SlideShare a Scribd company logo
Computers and its details
•What is a computer
•Types of computers
•Components of a computer system
05/31/13 06:19 Information and Communications Technology 2
What is A Computer
 A computer is a general purpose device
which can be programmed to carry out a
finite set of arithmetic or logical
operations. Since a sequence of
operations can be readily changed, the
computer can solve more than one kind
of problem.
05/31/13 06:19 Information and Communications Technology 3
What is A Computer
 They use digital circuits and are
designed to operate on two states,
namely bits 0 and 1. They are
analogous to states ON and OFF. Data
on these computers is represented as a
series of 0s and 1s.
05/31/13 06:19 Information and Communications Technology 4
Types of Computers
Computers can be generally classified by
size and power as follows, though there is
considerable overlap:
1.Personal computer: A small, single-user
computer based on a microprocessor.
Examples are: Laptop, iPad, iPhone,
Desktop
05/31/13 06:19 Information and Communications Technology 5
Types of Computers
2. Workstation: A powerful, single-user
computer. A workstation is like a
personal computer, but it has a more
powerful microprocessor and, in
general, a higher-quality monitor.
05/31/13 06:19 Information and Communications Technology 6
Types of Computers
3. Minicomputer: A multi-user computer
capable of supporting up to hundreds of
users simultaneously.
4. Mainframe: A powerful multi-user
computer capable of supporting many
hundreds or thousands of users
simultaneously.
05/31/13 06:19 Information and Communications Technology 7
Types of Computers
5. Supercomputer: An extremely fast
computer that can perform hundreds of
millions of instructions per second.
05/31/13 06:19 Information and Communications Technology 8
Types of PCs
 Desktops: A desktop is intended to be
used on a single location. The spare
parts of a desktop computer are readily
available at relatively lower costs. Power
consumption is not as critical as that in
laptops. Desktops are widely popular for
daily use in the workplace and
households.
05/31/13 06:19 Information and Communications Technology 9
Types of PCs
 Laptops: Similar in operation to
desktops, laptop computers are
miniaturized and optimized for mobile
use. Laptops run on a single battery or
an external adapter that charges the
computer batteries.
05/31/13 06:19 Information and Communications Technology 10
Types of PCs
 Laptops are enabled with a built-in
keyboard, touch pad acting as a mouse
and a liquid crystal display. Their
portability and capacity to operate on
battery power have proven to be of great
help to mobile users.
05/31/13 06:19 Information and Communications Technology 11
Types of PCs
 Netbooks: They fall in the category of
laptops, but are inexpensive and
relatively smaller in size. They had a
smaller feature set and lesser capacities
in comparison to regular laptops, at the
time they came into the market.
05/31/13 06:19 Information and Communications Technology 12
Types of PCs
 Personal Digital Assistants (PDAs): It is
a handheld computer and popularly
known as a palmtop. It has a touch
screen and a memory card for storage
of data. PDAs can also be used as
portable audio players, web browsers
and smartphones.
05/31/13 06:19 Information and Communications Technology 13
Types of PCs
 Most of them can access the Internet by
means of Bluetooth or Wi-Fi
communication.
05/31/13 06:19 Information and Communications Technology 14
Types of PCs
 Wearable Computers: A record-setting
step in the evolution of computers was
the creation of wearable computers.
These computers can be worn on the
body and are often used in the study of
behavior modeling and human health.
05/31/13 06:19 Information and Communications Technology 15
Types of PCs
 Wearable computers do not have to be
turned on and off and remain in
operation without user intervention.
05/31/13 06:19 Information and Communications Technology 16
Types of PCs
 Tablet Computers: Tablets are mobile
computers that are very handy to use.
They use the touch screen technology.
Tablets come with an onscreen
keyboard or use a stylus or a digital pen.
Apple's iPad redefined the class of
tablet computers.
05/31/13 06:19 Information and Communications Technology 17
Types of PCs
 Tower computers: The term refers to a
computer in which the power supply,
motherboard, and mass storage devices
are stacked on top of each other in a
cabinet. This is in contrast to desktop
models, in which these components are
housed in a more compact box.
05/31/13 06:19 Information and Communications Technology 18
Types of PCs
 The main advantage of tower models is
that there are fewer space constraints,
which makes installation of additional
storage devices easier.
05/31/13 06:19 Information and Communications Technology 19
•Hardware
•Software
•Peopleware
05/31/13 06:19 Information and Communications Technology 20
Hardware
 Personal computer hardware are the
component devices that are the building
blocks of personal computers. These
are typically installed into a computer
case, or attached to it by a cable or
through a port. In the latter case, they
are also referred to as peripherals.
05/31/13 06:19 Information and Communications Technology 21
Hardware
05/31/13 06:19 Information and Communications Technology 22
1. Monitor
2. Motherboard
3. CPU
4. RAM
5. Expansion
Cards
6. Power Supply
7. Optical Disk Drive
8. Hard Disk Drive
9. Keyboard
10. Mouse
Input vs. Output
 Input is the term denoting either an
entrance or changes which are inserted
into a system and which activate/modify
a process. Example, a trackpad sensing
a finger.
 Output is the term denoting either an
exit or changes which exit a system and
which activate/modify a process.
Example, a screen displaying a photo
05/31/13 06:19 Information and Communications Technology 23
Software
 Computer software, or just software, is a
collection of computer programs and
related data that provides the
instructions for telling a computer what
to do and how to do it. Software refers
to one or more computer programs and
data held in the storage of the computer.
05/31/13 06:19 Information and Communications Technology 24
Software
 In other words, software is a set
of programs, procedures, algorithms and
its documentation concerned with the
operation of a data processing system.
05/31/13 06:19 Information and Communications Technology 25
Software
 When software is stored in hardware
that cannot easily be modified (such as
BIOS ROM in an IBM PC compatible), it
is sometimes called "firmware" to
indicate that it falls into an uncertain
area somewhere between hardware and
software.
05/31/13 06:19 Information and Communications Technology 26
Operating System vs.
Application Software
 System software is computer
software designed to operate
the computer hardware to provide basic
functionality and to provide a platform
for running application software.
05/31/13 06:19 Information and Communications Technology 27
Operating System vs.
Application Software
 System software includes device
drivers, operating
systems, servers, utilities, and window
systems.
05/31/13 06:19 Information and Communications Technology 28
Operating System vs.
Application Software
 Application Software is a set of
programs that allows the computer to
perform a specific data processing job
for the user. It is a broad category, and
encompasses software of many kinds,
including the internet browser being
used to display a page.
05/31/13 06:19 Information and Communications Technology 29
List of Operating Systems
Operating Systems
Unix and BSD UNIX System V, IBM
AIX, HP-
UX, Solaris (SunOS), IRIX
, (too much to list all BSD
OSs)
GNU/Linux (too much to be listed)
