Computer Fundamentals Summary PDF
Document Details
Uploaded by EnticingWerewolf3014
Tags
Summary
This document provides a summary of computer fundamentals. It covers hardware components like input, output, storage, processing, and communication devices. The software aspect includes system and application software, along with details on computer users and professionals. Furthermore, different categories of computers and their networks, including the internet, are explained.
Full Transcript
## Hardware - **The physical parts of a computer** - **Devices** - **Definition** - **Example** - **Input** - Used to input data into the computer - Keyboards, mice, scanners, cameras - **Output** - Present results to the user - Monitors, printers, speakers, projectors...
## Hardware - **The physical parts of a computer** - **Devices** - **Definition** - **Example** - **Input** - Used to input data into the computer - Keyboards, mice, scanners, cameras - **Output** - Present results to the user - Monitors, printers, speakers, projectors - **Storage** - Used to store data - Hard drives, CD/DVD, USB flash drives - **Processing** - Perform calculation and control operation - Central processing unit (CPU) and memory - **Communications** - Allow users to communicate with others - Modems, network adapters ## Software - **Programs or instructions used to tell the computer hardware what to do.** - **Type** - **Definition** - **Examples** - **System software** - Operating system starts up the computer, controls its operation and launches programs - Windows, Mac OS, Linux, - **Application software** - Performs specific tasks or applications - Creating letters, Playing games, Viewing Web pages, Sending and receiving e-mail ## Computer Users and Professionals - **Computer users (end users):** People who use a computer to obtain information - **Computer professionals include:** Programmers, Systems analysts, Security specialists ## Computer Categories - **Six basic categories of computers** - **Embedded** - Embedded into a product and designed to perform specific tasks or functions - Household appliances Sewing machine, Cars - **Mobile device** - Very small device with Internet capability - Smart phonegaming device - **Personal** - Small computer designed to be used by one person a time. - **Desktop computers:** Fit on or next to a desk, use tower case - **Portable Computers:** are fully functioning computers example - Notebook (laptop), Tablet, - **Midrange** - Called medium-sized computer used to host programs - Servers minicomputer - **Mainframe** - Powerful computer used by several large organizations to manage large amounts of centralized data - Hospitals, universities, banks, government offices - **Supercomputer** - Larger, more expensive, and more powerful than servers. Fastest, most expensive, most powerful type of computer. - Space exploration, satellite, weather forecast, oil exploration, scientific research ## Computer Networks and The Internet - **Computer network** - Collection of computers and other devices that are connected together - **Internet** - Largest and most well-known computer network in the world. It is technically a network of networks - **WorldWide Web (WWW)** - Collection of Web pages available through the Internet. - **Web page** - Document, typically containing hyperlinks to other documents. - **Web site:** Collection of related Web pages usually belonging to an organization or individual. - **Web server** - Computer that is continually connected to the Internet and hosts Web pages - **Web browser** - Program used to view Web pages ## The System Unit: Processing and Memory. <start_of_image> Privacy - **State of being concealed or free from unauthorized intrusion** - **Information privacy** - Rights of individuals and companies to control how information about them is collected and used. ## Intellectual Property Rights - **Legal rights to which creators of original creative works (such as artistic or literary works, such as an IP address, domain name, or e-mail address.)** - **Copyright** - Legal right to sell, publish, or distribute an original artistic or literary work - **Digital watermark** - Subtle alteration of digital content that is not noticeable when the work is viewed or played - **Trademark** - Word, phrase, symbol, or design that identifies goods or services - **Patent** - Form of protection for an invention that can be granted by the government. ## Ethics - **Overall standards of moral conduct.