![Page 1: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/1.jpg)
Introduction to Computers
Chapter 1
![Page 2: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/2.jpg)
2
Hardware
Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware.
![Page 3: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/3.jpg)
3
Input/Output/Peripheral
Input Devices: Keyboard, mouse, scanner, etc.Output Devices: Printer, CD Burner, monitorPeripheral Devices: Expansion slots
![Page 4: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/4.jpg)
4
Motherboard
Expansion boards Central Processing Unit Bus ROM (Read Only Memory) RAM (Random Access Memory)
![Page 5: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/5.jpg)
5
Data Flow
![Page 6: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/6.jpg)
6
Utility Program
A program Manages Files Disk Doctor CD/DVD Drive Driver needed for printing
![Page 7: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/7.jpg)
7
Mobile Computing Devices
Notebook ComputersNotebook Computers
Tablet PCTablet PC
Handheld Computers (PDA)Handheld Computers (PDA)
SmartphonesSmartphones
Wearable Computers - MP3 Wearable Computers - MP3 PlayersPlayers
![Page 8: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/8.jpg)
8
Cross-Platform Connectivity
The ability for one type of PC to link to and share data with a different type of PC
![Page 9: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/9.jpg)
9
Programming Languages
Words Codes Symbols That allow a programmer to give
instructions to the computer
![Page 10: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/10.jpg)
10
Low/High Level Program Language
Low-Level: include machine language and assembly language
High Level: English-like instruction and are easier to use than machine language
![Page 11: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/11.jpg)
11
Complier/Interpreter
Complier: A program that converts an entire program into machine code before the program is executed.
Interpreter: Translates and executes an instruction before moving on to the next instruction in the program.
![Page 12: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/12.jpg)
12
Object-Oriented Language
Java C++ Visual Basic.Net
![Page 13: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/13.jpg)
13
Advantages of Networking
1. Allows users to reliably share and exchange data
2. Can reduce costs by sharing devices such as printers
3. Offers security options including password protection to restrict access to certain files
4. Simplifies file management through centralized software updates and file backups
5. Provides e-mail for network users
![Page 14: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/14.jpg)
14
Network Size
LAN: Local-Area Network WAN: Wide-Area Network
![Page 15: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/15.jpg)
15
Chapter 1
LAN Using a Bus Topology
![Page 16: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/16.jpg)
16
Chapter 1
LAN Using a Star Topology
![Page 17: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/17.jpg)
17
Chapter 1
LAN Using a Ring Topology
![Page 18: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/18.jpg)
18
NETIQUETTE
Network users should follow a certain etiquette referred to as netiquette:
*Do not attempt to access the account of another user without authorization.
*Do not share your password, and change it periodically
*Use appropriate subject matter and language, and be considerate of other people’s belief and opinions.
![Page 19: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/19.jpg)
19
Binary
The electrical circuits on a computer has one of two States, off or on. Therefore the binary number system(base 2), which only uses two digit (0 and 1), was adopted for use in computers.
Decimal Binary Base 2 Equivalent 0 0 =0×21+0×20 =0×2+0×1 =0+01 1 =0×21+1×20 =0×2+1×1 =0+12 10 =1×21+0×20 =1×2+0×1 =2+03 11 =1×21+1×20 =1×2+1×1 =2+14 100 =1×22+0×21+0×20 =1×4+0×2+0×1 =4+0+0
![Page 20: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/20.jpg)
20
Chapter 1
Storing Data in Memory
Computer memory is measured in bytes. MB - Megabytes which means 1,048,576 and GB – Gigabytes 1,073,741,820 bytes.c
Data stored in memory is referred to by an address. An address is a unique binary representation of a location in memory. Therefore, data can be stored, accessed, and retrieved from memory by its address.
![Page 21: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/21.jpg)
21
What is a File?
*Human-readable files are called text files, and computer readable files are called binary files.
Files type are distinguished by the extension that comes after the file name
![Page 22: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/22.jpg)
22
Extensions
.exe Executable .xls Excel
.doc Document .jpg Graphic
.class Complied java file
.gif GIF image file
.bmp Bitmap graphic .zip Compressed file
![Page 23: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/23.jpg)
23
Storage Devices
Storage devices use a persistent media to maintain files. These devices, which are also referred to as drives, mass storage, and auxiliary storage, can be categorized in three ways:
Internal or external
Removable or permanent media
Magnetic, optical, or solid state technology
![Page 24: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/24.jpg)
24
Storage Devices
Optical Technology - uses a drive with a laser and an optoelectronic sensor.
Solid State Technology - allows for the smallest, most portable storage
Magnetic Technology - allows for storage devices that range in capacity from 1.44MB to many gigabytes on hard disk drives.
![Page 25: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/25.jpg)
25
Chapter 1
Storage Devices
Storage media can be very sensitive. Care should be taken to avoid damaging files.
Never attempt to open a case containing a disk. Keep magnetic media away from magnets. Handel CD / DVDs by the center hole or by the
edges. Never bend CD / DVDs or other flexible media. Store CD / DVDs in a jewel case or sleeve to
prevent scratches. Keep media away from moisture and extreme
temperatures.
![Page 26: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/26.jpg)
26
Chapter 1
Intranet, Extranet, Internet
Intranet - is a network that is used by a single organization, such as a corporation or school, and is only accessible by authorized users.
Extranet - extends an intranet by providing various levels of accessibility to authorized members of the public.
Internet - Is the largest and most widely accessed network. The Internet, is a worldwide network of computers that is not controlled by any one organization.