Microsoft Windows
Windows 95, Windows
98, Windows
NT, Windows
2000, Windows
Me, Windows
XP, Windows
Vista, Windows 7,
Windows 8
DOS 86-DOS (QDOS), PC-
DOS, MS-DOS, DR-
DOS, FreeDOS
05/31/13 06:19 Information and Communications Technology 30
List of Operating Systems
OS
Mac OS Mac OS classic, Mac
OS X
Embedded and real-
time
(too much to be listed)
Experimental Amoeba, Oberon/Blue
bottle, Plan 9 from Bell
Labs
05/31/13 06:19 Information and Communications Technology 31
Picture of Windows 8
05/31/13 06:19 Information and Communications Technology 32
Picture of Mac OS X
05/31/13 06:19 Information and Communications Technology 33
Peopleware
 Peopleware is a term used to refer to
one of the three core aspects of
computer technology, the other two
being hardware and software.
05/31/13 06:19 Information and Communications Technology 34
Peopleware
 Peopleware can refer to anything that
has to do with the role of people in the
development or use of computer
software and hardware systems,
including such issues as developer
productivity, teamwork, group dynamics,
the psychology of programming, project
management, organizational factors
05/31/13 06:19 Information and Communications Technology 35
Peopleware
 human interface design, and human-
machine-interaction. Example, a
programmer
05/31/13 06:19 Information and Communications Technology 36
• Binary code (Base 2)
• Decimal code (Base 10)
• Conversion (Dec. – Binary and vice versa)
• Hexadecimal code (Base 16)
05/31/13 06:19 Information and Communications Technology 37
Binary Code
 A binary code is a way of representing
text or computer processor instructions
by the use of the binary number
system's two-binary digits 0 and 1. This
is accomplished by assigning a bit string
to each particular symbol or instruction.
05/31/13 06:19 Information and Communications Technology 38
Binary Code
 For example, a binary string of eight
binary digits (bits) can represent any of
256 possible values and can therefore
correspond to a variety of different
symbols, letters or instructions.
05/31/13 06:19 Information and Communications Technology 39
Binary Code
 Those methods may be fixed-width or
variable-width. In a fixed-width binary
code, each letter, digit, or other
character, is represented by a bit string
of the same length; that bit string,
interpreted as a binary number, is
usually displayed in code tables in octal,
decimal or hexadecimal notation.
05/31/13 06:19 Information and Communications Technology 40
• ASCII
• Binary-coded Decimal
05/31/13 06:19 Information and Communications Technology 41
ASCII Code
 The American Standard Code
Information Interchange, or ASCII, uses
a 7 bit binary code to represent text
within a computer, communications
equipment, and other devices that use
text. Each letter or symbol is assigned to
a number from 0 to 127.
05/31/13 06:19 Information and Communications Technology 42
ASCII Code
 For example, in the 8-bit ASCII code, a
lowercase "a" is represented by the bit
string 01100001.
05/31/13 06:19 Information and Communications Technology 43
Binary-coded Decimal
 Binary-coded decimal, or BCD, is a
binary encoded representation of integer
values that uses a 4-bit nibble to encode
decimal digits.
05/31/13 06:19 Information and Communications Technology 44
Binary-coded Decimal
 Four binary bits can encode up to 16
distinct values; but, in BCD-encoded
numbers, only the first ten values in
each nibble are legal, and encode the
decimal digits zero, through nine.
05/31/13 06:19 Information and Communications Technology 45
Binary-coded Decimal
 The remaining six values are illegal, and
may cause either a machine exception
or unspecified behavior, depending on
the computer implementation of BCD
arithmetic.
05/31/13 06:19 Information and Communications Technology 46
Decimal Code
 The decimal numeral system (also
called base ten or occasionally denary)
has ten as its base. It is the numerical
base most widely used by modern
civilizations.
05/31/13 06:19 Information and Communications Technology 47
Conversion of Binary to
Decimal
Positional notation method
1.For this example, let's convert the binary
number 110112 to decimal. List the powers
of two from right to left. Start at 20
,
evaluating it as "1". Increment the
exponent by one for each power.
05/31/13 06:19 Information and Communications Technology 48
Conversion of Binary to
Decimal
1. (cont.) Stop when the amount of
elements in the list is equal to the
amount of digits in the binary number.
The example number, 10011011, has
eight digits, so the list, to eight
elements, would look like this: 128, 64,
32, 16, 8, 4, 2, 1
2. Write first the binary number below the
list.
05/31/13 06:19 Information and Communications Technology 49
Conversion of Binary to
Decimal
3. Draw lines, starting from the right,
connecting each consecutive digit of
the binary number to the power of two
that is next in the list above it. Begin by
drawing a line from the first digit of the
binary number to the first power of two
in the list above it.
05/31/13 06:19 Information and Communications Technology 50
Conversion of Binary to
Decimal
3. (cont.)Then, draw a line from the
second digit of the binary number to the
second power of two in the list.
Continue connecting each digit with its
corresponding power of two.
05/31/13 06:19 Information and Communications Technology 51
Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 52
Conversion of Binary to
Decimal
4. Move through each digit of the binary
number. If the digit is a 1, write its
corresponding power of two below the
line, under the digit. If the digit is a 0,
write a 0 below the line, under the digit.
05/31/13 06:19 Information and Communications Technology 53
Conversion of Binary to
Decimal
5. Add the numbers written below the line.
The sum should be 155. This is the
decimal equivalent of the binary
number 10011011. Or, written with
base subscripts:15510
05/31/13 06:19 Information and Communications Technology 54
Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 55
Conversion of Binary to
Decimal
Doubling Method
1.This method does not use powers. As
such, it is simpler for converting large
numbers in your head because you only
need to keep track of a subtotal.
2.Start with the left-most digit of the given
binary number.
05/31/13 06:19 Information and Communications Technology 56
Conversion of Binary to
Decimal
2. (cont.) For each digit as you move to
the right, double your previous total and
add the current digit. For example, to
convert 10110012 to decimal, we take
the following steps:
3. 1011001 → 0 x 2 + 1 = 1
4. 1011001 → 1 x 2 + 0 = 2
5. 1011001 → 2 x 2 + 1 = 5
6. 1011001 → 5 x 2 + 1 = 11
05/31/13 06:19 Information and Communications Technology 57
Conversion of Binary to
Decimal
7. 1011001 → 11 x 2 + 0 = 22
8. 1011001 → 22 x 2 + 0 = 44
9. 1011001 → 44 x 2 + 1 = 8910
10. Like the positional notation method, this
method can be modified to convert from
any base to decimal. Doubling is used
because the given number is of base 2.
05/31/13 06:19 Information and Communications Technology 58
Conversion of Binary to
Decimal
10. (cont.)If the given number is of a
different base, replace the 2 in the
method with the base of the given
number. For example, if the given
number is in base 37, you would
replace the *2 with *37. The final result
will always be in decimal (base 10).
05/31/13 06:19 Information and Communications Technology 59
Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 60
Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 61
Comparison with descending powers of
two and subtraction
1.List the powers of two in a "base 2 table"
from right to left. Start at 20, evaluating it
as "1". Increment the exponent by one for
each power. The list, to ten elements,