** - **Computer ethics:** Standards of moral conduct as they relate to computer use. - **Business ethics** - Standards of moral conduct that guide a business’s policies, decisions, and actions. - **Plagiarism** - Presenting someone else’s work as your own. - **Computer hoax** - Inaccurate statement or story spread through the use of computers - **Digital manipulation** - Alteration of digital content, usually text or photographs. ## The Internet - **Internet** - Largest and most well-known computer networkmillions computers all over world. - **ARPANET** - Predecessor to the Internet, named Advanced Research Projects Agency (ARPA). - **World Wide Web (WWW)** - Collection of Web pages available through the Internet. - **Internet service provider (ISP)** - Business or organization that provides Internet access to others, typically for a fee. ## Searching the Internet - **Search site:** Web site designed to help users search for Web pages - **Search engine:** Software program used by a search site to retrieve matching Web pages from a search database. ## Accessing the Internet - **Internet address** - Address that identifies a computer, person, or Web page on the Internet, . - **IP address:** Numeric Internet address used to uniquely identify a computer on the Internet - **Browsers** - Are programs that provide access to web resources. - **Four well-known browsers are:** - Apple Safari - Google Chrome - Microsoft Edge - Mozilla Firefox ## Uniform Resource Locator (URL): - **Internet address** (usually beginning with http://) that uniquely identifies a Web page. - **The location or address of the resources.** ## Top-Level Domain (TLD) - **Domain** - **Type** - .com - Commercial - .edu - Educational - .gov - Government - .mil - U.S. military - .net - Network - .org - Organization ## Uses of Internet: 2S+2E+C - **Communication** - **Shopping** - **Searching** - **Education or Elearning** - **Entertainment** ## Computer Security - **Focuses on protecting information, hardware, and software from unauthorized use as well as preventing damage.** - **Computer security risk** - Any event or action that could cause a loss of or damage to computer hardware. - **Computer Crime** - Any illegal act involving a computer. - **Unauthorized access** - Gaining access to a computer, mobile device, network. - **Unauthorized use** - Using a computing resource for unapproved activities - **Hacking** - Using a computer to break into another computer system. - **Hacker** - Someone who accesses a computer or network illegally. - **denial of service attacks** - An act of sabotage that attempts to flood a network server or a Web server - **back door** - Is a program or set of instructions in a program that allow authorized and unauthorized users to bypass security controls. - **Computer sabotage** - Act of malicious destruction to a computer or computer resource. - **Computer sabotage** - Computer that is controlled by a hacker or other computer criminal. - **Bot** - Group of bots that are controlled by one individual. - **Botnet** - Any type of malicious software - **Computer virus:** A software program installed without the user’s knowledge - **Computer worm** - Malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. - **Trojan horse** - Malicious program that masquerades as something else. ## Protecting Against Computer Sabotage - Do not start computer with removable media. - Never open an e-mail attachment - Install an antivirus program. - Firewall: A collection of hardware and/or software intended to protect a computer - Backup: Is a duplicate of (copy) a file, program, or disk that can be used if original is lost, damaged, or destroyed. - User Names And Passwords: - **User name:** Is a unique combination of characters - **Password:** Is a private (secret) combination of characters - **Encryption:** A method of scrambling the contents of an e-mail message transmitted via that Web page. - **Secure Web page:** A Web page that uses encryption to protect information transmitted via that Web page. - **Public key encryption:** A type of encryption that uses key pairs to encrypt and decrypt the file or message. - **Private key encryption:** A type of encryption that uses a single key to encrypt and decrypt the file or message. - **Antivirus:** Software used to detect and eliminate computer viruses and other types of malware ## Theft of Data, Information. - **Identity theft** - Using someone identity to purchase goods or services, obtain new credit cards or bank loans.. - **Social media hack** - Act of accessing someone social media account to make changes to the content or to perform - **Phishing** - Use of spoofed communications (typically e-mail messages) to gain credit card numbers. - **Pharming** - Use of spoofed domain names to obtain personal information in order to use that information ## Communication - **Exchange e-mail, photos, and videos with your family and friends from almost anywhere in the world** - **E-mail** - Electronic messages sent from one user to another over the Internet or other network - **Messaging** - Text messaging (texting and sms) is process of sending short electronic messages – typically less than 160 characters. - **Instant messaging (im):** Supports live communication between friends. - **Include video conferencing features, file sharing, and remote assistance.