Sie sind auf Seite 1von 90

Study Guide

Also study Office Overview and Word


Chapter 1
Introduction
Speed, capacity, and flexibility determine the
power of microcomputers.
Knowledge of a computers power allows you
to make good buying decisions and to
determine if your current system will run new
applications.
Competent end users need to
understand the basic principles
of how microcomputers are
put together.

2
System Board
Main board or motherboard
Controls communications
Components connect to the system board
Data path
Traffic monitor
3
Bus Lines
Bus lines also known as a bus
Provide pathways that support
communication among the various
electronic components
Connect parts of the CPU to each
other
Two basic categories
System buses
Expansion buses


4
Microprocessor
Central Processing Unit (CPU)
Contained on the microprocessor chip
Brains of the computer
Two Basic Components
Control unit
Arithmetic-logic unit (ALU)

5
Microprocessor Chips (Page 1 of 2)
Chip capacities expressed in word size
Word
The number of bits that can be processed at
one time
64-bit standard
Clock Speed
Processing speed
The number of times the CPU fetches and
processes data or instructions in a second

6
Expansion Slots and Cards
Advanced graphics cards
Sound cards
Network interface cards (NIC)
Wireless network cards
Plug and Play
7
Power Supply
Computers require direct current (DC)
DC power provided by converting alternating
current (AC) from wall outlets or batteries
Desktop computers use power supply units
Notebooks and handhelds use AC adapters

8
Electronic Data and Instructions
Digital electronic signals
Recognized by computers
Analog signals
Created by voices
Conversion must take place from analog to
digital before processing can occur
9
Numeric Representation
Binary System only two digits called bits
On = 1; positive charge
Off = 0; no charge
Byte = 8 bits grouped together
Hexadecimal system
10
Character Encoding
Character encoding standards
ASCII
American Standard Code for Information Interchange
Microcomputers
EBCDIC
Extended Binary coded Decimal Interchange Code
Mainframe
Unicode
Uses 16 bits
Recognized by virtually all computer systems
11
Introduction
Computer literacy refers to acquiring computer-
related skills.
Information systems are involved in many of the
things we encounter each day.
Microcomputers are common in all areas of life.
New forms of learning have developed providing
numerous alternatives for people to become
educated without physically attending classes
The Web provides new avenues of
communication for people to purchase goods,
communication and share similar interests.
12
Parts of an Information System
People
Procedures
Software

Hardware
Data
Connectivity
13
People
Most important part of any system
Contact is
Direct
Indirect
Computer uses
Entertainment
Business
Medicine
Education

14
Procedures
The sequence of actions or instructions to
be followed in solving a problem or
accomplishing a task.
A set of rules governing the exchange or
transmission of data between devices.
15
Software
Enables application software to interact with the
computer hardware
Background software helps manage resources
Collection of programs
Operating Systems
Utilities
Device Drivers
Operating System
Coordinates computer resources
Provides the user interface
Runs applications

16
16
Hardware
Any output device is a hardware component that
conveys information from a computer or mobile
device to one or more people
Page 14
Figure 1-16
17 Discovering Computers: Chapter 1
Hardware Types of Computers
Supercomputers
High performance computing machine designed to have
extremely fast processing speeds. Have various
applications, performing complex scientific calculations,
modeling simulations, rendering large amounts of data.
Mainframe computers
Ultra high-performance computer made for high-volume,
processor-intensive computing. They are typically used by
large businesses and for scientific purpose.
18
Hardware Types of Computers
Midrange computers
High-range network servers that can handle large-scale
processing of many business applications. Not as powerful as
mainframe computers, but are less costly to buy, operate, and
maintain. They are popular as powerful network servers to
help manage large Internet Web sites, and corporate intranets
and extranets.
Microcomputers
A computer designed for individual use. The term was
introduced to differentiate desktop computer systems from
larger computers. It is often used synonymously with the term
desktop," but it may refer to a laptop, tablet, or notebook.
19
Data and Information
Page 11
Figure 1-11
20
Discovering Computers: Chapter 1
Connectivity, the Wireless Revolution, the
Internet, and Cloud Computing
Connectivity
Sharing of information
Wireless communication has widespread use
Computer networks
Connected communication system of computers
Largest network is the Internet
Cloud Computing
Uses the Internet and the Web to shift many
computer activities from a users computer to
computers on the Internet