would look like this: 512, 256, 128, 64, 32,
16, 8, 4, 2, 1
Conversion of Decimal to
Binary
2. For this example, let's convert the
decimal number 15610 to binary. What is
the greatest power of two that will fit
into 156? Since 128 fits, write a 1 for
the leftmost binary digit, and subtract
128 from your decimal number, 156.
You now have 28.
05/31/13 06:19 Information and Communications Technology 62
Conversion of Decimal to
Binary
3. Move to the next lower power of two.
Can 64 fit into 28? No, so write a 0 for
the next binary digit to the right.
4. Can 32 fit into 28? No, so write a 0.
5. Can 16 fit into 28? Yes, so write a 1,
and subtract 16 from 28. You now have
12.
05/31/13 06:19 Information and Communications Technology 63
Conversion of Decimal to
Binary
6. Can 8 fit into 12? Yes, so write a 1, and
subtract 8 from 12. You now have 4.
7. Can 4 (power of two) fit into 4 (working
decimal)? Yes, so write a 1, and
subtract 4 from 4. You have 0.
8. Can 2 fit into 0? No, so write a 0.
9. Can 1 fit into 0? No, so write a 0.
05/31/13 06:19 Information and Communications Technology 64
Conversion of Decimal to
Binary
10. Since there are no more powers of two
in the list, you are done. You should
have 10011100. This is the binary
equivalent of the decimal number 156.
Or, written with base subscripts: 15610 =
100111002
05/31/13 06:19 Information and Communications Technology 65
Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 66
Conversion of Decimal to
Binary
Short division by two with remainder
1.For this example, let's convert the
decimal number 15610 to binary. Write the
decimal number as the dividend inside an
upside-down "long division" symbol.
05/31/13 06:19 Information and Communications Technology 67
Conversion of Decimal to
Binary
1. (cont.)Write the base of the destination
system (in our case, "2" for binary) as
the divisor outside the curve of the
division symbol.
2. Write the integer answer (quotient)
under the long division symbol, and
write the remainder (0 or 1) to the right
of the dividend.
05/31/13 06:19 Information and Communications Technology 68
Conversion of Decimal to
Binary
3. Continue downwards, dividing each
new quotient by two and writing the
remainders to the right of each
dividend. Stop when the quotient is 0.
4. Starting with the bottom remainder,
read the sequence of remainders
upwards to the top. You should have
10011100.
05/31/13 06:19 Information and Communications Technology 69
Conversion of Decimal to
Binary
4. (cont.)This is the binary equivalent of
the decimal number 156. Or, written
with base subscripts: 15610 = 100111002.
This method can be modified to convert
from decimal to any base.
05/31/13 06:19 Information and Communications Technology 70
Conversion of Decimal to
Binary
4. (cont.) The divisor is 2 because the
desired destination is base 2. If the
desired destination is a different base,
replace the 2 in the method with the
desired base. For example, if the
desired destination is base 9, replace
the 2 with 9. The final result will then be
in the desired base.
05/31/13 06:19 Information and Communications Technology 71
Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 72
Hexadecimal Code (optional)
 Hexadecimal (also base 16, or hex) is a
positional numeral system with a radix,
or base, of 16. It uses sixteen distinct
symbols, most often the symbols 0–9 to
represent values zero to nine, and A,B,   
C,D,E,F (or alternatively a–f) to     
represent values ten to fifteen.
05/31/13 06:19 Information and Communications Technology 73
Hexadecimal Code (optional)
 For example, the hexadecimal number
2AF3 is equal, in decimal, to (2×163) +   
(10×162) + (15×161) + (3×160), or           
10995.
05/31/13 06:19 Information and Communications Technology 74
Hexadecimal Code (optional)
 Each hexadecimal digit represents four
binary digits (bits), and the primary use
of hexadecimal notation is a human-
friendly representation of binary-coded
values in computing and digital
electronics.
05/31/13 06:19 Information and Communications Technology 75
Hexadecimal Code (optional)
 One hexadecimal digit represents a
nibble, which is half of an octet (8 bits).
For example, byte values can range
from 0 to 255 (decimal), but may be
more conveniently represented as two
hexadecimal digits in the range 00 to
FF.
05/31/13 06:19 Information and Communications Technology 76
Hexadecimal Code (optional)
 Hexadecimal is also commonly used to
represent computer memory addresses.
05/31/13 06:19 Information and Communications Technology 77
• Flowchart
• Algorithm
05/31/13 06:19 Information and Communications Technology 78
Flowchart
 A flowchart is a type of diagram that
represents an algorithm or process,
showing the steps as boxes of various
kinds, and their order by connecting
these with arrows. This diagrammatic
representation can give a step-by-step
solution to a given problem.
05/31/13 06:19 Information and Communications Technology 79
Flowchart
 Process operations are represented in
these boxes, and arrows connecting
them represent flow of control. Data
flows are not typically represented in a
flowchart, in contrast with data flow
diagrams; rather, they are implied by the
sequencing of operations.
05/31/13 06:19 Information and Communications Technology 80
Flowchart
 Flowcharts are used in analyzing,
designing, documenting or managing a
process or program in various fields.
05/31/13 06:19 Information and Communications Technology 81
Examples of Flowchart
05/31/13 06:19 Information and Communications Technology 82
Algorithm
 In mathematics and computer science,
an algorithm is a step-by-step procedure
for calculations. Algorithms are used
for calculation, data processing,
and automated reasoning.
05/31/13 06:19 Information and Communications Technology 83
Algorithm
 More precisely, an algorithm is
an effective method expressed as
a finite list of well-defined instructions for
calculating a function.
05/31/13 06:19 Information and Communications Technology 84
Algorithm
 Starting from an initial state and initial
input (perhaps empty), the instructions
describe a computation that,
when executed, will proceed through a
finite number of well-defined successive
states, eventually producing
“output” and terminating at a final ending
state.
05/31/13 06:19 Information and Communications Technology 85
Algorithm
 The transition from one state to the next
is not necessarily deterministic; some
algorithms, known as randomized
algorithms, incorporate random input.
05/31/13 06:19 Information and Communications Technology 86
05/31/13 06:19 Information and Communications Technology 87
References
 http://en.wikipedia.org/wiki/Computer#S
oftware
 http://en.wikipedia.org/wiki/Software#Sy
stem_software
 http://en.wikipedia.org/wiki/Personal_co
mputer_hardware
 http://en.wikipedia.org/wiki/Peopleware
 http://en.wikipedia.org/wiki/Input
05/31/13 06:19 Information and Communications Technology 88
References
 http://en.wikipedia.org/wiki/Output
 http://www.cs.cmu.edu/~fgandon/lecture
/uk1999/computers_types/
 http://www.buzzle.com/articles/different-
types-of-computers.html
 http://en.wikipedia.org/wiki/Decimal#Non
-uniqueness_of_decimal_representation
 http://en.wikipedia.org/wiki/Binary_code
05/31/13 06:19 Information and Communications Technology 89
References
 http://en.wikipedia.org/wiki/Hexadecimal
 http://www.wikihow.com/Convert-from-
Binary-to-Decimal
 http://www.wikihow.com/Convert-from-
Decimal-to-Binary
 http://en.wikipedia.org/wiki/Flowchart
 http://en.wikipedia.org/wiki/Algorithm
05/31/13 06:19 Information and Communications Technology 90
References
 http://img.ibtimes.com/www/data/images
/full/2012/02/16/234130-mac-os-x-
mountain-lion-new-features.jpg
05/31/13 06:19 Information and Communications Technology 91

