SlideShare a Scribd company logo
Introduction to
PC Operations NC II/
Computer Education I
Mrs. Lanie P. Plecerda
Instructor I
MSWord - Wordprocessing
MS Excel – Spreadsheet application
MS Powerpoint – Presentation
Internet – Email and search the web
Introduction
Computer – a machine that performs tasks,
such as calculations or electronic
communications, under the control of a set
of instructions called a program.
Elements of a Computer System
1. Human Resources
2. Hardware
3. Software
Elements of a Computer System
Human Resources – are required to perform the
planning, operations, and some of the controls
external to the physical computer. Ex. Computer
Operator, System Analyst and Computer
Programmer
Hardware – refers to the physical components of a
computer system or an electronic components that
make up the computer system.
Software – is intangible and can only be seen but not
felt. It is an instruction that tell a computer exactly
what to use and what sequence of operations to
perform with the data.
Major Hardware Components
CPU – is the heart and brain of the computer.
It allow the computer to “think” about the
input given.
Memory – is classified either as primary and
secondary
I/O Devices – these are devices attached to
the main unit to facilitate communication (or
interface) between the user and the
computer.
Three Main Components of CPU
1. Control Unit – which is responsible for
maintaining order among the hardware
components. It acts like a traffic director; it
controls and directs the flow of information
between the input/output units and the central
processor.
2. ALU (Arithmetic Logic Unit) – which is
responsible for manipulating the data as required. It
contains all the electronic circuits for performing
the arithmetic calculations and logical comparisons.
3. Registers – which serve as temporary storage
areas for data during processing.
Software
a. Firmware – is software stored permanently in
chips in the computer’s circuitry making in
unalterable by computer users.
b. Operating System – Ex. DOS, Windows XP
c. Application Software – is software that
performs a specific task such as word
processing, spreadsheet design or database
management.
d. System Software – is software that is used to
operate and maintain a computer system.
Light Pen
Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held
pointer contains sensors that send signals to the computer whenever light is recorded. The
computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty
times every second. Because of this, the computer is able to determine the pen’s position by
noting exactly when the pen detects the electron beam passing its tip. Light pens are often used
in computer-aided design and computer-aided manufacture (CAD and CAM) technology because
of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on
a computer display screen.
A personal computer (PC)
enables people to carry out an
array of tasks, such as word
processing and slide
presentations. With a
connection to the Internet,
users can tap into a vast
amount of information on the
World Wide Web, send e-mail,
and download music and
videos. As a family tool, the PC
may be used for school,
research, communication,
record keeping, work, and
entertainment.
Computer System
A typical computer system consists of a central processing unit (CPU), input devices, storage
devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control
section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations.
The registers store data and keep track of operations. The control unit regulates and controls
various operations. The internal bus connects the units of the CPU with each other and with
external components of the system. For most computers, the principal input device is a
keyboard. Storage devices include external floppy disc drives and internal memory boards.
Output devices that display data include monitors and printers.
Memory
ROM (Read Only Memory) – is non-volatile
since its contents are not erased when the power
is off.
RAM (Random Access Memory) – is volatile,
its contents are lost when power is off, thus the
need for secondary storage where documents
and resulting information can be stored.
Primary - it is a storage which is immediately
accessible to the computer.
Secondary – holds data for a long period of
time.
Three Basic Operations
INPUT – computer is supplied with
necessary data and processing
instructions.
PROCESSING/COMPUTING – the
input data is processed and the answers
computed accordingly to the
instructions.
OUTPUT – the answers or results are
reported back to the computer user.
Characteristics of a Modern Computer
1. Electronic
2. Internal storage – used for storing both the
computer program and data being
processed.
3. Stored Program – the program of
instructions which stipulates the sequential
operations that the computer is to carry
out.
4. Program modification – ability to
automatically modify a program.
Advantages of Using a Computer
1. Speed – it saves a tremendous amount of time
2. Accuracy – if the computer is properly programmed and
provided with accurate data, it will do the intended work
with unerring accuracy.
3. Reliability – can work almost twenty-four hours a day
with a little time-out for equipment check up and
maintenance.
4. Retention – can store and save massive files of data and
programs.
5. Economy – the per unit cost of processing data or doing
computations by computer considerably lower than by
alternative actions.
6. Versatility – can used to solve a wide variety of problems
that arise in science and business.
Limitations of Computer
a. Dependence on People – it can only execute the
precise instructions that human beings provide.
b. Time-consuming and programming work – it is
unproductive until it is given the program that tells it
what operations to perform.
c. Disruptiveness – the results can reduced morale,
alienation, confusion and even sabotage.
d. Robot-like Processing – it is a big dumb machine,
dependent entirely on those who control it.
e. Computer Security – other security systems are
computer controlled, responding to specific pre-
recorded voice commands or physical characteristics lie
handprints.
Kinds of Computer
General Purpose Computer – used for a
wide variety of applications such inventory,
payroll, accounting, market research and sales
analysis.
Special Purpose Computer – incorporated
many features of general purpose computers
but support highly specialized data processing
tasks. Ex. Navigational computer on an
airplane.
End of Introduction

