II, use this architecture.

Pipelining: is a processing technique that feeds a new instruction into the CPU at every step of the processing cycle. So that four or more instructions are worked on simultaneously.

Page 23: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 22

اكثر من تعلیمھ في نفس الوقت وبصوره متزامنة ذتنفی

Parallel processing or multiprocessing: is using more than one CPU at the same time.

استخدام اكثر من معالج على نفس الجھاز• Speeds processing by linking hundreds and even thousands of

processors to operate at the same time • Can coordinate large amounts of data and access them with greater speed

Figure (1.7)Multiprocessing

Page 24: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 23

1.3.6.6- Complex and Reduced Instruction Set Computing

• Complex instruction set computing (CISC) - places as many microcode instructions into the central processor as possible, such as Motorola 68040 or Intel Pentium.

Advantages 1- provides programmers with many instructions یزود المبرمج بالعدید من التعلیمات 2- High speed of execution ھعالي السر ع 3- Makes programmer’s job easier یسھل عمل المبرمج Disadvantages 1- Complex معقد 2- Expensive غالي 3- Run hot because they consume so current یولد حرارة الستھالكھ للتیار الكھربائي

• Reduced instruction set computing (RISC) - involves reducing the

number of microcode instructions built into a chip to an essential set of common microcode instructions, these chips are less complex, less expensive to produce, and more efficient in power usage

1.3.6.7- Math Coprocessors: المعالج الریاضي المساعد

Is a separate chip that could be added to a computer system to increase mathematics operations, in the newest microprocessor the math coprocessor is included in the microprocessor design.

ویستخدم لغرض المساعدة في العملیات الریاضیة ،أالن اصبح المعالج الدقیق لھ ھذه الخاصیة

Page 25: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 24

1.4 The MEMORY الذاكرة

Memories are a high performance electronic circuits (semiconductors) used to store information and data, you will find memory circuits through out the computer system. For example, most printers have memory; on the mother board you’ll find additional memory chips and even small amount of the memory on the microprocessor itself.

أشباه الموصالت تستخدم لخزن البیانات وغالیة الثمن،مصنوعة من دوائر إلكترونیة عالي األداء والكفاءة

ا الطابعات وغیرھا والمعلومات وتكون مزوده لكافھ أجھزة الحاسبة ومنھ

The term Byte (B) is used to describe memory capacity

كما مبین ووحدات الخزن ربایت یستخدم كوحدة قیاس سعة الذ واك المصطلح

Table: 1.1: Memory capacity

Page 26: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 25

Types of memory رألذ واك عانو أ

Figure (1.8): Types of Memory

1.4.1- Random-Access Memory (RAM) الوصول العشوائي أو المباشر ةذاكر Is considered as the main memory of a computer. It is a high speed memory where the processor can store and retrieve the programs and data it is using, no processor could function without this memory.

مستمرة مع ةعمل الكمبیوتر وتعمل بصورفي ةة المستخدمالذاكرة الرئیسی ذاكرة رام رتعتب المعالج الدقیق

Figure (1.9): The RAM

Characteristics:

Page 27: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 26

Read write memory فقط ةقراء ةذاكر direct access وصول مباشر إلى المعلومات المخزونة علیھا volatile (loss its contain when the power is off ) متطایرة أي تفقد محتویاتھ

عند انقطاع التیار الكھربائي عنھا each memory location has an address like post office boxes call (memory address) لكل موقع على الذاكرة عنوان خاص بھ مثل مكتب البرید

temporary storage تخزین مؤقت Types of RAM

• EDO (Extended Data Out) • DRAM (Dynamic RAM) • RDRAM (Rambus Dynamic Random Access Memory) • SDRAM (Synchronous DRAM

.الوصول العشوائي، وأسعارھا تتفاوت باختالف ھذه األنواع ذاكرةو ھناك أكثر من نوع من

وع األول ة :SDR-RAMأو SD-RAMالن Single Data Rate Randomھي اختصار للجملAccess Memory ذا . وائي الدینامیكیة المتزامنة ذات النقل األحاديوالتي تعني ذاكرة الوصول العش ھ

ة ة مقارن من الطاق را كبی درا ل یستھلك ق ي المقاب ما، لكنھ ف النوع یقوم بنقل البیانات بسرعة مقبولة نوعال وم بنق ھ یق رى ألن األنواع األخ تب رة واح ب اع م بارتف را آخ ا ع بت ود لیرف م یع ة ث اع النبض د ارتف دة عن

وسرعة نقل البیانات فیھا إما . وھكذا، وكلما زادت الوحدات أدى ذلك إلى زیادة سرعة المعالجة.. النبضة .میجاھرتز 133أو 100أن تكون

ا اختصاD-SDRAM :أو DD-RAMالنوع الثاني ول أنھ البعض یق ر ھناك خالف على تسمیتھا، فة ول Dual Data RateSynchronous Dynamic Random Accessللجمل رة الوص أي ذاك

-Double Data Rateالعشوائي الدینامیكیة المتزامنة ذات النقل الثنائي، بینما ھناك من یقول أنھا تعني SynchronousDRAM اعف أو ذاكرةأي ل المض ة ذات النق ة المتزامن وائي الدینامیكی ول العش الوص

ت 2المزدوج، وكالھما یؤدي لنفس المعنى، ھذا النوع یؤدي ضعف أداء النوع األول، فھي تعطي ي ب ف عند انخفاضھا الثانیة الواحدة بمعنى لدى ارتفاع النبضة وآخرا ویتمیز ھذا النوع عن سابقھ . أنھا تنقل بتا

ل ة قیاسا ل ي الثانی ة مضاعفة من المعلومات ف ل كمی بان لدیھ عرض نطاق مضاعف وھذا یمكنھ من نقsd-ram .أقل من الطاقة .كما أنھ یستخدم قدرا

ث وع الثال ة : RD-RAMالن ار للجمل ي اختص Rambus Dynamic Random AccessھMemory ة از بسرعة مذھل ذاكرة تمت ذه ال وائي، وھ ول العش ذاكرة الوص ة ل وط الدینامیكی ي الخط وتعن

ر من ى أكث الج عل ذاكرة والمع ین ال وأسعارھا باھظة، ویرتكز عملھا على أساس توزیع نقل البیانات ما بومن بت 16إلى ) المستخدمة في األنواع األخرى( بت 32عن طریق تصغیر حجم الناقل األمامي من . قناة

وتعطي ، )وھذا سبب تسمیتھا بالخطوط(ثم توزیع الحركة على أكثر من قناة تعمل بشكل خطوط متوازیة

Page 28: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 27

تصل إلى ◌ وموھذا النوع ال یعمل إال مع معالجات . میجاھرتز 800سرعات تردد عالیة جدا ا 4 بنتی كمل ة من اللوحات األم مث مخصص ا ب أنواع ا تتطل لأنھ ا بسرعة بسبب إ. 850 إنت ي عنھ م التخل ات وت ثب

.انھما یمكنھما إعطاء نتائج منافسة جدا وحتى متفوقة بتكلفة إقل DDR 2والجیل الجدید DDRذاكرة

1.4.2- Read-Only Memory (ROM)

ط ا وال . نوع رئیسي من الذاكرة مستعملة في الحاسوب الشخصي تدعى ذاكرة للقراءة فق رأ منھ ن أن نق ث یمك حی .یمكن الكتابة إلیھا

اك سببان رئیسیان يھن وب الشخص من الحاس ائف ض بعض الوظ ط مستعملة ل راءة فق ل ذاكرة للق :یجع )أوامر اإلدخال واإلخراج (وتستخدم لغرض خزن أوامر التشغیل األساسیة

: وجھ التشابھ بین ھذه األنواع

ـائي -1 ـیار الكھرب ع التـ د قط ا(أن البیانات المخزنة على ھذه الرقائق من الذاكرة ال تضیع عن یس كم و ل ).فـي الـذاكرة الـرام التـي تضــیع محتویاتـھا عــند قطــع التــیـار

ك ممكن ولكن -2 ا، أو أن ذل ا ال یمكن تغییرھ ا أنھ ذاكرة إم أن البیانات المخزنة على ھذه الرقائق من ال ).و لیس كما في الذاكرة الرام حیث الكتابة علیھا بنفس سھولة القراءة(باستخدام وسائل خاصة

Is used to store the instruction to start the computer, this memory is called the ROM BIOS (Basic Input/Output System), it has the following characteristics:

Direct access وصول مباشر إلى المعلومات Non volatile (because there is a battery that supply it with power)

غیر متطایرة ألنھا مزوده ببطاریة تجھزھا بالطاقة الكھربائیة عند إطفاء الحاسبة Read only memory (you can’t change its contain) ذاكره قراءه فقط Types of ROM (read-only memory)

• PROM (programmable read-only memory) • EPROM (erasable programmable read-only memory) • EEPTROM(Electrically Erasableprogrammable read-only memory) • Flash Memory

To allow ROM upgrades, most computer use flash memory (flash Bios).

PROM: ھي اختصار ل)programmable read-only memory( وھذا النوع من رقائق الذاكرة ، . یمكن برمجتھا والكتابة علیھا لمرة واحدة

Page 29: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 28

EPROM: ار ل ي اختص وع ) Erasable ProgrammableRead-Only Memory(ھ ذا الن ، ھن ردد محدد م ث ت ة تبع دة باستخدام أداة خاص ھ مرات عدی ة علی وه والكتاب ن الممكن مح ائق م من الرق

ا من ultraviolet (UV (lightلضوئیة الموجات ا ة علیھ على الرقاقة فیمحو محتویاتھا ویجھزھا للكتاباطع یوجد ترانزستوران مسئوالن جدید، وھذه الرقاقة تتكون أیضا من أسطر وعوامید وعند كل خلیة تق

عن شحن وتفریغ الخالیا

EEPROM: ار ل ي اختص -Electrically ErasableProgrammable Read(ھOnlyMemory( وھي تتمیز عن األنواع السابقة بما یلي :

.تستطیع الكتابة على ھـذه الرقـاقـة دون إزالــتھا من مـكانــھـا -1

.لســت مضـطرا لمــحو الرقاقة كلــھا لتغییر جــزء مــحدود مــنھا-2

.تغییر المحتویات ال یحتاج إلى أدوات أو أجھزة خاصة-3

ات ال ة یمكن تغییر محتوی ائي للخلی تحكم بالمجال الكھرب ي ی امج محل ة باستخدام برن ذه الرقاق ي ھ ا ف خالیة ات الخلی و محتوی ویقوم بتفریغھا وشحنھا حسب المطلوب، ولكن ذلك یتم على مستوى الخلیة أي أن مح

.یتم بالتدریج كل مرة بایت واحد مما یجعلھا بطیئة للغایة

Flash Memory: ھي أحد أنواع الذاكرةEEPROM وتختلف عنھا أنEEPROM تمحو كل مرةا أسرع 512التعامل مع Flash Memoryبایت واحد بینما تستطیع ا یجعلھ ي المرة الواحدة مم بایت ف

.بكثیر

1.4.3- Basic input output system (BIOS):النظام االساسي لالدخال واالخراج و اختصارلعبارة وس ھ اه ( basic input output system) البی راج " ومعن نظام اإلدخال واإلخ

األساسية روم ى رقاق ة األم ومخزن عل ي اللوح دمج ف امج م ھ برن امج ولكن ارةعن برن و عب وس ھ ( إن نظام البی

از ) رقاقة قابلةللقراءة فقط م إطفاءجھ و ت ى ل ا حت وھي ذاكرة ال یمكن تغییر محتویاتھا وتحتفظ بمحتویاتھاز الح غیل الجھ د تش ة عن ي المرة التالی ف ع أجھزة . اسب لیكون نظام البیوس جاھزا وس بجمی تحكم البی ی

وس ، ق البی ذلك عن طری وم ب ھ أن یق ب علی الحاسب بال استثناء ، وإذا أراد أي برنامجالتحكم بالعتاد فیجرة اد مباش ع العت دث م امج بالتح وم البرن الممكن أن یق فمن رطا یس ش ك ل ن ذل ض ولك ى بع ول عل للحص

. الممیزات :ونستطیعتلخیص مھمة البیوس فیما یلي

POST القیام بعملیة الفحصاألولي للجھاز .1 .(عملیة بدء تشغیل نظام التشغیل( القیام بعملیة اإلقالعمن األقراص .2 .سمي باسمھاالتي رئیسیةوھي مھمتھ الBIOSالقیام بعملیات اإلدخالواإلخراج األساسیة .3وس .4 البرنامج الالزم للدخول على إعدادات البی ي تظھر ( یحوي النظام أیضا اء الت ة الزرق الشاش

وقت اإلقالع del عند الضغطعلى زر

Page 30: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 29

ونكس رزھم شركات ف د من المصنعین أب ل العدی البیوس من قب تم تصنیع رقاقات وشركة "Phoenix" یوف تجد "American megatrends" و شركة " Awardأوورد" ة أم فس ى أي لوح وإذا نظرت إل

.علیھا رقاقةالبیوس ومكتوب علیھا اسم الشركة المصنعة لھا

اج : رقاقة البیوس ة وال تحت ي المرة القادم ب ف ة عمل الحاس د بدای ى تسترجعھ عن وس حت تخزننظام البی . لبطاریةحتى تحتفظ بمحتویاتھا

1.4.4- CMOS الغیر متطایرة تستخدم لخزن أوامر التھیئة رنوع آخر من أنواع ألذ واك الضروریة

Complementary metal-oxide semiconductor is a special memory used to store essential startup configuration, such as the amount of memory that has been installed in the computer, also it track time and date. On Macintoshes computer it is called Parameter RAM. It used small battery to keep the power when the computer is switch off.

على رقاقة رام خاصة تسمى رقاقة السیموس وھي العتاد الخاص بالحاسبة معلوماتبتخزین البیوسقوم ی ـ وع من "Complementary Metal-Oxide Semi-Conductor" اختصار ل ارة عن ن وھي عب

ائي ، ار الكھرب ا التی ع عنھ دھا إذا انقط ا تفق ات ولكنھ وم بتخزینالبیان وائیة تق ذاكرة العش ذه ال زود ھ ذا ت لذه الذاكرةببطاریة صغیرة از ،وتستھلك ھ اء الجھ ات إطف تقوم بالحفاظ على محتویات ھذه الذاكرة في أوق

حیث أن ھذه البطاریة قد تعمل لعدة سنواتالرقاقات القلیل من الطاقة بلبة . ة والص راص المرن وع األق م ون ل حج از مث ن الجھ ة ع ات ھام یموس معلوم ى رقاقةالس زن عل تخ

ل رى مث ارات األخ ض الخی ذلك بع ت وك ذلك التاریخوالوق رن أم : وك رص الم ن الق الع م د اإلق ل تری ھ . اتالبایتاتإلخ ویكون حجمھا في حدود مئ..منالقرص الصلب أوال

( یمكن للمستخدم العادي أن یعدل من محتویات ذاكرةالسیموس وذلك بالدخول إلى إعدادات البیوس غالبا

از del بالضغط على الع الجھ د إق ر ( عن فتغیی اك ولكن كن حذرا ر من األشیاء ھن ل الكثی ك عم ، یمكنذه ق ل ، ھ ن العم بك ع ل حاس د یعط ا ق دادات دون إلمامبوظائفھ ن أن اإلع ي یمك یاء الت بعض األش ة ب ائم

:یعدلھابرنامج إعداد البیوس

تغییر الوقت والتاریخ تعیین عدد وحجم األقراصالمرنة والصلبة نوعیة بطاقة الفیدیو ( VGA , ega .... ھو -) إلخ VGA اجعل خیارك دائما خصائصتوفیر الطاقة( إعدادات الطاقة ) ة حمایةالحاسب بكلمة س( كلمة السر از إال من خالل كلم دخول للجھ د ال ر حیث ال یستطیع أح

زال ) السر ى ت ة السیموس حت ة بطاری از وإزال اء الجھ ك إطف ب علی ة السر فیج ، إذانسیت كلم .جمیعالمعلومات من رقاقة السیموس بما فیھا كلمة السر

ل حجم "CMOS" رقاقة سیموس وس مث ا البی ي یحتاجھ ات الت وم بتخزین المعلوم راص الصلبة تق األق .وما إلى ذلك ،وتحتاج لبطاریة حتى تحتفظبمحتویاتھا

Page 31: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 30

1.4.5- Cache Memory: Ram is fast, but it isn’t fast enough to support the new processors speeds such as Motorola & Pentium II. To enable micro processor to function at maximum speed, designer use cache memory as shown in figure (6) this has the following characteristics.

