A lot of us hear the word ping used a lot in gaming and when we are having network issues, but what exactly is ping?
ping is a command line tool that is used to measure the round-trip time for messages sent from one computer to another. This is often used to test if there is a connection between your computer and a website.
Ping the specified host until stopped. To see statistics and continue – type Control-Break; To stop – type Control-C.
Resolve addresses to hostnames.
Number of echo requests to send.
Send buffer size.
Set Don’t Fragment flag in packet (IPv4-only).
Time to Live.
Record route for count hops (IPv4-only)
Timestamp for count hops (IPv4-only).
Loose source route along host-list (IPv4-only).
Strict source route along host-list (IPv4-only).
Timeout in milliseconds to wait for each reply.
Source address to use.
Routing compartment identifier.
Ping a Hyper-V Network Virtualization provider address.
Force using IPv4.
Force using IPv6.
Adaptive ping. Interpacket interval adapts to round-trip time, so that effectively not more than one (or more, if preload is set) unanswered probes present in the network. Minimal interval is 200msec for not super-user. On networks with low rtt this mode is essentially equivalent to flood mode.
Allow pinging a broadcast address.
Do not allow ping to change source address of probes. The address is bound to one selected when ping starts.
Stop after sending count ECHO_REQUEST packets. With deadline option, ping waits for count ECHO_REPLY packets, until the timeout expires.
Set the SO_DEBUG option on the socket being used. Essentially, this socket option is not used by Linux kernel.
-F flow label
Allocate and set 20 bit flow label on echo request packets. (Only ping6). If value is zero, kernel allocates random flow label.
Flood ping. For every ECHO_REQUEST sent a period ”.” is printed, while for ever ECHO_REPLY received a backspace is printed. This provides a rapid display of how many packets are being dropped. If interval is not given, it sets interval to zero and outputs packets as fast as they come back or one hundred times per second, whichever is more. Only the super-user may use this option with zero interval.
Wait interval seconds between sending each packet. The default is to wait for one second between each packet normally, or not to wait in flood mode. Only super-user may set interval to values less 0.2 seconds.
-I interface address
Set source address to specified interface address. Argument may be numeric IP address or name of device. When pinging IPv6 link-local address this option is required.
If preload is specified, ping sends that many packets not waiting for reply. Only the super-user may select preload more than 3.
Suppress loopback of multicast packets. This flag only applies if the ping destination is a multicast address.
Numeric output only. No attempt will be made to lookup symbolic names for host addresses.
Set Quality of Service -related bits in ICMP datagrams. tos can be either decimal or hex number. Traditionally (RFC1349), these have been interpreted as: 0 for reserved (currently being redefined as congestion control), 1-4 for Type of Service and 5-7 for Precedence. Possible settings for Type of Service are: minimal cost: 0x02, reliability: 0x04, throughput: 0x08, low delay: 0x10. Multiple TOS bits should not be set simultaneously. Possible settings for special Precedence range from priority (0x20) to net control (0xe0). You must be root (CAP_NET_ADMIN capability) to use Critical or higher precedence value. You cannot set bit 0x01 (reserved) unless ECN has been enabled in the kernel. In RFC2474, these fields has been redefined as 8-bit Differentiated Services (DS), consisting of: bits 0-1 of separate data (ECN will be used, here), and bits 2-7 of Differentiated Services Codepoint (DSCP).
Quiet output. Nothing is displayed except the summary lines at startup time and when finished.
Record route. Includes the RECORD_ROUTE option in the ECHO_REQUEST packet and displays the route buffer on returned packets. Note that the IP header is only large enough for nine such routes. Many hosts ignore or discard this option.
Bypass the normal routing tables and send directly to a host on an attached interface. If the host is not on a directly-attached network, an error is returned. This option can be used to ping a local host through an interface that has no route through it provided the option -I is also used.
Specifies the number of data bytes to be sent. The default is 56, which translates into 64 ICMP data bytes when combined with the 8 bytes of ICMP header data.
