Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
15 views13 pages

ISB Chap 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 13

ISB

CHAP 1
Computer Fundamentals
The information-processing cycle consists of 4 basic operation
1. Input: the first operation of the information-processing cycle, enables the
computer to accept data
 Data refers to facts that are raw and unorganized
 Data is entered into the computer for processing through the use of
input devices such as a keyboard and mouse
2. Processing: the second operation of the information-processing cycle,
converts data into information
 Information refers to consolidated organized, processed data.
 The central processing unit (CPU) processes data into information
 Random access memory (RAM) temporarily stores programs and
data needed by the CPU
3. Output: the third operation of the information-processing cycle, requires
output devices such as monitors and printers.
4. Storage: the fourth operation of the information-processing cycle, holds
programs. Software and data that the computer system uses
 Storage device include hard drives, CD and DVD drives and media
card readers
CHAP 2
Introducing the System Unit
The system unit is the case that contains the major hardware components of a
computer.
System units come in different styles and have varying footprints-the amount of
space that the unit uses
Some units have embedded biometric authentication devices
System units vary in their form factor, which specifies how the internal
components are located within the system unit

Inside the System Unit


System unit main components
 Motherboard
 CPU
 Power supple
 Cooling fan
 Internal speaker
 Drive bays
 Expansion slots
What’s on the Motherboard?
The motherboard us he printed circuit board that contain the electrical circuitry
for the computer.
The majority of parts found on the motherboard are integrated circuits
The integrated circuit chip that processes electronic signals is call the Central
Processing Unit (CPU) or Microprocessor or Processor
The 2 main parts of the CPU:
1. The Control Unit retrieves instructions from memory and interprets and
performs those instruction
The control unit manages the machine cycle or processing cycle, the 4
parts process:
 Fetch: retrieves programs instructions
 Decode: Determines what the program is telling the computer todo
 Execute: Perform the requested action
 Store: stores the result to an internal register
2. The Arithmetic Logic Unit (ALU) performs arithmetic and logical
operation
 Arithmetic operations involve adding, subtracting, multiplying and
dividing
 Logical operation involve comparison between 2 or more items
Register store data when it must be temporarily stored in the CPU
Factors that affect the performance of a CPU include:
 The number of existing transistor
 Data bus width and word size
 Use of parallel processing
Data Bus: is the group of parallel wires that connect the CPU’s internal
component. Data bus width is measured in bits.
Clock Speed: is the measurement of the electrical pulses generated by the
system clock and is usually measured in GHz
Random access memory (RAM)
Temporarily stores data and instructions to be used by the central processing
unit
Is considered volatile because its contents are erased when the computer is shut
off
Permits the CPU to access or store data and instructions quickly through RAM’s
memory address feature (SDRAM/DDR3 SDRAM/ DDR4 SDRAM)
Cache Memory: is a small unit of fast memory built into the processor to
improve performance. CPU cache is faster and more expensive than RAM.
CHAP 3
Input Devices
Mouse alternatives:
 Trackball
 Pointing stick
 Touchpad
 Joystick
 Touch screen
 Stylus
Alternative specialized input devices include:
 Microphones for voice or speech recognition
 Scanner for optical character recognition (OCR)
 Optical mark reader (OMR)
Output Devices
Output devices enable users to see, hear or feel the end result of processing
operations
The 2 most popular output devices are monitors and printers

Factors Affecting Performance of the Monitor


1) Scan rate
 The frequency with which the image is refreshed
 Progressive Scanning and Interlaced Scanning refer to the ways the
screen is drawn and refreshed.
2) Resolution of screen
 Measured in pixels
 The more pixels, the higher resolution
3) Dot Pitch
 The amount of space between dots
 The smaller the dot pitch, the sharper the imager
4) Video Memory
 A high-speed form of RAM installed on graphics card.
Storage
Storage (Mass storage or Secondary Storage) is the process of saving software
and data
Memory (RAM) vs. Storage
 Storage devices retain data event if the computer is off, whereas
data stored in memory will be lost
 Less expensive than memory
 Storage Devices are required during the computer system’s start up
operation
 Storage devices are also used as an output device for saving data
Storage: Hard Dish
A Hard Disk Drive is:
 The most important storage device
 A high-capacity, high-speed device
 Considered secondary storage compared with memory/RAM as
primary storage
Rigid platter coated with magnetic oxide
Disk drive: a device that allows data to be read or written
 Disk drive for personal computers contained within computer
housing
 Large computer system may have several external disk drive
Reading/Writing Data
Access Arm moves read/write head over particular location
Read/write head hovers a few millionths of an inch above platter
 If head touches platter, a head crash occurs and data is destroyed
 Data can be destroyed if head touch foreign matter on surface of
disk
Storage: Disk Packs
Each platter has its own access arm with read/write head
Most disk packs combine platters, access arms and read/write head
Storage: Hard Disks
Hard disks record data on concentric bands called tracks
Tracks are divided sectors
A group of 2 or more sectors is a cluster
Cylinder
The track on each surface that is beneath the read/write head at a given position
of the read/write heads
When file is larger than the capacity of a single track, operating system will
store it in tracks within the same cylinder
Disk Access Speed: the time needed to access data on disk.3 factors:
 Seek Time it takes the access arm to get into position over a
particular track. All access arms move as a unit.
 Head Switching: the activation of a particular read/write head over
a particular track. All access arms move together but only 1
read/write head can operate at any time
 Rotational Delay: the time it takes for the desired data on the track
to rotate underneath the read/write head

