SlideShare a Scribd company logo
1 of 25
OVER VIEW OF COMPUTER
 ABOUT NUMBER SYSTEM
 HOW TO IDENTIFY THE SYSTEM
CONFIGURATION
 ALL THE PARTS OF COMPONENTS IN A
DESKTOP PC
 I/O PORTS COMPONENTS
 CABLES AND CONNECTERS
DECIMAL BINARY OCTEL HEXA-DECIMAL
0 -9 0,1 0-7 0-9
A-F
USES IN
IPV4
ADDRESSING
EX:
192.168.100.10
USES IN
MACHINE
LANGUAGE
EX:
COMPUTER
LANGUAGE
USES IN
COMPUTER
MEMORY
EX:KB/MB/GB/T
B
8 Bit=1 Byte
1024 Byte =
1MB
1024MB=1GB
USES IN
IPV6
ADDRESSING
AND MAC
ADDRESSING
EX:
FEX0:2FD0:E201
:1FE1:EEC0:ABC
D:EADC:
MAC ADDRESS:
A2-CA-F2-FF-
D3-A9
 DECIMAL TO BINARY
 DECIMAL TO OCTEL
 DECIMAL TO HEXA-DECIMAL
EX: DECIMAL VALUE 241
CONVERT TO BINARY
1 1 1 1 0 0 0 1
CONVERT TO OCTEL
3 6 1
 CONVERT DECIMAL TO HEXA-DECIMAL
 241 WILL BE F1
DECIMAL
241
BINARY
11110001
OCTEL
361
HEXA-
DECIMAL
F1
 STEP 1:GO TO MY COMPUTER DESKTOP ICON
 STEP 2:RIGHT CLICK PROPERTIES
 STEP 3:CHOOSE DEVICE MANAGER
 STEP 4: RIGHT CLICK MY COMPUTER
 STEP 5: CHOOSE MANAGE
THE ABOVE COMPONENTS WHICH HELP
YOU TO BUILT A OWN PC
THANK YOU SO MUCH FOR YOUR
INTEREST AND ATTENTION

More Related Content

Similar to Overview of Computers ABOUT NUMBER SYSTEM HOW TO IDENTIFY THE SYSTEM CONFIGURATION ALL THE PARTS OF COMPONENTS IN A DESKTOP PC

Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interruptTech_MX
 
EthernetDisk arrayLink builderFirewallCisco Router.docx
EthernetDisk arrayLink builderFirewallCisco Router.docxEthernetDisk arrayLink builderFirewallCisco Router.docx
EthernetDisk arrayLink builderFirewallCisco Router.docxelbanglis
 
EthernetDisk arrayNo symbols exist on t
EthernetDisk arrayNo symbols exist on tEthernetDisk arrayNo symbols exist on t
EthernetDisk arrayNo symbols exist on tBetseyCalderon89
 
8086 Micro-processor and MDA 8086 Trainer Kit
8086 Micro-processor and MDA 8086 Trainer Kit8086 Micro-processor and MDA 8086 Trainer Kit
8086 Micro-processor and MDA 8086 Trainer KitAmit Kumer Podder
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in LinuxMohammed Yazdani
 
YOKOGAWA CENTUM CS 3000 R3
YOKOGAWA CENTUM CS 3000 R3YOKOGAWA CENTUM CS 3000 R3
YOKOGAWA CENTUM CS 3000 R3Rehan Fazal
 
EthernetSatellite dishInternational Plastics, Inc. - C.docx
EthernetSatellite dishInternational Plastics, Inc. -  C.docxEthernetSatellite dishInternational Plastics, Inc. -  C.docx
EthernetSatellite dishInternational Plastics, Inc. - C.docxdebishakespeare
 
8. Kevin Stanton-report PSUBOT
8. Kevin Stanton-report PSUBOT8. Kevin Stanton-report PSUBOT
8. Kevin Stanton-report PSUBOTKarl Radestam
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101grantsupplies
 
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docx
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docxVisio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docx
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docxdickonsondorris
 
MICROPROCESSOR-LAB-VI-SEM.pdf
MICROPROCESSOR-LAB-VI-SEM.pdfMICROPROCESSOR-LAB-VI-SEM.pdf
MICROPROCESSOR-LAB-VI-SEM.pdfbhattparthiv23
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfQual4
 
Lecture 2 (system overview of c8051 f020) rv01
Lecture 2 (system overview of c8051 f020) rv01Lecture 2 (system overview of c8051 f020) rv01
Lecture 2 (system overview of c8051 f020) rv01cairo university
 

Similar to Overview of Computers ABOUT NUMBER SYSTEM HOW TO IDENTIFY THE SYSTEM CONFIGURATION ALL THE PARTS OF COMPONENTS IN A DESKTOP PC (20)

Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
 
EthernetDisk arrayLink builderFirewallCisco Router.docx
EthernetDisk arrayLink builderFirewallCisco Router.docxEthernetDisk arrayLink builderFirewallCisco Router.docx
EthernetDisk arrayLink builderFirewallCisco Router.docx
 
1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL
 
EthernetDisk arrayNo symbols exist on t
EthernetDisk arrayNo symbols exist on tEthernetDisk arrayNo symbols exist on t
EthernetDisk arrayNo symbols exist on t
 
8086 Micro-processor and MDA 8086 Trainer Kit
8086 Micro-processor and MDA 8086 Trainer Kit8086 Micro-processor and MDA 8086 Trainer Kit
8086 Micro-processor and MDA 8086 Trainer Kit
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
 
COA_mod2.ppt
COA_mod2.pptCOA_mod2.ppt
COA_mod2.ppt
 
YOKOGAWA CENTUM CS 3000 R3
YOKOGAWA CENTUM CS 3000 R3YOKOGAWA CENTUM CS 3000 R3
YOKOGAWA CENTUM CS 3000 R3
 
EthernetSatellite dishInternational Plastics, Inc. - C.docx
EthernetSatellite dishInternational Plastics, Inc. -  C.docxEthernetSatellite dishInternational Plastics, Inc. -  C.docx
EthernetSatellite dishInternational Plastics, Inc. - C.docx
 
CH06 (1).PPT
CH06 (1).PPTCH06 (1).PPT
CH06 (1).PPT
 
8. Kevin Stanton-report PSUBOT
8. Kevin Stanton-report PSUBOT8. Kevin Stanton-report PSUBOT
8. Kevin Stanton-report PSUBOT
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docx
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docxVisio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docx
Visio 2010RiordanMfgNetworkAlbanyDiagram.vsdEthernetDisk .docx
 
MICROPROCESSOR-LAB-VI-SEM.pdf
MICROPROCESSOR-LAB-VI-SEM.pdfMICROPROCESSOR-LAB-VI-SEM.pdf
MICROPROCESSOR-LAB-VI-SEM.pdf
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdf
 
Lecture 2 (system overview of c8051 f020) rv01
Lecture 2 (system overview of c8051 f020) rv01Lecture 2 (system overview of c8051 f020) rv01
Lecture 2 (system overview of c8051 f020) rv01
 
Chapter8.ppt
Chapter8.pptChapter8.ppt
Chapter8.ppt
 
Week7 final
Week7 finalWeek7 final
Week7 final
 
Wk1to4
Wk1to4Wk1to4
Wk1to4
 
Bus interface 8086
Bus interface 8086Bus interface 8086
Bus interface 8086
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Overview of Computers ABOUT NUMBER SYSTEM HOW TO IDENTIFY THE SYSTEM CONFIGURATION ALL THE PARTS OF COMPONENTS IN A DESKTOP PC

  • 1. OVER VIEW OF COMPUTER
  • 2.  ABOUT NUMBER SYSTEM  HOW TO IDENTIFY THE SYSTEM CONFIGURATION  ALL THE PARTS OF COMPONENTS IN A DESKTOP PC  I/O PORTS COMPONENTS  CABLES AND CONNECTERS
  • 3. DECIMAL BINARY OCTEL HEXA-DECIMAL 0 -9 0,1 0-7 0-9 A-F USES IN IPV4 ADDRESSING EX: 192.168.100.10 USES IN MACHINE LANGUAGE EX: COMPUTER LANGUAGE USES IN COMPUTER MEMORY EX:KB/MB/GB/T B 8 Bit=1 Byte 1024 Byte = 1MB 1024MB=1GB USES IN IPV6 ADDRESSING AND MAC ADDRESSING EX: FEX0:2FD0:E201 :1FE1:EEC0:ABC D:EADC: MAC ADDRESS: A2-CA-F2-FF- D3-A9
  • 4.  DECIMAL TO BINARY  DECIMAL TO OCTEL  DECIMAL TO HEXA-DECIMAL EX: DECIMAL VALUE 241 CONVERT TO BINARY 1 1 1 1 0 0 0 1 CONVERT TO OCTEL 3 6 1
  • 5.  CONVERT DECIMAL TO HEXA-DECIMAL  241 WILL BE F1 DECIMAL 241 BINARY 11110001 OCTEL 361 HEXA- DECIMAL F1
  • 6.
  • 7.
  • 8.  STEP 1:GO TO MY COMPUTER DESKTOP ICON  STEP 2:RIGHT CLICK PROPERTIES  STEP 3:CHOOSE DEVICE MANAGER  STEP 4: RIGHT CLICK MY COMPUTER  STEP 5: CHOOSE MANAGE
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. THE ABOVE COMPONENTS WHICH HELP YOU TO BUILT A OWN PC
  • 25. THANK YOU SO MUCH FOR YOUR INTEREST AND ATTENTION