Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware.

Similar presentations


Presentation on theme: "Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware."— Presentation transcript:

1 Introduction to Computers Chapter 1

2 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware.

3 3 Input/Output/Peripheral Input Devices: Keyboard, mouse, scanner, etc. Output Devices: Printer, CD Burner, monitor Peripheral Devices: Expansion slots

4 4 Motherboard Expansion boards Central Processing Unit Bus ROM (Read Only Memory) RAM (Random Access Memory)

5 5 Data Flow

6 6 Utility Program A program Manages Files Disk Doctor CD/DVD Drive Driver needed for printing

7 7 Mobile Computing Devices Notebook Computers Tablet PC Handheld Computers (PDA) Smartphones Wearable Computers - MP3 Players

8 8 Cross-Platform Connectivity The ability for one type of PC to link to and share data with a different type of PC

9 9 Programming Languages Words Codes Symbols That allow a programmer to give instructions to the computer

10 10 Low/High Level Program Language Low-Level: include machine language and assembly language High Level: English-like instruction and are easier to use than machine language

11 11 Complier/Interpreter Complier: A program that converts an entire program into machine code before the program is executed. Interpreter: Translates and executes an instruction before moving on to the next instruction in the program.

12 12 Object-Oriented Language Java C++ Visual Basic.Net

13 13 Advantages of Networking 1. Allows users to reliably share and exchange data 2. Can reduce costs by sharing devices such as printers 3. Offers security options including password protection to restrict access to certain files 4. Simplifies file management through centralized software updates and file backups 5. Provides e-mail for network users

14 14 Network Size LAN: Local-Area Network WAN: Wide-Area Network

15 15 Chapter 1 LAN Using a Bus Topology

16 16 Chapter 1 LAN Using a Star Topology

17 17 Chapter 1 LAN Using a Ring Topology

18 18 NETIQUETTE Network users should follow a certain etiquette referred to as netiquette: *Do not attempt to access the account of another user without authorization. *Do not share your password, and change it periodically *Use appropriate subject matter and language, and be considerate of other people’s belief and opinions.

19 19 Binary The electrical circuits on a computer has one of two States, off or on. Therefore the binary number system (base 2), which only uses two digit (0 and 1), was adopted for use in computers. Decimal BinaryBase 2 Equivalent 00=0×2 1 +0×2 0 =0×2+0×1=0+0 11=0×2 1 +1×2 0 =0×2+1×1=0+1 210=1×2 1 +0×2 0 =1×2+0×1=2+0 311=1×2 1 +1×2 0 =1×2+1×1=2+1 4100=1×2 2 +0×2 1 +0×2 0 =1×4+0×2+0×1=4+0+0

20 20 Chapter 1 Storing Data in Memory Computer memory is measured in bytes. MB - Megabytes which means 1,048,576 and GB – Gigabytes 1,073,741,820 bytes.c Data stored in memory is referred to by an address. An address is a unique binary representation of a location in memory. Therefore, data can be stored, accessed, and retrieved from memory by its address.

21 21 What is a File? *Human-readable files are called text files, and computer readable files are called binary files. Files type are distinguished by the extension that comes after the file name

22 22 Extensions.exe Executable.xls Excel.doc Document.jpg Graphic.class Complied java file.gif GIF image file.bmp Bitmap graphic.zip Compressed file

23 23 Storage Devices Storage devices use a persistent media to maintain files. These devices, which are also referred to as drives, mass storage, and auxiliary storage, can be categorized in three ways: Internal or external Removable or permanent media Magnetic, optical, or solid state technology

24 24 Storage Devices Optical Technology - uses a drive with a laser and an optoelectronic sensor. Solid State Technology - allows for the smallest, most portable storage Magnetic Technology - allows for storage devices that range in capacity from 1.44MB to many gigabytes on hard disk drives.

25 25 Chapter 1 Storage Devices Storage media can be very sensitive. Care should be taken to avoid damaging files. Never attempt to open a case containing a disk. Keep magnetic media away from magnets. Handel CD / DVDs by the center hole or by the edges. Never bend CD / DVDs or other flexible media. Store CD / DVDs in a jewel case or sleeve to prevent scratches. Keep media away from moisture and extreme temperatures.

26 26 Chapter 1 Intranet, Extranet, Internet Intranet - is a network that is used by a single organization, such as a corporation or school, and is only accessible by authorized users. Extranet - extends an intranet by providing various levels of accessibility to authorized members of the public. Internet - Is the largest and most widely accessed network. The Internet, is a worldwide network of computers that is not controlled by any one organization.