There are two types of cache, first called primary cache located in the microprocessor and is the fastest one. The second is called secondary cache or level2 (l2) cache located on the motherboard out side the microprocessor and faster than RAM.

الج رام ( Cache memory ) ذاكرة المع ذاكرة ال ت RAM ان ال التخزین المؤق وم ب تقي السرعة اوت ف ذا التف ان إضافة للبرامج والبیانات والرام یعمألبطئ من المعالج و لحل ھ ك

الج ( caches memory ) ذاكرة الكاش ى المع ع عل ي تق ي تنتظر . الت ات الت ام والبیان المھى L1 and L2 cache المرور بالمعالج تخزن فیذاكرة الكاش تحتوي المعالجات الحدیثة عل

عرف بـ ھي الذاكرة األساسیة للمعالج وھي أسرع L2 ... L1 و L1 موقعین لذاكرات الكاشت المعالجات القدیمة قبل البنتیوم كانت تستخدم ذاكرة. المھام والبیانات للمعالج مباشرة وتزود

( W T ) الج ة للمع ات الداخل رأ البیان ط تق ت فق ي كان وم . الت ات بنتی ور معالج وبظھة ذاكرة الثانی ا ال ة مع القراءة والكتاب وم ب بحالكاش یق دار L2 cache اص ي الإلص ف

ن معالج اني م رةاألولوالث ت ذاك وم كان رام L2 ات لنتی ي ال ع ف ي ... تق ي ف ا ف أم . L1 االصداراتالحدیثة فإنھا تقع على المعالج نفسھ و تقوم بنفس مھام ذاكرة

Smaller than RAM اصغر من ال رام Faster than RAM أسرع من ال رام Expensive غالیة الثمن Improves the computer system’s overall performance تحسین اداء

الحاسب من خاللھ The processor use it to store frequently accessed program

instruction and data

Page 32: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 31

Figure (1.10) the Cache memory

1.4.6- Virtual Memory (VM): الذاكرة االفتراضیة

Operating system allocates portion of hard disk to function like RAM. When the RAM gets full with programs, the operating system creates virtual memory; virtual memory is anextension of RAM.This act will slow down the computer because hard disk is much slow than RAM. To avoid using virtual memory it is better to use a bigger RAM.

ام أھا النظ ة ،أنش یة ممتلئ ذاكرة الرئیس ون ال دما تك لب عن رص الص ي الق ئ ف یة وتنش ذاكرة االفتراض الل من وتر الن سرعة القرص الصلب اق ة تبطأ الكمبی ذه العملی ذاكرة الرئیسیة ، وھ التشغیلي كتوسیع لل

. م الذاكرة ولغرض تفادي الذاكرة االفتراضیة یفضل زیادة حج.سرعة المعالج والذاكرة الرئیسیة

ھي جزء مألوف في أغلب أنظمة التشغیل، فأغلب أجھزة الحاسوب ھذه األیام تحتوي االفتراضیةالذاكرة ة 64أو 32على غیل مجموع افي لتش ر ك ذاكرة غی در من ال ذا الق میجابایت ذاكرة رام، ولكن لألسف فھ

د امج بری ت وبرن ة ومستعرض إنترن ور ومحرر كتاب ر ص من البرامج في وقت واحد مثل برنامج تحریك افتراضیةفإن لم یكن لدیك ذاكرة إلكتروني، ب من ى رسالة تطل رامج وستحصل عل ذه الب ن تعمل ھ فل

ذاكرة ود ال ع وج ذاكرة، م ن ال زء م ر ج ات لتحری ض التطبیق الق بع یةاالإغ وتر افتراض یقوم الكمبی سذا ى القرص الصلب وھ وم بنسخھا عل رام ویق ذاكرة ال بالبحث عن أجزاء غیر مستعملة باستمرار من ال

ذا األمر یحدث یح رة اإلضافیة، ھ ات الكبی غیل التطبیق ي تش تم استخدامھ ف رام لی ذاكرة ال ما من ال رر قس .بشكل تلقائي لدرجة أنك ال تحس بھ ویجعل جھازك یحس أن لدیھ ذاكرة أكبر مما ھي علیھ

1.5 System Bus & Expansion Bus باصات النظام والباصات

التوسعیةAre the Circuits that carry data from one component to anther (a highway

of parallel wires). التوسعةمنافذ (expantion slots) : ي القسم ع ف وھي عبارة عن شقوق تقة افةالكروت المختلف ي اض ا ھ ة األم ، وظیفتھ ن اللوح وبي م ھا (cards) الجن ر بعض ي تعتب الت

ة ور(ضروریة مثل كرت الشاش وم باصدارالص ذي یق ھا ال ة لعرض ى الشاش ذي ال ) وارسالھا ال والدة زات جدی ب می ث تعطي الحاس تم اضافتھا بحی التي ت یعمل الحاسب بدونھ ، وھنالك بعض الكروت

Page 33: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 32

وت ك كرت الص ى ذل ال عل وم (sound card) لكنھا لیست مھمة لكي یعمل الحاسب ،ومث ذي یق الا بصنع االصوات وارسالھا الى السماعةلكي نستطیع سماعھا ،طبع ا شقوق التوسعة أنواع كثیرة منھ

pci أضعاف سرعة8والذي یعمل بسرعة تعادل 4xالقدیم جدا و الحدیث والبطىء والسریعوالثالث و ر واالحدث فھ ادل 8x، اما االصدار الخی ذي یعمل بسرعة تع ل pci ضعفسرعة 16وال ي نق ف

! البیانات1.5.1- System Buses: ات أنواع وسائط النقل أو الباص - System Bus باص النظام (also called memory bus) connects the microprocessor to the supporting chips on the mother board as well as to the RAM. - Internal Bus داخلي باص connects the microprocessor components to each other - Expansion Bus باص توسعي (also called I/O Bus) is an important feature of motherboard which enables you to upgrade your system by adding input & output component, its connect to Expansion slots فتحات توسعیھ which accept expansion boards also called Adapter such as sound card, modems. 1.5.2- Expansion Buses أنواع الباصات التوسعیة

Figure (1.11): Expansion Buses

fastest next fastest next fastest slowest

Page 34: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 33

- ISA Bus (Industry Standard Architecture) used in older IBM compatible

computers which is 16 bit wide, older Macintoshes use NuBus which is 32 bit wide

ذ و من الشقوق industry standard architecture ویحمل االختصار : ISA منف وھردد ل بت ث یعم ة حی ة و البطیئ اھ 8القدیم دا 16یرتز وبعرض میغ ر ج ھ كبی ا انحجم ت كم ب

.واداؤه منخفض

- PCI Bus (Peripheral Component Interconnect) most new PCs & Macintoshes use this bus which is 32 or 64 bit wide.

ذ ار : PCI منف ل االختص قوق peripheral component interconnect ویحم ن الش و م وھردد pci كروت الصوت والمودیم وغیرھا ،وشقالمستعملة لتوصیل ث یعمل بت 33سریع وعملي حی

رض اھیرتز وبع ق 32میغ ك ش ا ھنال ت ، طبع ى pci-x ب ردده ال ل ت ذي یص اھیرتز 133ال میغ .(servers) بت وھو مستخدم في لوحات االم الخاصةبالخادمات 64وبعرض

- AGP Bus (AcceleratedGraphicsPort) is the latest Expansion Bus which is specially designed to improve the computer’s display performance.

ذ ھ accelerated graphics port ویحمل االختصار : AGP منف م االعالن عن و شقحدیث ت وھذا الشق مختص بكروت 1997عام ث أنھ ة ، حی ي كروت الشاش وذلك لدعم التطور الذي حدث ف

ین الشاشة فق ا وب ات سریع بینھ دلنقل للبیان ى مع اج ال ط، والھدف من اصداره أن كروت الشاشة تحتات ا agp من شقوق االعضاء االخرى اھمھا المعالج ، وھنالك سرعات لنقاللبیان ذي 1x، اولھ وال

. pci والذییعمل بسرعة تساوي أربعة أضعاف سرعة 2xمضاعفة ، اما الثاني فھو pci بسرعة

To ensure compatibility with other Expansion boards, most new motherboards include one or two ISA slots in addition to several PCI slots and an AGP slot.

1.6 Plug and play: When users tried to install a new peripheral, such as a modem or a sound card, a port conflict occurs, this conflict occurs when two or more devices are trying to use the same port. Microsoft and Intel created the Plug and Play (PNP) standard to remedy the conflict situation; this standard requires special chips on the motherboard. Only the newest PCs support this standard.

Page 35: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 34

CH2

Storage Units وحدات التخزین

Storage isn’t the same thing as memory; storage devices provide nonvolatile storage for programs and data. Storage devices are like file drawers, they hold programs and data in units called files, the speed of memory and storage devices called access speed(the time needed to find requested data) , memories are much expansive and faster than storage devices.

2.1- Storage devices characteristics: (Hard Disk, Floppy Disk, CD-ROM, DVD, and etc) All these units are random عشوائیة أو مباشر (direct access) accept the tape which is sequential متسلسل; tapes are slower than the other units, less expensive.

Characteristic: 1- Non volatile غیر متطایرة 2- Slower than memory إبطاء من الذاكرة 3- More capacity سعھ اكبر من الذاكرة 4- Read/write devices وحدات قراءه وكتابھ 5- Less expensive ارخص من الذاكرة

Page 36: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 35

2.2- Formatting التقسیم او التصفیر This process is necessary to prepare the magnetic disk before storage, in this process the disk will be divided into concentric circular bands أخادید أو

متحدة المركزاربطھ دائریة called tracks, each track is divided into pie-shaped wedges أوتاد تشبھ الفطیرة called sectors, two or more sectors combined to form a cluster.

Formatting the HDDتھیئة القرص الصلب

: نوعان التھیئةھناك , لكي نستطیع استخدام القرص الصلب یجب أن نقومبتھیئتھ أوال

ة ة الفیزیائی نخفض Physical Formatting أولھا ما یعرف بالتھیئ ة المستوي الم و تعرف أیضا بتھیئLow Level Formatting.

High Level أو ما یعرف بتھیئة المستوي العالي Logical Formatting الثانیة ھي التھیئة المنطقیةFormatting.

Figure (2.1): Formatting a disk

2.3 File Systems

(FAT (File Allocation Table (FAT32 (File Allocation Table32 (NTFS (New Technology File System (HPFS (High Performance File System NetWare File System Linux EXT2 and Linux SWAP

Track

Sector

Page 37: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 36

FAT (file allocation table): على القرص جدول مواقع الملفات • A table of information that operating system uses to locate files on a

disk • Reformatting disk usually erases only file allocation table and leaves

actual files on disk. The formatting program creates a file allocation table (FAT) when formatting is complete, which keeps vital records that show exactly where a given file is stored.

2.4- Storage unit’s types أنواع وحدات الخزن

2.4.1- Floppy Disks المرن القرص Is a circular plastic disk coated with a magnetically sensitive film.Floppy disks are design to work with floppy disk drives. Floppy size is 1.4MB, new floppies size is 2.88MB, and spin is (300 rpm)

Figure (2.2): the floppy disk 2.4.2-Hard Disk القرص الصلب Hard disk works like a floppy disk; magnetic read write heads move

across the surface of a disk coated with magnetically sensitive material. HD’s spin much faster than floppy, many HD’s spin at (7200 rpm), and high end drives hit (10,000 rpm).

A head crash can occur. it is one of the causes of bad sectors(areas of the

disk that have become damaged.

Page 38: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 37

Figure (2.3): the Hard disk

: للتعامل مع الكمبیوتر Interface تستخدم األقراص الصلبة نوعین من ال

EIDE ویمكن اختصارھا الي " IDE " ات ا ون اإللكترونی غیل القرص و فیھا تك ة لتش لالزمة -موجودة بداخلھ ین مستخدمي -فیلوحة التحكم االلكترونی ب ر شیوعا ھ ، وھي األكث یس خارج ول

وتر ھ , الكمبی طوانات المدمج غالت االس ي مش تخدمة ف ھا المس ي نفس رص , وھ یل الق تم توص وی .الصلبباللوحة األم عن طریق كابل مباشرة دون استخدام كروت اضافیة

SCSI ھ ھ أیضا مكلف عن ر من النوعاالول و لكن وع أسرع بكثی ي , ھذا الن ا ف ویستخدم غالبزم , السیرفرات واالجھزة التي تتطلبسرعات عالیة ة األم یل ولكن لتوصیل القرص الصلب مع اللوح .أن یكون ھناك كارتاضافي یركب باللوحة األم

- Partition المقاطع Is a section of a disk set aside as if it were a physical separate disk. Some time Partition is used to enable computer to work with more than one operating system.

ة) إلى قسم واحد علي األقل(نقوم بتقسیمھ انالقرص الصلب یجب عند استخدام . ثم تھیئة األقسام الناتجواع الث أن اك ث د , Primary أساسي: لتقسیمات القرصالصلب و ھي ھن ي Extended ممت ومنطق

Logical .

:Primary Partition القسم األساسي .1

غیل ي نظام التش دوز(یحتوي القسم األساسي عل ات ) مثاللوین ات أو بیان ى أي ملف المستخدم باإلضافة إلل(أخري ا , (My documents , Program files مث غیل و كم ل نظام التش تم تنزی ل إن ی ا قب ذكرن

.یجب تھیئة القسماألساسي أوال بنظام ملفات مناسب لنظام التشغیل المستخدم

Page 39: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 38

اح ون مت ط سیعمل و یك ا فق لو كان القرص الصلب یحتوي علي العدید مناألقسام األساسیة فإن واحد منھغ دء تش د ب اقي األقسام األساسیة لالستخدام و ھو الذي سیتمتحمیل نظام التشغیل منھ عن وتر و ب یل الكمبی

.ستصبحمخفیة مما یمنع استخدمھا

:Extended Partition :القسم الممتد .2

ة د من األقسام المنطقی ي العدی ةتحتوي عل ھ حاوی و ال یمكن أن ,یمكن أن نعتبر القسم الممتد علي أني یمكن بل یجب أن نقسمھ إلى, نستخدم القسم الممتد في تخزینالبیانات ة الت عدد من األقسام المنطقی

.أن نستخدمھا فیتخزین البیانات

:Logical Partition القسم المنطقي .3

د ي , ال یمكن لألقسام المنطقیة أن توجد إال داخاللقسم الممت وي عل ة أن تحت ویمكن لألقسام المنطقیة ي أنظم وي عل وال یمكن أن تحت بعض األح ل فی ات ب ة و بیان ات عادی غیل ملف ل(تش , OS/2 مث

LINUX ,WindowsNT) .

