Basic Concepts of Computer: A computer system is a combination of hardware and software. The physical and tangible parts/components of a computer that can be seen and touched are known as Hardware. When one looks at the computer system, he/she is actually looking at the computer hardware. The hardware consists of the physical components of a computer system like input devices (keyboard, mouse, scanner, etc.), output devices (monitor, printer, speaker, etc.), a processing device (CPU) and the storage device (Compact disk, hard disk, DVDs, etc.).
Introduction to Computing - Essentials of Technology - Day 1Mark John Lado, MIT
- Familiarize yourself with characteristics of computers
- Identify the basic components of a computer
- Explain the importance of various units of a computer
- Differentiate between system software and application software
- Explain the importance of operating system
- Know the internal parts of the system unit.
- Get acquainted in the elements of computer system.
Computer systems and software - Written by Mark John LadoMark John Lado, MIT
After going through this lesson you would be able to:
familiarise yourself with characteristics of computers
identify the basic components of a computer
explain the importance of various units of a computer
differentiate between system software and application
software
explain the importance of operating system
Understanding of Computer | Introduction | Computer In Business
Hello,
I am Saad Hasan from Begum Rokeya University, Rangpur.
All the Information of this slide is collected from "Fundamentals of Computer" written by E Balagurusamy. Any one can use for his presentations.
>>>>> If You Need Me to Create Slide for You,then You can find me through this link : https://www.linkedin.com/in/saadh393/
Introduction to Computing - Essentials of Technology - Day 1Mark John Lado, MIT
- Familiarize yourself with characteristics of computers
- Identify the basic components of a computer
- Explain the importance of various units of a computer
- Differentiate between system software and application software
- Explain the importance of operating system
- Know the internal parts of the system unit.
- Get acquainted in the elements of computer system.
Computer systems and software - Written by Mark John LadoMark John Lado, MIT
After going through this lesson you would be able to:
familiarise yourself with characteristics of computers
identify the basic components of a computer
explain the importance of various units of a computer
differentiate between system software and application
software
explain the importance of operating system
Understanding of Computer | Introduction | Computer In Business
Hello,
I am Saad Hasan from Begum Rokeya University, Rangpur.
All the Information of this slide is collected from "Fundamentals of Computer" written by E Balagurusamy. Any one can use for his presentations.
>>>>> If You Need Me to Create Slide for You,then You can find me through this link : https://www.linkedin.com/in/saadh393/
Batra Computer Centre is An ISO certified 9001:2008 training Centre in Ambala.
We Provide Best Basic Computer Training in Ambala. BATRA COMPUTER CENTRE provides best training in C, C++, S.E.O, Web Designing, Web Development and So many other courses are available.
A device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
This HIBB first covers the physical components of a computer and their usage, such as keyboards, monitors, and USB cables. It also includes how to use some of these physical components, such as moving a mouse and how to insert a CD. It then moves on to basic interactions with a computer, including logging in, opening programs, and saving files. At the end of this HIBB, students will be aware of the major physical components of a computer. In addition to this, students will be able to perform some basic functions on the computer, including logging in to the computer, opening programs, saving files.
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...Red Red
computercandys.com is a computer tutorial site, with lectures and references on computer technology such as computer unit, multimedia and networking, covering most aspects of computer hardware and software.
YT channel:
https://www.youtube.com/c/redtech101
Website:
https://www.computercandys.com
computer tutorial for everyone.
https://redcomputerscience.blogspot.com
"An Introduction to Computers" http://serverpartdeals.com -
The best place to buy server parts online, computer hardware supplies and computer networking products. We want to be your main computer parts supplier. Providing a reliable computer parts source to buy computer parts wholesale & server parts direct, online.
- See more at: http://serverpartdeals.com/#sthash.T7Moe4fN.dpuf
Batra Computer Centre is An ISO certified 9001:2008 training Centre in Ambala.
We Provide Best Basic Computer Training in Ambala. BATRA COMPUTER CENTRE provides best training in C, C++, S.E.O, Web Designing, Web Development and So many other courses are available.
A device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
This HIBB first covers the physical components of a computer and their usage, such as keyboards, monitors, and USB cables. It also includes how to use some of these physical components, such as moving a mouse and how to insert a CD. It then moves on to basic interactions with a computer, including logging in, opening programs, and saving files. At the end of this HIBB, students will be aware of the major physical components of a computer. In addition to this, students will be able to perform some basic functions on the computer, including logging in to the computer, opening programs, saving files.