27 27 Chapter 1 Telecommunications Telecommunications - is the transmitting and receiving of data. Numerous telecommunications options are available, which vary in speed and cost: Conventional Modem - Uses standard telephone lines to convert analog signals to digital data. A conventional modem is a 56 Kbps modem, which transmits data at 28.8 Kbps and 36.6 Kbps, and receives data at 56 Kbps. Home computers sometimes use a conventional modem. DSL (Digital Subscriber Line) - DSL modem uses standard telephone lines with data transmission up to 640 Kbps. Data receipt is from 1.5 Mbps to 9 Mbps. A DSL (Asymmetric DSL) is the most common form used

28 28 Telecommunications Cable Modem - Transmits data through a coaxial cable television network. Data transmission is from 2 Mbps to 10 Mbps and data receipt is from 10 Mbps to 36 Mbps. Leased / Dedicated Lines - are used by many businesses and schools for Internet access. They allow for a permanent connection to the Internet that is always active. The cost of a leased line is usually a fixed monthly fee. A T-1 carrier is a type of leased line that transmits data at 1.544 Mbps. ISDN (Integrated Services Digital Network)- is a digital telephone network provided by a local phone company. ISDN is capable of transmitting and receiving data at up to 64 Kbps. ISDN requires the use of an ISDN terminal adapter instead of a modem.

29 29 E-Mail christina@lpdatafiles.com User Name Domain Name

30 30 E-Mail Certain rules should be followed when composing e-mail messages Use manners.Include “please” and “thank you” and also properly address people you do not know as Mr., Ms., Mrs., Dr., and so on. Be Concise. Be professional, which includes using the proper spelling and grammar. Re-read a message before it is sent. Always fill in the “To Box” last to avoid sending a message before it is complete.

31 31 E-Mail E-mail messages are not private. Send messages through your account only. Use appropriate subject matter and language Be considerate of other people’s beliefs and opinions.

32 32 Finding Information on the Web and Downloading Files A search Engine - is a program that searches a database of web pages for keywords and then lists hyperlinks to pages that contain those keywords. Commonly used search engines include: Yahoo! (www.yahoo,com)Google (www.google.com) www.yahoo,comwww.google.comwww.yahoo,comwww.google.com MSN (www.msn.com)AOL (www.aol.com) www.msn.comwww.aol.comwww.msn.comwww.aol.com Excite (www.excite.com)Ask Jeeves (www.ask.com) www.excite.comwww.ask.comwww.excite.comwww.ask.com Overture (www.overture.com)Lycos (www.lycos.com) www.overture.comwww.lycos.comwww.overture.comwww.lycos.com Web Crawler (www.webcrawler.com)Fast Search (www. www.webcrawler.com

33 33 Internet Privacy Issues Online Profiling The collection of data a about consumers visiting a website is a marketing technique. Example: Cookies or Web Beacons

34 34 Internet Privacy Issues Cookies: a text file created by the server computer when a user enters information into the website. Each time the user visits the website the server recognizes the user. Web Beacons: are transparent graphics located on web pages or in e-mail messages that are used in combination with cookies to collect data about web page users or e-mail senders.

35 35 Internet Privacy Issues Privacy Policy: is a legally binding document that explains how any personal information will be used. Several laws have been passed to protect the consumers privacy. Electronic Communications Privacy Act of 1986 Electronic Freedom of information Act of 1996 Children’s Online Privacy Protection Act of 1998 Safety and freedom through Encryption Act of 1999

36 36 The Social and Ethical Implications of Computer Use The society in which we live has been so profoundly affected by computers that the historians refer to the present time as the Information Age.

37 37 Protecting Computer Software and The society in which we live has been so profoundly affected by computers that the historians refer to the present time as the Information Age.

38 38 Protecting Computer Software and Data As society becomes more and more reliant on digital information, copyright and exposure to malicious code have become two important issues among computer users. Copyright is protection of digital information.

39 39 Protecting Computer Software and Data Three forms of malicious code are: Virus Trojan Horse Internet Worm

40 40 Careers The growth of computers, the Internet, and the Web have created many new job opportunities in the IT field. Data-entry Operator Systems Analyst Programmer Computer Engineer Technical Suppot Technician

41 41 The Social and Ethical Implications of Computer Use Identity Theft is a growing crime where personal information is stolen electronically in order to make fraudulent purchases or loans.

42 42 MLA Citations General citation for material located at a website: Author’s Last Name, First Name MI. Site Title. Access date. Organization name.. Example citation of a personal website: Rawlings, Julie. Home page. 23 Dec. 2006.. continued next slide

43 43 MLA Citations, continued Example citation of an article in an online magazine: Schiffman, Paula. "Making Vinegar at Home." Vinegar Monthly. 4 May 2006.. Example citation of a posting to a discussion list: Cruz, Anthony. "Are Orchestras Going Downhill?" online posting. 10 Oct. 2006. Tuscon Annual Ballet Conf..


Download ppt "Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware."

Similar presentations


Ads by Google