21
The Internet
The Internet is a worldwide collection of networks that
connects millions of businesses, government agencies,
educational institutions, and individuals
Pages 18 19
Figure 1-25
22
Discovering Computers: Chapter 1
The Internet and the Web
The Internet is a large global network,
connecting smaller networks worldwide
The Internet was launched in 1969
US funded project to develop a national
computer network
ARPANET (Advanced Research Project Agency
Network)
The World Wide Web or WWW was
introduced in 1991 at CERN
23
Common Internet Uses
Communicating
e-mail, photos, videos
Discussions
Online Shopping
Searching
Virtual libraries
Education or
e-learning
Entertainment

24
Access
Common way to access the Internet is through a
Commercial Internet Service Provider (ISP)
Provide a connection for individuals to access the
Internet
Use telephone lines, cable, and/or wireless connections
25
Browsers
Programs that provide access to Web resources
Allow you to explore the web
Popular Web browsers include:
Mozilla Firefox
Apple Safari
Microsoft Internet Explorer
Google Chrome
Address or location of the
resource must be specified
URL

26
URLs
Uniform Resource Locator
Has at least two parts
Protocol
Domain name
Top-level domain (TLD)
Identifies the type of organization

27
URLs
Uniform Resource Locator
Has at least two parts
Protocol
Domain name
Top-level domain (TLD)
Identifies the type of organization

28
Communication
Communication is the most popular Internet
activity
E-mail
Transmission of electronic messages over the
Internet
Client-based
Web-based Webmail
E-Mail Address

29
Messaging
Text messaging / texting
Short electronic message
Instant messaging
Extension of email that provides direct, live
communication between two or more people
Most programs include video conferencing features,
file sharing and remote assistance
30
HTML and Hyperlinks
Browsers interpret HTML commands
Hypertext Markup Language
Display document as a Web page
Hyperlinks
Connect to other web pages
Text files
Graphic images
Audio and Video Clips

31
Social Networking
Connecting people and organizations that
share a common interest or activity
Three most popular:
Facebook
Facebook Profiles
Facebook Pages
Facebook groups
Google+
Circles
Hangouts
Sparks
LinkedIn
Business-oriented

32
Blogs, Microblogs
Web logs or blogs
personal news pages that
are date/time-stamped and
arranged with the most
recent items shown first

Microblogs short status
updates that answer the
question:
What are you doing
now?

33
Webcasts, Podcasts, Wikis
Webcast streaming
technology for live
broadcast of audio and
video
Podcast-audio and
video files that can be
downloaded to your
computer or media
player

Wiki a specially
designed Web site that
allows visitors to edit
the contents, supports
collaborative writing

34
Search Tools
Search Engines
Specialized Search Engines
Content Evaluation
35
Security
Payment methods must be fast, reliable,
and secure
Two options
Credit card
Digital cash

36
Introduction
Have you ever wondered how information gets
into your computer or comes out in a form you
can use?
Input devices convert what
we understand into what the
system unit can process
Output devices convert what
the system unit has processed
into a form that we can understand

37
What is Input?
Any data or instructions used by a computer
Input devices translate data into a form that
the system unit can process
Some hardware input devices include:
Keyboards
Mice
Pointing devices
Scanning devices
Image capturing devices
Audio-input devices

38
Keyboard Entry
Keyboards
Traditional keyboards
Notebook keyboards
Virtual keyboards
Thumb keyboards

39
Pointing Devices (Page 1 of 2)
40
Mouse Trackball
Touch pad Pointing
stick
Mice -
Optical
Mechanical
Wireless
Pointing Devices (Page 2 of 2)
41
Stylus
Joystick
Multitouch
screen
Touchscreen
Game Pad Dance Pad
Scanning Devices (Page 1 of 2)
Optical scanners
Flatbed scanners
Document scanners
Portable scanners
Card Readers
Magnetic card readers

42
Scanning Devices (Page 2 of 2)
Bar code readers
Handheld wand readers
or platform scanners
Contain photoelectric cells
that read bar codes
RFID Readers
RFID tags are tiny chips embedded for
tracking
Character and mark recognition
devices
Magnetic-ink character recognition (MICR)
Optical-character recognition (OCR)
Optical-mark recognition (OMR)

43
Image Capturing Devices
Digital cameras
Images recorded digitally on
disk or in cameras memory
Images can be downloaded to a computer
Digital video cameras
Records motion digitally, can also take still images
WebCams
Specialized
digital video
cameras built-in
or attached to
the monitor
44
Audio-Input Devices
Voice recognition systems
Use a microphone, sound card,
and special software
Users can operate computers
and create documents using
voice commands

45
What is Output?
Processed data or information
Types of output
Text
Graphics/photos
Audio & video
Output devices
Monitors
Printers
Audio-output devices

