The document provides an overview of computer hardware topics, including:
1) Input devices like keyboards, mice, and touchscreens; display devices like monitors and screens; and printers.
2) Data storage systems including hard drives, solid-state drives, optical discs, and memory cards. Storage features like capacity, access time, and transfer rates are also covered.
3) How expansion cards, slots, ports, and device drivers allow additional hardware to be added to computers.
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Lesson plan:Multiplication and division of binary numberssamina khan
Bi means two. Binary numbers are 0 and 1. we can add, subtract, multiply and divide. This lesson plan is related to multiplication and division of binary numbers. teacher will solve different questions to clear the method of binary multiplication and division.
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Lesson plan:Multiplication and division of binary numberssamina khan
Bi means two. Binary numbers are 0 and 1. we can add, subtract, multiply and divide. This lesson plan is related to multiplication and division of binary numbers. teacher will solve different questions to clear the method of binary multiplication and division.
Learning Objective:
After reading this information sheet, you must be able to:
1. define computer hardware;
2. identify basic set of devices found in most Personal Computer
3. determine the peripheral devices
Learning Objective:
After reading this information sheet, you must be able to:
1. define computer hardware;
2. identify basic set of devices found in most Personal Computer
3. determine the peripheral devices
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. Computer Concepts – Illustrated 9th Edition 2
Learning Objectives
Identify and describe how to use input
devices
Name different types of display devices,
and explain their key features
Describe different types of printers, and
explain the advantages and disadvantages
of each type
Identify and explain the different storage
devices and their corresponding storage
media
2
3. Computer Concepts – Illustrated 9th Edition 3
Learning Objectives (continued)
Explain the advantages and disadvantages
of magnetic, optical, and solid-state storage
systems
Explain when you might choose a CD, DVD,
or BD based on your storage needs
Describe the different types of solid-state
cards and drives available today
Identify expansion ports and expansion
cards, and explain how to use them
3
4. 4
Input Devices
Keyboards:
Type letters and numbers
Navigation keypad – Moves the insertion
point
Mouse:
Controls on-screen pointer
Optical mouse
Laser mouse
Computer Concepts – Illustrated 9th Edition 4
6. Computer Concepts – Illustrated 9th Edition 6
Input Devices (continued)
Other pointing devices:
Pointing stick
Touchpad (also called a trackpad)
Trackball
Touch screen
Other ways to input data:
Scanner
Microphone
Digital camera
7. Computer Concepts – Illustrated 9th Edition 7
Display Devices
Monitor:
Standalone display device
Found with desktop computers
Screen:
Area where output is displayed
• Monitors attached to desktop computers have
screens
• Notebook computers have screens, but not
monitors
8. Computer Concepts – Illustrated 9th Edition 8
Display Devices (continued)
LCD (liquid crystal display):
Manipulates light within a layer of liquid
crystal cells
Also called flat-panel displays
LED (light emitting diodes)
OLED (organic light emitting diodes):
Used by most handheld devices
Draws less power than LCD screens
Can be seen from any angle
10. Computer Concepts – Illustrated 9th Edition 10
Display Devices (continued)
Graphics card:
Contains circuitry that displays images
Response rate:
• Speed at which screens update displays
Pixel (picture element):
• Smallest unit in a graphic image
Resolution:
• Maximum number of displayed horizontal and
vertical pixels
11. Computer Concepts – Illustrated 9th Edition 11
Display Devices (continued)
Screen size:
Measured diagonally in inches
Viewing angle width:
Distance to sides you can still clearly view
image
Dot pitch (dp):
Measure of image clarity
Color depth or bit depth:
Number of colors displayed by monitors and
graphics cards
13. Computer Concepts – Illustrated 9th Edition 13
Printers (continued)
Ink-jet printer:
Sprays ink onto paper
Laser printer:
Produces dots of light on light-sensitive
drum that toner adheres to
14. Computer Concepts – Illustrated 9th Edition 14
Figure B-9: An ink jet printer Figure B-10: A laser printer
15. Computer Concepts – Illustrated 9th Edition 15
Printers (continued)
Printer resolution:
Determines the quality of printed output
Measured in dots per inch (or dpi)
Printer speed:
Pages per minute (ppm)
Duplex printer:
Prints on both sides of paper
Network-enabled printer
Photo printer
16. Computer Concepts – Illustrated 9th Edition 16
Data Storage – An Overview
Storage technology - Data storage system:
Allows for a computer or digital device to
store and retrieve data
Storage medium:
Holds data – Hard drive, tape, memory card,
flash drive, CD, DVD, etc.
Storage device:
Stores and retrieves data from its storage
medium – CD/DVD drive.
17. Computer Concepts – Illustrated 9th Edition 17
Figure B-12: Examples of storage media and storage devices
18. Computer Concepts – Illustrated 9th Edition 18
Data Storage – An Overview
(continued)
Hard drives – Internal or External:
Main storage system for PCs
Mechanical or solid state drives (SSD)
• Solid state technology – No moving parts
Additional storage devices:
USB flash drives
CD/DVD/BD drives
Solid-state card readers
19. Computer Concepts – Illustrated 9th Edition 19
Figure B-13: Inside of a mechanical hard drive
20. Computer Concepts – Illustrated 9th Edition 20
Data Storage – An Overview
(continued)
Connections:
Drive bays or expansion slots
USB ports
Figure B-14: Drive bays
21. Computer Concepts – Illustrated 9th Edition 21
Data Storage Systems Features
Storage capacity:
Maximum amount of data that can be stored
Measured in megabytes (MB), gigabytes
(GB), or terabytes (TB)
22. Computer Concepts – Illustrated 9th Edition 22
Data Storage Systems Features
(continued)
Access time:
Average time to locate data on the storage
medium and read it
Measured in milliseconds (thousandths of a
second, abbreviated as ms)
Data transfer rate:
Amount of data moved from the storage
medium per second.
23. Computer Concepts – Illustrated 9th Edition 23
Data Storage Systems Features
(continued)
Random access – Direct access:
Device can jump directly to the requested
data
Sequential access:
Device reads through data from the
beginning to the end
Magnetic storage:
Stores data by magnetizing microscopic
particles on the disk or tape surface
Hard drives and tapes
25. Computer Concepts – Illustrated 9th Edition 25
Data Storage Systems Features
(continued)
Solid-state storage:
Data stored in a nonvolatile, erasable, low-
power chip
Used in compact storage cards – memory
cards, thumb drives – flash drives, memory
sticks, and some hard drives
Optical storage:
Data stored as microscopic light and dark
spots on the disc surface
CDs, DVDs, and BDs
27. Computer Concepts – Illustrated 9th Edition 27
Optical Data Storage Systems
CD-ROM – Read-only technology:
DVD-ROM, BD-ROM
CD-R – CD recordable technology:
DVD-R/DVD+R, BD-R
CD-RW - CD rewritable technology:
DVD-RW/DVD+RW, BD-RE
A computer system can have a CD drive,
DVD drive, or BD drive
28. Computer Concepts – Illustrated 9th Edition 28
Figure B-20: How an optical drive works
29. Computer Concepts – Illustrated 9th Edition 29
Solid-State Data Storage Systems
Solid-state storage technology:
Stores data in a nonvolatile, erasable, low-
power chip/electronic circuit
Used in digital cameras, MP3 players, etc.,
or for transporting data
Wide range of solid-state memory cards:
CompactFlash (CF) cards
SecureDigital (SD) cards
Memory stick
30. Computer Concepts – Illustrated 9th Edition 30
Figure B-23: Solid state cards
Figure B-26: Examples of solid-state drives
31. Computer Concepts – Illustrated 9th Edition 31
Solid-State Data Storage Systems
(continued)
Card reader:
Required to transfer data to or from solid-
state storage cards
USB flash drives and solid-state drives
(SSD):
Incorporate memory and reader into one
device
Easily transportable from one computer to
another
32. Computer Concepts – Illustrated 9th Edition 32
How to Add Devices to Your
Computer
Expansion card:
Small circuit board allowing computers to
communicate with a peripheral devices
Expansion slot:
Slot on motherboards
where expansion
cards are plugged
Figure B-29: An expansion card slides into an expansion slot
33. Computer Concepts – Illustrated 9th Edition 33
How to Add Devices to Your
Computer (continued)
Expansion port:
Part of expansion card
Connector passing data between a
computer and a peripheral device
• Graphics ports, FireWire ports, Ethernet
network ports, USB ports, etc.
35. Computer Concepts – Illustrated 9th Edition 35
How to Add Devices to Your
Computer (continued)
Data bus:
Circuits over which data is transmitted to
peripheral devices
RAM (Random access memory):
Volatile main memory
Expansion bus:
Segment of the data bus between RAM and
the peripheral devices
36. Computer Concepts – Illustrated 9th Edition 36
Figure B-28: How the expansion bus works
37. Computer Concepts – Illustrated 9th Edition 37
How to Add Devices to Your
Computer (continued)
Device driver:
Software controlling communication with
peripheral devices or expansion cards
USB (universal serial bus) port:
Used for connecting many peripheral
devices
38. Computer Concepts – Illustrated 9th Edition 38
Talking Points: Why Recycle
Computers?
U.S. landfills already hold more than 2
million tons of computer parts:
Computer parts contain toxic substances,
such as lead, phosphorus, and mercury
Better options for disposing of computers:
Sell it, donate it, recycle it, or send it back to
the manufacturer
About half the states in the U.S. have taken
legislative action to deal with the problem
39. Computer Concepts – Illustrated 9th Edition 39
Figure B-31: Creative use of old computer parts
40. Computer Concepts – Illustrated 9th Edition 40
Summary
This unit introduced:
Input Devices
Display Devices
Printers
Data Storage—An Overview
Data Storage Systems Features
Optical Data Storage Systems
Solid-State Data Storage Systems
How to Add Devices to Your Computer
40