More Related Content

What's hot

Applying quality-standard (css)
Applying quality-standard (css)Applying quality-standard (css)
Applying quality-standard (css)
Bong Bandola
 
Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassemblymekashaw tizazu
 
understanding the computer system
understanding the computer systemunderstanding the computer system
understanding the computer system
Marilou Jamero
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Computer Hardware: Parts & Functions
Computer Hardware: Parts & FunctionsComputer Hardware: Parts & Functions
Computer Hardware: Parts & Functions
Ray Monterola
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
Frya Lora
 
Lesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculationLesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculation
Joel Tiemsin
 
Curriculum Guide ICT Grade 7-10.pdf
Curriculum Guide ICT Grade 7-10.pdfCurriculum Guide ICT Grade 7-10.pdf
Curriculum Guide ICT Grade 7-10.pdf
NikkiRodriguez7
 
TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)
Leonel Rivas
 
TLE K to12 ICT - CHS learning module
 TLE K to12 ICT - CHS learning module TLE K to12 ICT - CHS learning module
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computer
Joshua Hernandez
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
DepEd-Bataan
 
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersSemi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Anjenette Columnas
 
Css grade 11 week 2
Css grade 11 week 2Css grade 11 week 2
Css grade 11 week 2
Danilo Anos
 
Grade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docxGrade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docx
Angelito Villalon
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
Vicente Antofina
 
Rubric
RubricRubric
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
Eric Talamisan
 
TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1
Leonel Rivas
 

What's hot (20)

Applying quality-standard (css)
Applying quality-standard (css)Applying quality-standard (css)
Applying quality-standard (css)
 
Ch 2 computer assembly disassembly
Ch 2 computer  assembly disassemblyCh 2 computer  assembly disassembly
Ch 2 computer assembly disassembly
 
understanding the computer system
understanding the computer systemunderstanding the computer system
understanding the computer system
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Computer Hardware: Parts & Functions
Computer Hardware: Parts & FunctionsComputer Hardware: Parts & Functions
Computer Hardware: Parts & Functions
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Lesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculationLesson 3 performing mensuration and calculation
Lesson 3 performing mensuration and calculation
 
Curriculum Guide ICT Grade 7-10.pdf
Curriculum Guide ICT Grade 7-10.pdfCurriculum Guide ICT Grade 7-10.pdf
Curriculum Guide ICT Grade 7-10.pdf
 
TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)
 
TLE K to12 ICT - CHS learning module
 TLE K to12 ICT - CHS learning module TLE K to12 ICT - CHS learning module
TLE K to12 ICT - CHS learning module
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computer
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersSemi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
 
Css grade 11 week 2
Css grade 11 week 2Css grade 11 week 2
Css grade 11 week 2
 
Basic Computer Parts
Basic Computer PartsBasic Computer Parts
Basic Computer Parts
 
Grade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docxGrade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docx
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Rubric
RubricRubric
Rubric
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
 
TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1
 

Similar to Introduction to pc operations nc ii

Intro to computer
Intro to computerIntro to computer
Intro to computer
Surkhab Shelly
 
What is computer 1
What is computer 1What is computer 1
What is computer 1
Shuja Qais
 
Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
Makaha Rutendo
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
shashank singh
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
Online Assignment Help
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
INFOCHIEF institute
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
Sowmya Jyothi
 
Computer system
Computer systemComputer system
Computer system
PRAPTI MITRA
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introduction
sriushakeerthi2
 
Data processing
Data processingData processing
Data processing
Dr. Shalini Pandey
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
Karl John Piocos
 
Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)
TUHIN SAHA
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
AyyappanSri
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
roselynrequiso
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
BilawalHussain22
 

Similar to Introduction to pc operations nc ii (20)

Intro to computer
Intro to computerIntro to computer
Intro to computer
 
What is computer 1
What is computer 1What is computer 1
What is computer 1
 
Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Computer system
Computer systemComputer system
Computer system
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introduction
 
Data processing
Data processingData processing
Data processing
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
 
Input
InputInput
Input
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What is computer
What is computerWhat is computer
What is computer
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Introduction to pc operations nc ii

