The document discusses different types of computers and their uses. It defines a computer as an electronic device that can store, retrieve, and process data. It then describes several types of computers including supercomputers, mainframes, mini computers, desktops, laptops, and tablets. Each computer type has different processing power, data storage capabilities, and typical uses. The document also covers computer components, software types, and basic functions like word processing, spreadsheets and presentations.
nicely view , types of computer know information and lots of picture in computers and parts of fields.
here three category divide to know computer struture .
Classification of Computer according to their sizeManas Dhibar
On the basis of size, there are four types of computer. They are minicomputer, microcomputer, mainframe computer and supercomputer. The supercomputer is the fastest, most expensive, big in size, and the most powerful computer that can perform multiple tasks within no second. Mini Computers are medium-sized computer.
Number systems
A manner of counting
Several different number systems exist
Decimal number system
Used by humans to count
Contains ten distinct digits
Digits combine to make larger numbers
ECDL/ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation Slides. This module requires candidates to demonstrate knowledge and competence in using the common functions of a personal computer and its operating system. Among other tasks, candidates will learn to operate effectively within the desktop environment and how to manage and organise files and directories/folders.
On completion of this module each candidate will be able to:
Use the main features of the operating system including adjusting the main computer settings and using built-in help features
Operate effectively around the computer desktop and work effectively in a graphical user environment
Know about the main concepts of file management and be able to efficiently organise files and folders so that they are easy to identify and find
Use utility software to compress and extract large files and use anti-virus software to protect against computer viruses
Demonstrate the ability to use simple text editing and print tools available within the operating system
The presentation given at MSBTE sponsored content updating program on 'PC Maintenance and Troubleshooting' for Diploma Engineering teachers of Maharashtra.
Venue: Government Polytechnic, Nashik
Date: 17/01/2011
Session-1: Introduction to Computers.
nicely view , types of computer know information and lots of picture in computers and parts of fields.
here three category divide to know computer struture .
Classification of Computer according to their sizeManas Dhibar
On the basis of size, there are four types of computer. They are minicomputer, microcomputer, mainframe computer and supercomputer. The supercomputer is the fastest, most expensive, big in size, and the most powerful computer that can perform multiple tasks within no second. Mini Computers are medium-sized computer.
Number systems
A manner of counting
Several different number systems exist
Decimal number system
Used by humans to count
Contains ten distinct digits
Digits combine to make larger numbers
ECDL/ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation Slides. This module requires candidates to demonstrate knowledge and competence in using the common functions of a personal computer and its operating system. Among other tasks, candidates will learn to operate effectively within the desktop environment and how to manage and organise files and directories/folders.
On completion of this module each candidate will be able to:
Use the main features of the operating system including adjusting the main computer settings and using built-in help features
Operate effectively around the computer desktop and work effectively in a graphical user environment
Know about the main concepts of file management and be able to efficiently organise files and folders so that they are easy to identify and find
Use utility software to compress and extract large files and use anti-virus software to protect against computer viruses
Demonstrate the ability to use simple text editing and print tools available within the operating system
The presentation given at MSBTE sponsored content updating program on 'PC Maintenance and Troubleshooting' for Diploma Engineering teachers of Maharashtra.
Venue: Government Polytechnic, Nashik
Date: 17/01/2011
Session-1: Introduction to Computers.
Taming the ever-evolving Compliance Beast : Lessons learnt at LinkedIn [Strat...Shirshanka Das
Just when you think you have your Kafka and Hadoop clusters set up and humming and you’re well on your path to democratizing data, you realize that you now have a very different set of challenges to solve. You want to provide unfettered access to data to your data scientists, but at the same time, you need to preserve the privacy of your members, who have entrusted you with their data.
Shirshanka Das and Tushar Shanbhag outline the path LinkedIn has taken to protect member privacy in its scalable distributed data ecosystem built around Kafka and Hadoop.
