SlideShare a Scribd company logo
UMITT TRAINING
COMPUTERS & DEVICES - Information & Communication Technology
Information and Communications Technology (ICT) includes all technologies (hardware,
software & networking) used to process and communicate information.
The following are typical uses of ICT:
1. Internet Services including e-commerce, e-banking and e-government.
o E-commerce - Computer networks are gradually replacing our shopping habits. Nowadays
more and more people are buying and selling goods/services through Internet. This online
trading is often referred to as electronic commerce or e-commerce. Online buyers use credit
cards to purchase goods/services.
o E-banking – Nowadays many banks enable their customers to perform electronic banking
transactions through Internet. Users do not need to go to the bank to transfer funds, pay
bills, view and check their bank accounts etc.
o E-government – Nowadays many government departments offer services to the community
through the use of ICTs. Everyday many people seek information about services offered by
government departments. They also make Internet payments for various services such as
examinations fees, car licences, income tax payments, etc.
COMPUTERS & DEVICES - Information & Communication Technology (contd.)
2. Mobile Technology – In recent years there has been a gradual increase in
the use of laptops, netbooks, tablets and smartphones. These devices, in
particular the tablets and smartphones are easy to carry around. All devices
are able to connect to Internet without any wires. We say that these devices
can connect to wireless networks. Nowadays many households and public
places have wireless Internet connections. Also, in recent years many people
have
smartphones that can connect to Internet provided by mobile
telecommunication companies.
3. Office productivity applications – Typically home and office computers
have the following programs:
o Word processing programs (e.g. MS Word, Writer) – used to prepare text-
based documents such as letters, memos, reports etc.
o Spreadsheet programs (e.g. MS Excel, Calc) – used to analyse and
summarise numerical data. Spreadsheets are commonly used in accounting
environments to prepare balance sheets and financial reports.
o Presentation graphics programs (e.g. MS PowerPoint, Impress) – used to
organise text and numeric data in an appropriate format to be displayed to
COMPUTERS & DEVICES - Information & Communication Technology (contd.)
Hardware refers to the physical components of a computer system i.e. those components which
you can actually touch like: System unit; Keyboard; Disks; Modem; Speakers; Web camera
Main Types of Computers
Desktop/Tower computers are designed for home or office use. These computers are used to run
application programs such as: word processing, spreadsheets, databases, presentation software etc.
Desktop systems have units that are placed on a desk. Tower systems have units that can either be
placed on or underneath the desk.
Laptops – are lightweight portable computers with a built-in (thin screen) monitor, keyboard, hard
battery, and power supply adapter. Laptops can easily be transported and conveniently used in
libraries, temporary offices and at meetings. Laptops typically cost more than desktop computers
with the same capabilities.
Tablets – are small portable computers that use a touchscreen as their primary input device. Most
tablets are slightly smaller and weigh less than the average laptop. Early tablet touchscreens were
designed to work with light pens. Most modern tablets support human touch input. Tablets are
generally seen as accessories to laptops and desktop computers rather than replacements.
COMPUTERS & DEVICES - Information & Communication Technology (contd.)
The Processor
Every computer (or electronic device) has a processor inside it. The processor also
known as the Central Processing Unit (CPU) is the ‘brain’ of the computer. It
determines the speed at which program instructions are carried out by the computer.
The speed of the CPU is measured in GIGAHERTZ (GHz). 1GHz is equal to equal to 1
billion cycles per second. The higher the GHz the faster the computer will execute
program instructions.
The Random Access Memory (RAM) is made up of small memory chips that form a
memory module. These modules are installed in the RAM slots on the motherboard of
your computer. Computer programs are stored in a disk which is referred to as the
hard disk. Typically hard disks are located inside the computer. a word processor, you
instruct the computer to load this program. In a matter of seconds the computer reads
the program from the disk and starts loading (copying) it into the RAM. The more RAM
your computer has, the more data can be loaded from the hard drive into the RAM,
which can effectively speed up your computer.
Since the internal memory (RAM) is temporary, and therefore information has to be
stored on permanent media (hard drives) referred to as secondary or backing storage.
Storage devices and media include: internal hard disks, external hard disks, network
drives, CDs, DVDs, Blu-Ray Discs, USB flash drives, memory cards and online file
COMPUTERS & DEVICES - Information & Communication Technology (contd.)
Software
You might have the fastest computer sitting on your desk in front of you, however, without software the computer will
do nothing more than take up space. The computer hardware on its own has no intelligence and therefore must be
supplied with instructions to perform any task.
Software or programs, consist of step-by-step instructions that tell the computer how to perform a task. All software
can be divided into two categories: operating system software and application software.
Operating System (OS) software is a program that controls the computer and enables it to run applications software
(discussed further down). Systems software allows the computer to manage its internal resources. This software is
designed to allow the computer system to manage its own resources (disks, monitor, keyboard, and printer). This
software runs the basic computer operations - it tells the hardware what to do and how, and when to do it. Applications
software cannot run without system software.
Applications software are programs that help the user carry out specific tasks on the computer. Such software has been
written for a specific application - such as word-processors, spreadsheets, databases and presentation software.
Application software falls into two categories:
1. Tailor-made (or custom-written) software – is software designed for a particular customer. Typically individual
computer programmers or software houses are contracted to develop computerised systems for companies and
organisations.
2. Off-the-Shelf (or packaged) software – is software designed for use by the general public. Typically off-the-shelf
software is available from all software selling shops. Large software houses develop this software.
THANK YOU

