IT Module 7-14 PDF
Document Details
Uploaded by CheeryElectricOrgan
University of the Philippines
Tags
Summary
This document describes computer components, including the system unit, motherboard, processor, memory, and input/output devices. It also covers operating systems, storage devices, and computer communications. The document appears to be part of a larger IT course or curriculum.
Full Transcript
Module 7: Components of the System Unit ○ ROM (Read-Only Memory): Nonvolatile memory that stores permanent data and instructions. The data on most...
Module 7: Components of the System Unit ○ ROM (Read-Only Memory): Nonvolatile memory that stores permanent data and instructions. The data on most ROM System Unit: This is the case that houses the electronic chips cannot be modified. components of the computer used to process data. It's available in ○ Flash Memory: Nonvolatile memory that can be erased various shapes and sizes, made of metal or plastic, and protects the electronically and rewritten. It's used to hold startup internal components from damage. instructions and data on many mobile devices. Motherboard: The main circuit board of the system unit. Many ○ CMOS (Complementary Metal-Oxide Semiconductor): A electronic components attach to it, and others are built into it. It's type of memory that uses battery power to retain information where memory chips are installed on memory cards (modules). even when the computer is off. Processor (CPU): Interprets and carries out the basic instructions Expansion Slots and Adapter Cards: An expansion slot is a socket that operate a computer. It significantly impacts overall computing on the motherboard that can hold an adapter card. An adapter card power and manages most of a computer's operations. enhances functions of a component of the system unit and/or ○ Control Unit: Directs and coordinates most of the provides connections to peripherals. Peripherals are devices that operations in the computer. It interprets each instruction and connect to the system unit and are controlled by the processor. initiates the appropriate action. Examples of peripherals include modems, disk drives, printers, ○ Arithmetic Logic Unit (ALU): Performs arithmetic, scanners, and keyboards. comparison, and other operations. ○ Machine Cycle: The processor repeats a set of four basic Module 8: Input and Output Devices operations for every instruction: fetching, decoding, executing, and storing. Input: Any data and instructions entered into the memory of a ○ System Clock: Controls the timing of all computer computer. operations. Its pace, called the clock speed, is measured by Input Devices: Allow users to enter data and instructions into a the number of ticks per second. computer. Examples include: ○ Data Representation: Computers are digital and recognize ○ Keyboard: Users press keys to enter data and instructions. only two states: on and off. The two digits, 0 and 1, represent ○ Mouse: A handheld device used to control the pointer on the these states. The computer uses a binary system because it screen and make selections. recognizes only two states. The smallest unit of data the ○ Trackball: A stationary pointing device with a ball on its top computer can process is a bit (binary digit). Eight bits or side. grouped together form a byte, which can represent 256 ○ Touchpad: A small, flat, rectangular pointing device that's individual characters. sensitive to pressure and motion. Memory: Consists of electronic components that store instructions ○ Pointing Stick: A pressure-sensitive pointing device shaped waiting to be executed by the processor, data needed by those like a pencil eraser that's positioned between keys on a instructions, and the results of processing the data (information). It keyboard. usually consists of one or more chips on the motherboard. ○ Touch Screens: Touch-sensitive display devices that ○ RAM (Random Access Memory): Volatile memory that can respond to touch. be read from and written to by the processor and other ○ Pen Input: Users touch a stylus or digital pen on a flat devices. It holds items like operating system files, application surface to write, draw, or make selections. programs, and data being processed. ○ Game Controllers: Input devices used to direct movements and actions of on-screen objects in video games. Examples include gamepads, joysticks, wheels, light guns, dance pads, ○ Printers: Produce text and graphics on paper. Examples and motion-sensing controllers. include ink-jet printers, photo printers, laser printers, thermal ○ Digital Cameras: Capture images digitally instead of on film. printers, mobile printers, plotters, and large-format printers. ○ Voice Input: Entering input by speaking into a microphone. ○ Speakers, Headphones, and Earbuds: Produce music, Examples include voice conversations, voice chats, and speech, or other sounds. voice recognition. ○ Data Projectors: Project text and images from a computer ○ Audio Input: Entering any sound into the computer, such as screen onto a larger screen. speech, music, and sound effects. ○ Interactive Whiteboards: Touch-sensitive display devices ○ Video Input: Capturing full-motion images and storing them that respond to touch and allow users to control a computer on a computer's storage medium. program. ○ Webcams: Digital video cameras for capturing video and still images. Module 9: Storage Devices ○ Scanners: Light-sensing input devices that read printed text and graphics and then translate the results into a form the Storage: Holds data, instructions, and information for future use. computer can process. Storage Media: Physical materials on which a computer keeps data, ○ Optical Readers: Devices that use a light source to read instructions, and information. Examples include hard disks, solid characters, marks, and codes and then converts them into state drives, memory cards, USB flash drives, Express Card digital data that a computer can process. Examples include modules, optical discs, smart cards, magnetic stripe cards, and optical character recognition (OCR) and optical mark microfilm. recognition (OMR). Storage Devices: Computer hardware that records and/or retrieves ○ Bar Code Readers: Use laser beams to read bar codes, items to and from storage media. which are identification codes that