An alternative to replacing a PC is upgrading one you already own. Sometimes this is achieved via one-for-one swaps, and sometimes it involves the addition of entirely new devices. Today, PCs include welcome standard means of attaching powerful new devices via fast external interfaces like network adapters and USB ports. Even the task of swapping out nominally internal hardware like magnetic hard disk or optical drives can be eased by the one-time installation of aftermarket hardware like dock-and-drawer systems.
And if you are skittish about opening up your PC to do things like adding more primary memory chips, you can usually hire someone to do that for you. (You might make it cheaper to do this if you can provide your help with any manual bundled with the machine.) Compared to something like an automobile or even a toaster, the inside of your PC is a rather benign place. It would be rather odd to be exposed to the potentially deadly mains power voltage, for example. (A hot heat-sink sounds like a more likely hazard if you have a new high-power microprocessor.) But the hazard you present to your PC, for example, by electrostatic discharge resulting from walking on a carpet on a dry day, advises you should show proper respect for its well-being if you open its case and you have never done any electronics work previously.
An excellent (but overmodestly-named) in-depth technical reference for today's PC hardware is the Third Edition of the book PC Hardware in a Nutshell (2003), published by O'Reilly Media Inc., loved by techies everywhere. (Consider O'Reilly when the time comes you need a serious and well-written book about computing and related topics, rather than beginner stuff.)
If you have never used a PC before, let me suggest that the sorts of problems you might encounter upgrading and using one these days infinitely more resemble redressing the heartaches arising from a badly-written legal contract after the fact, rather than the mystery of figuring out the rain ingress path of a roof-leak whose consequences are sadly evidenced by a stain on your ceiling.
A general purpose computer, such a PC you buy at an electronics store or over the Internet, is very unlike nearly every other consumer good you might purchase. While the accelerator and braking pedals of you automobile will never reverse functions with one another, your PC is not so inflexible. The PC began as a hobbyist toy that inched its way first into the office and then into the home. The commercial culture it spawned has been very resistant to standardization and lock-down.
Why is this so? Well, in part it is because the PC fulfills the dream of a machine that can be infinitely customized with little effort. And in part it is because endlessly collapsing component prices keep making it ever more powerful and so ever more able to perform new functions. But it is hard to eat your cake and have it too: Military fighter aircraft are extremely manuverable; but that comes at the cost of making them highly unstable.
Happily, dramatically falling prices have not just ironically instigated problems, but have facilitated solutions as well. Many functions born on the PC can now be provided via affordable, parochial fixed-function appliances, often rather smaller in size as well. Their selling point is that they take rather little time to learn and don't require a lot of effort to maintain. (We will meet some of them later on in this lesson - and some others in the following lesson.)
An important reason not to favor MSN TV per se is that you can ONLY use a conventional (NTSC) television set as your display screen. While television is just fine for showing conventional video programming, it cannot do a good enough job displaying a page of text clearly. That's one reason you might consider the alternative represented by things like the Linspire Webstation, which can use a conventional PC monitor. Instead of a hard disk, this very inexpensive product employs a CD-ROM as its secondary storage, which means that its Linux-based software behaves the same way every time you start it up: the CD-ROM cannot be altered. (Unless, of course, you elect to replace it whole with an updated version of the CD-ROM.)
The Linspire Webstation uses what is called "Live CD" technology. When *any* PC starts up ("bootstraps"), it first runs software in its chip-based BIOS memory and then looks for a secondary memory drive to load and run the operating system (whether Windows, UNIX, Linux, DOS, etc.) Recent PCs have the ability to use a CD or DVD drive in this manner. (Which of multiple drives is used in the boot process is designated by setting a parameter in the - today typically misnamed - writable "CMOS RAM" section of the BIOS.)