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...Red Red
computercandys.com is a computer tutorial site, with lectures and references on computer technology such as computer unit, multimedia and networking, covering most aspects of computer hardware and software.
YT channel:
https://www.youtube.com/c/redtech101
Website:
https://www.computercandys.com
computer tutorial for everyone.
https://redcomputerscience.blogspot.com
"An Introduction to Computers" http://serverpartdeals.com -
The best place to buy server parts online, computer hardware supplies and computer networking products. We want to be your main computer parts supplier. Providing a reliable computer parts source to buy computer parts wholesale & server parts direct, online.
- See more at: http://serverpartdeals.com/#sthash.T7Moe4fN.dpuf
Computing Essentials first chapters , Introduction to IT, the first slide of computing Essentials E-Book, and it talk about introduction to IT, version 2018, includes introduction to what is the PC and its components , open ended questions , a guide to know how to build a PC and desktop , include all types of application (generalized app , specialized apps , mobile apps ) , includes some MCQ questions. all student in any field can study from it.
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxtaruian
Basics of Networking: Introduction, Network Types, Layered network models.
Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components.
IoT Processing Topologies and Types: Data Format, Importance of Processing in IoT, Processing Topologies, IoT Device Design and Selection Considerations, Processing Offloading.
Vs Code - Keyboard-Shortcuts-Windows,
General Ctrl+Shift+P, F1 Show Command Palette Ctrl+P Quick Open, Go to File… Ctrl+Shift+N New window/instance Ctrl+Shift+W Close window/instance Ctrl+, User Settings Ctrl+K Ctrl+S Keyboard Shortcuts Basic editing Ctrl+X Cut line (empty selection) Ctrl+C Copy line (empty selection) Alt+ ↑ / ↓ Move line up/down Shift+Alt + ↓ / ↑ Copy line up/down Ctrl+Shift+K Delete line Ctrl+Enter Insert line below Ctrl+Shift+Enter Insert line above Ctrl+Shift+\ Jump to matching bracket Ctrl+] / [ Indent/outdent line Home / End Go to beginning/end of line Ctrl+Home Go to beginning of file Ctrl+End Go to end of file Ctrl+↑ / ↓ Scroll line up/down Alt+PgUp / PgDn Scroll page up/down Ctrl+Shift+[ Fold (collapse) region Ctrl+Shift+] Unfold (uncollapse) region Ctrl+K Ctrl+[ Fold (collapse) all subregions Ctrl+K Ctrl+] Unfold (uncollapse) all subregions Ctrl+K Ctrl+0 Fold (collapse) all regions Ctrl+K Ctrl+J Unfold (uncollapse) all regions Ctrl+K Ctrl+C Add line comment Ctrl+K Ctrl+U Remove line comment Ctrl+/ Toggle line comment Shift+Alt+A Toggle block comment Alt+Z Toggle word wrap
Computer hardware is useless without software.
Software is the set of instructions and associated data that direct the computer to do a task.
Software can be divided into two categories:
System software and application software.
System software helps the computer to carry out its basic operating tasks.
Application software helps the user carry out a variety of tasks.
Hardware - is the most visible part of any information system: the equipment such as computers, scanners and printers that is used to capture data, transform it and present it to the user as output. Although we will focus mainly on the personal computer (PC) and the peripheral devices that are commonly used with it, the same principles apply to the complete range of computers:
Explain the importance of implementing data
resource management processes and
technologies in an organization.
• Outline the advantages of a database
management approach to managing the data
resources of a business.
• Explain how database management software
helps business professionals and supports the
operations and management of a business
Key element in DSS
Many classes of models
Specialized techniques for each model
Allows for rapid examination of alternative solutions
Multiple models often included in a DSS
Trend toward transparency
The purpose of IT infrastructure management is to provide structure and control of the functions responsible for diverse technical operations which generally involve hardware, software, and networking in both physical and virtual environments. The main goal is to minimize downtime and maintain business productivity.
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...YUSRA FERNANDO
This chapter begins with an introduction to software classifications and terminology. However, the emphasis of this chapter is on software management, specifically software installation in both Windows and Linux. In Linux, the discussion concentrates on the use of package managers and the installation of open source software. The chapter ends with an examination of server software with particular attention paid to installing and configuring the Apache web server at an introductory level.
