Beruflich Dokumente
Kultur Dokumente
Concepts
Learning Objective
• Computer Hardware Setup
• Networking of Computers
• Mobile Hardware Devices
• Use of mobile phones
• Use of applets
• Wireless Networks - Basic concepts.
1
100 Hrs. Information Technology Training © IT Directorate, ICAI
Introduction
• Computers, Mobiles and Networking have been technology buzzwords
since the last 25 years. Computers and Mobiles have consistently reduced
in size and increased in power. Interconnectivity is now instantaneous.
2
100 Hrs. Information Technology Training © IT Directorate, ICAI
Types of Computer
3
100 Hrs. Information Technology Training © IT Directorate, ICAI
Desktop Computers
Desktop computers are designed for use at a
desk or table. They are typically larger and
more powerful than other types of personal
computers. Desktop computers are made up
of separate components. The main
component, called the system unit, is usually a
rectangular case that sits on or underneath a
desk. Other components, such as the monitor,
mouse, and keyboard, connect to the system
unit.
8
100 Hrs. Information Technology Training © IT Directorate, ICAI
System Unit
The system unit is the core of a computer system. Usually it's a rectangular box placed
on or underneath your desk. Inside this box are many electronic components that
process information. The most important of these components is the central
processing unit (CPU), or microprocessor, which acts as the "brain" of your computer.
Another component is random access memory (RAM), which temporarily stores
information that the CPU uses while the computer is on. The information stored in
RAM is erased when the computer is turned off.
Almost every other part of your computer connects to the system unit using cables.
The cables plug into specific ports (openings), typically on the back of the system unit.
Hardware that is not part of the system unit is sometimes called a peripheral
device or device.
9
100 Hrs. Information Technology Training © IT Directorate, ICAI
Storage &Hard disk drive
Storage:
Your computer has one or more disk drives—devices
that store information on a metal or plastic disk. The
disk preserves the information even when your
computer is turned off. Storage is also called
secondary memory.
10
100 Hrs. Information Technology Training © IT Directorate, ICAI
CD and DVD drives
Nearly all computers today come equipped with a CD or DVD drive, usually located on
the front of the system unit. CD drives use lasers to read (retrieve) data from a CD, and
many CD drives can also write (record) data onto CDs. If you have a recordable disk
drive, you can store copies of your files on blank CDs. You can also use a CD drive to
play music CDs on your computer.
DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD
drive, you can watch movies on your computer. Many DVD drives can record data onto
blank DVDs.
11
100 Hrs. Information Technology Training © IT Directorate, ICAI
Mouse
A mouse is a small device used to point and select items on
your computer screen. Although mouse come in many
shapes, the typical mouse does look a bit like an actual
mouse. It's small, oblong, and connected to the system unit
by a long wire that resembles a tail. Some newer mouse are
wireless.
When you move the mouse with your hand, a pointer on your
screen moves in the same direction. (The pointer's
appearance might change depending on where it's positioned
on your screen.) When you want to select an item, you point
to the item and then click (press and release) the primary
button. Pointing and clicking with your mouse is the main way
to interact with your computer. There are optical mouse
12
which works on laser beam instead of roller ball.
100 Hrs. Information Technology Training © IT Directorate, ICAI
Keyboard
A keyboard is used mainly for typing text into your computer. Like the keyboard on a
typewriter, it has keys for letters and numbers, but it also has special keys:
– The function keys, found on the top row, perform different functions depending
on where they are used.
– The numeric keypad, located on the right side of most keyboards, allows you to
enter numbers quickly.
– The navigation keys, such as the arrow keys, allow you to move your position
within a document or webpage.
You can also use your keyboard to perform many of the same tasks you can perform
with a mouse. 13
100 Hrs. Information Technology Training © IT Directorate, ICAI
Monitor
A monitor displays information in visual
form, using text and graphics. The
portion of the monitor that displays the
information is called the screen. Like a
television screen, a computer screen
can show still or moving pictures.
There are two basic types of
monitors: CRT (cathode ray tube)
monitors and LCD (liquid crystal display)
monitors. Both types produce sharp
images, but LCD monitors have the
advantage of being much thinner and
lighter. CRT monitors, however, are
generally more affordable. LCD monitor (left); CRT monitor (right)
14
100 Hrs. Information Technology Training © IT Directorate, ICAI
Printer
A printer prints data from a computer onto paper. You don't need a printer to use your
computer, but having one allows you to print e‑mail, cards, invitations, announcements, and
other materials. Many people also like being able to print their own photos at home.
The two main types of printers are inkjet printers and laser printers. Inkjet printers are the
most popular printers for the home. They can print in black and white or in full colour and
can produce high-quality photographs when used with special paper. Laser printers are
faster and generally better able to handle heavy use.