Storage: Flash Drive/ SSD


A flash drive is a storage device that uses solid-state circuitry and has not
moving part. A slash drive is named a Solid-State Drive (SDD)
Flash memory (Flash Drive) is non-volatile electronic memory that stores data
in blocks on a chip.
CHAP 4
System Software: consists of all the programs that enable the computer and its
peripheral devices to function smoothly
It is divided 2 main categories:
1. The Operating System: is a set of programs that coordinates:
 Hardware Functions
5 basic functions:
 Starts the computer
Loads the OS into RAM. Cold boot and Warm boot and
involves 6 steps
 Manages applications
Multitasking Operating Systems permit more than 1
application to run at a same time
Preemptive multitasking ensures all applications have fair
access to the CPU
 Manages memory
Buffer: an area that holds data and instructions temporarily,
make programs run faster
Virtual Memory: uses portion of hard disk to extend RAM.
Instructions and data are divided into pages and are swapped
back and forth between Ram and Hard Disk.
 Handle input and output device message
Device drives enable communication between the computer
and the devices
 Provides a user interface
The user interface allows the user to start application
programs, manage storage devices and safety shut down the
computer
 Interaction between application software and computer hardware

2. System Utilities: Housekeeping Tools


System Utilities (Utility Program)
Software programs that are essential to effective management of the
computer system
Perform tasks such as:
 Backing up files: copies data found on the hard disk to backup file
 Antivirus Software protect the computer from viruses (AVG,
McAfree and Norton)
 File Compression Utilities
Decrease the size of files, resulting in faster downloads
Create archives by storing files in special format
 File Manager and Search Utility
 Disk Scanning Programs find and resolve disk file storage problem
 Disk Cleanup Utilities remove unnecessary files to save space
 Disk Defragmentation Program reorganized stored data in a more
efficient manner.
Open-Source Software: A variation of freeware, author retains copyright
Source Code made available: readable by humans
Other programmers can modify and redistribute the programs freely
E.g. Firefox, Chrome and Opera
CHAP 5
Moving Data: Bandwidth and Modems
Analog Signals are continuous waves
Digital Signals are discontinuous, discrete pulses
Converters translate signals
Bandwidth is the maximum amount of data transmitted through a
communication channel at 1 time
Throughput is the actual amount of data transmitted
Broadband is any transmission medium that carries several channels to
transport data at high speed.
A modem is a communication device used to send and receive data between
different transmission systems
Network Fundamentals
A network links multiple computer system to enable them to share data and
resources
Categories of computer networks:
1. Local Area Network (LAN)
 Uses cables, radio waves or infrared signals
 Links computers in a limited geographic area (SIM computer labs)
2. Wide Area Network (WAN)
 Uses long distance transmission media
 Links computer system a few miles or thousands of miles
 The Internet is the largest WAN
Communication devices convert data into signals to travel over a medium:
 Computers
 Modems
 Routers
 Switches
Local Area Networks
1. Peer-to-peer (P2P) Networks
 Share files without a file server
 Are easy to set up
 Are best used for home and small offices (<10 computers)
 Do not require a network
 Can be slow if too many users
 Security is not strong
2. Client/Server Networks
 Made up of 1 or more file servers and clients
 Client software enable request to be sent to server
 Wired or wireless connection
 Do not slow down with heavy users
3. LAN topologies
 Network topology: the physical design of LAN
 Bus topology: practical for home or small office
 Star topology: for computer labs and WANs, easy to add users
 Ring topology: for a division of a company or 1 floor
CHAP 7
Intellectual Property (IP) Rights
1. Copyright
 Provides protection for the creator/author of a literary or artistic
work with control over its use and distribution
 Limited in time, protection start at the time of the creation of the
work and ends 50 years (70years) after the death of author
2. Patent
 Protection inventions and encourages inventors
 Grant patent protection to software algorithms and techniques.
Patent last for 20 years
3. Trademark
 A word, name, symbol or device used to distinguish 1 company
and its product from another
 Protection lasts for 10 years after registration and can be rewarded
Computer Crime and Cybercrime
Computer-based activities that violate the law are known as Computer Crime
Cybercrimes are crimes perpetrated through the Internet
Type of computer crime:
 Identity Theft: criminal access to personal information in order to
impersonate someone
 Dumpster Diving: thieves go through a company’s trash to find
information they can steal
 Phishing Attacks: legitimate-looking emails or Website created in
an attempt to obtain data
 Spear Phishing: use targeted fake emails and social engineering to
trick recipient into providing personal information
 Malware(short for malicious software) programs that harm a
computer system or allow individuals to gain access to it without
permission
 Spyware: software that gather private information and track Web
use and provide that information to third party
 Adware: a form of spyware that generate annoying pop-up and
banner ads
 Keyloggers: record keystrokes to provide criminal with data
 Computer Virus: code inside a program that can harm/destroy files
More rogue programs:
 Time Bomb: virus programs that remains dormant on a computer
system until it is activated by a specific event
 Worm: similar to virus but does not need the action of a user to
execute the code
 Denial of Service (DoS) Attack: assaults an Internet server with so
many request that cannot function
 Trojan Horse: normal-looking program include concealed
instructions created to harm
Security
Security option available for wireless networks include:
 WEP (wired equivalent privacy)
 WPA (wi-fi protected access)
 WPA2

You might also like