Reviewer Intro To Comp
Reviewer Intro To Comp
Reviewer Intro To Comp
i. Computer Concepts - Introduction to Computer Automation - Computer performs all the tasks automatically i.e. it performs tasks
without manual intervention.
Computer is an electronic device that accepts data from the user, processes it, produces
results, displays them to the users, and stores the results for future usage. Memory - A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are also
Data is a collection of unorganized facts & figures and does not provide any further used to store data.
information regarding patterns, context, etc. Hence data means “unstructured facts and
figures” ii. Computer - Input Devices
Information is structured data i.e., organized meaningful and processed data. To process
the data and convert it into information, a computer is used. • Keyboard • Graphic Tablet
• Mouse • Microphone
Functions of Computers • Joystick • Magnetic Ink Card Reader (MICR)
Receiving Input - Data is fed into computer through various input devices like keyboard, • Light pen • Optical Character Reader (OCR)
• Track Ball • Bar Code Reader
mouse, digital pens, etc. Input can also be fed through devices like CD-ROM, pen drive,
• Scanner • Optical Mark Reader (OMR)
scanner, etc.
Processing the information - Operations on the input data are carried out based on the Keyboard - An input device used to enter the text data into the computer.
instructions provided in the programs. • The most common and very popular input device which helps to input data to the
computer.
Storing the information - After processing, the information gets stored in the primary or
secondary storage area. Mouse - is the most popular pointing device. It has two buttons called the left and the
right button and a wheel is present between the buttons.
Producing output - The processed information and other details are communicated to
the outside world through output devices like monitor, printer, etc. Joystick - is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its lower and upper ends. The lower
Characteristics of Computer spherical ball moves in a socket. The joystick can be moved in all four directions.
Speed - A computer works with much higher speed and accuracy compared to humans Light pen - is a pointing device similar to a pen. It is used to select a displayed menu
while performing mathematical calculations. Computers can process millions (1,000,000) item or draw pictures on the monitor screen.
of instructions per second. The time taken by computers for their operations is
microseconds and nanoseconds. Track ball - is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on the ball,
Accuracy - Computers perform calculations with 100% accuracy. Errors may occur due to the pointer can be moved.
data inconsistency or inaccuracy.
• Since the whole device is not moved, a track ball requires less space than a mouse. A
Diligence - A computer can perform millions of tasks or calculations with the same track ball comes in various shapes like a ball, a button, or a square.
consistency and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory
also makes it superior to that of human beings. Scanner - is an input device, which works more like a photocopy machine. It is used
when some information is available on paper, and it is to be transferred to the hard disk
Versatility - refers to the capability of a computer to perform different kinds of works of the computer for further manipulation.
with same accuracy and efficiency.
• It captures images from the source which are then converted into a digital form that
Reliability - A computer is reliable as it gives consistent result for similar set of data i.e., can be stored on the disk. These images can be edited before they are printed.
if we give same set of input any number of times, we will get the same result.
Prepared by: Olmo, Alea Nicole L.
INTRODUCTION TO COMPUTER
Digitizer - is also known as Tablet or Graphics Tablet as it converts graphics and pictorial Video Card: Boosts your computer's graphics performance, especially important for
data into binary inputs. A graphic tablet as digitizer is used for fine works of drawing and gaming.
image manipulation applications.
Speech Synthesizer: Converts text into audible speech, useful for communication and
Microphone - is an input device to input sound that is then stored in a digital form. The accessibility.
microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music. GPS: Uses satellites to pinpoint your location, helpful for navigation. It doesn't require
internet or phone signals for operation.
Magnetic Ink Card Reader (MICR) - MICR input device is generally used in banks as there
are large number of cheques to be processed every day. The bank’s code number and MODULE 3: COMPUTER BASIC PARTS and ITS HISTORY
cheque number are printed on the cheques with a special type of ink that contains A computer is an electronic machine that accepts data, stores, and processes data into
particles of magnetic material that are machine readable. information.