- Storage capacities: سعھ الخزن Hard Disk capacities are measured in megabyte or gigabyte, a disk with 20 GB = 20,000,000,000 Byte (character). تقاس سعھ الخزن بالكیلو

ومضاعفاتھا تبای - Physical performance: الفیزیائي ءاالدا A disk rotational speed سرعة الدوران is an important issue. - Seek time البحث زمن Is the time required to position the drive head over the correct track. - Disk Cache: is the part of the Hard Disk that is used as a virtual memory which is 512 KB.

2. Hard Disk Interfaces: ةواجھة االتصال بین القرص الصلب والحاسب Is the electronic connection between the drive and the computer, it is handled by a hard disk controller which may be located on the mother board or included in the drive itself.

The drive interface determines the drive data transfer rate نسبھ أو معدل نقل is the number of bits per ,البیانات وھي عدد ألبتاه التي تنقل في الثانیة الواحدةsecond (bps) that the drive can funnel data into the computer. On PCs, the most commonly interface is called Integrated Device Electronic (IDE) also called Advanced Technology Attachment (ATA). Most Macintosh and some PCs use controllers and drives that called Small Computer System Interface (SCSI).

Page 40: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 39

Newer PCs used Enhanced IDE (EIDE) interface and the latest use Ultra ATA also called Ultra DMA. The fastest SCSI is called Ultra Wide SCSI.

Hard Disk Interface

Interface Type Maximum Data Transfer Rate

( Mbps) Original IDE 2.1

5.0 16.6 20.0 33.3 40.0

Standard SCSI EIDE(ATA-2) Ultra SCSI Ultra ATA (Ultra DMA) Ultra Wide SCSI

Table (2.1): Hard Disk Interface

2.4.3- Removable Hard Disks األقراص الصلبة المتحركة نوع جدید من أنواع األقراص المتحركة ویتم الخزن على كاترجات ذات سعات كبیره

A type of hard disks that use removable disk cartridges, it can be used for backup procedures, to archive infrequently used of data files, and to exchange large data files with other computer users. Removable hard drives have security benefits. Many new computers come equipped with a Zip drive, a removable hard disk that uses 100MB cartridges.

- Magnetic Tape الشریط الممغنط

ھ ھ الن عملی دات الخزنی اقي الوح ا بب دا قیاس يء ج و بط یت وھ ریط الكاس ل ش وع یمث ذا الن ھ . البحث وتحدید البیانات تتم بصور متسلسلة لكنھ الزال یستخدم في الحاسبات الكبیرة

The earliest PCs came with cassette tape drives. Which are sequential data storages that make access time slow. The new type of tape drivers are called Quarter-inch cartridge (QIC) that works with cartridges that can store more that 100MB of data. In mainframe world, mass storage systems store hundreds or even thousand of high- capacity tape cartridges.

Page 41: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 40

2.4.4- CD Discs & Drives األقراص المضغوطة ومشغالتھا

Figure (24): the Compaq disk (CD)

• Storage medium • Most PCs include some type of compact disc drive • Available invariety offormats

Types of Compaq disk(CDs):

CD-ROMمضغوطة للقراءة فقطأقراص The most popular and least expensive type of optical disc is Compact disc read-only memory (CD-ROM) - large data capacity حجم بیانات كبیر - read only technology تقنیة قراءه فقط - low cost رخیصة

CD-ROM can store up to 650MB; they can transfer data at rate of 150,000 bps (15kbps) which is slow in compare to HD or FD. Faster CD-ROM came with transfer rate of 300 kbps (2X) double speed the latest one can transfer as much as 3.6 Mbps (like slower HD). Now is faster. CD-R سي دي قابل للتسجیل علیھ لمرة واحده فقط ویعتبر رخیص الثمن CD-recordable, can read CD-ROM discs also write to special CD-R disks which have a coating of Temperature-sensitive dye, greenish cold in color, when the laser hit the dye it changes the color.

- CD-R is a write ones technology - Not expensive

CD-RW read –Write compact discs سي دي للقراءة والكتابة أي یمكن

التسجیل علیھ عدة مرات ولھ مشغل خاص

Page 42: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 41

DVD-ROM سي دي خاص لخزن الرسومات والصور وھو ذو سعھ كبیره وسرعھ عالیة The newest optical disk is (digital video disc DVD) or (digital versatile disk) DVD-ROM is different format than CD-ROM, DVD-R, can read CD-ROM discs also write to special CD-R disks which have a coating of Temperature-sensitive dye, greenish cold in color, when the laser hit the dye it changes the color. And a read write version called DVD-RW. DVD-ROM drives can play DVD and can read CD-ROM.

Characteristics

capacity of 17 GB high speed 12Mbps work with video and images

2.5 Storing Data in Files حزن البیانات في الملفات

A file الملفis an area of the storage medium to store a program or a collection of data. - Files must have a name (up to 255 characters) - Files must have extension name اسم توسعي أو وصفي(no more than 3 characters) with the file name, that describe the file type. - Files organized into files cabinets called directories or folders دلیل أو حافظھ- Files are various types (Program files or Data files) نوعین األول تالملفا للبرامج والثاني للبیانات - All program files are binary files that contain information that the computer can read only - Data files are created to store the data that programs use, most programs store data in a proprietary file format, which is a data storage format used only by the company that makes the program.

Page 43: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 42

2.5.1- Types of data files انواع ملفات البیانات

- configuration files contain settings or configuration choices that program requires to run correctly ملفات تھیئھ البرامج ومعدات الحاسب

- Text files contain nothing but standard characters(letters, symbols,

marks, numbers) ملفات نصوص

- Graphic files contain pictures in a specific graphic format(JPEG, GIF) ملفات رسوم

- Database files contain data that has been stored in a proprietary files

format of database program تملفات قواعد بیانا

- Sound files contain digitized sounds ملفات صوت

- Backup files contain copies of essential data ملفات نسخ إضافیة

Page 44: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 43

CH 3

INPUT & OUPUTDEVICES وحدات اإلدخالو االخراج

3.1- Input devices: وحدات االدخال Are electrical and electronic units used by the computer user

(Programmers and non-Programmers) to access data and information into the computer through instruction or programs.

Figure (3.1): Input devices Types of input devices:

3.1.1 Typing devices: Keyboards لوحة المفاتیح Function keys

Typing areaNumeric keypad

Page 45: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 44

3.1.2 Pointing devices أجھزة التأشیر

3.1.2.1 Mouse الفأره

The common mouse operations

Point Click Right-click Double-click Drag Right-drag Rotate wheel Press wheel

3.1.2.2Trackball 3.1.2.3 Track point 3.1.2.4 Touchpad 3.1.2.5 Joysticks 3.1.2.6 Touch-sensitive 3.1.2.7 Pen-based system

3.1.3- Scanners الماسح الضوئي

3.1.4-Sound card كارت الصوت

3.1.5- Microphones المیكروفون

Page 46: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 45

3.2- OUTPUT DEVICES معدات اإلخراج Any hardware component that can convey information to a user

3.2.1- display device Like Television Information on a display device sometimes is called soft copy

Those monitors’ looks like television screen use the TV’s Cathode Ray Tube (CRT) technology. There is a new technology called Flat-panel display that use liquid crystal display (LCD) technology, LCD display sandwich cells containing tiny crystals between two transparent surfaces, gas plasma monitor.

3.2.1.1 The CRT monitor • Large sealed, glass screen كبیر الحجم نسبیا • Screen coated with tiny dots of phosphor material الشاشة مطلیة

بطبقة دقیقة جدا من نقاط مادة الفسفور• Three dots (red, blue, and green) combine to make up each

pixelیتم مزج ثالثة الوان لتكویت الصور الملونة وھي االحمر االزرق واالخضر • Pixel, or picture element, is single point in electronic image وھي

عنصر تكوین الصورة

Figure (3.3): CRT monitor

What are typical sizes for CRT MONITORS?

• 15, 17, 19, 21, and 22 inch screen size • Viewable size is diagonal measurement of actual viewing area provided

by the monitor

Page 47: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 46

3.2.1.2- The liquid crystal display (LCD) monitor Type of flat-panel displayشاشة مسطحة, Uses liquid crystals between two sheets of material to present

information on screenتستخدم تقنیة الكریستال السائل Electric current passes through crystals, which creates images

on the screen ورةالتیار الكھربائي یمر خالل الكریستال فیولد الص

Figure (3.3): CRT monitor What are the two technologies used for LCD monitors?

Active-matrix display: Can display high-quality color viewable from all angles جودة االلوان عالیة من اي زاویة من زوایا الشاشة

Passive-matrix display: Color often not as bright Images best viewed when working directly in front of Display.جودة االلوان تكون جیدة فقط من الواجھة االمامیة

Viewable size

Screen size

Page 48: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 47

3.2.1.3- The gas plasma monitor? • Flat-panel display uses layer of gas plasma between two sheets of

material. Larger screen sizes and higher display quality than LCD. شاشة مسطح تستخدم غاز البالزما لتكوین الصورة ، تصلح للحجام الكبیرة من شاشات العرض .(LCD)ارخص من شاشات

Display resolution: • Describes the sharpness and clarity of image • The higher the resolution, the sharper the image and the more that can display on the monitor

Video adapter card: بطاقة الشاشات

Figure (3.4): Video adapter card Video standards:

Table (3.1): the video standards

Page 49: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 48

Two important factors should considered عامالن أساسیان البد من مراعاتھما

- the resolution of the screen دقھ الوضوح - the depth of the colors نأال لوا

Table (3.2): resolution & color depth

3.2.2- Printers: الطابعات Electrical devices used to print the output on papers, printers connected to the computer through interface. رونیة تستخدم اجھزة الكت لطباعة المعلومات على الورق Two basic technologies dominate the world of computer printers: Impact and non-impact printers.

3.2.2.1 Impact Printers: When part of the printer presses the paper

to form the character, the printer is conisdered as impact printer.

اج . ة النت ى الورق ر عل ریط المحب رق الش ى ط ل عل ادمیة وتعم ات التص الطابع .الطباعة وتتحمل الظروف البیئیة مثل الحرارة والرطوبة واالھتزاز

Dot Matrix Printer:

وتعمل على أساس المصفوفات النقطیة ویمكن استخدام الورق المتسلسل ولعدة سخ وھي بطیئة ومزعجھ الصوت

Page 50: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 49

Figure (3.5): Dot Matrix Printing

line printer:

تتم طباعة سطر كامل فھي سریعة جدا حیث تقاس السرعة بعدد االسطر في القیقة الواحدة

High-speed impact printer that prints entire line at a time

Speed measured by number of lines per minute (lpm) it can print

Band printe`r prints fully-formed characters using a hammer mechanism

Shuttle-matrix printer is high-speed printer that works more like a dot-matrix printer

Figure (3.6): line Printer

Page 51: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 50

3.2.2.2 Non-impact printers: Are most widely used for PCs today, It

can produce both text and graphics. Because nothing strike the paper, its quite

Inkjet printer (also called bubble-jet printers): (non

impact printers) نفاثة الحبر وتكون سریعة وغیر تصادمیھ وتستخدم الورق العادي الغیر

متسلسل ویمكن عمل اكثر من نسخة

Figure (3.7): Ink jet printer

Lazier printers: (non impact printers) سریع تستخدم ھلیزاری تقنیة اللیزر الضوئي

Figure (3.8): Lazier printer

Thermal printer: are the best color printers, the best thermal printer is the dye sublimation printers حراریة ومن

) الداي سب لمیشن(افضل أنواع الطابعات الملونة أفضلھا

Page 52: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 51

Figure (3.9): Thermal printer

Multifunction printers: combine inkjet or laser printers with scanner and a copy machine طابعات متعددة الوظائف

3.2.3- Plotters: الراسمة وتستخدم لرسم الخرائط وباحجام كبیرة

Figure (3.9): Thermal printer

3.2.4- Speakers :السماعات Audio output devices Computer component that produces music, speech, and other sounds Speakers and headsets are common devices

Page 53: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 52

CH 4

Systems and Application Software

برامج النظام او التشغیل وبرامج التطبیقات

Model A SystemsSoftware

• Computer program - sequences of instructions for the computer

سلسلة او مجموعة من التعلیمات التي یعمل بھا الحاسب االلي• Documentation - describes program functions

وثائق تصف البرامج ومكوناتھ• Systems software - coordinates the activities of hardware & programs

لمسؤلة عن ادارة وتنسیق عمل االجھزة مع البرامج التطبیقیةھي البرامج ا:برامیجات النظام

4.1- Operating System (O.S) النظام التشغیلي Aset of programs that coordinates, control and manage all activities among computer hardware resources, and the user interface.

والبرامج هوتنظیم العالقات التشغیلیھ وتبادل البیانات بین أال جھزالبرنامج المسؤول عن أداره ) واجھة االتصال مع المستخدم(والمستخدم

Page 54: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 53

The computer’s O.S keeps traffic running smoothly النظام التشغیلي یجعل مرور البیانات بین أجزاء الحاسبة سھل وسلس

A computer can’t run without an O.S بدون النظام التشغیلي لالكمبیوتر ال یعم The O.S is usually stored on the computer’s hard disk النظام التشغیلي یحزن على

القرص الصلب When you turn on a computer, the computer copies the essential portions of the O.S (Kernel or supervisor program) into the computer memory, the kernel is called Memory resident, the other portion of O.S called the non-resident, and copied to the memory when needed. مى ذاكرة ویس ى ال غیلي عل ن النظام التش یة م زاء األساس غیل بنسخ األج د التش ب عن وم الحاس یق

ا )المقیم في الذاكرة ( ى القرص الصلب آم ى عل غیلي فتبق رامج النظام التش اقي ب ر (ب مى الغی ویس .ویتم نسخھا عند الحاجة) مقیم

Booting: A process of starting or restarting a computer

Cold boot: Process of turning on a computer after it has been poweredoff completely.

Warm boot: Process of restarting a computer that is already powered on

The functions of the O.S: النظام التشغیلي تفعالیا

4.1.1 Managing Programs أداره البرامج

Single-tasking: المھام المنفردة او االوحادیة Earlier O.S can run only one application program at a time.

لنظام التشغیلي الذي یشغل برنامج تطبیقي واحد في وقت واحد ا Multitasking: تعددیة المھام والواجبات O.S enable user to work with two or more program at once, one application is called foreground application is active, the other one called background application is inactive. This is called cooperative multitasking.

Foreground contains active application - the one you currently are using

Background contains inactive programs that are running but are not in use

Page 55: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 54

و ذاكرة وھ ة ال ي واجھ ون ف ت األول یك س الوق ي نف امج ف ر من برن غیل اكث تشال من ال ویمكن االنتق الفعال والثاني أو الباقي یكون في الخلفیة ویكون غیر فعة ذه التقنی ورت ھ د ط أرة ولق رامج بوسطھ الف ین الب ل ب ى أخر بالتحوی برنامج إل

ا حصل امج أيبحیث ال یتم إعادة تشغیاللحاسبة إذا م ي برن كال أو توقف ف إشي ھ ف ث ان رة حی وره مباش ة بص امج الخلفی ى برن ل إل تم التحوی ط ی ة فق الواجھامج ي برن ف ف بة إذا حدث أي توق غیل الحاس اده تش ى أع طر إل ان یض السابق ك

الواجھة Timesharing: المستخدمین دالمشاركة في الوقت أو تعد More than one user can use the same computer or application

simultaneously. ت ي الوق اركة ف ت أي المش س الوق ي نف وتر ف خص للكمبی ن ش ر م استخدام اكث

والبیانات ومصادر المعلومات والكمبیوتر Multithreading:

Enable the computer to execute more than one task in a single program. Programmers must divide a program into distinct tasks called threads.