Set socket sndbuf. If not specified, it is selected to buffer not more than one packet.
Set the IP Time to Live.
-T timestamp option
Set special IP timestamp options. timestamp option may be either tsonly (only timestamps), tsandaddr (timestamps and addresses) or tsprespec host1 [host2 [host3 [host4]]] (timestamp prespecified hops).
Select Path MTU Discovery strategy. hint may be either do (prohibit fragmentation, even local one), want (do PMTU discovery, fragment locally when packet size is large), or dont (do not set DF flag).
Print full user-to-user latency (the old behaviour). Normally ping prints network round trip time, which can be different f.e. due to DNS failures.
Show version and exit.
Specify a timeout, in seconds, before ping exits regardless of how many packets have been sent or received. In this case ping does not stop after count packet are sent, it waits either for deadline expire or until count probes are answered or for some error notification from network.
Time to wait for a response, in seconds. The option affects only timeout in absense of any responses, otherwise ping waits for two RTTs.
Note: Linux uses ping and ping6 to distinuish between IPv4 and IPv6
If you are having issues connecting to the internet many will try to test the issue by sending a ping request to a known working website. We will use google.com in this example.
If we run the command ping google.com we should get the following output:
Pinging google.com [184.108.40.206] with 32 bytes of data:
Reply from 220.127.116.11: bytes=32 time=22ms TTL=53
Reply from 18.104.22.168: bytes=32 time=26ms TTL=53
Reply from 22.214.171.124: bytes=32 time=23ms TTL=53
Reply from 126.96.36.199: bytes=32 time=68ms TTL=53
Ping statistics for 188.8.131.52:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 68ms, Average = 34ms
If all our packets get replies then we have a good connection. If some of them are lost it could mean that there is some network interference preventing a stable connection. If all of them are lost then we are looking at three different possible issues:
The website is down.
You are not connected to the internet.
You are having DNS problems.
We can test number 3 by typing in the IP Address of the website you wish to ping. If you get no packets then the issue is not likely a DNS issue. If you receive your packets then we may be able to fix the issue by flushing our DNS Resolver Catch with ipconfig /flushdns. To learn more about ipconfig look at our article here.
The majority of what you will be doing online will involve Google and Email to some extent or another. Your email is more than just a way of contact, it symbolizes your online identity. To get the most of the internet you need an email address, just like you need an ID to get the most out of citizenship in most countries. Many of the services that you will be using will be run by Google, this will require an email address. Fortunately Google provides both.
Google is the largest internet search engine and one of the largest advertising agencies online. At first Google was just a website that indexed other websites to make it easier to find others, but now it has its hands in every corner of the internet. Unfortunately this makes it difficult to avoid their almost omnipresent eyes. Fortunately this make things easier to manage.
Google’s main uses will be searching the internet and for email. Google also runs other services such as YouTube and Android’s main development branch. You have been touched by their influence, even if you have never touched a computer before. It is best to be acquainted with them.
Setting up a Google Account
Making a Google account is easy and quick. The first thing you need to do is open up your web browser (Firefox/Chrome/Etc.). In the search box just type up Google.com. At the top right of the screen there should be a blue button that says “Sign in”. This will take you to a page where you can sign into an account or make a new one. Underneath the login prompt asking for an email address is a “Create account” button, click it.
This page asks for some basic information. Your name, the username you wish, a password, birthday, gender, Phone#, and email. Remember that you do not need to use your real name, but what name you use will be an important identifier for many online actions.
You can omit the phone# and email. You will need a phone that can receive text messages or a call to verify your account on the next page. This is a safety measure that cannot be avoided easily. They will not use your phone # for any other purpose unless you allow them. They will send you a verification number. Enter the number and continue on.
Congratulations on your new Google account. Your email will be what was entered as the username with an @gmail.com.