You can download and burn a copy of many different types of CD-ROM "disk images" based on the Linux operating system, to create your own free Live CD. The chances are good that you will be able to boot your PC from it and see what using Linux is like - without disturbing another operating system, like Microsoft Windows, which is installed on your hard disk. Some of the live CD images are quite small, like that of Damn Small Linux, which can even fit on, and maybe boot from, a thumbnail-sized flash memory card as well. A LiveCD "distribution" (flavor) like this is capable of running respectably on quite antiquated hardware and provides a way to breathe life back into ancient PCs headed for use as a door stop or landfill.
Downloading large files with a slow dial-up modem connection over an ordinary telephone line can prove problematic. Slow speed per se is not the main issue - by leaving your computer on and downloading while you sleep 8 hours, it could transfer 140 megabytes of data with a bandwidth of only 5 kilobytes per second, a rate easily possible these days. The real issue is that your PC may "crash" ("spontaneously" stop working) or the telephone line disconnect (perhaps as a telephone company surge protector saves your modem by acuating during a lightning strike) part of the way through the transfer of a huge file like a disk image. The way to deal with this is to use a utility program called a "download manager", which is almost always able to resume a file download after interruptions occur without starting from scratch. One acceptable free choice is Download Accelerator.
A mobile professional who has never before used a PC might be tempted to get a (general purpose) laptop computer - which is not necessarily a bad idea. But some computer-like capabilities are also now offered by "smart" cell phones. Since the easy-to-carry cell phone has become for many people as permanent a companion as only our watches once were, this sounds promising for the future.
|The Nokia 770|
A third alternative is offered by handheld computers, the more
appliance-like of which are called
Personal Digital Assistants, or PDAs. One example is the charming
(product of a cellphone manufacturing giant) which should be
shipping around the time this is being written. No heavier than a
cellphone, but with a compact and yet highly detailed screen,
this $350+ device resembles the Linspire WebStation in upkeep
ease and the MSN TV somewhat in functionality. It is intended as
a portable means of accessing the Internet via one of the many
(multiple tens of thousands) of public
WiFi hotspots multiplying throughout the developed world.
Internet access is also possible with help from any nearby
But consider also a skeptical opinion on the Nokia 770 offered here, which takes note of the failure of many similar wireless Dynaboook-like products about 5 to 10 years ago (in the pre-WiFi-frenzy era). It also turns out yours truly helped develop a gadget which worked similarly in the late 1980s, too. Has its time now come at long last?
|WiFi digital radio provides a means of attaching wireless users to the Internet via a high-speed ("broadband") connection. It is easy and cheap to add a WiFi "hotspot" that will likely serve your entire home, and cities like Philadelphia are moving forward with plans to turn their entire area into a contiguous zone of them. It should be noted the wireless carriers are presently also spending billions to roll out so-called third-generation or 3G cellular radio service, such as now available throughout cities like Washington, DC. Such 3G provides an alternative to WiFi as an avenue for broadband Internet access.|
Parties who are serious PC users - like businesses - should remember that the vast majority of PC problems can be diagnosed and addressed remotely. A broadband Internet connection makes this especially easy. "Truck rolls" are expensive, but electricity is cheap, ever more so in a long-travel rural area as fuel prices rises. Firms providing remote management services include CenterBeam and everdream. (As far as I know, there are no firms named "centerdream" or "everbeam", haha.) The Chief Technology Officer of one Information Technology (IT) industry journal writes:
Iíve run the numbers many times and one of the great mysteries in IT management for me is why every company isnít a customer of one of these two companies.
When you get a new PC, make sure that you have a backup hard disk "image" (e.g. stored on a CD or DVD) that will let you restore your PC to the exact condition it was in when brand new, via "disk cloning". If something other than hardware goes bad in the future, this will let you get a fresh start within a very few minutes any time you want - but make sure you first backup (make copies) of precious data: like documents, e-mail archives, chat logs, photos, music files and such which you added to your PC in the course of using it. One way to make this easy is to put your "My Documents" folder onto its own disk drive or partition - one that is different than the one on which your programs are stored. Even if you have a single physical hard drive, it can be divided into two mythical "logical" drives (typically called C: and D:) to follow this regimen. By placing all your data into the "My Documents" tree branch you will make backing up your data (e.g. onto a DVD disk you burn) easy. This is something you should do regularly anyway, against the chance your PC is damaged or stolen: it is very cheap insurance.
