SlideShare a Scribd company logo
Introduction to
PC Operations NC II/
Computer Education I
Mrs. Lanie P. Plecerda
Instructor 3
MSWord - Wordprocessing
MS Excel – Spreadsheet application
MS Powerpoint – Presentation
Internet – Email and search the web
Introduction
Computer – a machine that performs tasks,
such as calculations or electronic
communications, under the control of a set
of instructions called a program.
Elements of a Computer System
1. Human Resources
2. Hardware
3. Software
Elements of a Computer System
Human Resources – are required to perform the
planning, operations, and some of the controls
external to the physical computer. Ex. Computer
Operator, System Analyst and Computer
Programmer
Hardware – refers to the physical components of a
computer system or an electronic components that
make up the computer system.
Software – is intangible and can only be seen but not
felt. It is an instruction that tell a computer exactly
what to use and what sequence of operations to
perform with the data.
Major Hardware Components
CPU – is the heart and brain of the computer.
It allow the computer to “think” about the
input given.
Memory – is classified either as primary and
secondary
I/O Devices – these are devices attached to
the main unit to facilitate communication (or
interface) between the user and the
computer.
Three Main Components of CPU
1. Control Unit – which is responsible for
maintaining order among the hardware
components. It acts like a traffic director; it
controls and directs the flow of information
between the input/output units and the central
processor.
2. ALU (Arithmetic Logic Unit) – which is
responsible for manipulating the data as required. It
contains all the electronic circuits for performing
the arithmetic calculations and logical comparisons.
3. Registers – which serve as temporary storage
areas for data during processing.
Software
a. Firmware – is software stored permanently in
chips in the computer’s circuitry making in
unalterable by computer users.
b. Operating System – Ex. DOS, Windows XP
c. Application Software – is software that
performs a specific task such as word
processing, spreadsheet design or database
management.
d. System Software – is software that is used to
operate and maintain a computer system.
Light Pen
Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held
pointer contains sensors that send signals to the computer whenever light is recorded. The
computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty
times every second. Because of this, the computer is able to determine the pen’s position by
noting exactly when the pen detects the electron beam passing its tip. Light pens are often used
in computer-aided design and computer-aided manufacture (CAD and CAM) technology because
of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on
a computer display screen.
A personal computer (PC)
enables people to carry out an
array of tasks, such as word
processing and slide
presentations. With a
connection to the Internet,
users can tap into a vast
amount of information on the
World Wide Web, send e-mail,
and download music and
videos. As a family tool, the PC
may be used for school,
research, communication,
record keeping, work, and
entertainment.
Computer System
A typical computer system consists of a central processing unit (CPU), input devices, storage
devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control
section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations.
The registers store data and keep track of operations. The control unit regulates and controls
various operations. The internal bus connects the units of the CPU with each other and with
external components of the system. For most computers, the principal input device is a
keyboard. Storage devices include external floppy disc drives and internal memory boards.
Output devices that display data include monitors and printers.
Memory
ROM (Read Only Memory) – is non-volatile
since its contents are not erased when the power
is off.
RAM (Random Access Memory) – is volatile,
its contents are lost when power is off, thus the
need for secondary storage where documents
and resulting information can be stored.
Primary - it is a storage which is immediately
accessible to the computer.
Secondary – holds data for a long period of
time.
Three Basic Operations
INPUT – computer is supplied with
necessary data and processing
instructions.
PROCESSING/COMPUTING – the
input data is processed and the answers
computed accordingly to the
instructions.
OUTPUT – the answers or results are
reported back to the computer user.
Characteristics of a Modern Computer
1. Electronic
2. Internal storage – used for storing both the
computer program and data being
processed.
3. Stored Program – the program of
instructions which stipulates the sequential
operations that the computer is to carry
out.
4. Program modification – ability to
automatically modify a program.
Advantages of Using a Computer
1. Speed – it saves a tremendous amount of time
2. Accuracy – if the computer is properly programmed and
provided with accurate data, it will do the intended work
with unerring accuracy.
3. Reliability – can work almost twenty-four hours a day
with a little time-out for equipment check up and
maintenance.
4. Retention – can store and save massive files of data and
programs.
5. Economy – the per unit cost of processing data or doing
computations by computer considerably lower than by
alternative actions.
6. Versatility – can used to solve a wide variety of problems
that arise in science and business.
Limitations of Computer
a. Dependence on People – it can only execute the
precise instructions that human beings provide.
b. Time-consuming and programming work – it is
unproductive until it is given the program that tells it
what operations to perform.
c. Disruptiveness – the results can reduced morale,
alienation, confusion and even sabotage.
d. Robot-like Processing – it is a big dumb machine,
dependent entirely on those who control it.
e. Computer Security – other security systems are
computer controlled, responding to specific pre-
recorded voice commands or physical characteristics lie
handprints.
Kinds of Computer
General Purpose Computer – used for a
wide variety of applications such inventory,
payroll, accounting, market research and sales
analysis.
Special Purpose Computer – incorporated
many features of general purpose computers
but support highly specialized data processing
tasks. Ex. Navigational computer on an
airplane.
End of Introduction