تشغیل اكثر من واجب على البرنامج الواحد على شكل حزم مثل الطباعة والخزن في نفس الوقت

Multiprocessing: The use of two or more processor at a time (SMP) Symmetric multiprocessing.

لكمبیوتر بصورة متزامنة حیث یمكن للنظام استخدام اكثر من معالج على نفس اوالسیطرة على جمیع المعالجات هالتشغیلي أال دار

4.1.2 Managing Memory أدارة الذاكرة

Optimizes the use of random access memory (RAM). The O.S gives each running program its own portion of the memory called partition.

على الذاكرة أو موقعھالنظام التشغیلي یخصص لكل برنامج ینفذ مكانھ

• allocates, or assigns, data and instructions to area of memory while they are being processed

• monitors contents of memory • clears items from memory when processor no longer requires

them

4.1.3 Handling Input & Output أداره وحدات اإلدخال واإلخراج

The O.S handles and manages the I/O devices. These devices generate interrupts signals إشارة مقاطعھ that inform the O.S that some thing has happened (the user has pressed a key); the O.S provides interrupt

Page 56: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 55

handler متحكم إشارة المتقاطعةwhich is a mini programs that control the interrupt signals.

د ث تول دات اإلدخال واإلخراج حی ذه األجھزة إشارة نظم التشغیل تقوم بأداة مع ھوح ق ل م عن طری ال رق ل إدخ ا مث دوث شيء م غیلي بح م النظام التش ھ تعل مقاطعمى ذه اإلشارة یس تحكم بھ امج لل ز برن غیلي بتجھی وم النظام التش ذلك یق اتیح وب المف

.بمتحكم اإلشارة The O.S needs device drivers (Device drivers contain specific information about a particular brand and model).

رامج ذه الب كل نظام تشغیلي یحتاج الى برامج شغیل وحدات االدخال واالخراج وھز غالت االجھ مى مش غیل الحالی ةتس م التش ب نط زود ة، اغل ون م ذه ةتك ل ھ بمث والمعدات ةالبرامج التي تدیر االجھز

4.1.4 User interface: واجھة االتصال بین المستخدم والحاسبھ Controls how you enter data and instructions and how information displays on screen. It's the part of the O.S that interacts with the user, some times called shell.

النظام التشغیلي الخاص بالمستخدم والتعامل واجھة االتصال بین الحاسبھ والمستخدم وھو جزء مع الحاسبھ

Types of user interface: انواع واجھات االتصال مع الحاسبھ

1- Command-line interface: Using the keyboard to tell the computer what to do

ام أوامر النظ ھ ب ب معرف ذا یتطل اتیح وھ ة المف طھ لوح ذھا بواس راد تنفی ر الم ھ االوام طباع التشغیلي وكیفیھ تحدید مسار االمر المطلوب

2- Menu -driven user interface: Select from a text based menu that show all the option available تحدید االمر المطلوب تنفیذه وذلك من خالل قائمھ تحتوي على كل الخیارات المطلوبھ

لذلك

3- Graphic user interfaces (GUS):Computer programs or files can be represented by icons

البرامج والملفات على شكل ایقونات لغرض التعامل معھا بالضغط على مفاتیح الفأرهیتم تمثیل

Every O.S provides a default user interface which accepts user commands and provides messages in response.

Page 57: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 56

واحھات اخرى لكل نظام تشغیلي واجھة اتصال رئیسیھ او اتوماتیكیھ یعمل علیھا ویمكن توفیر

User interface functions: All three types of user interfaces enable the user to do the following: رھا واجھة االتصال التي توف تالفعالیا

1- Gain access (log on) by user name and password 2- Start application programs (launch) 3- Manage disks and files 4- Shut down the computer safely

4.2 Types of O.S انواع نظم التشغیل

4.2.1- UNIX: Developed at AT&T’s Bell laboratories in early 1970s, is a pioneering O.S that has the following features first O.S with preemptive multitasking اول نظام استخدم خاصیھ اداره البرامج المتعدده efficient in a secure كفاءة عالیھ في مجال السریھ وامنیة المعلومات support net working (client / server computing) یدعم عمل الشبكات support multiprocessing یدعم عمل استخدام اكثر من معالج

4.2.2- MSDOS: Or DOS for short is an O.S for Intel-based PCs that uses the command line

User interface ھ والتنفیذیھیستخدم على حاسبات انتل وباسلوب طباعھ االوامر التشغیلی 4.2.3- Mac OS: For Macintosh PCs یستخدم على حاسبات ماكنتوش 4.2.4- Microsoft Windows 3.x: used for Intel based PCs with GUI interface , this O.S used with 80386 microprocessor that offer a new mode called protected mode that enable user to access virtually unlimited amounts of memory (windows 95,97,98,200,ME) جیل جدید من النظام دوس مطور من قبل شركة مایكروسوفت وعلى حاسبات انتل ویستخدم واجھة

) ایقونات(االتصال الرسومیھ

4.2.5- Microsoft Windows NT: is a specifically designed for client/server systems consist of two component called

:صمم خصیصا لدعم عمل الشبكات على الحاسبات الشخصیھ من نوع انتل وھو على نوعین

Page 58: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 57

Windows NT Workstation: is designed for individual desktop computers; it’s faster than Win 95-98 by as much as 30 percent.

%30بحوالي 98صمم للحاسبات المنفصلھ وھو اسرع من Windows NT Server: is design to support networks and has the

following benefits:

:ھذا النوع من نظم التشغیل مصمم الداره الشبكات وباالخص الشبكات المحلیھ ویمتاز بما یلي 1.Security السریة 2.Remote administration االداره عن بعد 3.Directory services خدمات االدلھ 4.Web server مخدم جبد في البحث عبر االنترنت

4.2.6- Linux: a new version of Unix that is used for Intel-based PCs ,

including Macintosh

من النظام یونكس استخدم لكل من حاسبات انتل وماكنتوش نظام لونكس وھو جیل جدید ومطور ویتمیز بقوتھ وسرعتھ العالیھ وباالخص في اداره البرامجیات الصوریھ والحركیھ

powered the PCs on which the movie’s animations very fast

This O.S is powerful & free, powerful because its includes all respected features of UNIX (multitasking, virtual memory, internet support, multiprocessing). Free because it is distributed using the open software foundation’s General Public License (GPL).

ل یونكس وغیره ومجاني ھذا النظام التشغیلي قوي جدا النھ یوفركل قابلیات النظم الجیده مثتقنیة النظم المفتوحة مباستخدا ةمجانی ةالنھ وزع بصور

4.3 System Utilities الخدمات او الفائده برامج

من برامج الخدمات وكما یلي ةعبمجمو ةلقد زودت النظم الحدی

1- Backup: utilities are an essential part of safe, efficient computer usage. They copy data from the computer’s HD to backup media برنامج عمل نسخھ اضافیھ طبق االصل للحفاظ على البیانات

2- Antivirus Software: also called (vaccines) protect a computer from

viruses الفایروسات ةبرنامج كشف ومعالج

3- File Compression: Utilities to reduce the size of a file by as much as 50%

Page 59: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 58

الى حوالي النصف ةمساحبرنامج ضغط القرص الصلب لغرض توفیر ال

4- Disk defragmentation programs: للملمة اجزاء البرامج المبعثرة على برنامج ترتیب الملفات اعادة و القرص

التي تنتج عن كثره االجراءات ةللقضاءعلى البعثر ةومنظم ةصحیح ةبرنامج ترتیب الملفات بصور

التي تتم على الملفات مثل النسخ والحذف وغیرھا

Model B Application Software

Page 60: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 59

4.4 Applications software: Programs that perform specific tasks for users, also called a software application or an application.Several reasons to use application software

برامج التطبیقات عي البرامج التي یستخدمھا المستخدم في عملھo To assist with graphics and multimedia projects Graphics and multimedia دعم الرسوم والوساءط المتعددة o To serve as a productivity/business tool Business support (enterprise) دعم المؤسسسات والشركات o To support household activities, for personal business, or for

educationPersonal support الدعم الشخصي o To facilitate communications: Group support ( Net work) دعم المجامیع

4.4.1- Programming Languages لغات البرمجة

Page 61: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 60

They are not natural languages; they are artificial language to tell the computer what to do. They are consist of a set of rules called (syntax)

كالتي یستخدمھا الناس في التحدث ، بل ھي لغات ةلیست لغات طبیعی ةلغات البرمج

وبتأني شدید لتوجیھ الحاسب االلكتروني واعالمھ ماذا ةاصطناعیھ بنیت بطریق مدروس syntaxمن القواعد تسمى ةومجموع ةوتتكون منمفردات لغوی.یفعل

1st Generation programming languages (1GL): للغات الجیل االول The earliest computers didn’t have programming language; computer had to be programmed in the computer language.

اكنة وھي لغھ الم ةالحاسب ةبلغ ةلذلك كان یتحتم البرمج ةلم یكن ھنالك لغات برمج ةفي البدای Machine language: consist of binary numbers 0s and 1s that

directly correspond to the computer electrical states. Each type or family of processor requires its own machine language for this reason, it is said to be machine-dependent (also called hardware-dependent). Used the ASCII (American Standard Code for Information Interchange)

دوائر الحاسب ةتمثل حال ةاي ارقام ثنائی 1و 0تتكون من ةلغھ الماكن ائي ب ةمرور التیار الكھربب لغ ةالكھربائی ذه الل ةخاص ةماكن ة، كل نوع من انواع المعالجات یتطل میت ھ ذلك س ھ ل ة ب غ

machine dependentبلغة الماكنة

2nd Generation programming languages (2GL): لغات الجیل الثاني The first programming language to break programmer’s dependence on machine language was the;

assemble language it’s resemble to machine language in that it’s machine dependent and closely tied to what goes on inside the computer, it’s called low level language. It consists of set of instruction for each processor. Before an assembly language can be run on a computer, it must be translated into machine language, the program is a text file called source code, and the source code is translated into machine language by an assembler.

ت الشبھ بالجیل االول من لغا ةلغات الجیل الثاني قریب: )لغھ التجمیع (لغات المستوى الواطىء

ةبكل نوع من المعالجات وقد سمیت بلغ ةمن التعلیمات الخاص ةوھي تتكون من مجموع ةالبرمج . ما یدور او ما یحدث داخل الحاسب ةالمستوى الواطىء النھ یتحتم على المبرمج معرف

Page 62: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 61

اي ةالماكن ةالمجمع الى لغ ةالتجمیع یجب تحویل البرنامج بواسط ةقبل ان یتم تنفیذ برامج لغلكي یفھمھا ةالى لغھ الماكن (source code)البرنامج الذي ھو ملف نصي اسمھ تحویل

. الحاسب 3rd generation programming languages: (3GL)لغات المستوى العالي

High level languages, they are procedural languages that tell the computer what to do, and there is no need for programmers to understand the intimate details of how the computer processes data. Like (COBOL, BASIC, FORTRAN, and BASCAL)

وتسمى بلغات المستوى العالي النھ ال یتطلب من ةوھي لغات اجرائی: لغات الجیل الثالثاي لیس من الضروري ان یكون ةلحاسبالبیانات داخل ا ةمعالج ة كیفیةالمبرمج فھم ومعرف

و ) الفورتران ، باسكال ، كوبول ، بیسك ( ةمثل لغ. التجمیع ةاو لغ ةالمبرجم یعرف لغھ الماكن (Modular language)اوالمعیاریھ (structure language)ةھیكلمھذه اللغات تعتبر لغات

Compiler: المترجم Is a translation program that translates all the source code into object code (a file that contains instruction in a specific computer machine language). With some compilers, it’s necessary to use a program called linker or assembler to transform the object code into executable program.

وتحویل التعلیمات ةیقوم بترجم ةمن لغات المستوى العالي برنامج ترجم ةلكل لغ: المترجم (source code) الى(object code) لكي یتم ةالماكن ةومن ثم یحول الى برنامج تنفیذي بلغ

فھمھا من قبل الكمبیوتر

Interpreter: it translates one line of the source code at a time and executes the translated instruction. It’s run programs more slowly than programs compiled into object code. They are helpful tools for learning and debugging.

الى برنامج تنفیذي ، وھو ة خط او صف كامل من التعلیمات مباشر ةیقوم بترجم ةبرنامج ترجم ةویستحدم في برامج كشف ومعالج) (compilerابطاء من المترجم االول

التي تحصل في البرامج (Debugger)االخطاء 4th Generation programming languages: (4GL)

Page 63: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 62

They are nonprocedural languages, like Database languages that include report generator and query languages. It’s called SQL (Structured query languages), like (DB3, DB4, FOXPRO, etc).

تتضمن عملیھ بناء وتتمثل بلغات قواعد البیانات التي ةوھي لغات غیر اجرائی: الجیل الرابع. من قواعد البیانات ةواعداد التقاریر واالستفھام او االستعالم واستخالص المعلومات المطلوب

ةاو الطبیعی ةالى اللغات االعتیادی ةوھذه اللغات تكون قریب

Object-Oriented Programming: (OOP) A new approach to programming called (OOP), In this language the problem of having update many programs is solved by eliminating the distinction between programs and data.

غیر ةوھي طریقة برمجة جدیده تم فیھا ازالة التمیز واالختالف بین البرنامج والبیانات بصورلبرنامج حیث یتم خزن البیانات وبذلك اصبح من الممكن اجراء التحدیث والتطویر على ا ةمسبوق

مع تعلیمات البرنامج المطلوبة لمعالجة ھذه البیانات Object:Is a unit of computer information that contains data as well as the procedures or operation, called (methods)

.بیانات وتعلیمات البرنامج المطلوبھ لمعالجة ھذه البیانات ةوحده من معلومات الكمبیوتر المكون

4.4.2- Special-purpose programsالبرامجیات ذات االستخدامات الخاصة

في محتلف المجاالت ةبرامج االستخدام الخاص وقد صممت ھذه البرامج لغرض تقدیم خدمات برمجیوغیرھا ومنھا ما یلي ةوالتعلیمی ةوالعلمی ةاالقتصادی

1- SOHO software: من البیت الشخصي برنامج اداره اعمال المكتب

Small office/home office is one of the fastest-growing businesses software of today economy. This software has the following capabilities. Employee training Management consulting Commercial debt negotiation Desktop video publishing Home inspection Telecommuting

2- Bookkeeping Software ةاالقتصادی ةاالنشط ةبرنامج توثیق المراسالت والكتب ومتابع 3- Contact managers برنامج االتصاالات ویعمل كسكرتیر الى 4- Personal information managers (PIMs) ةبرنامج المعلومات الشخصی Decision

Support systems (DSS) برامج نظم دعم القرارات ودعم صانعي القرار 5- Project Managers برنامج اداره المشاریع

Page 64: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 63

6- Fax Software برنامج الفاكس 7- Voice Mail برنامج البرید الصوتي 8- Tax software ةبرنامج ضریبی 9- Genealogy software دراسھ الجینات برنامج 10- Education software (Edutainment) ةوترفیھی ةبرنامج تعلیمی

CH 5

Page 65: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 64

Multimedia & Virtual reality )الوھمیھ(االوساط المتعددة والحقیقھ االفتراضیھ

5.1 Multimedia: االوساط المتعددة Is any representation that involve two or more media, such as text, graphics, or sound like movies, TV show The multimedia H/W can be represented by (CD-ROM drivers, sound card, speakers). A multimedia presentation may be involved some or all of the following:

المعدات والبرامجیات التي تقوم بتمثیل اكثر من وسط مثل نص ورسم او صوت وھي : ةاألوساط المتعددالصوت ، مشغل اقراص سي دي ،سماعات ةبطاق(من ة، وتتكون معدات االوساط المتعدد ةمع صور

.لھذا الغرض ةمن البرامجیات المحصص ةأدناه مجموع) وغیرھا - bit-mapped graphics برنامج الرسوم - vector graphics برنامج معالجة الرسوم - edited photographs برنامج ادخال الصور ومعالجتھا - 3 dimensional images برنامج الصور والرسومیات ثالثیھ االبعاد - edited video ةبرنامج االفالم الفدیوی - synthesized sound ةبرنامج الصوتیات المجسم The multimedia resources saved as digitized files, these files however required a huge amounts of storage spaces. To reduce the size of multimedia files most software uses compression /decompression algorithms called codecs.

