Download Chapter 4 - Clark Science Center

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

URL redirection wikipedia , lookup

Transcript
Thurs. 9/6
Overview of computing with specific emphasis on the Macintosh Operating System.
a. Understanding the Macintosh interface and
important utilities (Norton Utilities, TCP/IP, Virex,
Extension Manager, File Sharing, Virtual Memory,
Sherlock, Apple Menu, etc.), Backing-up.
HW # 1 Due 9/13 (2%)
1. High end Unix –based OS.
2. OS 9 under the hood – Classic
3. OS X –
a. preemptive multitasking- in contrast to cooperative multitasking in
which applications tell the processor how much attention it should
get, preemptive multitasking has the OS make the decision (traffic
cop) . Bottom line, an errant application will not cause the entire
system to crash by hogging processor attention.
b. memory protection-one application can not overwrite another in
ram. May happen when one application generates data which is
moved to a location in ram occupied by another application. When
the other application begins to run part of its instruction set is
wiped out, and this can cause a crash. Not normally the case in OS
X because of the memory protection scheme
c. dynamic ram allocation- instead of allocating fixed amounts of
memory to applications (as was the case in System 9), OS X
assigns applications what it needs at boot time, and as it continues
to work. More efficient use of ram, and also will not normally
crash applications that run out of memory as they execute. Allocate
additional memory on the fly-if it is available.
d. Multithreading-written into system better; allows multiple
processes within an application to work simultaneously such as
printing and writing another document in word.
e. Symmetrical Multiprocessing-OS supports using multiple
processors; heretofore was a function of the application instruction
set.
4. Fundamentals of OS X
a. Set your computer to login the owner (can be configured for
multiple users) with each user getting their own settings and a
distinct “home” area
i. Administrator account allows installation of applications for
all users, and can make system level changes in System’s
Preferences
ii. Regular users can only make changes to their personal areas
iii. Most powerful account is the “Root” account. Disabled by
default.
b. Menu Bar, Context Menus (Control + Click) within application or
finder.
i. Buttons – close, minimize, maximize
c. The Dock – shows application aliases, applications running,
Document or folder aliases, minimized documents (like windows
task bar)
i. Can be placed on left side, right side or bottom
ii. Options under Apple “Dock Options”
d. Apple Menu about this Mac, sleep, logout, shutdown, restart,
preference, recent items
5. The Finder
a. Systems control – folders, naming, finding, opening applications,
searching folders, manage files
b. Mac File System: hierarchically; users folder - View (folders can
be set independently to different views), also see icon view settings
in Finder; view options change in different viewing modes
c.
The finder’s tool bar can also be customized by dragging icons to
it.
d. A folder’s tool bar can be further customized by going to “View
Customize”
e. Go Menu –
f. Working with icons –
g. Copy – drag and drop while holding the Option key (see “+” sign)
or copy and paste via Edit Menu
h. Spring loaded folders drag and hold
i. Search for items via search box – within folder search
j. Get info (under File or Clover – I
k. Eject disk – select icon, File – Eject, or drag to trash
l. Burning a disk
i. Name disk, drag items to it, (a) drag to trash, trash turns to
Burn icon; select disk icon-File – Burn Disk; Click Burn icon
in toolbar if it was placed there via customization
6. Finder preferences under finder – select appropriate options
Chapter 4
1. Besides normal ways to activate applications can use Favorites in the Go
Menu (click on icon then Add to Favorites under File or Recent under Go)
2. Suffixes associated with files indicate which application will be invoked to
open it. A second way to do this is to use the Get Info window to change
its application association “Open With”
3. Saving Options ; Save As saves a new documents
4. In Word – Preferences – use grab
5. Classic applications can run from within OS X (Cocoa). To starup Classic
rather than Cocoa Systems Preferences under Apple, then Startup disk;
can also have certain applications startup under Login Items.