More Related Content

Similar to Computers and Internet.pptx

Lecture-02 - Introduction to computer.pptx
Lecture-02 - Introduction to computer.pptxLecture-02 - Introduction to computer.pptx
Lecture-02 - Introduction to computer.pptx
Md. Sakhawat Hossain
 
Computer in nursing
Computer in nursingComputer in nursing
Computer in nursing
Manthan Kapadiya
 
UNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptxUNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptx
samreen82
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
mahmood saqy
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
Huggermugger Eran
 
What is computer 1
What is computer 1What is computer 1
What is computer 1
Shuja Qais
 
CSO lecture 1.pptx
CSO lecture 1.pptxCSO lecture 1.pptx
CSO lecture 1.pptx
julitapelovello
 
Introduction To Computing
Introduction To ComputingIntroduction To Computing
Introduction To Computing
Adeel Rasheed
 
Topic -Anatomy of Computer.pptx
Topic -Anatomy  of Computer.pptxTopic -Anatomy  of Computer.pptx
Topic -Anatomy of Computer.pptx
PragatiKachhi1
 
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTREBASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
jatin batra
 
Computers
ComputersComputers
Computers
Meghana Uppu
 
Computer System
Computer SystemComputer System
Computer System
hajjaz
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
meharikiros2
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
SayeedAsghar
 
information tecnology
information tecnologyinformation tecnology
information tecnology
RezaSony
 
Performing computer operation PCO.pptx
Performing computer operation PCO.pptxPerforming computer operation PCO.pptx
Performing computer operation PCO.pptx
Rhayz Rhayz
 
Application of computer
Application of computerApplication of computer
Application of computer
A. S. M. Shafi
 
Computer application
Computer applicationComputer application
Computer application
HilalFadlallah
 
Intro to computer
Intro to computerIntro to computer
Intro to computer
Surkhab Shelly
 
Microsoft Office & Hardware of Computer By Rimon Rayhan
Microsoft Office    & Hardware of Computer By Rimon RayhanMicrosoft Office    & Hardware of Computer By Rimon Rayhan
Microsoft Office & Hardware of Computer By Rimon Rayhan
BUBT-Bangladesh University of Business and Tecnology
 

Similar to Computers and Internet.pptx (20)

Lecture-02 - Introduction to computer.pptx
Lecture-02 - Introduction to computer.pptxLecture-02 - Introduction to computer.pptx
Lecture-02 - Introduction to computer.pptx
 
Computer in nursing
Computer in nursingComputer in nursing
Computer in nursing
 
UNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptxUNIT1IT SKILLS.pptx
UNIT1IT SKILLS.pptx
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
What is computer 1
What is computer 1What is computer 1
What is computer 1
 
CSO lecture 1.pptx
CSO lecture 1.pptxCSO lecture 1.pptx
CSO lecture 1.pptx
 
Introduction To Computing
Introduction To ComputingIntroduction To Computing
Introduction To Computing
 
Topic -Anatomy of Computer.pptx
Topic -Anatomy  of Computer.pptxTopic -Anatomy  of Computer.pptx
Topic -Anatomy of Computer.pptx
 
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTREBASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
 
Computers
ComputersComputers
Computers
 
Computer System
Computer SystemComputer System
Computer System
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
information tecnology
information tecnologyinformation tecnology
information tecnology
 
Performing computer operation PCO.pptx
Performing computer operation PCO.pptxPerforming computer operation PCO.pptx
Performing computer operation PCO.pptx
 
Application of computer
Application of computerApplication of computer
Application of computer
 
Computer application
Computer applicationComputer application
Computer application
 
