SlideShare a Scribd company logo
1 of 19
Laptop Computer
Workstation
Supercomputer
Palmtop Computer
Personal Data Assistant
Types of Computers
New Learning Technologies
Internet
Multimedia
Virtual reality
Distance learning
Data warehousing
Shift in
information
infrastructure
1970’s-1980’s 1990’s-?
Infrastructure focused
on data crunching and
data storage
Infrastructure focused
on communications,
connectivity, and service
The Information Age Timeline
Progress of Technology through
Time
ENIAC
=
Current Technology
Composed of 17,000 vacuum tubes, 70,000 resistors, and
10,000 capacitors, the ENIAC (Electronic Numerical
Integrator and Computer) weighed over 30 tons and took up
1800 square feet of floor space. Completed in 1945, the
ENIAC was used for ballistics work and later on for weather
prediction.
Today’s technology uses vast numbers of
electronic components in the form of miniaturized
integrated circuits contained on silicon chips.
Modern day desk calculators exceed ENIAC’s
computational power and speed by far.
Apple
computer
created
1976
IBM
first micro-
computer
1981
Macintosh
computer
created
1984 1994
Multimedia
computers
and personal
data
assistants
developed
Personal and Multimedia Computers
1980 1986 1988 1990
DOS
becomes the
industry
standard
Microsoft
releases
Windows
3.0
IBM
introduces
first laptop
computer
IBM and
Microsoft
release the
OS/2
operating
system
Input Devices
•Keyboard
•Mouse
•Trackball
•Stylus
Central Processing Unit (CPU)
•Microprocessor
•Storage Devices (Hard Drives & Floppy Drives)
Output Devices
•Monitor
•Printer
Components of a Computer System
Components of a VGA Monitor
Electron Guns
Three electron guns located
at the back of the monitor’s cathode-
ray tube send out three electron beams
for each of the primary colors.
Magnetic Deflection Yoke
This mechanism uses electromagnetic
fields to bend the paths of the electron
streams.
Shadow Mask
The beams pass through holes in a
metal plate called a shadow mask.
The mask keeps the electron beams
precisely aligned, so that colors are
accurate. The monitor’s dot pitch
is a measure of how closely the
holes are spaced apart.
Phosphor Coating
The phosphor coating is a material
that glows when struck by an electron
beam. The screen is made up of
triads of red, green, and blue phosphor
dots. As the energy in the electron
beam increases, the phosphor dots
glow brighter. To create different
colors, the intensity of each of the
three beams is varied.
Computer Memory
SIMM
Single Inline Memory Modules are the most
popular memory module of present day
computers. The small circuit board contains
three to nine DIP chips. SIMMs range in size
from 4MB to 32MB of memory.
DIP
Dual Inline Pin memory modules were once
used for main memory in older computer
systems. Now they are used as components
on SIMM chips and are also used in cache
RAM.
ROM
A Read Only Memory storage device has
instructions permanently embedded in its
circuits. ROM chips contain programs that
start the computer and perform system
diagnostics.
Virtual Memory
When a computer runs out of real memory
(storing information in RAM), it employs
a software technique to generate virtual
memory, storing and swapping information
on the computer’s hard drive.
Hard Disk Storage
Sealed Metal Housing
The housing protects the internal
components from dust particles that could
block the gap between the read/write heads
and the platters, causing the hard drive to
crash.
Drive Spindle
The drive spindle is connected to a
motor which spins one or more
magnetically coated platters at several
thousand revolutions per minute. More
platters mean greater disk storage
capacity.
Head Actuator
This component moves the
collection of read/write heads
across the surface of the platters
with extreme accuracy. It aligns
the heads with the tracks that
lie in concentric circles
on the platters.
Read/Write Head
These read/write heads move in
unison across the surfaces of the
platters. The heads write data to
the platters by aligning magnetic
particles on the surface and read
data by detecting the polarity of
the particles.
Sector
When formatting the hard drive, the
computer divides the disk into radial
sections called sectors.
Track
Circular and concentric paths
the read/write heads follow
when reading information from
the disk.
How a Mechanical Mouse
Works
As the ball rotates it turns the two
rollers mounted perpendicular to one
another. One roller corresponds to
vertical movements of the mouse,
another corresponds to horizontal
movements.
Two small switches in the front of the
mouse register left and right mouse
clicks.
A perforated wheel and a photoelectric switch
measure the rotations the ball makes as the
mouse is moved, thus moving the cursor on the