Optical Character Reader (OCR) - OCR is an input device used to read a printed text. Supercomputer: These are the fastest, largest, most powerful, and expensive
Bar Code Reader - is a device used for reading bar coded data (data in the form of light computers. Supercomputers are used for highly complex tasks such as quantum physics,
and dark lines). Bar coded data is generally used in labelling goods, numbering the weather forecasting, and molecular modeling. The first supercomputer was designed by
books, etc. It may be a handheld scanner or may be embedded in a stationary scanner. Seymour Cray in the 1960s. For example, IBM Sequoia and Fujitsu K-Computer are
among the fastest supercomputers.
Optical Mark Reader (OMR) - OMR is a special type of optical scanner used to recognize
the type of mark made by pen or pencil. It is used where one out of a few alternatives is Mainframe Computer: Mainframes are powerful computers primarily used by large
to be selected and marked. organizations for tasks like data processing, statistics, and transaction processing. They
can handle high volumes of input and output. Mainframes are measured in MIPS
iii. Different Output Devices (millions of instructions per second).
Monitor: Your computer screen. It displays text, images, videos, and more by using tiny Personal Computer (PC): PCs are smaller, less powerful, and more affordable than
dots called pixels. There are different types of monitors, including CRT, flat-panel, and supercomputers and mainframes. There are two main types: Macintosh (Mac) and
plasma. personal computer compatibles (PC). Laptops, tablets, and handheld devices are
subtypes of PCs. Laptops are portable with integrated components, while PDAs and
Printer: Creates paper copies of your digital documents. There are two types: impact tablets have specific functionalities.
(like dot matrix) and non-impact (like laser).
Laptop Computers: Portable and self-contained, with integrated components and
Plotter: Prints high-quality graphics, often used for large maps and architectural batteries, providing 5-6 hours of use.
drawings. It's slower and more expensive than printers.
Personal Digital Assistant (PDA): Small handheld computers used for limited functions.
Projector: Magnifies and displays your computer's output on a big screen. Great for
presentations. Tablet Computer: Larger than PDAs with touch screens, offering various functionalities.
Speakers: Output sound from your computer, available in various qualities and sizes. Basic Components of a Personal Computer:
Headphones: Let you listen to sound privately, wired, or wireless, with options like System Case: The enclosure housing the computer's main components.
earphones and headsets.
Monitor: Displays visual output.
Sound Card: Needed for your computer to produce sound. It can be built-in or external
and improves sound quality. Keyboard: Input device for text entry.
Power Supply (SMPS): Converts AC voltage into DC for the computer. 1990: Tim Berners-Lee developed HTML, the basis for the World Wide Web.
Hard Disk Drive: Stores files and the operating system. 1996: Sergey Brin and Larry Page created Google.
CD/DVD Drive: Reads and sometimes writes data on optical discs. 2006: Apple launched the MacBook Pro and Intel-based iMac.
Motherboard: Central PCB with connectors for components. 2010: Apple introduced the iPad, popularizing tablets.
COMPONENTS OF MOTHER BOARD 2017: DARPA developed Molecular Informatics for information storage and processing
using molecules.
Processor Socket: Holds the CPU.
Memory Slots: For RAM. MODULE 4 CYBERSECURITY
IDE Connectors: For various drives.
PCI Slot: For adapter cards. Computer security, also called cybersecurity, the protection of computer systems and
AGP or PCI-Ex Slot: For graphics cards. information from harm, theft, and unauthorized use.
Power Connectors: Connect to the power supply.
Chipset: Specialized chips on the motherboard. Computer hardware is typically protected by the same means used to protect other
Back Panel Connectors: For external devices. valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms.
The protection of information and system access, on the other hand, is achieved through
Basic Computer System History Highlights: other tactics, some of them quite complex.
1880: The need for faster census calculations led to punch-card-based computers. The security precautions related to computer information and access address four major
threats:
1936: Alan Turing introduced the concept of a universal machine.
(1) theft of data, such as that of military secrets from government computers;
1937: J.V. Atanasoff attempted to build a computer without gears.
