Presentation is loading. Please wait.

Presentation is loading. Please wait.

Police Technology Chapter Two

Similar presentations


Presentation on theme: "Police Technology Chapter Two"— Presentation transcript:

1 Police Technology Chapter Two
Computer Basics Copyright : Hi Tech Criminal Justice, Raymond E. Foster

2 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Learning Objectives Understand the basic hardware and software components of a Desk Top Personal Computer (PC). The difference between Operating Systems and Applications software. The difference between and Flat File and Relational Database Copyright : Hi Tech Criminal Justice, Raymond E. Foster

3 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Binary Number System A mathematical counting scheme that has only two digits – zero (0) and one (1) which are combined to represent our ten- digit counting scheme. Today’s computers use this off/on scheme to represent the binary digits, commonly referred to as bits, 1 and 0. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

4 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Binary Number System It is simple for computers to translate binary digits into a sixteen digit-based code called hexadecimal. This coding system is a compromise between our abilities and the computer that allows us to interface. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

5 ASCII The standard computer code configuration
that works with computer bits is called the American Standard Code for Information Interchange (ASCII). Binary digits A byte is eight bits, or a series of eight ones and zeros. Byte ASCII Words you can read! Copyright : Hi Tech Criminal Justice, Raymond E. Foster

6 Interface Means to Interact
User interface is how we interact with the computer, e.g. the keyboard and mouse are user interface inputs and the monitor is the computer’s user interface output Copyright : Hi Tech Criminal Justice, Raymond E. Foster

7 Your Computer as a System
A computer system can considered as three broad categories of components: Hardware Software Firmware Copyright : Hi Tech Criminal Justice, Raymond E. Foster

8 Your Computer as a System
The user is a human being. The input devices are the computer keyboard, mouse, and microphone. The output devices are the monitor, speakers, printer, and various storage media. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

9 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Hardware Input/output devices are referred to as peripheral devices. Think of a peripheral device as any device not inside the computer case. They communicate with the main part of the computer using ports. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

10 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Hardware In addition to receiving information directly from human users via input devices, computers can receive information from other computers. This is done via a network, e.g. the Internet. Network information can come to the computers through: Hard lines (standard telephone line) Wireless (via radio signals) Copyright : Hi Tech Criminal Justice, Raymond E. Foster

11 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Hardware Computers have the ability to store information: Floppy Disks Compact Discs (CDs) Digital Video Discs (DVDs) Copyright : Hi Tech Criminal Justice, Raymond E. Foster

12 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer The systems board, or motherboard, is the brain of the computer. The motherboard contains a series of micro chips that are connected together by circuitry. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

13 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer Circuits, like wires or cables, transmit electrical signals containing binary data between the various microchips. The microchips in the computer can detect the presence or absence of electronic impulses. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

14 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside The Computer The Motherboard contains three types of memory chips: The Central Processing Unit (CPU) The Read-only Memory (ROM) The Random Access Memory (RAM) Copyright : Hi Tech Criminal Justice, Raymond E. Foster

15 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer The CPU has three core sets of instructions that it carries out: Mathematical computations (addition, subtraction, division); Moving data or information from one memory location to another; and, Making decisions and moving to a different set of instructions based upon those decisions. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

16 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer Random Access Memory (RAM) chips contain information only when your computer is on. When you turn off the computer, the memory in the RAM disappears. Also known as Volatile storage! Copyright : Hi Tech Criminal Justice, Raymond E. Foster

17 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer Read Only Memory (ROM) Contains the basic set of instructions that are required to start the computer. Memory was installed during the manufacturing process. ROM (BIOS instructions) is a permanent part of the chip. Also known as Non- Volatile storage! Copyright : Hi Tech Criminal Justice, Raymond E. Foster

18 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer The Motherboard contains….. A Complementary Metal Oxide Semi-conductor (CMOS) configuration chip. A system clock. Expansions slots. RAM memory. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