You will be given a short tutorial on what each button does and be sent back to the Google home page. If you look at the top right of the screen, in place of the login button, there is a icon of the first letter used for the name of your account. Near that button is an array of 9 squares set in a 3×3 arrangement, click it. This will bring up a list of Google services that are available. You will want to check your email first. Over time we will explore what these other services do in detail.
Click Gmail. This is Google’s email system. A short promotional slide presentation will play. Afterwords you should get access to your inbox. As you can see the interface is quite simple. On the top of the page you have a search box for your emails and the same options on the right as everywhere else on google. Underneath is your inbox and options for each option such as moving messages between folders and deleting them. On the left sidebar is a list of folders. Some will contain messages automatically, others you will have to populate yourself.
The Inbox is where all messages that you receive are stored. You will want to keep this as empty as possible by always organizing your email into other folders once read. The Starred are emails that have been marked as important, sometimes messages from people you often write back to will automatically be stared. As you can see the message that is in our inbox right now has a white star next to it, if you click it the message will be stared. Sent Mail is self-explanatory, these are messages that you have sent to others. Drafts are messages that have been started, but not completed. If you click the More button you can see the spam mail you receive and create a new folder by clicking the “Create new label” button.
Above your Inbox is a couple of tabs that are designed to help organize the inbox. This can be both helpful or a hindrance depending on how much email you receive and how you teach Gmail. Depending on how you read and write messages and what you mark them as for organization will determine the effectiveness of organization. You can move an email from one of these tabs to another by clicking and dragging it over to one of them.
Click an email to start reading it.You can see who the email is from and their email address, the day and time the email was sent, and some options for staring and replying to the email at the top. Then follows the email’s contents. The email that is resting within the inbox by default is just a promotional mail for other google products, but it is a good example. After the contents of the email there should be a little reply box. This email is auto-generated so you should not reply to it, but if you are emailing your friends it is much easier for organization to reply instead of starting a new message.
Composing a Message
Go back to your inbox and then click on the compose button.
You type the email address of the person you wish to write an email to in the first line. If you already have them in your contacts you can just type their name and it will automatically type their email. Then you have the subject line. It is important that you fill this out. Most email that lacks a subject will be regarded as spam and even then it is rude.
The main body of the email is after the subject line. You fill this out just like a letter. By the send button you have text options to modify the font and create bullet lists. Next to that you can upload attachments using the paper clip button, this is an easy way to share small files. Other options are to include files for google, send money, insert a picture, link photos, and emoticons. At the end of the screen there is the option to delete the email and the arrow has more options like moving the email to other folders and checking for spelling mistakes.
Once you hit send, the message will be sent to the email address you intended. You can send an email to multiple people by entering more than one email in the subject line.
For more information on how to use Gmail you can look at the account setup option underneath your inbox.
Not that was a long and boring track, but now we can get into the more fun parts of computers. Look forward to more articles in the future.
Now that we have an understanding of how to get around, we will go over installing software and the internet. We will only cover the minimum here, in the future we will go over email, Facebook, and other things.
There are a couple of programs we will be installing to get you up and running properly on the internet. These would be a web browser and a firewall.
The internet is, in its most basic form, a connection between computers. These computers can send data between one another. For our purposes your computer and a web-server will be communicating.
These servers hold the data that makes up websites and other things that you download.
Why access this data? For many reasons: The Internet holds vast amounts of information from encyclopedias to movies and games, you need to know how to use it effectively to hold a job and there is much fun to be had as well.
Wireless on the Left and Wired on the Right
Before you can do anything related with the internet you need to be connected. In the notifications area you should be able to see your connection status and if you are not connected, connect to a network. The icon for this will very depending on whether you are using a wired or a wireless connection.
If you are connected by Ethernet then you have nothing more to do, but if you are using wireless you will need to click the wireless icon. A new menu will appear showing all available networks. You will need to click on the network that belongs to you and enter the password for it.
If you do not know the password it may be on the router that you are using. A router is a devise that routs wireless connections, either your service provider sent you one or you will need to buy one to get wireless.