screen. The photoelectric switch consists of a
light-emitting diode (emitter) on one side,
and a phototransistor (receiver) on the
other side. The perforated wheel is
sandwiched between the two,
turning the switch off and on
as it rotates.
A third roller is used
not for measurement,
but instead to keep
the ball in place as
the user moves the
mouse.
Major Components of a Motherboard
SIMM RAM Bank
Single Inline Memory Module
stores data to be used by the
microprocessor.
ROM BIOS
Basic Input/Output System
stores permanent instructions
that start the computer.
Power Connector
Supplies power to the
motherboard.
16 Bit ISA Slots
Allows expansion of computer
through modem, sound and
video cards.
32 Bit PCI Slots
Allows expansion cards that
can transfer data faster than
ISA slots.
Battery
Provides power
for the system
clock.
Cache RAM
Stores and retrieves information
for the microprocessor at a faster
rate than SIMM RAM so
instructions can be executed faster.
Microprocessor
Single integrated circuit that
executes the majority
of the instructions
to process
data.
External Modem
Plugs into computer externally
Internal Modem
Fits inside computer
Modems can send data from one computer to another using telephone lines.
Modems are used in almost every aspect of work. Businesses use them to transfer
files, data, and money. They are also used for teleconferencing, which allows people
in various locations to communicate over vast distances; these are sometimes called
virtual meetings. Schools use them to provide access to the Internet.
Modems
Microsoft Office is one of the most popular
software suites available for business,
educational, and personal computer use.
• Word processor
• Database program
• Spreadsheet
• Presentation software
• Information management
Software suites are full-
featured versions of several
different programs
packaged together.
Software Suites
•Artificial Intelligence - Computer
brains that become self-teaching and
self-thinking.
•Cloning - Duplication of cells and
DNA to create an exact copy of an
organic being.
•Cybernetics - The union of the
organic and inorganic.
•Virtual reality - All-encompassing
computerized microworlds for
business and entertainment.
What does the Future Hold for
Computers and Society?
Detecting Computer Viruses
What is a computer virus?
A computer virus is a relatively small program that
can vary in its destructiveness from being a minor
nuisance, to a major disaster. Three common methods
of access include:
1) Disk in drive A: with virus program
2) Downloaded files through BBS/Internet
3) Via LAN server
What types of viruses are there?
• Logic bombs wait until a specific action is taken.
• Time bombs activate on a certain date.
• Trojan horses appear to be legitimate programs but
when opened, damage software codes.
• Worms burrow through and between networks to
change or overwrite data.
2
3
1
Data Encryption
Modern encryption techniques use complex mathematical algorithms that scramble and lock confidential data
contained in e-mail messages and binary files. There are two fundamental approaches to encryption: public-
key encryption and conventional encryption. Both require user passwords. Conventional encryption uses two
identical or symmetrical keys that both the sender and the recipient have. Public-key encryption uses two
different keys to encrypt and decrypt files. The advantage is that only one key needs to be kept secure and that
key doesn’t need to be shared.
Public-Key Encryption (Asymmetrical)
Conventional Encryption (Symmetrical)
File encrypted with public key Locked file sent to recipient File decrypted with secure key
File encrypted Locked file sent to recipient File decrypted with identical key
The Future of Computing:
Parallel Processing
Deep Blue
Pathfinder and Sojourner on Mars
Parallel processing subdivides the processing workload with multiple processors, enabling a
computer to complete a task in shorter time. Examples of parallel processing computers include
Cray supercomputers, IBM’s chess master Deep Blue, and NASA’s Mars Pathfinder.
Cray supercomputer
Society and the Future of Computing:
Telecommuting
Since the word was first coined over
20 years ago, telecommuting has
grown to be an increasingly viable
alternative work structure that not
only increases productivity but
lowers operating costs and worker
turnover as well.
Advantages
• Greater employee retention and lower turnover
• Reduces traffic congestion and taxes for road
repair and new highway construction
• Reduces absenteeism
• Reduces pollution
Disadvantages
• Requires greater discipline and self-motivation
• Greater number of distractions at home
• Reduced on-site interaction with clients
and coworkers