6. Chapter 5 Personalize Mac OS X
a. Multiple users have their own preferences and work space if
multiple users is invoked via System Preferences Accounts and
Screen Effects Activation for Password Control
b. Home Folder: Finder “Go”
i. Desktop – personal configuration
ii. Library – general preferences, data files, and other
settings required by applications and preferences unique
to user for application; temporary applications files,;
library folder contains POP and IMAP accounts info;
Mail folder for sorted mail (Entourage in Documents
/Microsoft User Data/Identities)
iii. Public – for sharing files with others on the same
machine or via the internet (read and copy allowed);
also contained here is the Drop Box –can’t open but can
drop items into it for someone else
iv. Sites – Store HTML documents and images for
personal websharing; if websharing on http://ip/~dss/
(to go to home for user sites)
v. Imovie
vi. Itunes
vii. Iphoto
viii. Documents – All documents (easier for backup; only
user can read and write to folder
ix. Movies - like documents
x. Music - like documents
xi. Pictures - like documents
c. Permissions – Assigning permissions allows access to others;
you are the owner of your home folder and subfolders – using
the show info command in the Finder, you can set 4 access
levels for any or all of your folders (read, write, read and write,
no access; done through Ownership and Permissions – may be
set for the owner, “wheel” or staff group (administrators), and
others (all others)
d. Shared Folder – inside main user’s folder is designed to allow
all users of Mac to access files that should be public (e.g.,
mp3s read/write access to folder).
2. Favorites – select item, File Add to Favorites; Finder Go Favorites;
edit Favorites Folder by GO – Favorites in Finder to edit aliases
3. Dock – Used for applications and documents, folders (change icons to
make them more unique www.iconfactory.com or www.icons.cx ,
trash; customizable-size, placement (ctrl-mouse button); add and
remove items by dragging and dropping; use hiding for more screen
room-appears when scroll over screen where it resides
4. Finder tips:
a. Use columns View – to move files – use two windows open at
once
b. Place folders on the toolbar of a finder’s window to get access
to folders quickly
c.
d. System preferences – works like control panels; panes used to
control preferences; more used panes can be dragged to
toolbar; only administrators can modify certain settings such as
users; other settings such as Cds and Dvds, desktop, etc., can
be modified by all users
e. Desktop- can use own image by drag image to Current Desktop
Picture area and drop it in area or open the Collections menu
and select the Choose Folder command to locate a folder where
a desired picture resides
f. Display – selects resolution; also allows Menu Barr access
g. Login Items open when booted
h. QuickTime pane – options on how movies are played in web
browser on Plug-In Tab, connection speed that QuickTime
reports to QuickTime servers
i. Screen Effects for entertainment and security; can configure
screen saver picture from Picture Folder from within Home;
activation corners
j. Software– searches internet for updates on some schedule
5. Chapter 6 – Getting Help and Searching Files
a. Help – straight forward ; search uses Boolean operators “and”,
“or”, “not “ but must be put together with symbols “+” = and,
“!” = not, | (vertical line = or). E.g. Printer ! USB finds printer
but not USB
i. Stored in Main Library Folder
/Library/Documentation/Help Folder—also may be
placed in personal user directory Library/Help but then
can be used only by you when logged in
b. Find i. generically can use Sherlock
ii. Find under File size of file, or amount of storage space
1. search by folder name in any specified place and
other criteria such as date created, date
modified, extensions
2. search by file content ; to do so files need to be
indexed; Get Info check Content Index – option
to index now and do regularly for files that
might be needed in the future; then search
specific folders for info-such as Documents
6. Chapter 7 Printing
a. Print Center - in Utilities Folder; under Print – Page Set-up &
Print Dialog boxes
b. The Quartz engine in Mac OS X actually creates a .pdf file, for
uniformity, that is then printed.
c. For Postscript printers you need to install the PPD file either
by running an installer or by placing the PPD file in
/Library/Printers/PPDs on startup disk (or in home Library
Printers)
d. By turning on Printer Sharing in the Sharing pane of the Mac in
which the USB Printer is attached, others on the Network
should be able to access it.