More Related Content

What's hot

Ecoonomics 2nd sem computer application project.docx
Ecoonomics 2nd sem   computer application project.docxEcoonomics 2nd sem   computer application project.docx
Ecoonomics 2nd sem computer application project.docx
Gorav Gopal Singh
 
History of Management Information System
History of Management Information SystemHistory of Management Information System
History of Management Information System
Emil Mesina
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
AndreaTugwell
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
Mohamed Thawuship
 
Management information system
Management information systemManagement information system
Management information system
RS P
 
CH003
CH003CH003
CH003
JUC
 
History of computer
History of computerHistory of computer
History of computer
MNButt
 
MIS MCQs by hassan samoon
MIS MCQs by hassan samoonMIS MCQs by hassan samoon
MIS MCQs by hassan samoon
Hassan Samoon
 
Lec1chap1f04
Lec1chap1f04Lec1chap1f04
Lec1chap1f04
screaminc
 
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...
MIS Lecture Tribhuvan University Lecture |   Managing the Digital Firm Book b...MIS Lecture Tribhuvan University Lecture |   Managing the Digital Firm Book b...
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...
Ram Sharma
 
Module1 computer evolution
Module1 computer evolutionModule1 computer evolution
Module1 computer evolution
Shaharizan Hassan
 
Information system
Information systemInformation system
Information system
John Pros Valencia
 
Nature and Development of Information systems
Nature and Development of Information systemsNature and Development of Information systems
Nature and Development of Information systems
John Pros Valencia
 
Computer presentation subeesh and abin
Computer presentation subeesh and abinComputer presentation subeesh and abin
Computer presentation subeesh and abin
Subeesh S Nair
 
Ch01
Ch01Ch01

What's hot (15)

Ecoonomics 2nd sem computer application project.docx
Ecoonomics 2nd sem   computer application project.docxEcoonomics 2nd sem   computer application project.docx
Ecoonomics 2nd sem computer application project.docx
 
History of Management Information System
History of Management Information SystemHistory of Management Information System
History of Management Information System
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Management information system
Management information systemManagement information system
Management information system
 
CH003
CH003CH003
CH003
 
History of computer
History of computerHistory of computer
History of computer
 
MIS MCQs by hassan samoon
MIS MCQs by hassan samoonMIS MCQs by hassan samoon
MIS MCQs by hassan samoon
 
Lec1chap1f04
Lec1chap1f04Lec1chap1f04
Lec1chap1f04
 
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...
MIS Lecture Tribhuvan University Lecture |   Managing the Digital Firm Book b...MIS Lecture Tribhuvan University Lecture |   Managing the Digital Firm Book b...
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...
 
Module1 computer evolution
Module1 computer evolutionModule1 computer evolution
Module1 computer evolution
 
Information system
Information systemInformation system
Information system
 
Nature and Development of Information systems
Nature and Development of Information systemsNature and Development of Information systems
Nature and Development of Information systems
 
Computer presentation subeesh and abin
Computer presentation subeesh and abinComputer presentation subeesh and abin
Computer presentation subeesh and abin
 
Ch01
Ch01Ch01
Ch01
 

Viewers also liked

Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
Rashid Yahye
 
30 task 14.21
30   task 14.2130   task 14.21
30 task 14.21
Haa'Meem Mohiyuddin
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
Shreyas Patil
 
A quick guide on how to work with Maven and Git
A quick guide on how to work with Maven and GitA quick guide on how to work with Maven and Git
A quick guide on how to work with Maven and Git
Noam Zakai
 
ICT for SEND
ICT for SENDICT for SEND
ICT for SEND
helen caldwell
 
The re-association of sound and images in cinema
The re-association of sound and images in cinemaThe re-association of sound and images in cinema
The re-association of sound and images in cinema
elena.pasquinelli
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
Rob Jewitt
 
Sounds and images
Sounds and imagesSounds and images
Sounds and images
cachs_computing
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Yohan Gunathilaka
 
Proprietary software and types of licenses
Proprietary software and types of licensesProprietary software and types of licenses
Proprietary software and types of licenses
Wilson Gabriel Sanchez
 
A&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information SystemA&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information System
vinay arora
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
Junaid Qadir
 