More Related Content

What's hot

Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
Techsailor
 
what is computer
what is computerwhat is computer
what is computer
Jelz JZ
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
norzaini
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
Subair Ali
 
Introduction to computer office 2003
Introduction to computer office 2003Introduction to computer office 2003
Introduction to computer office 2003
manyamfranchise
 

What's hot (20)

Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Las ict 9 q2 week 1 & 2
Las ict 9 q2 week 1 & 2Las ict 9 q2 week 1 & 2
Las ict 9 q2 week 1 & 2
 
what is computer
what is computerwhat is computer
what is computer
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Introduction to computers pdf
Introduction to computers pdfIntroduction to computers pdf
Introduction to computers pdf
 
CHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERSCHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERS
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Computer fundamental on Discovering Computer
Computer fundamental on Discovering ComputerComputer fundamental on Discovering Computer
Computer fundamental on Discovering Computer
 
Fundamental of Computers
Fundamental of ComputersFundamental of Computers
Fundamental of Computers
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Computer and Information Technology
Computer and Information TechnologyComputer and Information Technology
Computer and Information Technology
 
Understanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In BusinessUnderstanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In Business
 
Chapter1
Chapter1Chapter1
Chapter1
 
Fundamental note New
Fundamental note NewFundamental note New
Fundamental note New
 
Bab1
Bab1Bab1
Bab1
 
Introduction to computer office 2003
Introduction to computer office 2003Introduction to computer office 2003
Introduction to computer office 2003
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 

Viewers also liked

resume2pierceupdated08172016
resume2pierceupdated08172016resume2pierceupdated08172016
resume2pierceupdated08172016
Brenda Johnson
 
resume2pierceupdated08172016
resume2pierceupdated08172016resume2pierceupdated08172016
resume2pierceupdated08172016
Brenda Johnson
 
Density based-traffic-signal-system
Density based-traffic-signal-systemDensity based-traffic-signal-system
Density based-traffic-signal-system
PAVAN KUMAR ILLA
 
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de pageDRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
David Leclair
 
Les opportunités des dispositifs publicitaires multi-écrans par Millward Brown
Les opportunités des dispositifs publicitaires multi-écrans par Millward BrownLes opportunités des dispositifs publicitaires multi-écrans par Millward Brown
Les opportunités des dispositifs publicitaires multi-écrans par Millward Brown
Philippe KHATTOU
 

Viewers also liked (16)

resume2pierceupdated08172016
resume2pierceupdated08172016resume2pierceupdated08172016
resume2pierceupdated08172016
 
Practica 7
Practica 7Practica 7
Practica 7
 
Donna Gates Rickett Resume
Donna Gates Rickett ResumeDonna Gates Rickett Resume
Donna Gates Rickett Resume
 
Nominas
NominasNominas
Nominas
 
Educación superior,
Educación superior,Educación superior,
Educación superior,
 
practica 2
practica 2practica 2
practica 2
 
Risk Mgt
Risk Mgt Risk Mgt
Risk Mgt
 
Modelo osi
Modelo osiModelo osi
Modelo osi
 
resume2pierceupdated08172016
resume2pierceupdated08172016resume2pierceupdated08172016
resume2pierceupdated08172016
 
Naveen Prakash Resume
Naveen Prakash ResumeNaveen Prakash Resume
Naveen Prakash Resume
 
juran philoshophy(Management Guru)
juran philoshophy(Management Guru)juran philoshophy(Management Guru)
juran philoshophy(Management Guru)
 
Silk
SilkSilk
Silk
 
Density based-traffic-signal-system
Density based-traffic-signal-systemDensity based-traffic-signal-system
Density based-traffic-signal-system
 
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de pageDRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
DRC2500_Mémoire de plaidoirie_APPELANTS ÉQUIPE 5 FINAL note de bas de page
 
Recherche de stages Mnaa Artigraph 2011-12 : la lettre de candidature
Recherche de stages Mnaa Artigraph 2011-12 : la lettre de candidatureRecherche de stages Mnaa Artigraph 2011-12 : la lettre de candidature
Recherche de stages Mnaa Artigraph 2011-12 : la lettre de candidature
 
Les opportunités des dispositifs publicitaires multi-écrans par Millward Brown
Les opportunités des dispositifs publicitaires multi-écrans par Millward BrownLes opportunités des dispositifs publicitaires multi-écrans par Millward Brown
Les opportunités des dispositifs publicitaires multi-écrans par Millward Brown
 

Similar to Introduction to computers

Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
Shaheen Khan
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
rjsuthar56
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
Shaheen Khan
 

Similar to Introduction to computers (20)