If your PC does not have a disk backup image for your operating system and application programs, contact a computer professional to have one made for you - and at lousy 25 cents per blank disk, make at least two copies (which are kept in different places) against the chance one is manhandled, lost or has decayed when you have vital need to use it. Also see if your help can assist with segregating programs and data in the manner we explained.
Incremental methods to reliably "roll back" changes to the software installed on a PC's magnetic hard disk are also possible. (This approach avoids the need to generate an entire backup disk image, but is not as robust against the machinations of malevolent software which is clandestinely installed and discovered too late.) I started calling for this capability about a decade ago as I write this, as documented in the brief history here.
Microsoft Windows versions released in this century include a tool called System Restore to perform this type of function.
A good backup regimen is all the more important in light of contemporary "digital hygiene" problems. Today, an Internet connection is the primary way by which malicious software, or malware, is introduced into the average person's Microsoft Windows-based PC. This withering assault has proved so bad that Wall Street Journal technology columnist Walter S. Mossberg has recently (Dec. 9, 2004) written:
For the vast part of the public whose computers aren't bought and deployed by corporate computer departments... the burden of using personal computers has grown dramatically heavier in the past couple of years because of the plague of viruses, spyware and other security problems that now afflict the dominant Windows platform... A big reason for this slide backward is the failure of Microsoft to cope adequately with the security crisis...
Meanwhile, the company's historic rival, Apple Computer, has been making giant strides in ease of use. The Macintosh, with its [BSD UNIX-based] OS X operating system, is rock solid... Best of all, the current Mac operating system has never been attacked by a successful virus, and almost no spyware can run on it. This is largely because the Mac's small market share presents an unattractive target for digital criminals. But it's partly because the Mac operating system is harder to penetrate. I'm sure there will eventually be viruses that afflict Mac users, but nowhere near the 5,000 new Windows viruses that appeared in just the first six months of this year.
An interesting recent development is Apple's announcement that it will shift to the same brand of microprocessor (Intel) that Microsoft Windows PCs widely use. This raises the intriguing possibility that Apple may at one point try to leverage the vast amount of Intel PC hardware that now exists, laying the stage for software "crossgrades" away from Microsoft Windows, as Linux now pursues.
Until a more fundamental solution to the hard disk-based Windows PC malware epidemic emerges, using a back-up is a quick, cheap and easy way to remove problems once they have been detected. You can use a personal firewall program to help detect the presence of clandestine software running on your PC that uses the Internet to communicate with external computers (e.g. to copy sensitive data out from your PC or act as a proxy for harassing or even subverting yet other computers.)
With the security provided by a good backup strategy, you need not fear experimenting with your PC, whether you want to add new hardware, or just new software. If something goes wrong, or you are spending too much time to make it work, just give up and go back to the configuration with which you were happy. The ease and parsimony with which digital photos can be taken suggests that you consider snapping photos of hardware before, after - and maybe even while - making hardware changes.
You also have the choice of paying someone to upgrade or maybe just customize your PC. Whichever route you take, when you are happy with the new configuration, make sure the first thing you do is create a new disk backup image for the disk or partition on which sits your operating system and all your programs. When things go wrong from now on, you probably want to get back to the new plateau you have just achieved, and not the condition in which your PC was received. (But don't toss those very thin older disk images just yet - it is not impossible you may need to lose your latest changes and go back further to make something else new work in the future.)
Generally speaking, you will probably replace your PC - or all of its parts one-by-one - before nearly anything wears out, on account of how affordably cheap and improved new technologies will be. A common exception may be a dial-up modem which gets fried by lightning. It is not a bad idea to disconnect your PC from the mains power and the telephone line in advance of a known lightning storm. But I have never disconnected my satellite TV set-top box from its small-dish antenna or mains power, and it has yet to be clobbered by lightning in almost a decade of continuous use.
