A computer is a machine that processes data according to instructions. It can accept data as input, process the data, store the results, and output the information. The basic components of a computer are the system unit, display, and input/output devices. The system unit contains the central processing unit, memory, storage, and other internal components that work together to process data.
The parts of a computer slideshow for grades 3-4. Includes a quiz and activity. The activity is supposed to have the students act out the parts of a computer.
*ROM is READ ONLY MEMORY - I had a typo...sorry!
Basics of the Computer System.
Hi Everyone, here in this presentation you are about to get knowledge of 'What actually is a Computer System? Different types of computer, Computer Hardware, Software and a lot more with animated video..
This Video URL:
https://youtu.be/X5x5SI0rTz4
YouTube Channel URL:
https://www.youtube.com/channel/UCKVvceV1RGXLz0GeesbQnVg
Google+ Page URL:
https://plus.google.com/113458574960966683976/videos?_ga=1.91477722.157526647.1466331425
My Website Link:
http://appsdisaster.blogspot.com/
If you are interested in learning more about topics like this so Please don't forget to like, share, & Subscribe us.
Thanks
The parts of a computer slideshow for grades 3-4. Includes a quiz and activity. The activity is supposed to have the students act out the parts of a computer.
*ROM is READ ONLY MEMORY - I had a typo...sorry!
Basics of the Computer System.
Hi Everyone, here in this presentation you are about to get knowledge of 'What actually is a Computer System? Different types of computer, Computer Hardware, Software and a lot more with animated video..
This Video URL:
https://youtu.be/X5x5SI0rTz4
YouTube Channel URL:
https://www.youtube.com/channel/UCKVvceV1RGXLz0GeesbQnVg
Google+ Page URL:
https://plus.google.com/113458574960966683976/videos?_ga=1.91477722.157526647.1466331425
My Website Link:
http://appsdisaster.blogspot.com/
If you are interested in learning more about topics like this so Please don't forget to like, share, & Subscribe us.
Thanks
INTRODUCTION TO COMPUTER SYSTEMS ARCHITECTURE1_17 December 2023.pptMozammelHaque53
This is a lecture PowerPoint slide for the students of universities worldwide who desire to learn and advance his or her knowledge and expertise on Computer systems architecture.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
By Design, not by Accident - Agile Venture Bolzano 2024
cs305-170108135047.pptx
1. TOPIC
CHAPTER 1: Introduction To Computers
A computer is a machine that manipulates data
according to a list of instructions.
A computer is a device capable of performing
computations and making logical decisions at speed
millions and even billion of times faster them human
beings can.
Computer is an electronic machine which is use for
data processing. The output which comes after
processing data through computer is known as
Information.
What is Computer?
Slide 1 of 84
5. TOPIC
CHAPTER 1: Introduction To Computers
In 1946 first electronic computer ENAIC (Electronic
Numerical Integrator and Calculator ) was developed by
Mr. J.Presper Eckert and Mr. John Manuchly at
University of Pennsylvania.
It uses 18,000 vacuum tubes and its cast was $500,000.
Its weight was 30 tons and occupied a 30 by 50 foot
space.
It produced large amount of heat.
Its speed was very slow.
Slide 5 of 84
7. TOPIC
CHAPTER 1: Introduction To Computers
In this second generation vacuum tubes was
replaced by transistors.
Speed / performance of this generation computers
was improved in comparison to first generation
computers.
Size, price , and heat produced reduced by using
transistors.
Slide 7 of 84
9. TOPIC
CHAPTER 1: Introduction To Computers
In this third generation transistors was replaced by IC’s
(Integrated Circuits i.e fabrication of thousands electronic
components on single silicon chip ).
Using this drastic reduction in the size of computers.
Speed / performance was high in comparison to third
generation.
Heat produced by computers was reduced.
Slide 9 of 84
11. TOPIC
CHAPTER 1: Introduction To Computers
In this generation IC’s are replaced by LSI (Large Scale
Integrated Circuits : more number of electronic
components on silicon chip)
These are low cast, small size and high performance in
comparisons to third generation computers
Slide 11 of 84
12. TOPIC
CHAPTER 1: Introduction To Computers
In this generation LSI are replaced by VLSI (Very
Large Scale Integrated Circuits)
Size and cost of these computers is very less and
performance is very high
Slide 12 of 84
13. TOPIC
CHAPTER 1: Introduction To Computers
A computer can be divided into two main categories:
Slide 13 of 84
1. Hardware
Hardware is basically anything that you can touch
with your fingers.