Now we have one more step, that is open up a web browser. We will be using Microsoft Edge at the start of this tutorial, but will be changing that really soon. There are multiple ways to open Edge, the ‘e’ icon that is on the task bar and start menu, in the start menu you can click all apps and find “Microsoft Edge”, or you can open the start menu and start typing “edge” and hit enter when it appears.
Getting Around and Installing Better Programs
Now there are a couple of things you can do now; you can check the weather, make a Facebook account, or watch a movie, but we will be getting a new web browser and an anti-virus.
“Why do I need another browser?” Though Microsoft Edge is far better than what Microsoft had in the past, it is not powerful and is completely controlled by Microsoft. As said previously, we want to keep dependence on them to a minimal.
There are much better options out there than Edge, the two I recommend are Firefox and Google Chrome. This depends on your philosophy and how much power you wish over your browser. Firefox is founded on the principle of privacy and freedom to control the browser as you see fit. Google Chrome is controlled by one of the largest data collection organizations in the world, who just so happens to control a large amount of the internet. With Chrome you do not have control like in Firefox and privacy is questionable, but you have full integration with Google’s services and an easy to use interface.
I will be using Firefox for this tutorial, but the same principles apply to both browsers.
In the search box, the box on the top of the page, you should type wish to find, in this case “Firefox”. A web page should appear with a list of search results. Click on the blue text “Firefox Web Browser – The Official…”, this will take you to the Firefox website. There should be a button that says “Free Download”, click it.
At the bottom of Edge there should be a download status that gives you information on the download.
The first thing you wish to do once the file is downloaded is click “Run”. You will see a green extraction bar and then a warning asking if you would like to run the file, say yes.
The installer is a fairly self-explanatory, click next once it opens. You are then presented with options for a Standard or Custom install. For most programs you will want to do a Custom Install when it is an option, as some software will do undesirable things to your computer unless you disable them. Firefox will not do said things, but it is best to get in the habit of doing things this way.
Next you will be asked where you wish to install the program. You are best leaving this alone, but take note how things are set up. You are given the folder that the program will be installed into, how much space is required for the program, and how much you have on your hard drive.
The next option given you is to install the “Maintenance Service”, you will want to have this. You should always have your software up to date, this keeps it secure and keeps you from getting a virus.
There will also be the options to have an icon on your Desktop and in the Start Menu. You will want to have the start menu, but there is no need for a desktop icon as we will have a quick launch icon on the task bar shortly. Thus you will want to uncheck the desktop option.
You will be given a summery of the installation, where the program will be installed. All you need to do is click “Install”.
A green progress bar will show you how things are going and then you can just click “Finish”. Firefox will start automatic unless you unchecked it.
Follow similar steps if using Google Chrome.
Firefox and the Internet
You are finally here, you have a competent web browser and are connected to the internet. Now there is some simple setup needed for Firefox.
Without a little work, Firefox is not as powerful as it could be. So we need to go into the menu and click on options. This menu is on the far right of the browser, just under the close button. Within the options you will find a tab that says Search, under that tab you will have the option to change search engines. You will want to change it to Google under the drop down list that says Yahoo. Just click on the button and it will open this list, then click Google. Yes, that Google.
Then you just close the options by clicking the ‘x’ on the tab that is in the top of the browser. These tabs will become very important in the future.
Windows comes with a simple Firewall and anti-virus, but they are rather simplistic and lacking in some areas. If you are comfortable with that, you are set for the internet. However we will be covering anti-virus software in our next article.
Sadly our short attention span culture means that this website would suffer if I continue here. Keep an eye out for our next step, installing an anti-virus and exploring the web.
In Windows 10 you navigate using the mouse and keyboard. The mouse has to functions; the left button is used to activate whatever the cursor is on and the right button brings up additional options. The keyboard has many keys and many more functions, so we will introduce them slowly.
When you start up your computer and login, you will be greeted with the desktop. This place can contain files and program shortcuts, but it is always a good idea to keep it clean.