![Page 27: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/27.jpg)
27
Chapter 1
Telecommunications
Telecommunications - is the transmitting and receiving of data. Numerous telecommunications options are available, which vary in speed and cost:
Conventional Modem - Uses standard telephone lines to convert analog
signals to digital data. A conventional modem is a 56 Kbps modem,
which transmits data at 28.8 Kbps and 36.6 Kbps, and receives data at
56 Kbps. Home computers sometimes use a conventional modem.
DSL (Digital Subscriber Line) - DSL modem uses standard telephone
lines with data transmission up to 640 Kbps. Data receipt is from 1.5
Mbps to 9 Mbps. A DSL (Asymmetric DSL) is the most common form
used
![Page 28: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/28.jpg)
28
Telecommunications
Cable Modem - Transmits data through a coaxial cable television network. Data transmission is from 2 Mbps to 10 Mbps and data receipt is from 10 Mbps to 36 Mbps.
Leased / Dedicated Lines - are used by many businesses and schools for Internet access. They allow for a permanent connection to the Internet that is always active. The cost of a leased line is usually a fixed monthly fee. A T-1 carrier is a type of leased line that transmits data at 1.544 Mbps.
ISDN (Integrated Services Digital Network)- is a digital telephone network provided by a local phone company. ISDN is capable of transmitting and receiving data at up to 64 Kbps. ISDN requires the use of an ISDN terminal adapter instead of a modem.
![Page 30: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/30.jpg)
30
Certain rules should be followed when composing e-mail messages
Use manners.Include “please” and “thank you” and also properly address people you do not know as Mr., Ms., Mrs., Dr., and so on.
Be Concise. Be professional, which includes using the proper spelling
and grammar. Re-read a message before it is sent. Always fill in the “To
Box” last to avoid sending a message before it is complete.
![Page 31: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/31.jpg)
31
E-mail messages are not private.
Send messages through your account only.
Use appropriate subject matter and language
Be considerate of other people’s beliefs and
opinions.
![Page 32: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/32.jpg)
32
Finding Information on the Web and Downloading Files
A search Engine - is a program that searches a database of web pages for keywords and then lists hyperlinks to pages that contain those keywords. Commonly used search engines include:
Yahoo!Yahoo! ((www.yahoo,com)) Google (Google (www.google.com))
MSN (MSN (www.msn.com)) AOL (AOL (www.aol.com))
Excite (Excite (www.excite.com)) Ask Jeeves (Ask Jeeves (www.ask.com))
Overture (Overture (www.overture.com)) Lycos (Lycos (www.lycos.com))
Web Crawler (Web Crawler (www.webcrawler.com)) Fast Search (www.Fast Search (www.
![Page 33: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/33.jpg)
33
Internet Privacy Issues
Online Profiling The collection of data a about consumers
visiting a website is a marketing technique. Example: Cookies or Web Beacons
![Page 34: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/34.jpg)
34
Internet Privacy Issues
Cookies: a text file created by the server computer when a user enters information into the website. Each time the user visits the website the server recognizes the user.
Web Beacons: are transparent graphics located on web pages or in e-mail messages that are used in combination with cookies to collect data about web page users or e-mail senders.
![Page 35: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/35.jpg)
35
Internet Privacy Issues
Privacy Policy: is a legally binding document that explains how any personal information will be used.
Several laws have been passed to protect the consumers privacy.
Electronic Communications Privacy Act of 1986 Electronic Freedom of information Act of 1996 Children’s Online Privacy Protection Act of
1998 Safety and freedom through Encryption Act of
1999
![Page 36: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/36.jpg)
36
The Social and Ethical Implications of Computer Use
The society in which we live has been so profoundly affected by computers that the historians refer to
the present time as the Information Age.
![Page 37: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/37.jpg)
37
Protecting Computer Software and
The society in which we live has been so profoundly affected by computers that the historians refer to the
present time as the Information Age.
![Page 38: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/38.jpg)
38
Protecting Computer Software and Data
As society becomes more and more reliant on digital information, copyright and exposure to malicious code have become two important issues among computer users. Copyright is protection of digital information.
![Page 39: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/39.jpg)
39
Protecting Computer Software and Data
Three forms of malicious code are: Virus Trojan Horse Internet Worm
![Page 40: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/40.jpg)
40
Careers
The growth of computers, the Internet, and the Web have created many new job opportunities in the IT field.
Data-entry Operator Systems Analyst Programmer Computer Engineer Technical Suppot Technician
![Page 41: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/41.jpg)
41
The Social and Ethical Implications of Computer Use
Identity Theft is a growing crime where personal information is stolen electronically in order to make fraudulent purchases or loans.
![Page 42: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/42.jpg)
42
MLA Citations
General citation for material located at a website:
Author’s Last Name, First Name MI. Site Title. Access date. Organization name. <URL>.
Example citation of a personal website:
Rawlings, Julie. Home page. 23 Dec. 2006. <http://www.lpdatafiles.com/jrawlings/index.htm>.
continued next slide
![Page 43: Introduction to Computers Chapter 1. 2 Hardware Hardware: The physical components of the computer, such as the monitor and system unit, are called hardware](https://reader036.vdocuments.site/reader036/viewer/2022062304/56649e025503460f94aec0fd/html5/thumbnails/43.jpg)
43
MLA Citations, continued
Example citation of an article in an online magazine:Schiffman, Paula. "Making Vinegar at Home."
Vinegar Monthly. 4 May 2006. <http://www.lpdatafiles.com/ vinegarassoc/journal.asp>.
Example citation of a posting to a discussion list:Cruz, Anthony. "Are Orchestras Going
Downhill?" online posting. 10 Oct. 2006. Tuscon Annual Ballet Conf. <http://www.lpdatafiles.com/tuscontoes/downhill.txt>.