2. Software
For computer hardware to work it must follow a set
of instructions that is supplied to it as software.
14. TOPIC
CHAPTER 1: Introduction To Computers
Hardware refers to the computer’s physical components,
• Computer Case
• CPU (central processing unit...Pentium chip)
• Monitor
• Keyboard & Mouse
• Disk Drive, Zip Drive, CD-ROM, DVD,
• Hard Drive
• Memory (RAM)
• Speakers
• Printer
Slide 14 of 84
15. TOPIC
CHAPTER 1: Introduction To Computers
The term software refers to the set of instructions
that directs the hardware to accomplish a task.
1. System Software
2. Application Software
3. Utility Software
Application
Software
System
Software (OS)
Hardware
Slide 15 of 84
16. TOPIC
CHAPTER 1: Introduction To Computers
1. System Software/Operating System
System Software are used to control all
components of computer and serves as an
interface between user and hardware.
Slide 16 of 84
1. Control all Components of Computer
2. Interface b/w user and Hardware
17. TOPIC
CHAPTER 1: Introduction To Computers
2. Application Software
Application software is used or design for the
specific purpose of the user.
for example
MS-WORD
MS-EXCEL
Corel Draw
Game
Slide 17 of 84
MS-POWER POINT
Acdsee
Paint
MS-ACCESS
18. TOPIC
CHAPTER 1: Introduction To Computers
3. Utility Software
Utility Software is used to remove any problem or
solve a complex situation in computer.
for example
Partition Magic
Antivirus
Security Software
Slide 18 of 84
Backup utility
Data Recovery
Win Ghost
19. TOPIC
CHAPTER 1: Introduction To Computers
Bit:
Slide 19 of 84
One digit, either 0 or 1
Byte:
any combination of 0 or 1.
also called an octet.
Bits n Bytes
21. TOPIC
CHAPTER 1: Introduction To Computers
00011001
25
10110011
179
01000001
A
The number 25 stored as 8 bits using the binary number system:
The number 179 stored as 8 bits using the binary number system:
The letter A stored as 8 bits using ASCII code:
Slide 21 of 84
= =
= =
= =
22. TOPIC
CHAPTER 1: Introduction To Computers
INPUT
PROCESSING
OUTPUT
Exam Results!
Slide 22 of 84
Information for the Exam
23. TOPIC
CHAPTER 1: Introduction To Computers
Consists of four parts where each part involves one
or more specific components of the computer.
1. Input
2. Processing
3. Output
4. Storage
Information Processing Cycle
Slide 23 of 84
25. TOPIC
CHAPTER 1: Introduction To Computers
Input
Storage
Data Information
Input: A computer receives
dP
arto
a
ce
v
sis
a
ing
an input deO
vu
ic
tp
e
utsuch
Slide 25 of 84
as the keyboard.
26. TOPIC
CHAPTER 1: Introduction To Computers
Input Processing Output
Storage
Data Information
Processing: A computer
program performs operations
Slide 26 of 84
on the data to transform it
into information.
27. TOPIC
CHAPTER 1: Introduction To Computers
Input
Data
Output: A computer produces
the output through an output
Slide 27 of 84
Pr
d
oe
ce
v
sis
c
in
e
g such as th
O
e
utm
puo
t nitor to
display the resu
In
lt
fo
o
rm
f
a
th
tio
e
n
S
ptr
o
o
ra
c
ge
essing operations.
28. TOPIC
CHAPTER 1: Introduction To Computers
Output
Storage
Data Information
Storage: A computer stores
the result of the processing
operations in a storage device
Slide 28 of 84
Input such as thP
e
roh
ce
a
sr
sd
ing
disk.
