SlideShare a Scribd company logo
1 of 401
1-
Introduction to Information Technology Your Digital World Chapter 1 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Why become computer savvy? ,[object Object],[object Object],[object Object],[object Object],[object Object],1- Discussion Question: What was your worst computer problem?
IT & Your Life: The Future Now ,[object Object],[object Object],[object Object],1- ,[object Object]
How is IT being used in Education? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Discussion Question: Have you ever used the computer in your classroom for something other than the work in that class?
Rules for Computers in Classrooms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Health: High Tech for Wellness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Money: Cashless Society? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Discussion Question: How important is security if all your money is virtual?
Leisure: Infotech in Entertainment & the Arts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
IT in Government & Democracy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Jobs & Careers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Jobs & Careers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
The Telephone Grows Up ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Discussion Question: Why are cellphones banned in high-security military bases?
Internet, World Wide Web, & Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],1-
Internet, World Wide Web, & Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],1-
Internet, World Wide Web, & Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Email Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Email Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
5 Computer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
5 Computer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
5 Computer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
5 Computer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
5 Computer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Discussion Question:  Now,  how many of you would say you have NOT used a computer today?
Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Understanding Your Own Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Understanding Your Own Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Building Your Own PC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Building Your Own PC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Building Your Own PC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Future of Information Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Convergence, Portability, & Personalization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1-
Ethics ,[object Object],[object Object],[object Object],[object Object],[object Object],1-
2-
The Internet & the World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2- 28,800 / 8 = 3600 characters per second
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Connecting to the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
How Does the Internet Work? ,[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2- protocol domain name file name . extension directory
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2- Discussion Question: Have you ever mistyped a URL and gone to a website you weren’t expecting? As we learn later in this chapter, some unscrupulous websites take advantage of this.
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2- Discussion Question: If you publish an embarrassing web page and then take it down, is it REALLY gone?
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
The World Wide Web ,[object Object],[object Object],[object Object],2- A9 (Amazon.com) http://a9.com Blinkx www.blinkx.com Google www.google.com/video ShadowTV www.shadowtv.com StreamSage www.streamsage.com Virage www.virage.com Yahoo! http://video.search.yahoo.com
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],2- Discussion Question: If your email is stored at the server and servers are backed up, when you delete an email is it gone for good?
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2- User Name Domain name
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Email & Other Ways of Communicating over the Net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Telephony, Multimedia, Webcasting, Blogs, E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Telephony, Multimedia, Webcasting, Blogs, E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Telephony, Multimedia, Webcasting, Blogs, E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Telephony, Multimedia, Webcasting, Blogs, E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Telephony, Multimedia, Webcasting, Blogs, E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],2-
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2-
3-
Software 3.1 System Software: The Power behind the Power 3.2 The Operating System: What It Does 3.3 Other System Software: Device Drivers & Utilities 3.4 Common Features of the User Interface 3.5 Common Operating Systems 3.6 Application Software 3.7 Word Processing 3.8 Spreadsheets 3.9 Database Software 3.10 Specialty Software Chapter 3 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
System Software: The Power behind the Power ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
System Software: The Power behind the Power ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
The Operating System: What It Does ,[object Object],[object Object],[object Object],[object Object],[object Object],3-
Other System Software: Device Drivers & Utilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Other System Software: Device Drivers & Utilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3- Discussion Question: How many of you have lost important files such as a term paper? Didn’t you wish you had made a backup copy? ALL data media are subject to possible failure and data loss!
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],3-
Common Features of the User Interface ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Common Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Application Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Application Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Application Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Application Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing 3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3- Discussion Question: How doze a spell-checker Handel different spellings for the same word? Should ewe trust the spell-checker for everything?
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Word Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Spreadsheets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Spreadsheets 3-
Spreadsheets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Spreadsheets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Database Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Database Software 3-
Database Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software 3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
Specialty Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3-
4-
Hardware: The CPU & Storage 4.1 Microchips, Miniaturization, & Mobility 4.2 The System Unit: The Basics 4.3 More on the System Unit 4.4 Secondary Storage 4.5 Future Developments in Processing &  Storage Chapter 4 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Microchips, Miniaturization, & Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Microchips, Miniaturization, & Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],4-
Microchips, Miniaturization, & Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4- Discussion Question: If the 7 data bits are 1101011, and the modem is sending odd parity, what should the parity bit be set to? Answer: Since the data bits add up to 5, an odd number, the parity bit will be 0.
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics 4-
The System Unit: The Basics Computer Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
The System Unit: The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Parts of the CPU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4- ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More on the System Unit How Memory Works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Types of RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Speeding up Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Speeding up Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Ports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit USB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit USB Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Specialized Expansion Ports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
More on the System Unit Expansion Cards 4-
More on the System Unit  Expansion Buses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Floppies and Zip Disks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Hard Disks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Hard Disks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Optical Disks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Magnetic Tape ,[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Flash Memory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Secondary Storage Online Secondary Storage ,[object Object],[object Object],[object Object],[object Object],[object Object],4-
Future Developments in Processing & Storage ,[object Object],[object Object],[object Object],4-
Future Developments in Processing & Storage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4-
Future Developments in Processing & Storage ,[object Object]
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA
SKOLA

