🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

fundmental of IT.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Transcript

New Mansoura University Faculty of Computer Science and Engineering FDTC Fundamental of IT © 2021 The Central Unit of IT Training Supreme Council of Universities. What is a computer ? A Computer is an electronic device that accepts Input (data...

New Mansoura University Faculty of Computer Science and Engineering FDTC Fundamental of IT © 2021 The Central Unit of IT Training Supreme Council of Universities. What is a computer ? A Computer is an electronic device that accepts Input (data and instructions), Processes it, and produces Output as required. A computer is capable to receive user instructions, process the instructions, and provide the desired results back to the user. The diagram below depicts the operation of a computer system 2 SPECIAL FEATURES OF A COMPUTER The interesting feature of a computer is that it is programmable, i.e., it can be programmed and used for a variety of tasks that usually require human resource. These tasks are done with following features that make computers so special: ❑ Speed – Computers perform tasks in less than a millionth of a second. ❑ Accuracy – Computers perform tasks without any mistake. ❑ Attentiveness – Computers perform tasks and repeat them thousands of times without getting bored or tired unlike human beings. ❑ Huge Storage – Computers facilitate storing huge amount of data/ information in highly compact devices. 3 HOW DOES A COMPUTER WORK? Computers are multipurpose, amazingly fast & accurate; but how do they do that? Computers are built to carry out a variety of instructions, such as: ❑ Add, Subtract ❑ Divide (that even a basic Calculator does) ❑ Read/Write a character, ❑ Compare numbers/characters ❑ Logical operations like AND, OR, NOT, etc. A computer system has various components that work together to accomplish a task. It has two main components: Hardware and Software 4 HARDWARE Vs SOFTWARE (1) Hardware consists of all the physical components that are tangible in a computer system. ❑ Hardware includes Keyboard, Mouse, Screen, Microprocessor, Memory, Hard disk, etc. Different Hardware parts will be discussed later in this session. Computers can’t do anything on their own, they need specific step-by-step instructions or directions to perform any task. Software is a Set of Instructions (Programs) that tells the computer what to do. ❑ For example, if you want to write a letter using computer, you need a Word Processing Software like MS Word. Similarly, Windows 10 Software is required to entirely control and manage the operations of 5 the computer. HARDWARE Vs SOFTWARE (2) Unlike hardware, software is not a physical entity. It is set of instructions processed by computer hardware. There are two types of software: ❑ System software ❑ Application software A software specially designed to control and manage hardware devices is called System software. Application software is a program, or group of programs, designed for end users to perform specific tasks 6 TYPES OF COMPUTERS (1) Based on its speed and size, computer systems are usually classified into three types: ❑ Super Computers. ❑ Mainframe Computers. ❑ Microcomputers. Super-computer ❑ A Supercomputer is a computer that has complex hardware configuration with high-level computational capacity. ❑ It is useful when a huge amount of data needs to be processed in a short time. ❑ A Supercomputer is mostly used for scientific and engineering purposes, such as weather forecasting, bio-medical research and large-scale chemical analysis in laboratories, etc 7 TYPES OF COMPUTERS (2) Mainframe Computer ❑ A Mainframe computer is a large central computer with more memory, storage space, and processing power, but is generally less powerful than a supercomputer. ❑ Mainframes are used by large organizations for large-scale jobs. For example, insurance companies use mainframes to process information about millions of policyholders. ❑ A Mainframe computer is capable of supporting hundreds, or even thousands, of users simultaneously. 8 TYPES OF COMPUTERS (3) Micro Computer ❑ The Microcomputer has a compact Hardware. It is small in size and the most commonly used type of computer. ❑ It is affordable and very useful for almost every business and individual for a variety of tasks. ❑ Microcomputers are further categorized as below, based on the size of hardware: Desktop Computer or Personal Computer (PC) Laptops or Notebooks. Tablets and Smartphones. In 1981, IBM came up with first personal computer known as IBM 5150.projects, from inception to realization. 