They also discuss three foundational building blocks for scalable data management that can meet data compliance regulations: a centralized metadata system, a standardized data lifecycle management platform, and a unified data access layer. Some of these systems are open source and can be of use to companies that are in a similar situation. Along the way, they also look to the future—specifically, to the General Data Protection Regulation, which comes into effect in 2018—and outline LinkedIn’s plans for addressing those requirements.
But technology is just part of the solution. Shirshanka and Tushar also share the culture and process change they’ve seen happen at the company and the lessons they’ve learned about sustainable process and governance.
TYPES OF COMPUTER
analog
digital
hybrid
CLASSIFICATION OF COMPUTER
Mainframe
Minicomputers
Server
Supercomputers
Microcomputers
Desktops
Laptops
Personal Digital Assistants (PDAs)
Tablet Computers
Wearable Computers
General features of computer – Evolution of computers; Computer Applications – Data Processing – Information Processing – Commercial – Office Automation – Industry and Engineering – Healthcare – Education – Disruptive technologies.
PC (Personal Computer)
A PC can be defined as a small, relatively inexpensive computer designed for an individual
user. PCs are based on the microprocessor technology that enables manufacturers to put an
entire CPU on one chip. Businesses use personal
computers for word processing, accounting,
desktop publishing, and for running spreadsheet
and database management applications. At home,
the most popular use for personal computers is
playing games and surfing the Internet.
Workstation:
Workstation is a computer used for engineering applications (CAD/CAM), desktop publishing,
software development, and other such types of applications which require a moderate amount
of computing power and relatively high quality graphics capabilities.
Minicomputer
It is a midsize multi-processing system capable of supporting up to 250 users simultaneously.
Mainframe
Mainframe is very large in size and is an expensive computer capable of supporting hundreds
or even thousands of users simultaneously. Mainframe executes many programs concurrently
and supports many simultaneous execution of programs.
Supercomputer
Supercomputers are one of the fastest computers currently available. Supercomputers are
very expensive and are employed for specialized applications that require immense amount
of mathematical calculations (number crunching).
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Computer Studies, Uses, Computer application and appreciation
1. COMPUTER STUDIES AND USE
COMPUTER APPRECIATION
&
APPLICATION
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
2. What is a Computer?What is a Computer?
A computer is an electronic device that
manipulates information, or data. It has
the ability to store, retrieve, and
process data.
DEFINITION OF COMPUTERDEFINITION OF COMPUTER
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
3. Uses of a Computer are as followsUses of a Computer are as follows
A Computer can be use to type aA Computer can be use to type a
documentdocument
It can be used to play a gameIt can be used to play a game
It can be used to send an e-mailIt can be used to send an e-mail
It can be use to browse the webIt can be use to browse the web
You can also use it to edit orYou can also use it to edit or
create spreadsheets, presentations, andcreate spreadsheets, presentations, and
even videos.even videos.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
4. TYPES OF COMPUTER:TYPES OF COMPUTER:
1.1. Super computersSuper computers
2. Mainframes computers
3.3. Mini computerMini computer
4.4. Desktop computersDesktop computers
5.5. Notebooks/Laptop computersNotebooks/Laptop computers
6. Palmtop/Tablet computers
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
5. SUPERCOMPUTERSSUPERCOMPUTERS
SUPERCOMPUTERS: It is the most
powerful computers in terms of
performance and data processing are the
supercomputers. These are specialized
and task specific computers used by large
organizations. These computers are used
for research and exploration purposes,
like NASA (National Aeronautics and
Space Administration) uses
supercomputers for launching space
shuttles, controlling them and for space
exploration purpose. The supercomputers
are very expensive and very large in size.
It can be accommodated in large air-
conditioned rooms; some super
computers can span an entire building.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
6. MAINFRAMES COMPUTERMAINFRAMES COMPUTER
Mainframes Computer: Although Mainframes are not as
powerful as supercomputers, but certainly they are quite
expensive nonetheless, and many large firms & government
organizations uses Mainframes to run their business
operations.
