The document discusses the key internal and external components of a personal computer (PC). It identifies external components like the case, monitor, keyboard, and mouse. It then describes important internal components such as the motherboard, central processing unit (CPU), drives, expansion cards, memory, and power supply. The document provides details on how these components work and their functions within the PC.
A+ certification (Core hardware) Pc Maintenance muhammadishrat11
What does A+ Certification mean?
The A+ certification is a basic certification that demonstrates proficiency with computer hardware and operating systems (OS). It is governed by nonprofit trade association CompTIA. The A+ certification helps prove the recipient's proficiency with the use of computers and related devices.
Techopedia explains A+ Certification
Core elements of A+ certification criteria include knowledge of computer anatomy, which is why many experts suggest that those pursuing this credential practice assembling and disassembling a physical computer. Other areas involve operating systems (OS) and knowledge of Microsoft products. Those seeking A+ certification also should be knowledgeable about certain tasks, like booting up a computer with various installed operating systems (OS).
In addition to hardware configuration aspects, the A+ test also covers computer data usage elements, such as the basic structure of binary data and various aspects of file input/output (I/O). Test prep materials and other resources showing specific A+ certification test topics are available.
A+ certification (Core hardware) Pc Maintenance muhammadishrat11
What does A+ Certification mean?
The A+ certification is a basic certification that demonstrates proficiency with computer hardware and operating systems (OS). It is governed by nonprofit trade association CompTIA. The A+ certification helps prove the recipient's proficiency with the use of computers and related devices.
Techopedia explains A+ Certification
Core elements of A+ certification criteria include knowledge of computer anatomy, which is why many experts suggest that those pursuing this credential practice assembling and disassembling a physical computer. Other areas involve operating systems (OS) and knowledge of Microsoft products. Those seeking A+ certification also should be knowledgeable about certain tasks, like booting up a computer with various installed operating systems (OS).
In addition to hardware configuration aspects, the A+ test also covers computer data usage elements, such as the basic structure of binary data and various aspects of file input/output (I/O). Test prep materials and other resources showing specific A+ certification test topics are available.
COMPONENTS OF COMPUTER
System unit
WHAT IS DATA
DATA REPRESENTATION
WHAT IS BINARY
HOW TO MAKE BINARY
HOW IS A LETTER REPRESENTED IN SYSTEM PROCESSING?
WHAT IS STORAGE?
DIFFERENCE B/W MEMORY & STORAGE MEDIUM
TYPES OF STORAGE MEDIUM
1. Magnetic Tapes
2. Magnetic Disks
3. Optical Disks
COMPONENTS OF COMPUTER
System unit
WHAT IS DATA
DATA REPRESENTATION
WHAT IS BINARY
HOW TO MAKE BINARY
HOW IS A LETTER REPRESENTED IN SYSTEM PROCESSING?
WHAT IS STORAGE?
DIFFERENCE B/W MEMORY & STORAGE MEDIUM
TYPES OF STORAGE MEDIUM
1. Magnetic Tapes
2. Magnetic Disks
3. Optical Disks
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. Introduction
Personal Computers (PCs) and PC-
based equipment are based on
common hardware.
Here we’ll examine common hardware
components.
3. External components
Visible to the end-user
Required for the PC to function
Consist of
– Case
– Monitor
– Keyboard
– Mouse
4. Case (we’ll look inside later)
The case is the “box” that holds the internal
components of the PC. It protects those
delicate components from dust and debris.
5. Monitor
The monitor is the main output component
used on a PC. It’s where the computer is
able to show you what it, and you, are doing.
6. Keyboard
The keyboard is the main input device you
use with a computer or PC-based equipment.
7. Mouse
On any PC that uses graphics (pictures), a
mouse is an essential input device that allows
you to control the PC.
8. Internal Components
Remember the case? We said it
contained internal components.
Internal components are the parts of the
computer that do most of the work,
though they are behind the scenes.
Understanding their basic functions is
important to understanding the PC as a
whole.
12. CPU
The CPU (Central Processing Unit) is the
brain of the PC. All work done by the PC
involves the CPU in some way. The CPU
plugs into the motherboard.
