Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Dr.

Nejah NASRI (Eng, PhD, HDR)


Associate Professor on embedded systems, Computer Science Department-Gafsa
Laboratory of Smart systems for Engineering and E-health based on Technologies of Image and Telecommunications(SETIT-Sfax)
E: nejah.nasri@isecs.rnu.tn
 The Computer Skills course aims at developing the
students skills in using and operating computer.

 This course begin with introducing computers and


operating systems (Windows os) and file
management.

 IT also aims qualifying the students in using :


 Word processing program ( MS-Word )

 Spreadsheet program ( MS-Excel )

 Database program ( MS-Access )

 Slideshow program (MS-Powerpoint )


Realizing the basic concepts used in software,
Hardware and Information Technology
 The period from 1930-1950 is considered to
be the period in which computers were born.
Before this period, there were only one
mechanical devices such as the MARK1 is one
of the electromechanical computers.

 The first full electronic computer was called


ENIAC it was completely built in 1946.
 The first Generation (1950-1959)
 The Second Generation (1959-1965)
 The Third Generation (1965-1975)
 The fourth Generation (1975-1985)
 The Fifth Generation (1985 up till now)
 1- Super Computer :
Is huge in size. It has very large storage capacity and high
processing speed.
 2- Mainframe Computer:
Mainframe are used commonly at universities, aviation and
communication companies.
 3-Medium computer:
This type of computer has become obsolete since other mini-
computers have similar capabilities equal to those of the
medium computers.
 4-Micro-Computer:
This type of computer is know as the personal
computer (pc). This type comes in different forms
such as:
Desktops, laptops and palm computers.
 5- Workstations :
 Its capability of dealing with graphics . This feature
makes it preferred by scientists and engineers to
manage their applications.
 6- Control computer :
Its used in real time application. They are found in
the control rooms of power station, petroleum
refineries and the control rooms of train station.
 The personal computer consists of tow main
components :
 Hardware and Software
 Hardware refers to the Components that tangible
parts of the computer which includes:
1. Central processing unit (cpu)
CPU is the mastermind of the computer. It processes
data and performs the arithmetic and logical
operations.
The speed of the CPU is measured in MHZ and GHZ
2- Memory unit :
Memory is a collection of electronic circuits there are
two kinds of memories :
 Random Access Memory ( RAM )
Its saves the computer data temporarily while the programs are running.
 Read Only Memory ( ROM )
Its saves the computer operation data.
3- Input units :
The input units are the devices which are used to enter data into computer
whether these data are in the form of ( text,signals,pictures or audio ) input
devices have different forms according to kind of data they are used to deal
with such as:
 Mouse
 Keyboard
 Computer Camera
 Scanner
 Touch Screen
 Light pen
 Joystick
4- Output Units :
Output units are the devices which are used to display data in
their various forms (signals, text, pictures or audio) from the
computer. Output devices as follows:

 Visual Display Units (VDU)-Monitors

 Printers

 Plotters

 Speakers and Sound Systems


5-Storage Devices :
Computer contain three of disk devices they are:
 The Hard Disk

 The Floppy disk


(are small and light disks)

 The Compact Disc


( CD-DVD)
Computer are electronic machines that deal with
electronic current in two modes (ON : represented
by 1 and OFF: represented by 0) computer use the
Binary Digit System or BIT in which all characters
and symbols are eight bits called (BYTE) .
Which represents only one character . characters are
represented in the (ASCII Code) and bytes.
Following table shows the different units for
measurement in computers:
Symbol Unit Value

KB Kilo byte 1024 byte

1024×1024 byte
MB Megabyte around one million
byte

1024×1024×1024
byte around one
GB Gigabyte
billion bytes

1024×1024×1024×
TB Terabyte
1024 byte
 The efficiency of computer and their
performance depend of:

 The speed of the cpu .


