Download presentation
1
Introduction to Computers
Updated 12/2014
2
What are they? Electronic devices operating under the control of instructions stored in its own memory that can: accept data (input) process the date according to specified rules (process) produce results (output) store the results for future use (storage)
3
Different Computer Types
Personal Computers Apple Dell Toshiba Phones Cameras What are other computers that you encounter throughout your day? What about a microwave? Could that be a Computer? Review the definition to fine out.
4
Components System Unit (Computer Case) Motherboard Processor aka CPU
Memory/Storage RAM ROM Hard Drive/Disk External Devices
5
System Unit/Computer Case
System Unit-case that contains electronic components of the computer used to process data What’s under the hood? Lot’s of hardware components are found inside the computer case
6
Motherboard Motherboard – main circuit board of the computer, many electronic components are either plugged in or built in to it.
7
Processor Intel Core 2 Duo E6850 Processor Processor or Central Processing Unit – Processors contain a control unit (directs and coordinates operations) and arithmetic/logic unit (performs arithmetic, comparison and other operations) Interprets and carries out the basic instructions that operate a computer. Intel DP35DPM Motherboard
8
Memory is measured in bytes.
Measuring Memory Memory is measured in bytes. Byte = one character such as the letter A Kilobyte (KB) = 1,024 bytes Megabyte (MB) = 1 million bytes Gigabyte (GB) = 1 billion bytes Terabyte (TB) = 1 trillion bytes A single byte is made up of a series of 1's and 0's normally traveling in pairs of eight. These eight 0's and 1's are called bits and they are the way the computer communicates and stores information. With each keystroke or character, even spaces, a byte of memory is used. CD can hold 700 MB, Flash Drive 8GB – which holds more? 1 gigabyte can hold about 500,000 letters-sized pages of text/information
9
RAM (Memory) RAM doesn’t remember DDR2 is the current “best” type
More is better Windows XP can run with 512MB but 1GB is better Windows Vista and Windows 7 can run with 1 GB but 2GB is better (RAM) Memory is a small removable chip that temporarily stores data when the computer is up and running. RAM (random access memory) can be cleared when the computer is shut down. ROM (read only memory) is located in the motherboard and holds the bare minimum of instructions needed to start your computer. Used for critical functions, it can't be removed.
10
500 GB drive on a desktop computer is a good starting point
Hard Drive/ Hard Disk 500 GB drive on a desktop computer is a good starting point Has movable parts that either reads data from or writes data to a disk. When an application is downloaded to the computer it is written on the hard drive so it can be accessed whenever needed. Data on Hard disk transfers to RAM for easier access by a processor.
11
Input Devices Hardware components that allow data and instruction to be entered Keyboard Mouse Microphone Other input devices are Microphone, scanner, Web camera, Touchpad, Jump Drive, Camera, MP3/Ipod, External Hard Drive,
12
Hardware components that convey information to one or more people
Printer Monitor Speakers Output Devices USB drives are also know as jump drives, thumb drive, flash drives, etc.
13
Hardware components that stores information after a computer is powered off.
External Hard Drive USB Drive Cloud Storage Storage Devices USB drives are also know as jump drives, thumb drive, flash drives, etc.
14
Cloud Storage Cloud storage is a model of networked enterprise storage
Data is stored in virtualized pools of storage which are generally hosted by third parties Hosting companies operate large data centers, and people buy or lease storage capacity from them.
15
Computer Software System software consists of programs to control the operations of computer equipment. Such as an Operating System Application software consists of programs that tell a computer how to produce information.
16
Operating System Set of programs that coordinates all the activities among computer hardware devices. Provides a means for users to communicate with the computer and other software. Instructions in the operating system tell the computer how to perform the functions of loading, storing, and executing an application program and how to transfer data.
17
Operating System Facts
When a computer is turned on, the operating system is loaded into the computer’s memory from auxiliary storage, a process called booting. Most computers use an operating system that has a graphical user interface (GUI). GUI allows users to interact with electronic devices with images rather than text commands. A GUI represents the information and actions available to a user through graphical icons and visual indicators.
