Computer Hardware: Motherboard, CPU and more

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which component directly controls everything else in a PC?

  • Power supply
  • Motherboard (correct)
  • Processor
  • Expansion cards

The CPU's main function involves

  • holding programs and data being used
  • expanding computer functionality
  • feeding electrical power to every component
  • executing sequences of instructions (correct)

What does the chipset on a motherboard primarily determine?

  • The speed of the processor
  • The type of case required
  • The type of processor the motherboard accepts (correct)
  • The available colors for the case

Which type of memory is commonly used as the primary memory in computers?

<p>Dynamic RAM (B)</p> Signup and view all the answers

What is the purpose of ROM in a computer system?

<p>To hold data permanently (non- volatile) (A)</p> Signup and view all the answers

What is the role of the BIOS in a computer?

<p>Manages and tests computer's hardware before the OS loads (C)</p> Signup and view all the answers

What is the function of the 'POST' process during startup?

<p>Testing computer hardware (B)</p> Signup and view all the answers

Why is L1 cache the fastest type of cache memory?

<p>It is inbuilt in the processor. (D)</p> Signup and view all the answers

An expansion card enhances computer capability. What is another term for expansion card?

<p>Internal card (D)</p> Signup and view all the answers

What does VGA stand for in the context of computer hardware?

<p>Video Graphics Array (B)</p> Signup and view all the answers

What is the primary purpose of a sound card in a computer system?

<p>To connect speakers to the computer (D)</p> Signup and view all the answers

What is the function of a network interface card (NIC)?

<p>To connect a computer to a network (B)</p> Signup and view all the answers

What is disk formatting primarily used for?

<p>To prepare a data storage device for initial use (C)</p> Signup and view all the answers

What is the main role of a File System in an operating system?

<p>To organize and keep track of files (B)</p> Signup and view all the answers

Which of the following is a key characteristic of NTFS (New Technology File System)?

<p>It enables file system security via permissions (A)</p> Signup and view all the answers

What is the primary function of an operating system (OS)?

<p>To manage computer hardware and software (B)</p> Signup and view all the answers

What type of operating system is Linux described as?

<p>A Unix-like operating system (C)</p> Signup and view all the answers

What does computer security aim to protect?

<p>Computer systems against theft or damage (C)</p> Signup and view all the answers

What is meant by a 'threat' in the context of computer security?

<p>A possible danger that could exploit a vulnerability (C)</p> Signup and view all the answers

How can computer users protect their systems from vulnerabilities?

<p>By keeping software security patches up to date (A)</p> Signup and view all the answers

What is 'malware'?

<p>Malicious software designed to gain access or damage a computer (A)</p> Signup and view all the answers

Why do virus writers create viruses?

<p>To annoy users (A)</p> Signup and view all the answers

What triggers a computer virus to execute its code?

<p>Running the infected program (C)</p> Signup and view all the answers

What can a computer virus do once it infects your computer?

<p>Steal passwords and corrupt files (A)</p> Signup and view all the answers

Why is it believed that there is so much malicious software available on the web?

<p>The internet provides opportunity for economic exploitation (C)</p> Signup and view all the answers

What is the primary function of a Trojan horse?

<p>To hack into a computer by misleading the user (D)</p> Signup and view all the answers

What distinguishes Trojans from computer viruses and worms?

<p>Trojans are not able to self-replicate (D)</p> Signup and view all the answers

What is the key skill of a hacker?

<p>Bypassing computer security (C)</p> Signup and view all the answers

What distinguishes a 'white hat' hacker?

<p>Breaking security for non-malicious reasons (B)</p> Signup and view all the answers

What action can be taken to stay informed on how to protect your computer network?

<p>subscribing to newsletters (B)</p> Signup and view all the answers

Why should organizations enforce password policies?

<p>To permit access to authorized users (B)</p> Signup and view all the answers

How often should employees be trained on security protocols?

<p>Every few months (C)</p> Signup and view all the answers

How can the security of web browsers impact one's overall 'cyber-attack surface'?

<p>It can introduce more potential exploitation (C)</p> Signup and view all the answers

Which of the following helps you to Keep Your Browser Secure?

