IT74 Lecture #2 Components of Computers

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Components of a Computer

IT 74 | IT Application Tools in Business


Computer
✓It has the ability to store, retrieve, and
process data.
✓a machine that manipulates data
according to a set of instructions.
✓It contains both hardware components
and software applications.
✓Any device which aids humans in
performing various kinds of
computations or calculations.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Components of a Computer
HARDWARE
tangible or physical parts of the computer
SOFTWARE
instructions that is executed in the computer systems (programs, apps)

PEOPLEWARE
users of the computer

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


HARDWARE
• Internal and External Computer Components
• Assembly and Disassembly

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Hardware Components

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Input Devices: Mouse
A mouse is a small device
used to point to and select
items on your computer
screen.

Left Button: selection


Right Button: options
Mouse Wheel: scroll

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Input Devices: Keyboard
A keyboard is used mainly for typing text into your computer.

Keyboard parts:
typing keys
function keys
numeric keys
navigation keys

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Input Devices

MICROPHONE SCANNER WEBCAM STYLUS

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Output Device: Monitor
A monitor displays
information in visual form,
using text and graphics. The
portion of the monitor that
displays the information is
called the screen.

Different monitors:
CRT, LCD, touchscreen
VGA DVI HDMI
Video Graphics Array Digital Visual Interface High-Definition
Multimedia Interface

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Output Device: Display

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Output Device: Printer
A device that you use to
transfer text and images from
a computer to a paper or to
another medium

Different types of Printer:


Dot Matrix
Ink jet
Laser
Thermal Printer

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Output Device: Speaker
Speakers are used to play
sound. They may be built into
the system unit or connected
with cables. Speakers allow
you to listen to music and
hear sound effects from your
computer

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Central Processing Unit (CPU)
The central processing unit
(CPU) is a device that
interprets and runs the
commands that you give to a
computer. It is the control unit
of a computer. The CPU is
also referred to as the
processor.

Common brands include:


Intel
AMD
Snapdragon

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Central Processing Unit (CPU)
clock speed
the operating speed of a computer or its microprocessor,
defined as the rate at which it performs internal operations
and expressed in cycles per second (megahertz).

Clock speed is usually measured in MHz (megahertz, or


millions of pulses per second) or GHz (gigahertz, or billions
of pulses per second).

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Central Processing Unit (CPU)

32-bit VS 64-bit
ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Central Processing Unit (CPU)

CPU Core

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Memory: Random Access Memory (RAM)
Temporarily stores
information that the CPU
uses while the computer is on.
The information stored in
RAM is erased when the
computer is turned off.

The higher the RAM means


the more process the
computer can execute.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Memory: Read Only Memory (ROM)
It is the memory that
retains its contents even
after the computer is
turned off. ROM is
nonvolatile, or permanent,
memory that is commonly
used to store commands,
such as the commands that
check whether everything
is working properly.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


CMOS (Complementary Metal-Oxide-Semiconductor)

The CMOS is a physical part of the


motherboard: it is a memory chip
that houses setting configurations
and is powered by the onboard
battery. The CMOS is reset and loses
all custom settings in case the
battery runs out of energy,
Additionally, the system clock resets
when the CMOS loses power. The
CMOS reverts to factory settings if it
doesn't get power from the battery.
It's a common practice to remove the
battery to flash-back CMOS settings
if there is a configuration problem.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Motherboard

The motherboard is the


main part of the system unit.
Every component/peripheral
of computer is connected in
the motherboard.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Chipset

Northbridge/Southbridge Chipset
The Northbridge part of the chipset controls
the high-speed channels, while the
Southbridge controls the lower speed
devices.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Northbridge
The high-speed part of a common chipset architecture in a
computer. The Northbridge is the controller that interconnects
the CPU to memory via the frontside bus (FSB).

It also connects peripherals via high-speed channels such as


PCI Express. The Northbridge may include a display controller,
obviating the need for a separate graphics card.

Northbridge Connects CPU to:


RAM, Built-in graphics, PCI Express (PCIe)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Southbridge
The Southbridge controller handles the remaining I/O, including
the PCI bus, parallel and Serial ATA drives (IDE), USB, FireWire,
serial and parallel ports and audio ports.

Earlier chipsets supported the ISA bus in the Southbridge. Starting


with Intel's 8xx chipsets, Northbridge and Southbridge were
changed to Memory Controller and I/O Controller

Southbridge Connects CPU to:


SATA drives, USB bus, Built-in audio
ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Motherboard - Ports

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Ports

Read the full content at


https://www.electronicshub.org/types-of-computer-ports/

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Expansion Cards
An expansion card is a circuit board that can be attached to a
motherboard to add features such as video display and audio
capability to your computer.
An expansion card improves the performance of your computer
and enhances its features. Expansion cards are also called
expansion boards..

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Expansion Cards: Video card
A video card connects to the
motherboard of a computer
system and generates output
images to display. Video cards
are also referred to as
graphics cards. Video cards
include a processing unit,
memory, a cooling
mechanism and connections
VGA DVI HDMI to a display device.
Video Graphics Array Digital Visual Interface High-Definition
Multimedia Interface

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Expansion Cards

Network Interface Card Sound Card


(NIC)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Storage Devices
Storage devices are used to store data to your computer.
This may be internally connected to the system unit or be
externally plug to devices or existing computer ports.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Storage Devices: Hard Disk Drive (HDD)

Magnetic disk that is


usually the main storage
device on most computers.
It can be an external in the
form of external drives.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Storage Devices: Solid State Drive (SSD)
Storage device use same as
the Hard Disk Drive (HDD)
but with more durable and
faster in terms of handling
data.