i. AppleTalk attaches normally via Ethernet – AppleTalk
must be turned on via Network pane for each
computer that will use the printer
ii. IP Printing – must know IP address
iii. Print Center
1. add printer – add button-select type of printer
a. Directory Services is default – printers
appear if network administrator has
preconfigured printer – select and add
b. Otherwise select type – then those that
are of that type will appear
c. Set default printer
d. Page setup from File in application (note
scale option)
e. Print command also allows one to select
the printer - see options in window
f. Preview what you will print
g. Once document goes to printer – Print
Center can be used to control jobs on
queue
7. Chapter 8 PDFs, Fonts, and Color
a. PDF
i. In Print – Option for creating PDF; allows inter –
platform exchange with intact formatting and fonts;
make certain suffix .PDF remains in tact when
transporting so that other computers know how to
handle document.
b. Fonts
i. Storage locations:
1. /System/Library/Fonts/ --required Mac OS
fonts; default fonts
2. /Library/Fonts/ -- fonts that are made available
to all users on Mac
3. ~/Library/Fonts/ --personal fonts – active only
when logged in
ii. Install—drag to appropriate folder; then restart open
applications
8. Chapter 9 - Accessory and Security Applications
a. Apple System profiler – processor – memory – applications
installed - peripheral devices - can save and email for
technical support issues
b. Disk Copy – creates a disk image – a compressed computer
file that, when double clicked, mounts a “virtual volume” that
acts just as if it were a removable disk. Can drag and drop files
from the compressed archive tp other parts of the hard disk so
that one can work with files.
i. Useful in replicating a particular type of removable
media-which can be used for storing items that will
later be copied; e.g., can be used to burn a cd.
1. can create a blank image that has no filesbuilding an image from the ground up
2. can create an image from an existing source –
CD
3. can convert an existing image into another type
of image – read only image into an image that
allows one to add files
ii. Good for compressing (Archiving) and encrypting
files; a bit tricky to work; need to play with it. Can also
save in different file formats (Mac extended, Mac
Standard, Unix, Dos)
c. Keychain Access
i. A keychain is a special database, protected by a single
password, used to store a group of other usernames and
passwords
ii. Adding:
1. from option in application
2. Manually – File-New-New Password ; entering
a url in the name entry box will create and
internet password item (include http://
3. https://global1.onlinebank.com/cgiforte/forteisapi.dll/frte_cs0?ServiceName=webt
eller&BankTag=476florence&TemplateName=
Login.htm
iii. Multiple Key chains can be created to protect different
information. (Under File-New)
1. Click on Keychains then Edit settings to create
access and protection differentially
d. Text Edit
i. RTF default – also plain text capacity , but can not add
images, change fonts (all must be the same), or change
alignments
e. Accessories and Extras
i. Applet Launcher – in Utilities; launches aJava Applets
ii. Calculator- conversion options; advanced mode
iii. Chess
iv. Clock – can be placed dock or on desk top
v. Grab – takes picture of Mac desktop – screen shot –
saves as image in PDF/TIFF format or cloverleaf-shift3; cloverleaf-shift-4
vi. Keycaps – use modifier keys also see character pallette
QuickTime™ and a TIFF (LZW) decompressor are needed to see this picture.
vii. Stickies – can be saved as files – close command, or
quick stickies saves notes in stickie’s.
9. Chapter 10 Being the Administrator: Permissions, Settings and Adding
Users
a. Shared Folder in User’s Folder – grants read and write
permissions to everyone, making it a safe place for users to
copy files that all other users should be able to access freely;
the original creator remains the owner of that file-can make it
difficult for an administrative user to delete the files – without
logging in as root, using the sudo command, or asking the file’s
owner to delete them
b. Each user also has a Public Folder (inside Home) where
everyone has read permission. Inside that folder is a Drop Box
Folder, where everyone has write permission but not read
permission. Can send file to iser via Drop Box, while
disallowing users other than “X” fro seeing what has been
placed in the folder.
c. For attached volumes (e.g., hard disks) the root level can have
wide open permissions. Check with Get Info; subsequently can
assign permissions to individual folders. Controlled via
“Others”.