Unless you are very poor, don't bother with a ball-based mouse: who wants to clean mouse balls on a regular basis?! You can get a (camera-based) optical mouse for little more than $10 these days.
Most people who use PCs have a printer as well. Ink-jet printers are very cheap up front, but supplies are rather costly. Unless you really need to make color prints at home, invest in a laser printer instead. You might find a limited-refurbs-style model that runs only about $100 these days. Save on toner by avoiding the use of large black areas, and print throw-away drafts in a draft mode which spares the toner even more. Use the duplexing ability of your printer to mark both sides of a page to save yet more money - as well as paper storage space. Best of all, consider doing without paper, and publishing to the Internet, or maybe to an optical disk if you have a lot of material to justify burning a disk. Remember, you have to carry paper to the place you will need it, but electronic records like Web pages are always available from countless millions of Web terminals - and can be searched and copied at super-fast electronic speeds as well.
When a PC was booted up under MS-DOS, it finished by running a text-based program called COMMAND.COM. You would control the PC by typing commands on the keyboard to this program, which listened for keystrokes, echoed them to the text-only screen, and then carried out the instructions they comprised. We say that COMMAND.COM was the program by which MS-DOS provided a "command-line interface" to control your PC.
Originally, MS-DOS didn't even support the idea of file subdirectories; all the files on a given disk sat within a common directory. To run a program embodied as a file called DOAPP.EXE, sitting on your B: disk drive, you just typed B:DOAPP.EXE and hit the ENTER key. COMMAND.COM would copy this program into primary memory and transfer control of the PC to it. Thereafter, you interacted with the DOAPP program (using little more than your keyboard before other gadgets like joysticks and mice was available), until it was finished and handed control back to COMMAND.COM. Basically, only one program ran at once - unlike in modern operating systems like Mircosoft Windows and Linux, where many programs can operate virtually at the same time through multitasking.
As the notion of file subdirectories was imported from other operating
systems into MS-DOS, things got a bit more involved through adoption
of the idea of a file
MS-DOS acquired the notion there was an implicit
"working (or current) directory"
for each of the letter-designated disk drives it could access.
A legacy of COMMAND.COM remains in Microsoft Windows. Named the same
thing in earlier versions like Windows 98, and CMD.EXE in later
versions like Windows XP, it can be invoked by using Windows Explorer
in the manner described in our third lesson - by double-clicking on
its representation within the file system tree. Another method of
activation is to use our old friend, the "three-step dance": Hit
the "Windows" key, hit the "R" key and then enter the name of the
program, either "COMMAND.COM" or "CMD.COM" as is appropriate.
Application programs are not the only software we install on
computers. An important operating system extension called a
needs to be installed when we add a new piece of hardware. A device
driver might be bundled with the purchased hardware, or the operating
system might be able to install a suitable device driver from the
physical media used to install the operating system itself. Modern
versions of Microsoft Windows include a capability called
by which one can stick a USB device into the USB port or (expansion)
USB hub of a PC
which is already operating and have Windows assist in completing the
software interfacing process to make it operable. (Traditionally,
it is generally a bad idea to wire up electronics to which power
is applied!) Disappointments with the perfection of this regimen
led critics to coin the term "Plug-and-pray".
5. Installing programs today
Installing programs under complicated operating systems like
Microsoft Windows or Linux is much more involved. The installation
may involve the addition of dozens - or even hundreds - of different
disk files to various subdirectories on one's disk drive - as well
as the modification of existing (configuration) disk files.