Memberikan gambaran tentang bagaimana menjadi seorang desainer web tentang tugas dan tanggung jawabnya, serta berbagai hal apa saja yang harus dikuasai agar menjadi seorang desainer web yang profesional
JavaScript is the world's most popular programming language.
JavaScript is the programming language of the Web.
JavaScript is easy to learn.
This tutorial will teach you JavaScript from basic to advanced.
Objectives Learning:
Student know the Css Definition
Student know Css Sintax and Selector CSS
Student know the Web Technology, HTML, Web Static & Web Dynamic
Chapter 00 introduction - web desain -(shared)YUSRA FERNANDO
This course provides an introduction of web-development techniques that use HTML, CSS and JavaScript as a web development essentials including database connectivity, Basics of PHP for Web Development and advanced technique of web programming.
Sasaran Pembelajaran
Sesudah mempelajari bab ini Anda akan dapat:
Menjelaskan kepribadian, cara pengukurannya, dan faktor-faktor pembentuknya.
Menjelaskan kerangka kerja Indikator Tipe Kepribadian Myers-Briggs serta kekuatan dan kelemahannya.
Mengidentifikasi sifat-sifat utama dalam model kepribadian Lima Besar.
Mendemonstrasikan bagaimana fitur-fitur Lima Besar memprediksi perilaku di tempat kerja.
Sasaran Pembelajaran
Sesudah mempelajari bab ini Anda akan dapat:
Membedakan antara emosi dan suasana hati.
Mendiskusikan apakah emosi rasional dan apakah fungsi dari emosi.
Mengidentifikasi sumber-sumber emosi dan suasana hati.
Menunjukkan pengaruh emosi pekerja terhadap para pekerja
Sasaran Pembelajaran
Sesudah mempelajari bab ini Anda akan dapat:
Membandingkan tiga komponen sikap.
Meringkas hubungan antara sikap dan perilaku.
Membandingkan dan membedakan sikap-sikap kerja yang utama.
Mendefiniskan kepuasan kerja dan menunjukkan bagaimana kita dapat mengukurnya.
Meringkaskan sebab-sebab utama kepuasan kerja.
Mengidentifikasi empat respons pekerja terhadap ketidakpuasan.
Sasaran Pembelajaran
Sesudah mempelajari bab ini Anda akan dapat:
Menjelaskan dua bentuk utama keragaman tenaga kerja.
Mengenali stereotip dan memahami bagaimana fungsinya dalam tatanan organisasi.
Mengidentifikasi karakteristik-karakteristik biografis penting dan menjelaskan hubungannya terhadap perilaku organisasi.
Mendefinisikan kemampuan intelektual dan menunjukkan hubungannya terhadap perilaku organisasi.
Membandingkan kemampuan intelektual dan fisik.
Menjelaskan bagaimana organisasi mengelola keragaman dengan efektif.
Sasaran Pembelajaran
Sesudah mempelajari bab ini Anda akan dapat:
Mendemonstrasikan pentingnya keterampilan interpersonal di tempat kerja.
Menjelaskan fungsi, peran, dan keterampilan manajer.
Mendefinisikan perilaku organisasi (OB).
Menunjukkan pentingnya kajian sistematis ke dalam perilaku organisasi.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
2. Basic Concepts of Computer Systems
and Information Technology
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
Introduction Information Technology
2
7. Defining Information
• What is Information?
Information is any knowledge that comes to our attention. That
could be voice, image, text and video
• What is data?
Data is information when dealing with the machine
7
10. Defining Information Technology
• Information Technologies are systems of hardware and/or
software that capture, process, exchange, store and/or
present information using electrical, magnetic and/or
electromagnetic energy.
10
13. IT in Society (people)
• Personal Communication
• Conversations (phone, cell)
• Messaging (E-mail, SMS)
• Video Coms
• Entertainment
• Web surfing
• Downloading video and audio files
• Interactive gaming
• Day-to-Day living
Buying airline tecket
Ordering books
Electronic banking/ stock market
13
14. IT in Society (business)
• Internal Communication
• Computer network
• Corporate website
• Video teleconferencing
• Messaging (SMS, email)
• Electronic Commerce
• Call Centres
• Electronic transactions
• Online sales
• Business operations
Factory operation systems
Databases
14
15. Examples on IT Careers
• Information Security Jobs
• Address information security
• IT Analyst
• Translate business requirement into
technical specification
• Network Administration
• Configure and operate computer network
• Management Consulting
• Provide consulting for government and
organizations
• Database Administration
Managing corporate database
• Computer Forensics Expert
Extracts computer evidence for
detecting/preventing /prosecuting crimes
• IT Sales:
people on frontline to sell products
• Software development:
develop software solutions
15
16. An Introduction to Systems Concepts and Systems
Architecture
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
5th Edition, Irv Englander
John Wiley and Sons
16
17. What is a system?
• What do the following systems have in common?