9 Desktop or Personal Computers A desktop or personal Computer is designed for use by one person at a time on a desk. A typical Desktop Computer system hardware consists of a System Unit Cabinet and Input/ Output devices attached to it. It is also called as Personal Computer (PC) as it can be personalized and used according to an individual user either at home or in business. It is used for general purposes, which range from office tasks to browsing the internet and playing games 10 Laptop Computers or Notebooks A Microcomputer, small enough to be carried and used anywhere keeping on laps, is known as a Laptop. Also commonly known as Notebook, it has similar hardware components as a desktop computer, but in a compact form 11 Tablets and Smart Phones Tablets are thin mobile computers in the form of a single hand-held device with a touchscreen display. The touchscreen display uses recognition of a finger or a stylus touch (gestures) to receive user input, thus replacing the mouse and keyboard, used in desktops or laptops. A Smartphone is similar to a tablet PC, but smaller in size and has the functions of a cellular phone as well. It provides easy Internet browsing, personal organizer, checking emails and many useful everyday applications. Tablets are typically larger than smartphones with a screen size of 7 inches (18 cm) or larger. 12 USE OF COMPUTERS IN EDUCATION (1) Computers have become essential in the field of Education; for Students, Instructors and Educational Administrators. Computer Based Training (CBT) is now very common in education. CBT is also being used in business and other organizations for various purposes, such as training employees on new products or procedures. Following are some of the uses of computers in education: ❑ Teachers use computers for instructing students to achieve easy understanding of concepts, such as using PowerPoint slides. ❑ Use of the Learning Management System (LMS) e.g., Moodle, Blackboard, for excellent management of Teaching-Learning 13 USE OF COMPUTERS IN EDUCATION (2) Use of the Learning Management System (LMS) e.g., Moodle, Blackboard, for excellent management of Teaching-Learning Processes, such as: ❑ Planning and keeping track of learner progress. ❑ Collecting student’s assignments. ❑ Enabling students to learn new skills at any time on their own pace. ❑ By the use of graphics, audio, video, etc., learning contents are more interesting, interactive and easy to understand. Transforming the Testing & Evaluation process from traditional paper- based examinations to the advanced Online Examinations. E-libraries and Computer based Library Management System have changed the studies, research and teaching approach. 14 USE OF COMPUTERS IN GOVERNMENT SERVICES Government offices use computers to manage different office tasks like ❑ Documentation ❑ Calculation ❑ Analysis ❑ Generate reports ❑ Online communications ❑ Various government transactions. The use of computers in government services has made various transactions with government very easy and perfect. 15 USE OF COMPUTERS IN AIRLINE SERVICES The use of computers in Airlines has made the travel easy, quick & economic. Many Airlines and other Web Services offer easy online Flight Search with various facilities, like: ❑ You can compare & choose the best suitable flight. ❑ Manage your reservation, e. g. seat selection or other services. ❑ Online Web check-in. 16 USE OF COMPUTERS IN BANKING SERVICES They are reliably used by bank employees, eliminating the use of paper files. They are conveniently used by bank customers reducing the need of physically going to the bank. Online banking has revolutionized most banking transactions with just on-screen clicks. Following are common uses of computers in Banks: ❑ Banks use computers to keep track of customers and their account information. ❑ Computers help tellers to record all banking transactions, analyze them and prepare reports. 17 USE OF COMPUTERS IN MEDICAL SERVICES Computers are used in hospitals due to their reliability and accuracy. Several things in medical field have been simplified with the help of computers such as Open Heart Surgery. Examples of the use of computers in medical services are: ❑ Diagnosis ❑ Prescription & Treatment ❑ Surgeries Monitoring and Analysis ❑ Hospital Management, ❑ Patient Records & Health status, etc. ❑ Billing and Financial System. 