Download presentation
Presentation is loading. Please wait.
Published byWesley Eric Burns Modified over 9 years ago
1
Information Technology Essentials Deloris Y. McBride
2
Information Processing Cycle A computer is a set of electronic devices that works with software to perform actions. IPC = Input – Processing – Storage – Output Input = entering data to be processed Input devices include: Keyboard, mouse, flash drives, disk drives Data = raw facts, i.e a name, a telephone, zip code Information = a collection of raw facts or processed data i.e. A record, a check
3
IPC Continued Processing Taking the data and information that were entered and breaking it down to a language that the computer understands Micro processor – a computer chip i.e, Intel, Motorola Two main parts of the processor: Control Unit and the Arithmetic Logic Unit -
4
Processing The computer understands two numbers 1 and O Coding systems ASCII and EBCDIC Bit = binary digit which is smallest unit of data 8 bits = 1 byte which can give a letter of the alphabet or a number or a symbol 0000 1111 = a character 0000 1110
5
Processing Control Unit – fetching the data, converting the data into a code, de converting ALU – is responsible for the logical way in which data is processed. RAM – Random Access Memory CPU = Central Processing Unit = Brain of the Computer
6
Storage Saving documents, information, data, games, Bit = 0 or 1 Byte = 8 bits which is a letter, number, or symbol Kilo Bytes = 1024 Mega Byte = 1 million Giga Byte = 1 billion Tera Byte = 1 trillion Pera Byte = 1 Zillion http://www.kerryr.net/pioneers/ascii3.htm
7
Storage Devices CD R CDRW Flash drives 3 ½ floppy Hard Drive External Hard drives
8
Output Information that has been processed Hard copy - Comes a Printer Print out Soft Copy - Monitor View on the Screen Two types of Printers Laser Ink Jet
9
Hardware Physical components of the computers Monitor Keyboard/mouse CPU – Brain- Systems Unit Printer Storage Devices
10
Software Two main types of software Operating Systems Windows 95, 98 Me, Vista, Windows 7 Purpose – to boot up, to install programs, to manage files Application Software Productivity software – to generates documents of all sorts Four Main types of application software Word Processing, Spreadsheets, Databases, Presentations Word Processing Program - Microsoft Word Spreadsheet Program – Microsoft Excel Database program – Microsoft Access Presentation software - PowerPoint
11
Homework First Section – Information Essentials Read and answer Knowledge Check page 28 Windows 7 – Section 1 Read and answer Knowledge Check page 15
12
Networks Purpose to share information or resources Internet – the world’s largest network all the LANS and WANS connecting Two main sub types of networks Local Area Network (LAN) smaller geographical area Wide Area Network (WAN) large geographical area
13
Network components Clients – computer stations that are connected to the network Servers – data providers that are large and powerful computers than clients Client Server
14
Network components Connectivity cables such as UTP – unshielded twisted pair cable cat 5 cable for homes cat 6 cable for business
15
Network components Protocols 802.11n is the current Wi-Fi standard 150 Mbps can range 70 meters indoors and 250 outdoors. TCP/IP Transfer Control Protocol/Internet Protocol defines the rules for sending and receiving data between networks. Each device on the network has an IP address (a series of numbers from 0 to 255 i.e. 192.168.0.1
16
Network components HTTP (HyperText Transfer Protocol – defines the rules for sending and receiving web pages HTTPs (HyperText Transfer Protocol ) encrypts data before sending it over the Web. POP3 is the current version of Post Office Protocol for receiving email. It is a store and forward system in which your email waits on the mail server until you pick up via an email application. SMTP (Simple Mail Transfer Protocol) enables you to send email. The message is transferred to the recipient’s mail server on the Internet. FTP (File Transfer Protocol) provides an efficient, fast way to transfer files between computers.
17
Security Issues Viruses Worms Trojan – malware that masquerades as a useful program Spyware Adware Protection software McAfee, VirusScan, Spyware detectors included with Windows 7 and Vista
18
Email Etiquette and Computer ethics Ethics are the more principles that govern behavior. Email Etiquette be brief and to the point don’t use all caps remember attachment Use spell check reread what was written double check address in the in box watch your language always enter something in the subject line
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.