1. Plumbing system
2. Solar system
3. Home network system
4. Inventory control system
2-17
22. Definition of a System
• “A system is a collection of components linked together and organized in
such a way as to be recognizable as a single unit.”
• Linked components of a system also define a boundary for the system
• The environment is anything outside of the system
2-22
24. System Decomposition
• Components
• May be irreducible or
• May be subsystems
• Decomposition
• The division of a system into its components and linkages
• Hierarchical
2-24
25. System Architecture
“The fundamental properties, and the patterns of relationships,
connections, constraints, and linkages among the components and
between the system and its environment are known collectively as the
architecture of the system”
2-25
26. Abstractions of Systems
• How are the following two abstractions of a business system different
from one another?
• How are these abstractions different from the real business system?
2-26
29. IT System Architectures
• Distributed processing systems
• Client-Server Computing
• Two-tier architecture
• Three-tier architecture
• N-tier architecture
• Web-Based Computing
• Cloud Computing
• Peer-to-Peer Computing
2-29
30. Client-Server Computing
• A program on a client computer requests services from a program on a
server computer
• Examples:
• Email services, file services, print services, directory services, Web services,
database services, application services, remote access services
2-30
32. Advantages of Client-Server Architecture
• Centralization of services permits
• easier administration of services by IT professionals
• easier availability and location by users
• consistency of resources, such as files and data, can be managed and assured
• more efficient and cost-effective hardware procurement through purchasing
a small number of very powerful computers
2-32
34. Multi-tier Architectures
• Two-tier architecture
• Two computers are involved in a service
• Example: Web browser and Web server model used in intranets and on
the Internet
• Three-tier architecture
• Three computers are involved in a service
• Example: client computer, Web server, database server
• N-tier architecture
2-34
36. Cloud Computing
• Off-site storage facilities for an organization
• Software as a service (SaaS): applications run on a server or
processing may be divided on server and client
• Platform as a service (PaaS): tools for a developer to create and run
applications on a cloud platform
• Infrastructure as a service (IaaS) – cloud-based hardware emulation of
virtual machines and networking
2-36
37. Cloud Computing Advantages/Risks
• Advantages
• Client’s datacenter needs are simplified; reduced costs
• Supports collaboration
• Scalable to a variety of host platforms
• Reduced maintenance downtime
• Lower investment for short-term projects
• Risks
• Quality of security is critical
• Outages or loss of connectivity may prevent users from working
• Requires long-term commitment and viability of cloud service
• Changes in operating procedures can result in data loss
2-37
38. Peer-to-Peer Computing
• Computers on a network are treated as equals
• Each computer can share resources with the other computers on the network
• Disadvantages
• Difficult to establish centralized control of services
• Difficult to locate services
• Difficult to synchronize versions of files or software
• Difficult to secure network from unauthorized access and from viruses
• Advantages
• Sharing files between personal computers
• Internet file sharing
2-38
39. Hybrid Model of Computing
• Client-server technology used to locate systems and files
• Then systems can participate in peer-to-peer transactions
• Examples
• Instant messaging
• Skype
• Napster
2-39
40. Google: System Architecture
• Provide powerful, fast search capability for material on the Internet
• Derive income from advertising that is targeted to each user based on their
searches
• Basic requirements
• Capable of responding to millions of simultaneous requests from all over the world
• Perform a web crawl of the Internet to retrieve and organize data
• Establish ranking of results with appropriately targeted advertising
• High reliability of the system
• System is easily scalable and cost effective
2-40
43. Facebook’s Application Architecture
• N-tier architecture
• Based entirely on open source software
• Serves as an intermediary between web browser and an application
provider’s Web service
• API and protocols allow information exchange between Facebook
servers and the application server
2-43
44. Component of IT
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
5th Edition, Irv Englander
John Wiley and Sons
44
45. The Components of IT
• Accepting and storing data and information
• Performing mathematical calculations
• Applying logic to make decisions
• Retrieving, displaying, and sending information
• Consistently repeating the above actions many times
45
46. Information Technology Categories
• Hardware: the electronic and mechanical components you can see
and touch
• Software: the set of instructions that direct the hardware
• Network technology: increases the power of IT by allowing the
sharing of resource
46
48. Hardware Components
• Processing: Directs execution of instructions and the transformation of data
• Memory: Temporarily stores data and instructions before and after processing
• Input: Provides the interface used for data entry into a device
• Output: Provides the interface to retrieve information from a device
• Storage: Stores data, information, and instructions for the long term
• Communications: Connects one IT device to another
48
49. The Central Processing Unit
• Core of all computing operations is a chip composed of millions of transistors
called the central processing unit (or CPU).
