Upload
scott
View
69
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Computers and Computer Systems. Computing Fundamentals IC3. Major Unit Concepts. Understand the importance of computers. Define computers and computer systems. Classify computers. Use computer systems. Identify system components. Identify types of storage devices. - PowerPoint PPT Presentation
Citation preview
Computing Fundamentals 1
Computers and Computer Systems
Computing Fundamentals IC3
Computing Fundamentals 2
Major Unit Concepts Understand the importance of computers. Define computers and computer systems. Classify computers. Use computer systems. Identify system components. Identify types of storage devices. Explore computers in your future.
Computing Fundamentals 3
Vocabulary arithmetic/logic
unit (ALU) central
processing unit (CPU)
circuit board computer control unit Data
hard disk hardware information memory mobile device motherboard notebook
computer
Computing Fundamentals 4
Vocabulary random access memory
(RAM) read-only memory
(ROM) server software supercomputer tablet PC USB flash drive
Computing Fundamentals 5
Understanding the Importance of Computers The computer is one of the most important
inventions of the past century. You find computers and computer
technology everywhere—from businesses and financial organizations, to home electronics and appliances, to personal applications.
Computing Fundamentals 6
Understanding the Importance of Computers (continued)
Computers are used everyday: Educational institutions use computers to enhance
instruction and learning. Video game systems are computerized. Banks use ATM’s so you can withdrawal money from
you bank account in almost any location in the world.
Computers are used by television and at the movies. Mobile computing, text messaging, or email allow
you to communicate with people almost everywhere.
Computing Fundamentals 7
Understanding the Importance of Computers (continued)
Computers have been around for more than 60 years. A Brief History of the Computer:
The first computers were developed in the late 1940s and early 1950s for use by the military and government.
In 1971, Dr. Ted Hoff developed the microprocessor.
The first Apple computer was built in 1976 by Steve Jobs and Steve Wozniak.
The IBM PC was introduced in 1981 by Bill Gates. He worked with IBM to develop the first Disk Operating System.
Computing Fundamentals 8
Defining Computers and Computer Systems A computer is an electronic device that receives
data (input), processes data, stores data, and produces a result (output).
A computer system includes hardware, software, data, and people.
Computing Fundamentals 9
Defining Computers and Computer Systems (continued) The actual machine—wires, transistors, and
circuits—is called hardware. Software consists of instructions or
programs for controlling the computer. Data is text, numbers, sound, images, or
video. The computer receives data through an
input device, process the data, produces the output (or information), and stores the data and information on a storage device.
Computing Fundamentals 10
Defining Computers and Computer Systems (continued)
Computers perform only 2 operations: Arithmetic Computations: addition,
subtraction, multiply, divide, and comparisons.
Logical Operations: AND, OR, and NOT
Computing Fundamentals 11
Classifying Computers Special-purpose computers are used mostly
to control something else. General-purpose computers are divided into
categories, based on their physical size, function, cost, and performance:
Desktop and notebook computers
Server Mobile devices Tablet PC Mainframe computer
Supercomputer Embedded computers Portable players Calculators Computer game systems Electronic book readers
Computing Fundamentals 12
Using Computer Systems Computers are used for all kinds of tasks.
They take raw data and change it into information. An example of the procedure: You enter programs and data with some type
of input device. The computer uses instructions to process
the data and to turn it into information. You send the information to some type of
output device. You store it for later retrieval.
Computing Fundamentals 13
Using Computer Systems (continued)
Computer components
Computing Fundamentals 14
Identifying System Components The motherboard is a circuit board that
contains integral components—central processing unit, memory, connectors, and expansion ports and slots.
Computing Fundamentals 15
Identifying System Components (continued)
The Central Processing Unit: The central
processing unit (CPU) is the brains of the computer.
The CPU has two primary sections: the arithmetic/logic unit and the control unit.
Computing Fundamentals 16
Identifying System Components (continued) The Arithmetic/Logic Unit: The arithmetic/logic unit (ALU) performs
arithmetic computations and logical operations. The Control Unit: The control unit coordinates all of the
processor’s activities. You communicate with the computer through
programming languages. The computer uses machine language, or binary
code, which contains only 1s and 0s.