** - **Social networking** - Social networks connect individuals to one another. - **Facebook** - **Instagram** - **Twitter** - **Snapchat** - **Linkedin** ## E-learning: - We obtain through the Internet using communication technologies and electronic devices. - E-learning is enabled electronically. Typically is conducted on the Internet. - Students can access their learning materials online at any place and time. ## E-learning Content - **Simple learning resources** - Documents, PowerPoint presentation, Video and audio files. - **Interactive lessons** - Texts, animations, audio and videos. - **Electronic simulations** - Simulate the real world ## Types of E-learning - **The learners and the teacher** - **Example** - **Synchronous E-learning** - Are online and interact at the same time from different locations - Virtual Classroom-Audio and Video Conferencing-Chat-Webinars - **Asynchronous E-learning** - Cannot be online at same time - Email-Blogs-Discussion boards/forums-Pre-recorded videos - **Distance Learning** - Distance learning is when students are separated from teachers and peers. - Do not meet in a classroom but use the internet, e-mail, etc. to have classes. - **Blended Learning** - Combines both traditional (face to face) and online learning together. - Rotation-Flex-Enriched Virtual ## Components of E-learning: 3S + LM - **Students** - **Teachers** - **Technicians** - **Assistants** - **Administrators** - **Learning Management System (LMS):** Is a software application for the administration of e-Learning; ## Advantages of E-learning: 3S+WF - **Saves time.** - **Saves money.** - **Study Where You Want to** - **Less expensive.** - **More available.** - **Full Flexibility** ## Disadvantages of E-learning: 3F + 2S + CD - **Face-to-face communication is lacked.** - **Feedback is limited.** - **Focuses more on theory.** - **Social isolation** - **Self-motivation** - **Cheating is unavoidable** - **Depends on technology a lot** - **Depends** ## E-Commerce - **Doing business transactions over the Internet or similar technology** - **E-commerce** - E-commerce performed via a smartphone or other mobile device. - **E-commerce system** - Collection hardware, software, people used to perform and support e-commerce. - **Near field communications (NFC):** - Short-range wireless technology based on RFID and used to transfer payments. ## E-Commerce - **Advantages For businesses RICH** - **Reduced costs** - **Increased customer satisfaction** - **Customer base** - **Higher sales** - **Advantages For customers 2C+EH** - **Convenience** - **Customized products** - **Easier comparison shopping** - **Higher degree of selection** - **Disadvantages For businesses. RMLH** - **Must have an effective Web site.** - **Lost business** - **Higher rate of fraudulent transactions** - **Recurring threat** - **Disadvantages For customers. 2P +B** - **Potential for fraud** - **Buying goods without seeing** - **Possible expensive returns** ## E-commerce Business Models: - **Description of how an e-commerce company does business, such as the types of buyers and sellers involved.** - **Four main e-commerce business models are:** - **Business to consumer (B2C)** - Business provides goods or services to consumers - **Business to Business (B2B)** - Business provides goods or services to other businesses - **Consumer to Consumer (C2C)** - Consumer provides goods or services to other consumers - **Business to Government (B2G)** - Business provides goods and services to government organizations ## Online Auction Site - Web site where potential buyers bid on an item and, at the end of a set time period, the highest bidder buys(ebay) ## Security Issues - **Secure transactions** - All financial transactions should take place on a secure Web server; - **Secure sensitive documents and files** - Tools such as digital certificates and digital signatures can be used - **Authenticate online business partners** - Sensitive business documents should also be encrypted when sent ## System software - **Programs (operating system and utility) that control your computer and allow you to use it.** - **Serves as the interface between the user, application, and hardware.** - **System software consists of four types of programs:** - **Utilities** - Perform specific tasks related to managing computer resources. - **Antivirus programs** - Also called a utility, is performs specific tasks related to managing computer resources - **Backup programs** - **File compression programs** - **Device drivers** - Are specialized programs that allow particular input or output devices. - **Language translators** - Convert the programming instructions written by programmers into a language - **Operating system (OS)** - Is a collection of programs that manage and coordinate the activities - **Categories of Operating Systems:** - **Stand-alone operating systems** - Embedded are entirely stored within (embedded in) a device, cash registers - **Network operating systems** - Are used to control and coordinate