The Mainframe computers can be accommodated in large
air-conditioned rooms because of its size. Super-computers
are the fastest computers with large data storage capacity,
Mainframes can also process & store large amount of data.
Banks educational institutions & insurance companies use
mainframe computers to store data about their customers,
students & insurance policy holders.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
7. MINICOMPUTERSMINICOMPUTERS
Minicomputers are used by small
businesses & firms. Minicomputers are
also called as “Midrange Computers”.
These are small machines and can be
accommodated on a disk with not as
processing and data storage
capabilities as super-computers &
Mainframes.
These computers are not designed for a
single user. Individual departments of a
large company or organizations use
Mini-computers for specific purposes.
For example, a production department
can use Mini-computers for monitoring
certain production process.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
8. DESKTOP COMPUTERSDESKTOP COMPUTERS
A desktop computer is a
personal computer in a form
intended for regular use at a
single location desk/table due to
its size and power requirements,
as opposed to a laptop whose
rechargeable battery and
compact dimensions allow it to be
regularly carried and used in
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
9. LAPTOPS/NOTE BOOKSLAPTOPS/NOTE BOOKS
COMPUTERSCOMPUTERS
Laptop/Note Books
Computers have similar
functionality to desktops,
but are mobile.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
10. PALMTOP/TABLETS
A Palmtop PC was an aboutA Palmtop PC was an about pocket calculatorpocket calculator--
sized, battery-poweredsized, battery-powered PCPC in a horizontalin a horizontal
clamshell design with integrated keyboard andclamshell design with integrated keyboard and
display. It could be used like adisplay. It could be used like a subnotebooksubnotebook, but, but
was light enough to be comfortably used handheldwas light enough to be comfortably used handheld
as well. Most Palmtop PCs were small enough toas well. Most Palmtop PCs were small enough to
be stored in a user's shirt or jacket pocket.be stored in a user's shirt or jacket pocket.
A tablet computer is aA tablet computer is a mobile computermobile computer with awith a
touchscreen displaytouchscreen display,, circuitrycircuitry andand batterybattery in ain a
single device. Tablets come equipped withsingle device. Tablets come equipped with
sensors, includingsensors, including camerascameras, a, a microphonemicrophone andand
anan accelerometeraccelerometer, and the touchscreen display, and the touchscreen display
uses finger or stylususes finger or stylus gesturesgestures substituting forsubstituting for
the use ofthe use of computer mousecomputer mouse andand keyboardkeyboard..
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
11. GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
The first computers used vacuum tubes for circuitry and
magnetic drums for memory, and were often enormous, taking
up entire rooms.
They were very expensive to operate and in addition to using a
great deal of electricity, generated a lot of heat, which was often
the cause of malfunctions.
First Generation (1940-1956) Vacuum Tubes
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
12. GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
Transistors replaced vacuum tubes
and ushered in the second generation
of computers. The transistor was
invented in 1947 but did not see
widespread use in computers until the
late 1950s.
The transistor was far superior to the
vacuum tube, allowing computers to
become smaller, faster, cheaper,
more energy-efficient and more
reliable than their first-generation
predecessors.
Second Generation(1956-1963) Transistors
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
13. GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
The development of the
integrated circuit was the hallmark of
the third generation of computers.
Transistors were miniaturized and
placed on silicon chips, called
semiconductors, which drastically
increased the speed and efficiency of
computers.
Third Generation (1964-1971) Integrated Circuits
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
14. GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
The microprocessor brought the fourth
generation of computers, as
thousands of integrated circuits were
built onto a single silicon chip. What in
the first generation filled an entire
room could now fit in the palm of the
hand. The Intel 4004 chip, developed
in 1971, located all the components of
the computer—from the
central processing unit and memory to
input/output controls—on a single
chip.