Intro to computer
Intro to computerIntro to computer
Intro to computer
 
Microsoft Office & Hardware of Computer By Rimon Rayhan
Microsoft Office    & Hardware of Computer By Rimon RayhanMicrosoft Office    & Hardware of Computer By Rimon Rayhan
Microsoft Office & Hardware of Computer By Rimon Rayhan
 

More from JustusEkeneNwaka

Public Speaking.pptx
Public Speaking.pptxPublic Speaking.pptx
Public Speaking.pptx
JustusEkeneNwaka
 
1st term quiz competition.pptx
1st term quiz competition.pptx1st term quiz competition.pptx
1st term quiz competition.pptx
JustusEkeneNwaka
 
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptxKWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
JustusEkeneNwaka
 
TIPS TO SUCCEEDING IN CBT.pptx
TIPS TO SUCCEEDING IN CBT.pptxTIPS TO SUCCEEDING IN CBT.pptx
TIPS TO SUCCEEDING IN CBT.pptx
JustusEkeneNwaka
 
Public Speaking.pptx
Public Speaking.pptxPublic Speaking.pptx
Public Speaking.pptx
JustusEkeneNwaka
 
MATHS QUIZZ.pptx
MATHS QUIZZ.pptxMATHS QUIZZ.pptx
MATHS QUIZZ.pptx
JustusEkeneNwaka
 
Science Day 2022.pptx
Science Day 2022.pptxScience Day 2022.pptx
Science Day 2022.pptx
JustusEkeneNwaka
 
Appropriate use of verbs.pptx
Appropriate use of verbs.pptxAppropriate use of verbs.pptx
Appropriate use of verbs.pptx
JustusEkeneNwaka
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
JustusEkeneNwaka
 
Presentation111122222.pptx
Presentation111122222.pptxPresentation111122222.pptx
Presentation111122222.pptx
JustusEkeneNwaka
 
2022 kwara SAFEGUARDING FOR TEACHERS.pptx
2022 kwara SAFEGUARDING FOR TEACHERS.pptx2022 kwara SAFEGUARDING FOR TEACHERS.pptx
2022 kwara SAFEGUARDING FOR TEACHERS.pptx
JustusEkeneNwaka
 
WORD LESSON (1).pptx
WORD LESSON (1).pptxWORD LESSON (1).pptx
WORD LESSON (1).pptx
JustusEkeneNwaka
 

More from JustusEkeneNwaka (12)

Public Speaking.pptx
Public Speaking.pptxPublic Speaking.pptx
Public Speaking.pptx
 
1st term quiz competition.pptx
1st term quiz competition.pptx1st term quiz competition.pptx
1st term quiz competition.pptx
 
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptxKWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
KWARA CHILD SAFEGUARDING PRESENTATION TO - Copy - Copy - Copy.pptx
 
TIPS TO SUCCEEDING IN CBT.pptx
TIPS TO SUCCEEDING IN CBT.pptxTIPS TO SUCCEEDING IN CBT.pptx
TIPS TO SUCCEEDING IN CBT.pptx
 
Public Speaking.pptx
Public Speaking.pptxPublic Speaking.pptx
Public Speaking.pptx
 
MATHS QUIZZ.pptx
MATHS QUIZZ.pptxMATHS QUIZZ.pptx
MATHS QUIZZ.pptx
 
Science Day 2022.pptx
Science Day 2022.pptxScience Day 2022.pptx
Science Day 2022.pptx
 
Appropriate use of verbs.pptx
Appropriate use of verbs.pptxAppropriate use of verbs.pptx
Appropriate use of verbs.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation111122222.pptx
Presentation111122222.pptxPresentation111122222.pptx
Presentation111122222.pptx
 
2022 kwara SAFEGUARDING FOR TEACHERS.pptx
2022 kwara SAFEGUARDING FOR TEACHERS.pptx2022 kwara SAFEGUARDING FOR TEACHERS.pptx
2022 kwara SAFEGUARDING FOR TEACHERS.pptx
 
WORD LESSON (1).pptx
WORD LESSON (1).pptxWORD LESSON (1).pptx
WORD LESSON (1).pptx
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Computers and Internet.pptx