More Related Content

What's hot

Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learningmailyn0729
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
Introduction of computer Book
Introduction of computer BookIntroduction of computer Book
Introduction of computer Bookimtiazalijoono
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer systemparag dhok
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1CBAKhan
 
Basic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaimanBasic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaimansakkara123
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computersMuhammad Faisal
 
The World of Information
The World of InformationThe World of Information
The World of InformationBadal Dixit
 
Introduction of computer
Introduction of computer Introduction of computer
Introduction of computer Amit Singh
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computerMissNDuncan
 
Chapter01
Chapter01Chapter01
Chapter01Izaham
 
What is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer DefinitionWhat is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer Definitiondmir3304
 

What's hot (20)

Notacd05
Notacd05Notacd05
Notacd05
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
 
Notacd03
Notacd03Notacd03
Notacd03
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Basic Computer
Basic ComputerBasic Computer
Basic Computer
 
Introduction of computer Book
Introduction of computer BookIntroduction of computer Book
Introduction of computer Book
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
LS 6 Computers
LS 6 ComputersLS 6 Computers
LS 6 Computers
 
Notacd02
Notacd02Notacd02
Notacd02
 
Basic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaimanBasic computer for_small_business by rajesh valangaiman
Basic computer for_small_business by rajesh valangaiman
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
The World of Information
The World of InformationThe World of Information
The World of Information
 
Introduction of computer
Introduction of computer Introduction of computer
Introduction of computer
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter01
Chapter01Chapter01
Chapter01
 
What is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer DefinitionWhat is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer Definition
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 

Similar to SKOLA

Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1Ranz
 
Lesson 1 History and Evolution of Computers .pdf
Lesson 1 History and Evolution of Computers .pdfLesson 1 History and Evolution of Computers .pdf
Lesson 1 History and Evolution of Computers .pdfJoselleCaligner1
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 
BAIT1003 Chapter 1
BAIT1003 Chapter 1BAIT1003 Chapter 1
BAIT1003 Chapter 1limsh
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
Intro to Computer System.pptx
Intro to Computer System.pptxIntro to Computer System.pptx
Intro to Computer System.pptxDANESASIBAG
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01zelalwattar
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of itKMJ Science Computer
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsMudit Khetan
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to ITMaaz Haq
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxAdrianVANTOPINA
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 

Similar to SKOLA (20)

Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
Lesson 1 History and Evolution of Computers .pdf
Lesson 1 History and Evolution of Computers .pdfLesson 1 History and Evolution of Computers .pdf
Lesson 1 History and Evolution of Computers .pdf
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
BAIT1003 Chapter 1
BAIT1003 Chapter 1BAIT1003 Chapter 1
BAIT1003 Chapter 1
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Intro to Computer System.pptx
Intro to Computer System.pptxIntro to Computer System.pptx
Intro to Computer System.pptx
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Chap1a
Chap1aChap1a
Chap1a
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
Bab1
Bab1Bab1
Bab1
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
9359625.ppt
9359625.ppt9359625.ppt
9359625.ppt
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

SKOLA

  • 1. 1-
  • 2. Introduction to Information Technology Your Digital World Chapter 1 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. 2-
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. 3-
  • 88. Software 3.1 System Software: The Power behind the Power 3.2 The Operating System: What It Does 3.3 Other System Software: Device Drivers & Utilities 3.4 Common Features of the User Interface 3.5 Common Operating Systems 3.6 Application Software 3.7 Word Processing 3.8 Spreadsheets 3.9 Database Software 3.10 Specialty Software Chapter 3 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 126.
  • 127.
  • 128.
  • 130.
  • 131.
  • 132.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141. 4-
  • 142. Hardware: The CPU & Storage 4.1 Microchips, Miniaturization, & Mobility 4.2 The System Unit: The Basics 4.3 More on the System Unit 4.4 Secondary Storage 4.5 Future Developments in Processing & Storage Chapter 4 McGraw-Hill/Irwin © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150. The System Unit: The Basics 4-
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163. More on the System Unit Expansion Cards 4-
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.