18 WHAT IS COMPUTER HARDWARE? Computer Hardware is the actual physical equipment that performs dedicated tasks. It is important to know about each part of computer system, how it works and its features. A typical computer system hardware includes: ❑ Input/ Output devices ❑ The System Unit ❑ Storage devices 19 INPUT/OUTPUT DEVICES How do you give data to a computer? How do you get information from it? How do computers interact with people? We input text and even speech into a computer, but never think about the relationship between what we enter and what the computer processes. We understand languages that consist of letters, numbers, and punctuation marks. However, computers can understand only the Binary Machine Language consisting of only 0 and 1. 20 INPUT DEVICES (1) Input devices translate numbers, letters, and actions that we understand into a form that computers can process. For example, while writing a letter on a computer, you use the Keyboard to enter text and the Mouse to give commands. While there exists a variety of input devices, the following are some of the basic and commonly used input devices. ❑ Keyboard (Wired or Wireless) ❑ A computer keyboard resembles a common typewriter style device. It is an input device used to enter alphabets, numbers and special characters, as well as keys for specific functions. 21 INPUT DEVICES (2) ❑ Mouse (Wired or Wireless) ❑ A Computer Mouse is a small hand-held pointing device which controls movement of a Cursor or Pointer on a display screen. ❑ It allows users to control and direct computers, select on- screen options, etc. ❑ A Mouse usually has two buttons, a scroll wheel and uses laser or a ball, to control the movement of the pointer. ❑ While the mouse is usually connected to a system unit with a cable, wireless mouse have become common these days. 22 INPUT DEVICES (3) ❑ Scanner ❑ Scanner is used to scan information such as photographs and documents and translate it into a digital image. ❑ There are different types of scanners, but the flatbed scanners, as shown in the picture, are commonly used. ❑ Microphone ❑ A Microphone is an audio input device that converts sound signals into a form that can be processed by a computer. ❑ A mic is commonly used with computers to record audio or communicate over the Internet. ❑ Used to direct & control computers (to some extent) using a Voice 23 Recognition System. OUTPUT DEVICES (1) Output devices are used by the computer system to give us the output. They receive data from a computer and produce output through monitors, speakers, printers, etc. For example, a printer produces information in the form of a hard copy printout. Another example of an output device is a computer monitor, which displays an image that is stored in a computer. Monitors and printers are two of the most common output devices used with a computer 24 OUTPUT DEVICES (2) ❑ A Monitor is similar to a TV screen. It converts the information processed by the computer into visual images and displays it to the user. The output of a Monitor is referred to as a soft copy ❑ A printer enables you to take the information processed by the computer on to paper. Printer output is called a hard copy ❑ Speakers or Headphones are the audio output devices, that play sound output from a computer. For example, playing an audio file, text-to-speech, system notifications, etc. 25 THE SYSTEM UNIT (1) The System Unit, also known as System Cabinet, is a container housing most of the electronic components that make up a computer system. It has three important components i.e., A Motherboard, Central Processing Unit (CPU) and Memory. ❑ Motherboard, also known as system board, is the communication medium for the entire computer system. ❑ It is a flat circuit board where every hardware component, such as CPU, Memory, Hard disk, etc. are connected. ❑ All hardware devices communicate with one another through the motherboard 26 THE SYSTEM UNIT (2) ❑ The Central Processing Unit (CPU), also known as Microprocessor of a computer, is an electronic chip that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system. The CPU is like the brain of the computer. It consists of two parts: ❖ Control Unit (CU) ❖ Arithmetic-Logic Unit (ALU). 27 THE SYSTEM UNIT (3) ❑ Primary memory Before instructions can be processed by a CPU, they are stored along with other data in computer memory. ❑ Computer memory is the storage space in a computer where data is processed and stored. ❑ All computers have some amount of memory consisting of chips. Memory is measured in terms of bytes ❑ There are two well-known types of memories available in computer systems: ❖ Random-Access Memory (RAM) ❖ Read-Only Memory (ROM) 28 CPU COMPONENTS ❑ CPU consists of: ❖ The Control Unit (CU) controls the rest of the computer system to carry out specified instructions. o It controls the movement of signals among CPU, memory, and other devices. ❖ Arithmetic-Logic Unit (ALU) The Arithmetic-Logic Unit performs arithmetic and logical operations. o Arithmetic operations are the basic mathematical