SlideShare a Scribd company logo
INTERNAL
  COMPONENTS
OF A COMPUTER
         Benn Kelly
CPU
The CPU (Central processing unit) is
basically the brain of the computer,
it carry's out the instructions of a
computer program to preform the
operations of a system. The CPU is
measured in bits and the average
speed of a computer CPU is usually
3.1 Ghz and a laptop is 2.1 Ghz.
The faster the CPU the more heat
will be produced which means a
larger fan is needed.
Memory
      RAM                                      ROM
Random Access Memory,                    Read only memory,
is were data is stored                   cannot be edited.
and can be edited.




                   Flash Memory
                Flash memory can be electrically
                erased and re-programmed.
Memory
      DRAM                                SDRAM
Dynamic random-access              Synchronous DRAM is a much
memory, the difference             faster version of DRAM,
between DRAM and RAM is            running at 180MHz, depending
that DRAM stores each bit of       on your processor.
data in a different capacitor.
Memory

    EPROM                                   DRAM
Erasable Programmable Read Only   Dynamic Random Access
Memory, this is a memory chip     Memory, this stores every bit of
that contains data when the       data in many different capacitors
computer is turned off.           on the chip.
ADAPTER CARDS
     PCI                                                                 PCIe
Peripheral Component                                       Peripheral Component
Interconnect, it allows                                    Interconnect express, this is a
communication with an                                      computer expansion card.
external card.




                                       NIC

                           Network Interface Controller,
                           the connects the computer to
                           computer network.
HDD

Hard Disk Drive, this is for
storing and retrieving digital
information. A HDD can be
portioned into four different
parts and can be labeled
primary and secondary. The
HDD is connected to the
motherboard using a Ribbon
cable.
INPUT AND OUTPUT DEVICES
 -Keyboard is and input
 used to type on the
 computer.
 -Monitor is a input device.
 -Printers are an output
 device.
 -Speakers are an output
 device projecting sound.
 -Touch screen is an input
 device.
Internal Cables
       SATA                                                   SCSI
High transfer speeds and are                         It transfers data between
hot swappable, 7 pin                                 computers and peripheral
connector.                                           devices.




                                PATA
                         Use bi-directional
                         channels for data, 40 pin
                         connector.
Inside of a computer

More Related Content

What's hot

Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
karlp
 
06. System unit of computer
06. System unit of computer06. System unit of computer
06. System unit of computer
TimesRide
 
Parts of the computer (inside part)
Parts of the computer (inside part)Parts of the computer (inside part)
Parts of the computer (inside part)Jayson Maurer
 
Inside the computer
Inside the computerInside the computer
Inside the computer
Zafar Ayub
 
Parts of system unit
Parts of system unitParts of system unit
Parts of system unitkapitanbasa
 
Internal components of PC
Internal components of PCInternal components of PC
Internal components of PC
Tushar B Kute
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
avilab
 
Computer hardware ( system unit)
Computer hardware ( system unit)Computer hardware ( system unit)
Computer hardware ( system unit)zamzulaiha
 
System unit
System unitSystem unit
System unit
Nur Azlina
 
Internal and external hardware components of a computer
Internal and external hardware components of a computerInternal and external hardware components of a computer
Internal and external hardware components of a computerbethan_eastlake
 
System unit
System unitSystem unit
System unit
Dhani Ahmad
 
PC Hardware Overview
PC Hardware OverviewPC Hardware Overview
PC Hardware Overview
Prabu U
 
Knowing a personal computer (pc) system unit
Knowing a personal computer (pc) system unitKnowing a personal computer (pc) system unit
Knowing a personal computer (pc) system unitharyanie
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functionsEmily-scamell
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
Sef Cambaliza
 
System unit
System unitSystem unit
System unit
aea2067
 
Mubashar khan
Mubashar khanMubashar khan
Mubashar khan
Mubashar pathan
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unit
Samantha Regis
 

What's hot (20)

Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
06. System unit of computer
06. System unit of computer06. System unit of computer
06. System unit of computer
 
Parts of the computer (inside part)
Parts of the computer (inside part)Parts of the computer (inside part)
Parts of the computer (inside part)
 
Inside the computer
Inside the computerInside the computer
Inside the computer
 
System unit components
System unit componentsSystem unit components
System unit components
 
Parts of system unit
Parts of system unitParts of system unit
Parts of system unit
 
System unit
System unitSystem unit
System unit
 
Internal components of PC
Internal components of PCInternal components of PC
Internal components of PC
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
 
Computer hardware ( system unit)
Computer hardware ( system unit)Computer hardware ( system unit)
Computer hardware ( system unit)
 
System unit
System unitSystem unit
System unit
 
Internal and external hardware components of a computer
Internal and external hardware components of a computerInternal and external hardware components of a computer
Internal and external hardware components of a computer
 