14. Drives
There are many kinds of drives in a computer:
CDROM drives, hard drives, floppy drives, ZIP drives,
tape drives, pen drives. The basic function of all
drives is to store information (more on this later).
18. RAM
Random Access Memory (RAM) is memory that the
CPU uses when performing its tasks.
RAM consists of chips that plug into the motherboard.
In general, the more RAM you have, the better.
19. Expansion Cards
Expansion cards are circuit boards that
plug into the motherboard to expand its
capabilities. Sound cards are an
example. One required expansion card
is the video card, which connects to the
monitor.
20. Video card
Normally an expansion card, but sometimes
built into the motherboard (integrated), the
video card has 15 holes, in three rows of five.
21. Power Supply
The power supply is crucial to the PC. It converts
power from the wall outlet into power the PC can use.
It powers all internal components, including the
motherboard and drives.
22. Communication Ports
In industry, non-integrated PCs must
connect to external machines, such as:
– CNC machines
– Automobiles
– Robotic devices
These connections are made via
communication ports.
23. Communication Ports
Common communication ports are:
– Keyboard
– Mouse
– Serial
– Parallel
– Modem
– Network Interface Card (NIC)
– USB
24. Keyboard
Barcode readers often attach to keyboard
ports.
Keyboard ports appear in DIN5 and PS/2 or
Mini-DIN6 (below).
25. Mouse
Some input devices connect via a mouse port.
Common mouse ports are PS/2 (Mini-DIN6) on the
left and serial (9 pin male) on the right.
Don’t connect a mouse-port device to a keyboard
port.
26. Serial
Serial ports are fairly slow ports that can transmit
data over a long distance (hundreds of feet).
Serial ports are either 9 or 25 pin.
Serial ports are male (plugs) on the PC.
27. Parallel
Parallel ports are normally used for output to
printing devices.
Parallel ports are 25 pin female (socket) on
the PC.
28. Modem
Modems are normally expansion cards that
contain two phone jacks.
They communicate via phone lines to remote
devices.
29. Network Interface Card (NIC)
NICs are expansion cards that connect PC devices to
networks via special network cable.
Many connections to external machines are now
made via NICs, which normally have one port.
30. USB
A popular technology to connect to external devices
is USB, which can support 127 devices.
USB will eventually replace keyboard, serial, and
parallel ports.
31. Compare Communications Ports
Parallel is normally used for output only.
Keyboard and mouse ports are
normally input only.
Serial, NIC, Modem and USB are bi-
directional (input and output).
32. Storage Devices
Storage is easiest to think of in terms of
primary and secondary.
Primary storage is used by the CPU.
The primary example is RAM. Primary
loses information without power.
Secondary devices can store data
without power. Drives are the main
secondary storage devices.
36. Storage Reminders
RAM stores information that is currently
active.
Information in RAM must be saved to
secondary storage or it will be lost when
power is removed.
Secondary storage keeps data unless
the user removes it (or the device fails).
37. RAM vs. ROM
RAM stands for Random Access
Memory
RAM changes constantly as the CPU
needs different items in memory based
on the user’s requests.
RAM is lost when power is removed.
38. ROM
•ROM stands for Read Only Memory
•ROM does not change.
•ROM is not lost when the power is
removed from a PC.
•ROM stores key instructions that the
computer needs to boot up and operate.
39. Computer Hardware Components
– How did the computer become known as the
stored-program computer?
• Do they all have the same characteristics?
– Memory on chips and memory on magnetic
media, how do they differ?
– What do you look for when comparing memory
devices?
– How is information moved around within the
computer?
– How can you help your computer run better?
40. Basic Concepts of Computer
Hardware
This model of the typical digital computer is often called the von
Neumann computer.
– Programs and data are stored in the same
memory: primary memory.
– The computer can only perform one instruction
at a time.
CPU
(Central Processing Unit)
Input
Units
Output
Units
Primary Memory
41. Basic Concepts of Computer
Hardware
Input/Output (I/O): Refers to the
process of getting information into and
out of the computer.
