Computer basics for beginners free ebook


















These points are also nicely illustrated and written with lots of information that can be used to protect the family network. This book breaks training down into easy-to-understand modules. It starts from the very beginning of hacking, so you can get great results — even as a beginner!

So What are you waiting for? Protect and arm yourself in this digital world with these easy to follow steps. E-Book Description. Computer Hacking for Beginners 1st Edition PDF Free Download As we digress further into the digital age of computers, the skill of hacking and the knowledge of hack protection from unexpected enemies and government has become an essential skill every citizen needs to learn. Maria Adelle. A short summary of this paper. Download Download PDF.

Translate PDF. Ebook Introduction to Computer Science: A Textbook for Beginners in Informatics By Gilbert Brands This textbook is addressed to students of computer science in their first terms, and covers the content of a general introductory lecture in computer science held at a German University. The basic stuff for most special courses - circuit technology, programming, operating system, networking, security, and more - is presented along with some further background information not necessarily covered by other lectures, but helping to understand relationships and reasons why certain techniques are done in just that way.

The learning process is supported by numerous exercises. Though the primary language of this site is German, feel free to post your comments in English. Paolo Coletti Basic Computer course book 2. Microsoft Windows Microsoft Windows is currently the market leader operating system, it is the usual interface which appears when the user turns on a personal computer with Windows operating system. Versions and editions Microsoft released Windows XP in and for many years it has been the main Microsoft operative system.

Windows Vista was released in and it was not a market success. Starter Microsoft released Windows 7 in , which is the currently more widespread Microsoft operative system. It is available in only three editions. When the computer is switched on, it asks the user which operating system he would like to use and, after a short time, it starts with the default operating system.

In case the user wants to use a different operating systems, he obviously must restart the computer. When this happens, it is usually caused by the program that is used and therefore the first thing to do is to try to close the current program.

If this does not improve the situation, the only other solution left is to turn off the computer. Paolo Coletti 1. In any case all the current unsaved work will be lost; in the last two cases the operating system can sometimes be damaged but very often it will repair by itself the next time the computer is turned on.

Therefore it is always a very good idea to save very often the current work, especially when it is important, urgent, or difficult to redo. Keyboards and languages Before starting this section it is necessary to take a close look at your keyboard.

Another operation which can be useful in a multilanguage environment is changing the keyboard. While this can be done from the Language menu of the Control Panel, it is much easier to adjust it directly from the right side of the application bar, simply clicking on keyboard icon and selecting the appropriate one. File system Before starting this section it is necessary to do the following operations: 1. In this way extensions see section 2.

Page 8 of 33 Edition 8. Paolo Coletti 2. Files and directories Software is stored on storage devices in a special container called file. The operating system uses a lot of files for itself and for its data, a program usually uses one file for itself and other files for its data, and the user uses some files for his data.

A file is represented by a small picture called icon. Another special object is the directory or folder, which is basically a container for files and other directories and is represented with an icon depicting a yellow closed or open folder. Double clicking on a directory opens a new window which presents the directory content. Each storage device is a big directory, accessible from My Computer window, which contains directories and files.

Each file and directory can be univocally identified by its absolute path or address. While, the HPeDiag. Note that, for Windows operating system, capital or small caps letters in paths are perfectly equal.

A special and tricky object is the link or shortcut. Although its icon looks like a file icon, the small curved arrow on the left corner clearly indicates that this object is a link. A link is simply an address to a file or directory, it is not a real file or directory. When the user clicks on the link, the computer behaves exactly as if the user is clicking on the real file or directory if Windows can find the real one, which is not the case if in the meantime somebody deleted or moved it.

Therefore it is a good idea for novice users to avoid using links at all. If no program is associated with that file type, Windows asks the user which program should open the file. Copying a file means reproducing it to another location or to the same location with a different name. Copying a directory means reproducing it to another location, or to the same location with a different name, together with its entire tree of subdirectories and files. If a plus symbol does not appear, press CTRL key to have it appear while dragging.

Point the mouse to the destination and click the right mouse button. Moving a file means moving it to another location losing the file in the original place. Moving a directory means moving it to another location together with its entire tree of subdirectories and files.

A link is created in the same directory. Deleting a file means often putting it into the trash can where it can be recuperated unless the trash can is emptied. Deleting a directory means putting it to the trash can together with its entire tree of subdirectories and files.