18
Application Software Application Software - Series of related instruction organized for a common purpose, that tells the computer what tasks to perform and how to perform them. Programs designed to make users more productive and/or assist them with personal tasks. Microsoft Office Excel – Spreadsheet software Word – Word Processing software PowerPoint – Presentation Software Access – Database Software Outlook – Publisher – Publishing software
19
Network Collection of computers and devices connected via communications media and devices
20
Types of Networks Local Area Network (LAN) Wide Area Network (WAN) A local area network (LAN) connects computers in a limited geographic area A wide area network (WAN) covers a large geographical area
21
The World Wide Web The Internet is the world’s largest network
A Web page is a document that contains text, graphics, sound, and/or video and has built-in connections, or hyperlinks to other Web documents A Web site is a related collection of Web pages You access and view Web pages using a software program called a Web browser A Web page has a unique address, called a Uniform Resource Locator (URL) A search engine is a program that finds websites, web pages, images, videos, news, maps and other information related to a specific topic. Google is the most used search engine.
22
To better understand each element of a web address, match the colors in Figure A with the colors in Figures B-F for information on each element of the web address.
23
Search Engines Search engines are programs that find websites, web pages, images, videos, news, maps and other information related to a specific topic. Searches help you find pictures, research, and identify related information based on words Google is the most used search engine.
24
Social Media Forms of electronic communication through which users create online communities to share information, ideas, personal messages, and other content. Blog - Short for “Web Log”-online journal entries, usually made in reverse chronological order. Microblogging - Short, asynchronous messaging system. Users send messages to “followers”. Such as Twitter. Social Network - Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Such as Facebook. Wikis - A web site that can be modified by anyone, from directly within a web browser. Wikipedia is the most popular wiki but anyone can create a Wiki.
25
Types of Social Media
27
Malware Programs or files that are developed for the purpose of doing harm. Acts without a user’s knowledge and deliberately alters a computer’s operations.
28
Types of Malware Viruses Worms Code connected to a file or program
Cannot spread without human interaction Worms Similar to a virus Does not require human interaction to spread Copies itself repeatedly Can shut down a network Computer Virus-potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the user’s knowledge or permission. Worm – program that copies itself repeatedly using up resources and possibly shutting down a computer/network Trojan Horse – program that hides within or looks like a legitimate program. Does not replicate itself to other computers. Rootkit – program that hides in a computer and allows someone from a remote location to take full control of the computer. Once installed the author can access files, execute programs
29
Types of Malware Trojan Horse Rootkit
Disguised as helpful software but is not! Will not replicate or spread Rootkit Hides in computer Someone can access remotely and take over full control of computer. Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as advertising, collecting personal information, and changing the configuration of your computer. Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.
30
How to tell if you’ve been invaded?
Strange new things pop up on your system New toolbars, new homepage, new folders or files System is slow Hard drive light is busy a lot when you are not running any programs System is unstable Applications don’t run Windows crashes a lot
31
Tips for Preventing Viruses
Never start a computer with removable media inserted in the drives Never open an attachment unless it is from a trusted source. Install an antivirus program on all of your computers. Delete or quarantine any infected s, downloads or threats to your computer
32
Tips for Preventing Viruses
Scan all downloaded programs for viruses and other malware. Before using any removable media, scan the media for malware. Install a personal firewall program. Stay informed about new virus alerts and virus hoaxes.
33
Computer Maintenance Don’t throw away starter software
Shut down your computer – at least once a week Uninstall programs you are not using Backup your computer files monthly Keep all working files in one folder instead of your desktop such as My Documents. Easier to find & back up files Don’t put personal files on the C Drive File management is an important skill to keep files organized by naming files clearly and saving them in folders with like files. When saving you are unable to use special characters such as * ? / :
34
Computer Maintenance Physically clean your computer/accessories – wipe down the screen, use forced air to remove dust from keyboard Clean out your temporary files on your computer and internet Defragment your computer Change your passwords regularly Do not use personal information as a password Use different passwords
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.