19 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer The CMOS Chip: Responsible for remembering what hardware is in your computer. Necessary for your computer to initially organize itself. If you added a new drive, card, or peripheral device, your CMOS information would change. Volatile (information can be lost) so it has its own battery with constant power Copyright : Hi Tech Criminal Justice, Raymond E. Foster

20 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer Random Access Memory (RAM) …………. Contains information your computer is working with now (What is on the screen). Has to be limited in the amount of information it can contain. Once you are finished using the RAM and move on to another project, what was in RAM is dumped. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

21 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer Cache Memory contains memory your computer anticipates you might need, similar to the human brain. It makes assumptions about what information you might need based on certain programming. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

22 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer A BUS Contains the electrical pathways and directions for use of those pathways that the information uses while inside a computer. The small metal tracings in the circuit board take the place of wires to conduct electricity. The bus is these traces and the instructions for their use. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

23 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer CMOS Chips Continually hold the information on the configuration of your computer. When you turn on the computer, the startup process is called a booting. When a computer is booted from the power- off condition, it is called a “hard boot.” If you push the reset button, you are performing a “soft boot.” Copyright : Hi Tech Criminal Justice, Raymond E. Foster

24 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Inside your Computer The Random Access Memory (ROM) contains a set of permanent instructions known as the basic input/output system (BIOS). Sometimes referred to as the ROM BIOS or Flash BIOS. ROM chips are a hybrid of both hardware and software. It is a physical component with embedded software. ROM chips are sometimes referred to as firmware. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

25 Information on the Motherboard, except the ROM chip, is volatile.
Inside Your Computer Information on the Motherboard, except the ROM chip, is volatile. Long term or secondary storage are non-volatile: Hard disks; Zip disks; Floppy disks; Cassette tapes; CD-ROMs; and, DVDs. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

26 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Software Instructions that tell hardware what to do; or, A set of instructions written in a language that the computer can understand. Two broad classifications of software: Operating Systems (also called platform) Applications Copyright : Hi Tech Criminal Justice, Raymond E. Foster

27 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Operating Systems The operating system is the computer’s traffic cop. Tells the computer what to do. The computer software that controls and coordinates the interaction among the hardware elements and between the hardware and the application programs. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

28 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Operating Systems After your computer has booted and CMOS hands your computer over to the operating system the operating system has two primary functions: Managing the hardware and software. It provides application program interface (API). Copyright : Hi Tech Criminal Justice, Raymond E. Foster

29 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Disc Operating System DOS is probably the most common operating system. Users interface with a DOS in one of three ways: A command driven interface; A menu-driven interface; or, An icon-driven interface. Most police employees work with an icon-driven interface that is also called a graphical user interface (GUI). Copyright : Hi Tech Criminal Justice, Raymond E. Foster

30 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Applications Applications software allows the user to work with information in the computer. Applications are specific programs that allow the user to do specific tasks such as word processing. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

31 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Databases A collection of organized information that is centrally located and designed to meet the needs of users. There are two classifications of databases: Flat file Relational Database Copyright : Hi Tech Criminal Justice, Raymond E. Foster

32 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Forced Choice Formats Many state and local police agencies use software that allows them to configure data entries to match their specific data dictionary. Through the use of forced-choice formats, GUI software restricts data entries to previously determined attributes, properties or characteristics. Screen capture provided by Crimestar Corporation Copyright : Hi Tech Criminal Justice, Raymond E. Foster

33 Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Useful Terms Multi-media is the different forms of media being used by any particular application. Multimedia applications can include graphics, animation, sound, and video elements A scalable system can be adapted and expanded to meet increased needs. Most legacy systems are proprietary. The system manufacturer (either hardware, software, or both) will not reveal the systems specifications so that other firms may not duplicate the product. Also known as a closed architecture. Copyright : Hi Tech Criminal Justice, Raymond E. Foster

34 Police Technology Discuss criminal justice issues
Copyright : Hi Tech Criminal Justice, Raymond E. Foster


Download ppt "Police Technology Chapter Two"

Similar presentations


Ads by Google