Local area network
Local area networkLocal area network
Local area network
Ayushi Gagneja
 
Stage 1 Analysis (System Life Cycle)
Stage 1 Analysis (System Life Cycle)Stage 1 Analysis (System Life Cycle)
Stage 1 Analysis (System Life Cycle)
Haa'Meem Mohiyuddin
 
Projekt forandringer
Projekt forandringerProjekt forandringer
Projekt forandringerBenjaminP33
 
Private Branch Exchange
Private Branch ExchangePrivate Branch Exchange
Private Branch Exchange
Ibrahimcommunication Al Ani
 
Avaya lync integration 6 16
Avaya lync integration 6 16Avaya lync integration 6 16
Avaya lync integration 6 16
Chris Stegh
 
Free and Open Source Software, Licenses, Technologies, Scientific Publication...
Free and Open Source Software, Licenses, Technologies, Scientific Publication...Free and Open Source Software, Licenses, Technologies, Scientific Publication...
Free and Open Source Software, Licenses, Technologies, Scientific Publication...
Frederik Questier
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
Diana Oommachan
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Joel Briza
 

Viewers also liked (20)

Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 
30 task 14.21
30   task 14.2130   task 14.21
30 task 14.21
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
A quick guide on how to work with Maven and Git
A quick guide on how to work with Maven and GitA quick guide on how to work with Maven and Git
A quick guide on how to work with Maven and Git
 
ICT for SEND
ICT for SENDICT for SEND
ICT for SEND
 
The re-association of sound and images in cinema
The re-association of sound and images in cinemaThe re-association of sound and images in cinema
The re-association of sound and images in cinema
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Sounds and images
Sounds and imagesSounds and images
Sounds and images
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Proprietary software and types of licenses
Proprietary software and types of licensesProprietary software and types of licenses
Proprietary software and types of licenses
 
A&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information SystemA&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information System
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Local area network
Local area networkLocal area network
Local area network
 
Stage 1 Analysis (System Life Cycle)
Stage 1 Analysis (System Life Cycle)Stage 1 Analysis (System Life Cycle)
Stage 1 Analysis (System Life Cycle)
 
Projekt forandringer
Projekt forandringerProjekt forandringer
Projekt forandringer
 
Private Branch Exchange
Private Branch ExchangePrivate Branch Exchange
Private Branch Exchange
 
Avaya lync integration 6 16
Avaya lync integration 6 16Avaya lync integration 6 16
Avaya lync integration 6 16
 
Free and Open Source Software, Licenses, Technologies, Scientific Publication...
Free and Open Source Software, Licenses, Technologies, Scientific Publication...Free and Open Source Software, Licenses, Technologies, Scientific Publication...
Free and Open Source Software, Licenses, Technologies, Scientific Publication...
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Similar to Information and Communications Technology

INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
Luis R Castellanos
 
Fundamentals of computing
Fundamentals of computingFundamentals of computing
Fundamentals of computing
John Ombasa
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
Niraj Choudhary
 
Computer basic theory
Computer basic theoryComputer basic theory
Computer basic theory
Niraj Choudhary
 
BASIC KNOWLEDGE OF COMPUTER
BASIC KNOWLEDGE OF COMPUTERBASIC KNOWLEDGE OF COMPUTER
BASIC KNOWLEDGE OF COMPUTER
Niraj Choudhary
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
HaftomYitbarek
 
Itc notes
Itc notesItc notes
Itc notes
ali Israr
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)
Techglyphs
 
Chapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptxChapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptx
gadisaAdamu
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
Tirth Rami
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
mahmood saqy
 
information tecnology
information tecnologyinformation tecnology
information tecnology
RezaSony
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
Isha Joshi
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
umardanjumamaiwada
 
lecture 2
lecture 2 lecture 2
lecture 2
umardanjumamaiwada
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
umardanjumamaiwada
 
What is a computer
What is a computerWhat is a computer
What is a computer
Ofun Emma
 
Advanced Computer Architecture
Advanced Computer ArchitectureAdvanced Computer Architecture
Advanced Computer Architecture
Todd Turner
 
COMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptxCOMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptx
LivistWeldoneWanjala
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University
Mahatma Gandhi University
 

Similar to Information and Communications Technology (20)

INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
Fundamentals of computing
Fundamentals of computingFundamentals of computing
Fundamentals of computing
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
Computer basic theory
Computer basic theoryComputer basic theory
Computer basic theory
 
BASIC KNOWLEDGE OF COMPUTER
BASIC KNOWLEDGE OF COMPUTERBASIC KNOWLEDGE OF COMPUTER
BASIC KNOWLEDGE OF COMPUTER
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
 
Itc notes
Itc notesItc notes
Itc notes
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)
 
Chapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptxChapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptx
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
information tecnology
information tecnologyinformation tecnology
information tecnology
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
lecture 2
lecture 2 lecture 2
lecture 2
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Advanced Computer Architecture
Advanced Computer ArchitectureAdvanced Computer Architecture
Advanced Computer Architecture
 
COMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptxCOMPUTER-FORM-1-NOTES-min.pptx
COMPUTER-FORM-1-NOTES-min.pptx
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