Because copying so many files by hand would prove onerous,
typically one uses a single file, called an "installation"
file to do all the work. Under earlier versions of Microsoft
Windows, like Windows 98, this file was program which you ran
but once; other operating systems may use a non-executable
configuration file which is presented to a standard
utility. Indeed, recent versions of Microsoft Windows also
include such a utility, called
A legacy of COMMAND.COM remains in Microsoft Windows. Named the same thing in earlier versions like Windows 98, and CMD.EXE in later versions like Windows XP, it can be invoked by using Windows Explorer in the manner described in our third lesson - by double-clicking on its representation within the file system tree. Another method of activation is to use our old friend, the "three-step dance": Hit the "Windows" key, hit the "R" key and then enter the name of the program, either "COMMAND.COM" or "CMD.COM" as is appropriate.
Application programs are not the only software we install on computers. An important operating system extension called a device driver needs to be installed when we add a new piece of hardware. A device driver might be bundled with the purchased hardware, or the operating system might be able to install a suitable device driver from the physical media used to install the operating system itself. Modern versions of Microsoft Windows include a capability called "Plug-and-play", by which one can stick a USB device into the USB port or (expansion) USB hub of a PC which is already operating and have Windows assist in completing the software interfacing process to make it operable. (Traditionally, it is generally a bad idea to wire up electronics to which power is applied!) Disappointments with the perfection of this regimen led critics to coin the term "Plug-and-pray".
The installation file for an application program might come from a removable storage medium like an optical disk or flash memory card. It might alternately come through a computer network, such as via a network share or a Web page in which a link points to the installation file. Wherever it comes from, be sure that you trust the source of the file and are legally licensed to do the installation.
Licensing is different from purchase - and may involve no transfer of money at all. You can find much excellent free software by using the resources you find listed here.
Software for which you pay no money still requires that the people who create and distribute it enjoy a means to live all the same. Sometimes people do simply donate their labor - an amazing amount of the time, as it turns out. But sometimes they use alternate financing schemes which include "adware" - among the least objectionable of many methods, some of which (i.e. "spyware") might be used without your knowledge, because it would never get your consent!
It is not possible to put something like a physical sticker on a file to guarantee its authenticity - after all, a binary digital file is just an ordered sequence of 0's and 1's. But it is possible to perform a (complicated) mathematical operation (e.g. using a program) on the file to produce an alternate, much smaller (lossy) representation of the file called a message digest. (Here "lossy" means it is not possible to reproduce the original file from the computed respresentation, as one can from a "losslessly" compressed version of the file.)
A file which is alleged to be identical to an original file should produce the same message digest with a particular algorithm that it did when the algorithm was used on that original file. This is why people will sometimes publish the message digest of a file they are promoting, even if they don't have a copy of the original file to give you: when you find a file which is alleged to be a copy, you can apply the algorithm to verify you get the identical message digest, and thereby have evidence of its authenticity. Of course, agreement of a computed message digest with a published message digest is only useful if you can trust the published one is authentic itself!
Acceptable algorithms for generating a method digest have the property that they detect the change of a single bit anywhere in a file (a way to detect non-malicious errors due to marginally defective computing hardware) as well as the property that it is exceptionally hard for a forger to adjust the bits of a counterfeit file so that a particular message digest is produced. (A famous, simple algorithm with the first property - but not the second - is parity bit computation.)
The PCs in the main reading room at the Buchanan-Haralson Public Library include a copy of a program to compute the famous MD5 message digest function for a file, to help users authenticate that file.
It turns out we sort of used the program menu system designed into Microsoft Windows (called the "Start Menu") as early as our second lesson, because one way to elicit it is to tap the "Windows" key! (Another equally good way is to click the "Start" button on the screen with the mouse cursor - hence the rationale for its name.) After such alternate activation, you can use either the cursor keys or move the mouse to navigate the hierarchy of icons, each of which represents one program you can start up; you move horizontally to move "up/down" (sic.) a tree level, and vertically to move within a level. When you have highlighted the icon for the program you want to activate, you can either hit the ENTER key, or single-click the left mouse button.