Fourth Generation (1971-Present) Microprocessors
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
15. GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
Fifth generation computing devices,
based on artificial intelligence, are still
in development, though there are
some applications, such as
voice recognition, that are being used
today. The use of parallel processing
and superconductors is helping to
make artificial intelligence a reality.
Fifth Generation (Present and Beyond) Artificial Intelligence
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
16. PARTS & COMPONENTSPARTS & COMPONENTS
OF A COMPUTEROF A COMPUTER
3.3. KEYBOARDKEYBOARD 4. MOUSE4. MOUSE
1. MONITORMONITOR 2. CENTRAL PROCESSING UNITCENTRAL PROCESSING UNIT
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
17. COMPUTER PHERIPHERAL
(INPUT/OUTPUT) DEVICES
Input and output devices are typically housed externally
to the main computer chassis. The following are either
standard or very common to many computer systems.
Input devices allow the user to enter information into the
system, or control its operation. Most personal
computers have a mouse and keyboard, but laptop
systems typically use a touchpad instead of a mouse.
Other input devices include webcams, microphones,
joysticks, game pad and image scanners.
Output devices display information in a human readable
form. Such devices could include printers, speakers,
projector, LCD, monitors or a Braille embosser.Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
18. TYPES OF SOFTWARE AND THEIR APPLICATION
OPERATING SYSTEMS
An operating system is the most important program that
runs on a computer. Every general-purpose computer
must have an operating system to run other programs
and applications.
Operating systems perform basic tasks, such as
recognizing input from the keyboard, sending output to
the display screen, keeping track of files and
directories on the disk, and controlling
peripheral devices such as disk drives and printers.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
19. Examples of Operating SystemExamples of Operating System
Window 98
Windows 2000
Windows NT
Window XP
Window Vista
Window 7
Window 8
Window 10.
UNIX
LINUX Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
20. APPLICATION SOFTWARE
Application software, or simply
applications, are often called productivity
programs or end-user programs because
they enable the user to complete tasks
such as creating documents,
spreadsheets, databases, and
publications, doing online research,
sending email, designing graphics,
running businesses, and even playing
games! Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
21. EXAMPLES OF APPLICATION
SOFTWARE
Game (Scrabble, Car Race, Football e.t.c)
Drawing (Corel Draw, Photoshop e.t.c)
Playing Music (Winamp, Vlc, Kpm)
Shopping (Jumia, Konga et.c.)
Record Keeping (Microsoft Applications)
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
22. BOOTING
What is Booting?
Booting is a process or set of operations that loads and
hence starts the operating system, starting from the point
when user switches on the power button.
DVD/CD Drive
Hard Disk Drive / USB Drive
Network
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
Booting Devices are as follows:
23. WORM AND COLD BOOTING
When a Computer is turned on it is called WORM BOOTING
and when its is switched off it is called COLD BOOTING
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
24. USING THE COMPUTER
WORD PROCESSINGWORD PROCESSING:: WordWord processingprocessing is a term that means usingis a term that means using
a computer to create, edit, and print documents. Worda computer to create, edit, and print documents. Word processorsprocessors areare
the most common types of applicationsthe most common types of applications.. Microsoft WordMicrosoft Word
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
25. SPREADSHEET
SPREADSHEET : A spreadsheet is an interactiveSPREADSHEET : A spreadsheet is an interactive computer applicationcomputer application
program for organization, analysis and storage ofprogram for organization, analysis and storage of datadata inin tabulartabular form.form.
Spreadsheets developed as computerized simulations of paperSpreadsheets developed as computerized simulations of paper
accountingaccounting worksheetsworksheets(Microsoft Excel).(Microsoft Excel).
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
26. PRESENTATION
The term "PowerPoint presentation" was coined when MicrosoftThe term "PowerPoint presentation" was coined when Microsoft
introduced its software programintroduced its software program PowerPointPowerPoint. PowerPoint is. PowerPoint is
commonly used by presenters as a digital aid when presentingcommonly used by presenters as a digital aid when presenting
their topic to an audience.their topic to an audience.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
27. DATA & DATA
PROCESSING
DATA: Data is distinct information that is formatted in a
special way. Data exists in a variety of forms, like text on
paper or bytes stored in electronic memory.