29. TOPIC
CHAPTER 1: Introduction To Computers
Input Processing Output
Storage
Adds each item
cost together
Organizes data
Computes total
due
Note book
RM 4.50 each
Eraser
RM 0.80 each
Pen
RM 1.50 each
Stapler
RM 2.20 each
Slide 29 of 84
30. TOPIC
CHAPTER 1: Introduction To Computers
So
Computer is an Electronic device which can:
1. accept data
2. process it
3. give the result after that processing
4. and also store processed data Input
Output
Processing
Storage
Slide 30 of 84
31. TOPIC
CHAPTER 1: Introduction To Computers
PC four major functions are:
Input data
Process data
Output information
Store data and information
DATA IN
INFORMATION
OUT
Slide 31 of 84
32. TOPIC
CHAPTER 1: Introduction To Computers
Data vs. Information
Data is a representation of a fact or idea
Number
Word
Picture
Sound
Information is data that has been organized or
presented in a meaningful.
Kuala Lumpur Malaysia
examples of data
3547 Ahmad
examples of information
City-Kuala Lumpur
Slide 32 of 84
Roll No. 3547 Name-Ahmad
Country-Malaysia
33. TOPIC
CHAPTER 1: Introduction To Computers
2 + 2 = 4
Data vs. Instruction
Instruction
DATA Information
Slide 33 of 84
34. TOPIC
CHAPTER 1: Introduction To Computers
A Typical Personal Computer
System unit Display device
External device
External device
Input devices
A Personal Computer:
Slide 34 of 84
35. TOPIC
CHAPTER 1: Introduction To Computers
KLMU
1 User type “KLMU”
2 Keyboard converts
characters to a binary
code; bits are transmitted
to memory and to CPU for
processing
3 All processing and storage
are done in binary form 4 Transmission to
printer is in binary
form
5 Printer converts binary code
to characters before printing
K
_LMU_
Slide 35 of 84
36. TOPIC
CHAPTER 1: Introduction To Computers
Temporary
storage
Output
Input
RAM
Floppy Disk
Hard Disk
Permanent
storage
Monitor
Speaker
Printer
Webcam
Scanner
Slide 36 of 84
37. TOPIC
CHAPTER 1: Introduction To Computers
Enter data to be processed
Slide 37 of 84
Keyboard
Scanners
Mouse
Trackball
Touch screen
Microphone
Game Controller
Digital camera
38. TOPIC
CHAPTER 1: Introduction To Computers
Cabinet that houses all components
Motherboard
CPU
Memory modules System Unit
System Unit
Slide 38 of 84
39. TOPIC
CHAPTER 1: Introduction To Computers
A processor present in system unit is the part that is
like a computer’s brain.
A system unit is a personal computer component that
houses other devices necessary for the computer to
function.
Slide 39 of 84
40. TOPIC
CHAPTER 1: Introduction To Computers
Chassis
Memory chips
Disk drives
The System Unit
Cooling device
Microprocessor
(under cooling device)
Power Supply
Ports
Adapter Card
Slide 40 of 84
41. TOPIC
CHAPTER 1: Introduction To Computers
Display Device
Slide 41 of 84
A display device is a personal computer component
that enables users to view the text and graphical data
associated with a computer program.
42. TOPIC
CHAPTER 1: Introduction To Computers
Input Devices
Slide 42 of 84
An input device is a personal computer component
that enables users to enter data or instructions into a
computer.
43. TOPIC
CHAPTER 1: Introduction To Computers
External Devices
Slide 43 of 84
There are several categories of external devices:
Microphone
Digital camera
Scanner
Speakers
Printer
Network device
External drive
44. TOPIC
CHAPTER 1: Introduction To Computers
System Unit Components
Slide 44 of 84
The system unit itself has several important sub-
components, such as:
System Board
Central Processing Unit (CPU)
Memory
System Bus
Storage devices
45. TOPIC
CHAPTER 1: Introduction To Computers
Expansion slots
AGP slot
Ports
CPU
RAM slots
Drive interfaces
The System Board
The system board is the personal computer component that
acts as the backbone for the entire computer system.
Slide 45 of 84
46. TOPIC
CHAPTER 1: Introduction To Computers
The Central Processing Unit (CPU)
Slide 46 of 84
The central processing unit (CPU), sometimes
called microprocessor or just processor, is the real
brains of the computer and is where most of the
calculations take place.