Computing Fundamentals 17
Identifying System Components (continued)Recognizing How a Computer Represents Data: In machine language, the control unit sends out
necessary messages to execute the instructions. A single zero or a single one is a bit. A byte is a single character. Each bit is equal to 1 byte.
Computing Fundamentals 18
Identifying System Components (continued)
Memory Memory is where data is stored on the
motherboard. Memory can be short term or long term. When you want to store a file or information
permanently, you use secondary storage devices such as the computer’s hard drive or a USB drive. You might think of this as long term memory.
Computing Fundamentals 19
Identifying System Components (continued)
Random Access Memory The memory on the motherboard is short
term, called random access memory (RAM). Data, information, and program instructions
are stored temporarily on a RAM chip and disappear when the computer is turned off.
Computing Fundamentals 20
Identifying System Components (continued)
Random Access Memory (cont) The instruction cycle is the amount of time
it takes to retrieve instructions to perform a specified task and complete the command.
The execution cycle refers to the amount of time it takes the CPU to execute the instruction and store the results in RAM.
Computing Fundamentals 21
Identifying System Components (continued)
Random Access Memory (cont) Together, the instruction cycle and one or
more execution cycles create a machine cycle.
Computing Fundamentals 22
Identifying System Components (continued)
Random Access Memory (cont): For every instruction, a processor repeats a set of
four basic operations, which compose a machine cycle:
1. Fetching is the process of obtaining a program instruction or data item from RAM
2. Decoding refers to the process of translating the instruction into signals the computer can execute.
3. Executing is the process of carrying out the commands.
4. Storing, in this context, means writing the result to memory (not to a storage medium).
Computing Fundamentals 23
Identifying System Components (continued) Random Access Memory (cont):
Computing Fundamentals 24
Identifying System Components (continued) Read-Only Memory: Another type of memory found on the
motherboard is read-only memory (ROM). ROM chips store specific instructions that
are needed for computer operations. These instructions remain on the chip even when the power is turned off.
The more common of these is the BIOS ROM, containing instructions to start the system when you turn on the computer.
Computing Fundamentals 25
Identifying Types of Storage Devices
To keep a permanent copy of data, you must store it on a storage device.
Magnetic Storage Devices: Data is stored in numbered Tracks. Tracks are labeled and kept in a special
log on the disk called a file allocation table (FAT).
Types of magnetic storage media include hard disks, magnetic, tape, 3 ½ -inch disks and zip disks.
Computing Fundamentals 26
Identifying Types of Storage Devices
Hard Disks: Also called hard drives Store date inside the computer Can be internal or external Internal hard disks advantages: speed and
capacity Size measured in gigabytes or terabytes.
Computing Fundamentals 27
Identifying Types of Storage Devices (continued)
Optical Storage Devices:
Use laser technology to read and write data on plastic platters that contain a metal layer, like CDs and DVDs.
CD-R - Can be ready only by CD-ROM drive. After it is written, it cannot be changed.
CD-RW- Rewritable type that allows you to write on it several times.
Blu-Ray – Provides more than 5 times the storage capacity of traditional DVD’s. Can hold up to 50 GB and was developed for HD videos.
Computing Fundamentals 28
Identifying Types of Storage Devices (continued)
Solid-State Storage Media Removable medium that uses integrated circuits, such as
a USB flash drive. Processed electronically and contains no mechanical
devices. Can be used in cameras, smart phones, and computers. USB flash drive is most popular removable storage device.
Computing Fundamentals 29
Identifying Types of Storage Devices (continued)
Network Drives Hard drive or tape drive connected to a
network server and is available to and shared by multiple users.
Located on a computer other than the local user’s computer.
Remote storage is used to extend disk space on a server and to eliminate the addition of more hard disks or other storage devices.
Computing Fundamentals 30
Caring for Storage Media Keep away from magnetic fields. Avoid extreme temperatures. Remove media from drives and store them
properly when not in use. When handling DVDs and other optical
discs, hold them at the edges. Never try to remove the media from a drive
when the drive indicator light is on. Keep discs in a sturdy case when
transporting.