computers that are networked - **Desktop operating systems** - Designed to be installed and control a single computer, windows, mac. - During the 1980 s and early 1990s, DOS (Disk Operating System) was the dominant operating system for microcomputers. DOS traditionally used a command line interface, - **Windows:** Is the most widely used personal computer operating system developed by Microsoft. - **Mac OS:** Designed to run only with Apple computers. - **UNIX:** Designed in the late 1960s to run on minicomputers in network environments - **Linux:** Is an open source operating system that extended one of the UNIX versions. - **Open Source:** Allowed free distribution of the operating system code - **Functions of operating system: SB+4M** - **Security** - **File Management** - **Managing Resources** - **Managing Network** - **Monitoring Resources** - **Booting the Computer** - **Mobile operating systems:** Designed to be used with mobile phones and other mobile devices. - **Android** - Introduced in 2007 It was originally developed by Android Inc. and later purchased by Google. - **iOS. (iPhone OS):** The mobile operating system designed mobile phones and mobile devices in 2007. - **User Interfaces** - **Command-line interface** - User types commands or presses special keys on keyboard to enter data. - **Graphical user interface (GUI):** - User interact with menus and visual images such as buttons ## Network Size and Coverage Area - **Name** - **Definition** - **Examples** - **PANS** - Network that connects two or more of an individual's personal devices - Computer, mobile phone, smart watch,media tablet - **LANS** - Network that covers a small geographical area. - Home, office building, school - **MANS** - Network that covers a metropolitan area. - City or county - **WANS** - Network that covers a large geographical area. (two or more LANS) - Internet - **Intranet** - Private network used by an organization's employees and is set up like the Internet - **Extranet** - Intranet that partially accessible to authorized outsiders. - **VPN** - Private, secure path over the Internet that provides authorized users a secure means via the Internet. ## Networking Media - **Media Types** - **Wired** - Twisted-pair. - Coaxial. - Fiber optic cable. - **Wireless** - Cellular Radio Transmissions - Used with cell phones and are sent and received via cellular (cell) towers. - Microwave - Are high-frequency radio signals can send large data at high speeds long distances. - Satellites - Are space-based devices launched into orbit around the earth - Bluetooth - Is a short-range radio communication short distances of up to 33 feet - Wi-Fi (wireless fidelity) - Uses high-frequency radio signals to transmit data. ## Communications Protocols - **Protocol** - Is a set of rules to be followed that determine how devices on a network communicate. - **HTTPS: (hypertext transfer protocol secure).** - **TCP/IP (transmission control protocol/Internet protocol).** - **FTP (File Transfer Protocol).** ## Networking Hardware - **1. Modems** - **Modulation:** - Converting from digital to analog. (MDA) - **Demodulation:** - Converting from analog to digital. (DAD) - **2. Network adapter:** - Network interface, such as an expansion card or external network adapter - **3. Switch** - Device used to connect multiple devices on a single (typically wired) network; - **4. Router:** - Device that connects multiple networks together; routes packets to their next location ## Wired vs. Wireless Networks - **Wired network** - Connection are physically connected (via cabling) - **Wireless network** - Connection are air connected (via radio signals) ## Network Topologies - **Indicates how the devices in the network are arranged.** - **Network** - **Definition** - **If it Fails** - **Star** - Uses a central device (server or a switch) to which all network - Network cannot function - **Bus** - Uses a central cable to which all network devices connect - Network cannot function - **Mesh** - Uses a number of different connections (several possible paths) - Network can still function - **Tree** - Uses a central node - Network cannot function - **Hierarchical** - Central node is connected to two or more subordinate nodes - Network cannot function ## Network Architectures - **Way they are designed to communicate. ** - **Two most common network architectures are:** - **Client-server.** - **Clients** - (Computers that request and utilize network resources) - **Server** - (Computers that are dedicated to processing client requests) - **peer-to-peer (P2P).** - **All the computers on the network at the same functional level** ## Network Size and Coverage Area - **Networks are classified is by the size of their coverage area.** - **Personal Area Network (PAN).** - **Local Area Networks (LANs)** - **Metropolitan Area Networks (MANs)** - **Wide Area Networks (WANs)** - **Intranet.** - **Extranet** - **Virtual private Network (VPN).**