م فأنھ یتطلب المتعددة تخزن في ملفات رقمیھ ولكونھا ملفات كبیره الحج طأن مصادر أال وساضغط خاصھ لھذا الغرض ھي ةضغط ھذه الملفات على اقراص سي دي ، وقد استخدمت خاصی

. الضغط ھي كما مبین ادناه ةوالتي استخدمت تقنیتین في عملی)كودیكس ( Codecs use two different approaches to compression:

1- Lossless compression: the original file is compressed so that it can be completely restored without flaw when decompressing occurs. في ھذا النوع من الضغط فأن الملف االصلي یضغط بالكامل والیفقد اي من محتویاتھ عند رفع

الضغط

Page 66: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 65

2- Lossy compression: the original file is processed so that some information is permanently removed without any perceived when people see pictures or hear sounds.

ةعلى عمل الملف والغیر ملحوظ ةیتم ضغط الملف االصلي لكن یتم رفع بعض المعلومات الغیر مؤثر

5.2 Paint programs: برامج الرسومیات

وھنالك العدید من برامج الرسومیات على الخاسوب االلكتروني وبعدة ھیئات منھا

1- Graphics Interchange Format (GIF): - A 256-color file format - Use lossless compression - Best for simple images with large areas of sold colors - Used for web pages

2- Joint Photographic Experts Group (JPEG) - Store up to 16.7 million colors - Best for complex images - Use lossy compression - Used for web pages

3- Portable Network Graphics (PNG) - A new alternative to GIF - Compression is optional - Used for web pages

4-Windows Bitmap (BMP) by Microsoft - A standard bit-mapped graphic format - Compression is optional - Large files - Used for web pages

5.3 Image Editors: برامج ادخال الصور Are sophisticated versions of paint programs designed for editing and transforming but not creating complex bit-mapped images, such as photographs. A lot of software was used in this field such as Adobe Photoshop.

ةوالطبیعی ةالتي تتعامل مع الصور مثل الصور الشخصی ةوالمعقد ةبرامج الصور من البرامج المتطور وغیرھا، مثل برامج ادوبي 5.4 Drawing programs: الرسوم جبرام

Page 67: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 66

Are used to create vector graphics, in which each on-screen object is stored as a complex mathematical description.

مثل ماكرو میدیا وغیرھا كما مبین ادناه ةوالصعب ةوھي برامح تستخدم للرسوم المعقد

Those drawing programs such as Macromedia Freehand and Adobe Illustrator, save files by outputting instruction in the postscript language, which is an automated Page description language (PDL) .

5.5 Animation Programs: برامج الرسوم المتحركة والصور المتحركة

Consists of a series of still images displayed at a frame rate high enough to create the illusion of movement. In computer animation, the computer provides tools for creating the animation as well as running it. 5.6 Video Editor: االفالم الفدیویھ جبرام Enable you to modify digitized video, and to save files to the following video file formats:

ھیئات لھا مثل ما مبین ادناه ةوھنالك عد ةھذه البرامج تمكن المستخدم من ادخال وتعدیل الصور الفدیوی Moving Pictures Experts Group (MPEG) , (MPEG2)

- Lossy compression standards for full motion video - High resolution - Use DVD-ROM discs

Quick Time developed by Apple Computer (Quick Time-3)

- Plays full screen - Broadcast- quality video and CD

Video for Windows called (AVI) developed by Microsoft

windows - Plays full screen - Broadcast-quality video

5.7 Audio Software: الصوتیة جالبرام For processing sound for multimedia presentation with mixer and compression Software, with the following format:

ھي برامج لتولید الصوت على الكمبیوتر مثل MP3: Also known as (MPEG3), using 12:1 of compress Sun/Next (AU) Sounds WAV Sounds

Page 68: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 67

CH 6 Telecommunication& Network

والشبكات االتصاالت

Model A Telecommunication

6.1- Computer communications?

Process in which one computer transfers data, instructions, and information to another computer(s), Communications system contains many types of devices: o personal computers o notebook computers o Web-enabled cellular telephones o Web-enabled handheld computers o WebTV™ o GPS receivers

Page 69: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 68

What is needed for successful communications?

o sending device o communications device o communications channel o communications device o receiving device

6.1.1- Telephone lines: Most of telephone lines provide an analog connection, based on standards that date back more than a century. The old system was called public switched telephone network (PSTN). Now telephone system uses advanced switching technology to create an end-to-end circuit between any two telephones in the world.

واول ھذه النظم ھو ةان اغلب خطوط االتصاالت تعمل على مبدأ ارسال واستقبال االشاره التماثلی ما مبین اعاله

(PSTN)

ةستخدمت تقنیات حدیثھ لالتصاالت ومنھا الرقمیا) الھاتف(أالن نظم االتصاالت 6.1.2- Type of telephone:

6.1.2.1- Local Exchange Carriers (LECs) also called telcos نظام

ةاالتصاالت المحلی

Is network of local connection is called local access and transport area (LATA).changing electrical signal that matches the acoustics of the human voice these telephone are linked to subscriber loop carriers (SLCs) by means of copper wire called twisted pair.

ي ةومحدود ةصغیر ةجغرافی ةاي ضمن رقع ةاالتصاالت المحلی ةوھي نظم االتصاالت او شبك والتار ر االش ى تغی ل عل ار ةالكھربائی ةتعم ى اش وتی ةال بكھ ةص ذه الش ربط ھ ان وت وت االنس بھ ص تش

في التوصیل ةالثنائی ةوتستخدم االسالك النحاسی) بداالت(مقسمات ةبواسط

6.2.1.2- Long-Distance Transmission Media شبكات االتصاالت او النقل البعیدة المدى This transmission facilities are provide at the beginning by inter-exchange carrier (IXC)that provide regional and long-distance services, including the following:

ھذه النظم استخدمت عده تقنیات لنقل االشارة عبر المسافات وكما یلي

Page 70: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 69

6.1.3- Wire Transmission:Wire, cable, and other tangible (touchable) materials used to send and receive communications signals.

6.1.3.1- Twisted pair:Transmission media used by telephone system

and network cabling Specially conditioned copper wire called T1carriers can handle as many as 24 voice calls simultaneously or up to (1.544 Mbps) of computer data.

میكابت 1.544مكالمھ في نفس الوقت اي ما یعادل 24وتستطیع نقل ةالكیبالت النحاسی

من بیانات الكمبیوتر ةبالثانی

Figure(6.1): Twisted-pair wire

6.1.3.2- Coaxial cable: Single copper wire surrounded by at least three layers, often used for cable television wiring. Consists of a wire Single copper wire surrounded by at least three layers. Often usedfor cable television wiring.

Figure(6.2): Coaxial cable

Twisted-pair cable Twisted-pair wire

Woven or braided metal Copper wire

Plastic outer coating

Insulating material

Page 71: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 70

6.1.3.3- Fiber-optic cable: A type of cable that transmits databy means of pulses of light. Contains core of dozens or hundreds of thin strands of glass or plastic. Uses light to transmit signals. T3 carriers can handle 672 voice calls or (43 Mbps) of computer data.

ةمیكابت في الثانی 43او مایعادل ةمكالم 672وتستطیع نقل ةكیبالت االلیاف الزجاجی

Figure (6.3): Fiber-optic cables

Table (6.1): Types of Cable and LAN

Page 72: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 71

6.1.4- Wireless Transmission:Send communications signals through air or

space. Used when inconvenient, impractical, or impossible toinstall cables

6.2.Infrared: Wireless transmission media that sends signals using infrared

light waves, Requires line-of-sight transmission. Many computers and devices have an IrDA port that enables transfer of data using infrared light rays.

6.3.Microwave station:

• High-frequency radio waves called microwaves handled much of the long-distance telephone services. It used relay stations for every 30 miles because microwaves must travel in a straight line.

• Earth-based reflective dish that contains antenna, transceivers, and other equipment necessary for microwave communications

• Uses line-of-sight transmission, Must transmit in straight line with no obstructions between microwave antennas

ةالتردد تنقل االشاره والمكالمات التلفونی ةعالی ةمصادر االتصاالت الماكروویف وھي موجات رادیوی

میل الن الموجات المكروویف تتطلب االنتقال بخطوط 30كل ة،وتزود بمحطات تقویةلمسافات طویل.ةمستقیم

Figure (6.4): Microwave station

Page 73: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 72

• Communications satellite: Satellites are position in geosynchronous orbits. It uses a multiplexing technology that sends more than one call on a single line.Space station that receives microwave signals from an earth-based station, amplifies the signals, and then broadcasts the signals back over a wide area to any number of earth-based stations.

حیث یتم ارسال ةوتدور ھذه االقمار حول االرض في مدارات محدد ةاالتصال عبر االقماراالصطناعی

على الخط الواحد ةاكثر من مكالم

Figure(6.5): Satellite

Table (6.2): Types Wireless transmission

Page 74: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 73

Because telephone services are offered by thousand of companies, standard are needed to ensure that services. The telecommunication standards are governed by the International Telecommunication Union (ITU) based in Geneva-Switzerland, a division of United Nations.

لقد استخدمت تقنیات اخرى غیر التماثلیة ولكون خدمات االتصاالت اصبحت تقدم من االف الشركات عبر العالم ،فأنھ من الضروري ایجاد مواصفة قیاسیة تعتمدھا الشركات المصنعة لخدمات االتصاالت

- ه المواصفة اقرت من قبل االتحاد الدولي لالتصاالت التابع لمنظمة االمم المتحدة ومقره في جینیف،وھذ.سویسرا

As we learned most phones are analog devices tied to local loop’s twisted-pair wiring, but there are other way to access the system.

اجھزة االتصاالت تعتمد التقنیة التماثلیة لكن ھنالك تقنیات اخرى استخدمت لھذا كما نعلم فأن معضم الغرض كما في ادناه

1- private Branch Exchange (PBX) البداالت الخاصة والتي تعتمد الشفرات في عملھا 2- Cellular Telephones الھاتف الخلوي 3- Leased Lines الخطوط المستأجره

6.4- MODEMS: مالمود

• Communications device that converts computer's digital signals to analog signals and analog signals to digital signals

• ISDN and DSL use digital modem with a digital telephone line خطوط الھاتف لیتمكن نقلھا عبر ةتماثلی ةالى اشار ةھي االجھزه التي تحول اشاره ارقمی

Figure (6.6): Modem

Page 75: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 74

Modem: mo + dem

Modulate To convert a digital signal into an analog signal

Demodulate To convert an analog signal into a digital signal

How Modems work: یعمل المودم فكی Using a process called modulation; a modem transforms the computer’s digital signals into analog tones that can be conveyed through the telephone system. On the receiving end the process used is demodulation, in which the other modem transforms this signal from analog back to digital (modulation and demodulation).

تخدام عملی مھا ةباس ن(اس ارات تماثلی) مودلیش ى اش ل ال وتر المرس ارات الكمبی ل اش تم تحوی ةیل االشار) الھاتف(تتالئم مع نظم االتصاالت تم تحوی م ی ل ،ومن ث ب ةالتماثلی ةاو الناق ى الحاس عل

ل ). دیمودلیشن( اسمھا ةتظھر على الحاسب المستلم بعملی ةالمستلم الى اشاره رقمی ات التحوی عملی . المودم ةمن رقمي والى تماثلي وبالعكس تتم بواسط

6.4.1- Types of modems: المودم عانوا

Page 76: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 75

1- Internal modem: Is design to fit in one of computers expansion slots, it

gets its power from the computer’s expansion bus. ار و عب داخلي وھ ودم ال عی ةالم ي الفتحات التوس ى الكارت االم ف ت عل ي یثب ارت الكترون ةعن ك

بالكمبیوتر ةویستمد قوتھ من قوة الباصات الخاص2- External modem : Has its own case and power supply, which is more

expensive لى الكمبیوترعن طریق البورت المودم الخارجي ویكون جھاز الكتروني منفصل ویربط ا

6.4.2- Asynchronous communication: شبكھ االتصال الالمتزامن او الالمتوافق Is a method of networking used by Modems. In this method, data is sent one bit at a time, in a series (1 after 1). So that the receiving computer can tell where one Byte ends and the next one begins. وھي طریقھ ربط الشبكات التي یستخدمھا المودم حیث یتم فیھا ارسال بت واحد في الوقت الواحد ومن

ةالمستلم ةثم یرسل البت التالي وھكذا وبذلك یتم جمع بایت كامل على الحاسب

6.4.3- Modulation Protocols: المودم تبروتوكوال Are standards, set by international standards organizations.

الموضوعة والمعتمدة من قبل المنظمھ العالمیھ التصاالت وكما یلي ةوھي المواصفات القیاسی 1- V.90: enables modems to communicate at a maximum rate of 56Kbps 2- V.34: enables a rate of 28800 bps

6.4.4- Fax: الفاكس Enables you to send an image of a document over the telephone lines to any one who has an f ax machine. The sending fax makes a digital image of the document, using a built-in modem, the sending fax convert the image to an analog representation so that it can be transmitted through the analog telephone system. the receiving fax convert the analog signal into digital and then to an image of the document and prints the document.

تم ث ی اتف حی وط الھ ر خط ور عب ائق والص از ارسل الوث و جھ الھا وھ وب ارس ھ المطل ویر الوثیق تصى أشار ةرقمی ةكأشار ول ال اد ةبواسط ةتماثلی ةتح م یع تم ارسالھا ، ث از وی ود داخل الجھ ودم موج م

على الجھاز المستلم وطباعتھا ةرقمی ةتحویلھا الى اشار

Fax protocols govern transmission at 9.6kbps (V.29) & 14.4kbps (V.17)

Page 77: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 76

كیلوبت بالثانیھ 14.4و 9.6الفاكس تؤمن نقل بیانات بحدود بروتوكوالت 6.4.5- Bandwidth: التردد ىمد Is the data transfer capacity of a transmission medium, it’s determined by (Mbps, Gbps). This is used for the digital telephone technologies (ISDN & DSL), sometimes called last mile technologies which use twisted-pair wiring.

د استخدمت . ةاو كیكابت في الثانی ةھي سعھ نقل البیانات في اوساط النقلو یقاس با میكابت في الثانی ولق ةسیھ المزدوجوھذه النظم استخدمت االسالك النحا ةنقل البیانات في نظم االتصاالت الرقمی ةلقیاس سع

.للربط المحلي

6.5- Digital transmission systems: ةاالتصاالت الرقمی منظ

6.5.1- Integrated Services Digital Network (ISDN): د ةوھي احدى موصفات االتصاالت الرقمی ھ ةالمعتم ك ثالث المي التصاالت وھنال ل االتحاد الع من قب

:انواع ھي Basic Rate ISDN (BRI) Design for home and small business user, this service offer one or two 64 Kbps, as well as a 16 Kbps signaling channel, use twisted-pair wiring

ةكیلوبت بالثانی 64وتوفر مقسمین بحجم ةاو البیتی ةصممت للبداالت الصغیر

Primary Rate ISDN (PRI): Design for organization, this service includes 23 channels operation at 64 Kbps. It require T1 carrier (1.544Mbps)

ةكیلوبت بالثانی 64خط بحجم 32صممت للبداالت الكبیره المستخدمھ في المؤسسات وتوفر بحدود

Broadband ISDN (BISDN): A high technology that require fiber-optic cable, the data transfer rate is high with maximum of 622 Mbps.