Lecture
LectureLecture
Lecture
 
Lecture-It104
Lecture-It104Lecture-It104
Lecture-It104
 
Lecture
LectureLecture
Lecture
 
IT Lecture
IT LectureIT Lecture
IT Lecture
 
It
ItIt
It
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in Hospitality
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
computer funda.pptx
computer funda.pptxcomputer funda.pptx
computer funda.pptx
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Computer capsule sbi_clerk
Computer capsule sbi_clerkComputer capsule sbi_clerk
Computer capsule sbi_clerk
 
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
VTU C programming(CPS) 18CPS13/23 notes by Nithin,VVCE,Mysuru
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Topic 1 - Overview of IT.pdf
Topic 1 - Overview of IT.pdfTopic 1 - Overview of IT.pdf
Topic 1 - Overview of IT.pdf
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 

Recently uploaded

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 

Recently uploaded (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 

Introduction to computers

  • 1.
  • 3. New Learning Technologies Internet Multimedia Virtual reality Distance learning Data warehousing
  • 4. Shift in information infrastructure 1970’s-1980’s 1990’s-? Infrastructure focused on data crunching and data storage Infrastructure focused on communications, connectivity, and service The Information Age Timeline
  • 5. Progress of Technology through Time ENIAC = Current Technology Composed of 17,000 vacuum tubes, 70,000 resistors, and 10,000 capacitors, the ENIAC (Electronic Numerical Integrator and Computer) weighed over 30 tons and took up 1800 square feet of floor space. Completed in 1945, the ENIAC was used for ballistics work and later on for weather prediction. Today’s technology uses vast numbers of electronic components in the form of miniaturized integrated circuits contained on silicon chips. Modern day desk calculators exceed ENIAC’s computational power and speed by far.
  • 6. Apple computer created 1976 IBM first micro- computer 1981 Macintosh computer created 1984 1994 Multimedia computers and personal data assistants developed Personal and Multimedia Computers 1980 1986 1988 1990 DOS becomes the industry standard Microsoft releases Windows 3.0 IBM introduces first laptop computer IBM and Microsoft release the OS/2 operating system
  • 7. Input Devices •Keyboard •Mouse •Trackball •Stylus Central Processing Unit (CPU) •Microprocessor •Storage Devices (Hard Drives & Floppy Drives) Output Devices •Monitor •Printer Components of a Computer System
  • 8. Components of a VGA Monitor Electron Guns Three electron guns located at the back of the monitor’s cathode- ray tube send out three electron beams for each of the primary colors. Magnetic Deflection Yoke This mechanism uses electromagnetic fields to bend the paths of the electron streams. Shadow Mask The beams pass through holes in a metal plate called a shadow mask. The mask keeps the electron beams precisely aligned, so that colors are accurate. The monitor’s dot pitch is a measure of how closely the holes are spaced apart. Phosphor Coating The phosphor coating is a material that glows when struck by an electron beam. The screen is made up of triads of red, green, and blue phosphor dots. As the energy in the electron beam increases, the phosphor dots glow brighter. To create different colors, the intensity of each of the three beams is varied.
  • 9. Computer Memory SIMM Single Inline Memory Modules are the most popular memory module of present day computers. The small circuit board contains three to nine DIP chips. SIMMs range in size from 4MB to 32MB of memory. DIP Dual Inline Pin memory modules were once used for main memory in older computer systems. Now they are used as components on SIMM chips and are also used in cache RAM. ROM A Read Only Memory storage device has instructions permanently embedded in its circuits. ROM chips contain programs that start the computer and perform system diagnostics. Virtual Memory When a computer runs out of real memory (storing information in RAM), it employs a software technique to generate virtual memory, storing and swapping information on the computer’s hard drive.
  • 10. Hard Disk Storage Sealed Metal Housing The housing protects the internal components from dust particles that could block the gap between the read/write heads and the platters, causing the hard drive to crash. Drive Spindle The drive spindle is connected to a motor which spins one or more magnetically coated platters at several thousand revolutions per minute. More platters mean greater disk storage capacity. Head Actuator This component moves the collection of read/write heads across the surface of the platters with extreme accuracy. It aligns the heads with the tracks that lie in concentric circles on the platters. Read/Write Head These read/write heads move in unison across the surfaces of the platters. The heads write data to the platters by aligning magnetic particles on the surface and read data by detecting the polarity of the particles. Sector When formatting the hard drive, the computer divides the disk into radial sections called sectors. Track Circular and concentric paths the read/write heads follow when reading information from the disk.