At the bottom of the screen you will see the task bar.
This is the key to the interface. From left to right: Start Button, Cortana Searchbar, Task View Shortcut, Quick Launch Shortcuts, Notifications Area, Time and Date, and the Show Desktop Shortcut.
As we will not be using Cortana and there are shortcuts using the keyboard for task view we will disable the buttons on the taskbar. To do so we need to right click on the taskbar. This will bring up a Context Menu, it is called such as it is different depending on where and when you right click.
You will want to highlight the Cortana button in the menu, this will open up a submenu where you can chose to hide Cortana, click it. Click Show Task View button in the menu to hide it as well. Context Menus often give you access to many options that would otherwise be inconvenient to access.
Now that we have a clean looking taskbar, we can go over what everything is.
The Start Button gives you access to a menu of options and all of the installed programs. This will be the launching point of most of what you do on your computer. We will come back to this in a minute.
The Quick Launch Shortcuts give you the ability to access some programs without opening the Start Menu. This is useful for your most used programs.
The Notifications Area will tell you your internet connection status, volume settings, and many more. The button just left of the time will open up a list of notifications where you can see what has been happening to your computer. The arrow on the far left opens up a menu with more icons that will give you the status of certain programs. Some programs that you will install, such as a firewall, will place icons in this menu.
The time and date are displayed and when clicked will give you a monthly calendar.
The last button is a little hard to see by some, but it will hide all of your open programs and show the desktop when clicked. This is very useful when your screen is getting crowded.
The Start Menu and Programs
Click the start button or press the meta key on the keyboard (It looks like the start button) to open the start menu. It is full of ads and looks unprofessional, but we will be replacing it soon and we need it.
This is the part of the interface that brings you to your programs. Lets open File Explorer by clicking on it in the menu.
All files in Windows are stored in File(Also Called Directories). These file can hold pictures, music, videos, programs, and other files. You navigate these using a program named File Explore.
At the top you see the icon that represents the program, a properties, new folder, the name of the icon, a minimize, maximize, and exit button.
You should also note that the icon for File Explorer is highlighted with a blue bar under it in the taskbar. This indicates that it is open and active.
If you click the minimize button the program will be hidden from view, to bring it back up, just click on it in the taskbar. The Maximize button will make the program take up the whole screen. The Exit button will close the program.
If you hover the cursor along any of the edges of the program you can change its size. This is helpful if you have more than one program open at once.
We will go over File Explorer in depth in the future. For now you should have an understanding of how the widows interface works.
Last time we went over computer hardware. Today we will be installing Windows 10. Windows 10 is the most recent version of the Windows Operating system (OS). We will first go over installing the OS from a disk, if you bought a computer with Windows 10 on it you can skip ahead to part two.
Windows 10’s Localization Selection
Part 1: Installing from Disk
To interact with menus in windows you will use the left mouse button to select items and the keyboard to type information.
The first thing you will see when you start installing the system is the localization settings. You will want to select your language, time and currency format, and keyboard to mach your region. In the screen shot we have everything setup for a United States computer. Then hit Next.
On the next screen you should screen Install now and a Repair your computer button. Click Install now.
Windows will ask you for your serial number. It will be on the case of the installation disk. If you do not have it you can click I don’t have a product key, but you will run into trouble later if you cannot find it.
The next window will ask if you want to Upgrade or do a Custom install. We want to do the second. Click Custom.
You will just need to click on your hard drive and then the next button on the next screen, unless you know what you are doing.
We will go over partitioning in a later article.
Windows 10 is installing, it will only take a minute.
The next window will show the installation progress of Windows 10. This will take a few minutes. After it is done your computer will restart.
Part Two: Setting up Windows 10
Now we start setting up Windows 10 for use. This is where things get tricky for the uneducated user. Windows 10 will do everything in its power to get you to consent to giving more information than you should. If you do not care about your privacy you can ignore the next part of the article, but you should care. “but I have nothing to hide.” is an evil and dumb statement, never consent to giving your information when it is not required.