47. TOPIC
CHAPTER 1: Introduction To Computers
Memory
Slide 47 of 84
Memory is the personal computer component that
comprises the electronic storage areas in the
computer. It can be considered either volatile or
non-volatile.
48. TOPIC
CHAPTER 1: Introduction To Computers
Hard Drive
Controller
Video
Controller
Memory
System Bus
CPU
The System Bus
Slide 48 of 84
The system bus is the main communication path
between the CPU and memory.
49. TOPIC
CHAPTER 1: Introduction To Computers
Storage Devices
Slide 49 of 84
A storage device is a system unit component, such
as a hard drive, that enables users to save data for
reuse at a later time, even after the personal
computer is shut down and restarted.
50. TOPIC
CHAPTER 1: Introduction To Computers
Internal view
External view
Wires from the power supply
to the system board and drives
Fan
Voltage switch
Socket for power cord
Power switch
Power Supplies
Slide 50 of 84
A power supply is an internal computer component that
converts AC power from an electrical outlet to the DC
power needed by system components.
51. TOPIC
CHAPTER 1: Introduction To Computers
Cooling Systems
Fan
Heat sink
Slide 51 of 84
Computer systems contain several components that
require cooling:
The computer case
The CPU
The power supply
Some adapter cards
Some hard disk drives
52. TOPIC
CHAPTER 1: Introduction To Computers
PCI bus
Circuitry
Adapter Cards
An adapter card is a printed circuit board that you install
into a slot on the computer’s system board to expand
the functionality of the computer.
Phone line
connection
Circuit to
connect to
phone line
Slide 52 of 84
53. TOPIC
CHAPTER 1: Introduction To Computers
Riser Cards
REAR
FRONT
Slide 53 of 84
Memory slots
PCI/ISA slots on riser
Peripheral
connectors
CPU
A riser card is a board that plugs in to the system
board and provides additional slots for adapter
cards..
54. TOPIC
CHAPTER 1: Introduction To Computers
Storage Devices
The various types of storage devices used in personal
computers are:
Floppy Disk Drives (FDD)
Hard Disk Drives (HDD)
Optical Drives
Tape Drives
Solid State Storage devices
Slide 54 of 84
55. TOPIC
CHAPTER 1: Introduction To Computers
Front view 3.5-inch floppy disk drive
3.5-inch floppy disk
Rear view of floppy disk drive
Data cable
Power cable
Slide 55 of 84
Floppy Disk Drives (FDD)
FDD is a personal computer storage device that reads
data from, and writes data to, removable disks made of
flexible Mylar plastic covered with a magnetic coating
and enclosed in a stiff, protective, plastic case.
56. TOPIC
CHAPTER 1: Introduction To Computers
Hard Disk Drives (HDD)
Slide 56 of 84
HDD is a personal computer storage device that uses
fixed media, which means that the disk is built into the
drive and the drives are not removed from the computer
unless you are performing an upgrade or a repair.
57. TOPIC
CHAPTER 1: Introduction To Computers
An internal CD-ROM drive
An external DVD drive
A CD-R disc
Slide 57 of 84
Optical Disks
An optical disk is a personal computer storage device
that stores data optically, rather than magnetically.
58. TOPIC
CHAPTER 1: Introduction To Computers
Types of Optical Disks and Drives
Optical disks and drives come in several types, such as:
CD-ROM
CD-R
CD-RW
DVD-ROM
DVD-R
DVD+R
DVD+R DL
DVD-RW
DVD+RW
DVD-RAM
Slide 58 of 84
59. TOPIC
CHAPTER 1: Introduction To Computers
Tape Drives
Slide 59 of 84
A tape drive is a personal computer storage device that
stores data magnetically on a removable tape that is
enclosed in a tape cartridge.
60. TOPIC
CHAPTER 1: Introduction To Computers
Compact Flash
card fits in here
43mm
36mm
USB adapter connects the
Compact Flash reader to
the computer
Solid
Slide 60 of 84
Solid state storage is a personal computer storage
device that stores data in special types of memory
instead of on disks or tape.