  • 2. COMPUTERS & DEVICES - Information & Communication Technology Information and Communications Technology (ICT) includes all technologies (hardware, software & networking) used to process and communicate information. The following are typical uses of ICT: 1. Internet Services including e-commerce, e-banking and e-government. o E-commerce - Computer networks are gradually replacing our shopping habits. Nowadays more and more people are buying and selling goods/services through Internet. This online trading is often referred to as electronic commerce or e-commerce. Online buyers use credit cards to purchase goods/services. o E-banking – Nowadays many banks enable their customers to perform electronic banking transactions through Internet. Users do not need to go to the bank to transfer funds, pay bills, view and check their bank accounts etc. o E-government – Nowadays many government departments offer services to the community through the use of ICTs. Everyday many people seek information about services offered by government departments. They also make Internet payments for various services such as examinations fees, car licences, income tax payments, etc.
  • 3. COMPUTERS & DEVICES - Information & Communication Technology (contd.) 2. Mobile Technology – In recent years there has been a gradual increase in the use of laptops, netbooks, tablets and smartphones. These devices, in particular the tablets and smartphones are easy to carry around. All devices are able to connect to Internet without any wires. We say that these devices can connect to wireless networks. Nowadays many households and public places have wireless Internet connections. Also, in recent years many people have smartphones that can connect to Internet provided by mobile telecommunication companies. 3. Office productivity applications – Typically home and office computers have the following programs: o Word processing programs (e.g. MS Word, Writer) – used to prepare text- based documents such as letters, memos, reports etc. o Spreadsheet programs (e.g. MS Excel, Calc) – used to analyse and summarise numerical data. Spreadsheets are commonly used in accounting environments to prepare balance sheets and financial reports. o Presentation graphics programs (e.g. MS PowerPoint, Impress) – used to organise text and numeric data in an appropriate format to be displayed to
  • 4. COMPUTERS & DEVICES - Information & Communication Technology (contd.) Hardware refers to the physical components of a computer system i.e. those components which you can actually touch like: System unit; Keyboard; Disks; Modem; Speakers; Web camera Main Types of Computers Desktop/Tower computers are designed for home or office use. These computers are used to run application programs such as: word processing, spreadsheets, databases, presentation software etc. Desktop systems have units that are placed on a desk. Tower systems have units that can either be placed on or underneath the desk. Laptops – are lightweight portable computers with a built-in (thin screen) monitor, keyboard, hard battery, and power supply adapter. Laptops can easily be transported and conveniently used in libraries, temporary offices and at meetings. Laptops typically cost more than desktop computers with the same capabilities. Tablets – are small portable computers that use a touchscreen as their primary input device. Most tablets are slightly smaller and weigh less than the average laptop. Early tablet touchscreens were designed to work with light pens. Most modern tablets support human touch input. Tablets are generally seen as accessories to laptops and desktop computers rather than replacements.
  • 5. COMPUTERS & DEVICES - Information & Communication Technology (contd.) The Processor Every computer (or electronic device) has a processor inside it. The processor also known as the Central Processing Unit (CPU) is the ‘brain’ of the computer. It determines the speed at which program instructions are carried out by the computer. The speed of the CPU is measured in GIGAHERTZ (GHz). 1GHz is equal to equal to 1 billion cycles per second. The higher the GHz the faster the computer will execute program instructions. The Random Access Memory (RAM) is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer. Computer programs are stored in a disk which is referred to as the hard disk. Typically hard disks are located inside the computer. a word processor, you instruct the computer to load this program. In a matter of seconds the computer reads the program from the disk and starts loading (copying) it into the RAM. The more RAM your computer has, the more data can be loaded from the hard drive into the RAM, which can effectively speed up your computer. Since the internal memory (RAM) is temporary, and therefore information has to be stored on permanent media (hard drives) referred to as secondary or backing storage. Storage devices and media include: internal hard disks, external hard disks, network drives, CDs, DVDs, Blu-Ray Discs, USB flash drives, memory cards and online file
  • 6. COMPUTERS & DEVICES - Information & Communication Technology (contd.) Software You might have the fastest computer sitting on your desk in front of you, however, without software the computer will do nothing more than take up space. The computer hardware on its own has no intelligence and therefore must be supplied with instructions to perform any task. Software or programs, consist of step-by-step instructions that tell the computer how to perform a task. All software can be divided into two categories: operating system software and application software. Operating System (OS) software is a program that controls the computer and enables it to run applications software (discussed further down). Systems software allows the computer to manage its internal resources. This software is designed to allow the computer system to manage its own resources (disks, monitor, keyboard, and printer). This software runs the basic computer operations - it tells the hardware what to do and how, and when to do it. Applications software cannot run without system software. Applications software are programs that help the user carry out specific tasks on the computer. Such software has been written for a specific application - such as word-processors, spreadsheets, databases and presentation software. Application software falls into two categories: 1. Tailor-made (or custom-written) software – is software designed for a particular customer. Typically individual computer programmers or software houses are contracted to develop computerised systems for companies and organisations. 2. Off-the-Shelf (or packaged) software – is software designed for use by the general public. Typically off-the-shelf software is available from all software selling shops. Large software houses develop this software.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.