46
Monitors (Page 2 of 3)
Flat-panel monitors
Require less power to operate
Portable and thinner than CRTs
Liquid Crystal Display (LCD)
TFT-LC
AMOLED

47
Monitors (Page 3 of 3)
Other monitors
E-Book readers
Digital/interactive whiteboards
High-definition television (HDTV)

48
Audio and Video Devices
Translates audio information from
the computer into sounds that
people can understand
Speakers and headsets
Portable media players/
digital media players
Apple iPod, Creative Zen,
Microsoft Zune
Mobile digital television (Mobile DTV)

49
Combination Input and Output Devices
Multifunctional devices (MFD)
Internet telephones
Known as Internet telephony and IP telephony
Voice-over IP (VoIP)
Ooma
Vonage
MagicJack
Skype

50
Introduction
Data storage has expanded from text and
numeric files to include digital music files,
photographic files, video files, and much more.
These new types of files require secondary
storage devices with much greater capacity.
In this chapter, you learn about
the many types of secondary
storage devices including their
capabilities and limitations.

51
Storage
Primary storage
Volatile storage
Temporary storage
Random Access
Memory (RAM)
Secondary storage
Nonvolatile storage
Permanent storage
Secondary storage
characteristics
Media
Capacity
Storage devices
Access speed
52
Solid-State Storage
Solidstate drives (SSDs)
No moving parts
Faster and more durable
than hard disks
Flash memory cards
Widely used in computers,
cameras, and portable devices
such as mobile phones and
GPS navigation systems
USB Drives (or Flash Drives)
Connect to USB port
Capacity of 1 GB to 256 GB

53
Cloud Computing
Cloud computing is where the Internet
acts as a cloud of servers
Applications provided as a service rather than a
product
Supplied by servers
Google Apps
Mint.com


54
Introduction
Computers are ubiquitous in our lives and we
expect them to be there when we need
them.
We give little thought to the processes and
programs running behind the scenes to keep
them functioning effectively.
Such programs (i.e. operating
systems, utility programs, and
device drivers) are the system
software you learn about here.

55
System Software
Handles the technical details
Includes the operating system, utilities,
device drivers, and language translators

56
Operating Systems
A collection of programs that handle technical
tasks
Manage resources
Provide user interface
Run applications
Examples:
Windows 7
Mac OS X
Also called the software environment or
platform


57
Functions of an Operating System
Manages computer resources
Coordinate memory, processing, storage, printers and
monitors
Monitor system performance
Schedule tasks
Provide security
Start-up the computer
Provides user interface
Graphical user interface (GUI)
Runs applications
Multitasking
Foreground and background applications

58
Features of an Operating System
Booting
Features in common with application software
Icons
Pointer
Windows
Menus
Tabs
Dialog boxes
Help
Gesture Control
Files and Folders

59
Categories of Operating Systems
Three basic categories
Embedded operating systems (handheld)
Smartphones
Cable TV tuner boxes
Video game systems
Network operating systems (linked computers)
Windows Server, Linux, Unix
OS stored on network server which coordinates all
communication between the other computers
Stand-alone operating systems (desktop)
Also called client operating system

60
Mobile Operating Systems
Mobile OS
Embedded operating system in every
smartphone
Some of the best known
Android
BlackBerry OS
iOS
WebOS
Windows Phone
61
Virtualization
Ability to support multiple operating
systems on a single physical machine
Virtualization software
Each virtual machine appears as a separate
independent computer
Host operating system
Guest operating system
Hyper-V

62
Utilities
Specialized programs to make computing
easier
Most essential utilities
Troubleshooting or diagnostic programs
Antivirus programs
Backup programs
File compression programs
63
Device Drivers
Allow communication between a device and
the computer
Loaded into memory each time a computer
is started
When a new device is added, new device
drivers must be installed
Add a Device Wizard step-by-step
Windows already has many drivers within
the system software

64
People
Privacy What are the threats to personal privacy and
how can we protect ourselves?
Security How can access to sensitive information be
controlled and how can we secure hardware and
software?
Ethics How do the actions of individual users and
companies affect society?