Information and Communications Technology

  • 2. •What is a computer •Types of computers •Components of a computer system 05/31/13 06:19 Information and Communications Technology 2
  • 3. What is A Computer  A computer is a general purpose device which can be programmed to carry out a finite set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. 05/31/13 06:19 Information and Communications Technology 3
  • 4. What is A Computer  They use digital circuits and are designed to operate on two states, namely bits 0 and 1. They are analogous to states ON and OFF. Data on these computers is represented as a series of 0s and 1s. 05/31/13 06:19 Information and Communications Technology 4
  • 5. Types of Computers Computers can be generally classified by size and power as follows, though there is considerable overlap: 1.Personal computer: A small, single-user computer based on a microprocessor. Examples are: Laptop, iPad, iPhone, Desktop 05/31/13 06:19 Information and Communications Technology 5
  • 6. Types of Computers 2. Workstation: A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and, in general, a higher-quality monitor. 05/31/13 06:19 Information and Communications Technology 6
  • 7. Types of Computers 3. Minicomputer: A multi-user computer capable of supporting up to hundreds of users simultaneously. 4. Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously. 05/31/13 06:19 Information and Communications Technology 7
  • 8. Types of Computers 5. Supercomputer: An extremely fast computer that can perform hundreds of millions of instructions per second. 05/31/13 06:19 Information and Communications Technology 8
  • 9. Types of PCs  Desktops: A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relatively lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in the workplace and households. 05/31/13 06:19 Information and Communications Technology 9
  • 10. Types of PCs  Laptops: Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries. 05/31/13 06:19 Information and Communications Technology 10
  • 11. Types of PCs  Laptops are enabled with a built-in keyboard, touch pad acting as a mouse and a liquid crystal display. Their portability and capacity to operate on battery power have proven to be of great help to mobile users. 05/31/13 06:19 Information and Communications Technology 11
  • 12. Types of PCs  Netbooks: They fall in the category of laptops, but are inexpensive and relatively smaller in size. They had a smaller feature set and lesser capacities in comparison to regular laptops, at the time they came into the market. 05/31/13 06:19 Information and Communications Technology 12
  • 13. Types of PCs  Personal Digital Assistants (PDAs): It is a handheld computer and popularly known as a palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be used as portable audio players, web browsers and smartphones. 05/31/13 06:19 Information and Communications Technology 13
  • 14. Types of PCs  Most of them can access the Internet by means of Bluetooth or Wi-Fi communication. 05/31/13 06:19 Information and Communications Technology 14
  • 15. Types of PCs  Wearable Computers: A record-setting step in the evolution of computers was the creation of wearable computers. These computers can be worn on the body and are often used in the study of behavior modeling and human health. 05/31/13 06:19 Information and Communications Technology 15
  • 16. Types of PCs  Wearable computers do not have to be turned on and off and remain in operation without user intervention. 05/31/13 06:19 Information and Communications Technology 16
  • 17. Types of PCs  Tablet Computers: Tablets are mobile computers that are very handy to use. They use the touch screen technology. Tablets come with an onscreen keyboard or use a stylus or a digital pen. Apple's iPad redefined the class of tablet computers. 05/31/13 06:19 Information and Communications Technology 17
  • 18. Types of PCs  Tower computers: The term refers to a computer in which the power supply, motherboard, and mass storage devices are stacked on top of each other in a cabinet. This is in contrast to desktop models, in which these components are housed in a more compact box. 05/31/13 06:19 Information and Communications Technology 18
  • 19. Types of PCs  The main advantage of tower models is that there are fewer space constraints, which makes installation of additional storage devices easier. 05/31/13 06:19 Information and Communications Technology 19
  • 21. Hardware  Personal computer hardware are the component devices that are the building blocks of personal computers. These are typically installed into a computer case, or attached to it by a cable or through a port. In the latter case, they are also referred to as peripherals. 05/31/13 06:19 Information and Communications Technology 21
  • 22. Hardware 05/31/13 06:19 Information and Communications Technology 22 1. Monitor 2. Motherboard 3. CPU 4. RAM 5. Expansion Cards 6. Power Supply 7. Optical Disk Drive 8. Hard Disk Drive 9. Keyboard 10. Mouse
  • 23. Input vs. Output  Input is the term denoting either an entrance or changes which are inserted into a system and which activate/modify a process. Example, a trackpad sensing a finger.  Output is the term denoting either an exit or changes which exit a system and which activate/modify a process. Example, a screen displaying a photo 05/31/13 06:19 Information and Communications Technology 23
  • 24. Software  Computer software, or just software, is a collection of computer programs and related data that provides the instructions for telling a computer what to do and how to do it. Software refers to one or more computer programs and data held in the storage of the computer. 05/31/13 06:19 Information and Communications Technology 24
  • 25. Software  In other words, software is a set of programs, procedures, algorithms and its documentation concerned with the operation of a data processing system. 05/31/13 06:19 Information and Communications Technology 25
  • 26. Software  When software is stored in hardware that cannot easily be modified (such as BIOS ROM in an IBM PC compatible), it is sometimes called "firmware" to indicate that it falls into an uncertain area somewhere between hardware and software. 05/31/13 06:19 Information and Communications Technology 26
  • 27. Operating System vs. Application Software  System software is computer software designed to operate the computer hardware to provide basic functionality and to provide a platform for running application software. 05/31/13 06:19 Information and Communications Technology 27
  • 28. Operating System vs. Application Software  System software includes device drivers, operating systems, servers, utilities, and window systems. 05/31/13 06:19 Information and Communications Technology 28
  • 29. Operating System vs. Application Software  Application Software is a set of programs that allows the computer to perform a specific data processing job for the user. It is a broad category, and encompasses software of many kinds, including the internet browser being used to display a page. 05/31/13 06:19 Information and Communications Technology 29
  • 30. List of Operating Systems Operating Systems Unix and BSD UNIX System V, IBM AIX, HP- UX, Solaris (SunOS), IRIX , (too much to list all BSD OSs) GNU/Linux (too much to be listed) Microsoft Windows Windows 95, Windows 98, Windows NT, Windows 2000, Windows Me, Windows XP, Windows Vista, Windows 7, Windows 8 DOS 86-DOS (QDOS), PC- DOS, MS-DOS, DR- DOS, FreeDOS 05/31/13 06:19 Information and Communications Technology 30