.ةكیلوبت بالثانی 622اتصاالت حدیثھ تتطلب كیبالت فایبر اوبتك وبحجم نقل ةتقنی

6.5.2- Digital Subscriber Line (DSL) or (ADSL) نظام اتصال رقمي عالمي Is used for metropolitan markets, very fast up to (1.5Mbps), and is linked to (ISDN)

ریع ةتقنی االت س دود ةاتص مي وبح ربط العواص تخدم لل دا تس ھ 1.5ج ت بالثانی میكاب ةویربط الى الشبكات الداخلی

6.5.3- SONET

Page 78: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 77

Requiring fiber-optic cable Synchronous Optical Network, with transfer rate of (52Mbps) some enable (1Gbps) also known as (SDH) Synchronous Digital Hierarchy, used fiber-optic cables

بر اوبتك كیبل وتستخدم الفای ةكیكا بت بالثانی1میكبت الى 52جدا وتؤمن بحدود ةحدیث ةتقنی

Alternatives to digital telephony ةنظم االتصاالت الرقمی بدائل

ھنالك مجموعھ من نظم االتصاالت الرقمیھ البدیلھ مثل Direct Broadcast Satellite (DBS) Cable Modems Electrical Power System

Computers as telephones بكھ ات الش ر امكانی ك عب ون وذل از تلف تحدم كجھ وتر یس ل الكمبی ن جع ون م ن المھندس د تمك لق

ات ھ للمعلوم ت (العالمی ھ ) االنترنی وفیر خدم االت بت ركات االتص ن ش د م ت العدی ث قام حیر االت عب ھ باالتص ات الخاص ج التقنی تخدام ودم ك باس بكھ وذل ذه الش ر ھ اتفي عب ال الھ االتص

الشبكھ العالمیھ

Model B

Computers Networks شبكات الحاسب اآللي

Computer network links two or more computers so that they can exchange

data and share resources, including printers. ي المصادر ات وتتشارك ف ادل البیان ث تتب ع بعض بحی ر م ربط حاسبتین او اكث شبكات الحاسب ت

مثل الطابعات وغیرھا

6.6- Types of computer networks: انواع شبكات الكمبیوتر

6.6.1- Local Area Network (LAN): التخاطب المحلیھ شبكھ - use direct cables or localized wireless radio or infrared signal to link computers

- cover small geographic area

A

Page 79: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 78

6.6.2- Metropolitan Area Network (MAN): بین (شبكھ التخاطب العواصمیھ)مدینتین

- uses high-speed fiber optic lines to connect computers - transfer rate of 155Mbps

6.6.3- Wide Area Network (WAN): )العالمیھ(شبكھ التحاطب الواسعھ

- use long distance transmission media including telecommunication network

- Internet is the best example Network advantages: فوائد الشبكات

1- Reducing hardware cost تقلیل تكالیف المعدات 2- Enabling shared application امكانیھ المشاركھ في التطبیقات 3- Building massive information resources معلومات بناء مصادر ضخمھ لل 4- Connecting people ربط الناس مع بعض

6.7- Switching and Routing Techniques: تقنیات التحویل

The messages travel from one computer to another by means of switching, Network used to basic switching technologies:

6.7.1- Circuit Switching التحویل االلكتروني In circuit switching the network creates a physical, end-to-end circuit between the sending and receiving computers same as voice network. A high-speed electronic switch handles the job of establishing a connection.

6.7.2- Packet switch حویل المقطع او الحزمي الت This technique is different from telephone technique. In packet switching an outgoing message is divided into data units of fix size, called packets. Each packet is numbered and addressed to the destination computer; the sending computer pushes the packets onto the network, where they’re examined by routers المرسل. Routers are computer -based devices that examine each packet they detect. Advantages:

Page 80: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 79

Packets switching is more efficient than circuit switching التحویل المقطعي او الحزمي اكثر كفأه

Less expensive than circuit switching اقل كلفھ من التحویلي Packet switching networks are more reliable یعتمد علیھ في

الشبكات Routers may be able to find alternative pathways for the

data to reach the destination. المرسل یوفر المسالك للبیانات للوصول الى الجھھ االخرى

6.8- Protocols: Are the standards that are fixed, formalized exchanges that specify how two dissimilar networks components can establish communication. 6.8.1-Network protocol layers: مواصفات الشبكات تطبقا Network is so complex; the engineers divided network architecture into separate layers. Each of which has a function that can be isolated and treated separately from other layers.

7 Software 6 5 4 3 2 1 Hardware

6.9 Network H/W: Network interface card (NIC)

Card inserted into expansion slot of personal computer or other device, enabling it to connect to a network. To connect to LAN, computer most be equipped with special hardware, which is (NIC), this card is design to work with LAN cables and protocol.

Application layer Presentation layer

Session layer Transport layer Network layer Data link layer

Physical layer

Page 81: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 80

Figure (6.7): NIC

6.10- Network communications technologies Specific combinations of hardware and software that allow different devices on several types of networks to communicate

• Ethernet:LAN technology that allows personal computers to contend for access to networkBased on bus technology.

• Token ring:LAN technology that controls access to network by requiring network devices to share or pass a special signal, called a token. Device with token can transmit data over network. Only one token exists per network Based on ring topology, although it can use star topology.

• TCP/IP:Short for transmission control protocol/Internet protocol • Transmits data by breaking it up into packets. Commonly used for

Internet transmissions. • WAP: Allows wireless mobile devices to access Internet and its

services. Wireless device contains client software, which connects to Internet service provider's server.

6.11- Network connections: ربط الشبكات 6.11.1- Peer-to-Peer network (P2P): شبكات زوج لزوج

o Small network that shares hardware, data, or information located on any other computer in network o Each computer stores files on its own storage devices o all computers on this network are equal no., there is no server

NIC for desktop computer

Page 82: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 81

o Enables users with same networking software to connect to each other’s hard disks and exchange files directly.

Figure (6.8): peer-to-peer connection

6.11.2- Client-Server networks: المخدم والزبون ھشبك • Network in which one or more computers act as a server and other

computers on the network can request services from server • Clients are the entire computer connected to the file server.

Page 83: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 82

Figure (6.9): Client-server networks

6.11.3- Local Area network (LAN): Network in limited geographical

area such ashome, school computer laboratory, or office building

Figure (6.10): LAN networks

وھي طریقھ ربط شبكات التخاطب المحلیة

6.11.4- Wide area network (WAN): Network that covers large geographic area Internet is world’s largest WAN

client client client

server laser printer

Page 84: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 83

Figure (6.11): WAN networks

6.12- Network Topologies: اسالیب ربط الشبكات

• Configuration, or physical arrangement, of devices in a communications network

• Networks usually use combinations of three topologies 6.12.1- Bus topology: also called daisy chain طریقھ ربط الباص

Consists of a single central cable, to which all computers and other devices connect

Bus is physical cable or backbone Inexpensive and easy to install

communications satellite

Page 85: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 84

Figure (6.12): Bus topology

6.12.2- Star topology طریقھ ربط النجمھ

• All devices connect to a central computer, called the hub • All data transferred from one computer to another passes through

hub

Figure (6.13): Star topology

Host computer

printer

File server

PC

PC

PC

PC

personal computer

personal computer

personal computer

personal computer

personal computer

Page 86: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 85

6.12.3- Ring topology: ربط الحلقھ ھطریق • Cable forms closed ring, or loop, with all computers and devices

arranged along ring • Data travels from device to device around entire ring,

in one direction

Figure (6.14): Ring topology What is Hub: A device that provides a central point for cables in a network

Figure (6.15): Hobs

Page 87: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 86

6.13- LAN protocols: popular lower layer of the LAN protocols

Protocol Name Data Transfer

Rate

Physical Media Topology

Local Talk 230.4 kbps Twisted pair Bus Ethernet(10 base5) & (10 base2)

10Mbps Coaxial cable Bus

Ethernet (10 base T) 10 Mbps Twisted-pair cable

Star

Fast Ethernet (100 base T)

100Mbps Twisted-pair & Fiber-optic

Star

Gigabit Ethernet 100 Mbps (1Gbps)

Fiber-optic Star

IBM Token Ring Network

4-16 Mbps Twisted-pair Star

Table(6.3): LAN protocols 6.12.1- The middle layers include the following: ةالوسطى للبروتوكول والخاص ةالطبق ببرامجیات البروتوكول

1- TCP/IP: These are the core Internet Protocols (transmission control protocol/internet protocol). Does not require a specific type of computer.

2- IPX/SPX: These Protocols were developed by Novell for network that connect personal computers and link them to larger computers that function as file servers.

3- NetBIOS/NetBEUI: Developed by IBM & Microsoft. These protocols compete with IPX/SPX.

4- Apple Talk: Developed by Apple computer, these protocols are widely use on network connecting Macintosh computers.

6.14- WAN Protocols:Like any computer network WANs use protocols. X.25 is the oldest packet switching protocol for WAN, is

optimized for dial-up connections, offer speeds of 9.6 to 64 kbps, it carry point-to-point connection.

SMDS (Switching Multi-megabit Data Service is the new protocols designed for 100 percent digital lines. Enable much faster data transfer rate up to 155 Mbps.

Page 88: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 87

6.14.1- WAN application: تطبیقات شبكھ وان

WAN enable companies to use many of the same application, you’ll use on the Internet, such as (E-mail, conferencing, document exchange, and remote database access). This focuses on the ways to take advantage of a WAN’ superior security.

ل ت مث شبكھ وان تمكنك والعدید من الشركات الستخدام نفس التطبیقات عبر شبكھ االنترنی البرید االلكتروني وقواعد البیانات وغیرھا

o LAN-to-LAN Connections الربط عبر شبكات التخاطب المحلیھ o Transaction Acquisition االستعالم او تبادل المعلومات o Electronic Data Interchange (EDI) تبادل البیانات االلكترونیھ

How WANs Work: كیف تعمل شبكھ وان WANs are like long-distance telephone systems. WANs have two amounts to a local access number, called a point of presence (POP), and long-distance trunk lines, called backbones.

6.14.2- Point of Presence (POP): Is a WAN network connection point that enables customers to access the WAN by means of a local analog telephone call (using modem) or a direct digital hookup that enable a continuous, direct connection. A WAN called Tymnet has over 1,000 local points of presence in the United States. It used the following media:

A 56-kbps leased line ,end-to-end connection between two point ISDN from 56 to 128 kbps (basic Rate ISDN) or 1.5 Mbps

(primary Rate ISDN), using twisted–pair cables. ADSL, provide 1 Mbps access Permanent virtual circuit (PVC), is a new local connection

services, use a type of packet switching known as Frame relay.

6.14.3-Backbones: Is the high-capacity transmission limes that carry WAN traffic, some are regional, connecting towns, other are continental or even transcontinental.

Page 89: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 88

Ch 7 The Internet (World Wide Web)

& E-Commerce 7.1 The Internet is like many other technologies, it provides a wide range of services, some of which are effective and practical for use today, others are still evolving, and still others will fade away from lack of use.Originally developed as a document-management system, the World Wide Web is a menu-based system that is easy to use for personal and business applications.

ة دمات الفعال د من الخ دم العدی ي تق وبیة الت ات الحاس دة من التقنی ت واح د االنترن ة فق ا الیومی ي حیاتن ف .انشأت كنظام الدارة الوثائق والملفات

Before the Internet and the World Wide Web become universally used and accepted for business use, management issues; service and speed issues; and fraud, security, and unauthorized Internet sites must be addressed and solved. 7.2 Hypermedia: Connects data on pages, allowing users to access topics in whatever order they wish. Hypermedia documents are created using Hypertext Markup Language. Hypertext Markup Language is the standard page description language for the Web. The HTML tags let the browser know how to format the text. Users mark up a page by placing HTML tags before and after a word or words. HTML documents can be created using a text editor, such as Notepad. If a person uses a text editor they must type in text as well as the HTML tags to create the HTML document. Word processing programs such Microsoft Word can be used to create and save a file in a HTML format so that it can be viewed on the Web. Using Microsoft Word, create the following table of Web site locations and Web site URLs. Web Sites Web Site URLs Monster www.monster.com Yahoo www.yahoo.com Travelocity www.travelocity.com eBay www.ebay.com

Page 90: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 89

7.3- The common Internet services اھم خدمات شبكة االنترنت

e-mail البرید االلكتروني Web browsing التصفح file transfer نقل الملفات chat المحادثة message board مرفأ الرسائل instant messaging الرسائل الفوریة

7.4- History of the Internet: تأریخ االنترنت

ARPANET: Advanced Research Project Agency ا بكة اتص ات الاول ش ادل المعلوم ي تب ة ف یب االلكترونی تخدم الحواس أت . ت تس د انش وروق توط

ار ل و اختص م ھ ة، االس دفاع االمریكی اریع وزارة ال ن مش روع م ي (كمش وث ف اریع البح ة مش وكال ARPA). البنتاغون

Networking project by Pentagon’s Advanced Research

Projects Agency (ARPA) Became functional September 1969

Goal: To allow scientists at different locations to share

information To function if part of network were disabled

الھدف منھا تمكین العلماء والباحثین من التشارك في المعلومات من مواقع مختلفة How has the Internet Grown?

1969Four host nodes 1984More than 1,000 host nodes TodayMore than 100 million host nodes

Nobodycontrols the Internet; it is public, cooperative, and an independent network. Several organizations set standards.

ال احد یتحكم بشبكة االنترنت كونھا شبكة عامة ومستقلة ولكن ھنالك عدة مؤسسات توفر الخدمات

على الشبكة مثل World Wide Web Consortium (W3C)

Page 91: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 90

• Oversees research, sets standards and guidelines • Tim Berners-Lee, director

Internet2 (I2)

• Internet-related research and development project • Develops and tests advanced Internet technologies

7.5- How the Internet Works رنت یف تعمل االنتك

7.5.1- Access the Internet یتم الدخول الى الشبكة من خالل مجھز خدمة االنترنت مثل

Regional ISP مجھز خدمة انترنت اقلیمي National ISP مجھز خدمة انترنت محلي OSP(Ex. AOL) مجھز خدمت انترنت عالمي Wireless Internet Service Provider مجھز خدمة انترنت السلكي

• Hosts • Routers forward packets to other networks • Internet Protocol Stack (TCP/IP) – Internet Protocol (IP) – Transport Control Protocol (TCP) • Backbones

7.5.2- connect to the Internet Dial-up access Digital subscriber line (DSL) and cable modem Very high-speed connection

7.5.3- Steps to Connect to the Internet

1. Request data from the server on Internet. 2. Modem converts digital to analog signals 3. Data travels through telephone lines to a local ISP. 4. Data passes through routers. 5. Regional ISP uses leased lines to send data to a national ISP. 6. National ISP routes data across the country. 7. National ISP passes data to local ISP. 8. Server sendsdata back to you.