More Related Content

What's hot

Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
Makaha Rutendo
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
Niraj Choudhary
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
Preeti Khanwani
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computer
Sandeep Menon
 
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre. Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
ajayskumars
 
Computer system
Computer systemComputer system
Computer system
PRAPTI MITRA
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organization
University of Potsdam
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2
Amit Chandra
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)
Samiullah Khan
 
Presentation on Basic Computer
Presentation on Basic ComputerPresentation on Basic Computer
Presentation on Basic Computer
rimplebaggan
 
Computer system
Computer systemComputer system
Computer system
Temesgenthanks
 
Computer skills vocabulary
Computer skills vocabularyComputer skills vocabulary
Computer skills vocabulary
Ellie Simons
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
Ndubi Amos
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
Dr. B T Sampath Kumar
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
Praveen M Jigajinni
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
University of Gujrat
 
Introduction To ICTs
Introduction To ICTsIntroduction To ICTs
Introduction To ICTs
Makaha Rutendo
 
Computer System - An Overview
 Computer System - An Overview Computer System - An Overview
Computer System - An Overview
Hitesh Singh
 
Introduction to computing Lecture no 1
Introduction to computing Lecture no 1Introduction to computing Lecture no 1
Introduction to computing Lecture no 1
Ehtashamulhaq17
 

What's hot (20)

Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computer
 
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre. Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
 
Computer system
Computer systemComputer system
Computer system
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organization
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)
 
Presentation on Basic Computer
Presentation on Basic ComputerPresentation on Basic Computer
Presentation on Basic Computer
 
Computer system
Computer systemComputer system
Computer system
 
Computer skills vocabulary
Computer skills vocabularyComputer skills vocabulary
Computer skills vocabulary
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Introduction To ICTs
Introduction To ICTsIntroduction To ICTs
Introduction To ICTs
 
Computer System - An Overview
 Computer System - An Overview Computer System - An Overview
Computer System - An Overview
 
Introduction to computing Lecture no 1
Introduction to computing Lecture no 1Introduction to computing Lecture no 1
Introduction to computing Lecture no 1
 

Viewers also liked

DIB
DIBDIB
Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)
Caroline Kimball
 
What you should know about tech support scams
What you should know about tech support scamsWhat you should know about tech support scams
What you should know about tech support scams
Zero Effort Networking (ZEN)
 
CV2016
CV2016CV2016
Biodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated SiteBiodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated Site
Jenil Jariwala
 
Presentaciondelcursohpycy
Presentaciondelcursohpycy Presentaciondelcursohpycy
Presentaciondelcursohpycy
Manuel Lopez
 
La lengua y los hablantes
La lengua y los hablantesLa lengua y los hablantes
La lengua y los hablantes
sacra_bachoco
 
Encuesta Venezuela
Encuesta VenezuelaEncuesta Venezuela
Encuesta Venezuela
cravanzini
 
Curriculum Vita eng
Curriculum Vita engCurriculum Vita eng
Curriculum Vita eng
Piotr Kubiak
 
HAMARATA PROFILE PDF
HAMARATA PROFILE PDFHAMARATA PROFILE PDF
HAMARATA PROFILE PDF
CLIFFORD EDWIN
 
Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17
tzormbas
 
Patricia wright resume 2015
Patricia wright resume 2015Patricia wright resume 2015
Patricia wright resume 2015
Patricia Branca
 