<p>Familiarize yourself with privacy settings (A)</p> Signup and view all the answers

Computer hardware is best described as:

<p>The physical components that make up a computer system. (B)</p> Signup and view all the answers

Which of the following components holds all the programs and data the processor is currently using?

<p>RAM (D)</p> Signup and view all the answers

Among CPU, slot, PGA, what is LGA?

<p>Connection type between CPU and motherboard (B)</p> Signup and view all the answers

Flashcards

Computer hardware

Physical components that make up a computer system.

Motherboard

The core of the computer system that connects and controls everything.

Processor

The engine of the computer, also known as the Central Processing Unit.

Memory (RAM)

System memory, also known as RAM, holding programs and data currently in use.

Signup and view all the flashcards

Power supply

Supplies electrical power to every part in the PC.

Signup and view all the flashcards

Expansion cards

Add functionality with video, sound, network, and other cards.

Signup and view all the flashcards

CPU (Central Processing Unit)

The most valuable and expensive part of the computer, considered the brain of the system.

Signup and view all the flashcards

Expansion Slot

A socket on the motherboard for inserting an expansion card.

Signup and view all the flashcards

Chipsets

Integrated circuit chips that support the CPU.

Signup and view all the flashcards

Ports

Input and output interfaces for device communication with peripherals.

Signup and view all the flashcards

Random Access Memory

Common RAM know as dynamic RAM.

Signup and view all the flashcards

Read Only Memory (ROM)

Can only be read from but not written to.

Signup and view all the flashcards

BIOS (Basic Input/Output System)

Built-in software that determines what a computer can do without accessing a disk.

Signup and view all the flashcards

POST Function

Tests the computer hardware.

Signup and view all the flashcards

Bootstrap Loader

Locate the operating system.

Signup and view all the flashcards

CMOS Setup

Configuration program to configure hardware settings.

Signup and view all the flashcards

Level 1 (L1) Cache

Inbuilt in the processor; made of SRAM, checks for memory data.

Signup and view all the flashcards

Level 2 (L2) Cache

Larger but slower than L1 cache, sees recent accesses not picked by L1 cache.

Signup and view all the flashcards

Level 3 (L3) Cache

Enhanced memory on motherboard, speeds up processing operations.

Signup and view all the flashcards

Expansion cards

Used to give a computer additional capability.

Signup and view all the flashcards

VGA Cards

Used to connect the monitor to the motherboard using the VGA interface.

Signup and view all the flashcards

Sound cards

Used to connect speakers to the computer.

Signup and view all the flashcards

Network cards

Used to connect your computer to another computer.

Signup and view all the flashcards

Hard Disk Drive (HDD)

Non-volatile memory hardware device that permanently stores data.

Signup and view all the flashcards

Partition

Logical division of a hard disk for better content arrangement.

Signup and view all the flashcards

Format

Preparing a data storage device for initial use.

Signup and view all the flashcards

File System

Organizes and keeps track of files.

Signup and view all the flashcards

Operating Systems

Most important software that runs on a computer.

Signup and view all the flashcards

Computer security

Protection of computer systems against theft or damage; also known as cybersecurity.

Signup and view all the flashcards

System Threats

A possible danger.

Signup and view all the flashcards

Malware

"Malicious software."

Signup and view all the flashcards

Virus

Program written to alter the way a computer operates.

Signup and view all the flashcards

Trojan Horse

Malicious computer program that misleads users to hack in.

Signup and view all the flashcards

Hackers

Highly skilled computer expert capable of breaking into systems.

Signup and view all the flashcards

Black hat hacker

Violates computer security.

Signup and view all the flashcards

Gray hat hacker

Breaks security for the sole purpose that their system is defect.

Signup and view all the flashcards

White hat hacker

Breaks security for non malicious reasons.

Signup and view all the flashcards

Study Notes

Computer Hardware Basics

  • Hardware refers to the physical components of a computer system.
  • Includes components that can be installed inside or connected to the outside of a computer.
  • System box devices include:

Motherboard

  • The core of the computer system.
  • Connects all other components.
  • Controls everything in the system.

Processor (CPU)

  • Known as the "engine" of the computer.
  • CPU stands for Central Processing Unit.

Memory (RAM)

  • Referred to as RAM.
  • Primary memory that holds programs and data currently being used by the processor.

Power Supply

  • Feeds electrical power to all parts of the computer.