SSD uses interconnected flash


memory chips compared to
HDD’s magnetic disks.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Storage Devices: Portable Storage Devices

Optical Disk Flash Drive Memory Cards

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


SOFTWARE
• System Software
• Application Software
• Malwares

ICA | Institute of Computer Applications ITCC 43 | Introduction to Computing


Operating System (OS)

User OS Hardware

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Booting
• Booting is the process that occurs when you press the
power button to turn your computer on.
• It runs tests to make sure everything is working correctly.
• It checks for new hardware.
• It then starts up the operating system.
• Once the operating system has started up, it manages
all of the software and hardware on the computer.
Further readings
https://www.computer-hardware-explained.com/boot-process.html
https://www.engineersgarage.com/tutorials/how-computer-pc-boots-up
ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Operating System

Manages user files Manages installed programs

Provides interface Configure equipment


ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Operating Systems - Desktop
Microsoft Windows Operating
System is the most used
operating system in the world.

Most Popular OS versions:


Windows 10 (latest), 8 and
8.1, 7 and XP

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Windows 10
Operating System

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System - Desktop
Mac OS is a line of operating
systems created by Apple Inc.
which comes pre-installed to
Macintosh products.

Popular versions:
Snow Leopard, Leopard, Lion,
Yosemite and El Capitan,
Sierra, High Sierra, Mojave
(latest)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System

Mac OS X
Mojave

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System - Desktop
Linux is a free and open
source operating system.
Unlike the other OS’es, it can
be distributed and modified
by anyone in the world.

Popular distributions:
Ubuntu, Mint, and Fedora

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System

Ubuntu OS
ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Operating System - Mobile

Android Pie iOS 12 Windows 10 Mobile


(Google) (Apple) (Microsoft)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System - Server

Solaris Mac OS X Server Windows Server


(Suns Microsystems) (Apple) (Microsoft)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Operating System

User distribution

Read full content


http://gs.statcounter.com/os-market-share

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Driver
Device drivers consist of software
code that allows your PC's
operating system to interact with
a hardware device. Every device
driver performs a different
function due to the fact that
there are so many peripheral
devices that connect to
computer’s OS.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Software Installation
Software installation is a process to
incorporate/add additional features to your
computer.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Software Installation - License
• Public Domain Software
• Commercial Software
• Freeware
• Shareware
• Open Source Software

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


INSTALLATION PROCESS
INSTALLER
A compressed file used to
add the software files to a
computer. This will be
extracted and save to the
computer system during
the installation process.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


INSTALLATION PROCESS
EULA
(End User
License
Agreement)
The specification of the
terms and conditions in
using the software (this is
required to be agreed
upon installation of a
software)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


INSTALLATION PROCESS
Activation Key / Product
Key (keygen)
A sequence of numbers
and/or letters used by
software developers to verify
the purchase of the software
(this is required for
commercial software)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


INSTALLATION PROCESS
Activation Key /
Product Key
A sequence of numbers
and/or letters used by
software developers to
verify the purchase of the
software (this is required
for commercial software)

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


INSTALLATION PROCESS
Installation Location

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Software Release Life Cycle
Alpha version
Beta version (open or closed)
Release Candidate (RC) – aka Gamma or Delta
Release to Manufacturing (RTM)
General Availability (GA)
Gold
End-of-Life

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


MALWARE
• short for Malicious Software
• this is created to disrupt computer operation or
gain access to private computer systems

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
VIRUS
> A program or piece of code that is loaded onto
your computer without your knowledge and runs
against your wishes.
> Viruses can replicate and all manmade

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
TROJAN HORSE
> A Trojan Horse program has the appearance of
having a useful and desired function.
> A Trojan Horse neither replicates nor copies itself,
but causes damage or compromises the security of
the computer.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
WORM
> A computer worm is a self-replicating computer
program.
> It uses a network to send copies of itself to other
nodes (computers on the network) and it may do
so without any user intervention.
> It does not need to attach itself to an existing
program.
ICA | Institute of Computer Applications IT74 | IT Application Tools in Business
Types of Malware
SPYWARE
> Spyware is a type of malware installed on
computers that collects information about users
without their knowledge.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
ZOMBIE
>Zombie programs take control of your computer
and use it and its Internet connection to attack
other computers or networks or to perform other
criminal activities.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
PHISHING
> Phishing is a message that tries to trick you into
providing information like your social security
number or bank account information or logon and
password for a web site.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
SPAM
>Spam is a common way to spread viruses, trojans,
and the like.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
ADWARE
>Adware (short for advertising-supported software)
is a type of malware that automatically delivers
advertisements.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Types of Malware
RANSOMWARE
> Ransomware is a form of malware that essentially
holds a computer system captive while demanding
a ransom.

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


How Malware infects Computers?
➢ Social Network
➢ Pirated Software
➢ Portable storage devices
➢ Email
➢ Websites

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Damage of Malware

➢ Data Loss
➢ Account Theft
➢ Financial Losses

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Symptoms of Malware
➢ Slow computer or web browser speeds
➢ Freezing or crashing
➢ Modified or deleted files
➢ Appearance of strange files, programs, or
desktop icons

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


Anti – Malware Software
➢ Anti virus program
➢ Anti-spyware program
➢ Anti-spam program
➢ Firewall

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business


-End-

ICA | Institute of Computer Applications IT74 | IT Application Tools in Business

You might also like