Computing Fundamentals 31
Exploring Computers in Your Future
A major focus of new types of computers is connectivity, or the ability to connect with other computers.
Wireless and mobile devices are now as common as wired desktop machines.
Computer literacy, which is the knowledge and understanding of computers and their uses, will become even more important.
Computing Fundamentals 32
Assignments
TIC-TAC-TOE Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—horizontally, vertically, or diagonally—or in the 4 corners, you made decide to be finished. Or you may decide to keep going and complete more activities.
Star the activities you plan to complete. Color in the box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE Review Take end of section quiz
Computing Fundamentals 33
Continue on to next section
Computers and Computer Systems 34
Input, Output, and Processing
Computing Fundamentals IC3
Computing Fundamentals 35
Major Unit Concepts
Identify and describe standard and specialized input devices.
Identify and describe standard and specialized output devices.
Connect input and output devices to a computer.
Consider computer performance factors.
Computing Fundamentals 36
Vocabulary
audio input biometrics digital camera expansion slot FireWire inkjet printer input
keyboard laser printer modem monitor mouse output plug and play
Computing Fundamentals 37
Vocabulary (continued)
pointing device port printer scanner trackball Universal Serial Bus (USB)
Computing Fundamentals 38
Standard Input Devices
Input , which is data , must be entered into computer and then stored on a storage media device.
To turn the data into information, CPU (Central Processing Unit) processes the data.
After data is processed, it is “presented” to the user through an output device.
Computing Fundamentals 39
Standard Input Devices (continued)
Input devices allow you to enter data and commands.
A modem is a device that allows one computer to talk to another.
Keyboards The keyboard is the most commonly
used input device for entering text and numbers into a computer.
Computing Fundamentals 40
Standard Input Devices (continued)
Keyboards (continued): Ergonomic Cordless/wireless Specialized Security Foldable/flexible Laser/virtual
Computing Fundamentals 41
Standard Input Devices (continued) Pointing Devices: A pointing device is an input device you
use to position the pointer on the screen.
The most common pointing device for personal computers is the mouse.
Mechanical Optomechanical Optical Wireless Trackball mouse Radio frequency Foldable mouse
Computing Fundamentals 42
Standard Input Devices (continued) Pointing Devices (continued): The trackball works like a mouse turned
upside down; the ball is on top of the device.
A common feature on laptop computers is the touchpad, with a specialized surface that can convert the motion and position of your fingers to a relative position on screen.
Computing Fundamentals 43
Standard Input Devices (continued) Pointing Devices (continued): Some notebook computers contain a
pointing stick, a pressure-sensitive device that looks like a pencil eraser and is located on the keyboard, generally between the G, H, and B keys.
Audio input is sound entered into a computer.
Computing Fundamentals 44
Standard Output Devices Output is data processed into a useful
format. Monitors: Desktop computers typically use a monitor
as their display device, including CRT, LCD, and gas plasma.
Computing Fundamentals 45
Standard Output Devices (continued) Printers: Printers produce a paper copy, or hard
copy, of processing results. A laser printer produces high-quality
output. An inkjet printer provides good-quality color
printing for less expense. Speakers: Speakers and headsets generate sound.
Computing Fundamentals 46
Specialized Input Devices Digital Cameras: The pictures you take are stored digitally
and then transferred to the computer’s memory.
Computing Fundamentals 47
Specialized Input Devices (continued)
Game Controllers: You use joysticks and wheels most
often for games.
Computing Fundamentals 48
Specialized Input Devices Scanners/Bar Code Readers: Scanners are devices that can change
images into codes for input to the computer. Image scanners Bar code scanners Magnetic scanners Wireless scanners Optical character recognition (OCR) and
optical mark recognition (OMR) scanners
Computing Fundamentals 49
Specialized Input Devices (continued) Touch Display Screen: A special screen that reacts to direct
touches within the display area, usually from a person’s finger or hand.