(2) vandalism, including the destruction of data by a computer virus;
1939: Hewlett-Packard was founded.
(3) fraud, such as employees at a bank channeling funds into their own accounts; and
1947: The invention of the transistor by Shockley, Bardeen, and Brattain.
(4) invasion of privacy, such as the illegal accessing of protected personal financial or
1958: Kilby and Noyce unveiled the integrated circuit. medical data from a large database.
1969: Bell Labs developed UNIX. Tips to protect your computer:
1971: Alan Shugart introduced the floppy disk. Use a Firewall: Windows comes with a built-in firewall that's automatically enabled.
1975: Microsoft was founded, and the Altair 8080 computer was introduced. Keep Software Updated: Turn on automatic updates for Windows, Microsoft Office, and
other apps to stay protected.
1976: Apple Computers was founded.
Antivirus Software: Ensure you have antivirus software like Windows Security or
1977: The TRS-80 and Apple II were launched.
Windows Defender installed and keep it updated.
1979: MicroPro International released WordStar.
Strong Passwords: Use strong and unique passwords to protect your accounts.
1981: IBM introduced the first PC.
Use External Devices Carefully: Only use USBs and external devices that you own or • Malware - Harmful or maliciously created software, such as a virus or spyware. A virus
trust to prevent malware infection. is a malware that attaches itself to an executable file and spreads to other files when the
program is run.
10 Tips for Basic Computer Maintenance & Security
• Spyware is a type of malware that spies on the user’s activities and reports them back
Updates: Keep your operating system and software up to date to ensure security to the spyware’s developer.
improvements and bug fixes.
• Adware - a type of malware that pops up unwanted ads on the screen.
Disk Space: Regularly check your disk space, remove unwanted programs, and delete
unnecessary files to prevent software issues. • Firewall software - Software that blocks hackers from accessing a computer by closing
unnecessary services and ports.
Back Up: Maintain multiple backups of your data, both on external hard drives and in
the cloud, to protect against data loss. • Anti-spam software - Software that rejects junk email messages.
Ventilation: Ensure your computer has proper ventilation to prevent overheating and • Disk checking program - Software that finds and fixes errors in the disk storage system.
dust buildup. Clean your computer's openings and keyboard with compressed air.
• Registry cleanup program - Software that analyzes the Windows registry and deletes
Antivirus: Install a reliable antivirus program and scan your computer regularly to unneeded entries. A Registry is the main system configuration database for Microsoft
protect against new viruses. Windows.
Safe Browsing: Verify the reliability of websites and be cautious when entering URLs, • Uninstaller utility - Software that removes installed software along with its associated
especially during online shopping. Stick to reputable websites and avoid deals that seem files and registry entries.
too good to be true.
Comparing the Major Operating Systems
Strong Passwords: Use strong, complex passwords, and avoid reusing them across
multiple accounts. Change passwords regularly and store them securely. 1. MS-Windows:
Two-Factor Authentication: Enable two-factor authentication wherever possible to add • Best for: Apps, Browsing, Personal Use, Gaming, etc.
an extra layer of security to your accounts. • Popularity: Most widely used OS for home and office computers.
• Versions: Latest version is Windows 10.
Monitor Financials: Regularly review your financial accounts for any suspicious or • Usage: Used on tablets and some web and server computers.
unauthorized activity. Take immediate action if you spot anything unusual. • Manufacturer Compatibility: Supported by a wide range of computer
manufacturers.
Beware of Phishing: Be cautious of phishing emails that ask for personal information or
prompt you to take action. Verify the authenticity of emails before responding or clicking
on links.
• Best for: Apple-exclusive Apps, Dynamic Desktop, etc. • Manages the computer hardware and provides a basis for application programs • The
• Type: Used exclusively on Apple devices. more common to describe an operating system is it is the one program running at all
• Cost: Recently offered for free with occasional free upgrades. times on the computer, usually called the kernel.
• Successor: macOS (formerly OS X). option button - type of control selects only one of a group of mutually exclusive
• Unix Roots: Shares features with Unix-related operating systems. options.