16
100 Hrs. Information Technology Training © IT Directorate, ICAI
Network Interface cards(NIC)/ Ethernet cards
• An Ethernet card is one kind of network adapter. These adapters support
the Ethernet standard for high-speed network connections via cables.
Ethernet cards are sometimes known as network interface cards (NICs).
17
100 Hrs. Information Technology Training © IT Directorate, ICAI
Computer Networks
A computer network is an interconnected group of computers. Networks may be classified by the network layer at
which they operate according to basic reference models considered as standards in the industry, such as the five-layer
Internet Protocol Suite model (TCP model). While the seven-layer Open Systems Interconnection (OSI) reference model
is better known in academia, the majority of networks use the Internet Protocol Suite (IP).
By scale, Computer networks may be classified according to the scale: Personal area network (PAN), Local Area
Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN).
As Ethernet increasingly is the standard interface for networks, these distinctions are more important to the network
administrator than the user. Network administrators may have to tune the network, to correct delay issues and achieve
the desired performance level.
By connection method, Computer networks can also be classified according to the hardware technology that is used to
connect the individual devices in the network such as Optical fiber, Ethernet, Wireless LAN, HomePNA, or Power line
communication.
•Ethernets use physical wiring to connect devices. Often they employ hubs, switches, bridges, gateways and/or routers.
•Wireless LAN technology is built to connect devices without wiring. These devices use a radio frequency to connect
18
100 Hrs. Information Technology Training © IT Directorate, ICAI
Computer Network Continue…
By functional relationship (Network Architectures)
Computer networks may be classified according to the functional relationships which
exist between the elements of the network, e.g., Active Networking, Client-server and
Peer-to-peer (workgroup) architectures.
By network topology
Computer networks may be classified according to the network topology upon which
the network is based, such as Bus network, Star network, Ring network, Mesh
network, Star-bus network, Tree or Hierarchical topology network, etc.
Network Topology signifies the way in which intelligent devices in the network see
their logical relations to one another. The use of the term “logical” here is significant.
That is, network topology is independent of the “physical” layout of the network. Even
if networked computers are physically placed in a linear arrangement, if they are
connected via a hub, the network has a Star topology, rather than a Bus Topology. In
this regard the visual and operational characteristics of a network are distinct; the
logical network topology is not necessarily the same as the physical layout.
Internet:Intranets and extranets may or may not have connections to the Internet. If
connected to the Internet, the intranet or extranet is normally protected from being
accessed from the Internet without proper authorization. The Internet is not
considered to be a part of the intranet or extranet, although it may serve as a portal
for access to portions of an extranet.
22
100 Hrs. Information Technology Training © IT Directorate, ICAI
Mobile Hardware
Devices
Mobile Hardware Devices have three main features, common to most them:
•Mobile devices provide wireless communication to a base station (a personal
computer, or a whole telephone, or data network)
•Mobile devices must be small to be portable
•Mobile devices must remain operational for several hours or days without a
battery recharge.
Benefits:
Keeping you organised
Flexible working
Information at your fingertips
Never out of touch
Better information sharing
Greater functionality
Faster communication
E.g.:
1. Stolen and Lost Devices
2. Compromised and Damaged Devices
3. Selective Wipe
•General Usage
•While driving
•In schools
•Mobile banking and payments
•Two-way Interactive Text Messaging Applications
•Tracking and privacy
•Health effects
•Environmental impact
Prior to the World Wide Web, the built-in writing and drawing programmes that came
with Windows were sometimes called applets.
On the Web, using Java language, an applet is a small programme that can be sent along
with a Web page to a user. Java applets can perform interactive animations, immediate
calculations, or other simple tasks without having to send a user request back to the
server.
Wireless is rapidly gaining in popularity for both home and business networking.
Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-
Fi" standards. Wireless networks are built using network adapters (NICs), access
points (APs), and routers.
Pros:
• Mobility
• Setup
• Lack of mess
Cons:
• Speed
• Reliability
• Distance sensitive
Internal Roaming: The Mobile Station (MS) moves from one access point (AP) to
another AP within a home network because the signal strength is too weak.
An authentication server (RADIUS) performs the re-authentication of MS via 802.1x.
External Roaming: The Mobile Station (client) moves into a WLAN of another
Wireless Internet Service Provider (WISP) and takes their services (Hotspot).
The user can independently of his home network use another foreign network,
if this is open for visitors. There must be special authentication and billing systems
for mobile services in a foreign network.
100 Hrs. Information Technology Training © IT Directorate, ICAI
Bluetooth and WiFi
•Bluetooth signal can be considered to be •Wi-Fi is better suited for operating full-scale
narrowband, while Wi-Fi (802.11a/g), networks because it enables a faster
which is really many narrowband signals connection, better range from the base
combined to create a much larger station, and better security (if configured
bandwidth signal to counteract the properly) than Bluetooth.
reflections or multi-path interference.
Answers
1 2 3 4 5 6 7 8 9 10
D C B A C C C D B A