operations like Addition, Subtraction, Multiplication, and Division. Logical operations of ALU include logical comparisons such as Greater than (>), Less than (>) 29 MEMORY TYPES (1) ❑ RAM Random-Access Memory (RAM) holds programs (instructions) and data currently required by the CPU to process. ❑ RAM is called temporary or Volatile storage as everything in RAM is lost when the computer is switched off. ❑ When we save a file in a computer (e.g. a letter) it is copied from the RAM and stored onto a permanent storage device, like the hard disk of the computer. ❑ Thus, the RAM functions as a scratch pad memory to save the information temporarily. ❑ Most computers today are equipped with at least 4 GB of RAM. Extra memory can be added to a computer by plugging new memory chips 30 inside the system unit. MEMORY TYPES (2) ❑ Read-Only Memory (ROM) is a permanent memory having built-in programs from the manufacturer. ❑ ROM chips contain instructions for booting of the computer. ❑ Unlike RAM, ROM is non-volatile i.e., data in ROM is not lost when the computer is turned off. ❑ The information in ROM can’t be deleted or modified. 31 MEMORY TYPES (3) ❑ Secondary Storage devices ❖ Every computer should have the ability to store information for long period of time even after the computer has been switched off. ❖ This is achieved by the Secondary Storage devices. There is a variety of such secondary storage devices, like Hard disks, CDs, Flash Drives, etc. ❖ The hard disk is the main secondary storage device in the computer system. It permanently stores software and data files. ❖ There are two types of Hard Disks: Internal Hard Disk (Installed within the System Unit) External (Portable) Hard disk 32 ❖ Usually, a Hard Disk has a storage capacity of 500 GB or more MEMORY TYPES (4) ❑ Compact Disc ❖ Compact Disc (CD) is one of the most widely used secondary storage media based on optical format. There are three basic types of CDs: CD-R, CD-ROM, and CD-RW ❖ CD-R (Compact Disc – Recordable) These are CDs, which are recordable only once, can be read several times, but can’t be erased. It is used to save data files and programs. Their storage capacity ranges between 650 MB to 700 MB. ❖ CD-ROM (Compact Disc-Read Only Memory) CD-ROM has the data imprinted by the manufacturer. These are used to distribute large software applications, video games, user guides, etc. 33 MEMORY TYPES (5) ❖ CD-RW (Compact Disc-Rewritable) CD-RW allows erasing of previously recorded information and writing (recording) of new information on the same physical location ❖ DIGITAL VERSATILE DISC (DVD) DVDs are similar to CDs, except that they have a different format with high storage capacity ranging from 4.7 GB to 17 GB. Like CDs, DVDs are also in the form of DVD-R, DVD-ROM & DVD-RW ❖ Flash drive These are removable and rewritable storage devices, which allow you to copy, transfer and erase data several times. Flash drives are available in different storage capacities. Generally, its storage capacity ranges from 1 GB to 2 TB. 34 UNITS OF MEMORY MEASUREMENT 35 Information Security (1) - Password A Password is a set of characters (letters, numbers and special characters) used to get access to a computer, web page, network resource or data. Creating a strong password is the responsibility of the owner. Below are the recommendations for creating a strong password: ❑ The password should be difficult to guess. ❑ The password should not be less than the length of 8 characters. ❑ The password should contain a mixture of numbers, letters and special characters (such as * , - , / , ! , @ , # , etc.). ❑ The password should not contain the user's name. ❑ The password should not contain the user’s personal information, such as name, street address, phone number, date of birth etc. 36 Information Security (2) - Password Tips ❑ Do not share your passwords with others. If you are provided with a new password, change it immediately after you use it for the first time. ❖ Change your passwords periodically. ❖ Do not use the same password everywhere such as e-mail, bank account, etc. ❖ Do not keep a written record of passwords on a paper or in an e- mail message. ❖ Avoid using the “Remember Password” option everywhere.. 37 Information Security (3) - MALICIOUS SOFTWARE Malicious software, also known as Malware, is any program or file that is harmful to a computer or the privacy of users. The harm done by malware can vary from something slight as changing the author’s name on a document to full access of your machine without being traced. Malware types can be categorized as follows: ❑ Viruses ❑ Worms ❑ Spywares ❑ Trojan Horse 38 Information Security (4) - MALICIOUS SOFTWARE ❑ A computer virus is a malicious program that attaches itself to a file or a program, enabling it to spread and infect different files. ❖ Viruses can be transmitted as attachments to an e-mail or in a downloaded file. ❖ Viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program. ❑ Worms are standalone malicious software and do not require a host program or human help to spread. ❖ It replicates its functional copies and can consume system memory and network bandwidth, which in turn slows down or causes failure of the computer/network system. 39 Information Security (5) - MALICIOUS SOFTWARE ❑ Spyware is classified as privacy-invasive software. ❖ The most common spyware function is to steal personal information and address book (identity theft and keystroke-logging). ❖ It hijacks the browser and redirects it to advertising web pages. ❑ A Trojan is a harmful piece of software that looks genuine. ❖ After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files or activating and spreading other malware). ❖ Trojans are also known to create back doors to give malicious user access to the system. 40 Information Security (6) - Others ❑ A hoax is a false warning about a computer virus. Typically, the warning arrives in an e-mail note. ❖ These kinds of email notes pretend that they are from IBM, Microsoft or other genuine companies. A number of hoaxes have warned users that vital system files are viruses and encourage them to delete those files, possibly damaging the system. ❑ Phishing is an un-authorized attempt to obtain vital information such as usernames, passwords, and credit card details by hackers masked as trustworthy entities in an electronic communication. ❖ Often the attackers use fake e-mails or websites in an attempt to scam the user into surrendering private information. 41 How malicious software enters your computers ❑ Malicious software usually enters our computers through the following ways: ❖ Removable storage devices. ❖ Email attachments. ❖ Internet downloads. ❑ To stay protected from malicious software: ❖ Be aware of common virus symptoms and the ways they attack. ❖ Be aware of suspicious, new process names in the list of running processes. ❖ Avoid using the “auto-run” option in Windows OS for portable drives. ❖ Use anti-spyware software, anti-virus software and scan and update regularly. ❖ Always be wary of strange e-mails, especially ones with attachments. 42 BACKUP ❑ Backup is the activity of storing multiple copies of important files, databases or software so that the information is preserved in case of computer failure, hard disk crash or other disaster ❑ Personal computer users can back up important data in two ways: ❖ Local Backup ❖ Internet Backup (cloud storage). ❑ Local Backup This is backing up data on an external hard disk, CD, flash drives, etc. ❑ Internet Backup (Cloud Storage) This is backing up of data onto several servers on the internet. Many cloud storage services offer a free limited storage space, which is commonly enough for most users. Examples of cloud storage service providers: ❖ Drop Box – offers up to 2 GB free space from DropBox ❖ Google Drive- offers up to 15 GB free space from Google ❖ OneDrive- offers up to 15 GB free space from Microsoft 43 COPYRIGHT (1) ❑ Copyright is the ownership of an intellectual property within the limits prescribed by a national or international law. ❖ This ownership protection is available for both published and unpublished works. A copyright law grants ownership rights to the owner exclusively. These rights include: To reproduce the work. To prepare derivative works. To distribute copies. To perform the work. To display the work publicly 44 COPYRIGHT (2) ❑ A copyright notice should contain the following three elements: ❖ The symbol © (the letter C in a circle), the word “Copyright” or the abbreviation “Copr.” ❖ The year of the copyright. ❖ The name of the owner of the copyright ❖ Example: © 2020 Supreme Council of Universities. 45 Activities (1) ❑ Another name for a desktop computer is ….. a) Mainframe computer b) Tablet PC c) Personal computer d) Parallel computer ❑ Which one of the following is not an input device? a) Scanner b) Mouse c) Keyboard d) Speaker 46 Activities (2) ❑ This part tells the rest of the computer system to carry out specified instructions. a) Arithmetic Logical Unit b) Control Unit c c) Microphones d) Read Only Memory ❑ RAM stands for …… a) Random Active Memory b) Random Access Memory c) Read Access Memory d) Real Access Memory 47 Reference ❖ Copyrights© The Central Unit of IT Training ❖ © 2021 Supreme Council of Universities. 48

Tags

information technology computer science hardware and software
Use Quizgecko on...
Browser
Browser