Computing Fundamentals 50
Specialized Input Devices (continued) Stylus: A stylus and digital
pen are pen-like writing instruments used to enter information by writing on a screen on a mobile device or using the pen as a pointer.
Computing Fundamentals 51
Specialized Input Devices (continued) Environmental Probes and Sensors: Workers can view information such as the
temperature and humidity of a remote environment, smoke detector readings, and pollution control readings.
Remote Controls: Used to manage devices such as
televisions, lights, and fans.
Computing Fundamentals 52
Specialized Input Devices (continued) Security Devices: Biometrics is an authentication technique
using automated methods of recognizing a person based on a physiological or behavioral characteristic. Enrollment Submission Verification
Computing Fundamentals 53
Specialized Input Devices (continued) Virtual Devices: Use the synchronized positioning of light-
emitting and sensing devices to detect user input.
Computing Fundamentals 54
Specialized Input Devices (continued) Touch-Sensitive Pads: On a portable device, enables you to scroll
through a list, adjust the volume, play music, view videos or pictures, and customize settings.
Input Devices for the Physically Challenged:
A variety of special input devices are available for the physically challenged.
Computing Fundamentals 55
Specialized Output Devices Projectors Fax machines and fax modems Multifunction printer Control devices/robots
Specialized Printers: Thermal Mobile Label and postage Plotters/large-format
Computing Fundamentals 56
Specialized Output Devices (continued)
Output Devices for the Physically Challenged: Screen magnifiers Screen readers Voice synthesizers
Computing Fundamentals 57
Connecting Input and Output Devices to a Computer Ports and Connectors: A port, also called a jack, is an interface to
which a peripheral device attaches to or communicates with the system unit or other peripheral devices.
A Universal Serial Bus (USB) port can connect up to 127 peripheral devices with a single connector and transfer data at rates of up to 200 million bits per second (Mbps).
Plug and play refers to the ability of a computer system to configure expansion boards and other devices automatically.
Computing Fundamentals 58
Connecting Input and Output Devices to a Computer (continued) Ports and Connectors (continued): Another type of external bus is FireWire, which
supports data transfers up to 400 Mbps and can connect up to 63 external devices.
Special-purpose ports are: SCSI IrDA Bluetooth
Expansion slots are openings on the motherboard where an expansion board can be inserted.
Computing Fundamentals 59
Connecting Input and Output Devices to a Computer (continued) Hardware Installation: For most hardware devices to work, they
need a set of instructions that communicates with the computer’s operating system. This set of instructions is called a driver.
If the operating system already contains the driver, it performs an automatic plug and play, installation for newly connected devices.
Computing Fundamentals 60
Considering Computer Performance Factors A variety of factors can affect a computer’s
performance. Microprocessor: The higher the
generation, the faster and better the processing speed.
Random Access Memory (RAM): Helps to speed up the processing cycle.
Hard disk: The bigger and faster the hard drive, the faster it can process data.
Video: Need adequate video memory.
Assignments
TIC-TAC-TOE Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—horizontally, vertically, or diagonally—or in the 4 corners, you made decide to be finished. Or you may decide to keep going and complete more activities.
Star the activities you plan to complete. Color in the box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE Review Take end of section quiz
Computing Fundamentals 61
Computing Fundamentals 62
Continue to the Next Section:
Computers and Computer Systems 63
Computer Protection
Computing Fundamentals IC3
Computing Fundamentals 64
Major Unit Concepts Protect from hardware from theft. Data Protection Identify environmental factors that can
damage computers. Identify common hardware problems.
Computing Fundamentals 65
Vocabulary backup data theft driver encryption humidity ping power spikes surge suppressor
uninterruptible power supply (UPS)
Computing Fundamentals 66
Protecting Computer Hardware from Theft and Damage In addition to the capital loss of equipment
and the related down time until it is replaced, losing sensitive and confidential information through theft or damage could have long-term consequences.
One safeguard you can use to prevent theft in the workplace is to physically secure equipment, especially items such as notebook computers, handheld devices, cell phones, and other transportable devices.