Page 92: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 91

Figure ( 7.1): How internet works

7.5.4- Internet protocol (IP) address: The number that uniquely identifies each computer or device connected to Internet

Step 1 Step 2

Step 3

Step 4

Step 5

Step 6

Step 7

Step 8

Regional ISP

Local ISP

National ISP

National ISP

Internet backbone

IP address

First part identifies network

Last part identifies specific computer

199.95.72.10

Page 93: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 92

7.5.5- Domain name: Is the text version of IP address

7.5.6- The World Wide Web:

A worldwide collection of electronic documents Also called the Web Each document is called a Web page Can contain text, graphics, sound, video, and links to other

Web pages A Web site is a collection of related Web pages

Web browser: Program that allows you to view Web pages Like:

• Netscape • Internet Explorer

establish a connection and start the Web browser

1:Click the Web browser program name 2:If necessary, connect to Internet 3:Connection to the Internet occurs and a home pagedisplays

Domain name

scsite.com

IP address

199.95.72.10

Page 94: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 93

Figure (7.2): establish a connection and start the Web browser hyperlink: Text or graphic that displays a related Web page Also called a link

How can you identify a hyperlink (link) on a Web page?

Mouse pointer changes to a small hand when you point to a link

Click the link to display the associated Web page Link can be a word, phrase, or image

Mouse pointer changes to a small hand

Page 95: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 94

7.5.7- The URL: Unique address for Web page located on Web server. العنوان الموحد لصفحات االنترنت

Hypertext transfer protocolHost Network Name

http://www.nationalgeographic.com/travel/index.html

World Wide WebDomain category

E-mail address: Combination of user name and domain name that identifies user so he or she can receive e-mail

البرید االلكتروني User name or user-ID (A unique combination of characters that identifies you)

[email protected] at Domain name (Identifies the mail server)

FTP:File Transfer ProtocolInternet standard that allows you to upload and download files with other computers on Internet.

اتفاقیة نقل الملفات عبر االنترنت كتحمیل او تنزیل ملفات منوالى الشبكة

Page 96: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 95

search engine: Program used to find Web pages

Pertaining to a specific topic ث ة البح بكة : ماكن ى ش ة عل فحات معین ع او ص اد مواق ث وایج ي البح ص ف امج متخص برن

وھو نوعان . االنترنت Search text

Word or phrase entered in search engine’s text box, Also called a keyword.

Spider

Program used by search engines to find Web pages that contain search text, also called a crawler or bot.

7.6 The six basic types of Web pages االنواع االساسیة لصفحات االنترنت

Advocacyصفحات الدفاع والتأیید مثل صفحات الدفاع عن الحیوانات Business/marketing صفحات االعمال والتسویق News صفحات االخبار Portal البوابات مثل یاھو وكوكل Informationalصفحات معلوماتیة مثل ویكیبیدیا Personal صفحات او مواقع شخصیة

Servicesthat found on a portal الخدمات التي تقدمھا البوبات

Search engine

Page 97: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 96

Local , national, and worldwide news Sports and weather Free personal Web pages Shopping malls and auctions Maps Stock quotes E-mail Chat rooms Reference tools Calendars Instant messaging Newsgroups or message boards

7.7- Electronic Commerce التجارة االلكترونیة

Financial business transaction that occurs over an electronic network such as the Internet

اجراء التبادالت المالیة والتجاریة في المؤسسات عبر شبكة االنترنت The types of e-commerce: 7.7.1- Business to business(B-to-B or B2B):Businesses providing goods

and servicesto other businesses ت بكة االنترن ر ش ات وعب ین المؤسس اري ب ادل التج بكة التب تخدام ش ال باس دات األعم وم وح ث تق حی

إجراء وم ب ا تق االتصاالت وتكنولوجیا المعلومات لتقدیم طلبات الشراء إلى موردیھا وتسلیم الفواتیر، كمة دفع اإللكترونی ات ال ر . عملیة الدفع من خالل وسائل عدة مثل استخدام بواب ر ویعتب كل من أكث ذا الش ھ

ال أنواع التجارة اإللكترونیة شیوعا ویطبق بین مؤسسات األعمال داخل الدولة، أو مع مؤسسات األعم بما في ذلك تبادل الوثائق إلكترونیا .خارج الدولة، حیث یتم إجراء كافة المعامالت التجاریة إلكترونیا

7.7.2- Business to consumer(B-to-C or B2C):Sale of goods to general

public ث ت التبادل التجاري بین المؤسسات والمستھلكین عبر شبكة االنترنت حی ى شبكة اإلنترن توجد عل

ات ام عملی العالمیة مواقع لمراكز تجاریة متعددة یستطیع المستھلك ومؤسسة األعمال عن طریقھا إتم وم وتقوم ھذه المواقع ب. البیع والشراء فیما بینھما إلكترونیا ا تق واع السلع والخدمات، كم ة أن تقدیم كاف

ھذه المواقع باستعراض كافة السلع والخدمات المتاحة وتنفذ إجراءات البیع والشراء، كما یتم استخدام ي ان ف ات االئتم تخدام بطاق ر اس ث یعتب راء، حی ع والش ات البی ام عملی ل إتم ن أج ان م ات االئتم بطاق

واستخدام ع عملیة الدفع أكثر شیوعا ى إیجاد وسائل دف بین المستھلك ومؤسسات األعمال، إضافة إل اة إلكترونیة أخرى ومطبقة بشكل واسع مثل الشیكات اإللكترونیة ودفع النقد عند التسلیم، أو أي طریق

.أخرى یتم االتفاق علیھا من قبل الطرفین أصحاب العالقة

Page 98: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 97

7.7.3- Business to Government (B-to-G or B2G):

تقوم الحكومة بعرض اإلجراءات واللوازم والرسوم حیث لتبادل التجاري بین المؤسسات والحكومة ا ا من خالل ع علیھ ال أن تطل ونماذج المعامالت على شبكة اإلنترنت بحیث تستطیع مؤسسات األعم

ا ب المؤسس ع مكات ل م دون التعام ب ا امالت إلكترونی إجراء المع وم ب ة وأن تق ت الوسائل اإللكترونیمى ا یس ى م ة اآلن بالعمل عل وم الحكوم ة( والدوائر الحكومیة، وتق ة االلكترونی ك ) الحكوم ام تل إلتم

.المعامالت إلكترونیا

7.7.4- Government to Consumer (G-to-C or G2C): المحلیة، ھذا النوع من التجارة اإللكترونیة یتم بین المستھلك واإلدارة :التبادل التجاري بین الحكومة والمستھلك

ة دوائر الحكومی ة ال تھلك بمراجع وم المس ة ألن یق دون الحاج ب ا تم إلكترونی ث ت واتیر حی ع الف ة دف ل عملی مث .الخاصة بذلك

7.7.5- Consumer to consumer(C-to-C or C2C):One consumer sells directly

to another التبادل التجاري بین المستھلكین مع بعضھم البعض عبر شبة االنترنت

التجارة اإللكترونیة ذات المستوى البسیط

لع ك الس ة لتل الن والدعای ى اإلع یشمل ھذا النوع من التجارة اإللكترونیة الترویج للسلع والخدمات، إضافة إلجارة اإللكترونیة ذات المستوى البسیط عملیة التوزیع وتتضمن الت. والخدمات، بما فیھا خدمات قبل وبعد البیع

ن اإللكتروني للسلع والخدمات وخصوصا غیر المادیة منھا، إضافة إلى التحویالت البسیطة لألموال وذلك ع .طریق بوابات الدفع اإللكترونیة

التجارة اإللكترونیة ذات المستوى المتقدم

ذات مستوى یحتاج یركز ھذا النوع على عملیات وإجراءات الدفع التي تتم عبر اإلنترنت، والتي تعتبر عملیاتوى ذا المس ى ھ املین عل دفع . إلى توعیة كبیرة من قبل المتع ات ال ر عملی توى -وتعتب ى المس ت عل واء كان س

عملیات ذات تطور متقدم وبحاجة إلى أخذ الحیطة والحذر عند التعامل على ھذا -المحلي أو الوطني أو الدولي .توىالمس

7.8 E-commerce features: Electronic storefrontالواجھات االلكترونیة Shopping cart عربات التسوق Online auction المزادات المباشرة

Page 99: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 98

References:

Ralph M. Stair, George W. Reynolds,” Principles of Information Systems”, 6th edition, Thomson, ISBN: 981-243-510-7.

Gary B. Shelly, Thomas J. Cashman, Misty E. Vermaat, “Discovering

Computers”, Thomsin, ISBN: 1-4188-5956-7

H.L Capron, J.A Johnson, "Computers- Tools for an Information Age", Eighth Edition, prentice Hall.

Lary Long, Nancy Long, "Computers", Seventh Edition, prentice Hall.

James A. O’BRIEN, “Introduction to Information Syste ms”, Tata

McGraw-Hill, 12th edition, ISBN 0-07-058971-2.

Diane Routhier Graf, Betty L. Schroeder, “ Office Systems And Technology”, Pearson, 5th edition, ISBN: 0-13-114549-5.

Page 100: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 99

Test Bank MCQ: 1. How many Americans have personal computers in their homes as we

begin the 21st century? a. 25% b. 33% c. 50% d. 75% 2. How many Americans use personal computers at work as we begin the

21st century? a. fewer than 25% b. 25% 50ؤ % c. 50% 75ؤ % d. more than 75% 3. Which of the following is NOT part of your text's definition of

computer literacy? a. awareness b. interaction c. knowledge d. programming 4. In terms of computer literacy, "interaction" means a. using word processing software. b. using a simple chat program. c. responding to email. d. all of the above. 5. The three fundamental characteristics of computers are a. speed, storage capability, variety of applications. b. reliability, speed, storage capability. c. cost effectiveness, speed, variety of applications. d. cost effectiveness, reliability, storage capability.

Page 101: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 100

6. The fundamental characteristic of computers most relevant to the service we expect when we make a bank withdrawal, telephone call, or obtain stock quotes is

a. reliability. b. speed. c. storage capability. d. variety of applications. 7. According to your text, the by-products resulting from the three

fundamental characteristics of computers are a. cost reduction, Internet use, and productivity. b. communications, data analysis, and decision making. c. data analysis, Internet use, and productivity. d. cost reduction, decision making, and productivity. 8. Computers help to reduce the costs of goods and services in our

economy due to a. speed and reliability. b. storage capability and productivity. c. decision making and speed. d. productivity and decision making. 9. Which of the following energy-related tasks are NOT done with the use

of computers? a. Recording home and business energy use b. Monitoring power networks c. Locating oil, natural gas, coal and uranium d. All of the above tasks use computers 10. Your mother just bought a new car. Which of the following aspects of

how her car functions are monitored by computers? a. Electrical system functioning b. Temperature levels c. Fluid levels d. All of the above 11. Maria Hernandez owns and operates a strawberry farm and fresh air

cafe. Customers pick their own strawberries and can have them prepared fresh in strawberry shortcake at the cafe. Which of the following computer uses are relevant to Maria?

Page 102: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 101

a. Determining feed combinations b. Gathering information about livestock breeding and performance c. Determining cost per acre d. All of the above 12. TV and movies have featured technology where miniaturized craft and

humans travel through the human body to study body functioning and perform needed "repairs." Robots

a. can travel through the bloodstream today. b. will be able to travel through the bloodstream in the next year or

two. c. will be able to travel through the bloodstream in five to seven years. d. are unlikely to be able to travel through the bloodstream in less than

10 years. 13. Which aspect of "where computers are used" is most relevant to the

availability of telecommuting as an option for workers? a. Robotics b. Connectivity c. Graphics d. Government 14. Your six year old niece wanted a special doll for her birthday. You went

online and ordered one with the same eye, skin, and hair color as your niece. This doll is an example of

a. a product available online only. b. online advertising. c. mass customization. d. all of the above. 15. According to your text, the most important component of a computer

system is a. hardware. b. software. c. people. d. all of the above. 16. The step-by-step instructions that direct a computer to find your school's

website are called a. hardware. b. a program.

Page 103: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 102

c. an input device. d. network tools. 17. Computer controlled factory equipment makes it possible to a. readjust assembly lines quickly b. reduce the number of employees by half c. increase profits by 20% on average d. all of the above 18. The main aspects of data handling required for a computer to function

are a. input, processing, output, and storage. b. input, data analysis, reports, and connectivity. c. processing, connectivity, speed, and a variety of programs. d. connectivity, input, output, and speed. 19. The computer hardware that accepts commands in a form that the

computer can use is called a(n) a. storage device. b. input device. c. output device. d. processor. 20. Each of the members of your history class project team has written a

section of the required paper. Which secondary storage device should be used to provide all this information to the team member who will compile the entire paper?

a. Printer b. E-mail attachment c. Diskette d. All of the above are suitable secondary storage devices 21. Using a computer word processor to do a report for school differs from

using an electric typewriter to prepare your report in that a. you can input the text of your report using something other than a

keyboard. b. you can output your report to your instructor without printing it on

paper. c. you can easily produce another copy for your instructor if you drop

the original in the mud on the way to class.

Page 104: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 103

d. all of the above. 22. In addition to typing, data can be input to a computer by a. speaking. b. pointing. c. looking. d. all of the above. 23. Laser beams are used to read input from a. wand readers. b. flatbed scanners. c. optical mice. d. all of the above. 24. Standard student services offered on computer by colleges include

registration and a. applications for financial aid. b. unlimited access to music downloads. c. class attendance via webcam. d. none of the above. 25. The most widely used input device is a. a mouse. b. a keyboard. c. a scanner. d. speech-recognition. 26. One of your classmates was injured in an accident and broke both

wrists. Which input device will he need to use in the computer lab until he has recovered?

a. Mouse b. Keyboard c. Scanner d. Speech-recognition 27. Which of the following is NOT true of computer books? a. They allow you to electronically "dog-ear" pages b. They allow you to add your own notes c. They allow you to look up unfamiliar terms in a dictionary d. They are as inexpensive as conventional paper books

Page 105: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 104

28. The processor is also known as a. RAM. b. the CPU. c. secondary storage. d. an input device. 29. CPU stands for a. Code Protection Unit. b. Critical Path Unit. c. Central Processing Unit. d. None of the above. 30. The portion of the computer that actually transforms data into

information is called a. the CPU. b. memory. c. a diskette. d. all of the above. 31. Information is data that is a. organized, meaningful, and useful. b. cost-effective, organized, and meaningful. c. useful, cost-effective, and accurate. d. factual, logical, and verifiable. 32. Computer memory is also known as a. a CPU. b. primary storage. c. secondary storage. d. a hard disk. 33. Which of the following statements about computer memory holding

data is true? a. after it is input, but before it is processed. b. after is has been processed, but before it has been released to the

output device. c. both a and b are correct. d. none of the above.

Page 106: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 105

34. After playing a computer game for over two hours, you have finally

started working on your African Culture term paper and your Business Statistics spreadsheet. Your mother wants to check her email. She has announced that if you do not let her use the computer in 10 minutes, she will unplug it when you least expect it. You work for another 9 minutes and turn the mouse over to her, because if she unplugs the computer

a. you will lose any data not saved to a secondary storage device. b. you will lose your entire term paper. c. you will lose your entire spreadsheet. d. all of the above. 35. Which of the following statements about the contents of computer

memory is true? a. Computer memory holds data and programs b. Computer memory holds programs only c. Computer memory holds data only d. None of the above 36. What is the computer's "whole reason for being"? a. Input b. Output c. Gaming and e-mail d. Processing 37. Raw data that has been processed by the computer is known as a. numeric data. b. textual data. c. alphanumeric data. d. information. 38. Secondary storage is required because a. primary storage holds data and programs only temporarily. b. primary storage is not sufficiently fast. c. laptops cannot have primary storage. d. all of the above. 39. The most common form of secondary storage for personal computers

are a. magnetic tape. b. optical disk drives.