  • 31. List of Operating Systems OS Mac OS Mac OS classic, Mac OS X Embedded and real- time (too much to be listed) Experimental Amoeba, Oberon/Blue bottle, Plan 9 from Bell Labs 05/31/13 06:19 Information and Communications Technology 31
  • 32. Picture of Windows 8 05/31/13 06:19 Information and Communications Technology 32
  • 33. Picture of Mac OS X 05/31/13 06:19 Information and Communications Technology 33
  • 34. Peopleware  Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software. 05/31/13 06:19 Information and Communications Technology 34
  • 35. Peopleware  Peopleware can refer to anything that has to do with the role of people in the development or use of computer software and hardware systems, including such issues as developer productivity, teamwork, group dynamics, the psychology of programming, project management, organizational factors 05/31/13 06:19 Information and Communications Technology 35
  • 36. Peopleware  human interface design, and human- machine-interaction. Example, a programmer 05/31/13 06:19 Information and Communications Technology 36
  • 37. • Binary code (Base 2) • Decimal code (Base 10) • Conversion (Dec. – Binary and vice versa) • Hexadecimal code (Base 16) 05/31/13 06:19 Information and Communications Technology 37
  • 38. Binary Code  A binary code is a way of representing text or computer processor instructions by the use of the binary number system's two-binary digits 0 and 1. This is accomplished by assigning a bit string to each particular symbol or instruction. 05/31/13 06:19 Information and Communications Technology 38
  • 39. Binary Code  For example, a binary string of eight binary digits (bits) can represent any of 256 possible values and can therefore correspond to a variety of different symbols, letters or instructions. 05/31/13 06:19 Information and Communications Technology 39
  • 40. Binary Code  Those methods may be fixed-width or variable-width. In a fixed-width binary code, each letter, digit, or other character, is represented by a bit string of the same length; that bit string, interpreted as a binary number, is usually displayed in code tables in octal, decimal or hexadecimal notation. 05/31/13 06:19 Information and Communications Technology 40
  • 41. • ASCII • Binary-coded Decimal 05/31/13 06:19 Information and Communications Technology 41
  • 42. ASCII Code  The American Standard Code Information Interchange, or ASCII, uses a 7 bit binary code to represent text within a computer, communications equipment, and other devices that use text. Each letter or symbol is assigned to a number from 0 to 127. 05/31/13 06:19 Information and Communications Technology 42
  • 43. ASCII Code  For example, in the 8-bit ASCII code, a lowercase "a" is represented by the bit string 01100001. 05/31/13 06:19 Information and Communications Technology 43
  • 44. Binary-coded Decimal  Binary-coded decimal, or BCD, is a binary encoded representation of integer values that uses a 4-bit nibble to encode decimal digits. 05/31/13 06:19 Information and Communications Technology 44
  • 45. Binary-coded Decimal  Four binary bits can encode up to 16 distinct values; but, in BCD-encoded numbers, only the first ten values in each nibble are legal, and encode the decimal digits zero, through nine. 05/31/13 06:19 Information and Communications Technology 45
  • 46. Binary-coded Decimal  The remaining six values are illegal, and may cause either a machine exception or unspecified behavior, depending on the computer implementation of BCD arithmetic. 05/31/13 06:19 Information and Communications Technology 46
  • 47. Decimal Code  The decimal numeral system (also called base ten or occasionally denary) has ten as its base. It is the numerical base most widely used by modern civilizations. 05/31/13 06:19 Information and Communications Technology 47
  • 48. Conversion of Binary to Decimal Positional notation method 1.For this example, let's convert the binary number 110112 to decimal. List the powers of two from right to left. Start at 20 , evaluating it as "1". Increment the exponent by one for each power. 05/31/13 06:19 Information and Communications Technology 48
  • 49. Conversion of Binary to Decimal 1. (cont.) Stop when the amount of elements in the list is equal to the amount of digits in the binary number. The example number, 10011011, has eight digits, so the list, to eight elements, would look like this: 128, 64, 32, 16, 8, 4, 2, 1 2. Write first the binary number below the list. 05/31/13 06:19 Information and Communications Technology 49
  • 50. Conversion of Binary to Decimal 3. Draw lines, starting from the right, connecting each consecutive digit of the binary number to the power of two that is next in the list above it. Begin by drawing a line from the first digit of the binary number to the first power of two in the list above it. 05/31/13 06:19 Information and Communications Technology 50
  • 51. Conversion of Binary to Decimal 3. (cont.)Then, draw a line from the second digit of the binary number to the second power of two in the list. Continue connecting each digit with its corresponding power of two. 05/31/13 06:19 Information and Communications Technology 51
  • 52. Conversion of Binary to Decimal 05/31/13 06:19 Information and Communications Technology 52
  • 53. Conversion of Binary to Decimal 4. Move through each digit of the binary number. If the digit is a 1, write its corresponding power of two below the line, under the digit. If the digit is a 0, write a 0 below the line, under the digit. 05/31/13 06:19 Information and Communications Technology 53
  • 54. Conversion of Binary to Decimal 5. Add the numbers written below the line. The sum should be 155. This is the decimal equivalent of the binary number 10011011. Or, written with base subscripts:15510 05/31/13 06:19 Information and Communications Technology 54
  • 55. Conversion of Binary to Decimal 05/31/13 06:19 Information and Communications Technology 55
  • 56. Conversion of Binary to Decimal Doubling Method 1.This method does not use powers. As such, it is simpler for converting large numbers in your head because you only need to keep track of a subtotal. 2.Start with the left-most digit of the given binary number. 05/31/13 06:19 Information and Communications Technology 56
  • 57. Conversion of Binary to Decimal 2. (cont.) For each digit as you move to the right, double your previous total and add the current digit. For example, to convert 10110012 to decimal, we take the following steps: 3. 1011001 → 0 x 2 + 1 = 1 4. 1011001 → 1 x 2 + 0 = 2 5. 1011001 → 2 x 2 + 1 = 5 6. 1011001 → 5 x 2 + 1 = 11 05/31/13 06:19 Information and Communications Technology 57
  • 58. Conversion of Binary to Decimal 7. 1011001 → 11 x 2 + 0 = 22 8. 1011001 → 22 x 2 + 0 = 44 9. 1011001 → 44 x 2 + 1 = 8910 10. Like the positional notation method, this method can be modified to convert from any base to decimal. Doubling is used because the given number is of base 2. 05/31/13 06:19 Information and Communications Technology 58
  • 59. Conversion of Binary to Decimal 10. (cont.)If the given number is of a different base, replace the 2 in the method with the base of the given number. For example, if the given number is in base 37, you would replace the *2 with *37. The final result will always be in decimal (base 10). 05/31/13 06:19 Information and Communications Technology 59
  • 60. Conversion of Binary to Decimal 05/31/13 06:19 Information and Communications Technology 60
  • 61. Conversion of Decimal to Binary 05/31/13 06:19 Information and Communications Technology 61 Comparison with descending powers of two and subtraction 1.List the powers of two in a "base 2 table" from right to left. Start at 20, evaluating it as "1". Increment the exponent by one for each power. The list, to ten elements, would look like this: 512, 256, 128, 64, 32, 16, 8, 4, 2, 1