• A transistor is an electronic switch that can be on (1) or off (0).
• By combining multiple transistors we can represent data in a binary format.
• The CPU works together with memory to control the execution of instructions
and the processing of data.
• CPU speed is measured by its clockspeed in billions of cycles per second
(gigahertz).
49
50. Memory
• There are two types of memory—long term (ROM) memory and
short-term (RAM) memory
• Both types of memory are built onto memory chips
• Both are measured in number of bytes stored:
• 1000’s (kilobytes—KB)
• Millions (megabytes—MB
• Billions (gigabytes—GB)
50
51. Read Only Memory
• Read Only Memory (ROM) contains instructions that
are not meant to be changed or changed only
infrequently
• ROM is present in most IT devices
• In computers, ROM holds instructions used to
control the startup process
• There are far fewer ROM chips than RAM chips in a
computer
51
52. Random Access Memory
• Random Access Memory (RAM) is the predominant
form of memory in a computer.
• The CPU can access any item stored in RAM directly
(randomly).
• RAM is temporary memory so anything in RAM is lost
when the computer is shut down.
• Increasing RAM capacity is the easiest way to increase
effectiveness of a computer.
52
53. Input Hardware
• Input devices provide one interface between the internal processes of an
IS and its environment.
• It allows us to enter data and commands.
• Input devices include:
• Keyboards
• Pointing devices such as a mouse
• Scanning devices such a barcode scanner
53
54. Keyboard
• Most widely used input device for computers.
• Highly versatile, providing the capability to enter all types of data as well as
instructions.
• Ergonomic keyboards are keyboards that are designed to keep users safe as
well as enabling them to be more productive.
54
55. Pointing and Scanning Devices
• Pointing devices such as a mouse allow users to provide instructions to a computer
using physical movements, such as “point” and “click”.
• Pointing devices tend to require less training than a keyboard.
• More useful to entering commands than for entering data.
• Scanning devices such as barcode readers improve speed and efficiency or perform a
task more efficiently.
55
56. Output Hardware
• Output devices convert IT-processed information into a form usable by
knowledge workers (or other machines)
• Quality and speed of output is important in choosing an output device.
• Common output devices include
• Display devices such as liquid crystal displays (LCDs)
• Printers, typically laser or ink-jet as well as plotters
• Speakers
56
57. IT Storage Hardware
• Storage refers to hardware media and devices used to contain
large amounts of data and instructions for the long term.
• Storage is much slower to access than memory.
• Examples include:
• Hard drive
• CD and DVDs
• USB flash memory
57
58. Communications Hardware
• Network interface card (NIC) provides the
physical connection between the computer and a
local network
• Wired
• Wireless
• Modems allow you to connect to a remote
network over a telecommunications line
(telephone line or cable TV service)
58
59. Software
• Software is information that specifies how the device should work
with other data, information, and knowledge.
• Software is legally protected just like music and books.
• Firmware is software built into chips (hardware) like that in cell
phones and PDAs
• Software gets the job done!
• System Software
• Application Software
59
60. System Software
• Controls the hardware associated with a system
• Supports the execution of application software
• Two main types of systems software
• Operating Systems (OS) Software –coordinates and handles the details of
working with the computer hardware.
• Utility software – provides additional tools to maintain and service your
system (many utility software tasks are now included in the OS).
60
62. Application Software
• Application software is a complete, self-contained program or set of
programs for performing a specific job.
• Application software is the software you use to get things done.
• Productivity software – software used by knowledge workers to work
with data, information, and knowledge. For example, MS Office and
Intuit’s Quicken software.