Expansion Cards

  • Examples: video card, sound card, MODEM, Network Interface Card, TV/Radio Card.
  • Extends computer functionality.

CPU Details

  • The most valuable and expensive part of the computer.
  • Complex set of electronic circuitry.
  • Executes sequences of instructions representing programs stored in the Main Memory.
  • Intel and AMD are major brands

CPU Sockets

  • PGA
  • LGA
  • Slot

Motherboards

  • Categorized by size, features, layout, arrangements, and internal components.
  • Newer offer integrated interface cards.
  • Integrated interface cards examples:
  • Sound cards
  • VGA Cards
  • Network Cards
  • Controller Cards

Motherboard Components

  • Consists of many parts.
  • Key components include:
  • Ports
  • Slots
  • Chip Sets

Ports

  • Input and output interfaces for communication with peripherals and computer networks.
  • In modern computers, they are on the back side of the motherboard, which is called the back panel.
  • Special port requirements can be added as a card via the slots.

Slots

  • A socket for expansion cards that provide additional features, like video, sound, graphics, Ethernet, or memory.

Chipsets

  • Integrated circuit chips that support CPU interfacing with other motherboard devices.
  • Determines the type of processor, RAM capacity, and internal/external devices the motherboard supports.

RAM and ROM

  • RAM is Random Access Memory.

The most common types in use are dynamic RAM, of various speeds and sizes. The most common RAM today is DDR 4 RAM. Older versions were DDR3, DDR2, DDR1, and SD RAM.

  • ROM is Read Only Memory.
  • Data is read only and held permanently (nonvolatile).
  • Stores information, such as time, date, memory, and settings.
  • The BIOS a.k.a Basic Input Output System
  • Built-in software that determines what a computer can do before programs from a disk are accessed.
  • Contains code to control keyboard, display, disk drives, serial communications, and other functions.
  • Typically placed on a ROM chip.
  • ROM aKa, Read Only Memory: used to store the code for the BIOS

BIOS Functions

  • POST (Power-On Self-Test).
  • Tests and makes sure no errors exist before loading the operating system.
  • Bootstrap Loader.
  • Finds and loads the operating system.
  • BIOS or CMOS Setup.
  • Configuration program to configure hardware settings.

Cache Memory

  • Used to quickly access data.
  • Levels of Cache:
  • Level 1 (L1) Cache - fastest, built into the processor using SRAM.
  • Level 2 (L2) Cache - slower, larger than L1, also inside CPU
  • Level 3 (L3) Cache - slower, larger than L2, found on the motherboard.

Expansion Cards

  • Provides additional capabilities, such as enhanced video performance.
  • Referred to as add-on cards, expansion boards, internal cards, or interface adapters.

VGA (Video Graphics Array) Cards

  • Connects the monitor to the motherboard using the VGA interface.
  • Older cards used ISA/PCI.
  • Newer cards use AGP or PCI-Express.

Sound Cards

  • Connects speakers to the computer.
  • Often built into new motherboards.
  • Must process multiple sounds simultaneously for configurations like surround or stereo sound.

Network Cards (NIC)

  • Connects a computer to a network.
  • Commonly available in PCI.
  • Some are in USB versions.
  • NICs allow computers to communicate via cable or wirelessly.

Hard Disk Drive (HDD)

  • Non-volatile memory device for permanent data storage and retrieval.
  • Consists of platters with data written using a magnetic head inside an air-sealed casing.
  • Connects to the motherboard via an ATA, SCSI, or SATA cable.
  • Powered by connection to the PSU.

Partition

  • Partition
  • Logical division of a hard disk to organize content or create separate drives.
  • To boot from a hard disk.
  • A primary partition is required.
  • Empty space after a primary partition.
  • Can be turned into an extended partition.
  • Extended partitions
  • Can create logical partitions.

Format

  • Disk formatting.
  • Prepares a data storage device like HDD, SSD, floppy disk, or USB flash drive for initial use.
  • Formatting may create new file systems

File System

  • A system used by an operating system or program to organize and track files.
  • A hierarchical file system uses directories in a tree structure.
  • Main file systems commonly in use:
  • FAT 16
  • FAT 32
  • NTFS
  • FAT.
  • File Allocation Table, is used to locate files on a disk. Fat 16
  • Used for old versions of Windows 95. FAT NTFS
  • Used for new versions of Windows 95, 98, XP, 7. NTFS (New Technology File System)
  • Used by Windows NT and XP for storing and retrieving files.
  • Better than FAT 32.
  • Enables file system security via NTFS permissions.