61. TOPIC
CHAPTER 1: Introduction To Computers
Personal Computer Connection Methods
Slide 61 of 84
The various PC connection methods are:
Ports
Personal Computer Connections
Serial Connections
Parallel Connections
Universal Serial Bus (USB) Connections
IEEE 1394 and FireWire Connections
Small Computer Systems Interface (SCSI) Connections
Parallel ATA (PATA) Connections
Serial ATA (SATA) Connections
62. TOPIC
CHAPTER 1: Introduction To Computers
Enable devices to be connected to a personal computer.
6-pin round
connector
25-pin D-shaped connector
15-pin D-shaped connector
Ports
A port is a hardware connection interface on a personal
computer that enables devices to be connected to the
computer.
Slide 62 of 84
63. TOPIC
CHAPTER 1: Introduction To Computers
USB Connector
Cable
Slide 63 of 84
Personal Computer Connection
A personal computer connection is a means by which
a personal computer component is attached to other
components to provide computing capabilities.
64. TOPIC
CHAPTER 1: Introduction To Computers
25-pin serial port
on a serial device
25-pin end of serial cable connects to modem
and 9-pin end connects to computer’s serial port
Serial Connections
Slide 64 of 84
A serial connection is a personal computer connection
that transfers data one bit at a time over a single wire.
65. TOPIC
CHAPTER 1: Introduction To Computers
Parallel connector
Parallel cable
Slide 65 of 84
Parallel Connections
A parallel connection is a personal computer connection
that transfers data eight bits at a time over eight wires
and is typically used to connect a printer to a system unit.
66. TOPIC
CHAPTER 1: Introduction To Computers
Type B connector
connects to USB device
Type A connector connects to
USB port on the computer
or on a hub
Slide 66 of 84
USB Connections
A USB connection is a personal computer connection
that enables you to connect multiple peripherals to a
single port with high performance and minimal device
configuration.
67. TOPIC
CHAPTER 1: Introduction To Computers
FireWire device
FireWire port
FireWire 6-pin connector
Slide 67 of 84
IEEE 1394 and FireWire Connections
A FireWire connection is a personal computer
connection that provides a high-speed interface for
peripheral devices that are designed to use the IEEE
1394 standard.
68. TOPIC
CHAPTER 1: Introduction To Computers
SCSI connector
SCSI cable
Slide 68 of 84
Small Computer Systems Interface (SCSI)
Connections
A SCSI connection is a personal computer connection
that connects internal and external components to the
system unit and provides for high-speed data transfer.
69. TOPIC
CHAPTER 1: Introduction To Computers
PATA connector
Slide 69 of 84
Parallel ATA (PATA) Connections
A PATA connection is a personal computer connection
that provides a parallel data channel from a disk
controller to the disk drives.
70. TOPIC
CHAPTER 1: Introduction To Computers
SATA data cable
SATA power cables
Serial ATA (SATA) Connections
Slide 70 of 84
A SATA connection is a personal computer connection
that provides a serial data channel between the drive
controller and the disk drives.
72. TOPIC
Personal Computer
A single-user computer that can perform all input, processing, output
and storage operations on its own.
Two types of personal computer are desktop computer and
workstation.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 72 of 84
73. TOPIC
Notebook Computer
Portable, small enough to fit on
your lap.
Also called a laptop computer.
Usually more expensive than a
desktop computer with equal
capabilities.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 73 of 84
74. TOPIC
Tablet PC
A computer that is shaped like a
slate or notebook.
Normally fitted with a touch screen
for users to enter input through a
stylus.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 74 of 84
75. TOPIC
Handheld Computer
A small computer that can easily
be fit in one hand and operated by
the other hand.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 75 of 84
76. TOPIC
Personal Digital Assistant (PDA)
A small, portable computer built for
specific purposes such as for
keeping phone directories and
calendars.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 76 of 84
77. TOPIC
Mid-Range Server
More powerful and larger that a workstation and can
support up to 4,000 users at one time.
Formerly known as minicomputer.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 77 of 84
78. TOPIC
Mainframe Computer
Very powerful, expensive computer that supports
thousands of connected users
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 78 of 84
79. TOPIC
Supercomputer
The fastest, most powerful, most
expensive computer.
Used for applications requiring complex
mathematical calculations.
CHAPTER 1: Introduction To Computers
1.5 Categories of Computer
Slide 79 of 84