Pay special attention, since not always the trash can works as user expects and sometimes files are deleted without passing through the trash can. To rename a file or directory, simply select the object, click on the name and retype it. Usually Windows accepts most names, but novice users should stick with only letters, numbers and spaces, since other characters may be forbidden.

After the creation, rename it. Sometimes files occupy a lot of space and need to be reduced to save disk space or to be sent by email; other times files must be put in a package to remain together or to be sent as a single file via email. To compress a set of files and directories: 1. When double clicking on a compressed file, if the compression program is properly installed, it will open in a window as if it were a directory.

Files can be copied from this window to a real directory simply dragging them to the directory. File types Windows identifies a file type by its extension, which is everything after the last dot in the filename. Usually it is a 3 or 4 character acronym. Using the file extension, Windows knows the file type and decides which program will open that file.

If the file extension does not show up, follow the instructions at section 2. The most important file types are: Edition 8. File permissions For each file Windows 7 operative system uses a permission. The security dialog box shows the list of users or groups of users who may access this object, while not listed users may not access it. The owner of the file usually has full control on it and may change permissions or add new authorized groups or users. A special group is the Administrators group containing the users involved in technical administration of computers which has full control on every object.

These are called network folders. Some of them are: Page 12 of 33 Edition 8. Roaming user profile at UNIBZ Whenever the user logs in on a new computer, usually he should find a complete new profile Desktop, icons, Documents, configuration , which is obviously very annoying. This mechanism, called roaming user profile, works fine only if the user is not using too much disk space which is usually MB, but it is a good idea to stay below MB. If the user is over quota, the system sends a warning via email to the user and, if the user remains over quota, this mechanism does not work anymore.

Moreover, if the user still remains over quota, he will be forbidden from saving any file on the computer he is currently using. Therefore it is a good idea to always work on a USB pen drive which is then copied on another personal computer and to periodically check the disk space looking at the proprieties of this directory. If a warning email has been received or, even worse, roaming user profile does not work anymore, files need to be deleted not from the current computer since the mechanism is not working anymore but directly going through this directory.

Paolo Coletti Basic Computer course book 3. Without entering into technical details, this section will explore the situations in which a novice user can find himself in troubles and how he can try to survive dialoguing with network administrators in their own strange technical language. Technical aspects A computer network is a set of devices which communicate and share resources. Server and client A computer network interaction is based on the client server architecture.

When considering a single interaction, one computer is the server and the other one is the client. The server is the computer which is offering its resource, usually programmed to wait until someone asks for its resource. The client is the computer which uses the resource, which sends the request to a waiting server.

The same computer may be the client for a service and the server for another service. For example, a library computer may have a CD inside its reader shared to the network server for the CD and may be at the same time used by a user to print his own documents client for the printer. Inside the LAN every computer is well identified and usually every user is known.

It is considered a trusted area. It is considered a dangerous area. VPN is typically required to identify portable computers connected via wireless connection.

Transfer speed The network connecting components are the cables, which determine the speed of the LAN. Cables have a speed measure in bps bits per second which indicates how many bits can flow through the cable in one second. Page 14 of 33 Edition 8. To find out how much time does it take to transfer a file with a size expressed in bytes, divide the connection speed in bps by 8 to find out the byte rate per second and then divide the file size by the speed to find out the number of seconds it takes for the file transfer.

For example, to transfer a MB file through an Fast Ethernet connection, find out the speed of Communication Inside a computer network many communication programs are installed on Intranet computers to connect to the Internet or even to internal computers. Web browser A web browser is a client program to navigate the WWW and retrieve web pages.

Mail reader A mail reader is a client program to send and retrieve emails. The market leader is Microsoft Outlook, a commercial proprietary software. It has many competitors, the most famous being the open source Mozilla Thunderbird and the free Windows Live Mail. It can be useful for various reasons: it does not require the installation of a mail reader program; old received emails are always available on the website and can thus be accessed from home, office and while traveling, even without a personal laptop; the mailserver takes care of emails backup.

But on the other hand it requires a continuous fast connection even to write a single long email, which can be costly and, in some situations, impossible and usually the email space is limited. The most famous website interfaces are the Microsoft Outlook Web App, where the web interface looks exactly like Microsoft Outlook, and the Webmail interface, used and personalized by most Internet providers.

Posta Elettronica Certificata PEC When sending an email, the sender has no proof that it has been sent, for example to be used in a court of justice, and no guarantee that the email has been dispatched.



0コメント

  • 1000 / 1000