d. Creating Users via Accounts pane; short name is limited to 8
characters; ; passwords are case sensitive; images are stored in
/Library/User Pictures / should be 128 X 128 pixels; click on
Allow user to Log in from Windows
e. In Unix only the first 8 characters are active for passwords
f. In accounts pane can control the applications and system’s
opetions that a user has access to; and invoke startup screen
which does not identify all users, and requires both Name and
Password, without the option to Restart and Shut Down-for
security
10. Chapter 11 Configuring Internet Access
a. Dial Up
i. Need ISP with PPP (Point to Point Protocol) - TCP/IP
Trans application to initiate modem connectionmission
Control Protocol/Internate Protocol
ii. Use Internet Connect , Network Pane-TCP/IP; PPP with
options, select modem
iii. Use Internet Connection Application to make
Connection or modem on Menu Bar to make
connection
iv. To disconnect from PPP – Disconnect in Iternet
Connection App or from Menu Bar
b. High Speed Connections
i. Manual or DHCP
c. Security and Firewalls
i. Unless you specifically wants a server on the internet
chanaging your IP address frequently is a good idea
(sign off/sign on)
ii. Firewall for Mac OS X
1. Brick House & Firewalk X are shareware
firewalls
2. Net Barrier X & Norton’s Personal Firewall are
commercial products
3. In Sharing Pane Firewall tab allows blocking of
various ports with various services
11. Chapter 12 The Web, Security, and Sherlock 3
a. Use Internet pane in system preferences to identify default
browser, where to download files, and default email program,
as well as configuringh . mac
b. Holding cloverleaf while clicking url opens web page in new
window
c. Holding control while clicking a page provides a contextual
menu
d.
e. Right clicking brings up a save window
f. Creating toolbar favorites and organizing bookmarks in general
p.302-303.
g. Tracking history of URL:s -quantified under Preferencesadvanced. Maintained in a file in Preferences – Library – in
home directory (e.g., Explorer); delete history via Browser –
Prefernces – Advanced – Clear; while there it may also be a
good idea to clear the cache – security on public mac
h. Search tab on I.E., customizable
i. Scrabook tab – saves an entire page or image and other
multimedia elemens – to add drag page to scrapbook or hit add;
to delete hold down mouse menu until option to delete appears;
you can also edit name from context menu – edit; organize
scapbook with folders and dividers
j. Subscribe – under favorites; checks sites for changes;
downloads into browser cache to load quickly
k. Page holder – opens pane to store a single web page with
multiple links – new page appears in main window – removes
need for going back and forth
l. Urls can be dragged to the desktop or dock to creat shortcuts –
after @ sign
m. Archiving websites – Save As web Archive; Options provides
whether to download pictures, movies, links, etc.; Skip Links
to other sites to limit the amount of downloading
n. Plug-ins are snipets of computer code that a web browser can
use to extend its capabilities. When browser ecounders
EMBED or OBJECT command it looks for a plug-in to handle
the code; stored in /Library/internaet/Plug-Ins/ folder inside
home folder; to set preferences hold down mouse key on image
that’s created by the plu-in
o. File Helpers – Preferences – Receiving Files –helpers; options
to alter associations of files downloaded to helper applications.,
and where to save files; can also add file types by using the
Add command.
p. Webs Security – (securing info being sent to others; web
browsers support (SSL) Secure Sockets Layer technology –
encrypts data in browser before it is sent
i. Sites should be authenticated via certificates which web
browser checks for autheticity (Verisign; Baltimore
Cyber Trust and others) Vouch that the site is the
company that it claims to be; if a mis match occurs an
alert message is issued to the browser
ii. Once authenticated encryption follows –only site can
decrypt using a public encryption key is used for
encryption; private encryption key decrypts
iii. IE Preferences; security
iv. Cookies – Saved piece of code that typically keeps data
about you on your computer, typically in the
preferences folder, tracks you on a website; can tern on
or off cookies and have alerts to decide whether to
accept/reject – under Prefences-cookies
v. Web Privacy – on web side, a site can learn the IP
address and web browser type and model that your Mac
is using & the URL of the web page that you were on
before you visited the new site
1. Browser cache – stored to make return visits
quicker; can be purged from Preferences –
Advanced
2. History – makes auto completion possible
3. Images and Ads – disabling JavaScript may do
this, as will some other programs such as:
Norton Internet Security; and Aladdin’s I Clean
q. Sherlock 3 – search/browser-multiple channels
1. Customizing – change toolbars (View –
Customize Toolbar – dialog appears
2. Add channels – Preferences – Subscriptions
12. Chapter 13 Remote Login, FTP and iChat
a. Telnet and FTP built into Terminal
b. In practice the Terminal – assessing your own Mac, assessing
remote Macs FTP; assessing remote Macs using Telnet
c. To enable remote login – System Preferences – Sharing; check
remote login – make certain to coordinate with firewall tab (p.