  • 1. Introduction to PC Operations NC II/ Computer Education I Mrs. Lanie P. Plecerda Instructor I
  • 2. MSWord - Wordprocessing MS Excel – Spreadsheet application MS Powerpoint – Presentation Internet – Email and search the web
  • 3. Introduction Computer – a machine that performs tasks, such as calculations or electronic communications, under the control of a set of instructions called a program. Elements of a Computer System 1. Human Resources 2. Hardware 3. Software
  • 4. Elements of a Computer System Human Resources – are required to perform the planning, operations, and some of the controls external to the physical computer. Ex. Computer Operator, System Analyst and Computer Programmer Hardware – refers to the physical components of a computer system or an electronic components that make up the computer system. Software – is intangible and can only be seen but not felt. It is an instruction that tell a computer exactly what to use and what sequence of operations to perform with the data.
  • 5. Major Hardware Components CPU – is the heart and brain of the computer. It allow the computer to “think” about the input given. Memory – is classified either as primary and secondary I/O Devices – these are devices attached to the main unit to facilitate communication (or interface) between the user and the computer.
  • 6. Three Main Components of CPU 1. Control Unit – which is responsible for maintaining order among the hardware components. It acts like a traffic director; it controls and directs the flow of information between the input/output units and the central processor. 2. ALU (Arithmetic Logic Unit) – which is responsible for manipulating the data as required. It contains all the electronic circuits for performing the arithmetic calculations and logical comparisons. 3. Registers – which serve as temporary storage areas for data during processing.
  • 7. Software a. Firmware – is software stored permanently in chips in the computer’s circuitry making in unalterable by computer users. b. Operating System – Ex. DOS, Windows XP c. Application Software – is software that performs a specific task such as word processing, spreadsheet design or database management. d. System Software – is software that is used to operate and maintain a computer system.
  • 8. Light Pen Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held pointer contains sensors that send signals to the computer whenever light is recorded. The computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty times every second. Because of this, the computer is able to determine the pen’s position by noting exactly when the pen detects the electron beam passing its tip. Light pens are often used in computer-aided design and computer-aided manufacture (CAD and CAM) technology because of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on a computer display screen.
  • 9. A personal computer (PC) enables people to carry out an array of tasks, such as word processing and slide presentations. With a connection to the Internet, users can tap into a vast amount of information on the World Wide Web, send e-mail, and download music and videos. As a family tool, the PC may be used for school, research, communication, record keeping, work, and entertainment.
  • 10. Computer System A typical computer system consists of a central processing unit (CPU), input devices, storage devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations. The registers store data and keep track of operations. The control unit regulates and controls various operations. The internal bus connects the units of the CPU with each other and with external components of the system. For most computers, the principal input device is a keyboard. Storage devices include external floppy disc drives and internal memory boards. Output devices that display data include monitors and printers.
  • 11. Memory ROM (Read Only Memory) – is non-volatile since its contents are not erased when the power is off. RAM (Random Access Memory) – is volatile, its contents are lost when power is off, thus the need for secondary storage where documents and resulting information can be stored. Primary - it is a storage which is immediately accessible to the computer. Secondary – holds data for a long period of time.
  • 12. Three Basic Operations INPUT – computer is supplied with necessary data and processing instructions. PROCESSING/COMPUTING – the input data is processed and the answers computed accordingly to the instructions. OUTPUT – the answers or results are reported back to the computer user.
  • 13. Characteristics of a Modern Computer 1. Electronic 2. Internal storage – used for storing both the computer program and data being processed. 3. Stored Program – the program of instructions which stipulates the sequential operations that the computer is to carry out. 4. Program modification – ability to automatically modify a program.
  • 14. Advantages of Using a Computer 1. Speed – it saves a tremendous amount of time 2. Accuracy – if the computer is properly programmed and provided with accurate data, it will do the intended work with unerring accuracy. 3. Reliability – can work almost twenty-four hours a day with a little time-out for equipment check up and maintenance. 4. Retention – can store and save massive files of data and programs. 5. Economy – the per unit cost of processing data or doing computations by computer considerably lower than by alternative actions. 6. Versatility – can used to solve a wide variety of problems that arise in science and business.
  • 15. Limitations of Computer a. Dependence on People – it can only execute the precise instructions that human beings provide. b. Time-consuming and programming work – it is unproductive until it is given the program that tells it what operations to perform. c. Disruptiveness – the results can reduced morale, alienation, confusion and even sabotage. d. Robot-like Processing – it is a big dumb machine, dependent entirely on those who control it. e. Computer Security – other security systems are computer controlled, responding to specific pre- recorded voice commands or physical characteristics lie handprints.
  • 16. Kinds of Computer General Purpose Computer – used for a wide variety of applications such inventory, payroll, accounting, market research and sales analysis. Special Purpose Computer – incorporated many features of general purpose computers but support highly specialized data processing tasks. Ex. Navigational computer on an airplane.