Page 107: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 106

c. magnetic disks. d. RAM. 40. Which of the following statements is true of optical disk drives? a. CD-ROMs are optical disk drives b. DVD-ROMs are optical disk drives c. Diskettes are optical disk drives d. Both CD-ROMs and DVD-ROMs are optical disk drives 41. The hardware devices that are attached to the computer are called a. central processing units. b. primary storage devices. c. peripheral equipment. d. backup devices. 42. Which of the following is NOT usually a piece of peripheral equipment? a. Mouse b. Keyboard c. Monitor d. CPU 43. The four elements of a computer system are a. networks, printers, CPU, and software. b. input, processing, output, and storage. c. networks, RAM, output, and secondary storage. d. input, processing, output, and peripherals. 44. The term LAN stands for a. Logical Access Network. b. Local Audio Network. c. Limited Access Network. d. Local Area Network. 45. In this type of network, personal computers are connected within an

office. a. WAN b. LAN c. Internet d. Web site 46. The devices that enable personal computers to be interconnected via

Page 108: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 107

phone lines are called a. modems. b. LANs. c. Internets. d. all of the above. 47. Two employees from a local computer store have played computer

games together for years. They connected their computers together directly by running appropriate hardware from one house to the other, over the fence that separates the houses. The system they are using is called

a. the Internet. b. a LAN. c. broadband. d. a web site. 48. The largest and most far-flung network system is called a. the Matrix. b. the Internet. c. the Intranet. d. ARPAnet. 49. Who owns the Internet? a. United States Government b. Microsoft c. The World Trade Organization d. No one owns the Internet 50. Which of the following statements about who is allowed to connect to

the Internet is true? a. Only those authorized by the U.S. government may connect b. Only those with a URL ending in .com may connect c. Schools, colleges and government organizations may connect, but

not individuals d. Anyone with the capacity to hook up may connect to the Internet 51. What does TCP/IP stand for? a. Transmission Control Protocol/Internet Protocol b. Transport Capture Protocol/Intranet Protocol c. Transmission Control Protocol/Internet Packet d. Telecommunications Connection Protocol/Internet Protocol

Page 109: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 108

52. The term ISP stands for a. Internet Surfing Provider. b. Information Service Provider. c. Internet Service Provider. d. Interactive Systems Producer.

Page 110: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 109

53. Software that allows the use of a mouse to point and click on screen text or pictures, to explore the Internet is called a(n) a. menu. b. toolbar. c. ISP. d. browser. 54. The main page of a web site is also known as the a. front page. b. home page. c. URL. d. hyperlink. 55. Which government agency sponsored the development of an e-mail

capture system, originally named Carnivore, for law enforcement? a. FBI b. CIA c. NSA d. None of the above 56. Users planning to spend substantial time developing graphic images,

performing heavy-duty calculations, or playing action-oriented arcade-style games should consider purchasing this kind of computer.

a. Net computer b. Low-end computer c. Cutting-edge computer d. Mainframe computer 57. A limited piece of hardware with a CPU and minimal memory, offered

with Internet access in mind is called a a. net computer. b. workstation. c. personal computer. d. mainframe computer. 58. Which of the following statements is true when comparing notebook

and desktop computers with the same relative performance and capabilities?

a. Notebook computers are more expensive than desktop computers b. Notebook computers are less expensive than desktop computers c. Notebook computers are about the same price as desktop computers

Page 111: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 110

d. Relative costs depend almost entirely on the brands purchased 59. Which of the following places computers in the correct order, from

smallest to largest? a. Laptop, personal digital assistant, notebook, pocket PC b. Personal digital assistant, pocket PC, notebook, laptop c. Laptop, notebook, pocket PC, personal digital assistant d. Notebook, personal digital assistant, laptop, pocket PC 60. Which of the following is NOT a modification made to a laptop

computer to qualify it as "ruggedized"? a. Sealed keyboard to keep out liquids b. Dust-resistant external connectors c. Plastic exterior d. Disk drives mounted in gel 61. Which of the following is NOT likely to need or use the services of a

mainframe computer? a. Bank b. Insurance company c. Government accounting services d. Local florist shop 62. Large servers are likely to be hosted on a. mainframe computers. b. personal computers. c. workstations. d. laptop computers. 63. For many years, access to supercomputers was mostly restricted to

which of the following? a. State and local governments b. Pharmaceutical research firms c. Internet Service Providers d. Federal government agencies 64. Which of the following statements about being an informed consumer

of the Internet is true? a. The Internet is solely a technical challenge, not a social or ethical

one b. Critical thinking skills are relatively unimportant, given the size of

Page 112: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 111

the Web c. One of the best methods of learning about the Internet is exploring it

yourself d. The Internet is a highly regulated, global information exchange True and False: 1. The Internet is a loosely organized global collection of smaller

networks. a. True b. False 2. The explosive growth of personal computers and networks has spelled

the demise of "big iron" computers. a. True b. False 3. The stated purpose of the Carnivore system was to collect e-mail and

Web page views to combat terrorism and drug dealers. a. True b. False 4. Most errors resulting from computer use are the result of hardware

problems. a. True b. False 5. Law Enforcement agencies use computer modeling to determine the

probability that a suspect committed a crime, such as rape. a. True b. False 6. Your textbook was tracked from the time it was printed until you

purchased it by use of a bar code on the back cover. a. True b. False 7. Research on the relative effectiveness of physicians and computers in

correctly diagnosing heart attacks has demonstrated that this is one of the areas where humans are better than computers.

a. True b. False

Page 113: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 112

8. Members of the animal rights group, PETA, are likely to be great fans

of increased computer use in animal research because computer models increasingly substitute for animals in research.

a. True b. False 9. Input is processed into output by both software and hardware. a. True b. False 10. A classic scene in the fourth Star Trek movie shows Scotty (the Chief

Engineer) attempting to input data by speaking commands to the computer. This scene would still be appropriate today, since voice input is not possible.

a. True b. False 11. Computer memory holds data even after the computer's power is shut

off. a. True b. False 12. In order to be computer literate, you must be able to program in at least

one language. a. True b. False 13. Computers help to reduce the costs of goods and services in our

economy by helping hold down the costs of labor, energy, and paperwork.

a. True b. False 14. Will always does better in classes where he can "learn by doing." Using

a word processor and spreadsheet in a computer lab should help him do better in this class.

a. True b. False 15. Computer training using simulations, such as flight simulators, is

Page 114: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 113

typically regarded by students as fun, but such training costs more than typical flight training.

a. True b. False 16. In modern computers, the processor is often located in a peripheral

device. a. True b. False 17. The major problem with computer books is that they are still quite

heavy, weighing over 5 pounds. a. True b. False 18. You can produce output from a computer using film, voice, and music. a. True b. False 19. Secondary storage devices such as DVD-ROMs and ZIP drives are

increasingly used for backup purposes, or data insurance due to the high cost of magnetic tape.

a. True b. False 20. A modem is a system that uses communications equipment to connect

computers and their resources, such as printers. a. True b. False 21. The comprehensive index that tells you where information is available

on the Internet is maintained by the U.S. Government. a. True b. False 22. The home page of a website is the page that was developed first. a. True b. False 23. Net computers are becoming increasingly popular, because they have

hard drives and cost a lot less than typical "cheap" personal computers.

Page 115: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 114

a. True b. False 24. PDA, Pocket PC, and pen-based computers are all terms for the same

hardware. a. True b. False 25. The Internet, the World Wide Web, and the Web are all terms for the

same network system. a. True b. False Fill in the blank: 1. ___________ use computer-generated graphics to provide a visual

walk-through to prospective clients. 2. Input, processing, output and storage are the four main aspects of

____________. 3. The processor executes computer instructions and is also known as the

_______. 4. The traditional cornerstones of an economy are land, labor, and capital.

As we have moved beyond the Industrial Age, we have added a fourth economic cornerstone, ______.

5. The ___________ aspect of computer literary addresses the importance,

versatility, and pervasiveness of computers in society. 6. The three aspects of computer literacy, as discussed by your text, are

___________, ___________, and ___________. 7. The three fundamental characteristics of computers are __________,

_____________, and ____________. 8. The three by-products of the fundamental characteristics of computers

are _____________, ________________, and __________________. 9. The three ways computers are used in cars are to _____________,

Page 116: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 115

_____________, and _______________. 10. Meter readers use ________________ to record how much energy is

used each month in homes and businesses. 11. Computers are increasingly used for agricultural purposes. Cattle

ranchers use computers for ____________. 12. An unpleasant or dangerous job that robots have taken over from

humans is _________. 13. The three main components of a computer system are _____________,

___________, and ________________. 14. A computer is a machine that can be programmed to accept

_______________. 15. Primary storage, which is also called _________, holds data and

programs only temporarily. 16. A(n) _______ is an input device that consists of a keyboard, screen

display and some method of connection to a computer. 17. An output device that varies its form of display to include text, numbers,

art, photographs and even video is called a(n) ______. 18. Input, output and secondary storage devices are examples of

___________. 19. The computers in an office are networked together, allowing employees

to communicate with one another using a(n) __________. 20. The Internet subset consisting of text, images, and sounds linked

together is called the _________. 21. The main page of a Web site is called the ______. 22. The WebTV is the best known ______, which has a CPU and minimal

memory, and is intended to provide easy Internet access. 23. A(n) ______ is a handheld computer that can help you keep track of

Page 117: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 116

appointments and other business information. 24. ______ are large computers that are capable of processing billions of

instructions per second. 25. Members of the military, construction engineers, and oil rig managers

are among those who use ____ computers that have titanium alloy cases, sealed keyboards and dust-resistant external connections.

26. ____ were initially used only by the federal government, and can

process trillions of instructions per second. 27. _____ are the people who buy and use computer software. Short Questions 1. Distinguish between data and information in the context of computers.

Give an example of each. 2. Computers always contain the components of input, processing, output

and secondary storage. Give an example of input, output, processing and storage when the computer is used for word processing.

3. Name, and briefly describe, three pieces of personal computer

peripheral equipment. 4. Consider a supercomputer and a personal digital assistant (PDA). Name

at least three important dimensions on which these two families of computers differ.

5. Name, and briefly describe, one application or problem that you believe

requires a supercomputer for a solution. Why do you think that this problem is not appropriate for a less capable computer?

Page 118: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 117

Questions Answers: MCQ Answers 1. c 2. c 3. d 4. d 5. b 6. b 7. d 8. d 9. d 10. d 11. c 12. a 13. b 14. c 15. c 16. b 17. a 18. a 19. b 20. c 21. d 22. d 23. a 24. a 25. b 26. d 27. d 28. b 29. c 30. a 31. a 32. b

33. c 34. a 35. a 36. b 37. d 38. d 39. c 40. d 41. c 42. d 43. b 44. d 45. b 46. a 47. b 48. b 49. d 50. d 51. a 52. c 53. d 54. b 55. a 56. c 57. a 58. a 59. b 60. c 61. d 62. a 63. d 64. c

True and False Answers 1. True 2. False

Page 119: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 118

3. True 4. False 5. True 6. True 7. False 8. True 9. False 10. False 11. False 12. False 13. True 14. True

15. False 16. False 17. False 18. True 19. False 20. False 21. False 22. False 23. False 24. False 25. False

Fill in the blank Answers 1. Architects 2. data handling 3. central processing unit ؤ

CPU 4. information 5. awareness 6. awareness, knowledge,

interaction 7. speed, reliability, storage

capability 8. productivity, cost reduction,

decision making 9. monitor fluid levels,

temperatures, electrical systems

10. handheld computers (Ch. 1, WHERE COMPUTERS ARE USED)

11. gathering information about livestock breeding and performance

12. dealing with bombs or suspected bombs, dangerous/exhausting factory work

13. hardware, software, people 14. data or input

15. memory 16. terminal 17. screen or monitor 18. peripheral equipment 19. LAN or local area network 20. World Wide Web, Web 21. homepage 22. consumer net computer or

net box 23. personal digital assistant or

PDA 24. Mainframes 25. ruggedized 26. Supercomputers 27. End-users or Users

Page 120: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 119

Short Question Answers 1. A good answer here should indicate that data is the raw material which must be

processed into information. The answer must point out that information is data that has become organized and meaningful. Data is less interesting than information because it is not as useful. Appropriate examples include, but are not limited to: Data is a student score, but a class average is information. Knowing that the mouse is at x = 500, y = 200 is data, but knowing that the mouse is on the icon for Microsoft Word is information. (Ch. 1, YOUR PERSONAL COMPUTER HARDWARE, The Processor and Memory: Data Manipulation)

2. Inputs for word processing include: the keyboard, the mouse, wand reader, bar code

reader, flatbed scanner, or sheet-fed scanner, speech-recognition software, devices for access by the physically challenged (e.g. special switches), or Processing includes: Displaying typed letters on the monitor, Spell-checking, Indenting, formatting, and so forth Output could be one or more of: Text on the monitor, Text on the printer, Voice output Sending the document via e-mail Storage would be used for: Saving the document, Storing the text as it is typed, Making a backup copy A diskette used to transport the text from one computer to another (Ch. 1, YOUR PERSONAL COMPUTER HARDWARE)

3. Among the many possible correct answers: Printers, modems, keyboards, mice, scanners, readers, speakers, sensors. Answers mentioning components almost always included in the main computer

Page 121: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 120

housing of a personal computer, such as RAM memory, expansion cards, the CPU, a power supply and so forth should be scored as incorrect. Many secondary storage devices, e.g., magnetic tape drives, Zip disks, and external CD-ROM and DVD-ROM drives could be classified as peripherals and scored as correct here, if it is clear that they are external to the main computer housing. (Ch. 1, YOUR PERSONAL COMPUTER HARDWARE, The Complete Hardware System)

4. Possible correct answers:

Different price (supercomputers are much more expensive) Different performance (trillions of operations per second versus millions) Different user communities (scientific and government versus businessmen, students) Different physical sizes (only the PDA is likely to be portable) Different ages (supercomputers have been around longer than PDAs) Different numbers of users (supercomputers are probably multi-user, PDA's single user) Other possibilities may be scored as correct if they contain adequate explanation of the proposed dimension(s). Answers that identify relevant dimensions but have the endpoints reversed, e.g. PDA physically larger than supercomputer, should not receive full credit. (Ch. 1, CLASSIFICATION OF COMPUTERS, sections Smaller Still: Handheld Computers and Supercomputers)

5. Examples cited in the text include: Stock analysis, automobile design, special effects for movies, sophisticated artwork, worldwide weather forecasting and weapons research. Other possibilities include, but are not limited to: Calculating the orbits of stars and planets, many scientific simulations, searching for prime numbers, code breaking and human genome research. Acceptable answers to the "Why" portion of the question need not be lengthy, but should indicate an awareness that the problem is appropriate for supercomputers because it requires a large number of calculations, very complex calculations, very large amounts of data, or contains a large amount of "trial and error." For instance, special effects for movies may be created on supercomputers because of the required very high-resolution images, and large numbers of frames mean that many calculations are required. Poor or partial-credit answers either select problems that are much too simple and

Page 122: Fundamentals of Information Technology€¦ · Fundamentals of Information Technology Hand Book English / Arabic Dr. Eng. Salah Alkhafaji, PhD 11 1.2-Computer architecture:ﺐﺳﺎﺤﻟا

Fundamentals of Information Technology Hand Book English / Arabic

Dr. Eng. Salah Alkhafaji, PhD 121

which even laypersons should realize are currently solved on smaller computers, or which name a problem but do not elaborate on the rationale for requiring the use of a supercomputer. Keeping the books for a small business is an example of a clearly wrong answer. (Ch. 1, CLASSIFICATION OF COMPUTERS, Supercomputers)

View publication statsView publication stats