332).
d. Remote login can assess machine via named address or IP
e. Launch Terminal – type Telnet - enter address – return
f. iChat – can be used to chat and transfer files; get AOL account
i. Add buddies
ii. By enabling Rendezvous no need to configure names;
Rendezvous will find active users for IM
iii. File sharing – like instant email
1. Can also send file without chatting by ctrclicking on name; contextual menu appears with
option
13. Chapter 14 E-Mail and Apple Mail
a. Rules to eliminate spam; vacation; put items in specific folders
14. Chapter 18 Assessing Network Volumes
a. Choose “Go” in Finder – Connect to Server
b. Some servers appear, others type IP address
c. AFP (Apple File Sharing Server) servers – local or via url
d. Once connected a listing of available volumes/folders will
appear (additional volumes can be selected by holding down
command while clicking)
e. Can also create alias’ to access servers without going through
Go Menu – place in folder for easy access
f. In options window – include password in key chain
g. OS X 10.2 allows sharing with Windows machines using SMB
protocol; and vice versa if Windows file sharing is turned on in
Sharing Pane
i. Share point must be invoked on PC – right click on
folder and then choose Sharing giving various
privileges
ii. Use network window to connect or smb://IP
iii. Log out pulling icon to Trash or select File – Eject; or
ctrl – click right mouse button
15. Chapter 19 Building a Network and Sharing Files
a. LAN = Local area network; WAN is a group of LANs
b. Protocols TCP/IP or AppleTalk route data between computers
in an orderly fashion, making sure packets of data leaving one
computer arrive at the other
c. AFP – Apple Filing Protocol – makes it possible for Mac OS X
and earlier versions to share files via AppleShare over IP
d. FTP – serves files
e. http – serves web pages
f. Rendezvous – makes it possible for computers to configure
themselves on a TCP/IP network without relying on a DHCP or
similar server. Also allows printers to configure themselves,
iChat to find necessary resources and discover other
Rendezvous users
g. Personal File Sharing – enabled allows assess to portions of the
HD; peer-to-peer network
h. What a user sees depends on permissions (e.g., admin account
can see home folder, most of OS X startup disk, including
other user’s Public Folders, and other attached hard or
removable disks; normal account-users home directory and
Public Folders of all users on Computer
16. Chapter 23 Terminal and the Darwin Command Line
a. Unix-based operating system; non-graphical
b. Use Terminal Program to access or type Console during login
procedure (Terminal is in Utilities Folder)
c. To leave Terminal type exit and return
d. Commands:
i. pwd (print working directory) tells you where you are
in hierarchy
ii. finger – determine who is using machine
iii. cd to change directory (no argument – goes to personal
directory)
iv. ls to list the files in a directory
v. exit to log out
vi. first term in line is typically a program and the second
term is an argument (input to the program)
vii. programs may also take options which are a hypen (-)
e.g., -l with ls –l shows a more detailed listing
viii. “which” command is like a find – shows path to file
ix. built in commands from shell: type “builtins”
x. cat lists a file or series of files
xi. cp copy files: cp *.txt ~/Documents/ copies all files
that end in .txt to the Document Folder inside home
directory; cp readme.txt info.txt copies readme to info
* is a wildcard
xii. mv move or rename a file or directory mv memo.rtf
memos (moves memo.rtf to folder memos)
xiii. rm remove files or directories (use –R flag prior to
directory name to remove directory and all its contents)
xiv. mkdir makes directory
xv. rmdir removes a directory (works only on empty
directories
xvi. passwd changes the password for the account currently
logged-in
xvii. sudo root control
xviii. gzip file compression; gunzip uncompress (e.g., tar –
czf backup.tgz ~/Documents creates a compressed
archive of documents or tar -czf applicant.tgz
stephres.doc cover.doc to create a compressed archive
of 2 files pp. 570
xix. exit logout
xx. ls –l (L) gives information about the files in a directory
including permissions
1. “chmod” change permissions on files and
directories form = “chmod u+w filename”
where u, g, o, a are respectively (user “owner”,
group, others and all) + or – adds or removes a
permission r,w,x is the permission of read,
write, execute; second argument is the name(s)
of files or directory to change
a. “chmod a+w textfile.txt “ gives all users
write permission to the file
2. “chown” changes the ownership of a file or
directory ; first argument is the new owner
followed by files to change:
a. “chown stevej
/shared/documents/stevej “ (makes
stevej the owner of a folder labelled
“stevej” in shared/documents)
b. or a file could be changed: chown
“stevej /Public/memo2.doc” make sit
possible for another person to move file,
delete it, etc.