62
63. Types of Productivity Software
• Document Preparation Software: used in creating documents composed of text, images, and
graphics.
• Electronic Spreadsheet Software: used to perform general calculations and analyses.
• Presentation Graphics Software: used for preparing slides and graphics for business
presentations.
• Database Management System (DBMS) software: used to design, create, update, and query
data.
• Personal Information Management (PIM) software: used to manage personal information.
63
64. Connecting over Networks
• Networks are everywhere! In this section, we concentrate
on a computer networks.
• A computer network consists of nodes that represent
computer hardware and network user with hardware,
software, and communications media forming links
between nodes.
• Network consists of 4 primary components:
• Data
• Special hardware
• Software that allows computers to share data.
• Communications media to link computers together.
64
65. Network Categories
• Computer networks are commonly described by the
physical size of the network.
• The most commonly use types are LANs and WANs.
• A Local Area Network (LAN) is confined to a
relatively small area like a building.
• A Wide Area Network (WAN) connects computers
over regions, countries, and continents.
65
66. Network Hardware
• There are three basic categories of network hardware
1. Hardware to connect a device to a network.
2. Specialized hardware for handling network traffic.
3. Specialized computers that control the network and delivery of data on the
network.
66
67. Network Connection Hardware
• Modems, cable modems, network interface cards, and wireless cards
• The physical link that creates the network connection is referred to as
the carrier or communications medium.
• Copper wire for telephone systems
• Coaxial cable or fiber-optic cables for faster transmission
• Wireless technologies including infrared light, radio waves, and microwaves.
67
68. Network Traffic Hardware
• A bridge is a device that lets you connect to networks or break a large network into
two smaller, more efficient networks.
• A router is an intelligent bridge that connects, translates, and then directs data that
cross between two networks.
• A hub (or concentrator) serves as a central connection point for devices on a a
network.
• A wireless Access Point (AP) is a special bridge that connects between wireless
devices and a wired network.
68
69. Specialized Network Computers
• Servers are specialized computers that manage the various functions
on a network.
• A file server is a fast computer with large amount of RAM and
storage.
• File servers run the network operating system as well as storing
shared software applications and data files.
• Computers connected to a file server are called clients or
workstations.
69
70. Network Software
• Network operating system software manages network functions and
the flow of data over a computer network.
• Network application software provides the instructions that allow for
the creation of data and for transformation to fit appropriate
protocols for transmission over a network.
• A protocol is a standard set of rules that allows the communication of
data between nodes on a network.
70
71. Network Benefits
• Efficient communication: E-mail and instant messaging are just two ways that networks allow us to
communicate more efficiently.
• Effective resource management: Networks allow easy sharing of software, hardware, and data
resources.
• Complete, accurate, reliable, and timely information: Multiple users can access or update data
quickly from a central database.
• Expanded marketing and customer service capabilities: Businesses and individuals can carry out
remote business transactions anytime and anywhere.
71
72. The Internet
• Any computer network that connects several networks together is an internet.
• Typically we refer to the single largest and most popular internet as the “Internet.”
• Over 1 billion people had access to the Internet in 2006.
• The Internet uses the TCP/IP suite of packet switching protocols.
• Any computer using software compatible with TCP/IP, regardless of OS, can connect
and communicate over the Internet.
72
73. Access the Internet
• Home users access the Internet through dial-up over traditional telephone
lines or broadband through cable or DSL.
• Most users connect through an Internet Service Provider (ISP) using
Internet access software.
• Internet access has moved into libraries, airports, or coffee shops using
Wi-Fi.
• Wi-fi stands for 802.11 standards for wireless network access.
73
74. The World Wide Web
• The World Wide Web (WWW) is one the two most popular Internet applications (e-mail
is the other.)
• The Web provides a hypertext system that operates over the Internet.
• Hypertext provides an easy way to publish information on a network in documents that
incorporate hyperlinks to other information on the network.
• Web browser software enables user to view hypertext document and use hyperlinks to
browse other related documents.
74
75. Web Standards
The Web relies on three basic standards:
1. A Uniform Resource Locator (URL) which specifies a unique address for each page
that indicates the location of a document.
2. The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and
servers as they respond to each other.
3. Hypertext Markup Language (HTML) provides a language for encoding the
information so a variety of IT devices can display it.
75
76. THANK YOU ...
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
YUSRA FERNANDO, S.KOM., M.KOM
76