Data Processing: Data processing is, broadly, "the
collection and manipulation of items of data to produce
meaningful information.Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
28. NETWORKINGNETWORKING
A network is a group of two or more computer systems
linked together.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
29. LAN NETWORKINGLAN NETWORKING
Local-Area Networks (LANs): The computers are
geographically close together (that is, in the same
building).
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
30. WAN NETWORKINGWAN NETWORKING
Wide-Area Networks (WANs): The computers are
farther apart and are connected by telephone lines or
radio waves.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
31. DIFFERENCES BETWEEN LAN AND WAN NETWORKINGDIFFERENCES BETWEEN LAN AND WAN NETWORKING
LAN WAN
Local Area Network Wide Area Network
Local areas only Large geographic areas
(e.g., homes, offices, schools) (e.g., cities, states, nations)
High speed (1000 mbps) Less speed (150 mbps)
LANs have a high data transfer WANs have a lower data transfer
Less congestion More congestion
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
32. INTERNETINTERNET
The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite
(TCP/IP) to link several billion devices worldwide.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
33. Accessing the InternetAccessing the Internet
for Instructional purposefor Instructional purpose
STEPS TO FOLLOW
Lunch your web browser (Internet explorer, Firefox, Google
chrome e.t.c)
Click inside the Address bar
Type the Web address and tap enter on your keyboard
(www.google.com, www.ask.com, www.wikipedia.com e.t.c)
Locate the information that you so desire
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
34. PROTECTION OF THE COMPUTER/DATA
Antivirus programs, which can scan and keeps you alert
about viruses. Example: Kaspersky, Norton, Avira, Avast,
e.t.c.
Firewall of your system, which can be configured for
enabling you to transfer selected information between your
system and internet.
Backup is another way of protecting your important files and
documents, as this helps to restore lost files because of virus
attack.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
35. COMPUTER-ASSISTED INSTRUCTION (CAI)
Computer-assisted instruction (CAI) refers to
instruction or remediation presented on a
computer.
Many educational computer programs are
available online and from computer stores
and textbook companies. They enhance
teacher instruction in several ways.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
36. ADVANTAGES COMPUTER-ASSISTED
INSTRUCTION (CAI)
IMMEDIATE FEEDBACK: The immediate feedback provided by
interactive terminals keeps students interacting and eager to keep
trying.
ACTIVE PARTICIPATION: Even weaker students are obliged to
participate actively. They often remain passive in lectures.
GRAPHICS FACILITY: Interactive graphics make it possible to
sample many more illustrations that could easily be shown in a
textbook.
ACCURATE DATA: Large volumes of data can be handled with
accuracy and without drudgery.
ENRICHMENT OF COURSE: The novel technique provides enrichment
of course through added variety.
MATHEMATICAL CALCULATIONS: Mathematical calculations can be
done as readily for realistic examples as for artificially simple class
that can be solved analytically.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)
37. DISADVANTAGES COMPUTER-ASSISTED
INSTRUCTION (CAI)
A programmer cannot cater for every possible response and may
give unexpected and unhelpful responses to unusual input.
A few students are intimidated by the strangeness of a computer
terminal.
Packages can become boring if a student is alone at a terminal for
too long. Most packages should run for an hour or so.
Lack of trained teachers. It is necessary for teachers and students
to have basic technology knowledge before applying computer
technology in second language teaching and learning.
A package will not be appreciated unless it has a perceived goal
and will not be
considered important unless it is integrated into a course to the
extent of being assessed by a teacher.
Comp. Appreciation&Application byComp. Appreciation&Application by
Adekunle OladimejiAdekunle Oladimeji
(adekunleforreal@gmail.com)(adekunleforreal@gmail.com)