Computing Fundamentals 67
Protecting Computer Hardware from Theft and Damage (continued)
In addition, apply the following safeguards to help protect computer hardware from theft: Use security locks and/or tabs to secure the
equipment to the desk or other furniture. Attach an alarm that will sound if the equipment
is moved from its designated location. Mark all equipment with an identification tag or
symbol that can be traced. Insure the equipment. Use a designated schedule to back up data to a
separate system.
Computing Fundamentals 68
Protecting Computer Hardware from Theft and Damage (continued)
Another type of theft that is sometimes overlooked involves employees accessing in a company’s computer for personal use.
Computing Fundamentals 69
Safe Guarding Data
Data Thieves steal laptops and servers, they can access company’s network and bypass companies security measures.
Data theft can occur when older systems are discarded and the data is not completely deleted.
Computing Fundamentals 70
Safeguarding Data In most instances, hardware can be replaced when it
is stolen or damaged. Data, on the other hand is a critical component of
most businesses and is not easily replaced. The risk and severity of data theft is increasing due
to four predominant factors: The value of data stored on computers. Massive amounts of confidential data being
stored. Increased use of mobile devices outside a secure
network. Increased proficiency of data hackers and
thieves.
Computing Fundamentals 71
Safeguarding Data (continued) Many businesses and organizations use data
encryption to protect their data. Encryption is a secure process for keeping confidential information private. The data is scrambled mathematically with a password or a password key and is unreadable until it is decrypted.
Computing Fundamentals 72
Safeguarding Data (continued)
Data Backup: Even saved data can be lost or corrupted by:
Equipment failure Software viruses Hackers Fire or water damage Power irregularities
Because data is so valuable, you must back up important files regularly to removable disks or some other independent storage device.
Computing Fundamentals 73
Safeguarding Data (continued) A hard disk crash can result in serious loss
of data if not properly backed up. Backup procedures should place priority on
files that would be difficult or impossible to replace or reconstruct if they were lost, such as a company’s financial statements, important projects, and works in progress.
Computing Fundamentals 74
Identifying Environmental Factors that Can Damage Computers Environmental factors such as temperature,
humidity, and electrical fields also can contribute to hardware and software damage.
Temperature: A temperature range of 68 to 75 degrees is
optimal for system reliability. You should not operate computer
equipment in a room where the temperature exceeds 85 degrees.
Computing Fundamentals 75
Identifying Environmental Factors that Can Damage Computers (cont.)
Humidity: A high level of humidity can cause
computers to short circuit, resulting in the loss of data and damage to hardware.
Components to rust. For optimal performance, the relative
humidity of the computer room should be above 20 percent and below the dew point.
Environments that require high reliability should have a humidity alarm.
Computing Fundamentals 76
Identifying Environmental Factors that Can Damage Computers (cont.)
Water Damage: Modern computer systems contain a cut-off
device that is triggered if sprinklers turn on. If a computer suffers water damage, make
sure it is completely dry before restoring the power.
Storage devices and printouts can be damaged or destroyed by water.
Water damage may also occur from flooding or broken pipes.
Computing Fundamentals 77
Identifying Environmental Factors that Can Damage Computers (cont.)
Magnetic Fields and Static Electricity:
A single spark from static electricity can damage the internal electronics of a computer.
Grounding prevents damaging a computer with a static electrical spark.
Computer rooms should have tile floors and antistatic carpet to reduce static electricity.
Hard drives are sensitive to magnetic fields. Do not store magnets directly on a computer.
Computing Fundamentals 78
Identifying Environmental Factors that Can Damage Computers (cont.)
Physical Damage: Prevent damage to desktop computers by arranging
equipment so it is stable and cannot fall or be knocked over.
Notebook computers are more prone to physical wear and tear because they are portable.
Most portable systems are insulated with shock absorbing material.
Transport devices with care, such as in padded cases.
Computing Fundamentals 79
Identifying Environmental Factors that Can Damage Computers (cont.)
Poor Maintenance: One of the best ways to cut down on
computer repair is through preventive maintenance.
Follow a monthly maintenance schedule to keep computer devices in good working order.