identify the manufacturer ○ Hard Disks: Contain one or more inflexible, circular platters and the item. that use magnetic particles to store data. ○ RFID Readers: Use radio signals to communicate with tags ○ RAID (Redundant Array of Independent Disks): A placed in or attached to an object, an animal, or a person. configuration that connects multiple smaller disks into a ○ Magnetic Stripe Card Readers: Read the magnetic stripe single unit that acts like a single large hard disk. on the back of credit cards, entertainment cards, and bank ○ NAS (Network Attached Storage): A server connected to a cards. network with the sole purpose of providing storage. ○ MICR Readers: Read text printed with magnetized ink. ○ External and Removable Hard Disks: External hard disks ○ Biometric Input: Authenticating a person's identity by are separate freestanding units that connect to a computer, verifying a personal characteristic. Examples include while removable hard disks are inserted and removed from a fingerprint readers, hand geometry systems, face recognition drive. systems, voice verification systems, signature verification ○ Miniature Hard Disks: Smaller hard disks found in portable systems, iris recognition systems, and retinal scanners. media players, digital cameras, and smartphones. ○ Hard Disk Controllers: Special-purpose chips and Output: Data that has been processed into a useful form. electronic circuits that control the transfer of data, Output Devices: Convey information to users. Examples include: instructions, and information from a disk to and from the ○ Display Devices: Visually convey text, graphics, and video system bus and other components in the computer. information. Examples include monitors, LCD screens, plasma monitors, and CRT monitors. ○ Flash Memory Storage: Nonvolatile memory that can be ○ Kernel: The core of an operating system that manages erased electronically and rewritten. Examples include solid memory and devices, maintains the computer's clock, starts state drives (SSDs) and memory cards. programs, and assigns the computer's resources. ○ Memory Cards: Removable flash memory devices that are ○ User Interface: Controls how users enter data and inserted and removed from a slot in a computer, mobile instructions and how information is displayed on the screen. device, or card reader/writer. Examples include graphical user interfaces (GUIs) and ○ USB Flash Drives: Flash memory storage devices that plug command-line interfaces. into a USB port on a computer or mobile device. ○ Managing Programs: How an operating system handles ○ Express Card Modules: Removable devices that fit in an programs directly affects user productivity. Single user/single Express Card slot and can be used to add memory, storage, tasking operating systems allow only one user to run one communications, multimedia, and security capabilities to a program at a time. Single user/multitasking operating computer. systems allow a single user to work on two or more ○ Cloud Storage: An Internet service that provides hard disk programs that reside in memory at the same time. Multiuser storage to computer users. operating systems enable two or more users to run ○ Optical Discs: Flat, round, portable discs made of metal, programs simultaneously. Multiprocessing operating systems plastic, and lacquer. Examples include CD-ROMs, CD-Rs, support two or more processors running programs at the CD-RWs, DVDs, and Blu-ray Discs. same time. ○ Tape: A magnetically coated ribbon of plastic used for ○ Managing Memory: Optimizes the use of random access long-term storage and backup. memory (RAM). Virtual memory is a concept in which the ○ Magnetic Stripe Cards: Credit cards, entertainment cards, operating system allocates a portion of a storage medium, and bank cards that contain information identifying the user usually the hard disk, to function as additional RAM. The and the card issuer. operating system swaps items between memory and storage ○ Smart Cards: Store data on a thin microprocessor using a technique called paging. embedded in the card. ○ Coordinating Tasks: The operating system determines the ○ Microfilm and Microfiche: Store microscopic images of order in which tasks are processed. A task, or job, is an documents on roll or sheet film. operation the processor manages. The operating system places items in buffers while waiting to be transferred from an input device or to an output device. This process, called Module 10: Operating Systems and Utility Programs spooling, sends documents to be printed to a buffer instead of sending them immediately to the printer. Operating System (OS): A set of programs containing instructions ○ Configuring Devices: A driver is a small program that tells that work together to coordinate all the activities among computer the operating system how to communicate with a specific hardware resources. device. Plug and Play means the operating system ○ Operating System Functions: Starting and shutting down a automatically configures new devices as you install them. computer, providing a user interface, managing programs, ○ Establishing an Internet Connection: Operating systems managing memory, coordinating tasks, configuring devices, typically provide a means to establish Internet connections. establishing an Internet connection, monitoring performance, ○ Monitoring Performance: Operating systems typically providing file management and other utilities, updating contain a performance monitor, which assesses and reports automatically, controlling a network, and administering information about various computer resources and devices. security. ○ Booting: The process of starting or restarting a computer. ○ Providing File Management and Other Utilities: Operating file compression utilities, media players, disc burning software, and systems often provide users with the capability of managing personal computer maintenance utilities. files, searching for files, viewing images, securing a computer from unauthorized access, uninstalling programs, Module 12: Uses of Computer Communications cleaning up disks, defragmenting disks, diagnosing problems, backing up files and disks, and setting up screen Computer Communications: The process in which two or more savers. computers or devices transfer data, instructions, and