Operating Systems (OS)

  • Manages all software and hardware on the computer.
  • Coordinates CPU, memory, and storage access for multiple programs.
  • Common desktop operating systems:
  • Windows - Microsoft's main operating system. -GUI-based since 1985 with multiple versions.
  • Mac OS - Apple's operating system for Macintosh computers.
  • Linux - Unix-like operating system designed as a free, low-cost alternative.
  • Efficient and performs well.

Computer Security (Cybersecurity)

  • Protection of computer systems against theft, damage, or service interruption.
  • Requires coordinated efforts and includes:
  • Application security
  • Information security
  • Network security
  • Disaster recovery/business continuity planning
  • Operational security
  • End-user education
  • Constant evolution of security risks is a problematic element.

System Threats

  • Threat
  • A possible danger that exploits a vulnerability to breach security.
  • Intention.
    • An accidental or circumstance, competency, action, or event.
    • ISO 27005
    • Defines threat as a potential cause of an incident.
  • Vulnerability
  • Weakness that allows an attacker to reduce system's information assurance.
  • Computer users can protect systems by:
  • Keeping up with software security patches.
  • Staying informed about vulnerabilities
  • Seeking ways to protect against threats.

Malware

  • Malware: Software that accesses or damages computer systems without the owner's knowledge.
  • Virus creators.
  • Started off writing viruses often with intentions limited to pranks.
  • Early 1980s creation.

Virus

  • A program that alters computer operations without user permission.
  • Replicates and executes itself, often damaging the computer.
  • Antivirus programs check for known threats to the types of viruses.
  • A virus after successful attachment to file, or document.
  • Will stay dormant until circumstances happen.
  • Can not run the infected program or virus.
  • Once a virus infects your computer, it can continue its execution.
  • Can attack systems on the same network and is devastating and irritating.
  • Stealing passwords or data:
  • Spamming your email contacts.
  • Logs key strokes.
  • Corrupting files.

Spyware

  • Malicious computer programs that hack into other systems.
  • Enables cyber criminals.
  • Spy on the user.
  • Steal sensitive data.
  • Enable backdoors.

Ransomware

  • Computer is slow.
  • As are pop-ups spam and frequent crashes.
  • Malware scanner
  • To fix corrupted file.

Trojan Horse

  • Used Greek to enter the Trojan War.
  • It means Greek soldiers sneak out.
  • Can enable cybe-criminals to spy on you, steal your sensitive data, and. Actions can include:
    • Deleting data
    • Blocking data
    • Modifying day
    • Copping Day
  • Disrupting the performance of computers or computer networks
  • Unlike computer viruses and worms.
  • Trojans, Trojans are not able to self-replicate

Hackers

  • Computer Expert.
  • Highly Skilles capable of breaking into computers.
  • Different meaning.
  • Has controversial.
  • Moral and ethical connotations.
  • In original sense.
  • Refers to person in any and hacker subcultures

Types of Hackers

  • Divided into three based on illegal status.
    • White Hat
    • Black hat
    • Gray hat
  • White hackers break security for system.
  • Or work for security companies
  • Hackers will violate computers
  • Black Hat hackers are malicious for personal gain. Computer systems for personal gain.
  • Black Hat hackers is. Hack into a computer.
    • Computer system has a security defect.

Mitigating Techniques

  • Increasing awareness of businesses.
  • So there is protection.
  • No such thing as secure and protective software.
  • Training programs that teach.
    • Damage being done by opening files and protecting password Automatic update.
  • Software is running.
  • updates are current.
  • Passwords are long, numbers, and up/ lowercase.
  • Protect your cyber setting for an attack surface.
  • Make sure you know all the privacy and security needs for browser protection.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Hardware Basics
16 questions

Computer Hardware Basics

AmicableNeodymium avatar
AmicableNeodymium
Computer Hardware Basics
16 questions

Computer Hardware Basics

HandsDownSanctuary7820 avatar
HandsDownSanctuary7820
Use Quizgecko on...
Browser
Browser