3. “chgrp” Changes the group associated with a
file or directory, similar , they also will process
all the directoryto choyn
a. chgrp authors index.html
4. All of these commands support –R before the
argument. This option makes these commands
recursive, meaning that if you use them on a
directory, they also will process all the
directorie’s files and subdirectories.
xxi. In most cases, you’ll need to use the sudo command to
change the owner of a file or directory unless you’re
logged into the root account. Thus, the above example
would actually read: “sudo chown stevej
/Public/memo2.do”c then prompted for an
administrator’s password in order to perform the
change.
17. Chapter 25 Web Serving, FTP Serving, and Net Security
a. Web – responds to requests made by remote clients via http or
downloading unrecognized files
b.
c. Web pages are stored in the Documents folder inside the
Webserver folder that’s inside the main Library Folder on the
startup disk /Library/Webserver/Documents.
d. Replace the default index.html file in the Web Documents
folder “index.html”
e. Folders with documents can be nested within this folder and
referenced accordingly
f. Must have admin status to write to the Web Documents folder.
This folder will then only have write permission for you, not all
admin’s; permissions can be changes via Info; do not give
write privileges to others
g. Adding CGI Scripts; method by which applications can be run
on the web server so that server can respond in real time to data
and other input provided by the user. E. G. can be a script
designed to send HTML form data as an email; Apache
Webserver can process CGI scripts –Perl; Applescript; C,
Objective C, Java and others (subscript to filename tells the
language used
i. Scripts should be stored in the CGI-Executable folder
found inside the Webserver folder on your Mac
(Library/WebServer/CGI-Executables); CGIExecutables folder is mapped to the standard URL
path/cgi-bin/ (do not use CGI-Executables in the URL
created (e.g., http://192.168.123.121/cgi-bin/count --where count is the script placed in the Executables
Folder)
1. OS X includes a script “test-cgi” to make certain
that the CGI feature is working.
2. Caveat: Before a script in CGI-Executables can
execute properly its permissions need to be
changed-need to use terminal for this:
a. Launch Terminal then type cd
/Library/Webserver/CGI-Executables –
return
b. sudo chmod 755 test-cgi – return (755
tells chmod to assign read and execute
permissions for the Groups and Others,
but without giving them write
permissions)
c. at password prompt enter password;
proper permissions will then be input,
and the script should execute
d. test with browser: http://ip/cgi-bin/testcgi
h. By default OSX enables users to have a personal website via
websharing by placing HTML documents in a user’s Sites
folder, making them assessable by appending ~username/ to
URL using the short username assigned (e.g.,
http://192.168.123.113/~dss/ - would cause the index.html to
appear)
i. To execute CGI scripts from here one needs to
reference the cgi-bin in the main directory (e.g., http://
192.168.123.113/cgi-bin/test-cgi)
ii. Turn on Firewall if using websharing with static IP and
turn off other sharing options for security
18. Chapter 26 Adding Internet and Network Services
a. Sreaming Video with Quicktime Steaming Server pps 630 639