information. ○ Updating Software Automatically: Many popular Types of Computer Communications: Blogs, Chat Rooms, E-Mail, programs, including most operating systems, include an Fax, FTP, Instant Messaging, Internet, Newsgroups, RSS, Video automatic update feature that automatically provides Conferencing, VoIP, Web, Web 2.0, Web Folders, and Wikis. updates to the program. Wireless Messaging Services: Text messaging, picture/video ○ Controlling a Network: Some operating systems are messaging, and wireless instant messaging. designed to work with a server on a network. A server Wireless Internet Access Points: Provide Internet connections to operating system organizes and coordinates how multiple mobile computers and devices. Examples include hot spots and users access and share resources on a network. The mobile wireless networks. network administrator uses the server operating system to Global Positioning Systems (GPS): Navigation systems that use add and remove users, computers, and other devices to and satellites to determine the receiver's geographic location. from the network. Collaboration: Working online with other users connected to a server. Examples include collaborative software and document Module 11: Operating Systems and Utility Programs management systems. Groupware: Software that helps groups of people work together on Types of Operating Systems: Stand-alone operating systems, projects and share information over a network. server operating systems, and embedded operating systems. Voice Mail: Allows someone to leave a voice message for one or ○ Stand-Alone Operating Systems: Work on a desktop more people. computer, notebook computer, or mobile computing device. Web Services: Standardized software that enables programmers to Examples include Windows 7, Mac OS X, UNIX, and Linux. create applications that communicate with other remote computers ○ Server Operating Systems: Designed specifically to over the Internet or over an internal business network. support a network. Examples include Windows Server 2008, Mashups: Web applications that combine services from two or more UNIX, Linux, Solaris, and Novell's NetWare. sources, creating a new application. ○ Embedded Operating Systems: Reside on a ROM chip and are used on mobile devices and consumer electronics. Module 13: Communications and Networks Examples include Windows Embedded CE, Windows Phone 7, Palm OS, iPhone OS, BlackBerry, Google Android, Networks: Collections of computers and devices connected together embedded Linux, and Symbian OS. via communications devices and transmission media. Utility Programs: Perform maintenance-type tasks, usually related Types of Networks: Local area networks (LANs), metropolitan area to managing a computer, its devices, or its programs. Examples networks (MANs), and wide area networks (WANs). include file managers, search utilities, disk cleanup and ○ LAN (Local Area Network): Connects computers and defragmenter utilities, backup and restore utilities, personal firewalls, devices in a limited geographical area. antivirus programs, spyware and adware removers, Internet filters, ○ MAN (Metropolitan Area Network): Connects local area networks in a metropolitan area. ○ WAN (Wide Area Network): Covers a large geographic area Internet and Network Attacks: Attacks that jeopardize security and uses a communications channel that combines many include computer viruses, worms, Trojan horses, and rootkits; types of media. botnets; denial of service attacks; back doors; and spoofing. Network Architectures: Client/server networks and peer-to-peer Safeguards against Computer Viruses and Other Malware: Use networks. antivirus programs, personal firewalls, intrusion detection software, ○ Client/Server Networks: One or more computers act as a and practice safe computing habits. server, while other computers on the network request Unauthorized Access and Use: The use of a computer or network services from the server. without permission. ○ Peer-to-Peer Networks: Each computer has equal Safeguards against Unauthorized Access and Use: Implement responsibilities and capabilities, sharing hardware, data, or access controls, use usernames and passwords, use possessed information with other computers on the network. objects, use biometric devices, and have a written acceptable use Network Topologies: Star networks, bus networks, and ring policy (AUP). networks. Hardware Theft and Vandalism: The act of stealing or defacing ○ Star Network: All computers and devices connect to a computer equipment. central device. Safeguards against Hardware Theft and Vandalism: Use physical ○ Bus Network: Computers and devices connect to a single access controls, alarm systems, and tracking software. central cable. Software Theft: Stealing software media, intentionally erasing ○ Ring Network: A cable forms a closed loop with all programs, illegally copying a program, or illegally registering and/or computers and devices arranged along the ring. activating a program. Intranets: Internal networks that use Internet technologies. Safeguards against Software Theft: Use license agreements, back Network Communications Standards: Define guidelines for how up files and disks regularly, and practice safe software habits. computers access the medium to which they are attached, the Information Theft: Stealing personal or confidential information. type(s) of medium used, the speeds used on different types of Safeguards against Information Theft: Use encryption techniques, networks, and the type(s) of physical cable and/or the wireless digital signatures, and digital certificates. technology used. Examples include Ethernet, token ring, TCP/IP, System Failure: The prolonged malfunction of a computer. Wi-Fi, Bluetooth, UWB, IrDA, RFID, WiMAX, and WAP. Safeguards against System Failure: Use surge protectors, uninterruptible power supplies (UPS), and redundant components or computers Module 14: Computer Security and Safety, Ethics, and Privacy Computer Security Risks: Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. ○ Types of Security Risks: Internet and network attacks, unauthorized access and use, hardware theft, software theft, information theft, and system failure. ○ Perpetrators of Cybercrime: Hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists.