SlideShare a Scribd company logo
Computer Fundamentals
& Internet Part 1
Computer
 machine that performs tasks, such as mathematical
calculations or electronic communication, under the
control of a set of instructions called a program.
 is an electronic device used to process data
Limitation of Computer
 A computer cannot generate information on its own. It must be told
what-to-do when to start, stop, compute and make the next move.
Computer is basically subject to human control.
 A computer can detect but generally cannot correct on its own in an
accurate entry. It cannot correct wrong instructions. It does not have
the “common sense” to correct the incorrect data or instructions but it
can inform you that there is an error.
 Computers need periodic maintenance support.
 A computer is subject to occasional breakdown normally due to power
failure or power fluctuations.
Data
 May be defined as the knowledge contained in the human
brain and in all electronic and written records.
 Definite knowledge acquired or supplied about something
or somebody
 The collected facts and data about a particular subject
Information
 information output by a sensing device or organ that
includes both useful and irrelevant or redundant
information and must be processed to be meaningful.
 often in the form of facts or figures obtained from
experiments or surveys, used as a basis for making
calculations or drawing conclusions.
Computer
Hardware
 refers to any part of the computer you can touch.
 Hardware consists of interconnected electronic devices
that you can use to control the computer’s operation,
input, and output.
 refers to the physical equipment of a computer
information system.
Hardware
 Processor
 Memory
 Storage Device
 Input and output Device
Processor
 The procedure that transforms raw data into useful information is called processing.
 To perform this transformation, the computer use two components: the processor and
memory.
 The processor is like the brain of the computer, the part that organizes and carries out
instructions that come from either the user or the software.
Memory
 is the computers electronic scratch pad.
 Programs are loaded into and run from memory.
 Data used by the program is also loaded into memory for fast access.
Storage Device
 Magnetic storage devices
 Optical storage devices
 Flash memory devices
 Online and Cloud
Magnetic Storage Devices
Today, magnetic storage is one of the most common types of storage used with
computers and is the technology that many computer hard drives use.
 Floppy diskette
 Hard drive
 Magnetic strip
 SuperDisk
 Tape cassette
 Zip diskette
Optical Storage Devices
Another common storage is optical storage, which uses lasers and lights as its
method of reading and writing data.
 Blu-Ray disc
 CD-ROM disc
 CD-R and CD-RW disc
 DVD-R, DVD+R, DVD-RW, and DVD+RW disc
Flash Memory Devices
Flash memory has started to replace magnetic media as it becomes cheaper as it
is the more efficient and reliable solution.
 Jump drive or flash drive
 Memory card
 Memory stick
 SSD
Online and Cloud
Storing data online and in cloud storage is becoming popular as people need to
access their data from more than one device.
 Cloud storage
 Network media
Input Devices
 Primary Input Devices:
 Keyboard
 Mouse
 Other Input Devices:
 Pens
 Touch Screen
 Barcode Readers
 Image Scanners and Optical Character Recognition (OCR)
Keyboard
 The keyboard is the primary input device for entering text and numbers.
 It is a relatively simple device, consisting of about 100 keys, each of which
sends a different character code to the CPU.
 It was one of the first peripherals to be used with PC’s, and it is still the most
common; you will find a keyboard either built into or attached to every PC.
Mouse
 Mouse is device used to control on-screen cursor for such actions as “pressing”
on-screen buttons in dialog boxes, choosing menu items, and selecting ranges
of cells in spreadsheets or groups of words in a document.
Pens
 Pens based system use an electronic pen as their primary input device.
 You hold the pen in your hand and write on a special pad or directly on the
screen.
Touch Screen
 Touch screen allows the user to point directly at the computer display, usually
to select from a menu of choices on the screen
Barcode Reader
 Barcode Readers are the most widely used input device after the keyboard and
mouse.
 The most common type of barcode reader is the flatbed model, which is
commonly found in supermarkets and department stores.
Image Scanner
 Image Scanner convert any image into electronic form by shining light onto the
image and sensing the intensity of the reflection at every point.
Output Device
Monitors
Printers
Monitor
 in computer science, device connected to a computer that displays
information on a screen.
 Modern computer monitors can display a wide variety of information, including
text, icons (pictures representing commands), photographs, computer
rendered graphics, video, and animation.
Types of Monitor
 Cathode Ray Tube (CRT)  Flat-Panel Display
Cathode Ray Tube (CRT)
 an electron tube, or evacuated glass container, having at one end a cathode,
or negative electrode, and a device called an electron gun that projects a
beam of electrons against a luminescent screen at the opposite end of the
tube.
Flat – Panel Display
 There are several types of flat – panel monitors, but the most common is the
Liquid Crystal Display (LCD) monitor.
Printers
 A computer peripheral that puts text or a computer-generated image on paper
or on another medium.
Ink-Jet Printers
 A computer-controlled array of ink nozzles can produce images on a moving
sheet or a web of paper.
 Simple ink-jet printers are used routinely to print variable information such as
the expiration dates on food packages or address labels on direct mail pieces,
and are sometimes installed on the end of a conventional printing press.
Laser Printers
 are more expensive than ink – jet printers, their print quality is higher, and
most are faster.
 An electrophotographic printer that is based on the technology used by
photocopiers.
 A focused laser beam and a rotating mirror are used to draw an image of the
desired page on a photosensitive drum.
Dot Matrix Printer
 uses a print head that moves back-and-forth, or in an up-and-down motion, on
the page and prints by impact, striking an ink-soaked cloth ribbon against the
paper, much like the print mechanism on a typewriter
Software
 The programs that help people accomplish specific tasks are referred to as
application software.
 Application software has been written to do almost every task imaginable.
 Thousands of applications are available; however, some major categories you
are likely to encounter are:
 Word processing software
 Spreadsheet
 Database management software
 Graphics, multimedia, and presentation applications
 Entertainment and education software
 Utilities
 Communication software

More Related Content

What's hot

NI221 - Fundamentals of Computer
NI221 - Fundamentals of ComputerNI221 - Fundamentals of Computer
NI221 - Fundamentals of Computer
paulcaspe
 
1 01 Computer Components
1 01 Computer Components1 01 Computer Components
1 01 Computer Componentsjasonmammano
 
Power Point Lesson 02
Power Point Lesson 02Power Point Lesson 02
Power Point Lesson 02Nasir Jumani
 
How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?
Paula Perkovic
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computerkapil078
 
Unit 1 computer concepts
Unit 1   computer conceptsUnit 1   computer concepts
Unit 1 computer concepts
Mithun DSouza
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
Huggermugger Eran
 
COMPONENTS OF COMPUTER SYSTEM
COMPONENTS OF COMPUTER SYSTEMCOMPONENTS OF COMPUTER SYSTEM
COMPONENTS OF COMPUTER SYSTEM
Jelly Flores
 
Pc components
Pc componentsPc components
Pc componentsFrya Lora
 
Types and components of computers
Types and components of computersTypes and components of computers
Types and components of computersCik Na Shohaili
 
Different types of computer systems
Different types of computer systemsDifferent types of computer systems
Different types of computer systemshaydenrd1
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
Jubayer Alam Shoikat
 
Basics of computers
Basics of computersBasics of computers
Basics of computers
pankaj chandel
 
Computer basics--cte i-_-_computer_basics
Computer basics--cte i-_-_computer_basicsComputer basics--cte i-_-_computer_basics
Computer basics--cte i-_-_computer_basics
Tanvir Tomal
 
Computer systems for school kids
Computer systems for school kidsComputer systems for school kids
Computer systems for school kids
Rajesh Tivrekar
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_ed
aswathy ck
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
rachit jaish
 
computer system hardware
computer system hardwarecomputer system hardware
computer system hardware
nicolames
 
Knowing Computer
Knowing ComputerKnowing Computer
Knowing Computer
himabindukursam
 

What's hot (20)

NI221 - Fundamentals of Computer
NI221 - Fundamentals of ComputerNI221 - Fundamentals of Computer
NI221 - Fundamentals of Computer
 
1 01 Computer Components
1 01 Computer Components1 01 Computer Components
1 01 Computer Components
 
Power Point Lesson 02
Power Point Lesson 02Power Point Lesson 02
Power Point Lesson 02
 
How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?
 
Cmp104 lec 3 component of computer
Cmp104 lec 3 component of computerCmp104 lec 3 component of computer
Cmp104 lec 3 component of computer
 
Unit 1 computer concepts
Unit 1   computer conceptsUnit 1   computer concepts
Unit 1 computer concepts
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
COMPONENTS OF COMPUTER SYSTEM
COMPONENTS OF COMPUTER SYSTEMCOMPONENTS OF COMPUTER SYSTEM
COMPONENTS OF COMPUTER SYSTEM
 
Pc components
Pc componentsPc components
Pc components
 
Types and components of computers
Types and components of computersTypes and components of computers
Types and components of computers
 
Different types of computer systems
Different types of computer systemsDifferent types of computer systems
Different types of computer systems
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basics of computers
Basics of computersBasics of computers
Basics of computers
 
Computer basics--cte i-_-_computer_basics
Computer basics--cte i-_-_computer_basicsComputer basics--cte i-_-_computer_basics
Computer basics--cte i-_-_computer_basics
 
Computer systems for school kids
Computer systems for school kidsComputer systems for school kids
Computer systems for school kids
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_ed
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
computer system hardware
computer system hardwarecomputer system hardware
computer system hardware
 
Knowing Computer
Knowing ComputerKnowing Computer
Knowing Computer
 

Viewers also liked

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
VTC_NeilaSofien
 
Web Terminologies
Web TerminologiesWeb Terminologies
Web Terminologies
Lei Tolentino
 
IoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of ThingsIoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of Things
Edmandie Samonte
 
An Introduction to Social Networking
An Introduction to Social NetworkingAn Introduction to Social Networking
An Introduction to Social Networking
Steve Willinger, Freshly Brewed Marketing
 
Chapter 20 coc
Chapter 20 cocChapter 20 coc
Chapter 20 coc
Hareem Aslam
 
Chapter 13 sio
Chapter 13 sioChapter 13 sio
Chapter 13 sio
Hareem Aslam
 
Chapter 18 internet
Chapter 18 internetChapter 18 internet
Chapter 18 internet
Hareem Aslam
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2
Leo Mark Villar
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Chapter19 multimedia-091006115642-phpapp02 (1)
Chapter19 multimedia-091006115642-phpapp02 (1)Chapter19 multimedia-091006115642-phpapp02 (1)
Chapter19 multimedia-091006115642-phpapp02 (1)Jay Patel
 
Networking basics Tutorial 1
Networking basics Tutorial 1Networking basics Tutorial 1
Networking basics Tutorial 1
Technocrats E Services
 
Computer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageComputer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageSaumya Sahu
 
Chapter 17 dccn
Chapter 17 dccnChapter 17 dccn
Chapter 17 dccn
Hareem Aslam
 
Computer Fundamentals Chapter 11 pcp
Computer Fundamentals Chapter 11 pcpComputer Fundamentals Chapter 11 pcp
Computer Fundamentals Chapter 11 pcpSaumya Sahu
 
Chapter 21 c language
Chapter 21 c languageChapter 21 c language
Chapter 21 c language
Hareem Aslam
 
Web browsers
Web browsersWeb browsers
Web browsers
Ramon Olmos
 
Chapter 16 bdp
Chapter 16 bdpChapter 16 bdp
Chapter 16 bdp
Hareem Aslam
 
Chapter 15 asp
Chapter 15 aspChapter 15 asp
Chapter 15 asp
Hareem Aslam
 

Viewers also liked (20)

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Web Terminologies
Web TerminologiesWeb Terminologies
Web Terminologies
 
IoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of ThingsIoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of Things
 
An Introduction to Social Networking
An Introduction to Social NetworkingAn Introduction to Social Networking
An Introduction to Social Networking
 
Chapter 20 coc
Chapter 20 cocChapter 20 coc
Chapter 20 coc
 
Chapter 13 sio
Chapter 13 sioChapter 13 sio
Chapter 13 sio
 
Chapter 18 internet
Chapter 18 internetChapter 18 internet
Chapter 18 internet
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chapter19 multimedia-091006115642-phpapp02 (1)
Chapter19 multimedia-091006115642-phpapp02 (1)Chapter19 multimedia-091006115642-phpapp02 (1)
Chapter19 multimedia-091006115642-phpapp02 (1)
 
Networking basics Tutorial 1
Networking basics Tutorial 1Networking basics Tutorial 1
Networking basics Tutorial 1
 
Chapter 10 cs
Chapter 10 csChapter 10 cs
Chapter 10 cs
 
Computer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageComputer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storage
 
Chapter 17 dccn
Chapter 17 dccnChapter 17 dccn
Chapter 17 dccn
 
Computer Fundamentals Chapter 11 pcp
Computer Fundamentals Chapter 11 pcpComputer Fundamentals Chapter 11 pcp
Computer Fundamentals Chapter 11 pcp
 
Chapter 21 c language
Chapter 21 c languageChapter 21 c language
Chapter 21 c language
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Chapter 16 bdp
Chapter 16 bdpChapter 16 bdp
Chapter 16 bdp
 
Chapter 15 asp
Chapter 15 aspChapter 15 asp
Chapter 15 asp
 

Similar to Computer fundamentals-internet p1

Computer components
Computer componentsComputer components
Computer components
Ali Zamin
 
ES 114 Topic 1.pdf
ES 114 Topic 1.pdfES 114 Topic 1.pdf
ES 114 Topic 1.pdf
jumar dimas
 
Introduction To Computing
Introduction To ComputingIntroduction To Computing
Introduction To Computing
Adeel Rasheed
 
Unit2
Unit2Unit2
Hardware software
Hardware softwareHardware software
Hardware software
Mohit Saini
 
UNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptxUNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptx
samreen82
 
Computers
ComputersComputers
Computers
Meghana Uppu
 
Lec 2 computer basics
Lec 2 computer basicsLec 2 computer basics
Lec 2 computer basics
Priyanka Dohare
 
Project
ProjectProject
Project
Pulkit Parsai
 
an overview of computer
 an overview of computer an overview of computer
an overview of computer
smartyaana
 
Understanding the Computer System.pptx
Understanding the Computer System.pptxUnderstanding the Computer System.pptx
Understanding the Computer System.pptx
Raymond Guillermo
 
The computer system
The computer systemThe computer system
The computer system
Vidya Kalaivani Rajkumar
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERthanathip
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
Dr.Florence Dayana
 
computer introduction b.pptx
computer introduction b.pptxcomputer introduction b.pptx
computer introduction b.pptx
AMITYWEBSOLUTIONS1
 
Reportmajor ppt2003 (hardware)
Reportmajor ppt2003 (hardware)Reportmajor ppt2003 (hardware)
Reportmajor ppt2003 (hardware)lealynn
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
christeena francis
 
Introduction to computer according to veta curicullum
Introduction to computer according to veta curicullumIntroduction to computer according to veta curicullum
Introduction to computer according to veta curicullum
Steven Alphonce
 
PALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptxPALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptx
AMITYWEBSOLUTIONS1
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
MuhammedTalha7
 

Similar to Computer fundamentals-internet p1 (20)

Computer components
Computer componentsComputer components
Computer components
 
ES 114 Topic 1.pdf
ES 114 Topic 1.pdfES 114 Topic 1.pdf
ES 114 Topic 1.pdf
 
Introduction To Computing
Introduction To ComputingIntroduction To Computing
Introduction To Computing
 
Unit2
Unit2Unit2
Unit2
 
Hardware software
Hardware softwareHardware software
Hardware software
 
UNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptxUNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptx
 
Computers
ComputersComputers
Computers
 
Lec 2 computer basics
Lec 2 computer basicsLec 2 computer basics
Lec 2 computer basics
 
Project
ProjectProject
Project
 
an overview of computer
 an overview of computer an overview of computer
an overview of computer
 
Understanding the Computer System.pptx
Understanding the Computer System.pptxUnderstanding the Computer System.pptx
Understanding the Computer System.pptx
 
The computer system
The computer systemThe computer system
The computer system
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTER
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
computer introduction b.pptx
computer introduction b.pptxcomputer introduction b.pptx
computer introduction b.pptx
 
Reportmajor ppt2003 (hardware)
Reportmajor ppt2003 (hardware)Reportmajor ppt2003 (hardware)
Reportmajor ppt2003 (hardware)
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to computer according to veta curicullum
Introduction to computer according to veta curicullumIntroduction to computer according to veta curicullum
Introduction to computer according to veta curicullum
 
PALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptxPALAMPUR POWER POINT FILE SONU.pptx
PALAMPUR POWER POINT FILE SONU.pptx
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 

More from Leo Mark Villar

Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
Leo Mark Villar
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
Leo Mark Villar
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
Leo Mark Villar
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
Leo Mark Villar
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
Leo Mark Villar
 
Web programming
Web programmingWeb programming
Web programming
Leo Mark Villar
 
Html
HtmlHtml
Team foundation server
Team foundation serverTeam foundation server
Team foundation server
Leo Mark Villar
 
Microsoft office 2013
Microsoft office 2013Microsoft office 2013
Microsoft office 2013
Leo Mark Villar
 
Sql performance tuning
Sql performance tuningSql performance tuning
Sql performance tuning
Leo Mark Villar
 
Angular js
Angular jsAngular js
Angular js
Leo Mark Villar
 

More from Leo Mark Villar (11)

Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
 
Web programming
Web programmingWeb programming
Web programming
 
Html
HtmlHtml
Html
 
Team foundation server
Team foundation serverTeam foundation server
Team foundation server
 
Microsoft office 2013
Microsoft office 2013Microsoft office 2013
Microsoft office 2013
 
Sql performance tuning
Sql performance tuningSql performance tuning
Sql performance tuning
 
Angular js
Angular jsAngular js
Angular js
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Computer fundamentals-internet p1

  • 2. Computer  machine that performs tasks, such as mathematical calculations or electronic communication, under the control of a set of instructions called a program.  is an electronic device used to process data
  • 3. Limitation of Computer  A computer cannot generate information on its own. It must be told what-to-do when to start, stop, compute and make the next move. Computer is basically subject to human control.  A computer can detect but generally cannot correct on its own in an accurate entry. It cannot correct wrong instructions. It does not have the “common sense” to correct the incorrect data or instructions but it can inform you that there is an error.  Computers need periodic maintenance support.  A computer is subject to occasional breakdown normally due to power failure or power fluctuations.
  • 4. Data  May be defined as the knowledge contained in the human brain and in all electronic and written records.  Definite knowledge acquired or supplied about something or somebody  The collected facts and data about a particular subject
  • 5. Information  information output by a sensing device or organ that includes both useful and irrelevant or redundant information and must be processed to be meaningful.  often in the form of facts or figures obtained from experiments or surveys, used as a basis for making calculations or drawing conclusions.
  • 7. Hardware  refers to any part of the computer you can touch.  Hardware consists of interconnected electronic devices that you can use to control the computer’s operation, input, and output.  refers to the physical equipment of a computer information system.
  • 8. Hardware  Processor  Memory  Storage Device  Input and output Device
  • 9. Processor  The procedure that transforms raw data into useful information is called processing.  To perform this transformation, the computer use two components: the processor and memory.  The processor is like the brain of the computer, the part that organizes and carries out instructions that come from either the user or the software.
  • 10. Memory  is the computers electronic scratch pad.  Programs are loaded into and run from memory.  Data used by the program is also loaded into memory for fast access.
  • 11. Storage Device  Magnetic storage devices  Optical storage devices  Flash memory devices  Online and Cloud
  • 12. Magnetic Storage Devices Today, magnetic storage is one of the most common types of storage used with computers and is the technology that many computer hard drives use.  Floppy diskette  Hard drive  Magnetic strip  SuperDisk  Tape cassette  Zip diskette
  • 13. Optical Storage Devices Another common storage is optical storage, which uses lasers and lights as its method of reading and writing data.  Blu-Ray disc  CD-ROM disc  CD-R and CD-RW disc  DVD-R, DVD+R, DVD-RW, and DVD+RW disc
  • 14. Flash Memory Devices Flash memory has started to replace magnetic media as it becomes cheaper as it is the more efficient and reliable solution.  Jump drive or flash drive  Memory card  Memory stick  SSD
  • 15. Online and Cloud Storing data online and in cloud storage is becoming popular as people need to access their data from more than one device.  Cloud storage  Network media
  • 16. Input Devices  Primary Input Devices:  Keyboard  Mouse  Other Input Devices:  Pens  Touch Screen  Barcode Readers  Image Scanners and Optical Character Recognition (OCR)
  • 17. Keyboard  The keyboard is the primary input device for entering text and numbers.  It is a relatively simple device, consisting of about 100 keys, each of which sends a different character code to the CPU.  It was one of the first peripherals to be used with PC’s, and it is still the most common; you will find a keyboard either built into or attached to every PC.
  • 18. Mouse  Mouse is device used to control on-screen cursor for such actions as “pressing” on-screen buttons in dialog boxes, choosing menu items, and selecting ranges of cells in spreadsheets or groups of words in a document.
  • 19. Pens  Pens based system use an electronic pen as their primary input device.  You hold the pen in your hand and write on a special pad or directly on the screen.
  • 20. Touch Screen  Touch screen allows the user to point directly at the computer display, usually to select from a menu of choices on the screen
  • 21. Barcode Reader  Barcode Readers are the most widely used input device after the keyboard and mouse.  The most common type of barcode reader is the flatbed model, which is commonly found in supermarkets and department stores.
  • 22. Image Scanner  Image Scanner convert any image into electronic form by shining light onto the image and sensing the intensity of the reflection at every point.
  • 24. Monitor  in computer science, device connected to a computer that displays information on a screen.  Modern computer monitors can display a wide variety of information, including text, icons (pictures representing commands), photographs, computer rendered graphics, video, and animation.
  • 25. Types of Monitor  Cathode Ray Tube (CRT)  Flat-Panel Display
  • 26. Cathode Ray Tube (CRT)  an electron tube, or evacuated glass container, having at one end a cathode, or negative electrode, and a device called an electron gun that projects a beam of electrons against a luminescent screen at the opposite end of the tube.
  • 27. Flat – Panel Display  There are several types of flat – panel monitors, but the most common is the Liquid Crystal Display (LCD) monitor.
  • 28. Printers  A computer peripheral that puts text or a computer-generated image on paper or on another medium.
  • 29. Ink-Jet Printers  A computer-controlled array of ink nozzles can produce images on a moving sheet or a web of paper.  Simple ink-jet printers are used routinely to print variable information such as the expiration dates on food packages or address labels on direct mail pieces, and are sometimes installed on the end of a conventional printing press.
  • 30. Laser Printers  are more expensive than ink – jet printers, their print quality is higher, and most are faster.  An electrophotographic printer that is based on the technology used by photocopiers.  A focused laser beam and a rotating mirror are used to draw an image of the desired page on a photosensitive drum.
  • 31. Dot Matrix Printer  uses a print head that moves back-and-forth, or in an up-and-down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter
  • 32. Software  The programs that help people accomplish specific tasks are referred to as application software.  Application software has been written to do almost every task imaginable.  Thousands of applications are available; however, some major categories you are likely to encounter are:  Word processing software  Spreadsheet  Database management software  Graphics, multimedia, and presentation applications  Entertainment and education software  Utilities  Communication software