Most of the icons for the programs you want to activate sit within the "Programs" branch of the Start Menu hierarchy; but they can also be placed at the root of that hierarchy. In Microsoft Windows, these icons are actually what are called "shortcuts", which are tiny configuration files which point at an executable file and specify some details about how it will be activated.
It is also possible to put "shortcuts" on the "desktop", which is to say overlayed on the "wallpaper" used to decorate the screen when no programs are running. By default, you need to double-click such a desktop shortcut to activate the program.
Shortcuts can point to things other than executable program files. They can point to file system hierarchy subdirectories/folders or non-executable data files as well. Clicking on a nonexecutable data file shortcut as if it was a program often activates a program which will examine or otherwise process that data file. (We saw this same behaviour in our second lesson, when entering a data file name after hitting the "Windows" and "R" keys in order.) Choosing how to associate particular file types with particular programs is something the user can specifiy, but is not covered in this lesson.
It turns out that the Start Menu items are actually a branch of the file system hierarchy rooted at: "C:\WINDOWS\Start Menu" and the collection of shortcuts on the desktop are actually a branch rooted at: "C:\WINDOWS\Desktop". Use Windows Explorer to examine these branches when you find some spare time, as a lesson in alternate manifestations of a common thing - the patterns of 1's and 0's on the hard disk which embodies the Windows Desktop and Start Menu.
Your Microsoft Windows computer contains some "documentation" - if perhaps not as much as you would like. You can always hit the F1 key near the top left of your keyboard to bring up what is called the "Help" system for the program associated with the window which has "keyboard focus". (Microsoft Windows indicates focus by highlighting of the bar at the top of that window differently from all other windows; it is this window which is told of the keys on the keyboard which you strike.) If the Windows desktop has keyboard focus, hitting the F1 key brings up "Windows Help". The interface for this facility uses menus, tabs, a cascading hierarchy of icons and many other features typical of Microsoft Windows programs. Use your mouse to click on things to explore them - this facility is read-only and you cannot do it any harm. Effort here is well spent, even in the absence of some specific and passing need - you will learn important things for which we have no time here.
Almost any program includes an item called "Help" at the root of its menu hierarchy, drawn at the top of some window it shows. Click on it for additional help with that program, typically including the thing you can call up by hitting the F1 key.
Letting your mouse "hover" (dwell) over a particular feature within a window will often popup a small label called a "ToolTip" for the feature in question. It is as if Windows guesses you are "stuck" and offers a hint to help get you on your way.
Many programs also draw windows which include a small icon with a question mark within it. If you click on this icon and then click on something else within the window in question, a short explanation is offered about that second thing you click.
If you are stumped despite your use of the aforementioned built-in help aids, you need not despair merely because there is no one around to help you - as long as you can use your Web browser to access the Internet! Try our old friend the Google search engine to pose a phrase that may appear in a Web page explaining the thing about which you seek more information. It could be a tutorial article from the online version of a trade serial, some school course notes, or maybe just the FAQ ("Frequently Asked Questions") list a software vendor posted on its Website about the software product in question.
Don't forget more focused things like topic-specific online bulletin boards, such as Google Groups, which includes the UseNet archives, many of whose groups address technical questions about particular computing topics. Also consider using a "live" tool like text-based chat to immediately interact with other people on the Internet. The Search IRC engine can help you locate a chatroom on IRC that may be full of people who would love to answer your questions. Find a small collection of online resources for reaching other people, either synchronously or asynchronously, here.
If your PC is attached (e.g. via the Internet) to another PC attended by a human being, that person might be able to help you reconfigure your machine remotely. For example, if both PCs run a version of Microsoft Windows XP, you can use XP's Remote Assistance tool. In earlier versions of Windows, you could instead use the free NetMeeting utility program, which we will mention again when discussing teleconferencing in our next lesson. We will also discuss a similar tool capable of operating between computers running dissimilar operating systems, called VNC.
Now that we know more about how to upgrade and operate our PC, our next lesson will focus on some of the exciting and amazing applications to which it and specialized devices inspired by it can be put.