The next screen will ask you if you want to Use Express settings, you do not want to. Each point that the installer makes about why you want to use them is another piece of your private life that Microsoft can use for marketing and something that can be used against you.
There is a small Customize settings button near the bottom left of the screen, click it.
The next few windows will have a lot of options you will want to click off.
Oh where art thou, oh where art thou privacy?
You will want to click each one of these option to off. These options will allow Microsoft to track everything you type, your location, your calendar information, and the
contact information of others. Most of the programs that use these “features” are more prevalent on cellphones, so you do not benefit much by giving this information to Microsoft.
Once you have everything off click next.
Connectivity and error reporting:
Computer security 101: Never connect to a network you trust, ever. The next three options are more dangerous to have on than just giving Microsoft your information. When you connect to a network you make your computer open to what is on it. You will want to change these to off.
Sending error reports to Microsoft actually sounds like a good idea, but in my experience diagnostics never return results. It is better not to give Microsoft this information as you will not see results and Microsoft will sell what they get from you.
More options to turn off:
More things to turn off, hooray!
Windows 10’s SmartScreen feature is useful if you go to less savory websites, but in exchange, Microsoft gets to know where you have been online and what you are downloading.
Page prediction will be useless for us as we will be using a third party program to brows the internet. If left on, Windows 10 will send your internet and download history to Microsoft. Even if you do use the integrated web browser, you will not benefit much by having this on.
The last option will use your computer to send updates to others and allow you to receive them from others. This will use your internet connection, thus wasting bandwidth and slowing down your internet.
Turn these off.
Windows will restart after you click next.
Part Three: Creating a Local Account
We are almost done! Unfortunately Microsoft tries to ware on your willpower by making it easier to just hand over the keys to your life.
It is a trap! Do not fall for it.
Windows 10 will ask you to sign in to or make a Microsoft account. This account will allow you to connect your devices and will allow Microsoft to put a name, address, email, and phone number to all the data they collect.
They make it hard to say no by making the Skip this step and Microsoft privacy statement buttons small. Read that privacy statement, it is vague and misleading, but it basically states that Microsoft will be sharing your information with the government, sending it to advertisers, and using it for the improvement of Windows 10.
We will want to Skip this step. There are some honest benefits to using a Microsoft account, parental controls and online backups, but there are alternatives that do not want to sell you ever chance they get.
Creating a Local Account
This is the screen that they should greet you with.
We are going to setup the account for the first user on this computer, this will be the system administrator and will have full control over the system.
The user name can be your name or anything you want. On this system I will be using “Random Thoughts”. The password is very important. This is what keeps others out of your computer. It would be a shame to have gone through all that effort to lessen Microsoft’s grip just to hand the keys over to someone else. Use the keyboard to enter one that uses a combination of Upper and lower case letters, symbols, and numbers. Unless you are expecting someone with physical access to your computer to brake into your computer, it does not need to be overly strong.
An example password could look something like this: hTF1%g%#Gl#6U
Never usepassword as a password.
The password hint can help you remember what you have entered here, if you forget your password you will not be able to access your computer.
Now Windows 10 will play an animation as it sets things up for the new user. Just wait wist it finishes.
We are done, just one more thing to do.
Congratulations, Windows 10 is now installed. There is just one more step. If you have your computer connected to the internet already, you will want to decide if you want your computer viable to others on the network. If you are at home you can select yes. If you are using a laptop or a computer that is on a public network you will want to say no.
If you have no plans on running a server or doing anything regarding computers interacting with each other you are better off saying no, you can always change this option.
We will be going over the windows interface next time and setting things up for you to use. We will also install our first few programs in the next article.
Before we learn how to use a computer we must understand what a computer is and the underlining concepts that allow computers to work.
At the most basic level a computer takes data (input) and processes it into information (output). Lets say you us a calculator to solve a 2 + 4. The numbers 2 and 4 are your input along with the plus (+) sign. The plus sign is an operator that tells the calculator how to process the input. The output will be 6. This is how computers work, everything you wish to do on a computer follows this principle.