  • 62. Conversion of Decimal to Binary 2. For this example, let's convert the decimal number 15610 to binary. What is the greatest power of two that will fit into 156? Since 128 fits, write a 1 for the leftmost binary digit, and subtract 128 from your decimal number, 156. You now have 28. 05/31/13 06:19 Information and Communications Technology 62
  • 63. Conversion of Decimal to Binary 3. Move to the next lower power of two. Can 64 fit into 28? No, so write a 0 for the next binary digit to the right. 4. Can 32 fit into 28? No, so write a 0. 5. Can 16 fit into 28? Yes, so write a 1, and subtract 16 from 28. You now have 12. 05/31/13 06:19 Information and Communications Technology 63
  • 64. Conversion of Decimal to Binary 6. Can 8 fit into 12? Yes, so write a 1, and subtract 8 from 12. You now have 4. 7. Can 4 (power of two) fit into 4 (working decimal)? Yes, so write a 1, and subtract 4 from 4. You have 0. 8. Can 2 fit into 0? No, so write a 0. 9. Can 1 fit into 0? No, so write a 0. 05/31/13 06:19 Information and Communications Technology 64
  • 65. Conversion of Decimal to Binary 10. Since there are no more powers of two in the list, you are done. You should have 10011100. This is the binary equivalent of the decimal number 156. Or, written with base subscripts: 15610 = 100111002 05/31/13 06:19 Information and Communications Technology 65
  • 66. Conversion of Decimal to Binary 05/31/13 06:19 Information and Communications Technology 66
  • 67. Conversion of Decimal to Binary Short division by two with remainder 1.For this example, let's convert the decimal number 15610 to binary. Write the decimal number as the dividend inside an upside-down "long division" symbol. 05/31/13 06:19 Information and Communications Technology 67
  • 68. Conversion of Decimal to Binary 1. (cont.)Write the base of the destination system (in our case, "2" for binary) as the divisor outside the curve of the division symbol. 2. Write the integer answer (quotient) under the long division symbol, and write the remainder (0 or 1) to the right of the dividend. 05/31/13 06:19 Information and Communications Technology 68
  • 69. Conversion of Decimal to Binary 3. Continue downwards, dividing each new quotient by two and writing the remainders to the right of each dividend. Stop when the quotient is 0. 4. Starting with the bottom remainder, read the sequence of remainders upwards to the top. You should have 10011100. 05/31/13 06:19 Information and Communications Technology 69
  • 70. Conversion of Decimal to Binary 4. (cont.)This is the binary equivalent of the decimal number 156. Or, written with base subscripts: 15610 = 100111002. This method can be modified to convert from decimal to any base. 05/31/13 06:19 Information and Communications Technology 70
  • 71. Conversion of Decimal to Binary 4. (cont.) The divisor is 2 because the desired destination is base 2. If the desired destination is a different base, replace the 2 in the method with the desired base. For example, if the desired destination is base 9, replace the 2 with 9. The final result will then be in the desired base. 05/31/13 06:19 Information and Communications Technology 71
  • 72. Conversion of Decimal to Binary 05/31/13 06:19 Information and Communications Technology 72
  • 73. Hexadecimal Code (optional)  Hexadecimal (also base 16, or hex) is a positional numeral system with a radix, or base, of 16. It uses sixteen distinct symbols, most often the symbols 0–9 to represent values zero to nine, and A,B,    C,D,E,F (or alternatively a–f) to      represent values ten to fifteen. 05/31/13 06:19 Information and Communications Technology 73
  • 74. Hexadecimal Code (optional)  For example, the hexadecimal number 2AF3 is equal, in decimal, to (2×163) +    (10×162) + (15×161) + (3×160), or            10995. 05/31/13 06:19 Information and Communications Technology 74
  • 75. Hexadecimal Code (optional)  Each hexadecimal digit represents four binary digits (bits), and the primary use of hexadecimal notation is a human- friendly representation of binary-coded values in computing and digital electronics. 05/31/13 06:19 Information and Communications Technology 75
  • 76. Hexadecimal Code (optional)  One hexadecimal digit represents a nibble, which is half of an octet (8 bits). For example, byte values can range from 0 to 255 (decimal), but may be more conveniently represented as two hexadecimal digits in the range 00 to FF. 05/31/13 06:19 Information and Communications Technology 76
  • 77. Hexadecimal Code (optional)  Hexadecimal is also commonly used to represent computer memory addresses. 05/31/13 06:19 Information and Communications Technology 77
  • 78. • Flowchart • Algorithm 05/31/13 06:19 Information and Communications Technology 78
  • 79. Flowchart  A flowchart is a type of diagram that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. 05/31/13 06:19 Information and Communications Technology 79
  • 80. Flowchart  Process operations are represented in these boxes, and arrows connecting them represent flow of control. Data flows are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are implied by the sequencing of operations. 05/31/13 06:19 Information and Communications Technology 80
  • 81. Flowchart  Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields. 05/31/13 06:19 Information and Communications Technology 81
  • 82. Examples of Flowchart 05/31/13 06:19 Information and Communications Technology 82
  • 83. Algorithm  In mathematics and computer science, an algorithm is a step-by-step procedure for calculations. Algorithms are used for calculation, data processing, and automated reasoning. 05/31/13 06:19 Information and Communications Technology 83
  • 84. Algorithm  More precisely, an algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function. 05/31/13 06:19 Information and Communications Technology 84
  • 85. Algorithm  Starting from an initial state and initial input (perhaps empty), the instructions describe a computation that, when executed, will proceed through a finite number of well-defined successive states, eventually producing “output” and terminating at a final ending state. 05/31/13 06:19 Information and Communications Technology 85
  • 86. Algorithm  The transition from one state to the next is not necessarily deterministic; some algorithms, known as randomized algorithms, incorporate random input. 05/31/13 06:19 Information and Communications Technology 86
  • 87. 05/31/13 06:19 Information and Communications Technology 87
  • 88. References  http://en.wikipedia.org/wiki/Computer#S oftware  http://en.wikipedia.org/wiki/Software#Sy stem_software  http://en.wikipedia.org/wiki/Personal_co mputer_hardware  http://en.wikipedia.org/wiki/Peopleware  http://en.wikipedia.org/wiki/Input 05/31/13 06:19 Information and Communications Technology 88
  • 89. References  http://en.wikipedia.org/wiki/Output  http://www.cs.cmu.edu/~fgandon/lecture /uk1999/computers_types/  http://www.buzzle.com/articles/different- types-of-computers.html  http://en.wikipedia.org/wiki/Decimal#Non -uniqueness_of_decimal_representation  http://en.wikipedia.org/wiki/Binary_code 05/31/13 06:19 Information and Communications Technology 89
  • 90. References  http://en.wikipedia.org/wiki/Hexadecimal  http://www.wikihow.com/Convert-from- Binary-to-Decimal  http://www.wikihow.com/Convert-from- Decimal-to-Binary  http://en.wikipedia.org/wiki/Flowchart  http://en.wikipedia.org/wiki/Algorithm 05/31/13 06:19 Information and Communications Technology 90