 The size of RAM .
 The storage capacity of Hard Disk .
 Software :

Software is one of the main components of PCs


which refers to a collection of computer programs.
Software can be divided into three main types:

1. Operating Systems.
2. Application programs.
3. Programming languages
 The Main Function of the Operating Systems:
 The link between the user and the computer.
 Controls all the computer components .
 Runs applications .
 Provides user interface (GUI)
 Operating systems commonly used by individuals
◦ Windows – most widely used
◦ Mac OS – powerful and easy to use
◦ UNIX – network; originally designed for Web
◦ LINUX – non proprietary; free from the Web
 A network is a group of connected computer
for the sake of sharing resources .
 Networks are used to protect data using
usernames and passwords .
 Other users can communicate over networks
using the email .
 Networks can be classified into three types
according to the distance between
terminals. They are:
1. Local Area Network (LAN) is a group of
computers connected using cables and this
network is found on a limited area such as a
company building or a college lab .
2- Wide Area Network (WAN):
Is a group of computers connected together
but since it is spread over a wide area like the
branches of company in to cities, therefore,
connection is achieved using telephone lines
or satellites.
3- Metropolitan Area Network (MAN):
is a group of computers that are distributed
over a city .
Computers can be categorized according to
their functions into two types :
 Clients :
The client computer is a terminal unit that is
connected to the network but it has no
authorities over the network.
 Servers :
The server is the most important device on the
network as it controls it and as it provides the
network with services and resources.
 There are many ways to connect to the
internet :
1. Dial-up internet Connection.
2. Integrated Services Digital Network (ISDN) .
3. Digital Subscriber Line (DSL) .
4. Satellite internet Access .
5. Wireless Fidelity (Wi-Fi) Internet Connection.
 The Internet :is a huge collection of various
networks that can communicate with each
other.
 Intranet : is an internal and local network that
is based on secured network protocol called
(TCP/IP)
 Extranet : some companies try to offer access
to their local network (intranet) by providing
authorized access to some clients through
secured access points.
 Internet has many services includes:

 The World Wide Web (WWW)

 E-mail service

 File Transfer Protocol (FTP)

 Internet Relay chat Service


 Utilizing IT in Everyday Life
1. Accounting applications .
2. Payroll applications .
3. Warehouses programs .
4. Airlines companies programs .
5. E-Government Application .
6. Hospitals .
7. Education .
 Security refers to all measures taken to protect data,
information and software to prevent their loss in part or in
whole.
• User Name and Password
• Backup
• Weak point and Hacking
• Firewalls
• URL (Http-Https)
• Encryption
 Rules and regulation related to the publishing
and copy rights state that anyone who buys
copyrighted software should not copy or
distribute such software to others .
 User License .
 Product key .
 Freeware .
 Shareware .
 Computer can be protected against hacking
or intrusion by using usernames and
passwords .
 A password usually consists of at least eight
characters. These characters may consist of
capital letters, small letters and/or digits as
can be seen in the recommendation by
Microsoft on password direction .
 Computer viruses are small programs that are written in
a any programming languages that intends to harm or
damage computer systems .
 Viruses are characterized by their ability to:
 Attach themselves into other programs .
 The frequent use of the internet and emails as they can be sent as
attachments with email massages .
 Their ability to replicate themselves within the infected programs .
 Their ability to distinguish between infected software and new software
free of viruses .
 Their ability to prevent updating or making additional modification to
the infected programs .
 There are four main mechanisms used by
viruses :

1) The Replication Mechanism .

2) The protection Mechanism .

3) The Trigger Mechanism .

4) The payload Mechanism .


 Viruses can be classified into different types
as follows :
1) Viruses
2) Worms
3) Trojan horses
4) Spyware
How viruses Infect Computers:
• Opening an infected file or email attachment leads to
infection with computer viruses
 Viruses can be detected in a number of ways as
follows :
1. Observation
2. Anti Virus ( Scan – Format )
How to avoid being infected with Viruses :
• Avoiding the use of copies or pirated software programs from untrusted
sources .
• Having a number of backup copies for programs .
• Following –up the processes of installing application programs .
• Installing anti-virus software to scan and clean the computer .
• Avoid installing software programs brought from outside the work
environment .
• Trying and testing in addition to scanning new software should be carried
out on a separate computer which should not be connected to the net work .

You might also like