ENIAC, the first general purpose computer.
Brief History of The Computer
Technically commuters have been around for thousands of years, but we are only interested in the past two hundred years.
Charles Babbage conceptualized programmable computers and began to build a Difference Engine in 1822. After building his Difference Engine, he thought it would be possible to have a system that used punch cards for input. This punch card system was called the Analytical Engine. Unfortunately Babbage died before he could get it working.
Ada Lovelace wrote the first algorithm for the Analytical Engine. Wist the Engine was not finished, Lovelace wrote what is attributed to be the first computer program.
These Difference and Analytical Engine are both mechanical computers. Though there where electronic computers near the beginning of the 1900s, the first general purpose electric computer was announced in 1946. This computer was named the Electronic Numerical Integrator And Computer (ENIAC). ENIAC combined the abilities that other earlier computers had and ran at a much faster speed.
Computers come in many shapes and sizes, ranging from so small that 150 of them can fit on your thumb (M3) to ones larger than ENIAC. The smallest computer we will be going over in this series is your cell phone and we will not be building server farms so we will not concern ourselves too much with size.
Computers have become such an integrated part of our society that it is almost impossible to get a job without knowing how to use one. Even cash registers have computers integrated into them.
Types of Computers
We will be going over several types of computers during this series. This includes:
Smart Phones have largely replaced standard phones for most things. These phones are computers that can connect to cell-phone networks and WiFi networks. This gives the phones the power to both access the internet and make phone calls. Smart Phones can run software to do anything that a desktop computer can, from playing games to doing your taxes.
Single-board Computers have one circuit board with all of the components soldered to it. These boards are often used in manufacturing and hobbyist projects. The most notable computer of this type is the Raspberry Pi. These computers are often inexpensive and perfect for simple tasks like weather tracking. We will go over Raspberry Pi projects some time in the future.
Laptop and Desktop Computers:
Laptops are computers that have a folding screen that comes down over the keyboard. Laptops are more expensive and less powerful than Desktops, but run off battery power and are portable. Desktops are cheep and powerful, but are not as portable as laptops. Both run the same type of software and the same principles apply. This is the type of computer this series will focus on.
Next time we will go over the basic hardware that will be needed and how hook everything together.
For further reading you can read the Wikipedia pages for concepts we have covered:
In our hyper connected world it is important to know how to use a computer. Unfortunately, many people do not have the knowledge of computers to get far in a work environment. Thus Random Thoughts will start an Introduction to Computers series of posts. This is to help people who have little knowledge of how to use computers become more than competent with them. By the end of this series you should be your own computer guy.
Assumptions I Have Made:
As it is impossible to predict every scenario, I have made the following assumptions.
You have a computer and are running Windows 7 or newer. I will be using Windows 10 in this series as Windows is the most common operating system. I do not have access to a Mac and Linux has too little of the market to make this useful to the majority. In the Future I will have a few articles on Linux, but the same principle apply.
You have never used a computer or only use computers for basic research, games, and social media. If you know how to go on Facebook and how to search Google for cat pictures, but do not know how to change paragraph format a word possessor, you do not know how to use a computer. If you have never used a computer before or never did any maintenance on your computer, this is geared to you. Likewise, if you are an avid computer programmer this is not for you.
You have an internet connection. You will not be able to download the software we will be using without an internet connection and the majority of things we will cover will use the internet.
You are willing to learn, mess up, as questions, and find answers on your own. If you are not willing to learn, you will not learn. You need to experiment, that means messing up and potentially breaking something. It is okay if you mess something up, you can always fix it. You do not learn by studying theory, you learn by tinkering. You will need to find your own answers for many problems, we will help point you in the right direction.
You have administrator rights to your computer. This is important as you need administrator access to do many of the early things we will be covering and to install software.
I look forward to seeing in part one of Introduction to Computers