  • 11. How a Mechanical Mouse Works As the ball rotates it turns the two rollers mounted perpendicular to one another. One roller corresponds to vertical movements of the mouse, another corresponds to horizontal movements. Two small switches in the front of the mouse register left and right mouse clicks. A perforated wheel and a photoelectric switch measure the rotations the ball makes as the mouse is moved, thus moving the cursor on the screen. The photoelectric switch consists of a light-emitting diode (emitter) on one side, and a phototransistor (receiver) on the other side. The perforated wheel is sandwiched between the two, turning the switch off and on as it rotates. A third roller is used not for measurement, but instead to keep the ball in place as the user moves the mouse.
  • 12. Major Components of a Motherboard SIMM RAM Bank Single Inline Memory Module stores data to be used by the microprocessor. ROM BIOS Basic Input/Output System stores permanent instructions that start the computer. Power Connector Supplies power to the motherboard. 16 Bit ISA Slots Allows expansion of computer through modem, sound and video cards. 32 Bit PCI Slots Allows expansion cards that can transfer data faster than ISA slots. Battery Provides power for the system clock. Cache RAM Stores and retrieves information for the microprocessor at a faster rate than SIMM RAM so instructions can be executed faster. Microprocessor Single integrated circuit that executes the majority of the instructions to process data.
  • 13. External Modem Plugs into computer externally Internal Modem Fits inside computer Modems can send data from one computer to another using telephone lines. Modems are used in almost every aspect of work. Businesses use them to transfer files, data, and money. They are also used for teleconferencing, which allows people in various locations to communicate over vast distances; these are sometimes called virtual meetings. Schools use them to provide access to the Internet. Modems
  • 14. Microsoft Office is one of the most popular software suites available for business, educational, and personal computer use. • Word processor • Database program • Spreadsheet • Presentation software • Information management Software suites are full- featured versions of several different programs packaged together. Software Suites
  • 15. •Artificial Intelligence - Computer brains that become self-teaching and self-thinking. •Cloning - Duplication of cells and DNA to create an exact copy of an organic being. •Cybernetics - The union of the organic and inorganic. •Virtual reality - All-encompassing computerized microworlds for business and entertainment. What does the Future Hold for Computers and Society?
  • 16. Detecting Computer Viruses What is a computer virus? A computer virus is a relatively small program that can vary in its destructiveness from being a minor nuisance, to a major disaster. Three common methods of access include: 1) Disk in drive A: with virus program 2) Downloaded files through BBS/Internet 3) Via LAN server What types of viruses are there? • Logic bombs wait until a specific action is taken. • Time bombs activate on a certain date. • Trojan horses appear to be legitimate programs but when opened, damage software codes. • Worms burrow through and between networks to change or overwrite data. 2 3 1
  • 17. Data Encryption Modern encryption techniques use complex mathematical algorithms that scramble and lock confidential data contained in e-mail messages and binary files. There are two fundamental approaches to encryption: public- key encryption and conventional encryption. Both require user passwords. Conventional encryption uses two identical or symmetrical keys that both the sender and the recipient have. Public-key encryption uses two different keys to encrypt and decrypt files. The advantage is that only one key needs to be kept secure and that key doesn’t need to be shared. Public-Key Encryption (Asymmetrical) Conventional Encryption (Symmetrical) File encrypted with public key Locked file sent to recipient File decrypted with secure key File encrypted Locked file sent to recipient File decrypted with identical key
  • 18. The Future of Computing: Parallel Processing Deep Blue Pathfinder and Sojourner on Mars Parallel processing subdivides the processing workload with multiple processors, enabling a computer to complete a task in shorter time. Examples of parallel processing computers include Cray supercomputers, IBM’s chess master Deep Blue, and NASA’s Mars Pathfinder. Cray supercomputer
  • 19. Society and the Future of Computing: Telecommuting Since the word was first coined over 20 years ago, telecommuting has grown to be an increasingly viable alternative work structure that not only increases productivity but lowers operating costs and worker turnover as well. Advantages • Greater employee retention and lower turnover • Reduces traffic congestion and taxes for road repair and new highway construction • Reduces absenteeism • Reduces pollution Disadvantages • Requires greater discipline and self-motivation • Greater number of distractions at home • Reduced on-site interaction with clients and coworkers