65
Privacy
Privacy concerns the collection and use of
data about individuals
Three primary privacy issues:
Accuracy
Property
Access
66
Large Databases (Page 1 of 2)
Large organizations
compile information
about us.
Federal government
has over 2,000
databases
Telephone
companies
Reverse directory
lists of calls we make
Supermarkets
What we buy and
when

67
Large Databases (Page 2 of 2)
Information resellers or information brokers
Collect and sell personal data
Electronic profiles easily created
Personal information is a marketable commodity,
which raises many issues:
Collecting public, but personally identifying information
(e.g., Googles Street View)
Spreading information without personal consent,
leading to identity theft
Spreading inaccurate information
Mistaken identity
Freedom of Information Act

68
Private Networks
Employers can monitor e-mail legally
75 percent of all businesses search employees
electronic mail and computer files using
snoopware
A proposed law could
prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first

69
Viewing and Blocking Cookies
Cookies
Small pieces of information that are
deposited on your hard disk from
web sites you have visited
First-party cookies
Third-party cookies
70
Online Identity
The information that people voluntarily post
about themselves online
Archiving and search features of the Web make
it available indefinitely
Major Laws on Privacy
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act
(HIPAA)
Family Educational Rights and Privacy Act (FERPA)
71
Security
Cybercrime or computer crime is any
offense that involves a computer and a
network
Hackers
Gain unauthorized access

72
Computer Crime (Page 1 of 3)
Malicious Programs - Malware
Viruses
Worms
Trojan horse
Zombies
Denial of Service
(DoS) attack

73
Computer Crime (Page 2 of 3)
Internet scams
Phishing

74
Computer Crime (Page 3 of 3)
Social networking risks
Cyber-bullying
Rogue Wi-Fi hotspots
Theft
Data manipulation
Computer Fraud and
Abuse Act


75
Ethics
Standards of moral conduct
Copyright
Gives content creators the right to control the use
and distribution of their work
Paintings, books, music, films, video games
Software piracy
Unauthorized copying and distribution
Digital Millennium Copyright Act
Digital rights management (DRM)
Plagiarism

76
Introduction
We live in a truly connected
society.
Increased connectivity
potentially means increased
productivity, especially in
business.
You will learn more about the
concept of connectivity and the
impact of the wireless
revolution in this chapter.

77
Communications
Computer communications is the process of
sharing data, programs, and information
between two or more computers
Numerous applications depend on
communication systems, including
E-mail
Instant messaging
Internet telephone
Electronic commerce

78
Communications Today
Connectivity uses computer
networks to link people and
resources
The Wireless Revolution
Single most dramatic change in
connectivity and
communications has been
widespread use of mobile
devices like smartphones and
table PCs with wireless Internet
connectivity

79
Communication Systems
Four basic elements
Sending and receiving devices
Communication channel
Connection devices
Data transmission specifications

80
Connection Devices
Modem modulator-
demodulator
Modulation
Demodulation
Transfer rate
Mbps
Types of Modems
Telephone modem
DSL
Cable
Wireless

81
Connection Services
Leased lines
T1 combined to form T3
and DS3
Replaced by optical
carrier (OC) lines
Digital subscriber line
(DSL)
Uses phone lines
ADSL is most widely used
type of DSL

Cable
Uses existing TV cable
Faster than DSL
Satellite connection
services
Use almost anywhere
Slower than DSL and
cable modem
Cellular Services
3G and 4G cellular
network connectivity

82
Bandwidth
Measurement of the width or capacity of
the communication channel
Categories
Voiceband (or low bandwidth)
Medium band
Broadband
Baseband
83
Protocols
Communication rules for exchanging data
between computers
Internet standard: TCP/IP (Transmission control
protocol/Internet protocol)
Identification unique IP address
Packetization information broken down
into small parts (packets) and then
reassembled

84
Networks
A communication
system that
connects two or
more computers
Allows exchange
of information
and resources

85
Network Types
Local area network (LAN)
Home network
Wireless LAN (WLAN)
Personal area
network (PAN)
Metropolitan area
network (MAN)
Wide area network
(WAN)
86
Organizational Networks
Intranet
Private network within an organization
Works like the Internet, where employees use
browsers to access Web sites and Web pages
Extranet
Private network that connects organizations
Works like the Internet, but provides suppliers
and other trusted partners with limited access
to the organizations networks
87
Network Security
Firewall
Hardware and software controls access to network
Proxy server provides pass-through access
Protects against external threats
Intrusion detection system (IDS)
Works with firewall to protect organization's
network
Analyzes all incoming and outgoing network traffic
Virtual private network (VPN)
Creates a secure private network connection
between your computer and the organization

88
Intranet, Extranet, Firewall, Proxy Server
89
Making IT Work for You ~ Remote Access
Use remote access to gain access to your
computer when away from your home or
office with LogMeIn
Free service
90

Das könnte Ihnen auch gefallen