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимуществаПрограмма для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
VisitBasis Tech, LLC
 
Boulton on Abatement
Boulton on AbatementBoulton on Abatement
Boulton on Abatement
Ann Treacy
 
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
New City Church
 

Viewers also liked (15)

DIB
DIBDIB
DIB
 
Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)
 
What you should know about tech support scams
What you should know about tech support scamsWhat you should know about tech support scams
What you should know about tech support scams
 
CV2016
CV2016CV2016
CV2016
 
Biodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated SiteBiodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated Site
 
Presentaciondelcursohpycy
Presentaciondelcursohpycy Presentaciondelcursohpycy
Presentaciondelcursohpycy
 
La lengua y los hablantes
La lengua y los hablantesLa lengua y los hablantes
La lengua y los hablantes
 
Encuesta Venezuela
Encuesta VenezuelaEncuesta Venezuela
Encuesta Venezuela
 
Curriculum Vita eng
Curriculum Vita engCurriculum Vita eng
Curriculum Vita eng
 
HAMARATA PROFILE PDF
HAMARATA PROFILE PDFHAMARATA PROFILE PDF
HAMARATA PROFILE PDF
 
Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17
 
Patricia wright resume 2015
Patricia wright resume 2015Patricia wright resume 2015
Patricia wright resume 2015
 
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимуществаПрограмма для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
 
Boulton on Abatement
Boulton on AbatementBoulton on Abatement
Boulton on Abatement
 
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
 

Similar to Introductiontopcoperationsncii 130724004019-phpapp01

Intro to computer
Intro to computerIntro to computer
Intro to computer
Surkhab Shelly
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
shashank singh
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
Online Assignment Help
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
Sowmya Jyothi
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
INFOCHIEF institute
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introduction
sriushakeerthi2
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
Karl John Piocos
 
Data processing
Data processingData processing
Data processing
Dr. Shalini Pandey
 
Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)
TUHIN SAHA
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
AyyappanSri
 
Input
InputInput
Basics of computer
Basics of computerBasics of computer
Basics of computer
Romio Khumukcham
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
roselynrequiso
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
roselynrequiso
 
What is computer
What is computerWhat is computer
What is computer
roselynrequiso
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
roselynrequiso
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
BilawalHussain22
 
C with lab
C with labC with lab
C with lab
ParveenSingh73
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
arehkelvin
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
Vhe Cagande
 

Similar to Introductiontopcoperationsncii 130724004019-phpapp01 (20)

Intro to computer
Intro to computerIntro to computer
Intro to computer
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introduction
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Data processing
Data processingData processing
Data processing
 
Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)Fundamentals of Computers and Operating System(OS)
Fundamentals of Computers and Operating System(OS)
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
 
Input
InputInput
Input
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
What is computer
What is computerWhat is computer
What is computer
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
 
C with lab
C with labC with lab
C with lab
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 

Recently uploaded

Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
ssuserd4e0d2
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
Safe Software
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
The Evolution of Remote Server Management
The Evolution of Remote Server ManagementThe Evolution of Remote Server Management
The Evolution of Remote Server Management
Bert Blevins
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 

Recently uploaded (20)

Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
The Evolution of Remote Server Management
The Evolution of Remote Server ManagementThe Evolution of Remote Server Management
The Evolution of Remote Server Management
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 