System unit
System unitSystem unit
System unit
 
PC Hardware Overview
PC Hardware OverviewPC Hardware Overview
PC Hardware Overview
 
Knowing a personal computer (pc) system unit
Knowing a personal computer (pc) system unitKnowing a personal computer (pc) system unit
Knowing a personal computer (pc) system unit
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
 
System unit
System unitSystem unit
System unit
 
Mubashar khan
Mubashar khanMubashar khan
Mubashar khan
 
Parts of the system unit
Parts of the system unitParts of the system unit
Parts of the system unit
 

Similar to Internal computer components benn kelly

Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
harryhickford
 
Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
harryhickford
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components UpdatedBenRB
 
Internal components technical
Internal components technicalInternal components technical
Internal components technical
LiamSewell
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
BenRB
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonBenRB
 
Hardware (2)
Hardware (2)Hardware (2)
Hardware (2)
Coky Fauzi Alfi
 
Technical & Non-Technical Information
Technical & Non-Technical InformationTechnical & Non-Technical Information
Technical & Non-Technical InformationBalBadwal
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
Soumit Ghosh
 
Lesson three hardware basics
Lesson three hardware basicsLesson three hardware basics
Lesson three hardware basicsMik Endale
 
Internal components for a non technical audience
Internal components for a non technical audienceInternal components for a non technical audience
Internal components for a non technical audienceBenRB
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
mite6025.hku
 
Technical presentation
Technical presentationTechnical presentation
Technical presentationconnorhowe131
 
Computer Components
Computer ComponentsComputer Components
Computer Components
dheelan2995
 

Similar to Internal computer components benn kelly (20)

Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
 
Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
 
P1 Unit 3
P1 Unit 3 P1 Unit 3
P1 Unit 3
 
P1 – Unit 3
P1 – Unit 3P1 – Unit 3
P1 – Unit 3
 
Power point presentation3
Power point presentation3Power point presentation3
Power point presentation3
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
 
Internal components technical
Internal components technicalInternal components technical
Internal components technical
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Computer Hardware Components
Computer Hardware ComponentsComputer Hardware Components
Computer Hardware Components
 
Hardware (2)
Hardware (2)Hardware (2)
Hardware (2)
 
Technical & Non-Technical Information
Technical & Non-Technical InformationTechnical & Non-Technical Information
Technical & Non-Technical Information
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Lesson three hardware basics
Lesson three hardware basicsLesson three hardware basics
Lesson three hardware basics
 
Internal components for a non technical audience
Internal components for a non technical audienceInternal components for a non technical audience
Internal components for a non technical audience
 
Hardware
HardwareHardware
Hardware
 
Hardware
HardwareHardware
Hardware
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Technical presentation
Technical presentationTechnical presentation
Technical presentation
 
Computer Components
Computer ComponentsComputer Components
Computer Components
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Internal computer components benn kelly

  • 1. INTERNAL COMPONENTS OF A COMPUTER Benn Kelly
  • 2. CPU The CPU (Central processing unit) is basically the brain of the computer, it carry's out the instructions of a computer program to preform the operations of a system. The CPU is measured in bits and the average speed of a computer CPU is usually 3.1 Ghz and a laptop is 2.1 Ghz. The faster the CPU the more heat will be produced which means a larger fan is needed.
  • 3. Memory RAM ROM Random Access Memory, Read only memory, is were data is stored cannot be edited. and can be edited. Flash Memory Flash memory can be electrically erased and re-programmed.
  • 4. Memory DRAM SDRAM Dynamic random-access Synchronous DRAM is a much memory, the difference faster version of DRAM, between DRAM and RAM is running at 180MHz, depending that DRAM stores each bit of on your processor. data in a different capacitor.
  • 5. Memory EPROM DRAM Erasable Programmable Read Only Dynamic Random Access Memory, this is a memory chip Memory, this stores every bit of that contains data when the data in many different capacitors computer is turned off. on the chip.
  • 6. ADAPTER CARDS PCI PCIe Peripheral Component Peripheral Component Interconnect, it allows Interconnect express, this is a communication with an computer expansion card. external card. NIC Network Interface Controller, the connects the computer to computer network.
  • 7. HDD Hard Disk Drive, this is for storing and retrieving digital information. A HDD can be portioned into four different parts and can be labeled primary and secondary. The HDD is connected to the motherboard using a Ribbon cable.
  • 8. INPUT AND OUTPUT DEVICES -Keyboard is and input used to type on the computer. -Monitor is a input device. -Printers are an output device. -Speakers are an output device projecting sound. -Touch screen is an input device.
  • 9. Internal Cables SATA SCSI High transfer speeds and are It transfers data between hot swappable, 7 pin computers and peripheral connector. devices. PATA Use bi-directional channels for data, 40 pin connector.
  • 10. Inside of a computer