Computing Fundamentals 80
Protecting Computers from Power Loss and Fluctuation An unexpected power outage can wipe out
any data that has not been properly saved. Secure electric cords so that they cannot be
disconnected accidentally. Protect computers from power
spikes with a surge suppressor.
Computing Fundamentals 81
Protecting Computers from Power Loss and Fluctuation An uninterruptible power supply (UPS) can
prevent data loss due to power outages. A UPS contains a battery that temporarily
provides power if the normal current is interrupted.
Computing Fundamentals 82
Identifying Common Computer Hardware Problems Computer equipment and stored data are subject to
computer hardware issues. “Crashed” hard drive-caused by software
corruption or hardware defects. Damaged media Printer and monitor problems Loss of network or Internet connectivity General failure
You can solve many problems on your own, while others may require a professional.
Computing Fundamentals 83
Identifying Common Computer Hardware Problems (continued) Crashed Hard Drive: Hard drives can stop working if they become
overheated, are dropped or shaken, become worn out, or are infected with a virus.
To evaluate the condition of the drive: Use a boot disk to determine if the drive is
readable. Use diagnostic and data recovery programs to
locate and recover bad sectors. Use a data recovery service.
Computing Fundamentals 84
Identifying Common Computer Hardware Problems (continued) Damaged Media: Hard drives and other media eventually fail. In many instances, you can recover data.
First, move the damaged media to a secure environment.
Second, inspect or test the media to determine what type of damage has occurred. The type of damage determines the type of recovery method to use.
Another option is to locate a disaster data recovery company to recover data from the computer.
Computing Fundamentals 85
Identifying Common Computer Hardware Problems (continued) Printer Problems: Paper jams stop
printers from printing a file.
Using the wrong paper or using wrinkled or torn paper can cause a paper jam.
Always pull the paper in the direction of the paper path.
Computing Fundamentals 86
Identifying Common Computer Hardware Problems (continued) Printer Problems (continued): If ink or toner comes off the paper when
touched, the fuser assembly might be damaged or need to be replaced; the toner cartridge could be defective; or some toner may have spilled into the printer.
If the printed image is faded, the toner might be low, the print density set too low, or economy mode printing is turned on.
Computing Fundamentals 87
Identifying Common Computer Hardware Problems (continued) Display Problems: The hardware of a display consists of
the monitor and the video card. To troubleshoot a display problem:
Check that the power cord is plugged in and the monitor cable is connected to the computer.
Verify that the monitor is turned on and settings are correct.
Update the video driver.
Computing Fundamentals 88
Identifying Common Computer Hardware Problems (continued) Inoperable Hardware Devices: When a hardware device does not work, it could be a
software problem, an electrical problem, or a mechanical problem.
A small program called a driver instructs the operating system on how to operate specific hardware.
Other causes are incorrect installation of the software or hardware failure.
Computing Fundamentals 89
Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet
Connectivity: Common causes of connectivity problems:
The network provider’s system is not working properly.
Network adapters and switch ports do not match.
The network adapter is incompatible with the motherboard or other hardware components.
Computing Fundamentals 90
Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet
Connectivity (continued): Troubleshooting options:
Use the DOS ping command to test connectivity and isolate hardware problems and mismatched configurations.
Computing Fundamentals 91
Identifying Common Computer Hardware Problems (continued)
Loss of Network or Internet Connectivity (continued):
Computing Fundamentals 92
Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet
Connectivity (continued): Verify that other computers on the same
network and those plugged into the same switch are also experiencing network connectivity problems.
Restart the router. Check the computer’s network card or
board and verify it is using appropriate settings as indicated by the manufacturer.
Computing Fundamentals 93
Identifying Common Computer Hardware Problems (continued) Loss of Network or Internet
Connectivity (continued): Try another network cable. If you are using a wireless router within
a home, beware of signal interference from other home appliances.
Assignments
TIC-TAC-TOE Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—horizontally, vertically, or diagonally—or in the 4 corners, you made decide to be finished. Or you may decide to keep going and complete more activities.
Star the activities you plan to complete. Color in the box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE Review Take end of section quiz
Computing Fundamentals 94
Computing Fundamentals 95
References
Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition, Morrison / Wells