Introductiontopcoperationsncii 130724004019-phpapp01

  • 1. Introduction to PC Operations NC II/ Computer Education I Mrs. Lanie P. Plecerda Instructor 3
  • 2. MSWord - Wordprocessing MS Excel – Spreadsheet application MS Powerpoint – Presentation Internet – Email and search the web
  • 3. Introduction Computer – a machine that performs tasks, such as calculations or electronic communications, under the control of a set of instructions called a program. Elements of a Computer System 1. Human Resources 2. Hardware 3. Software
  • 4. Elements of a Computer System Human Resources – are required to perform the planning, operations, and some of the controls external to the physical computer. Ex. Computer Operator, System Analyst and Computer Programmer Hardware – refers to the physical components of a computer system or an electronic components that make up the computer system. Software – is intangible and can only be seen but not felt. It is an instruction that tell a computer exactly what to use and what sequence of operations to perform with the data.
  • 5. Major Hardware Components CPU – is the heart and brain of the computer. It allow the computer to “think” about the input given. Memory – is classified either as primary and secondary I/O Devices – these are devices attached to the main unit to facilitate communication (or interface) between the user and the computer.
  • 6. Three Main Components of CPU 1. Control Unit – which is responsible for maintaining order among the hardware components. It acts like a traffic director; it controls and directs the flow of information between the input/output units and the central processor. 2. ALU (Arithmetic Logic Unit) – which is responsible for manipulating the data as required. It contains all the electronic circuits for performing the arithmetic calculations and logical comparisons. 3. Registers – which serve as temporary storage areas for data during processing.
  • 7. Software a. Firmware – is software stored permanently in chips in the computer’s circuitry making in unalterable by computer users. b. Operating System – Ex. DOS, Windows XP c. Application Software – is software that performs a specific task such as word processing, spreadsheet design or database management. d. System Software – is software that is used to operate and maintain a computer system.
  • 8. Light Pen Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held pointer contains sensors that send signals to the computer whenever light is recorded. The computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty times every second. Because of this, the computer is able to determine the pen’s position by noting exactly when the pen detects the electron beam passing its tip. Light pens are often used in computer-aided design and computer-aided manufacture (CAD and CAM) technology because of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on a computer display screen.
  • 9. A personal computer (PC) enables people to carry out an array of tasks, such as word processing and slide presentations. With a connection to the Internet, users can tap into a vast amount of information on the World Wide Web, send e-mail, and download music and videos. As a family tool, the PC may be used for school, research, communication, record keeping, work, and entertainment.
  • 10. Computer System A typical computer system consists of a central processing unit (CPU), input devices, storage devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations. The registers store data and keep track of operations. The control unit regulates and controls various operations. The internal bus connects the units of the CPU with each other and with external components of the system. For most computers, the principal input device is a keyboard. Storage devices include external floppy disc drives and internal memory boards. Output devices that display data include monitors and printers.
  • 11. Memory ROM (Read Only Memory) – is non-volatile since its contents are not erased when the power is off. RAM (Random Access Memory) – is volatile, its contents are lost when power is off, thus the need for secondary storage where documents and resulting information can be stored. Primary - it is a storage which is immediately accessible to the computer. Secondary – holds data for a long period of time.
  • 12. Three Basic Operations INPUT – computer is supplied with necessary data and processing instructions. PROCESSING/COMPUTING – the input data is processed and the answers computed accordingly to the instructions. OUTPUT – the answers or results are reported back to the computer user.
  • 13. Characteristics of a Modern Computer 1. Electronic 2. Internal storage – used for storing both the computer program and data being processed. 3. Stored Program – the program of instructions which stipulates the sequential operations that the computer is to carry out. 4. Program modification – ability to automatically modify a program.
  • 14. Advantages of Using a Computer 1. Speed – it saves a tremendous amount of time 2. Accuracy – if the computer is properly programmed and provided with accurate data, it will do the intended work with unerring accuracy. 3. Reliability – can work almost twenty-four hours a day with a little time-out for equipment check up and maintenance. 4. Retention – can store and save massive files of data and programs. 5. Economy – the per unit cost of processing data or doing computations by computer considerably lower than by alternative actions. 6. Versatility – can used to solve a wide variety of problems that arise in science and business.
  • 15. Limitations of Computer a. Dependence on People – it can only execute the precise instructions that human beings provide. b. Time-consuming and programming work – it is unproductive until it is given the program that tells it what operations to perform. c. Disruptiveness – the results can reduced morale, alienation, confusion and even sabotage. d. Robot-like Processing – it is a big dumb machine, dependent entirely on those who control it. e. Computer Security – other security systems are computer controlled, responding to specific pre- recorded voice commands or physical characteristics lie handprints.
  • 16. Kinds of Computer General Purpose Computer – used for a wide variety of applications such inventory, payroll, accounting, market research and sales analysis. Special Purpose Computer – incorporated many features of general purpose computers but support highly specialized data processing tasks. Ex. Navigational computer on an airplane.