– Input: Those parts of the computer
receiving information to programs.
– Output: Those parts of the computer that
provide results of computation to the
person using the computer.
42. Sources of Data
for the Computer
Two types of data stored within a computer:
– Original data or information: Data being
introduced to a computing system for the first
time.
• Computers can deal directly with printed text, pictures,
sound, and other common types of information.
– Previously stored data or information: Data
that has already been processed by a computer
and is being stored for later use.
• These are forms of binary data useful only to the
computer.
• Examples: Floppy disks, DVD disks, and music CDs.
43. Input Devices
Two categories of input hardware:
– Those that deal with original data.
– Those that handle previously stored data.
44. Input Devices
Input hardware: Those that deal with original data.
– Keyboard
– Mouse
– Voice recognition hardware
– Scanner
– Digital camera
Digitizing: The process of taking a visual image, or
audio recording and converting it to a binary form for
the computer.
– Used as data for programs to display, play or manipulate the
digitized data.
45. Input Devices
Connecting Hardware to the computer:
– Hardware needs access through some general
input/output connection.
• Port: The pathway for data to go into and out of the
computer from external devices such as keyboards.
– There are many standard ports as well as custom
electronic ports designed for special purposes.
– Ports follow standards that define their use.
» SCSI, USB: Multiple peripheral devices (chain).
» RS-232, IDE: Individual peripheral devices.
• Peripheral device: A piece of hardware like a printer or
disk drive, that is outside the main computer.
46. Input Devices
Connecting Hardware to the computer:
(continued)
– Hardware needs software on the computer
that can service the device.
• Device driver: Software addition to the
operating system that will allow the computer to
communicate with a particular device.
47. Input Devices
Common Basic Technologies for
Storing Binary Information:
– Electronic
– Magnetic
– Optical
48. Input Devices
Electronic Circuits
– Most expensive of the three forms for
storing binary information.
– A flip-flop circuit has either one electronic
status or the other. It is said to flip-flop from
one to the other.
– Electronic circuits come in two forms:
• Permanent
• Non-permanent
49. Input Devices
Magnetic Technology
– Two parts to most of the magnetic forms of
information storage:
• The medium that stores the magnetic information.
– Example: Floppy disk. Tiny spots on the disk are
magnetized to represent 0s and 1s.
• The device that can “read” that information from the
medium.
– The drive spins the disk.
– It has a magnetic sensing arm that moves over the disk.
– Performs nondestructive reading.
50. Input Devices
Optical
– Uses lasers to “read” the binary information
from the medium, usually a disc.
• Millions of tiny holes are “burned” into the
surface of the disc.
• The holes are interpreted as 1s. The absence
of holes are interpreted as 0s.
51. Input Devices
Secondary Memory Input Devices
– These input devices are used by a
computer to store information and then to
retrieve that information as needed.
• External to the computer.
• Commonly consists of floppy disks, hard disk
drives, or CD-ROMs.
– Secondary memory uses binary.
• The usual measurement is the byte.
– A byte consists of 8 binary digits (bits). The byte is a
standard unit.
52. Input Devices
The four most important characteristics
of storage devices:
– Speed and access time
– Cost / Removable versus non-removable
– Capacity
– Type of access
53. Input Devices
Speed (Access time) - How fast
information can be taken from or stored
onto the computer memory device’s
medium.
– Electronic circuits: Fastest to access.
• 40 billionths of a second.
– Floppy disks: Very slow in comparison.
• Takes up to 1/2 second to reach full speed
before access is even possible.
54. Input Devices
Cost
– Megabyte: A Million bytes.
– Gigabyte: A billion bytes.
– Two parts to a removable secondary storage device:
• The cost of the medium. (Cheaper if bought in quantity)
• The cost of the drive.
Examples: Cost for drive Cost for medium
Floppy drive (1.4MB) 59.00 .50
Zip 100 (100 MB) 99.00 10.00
CD-WR (650 MB) 360.00 and up 1.00
55. Input Devices
Capacity - The amount of information that can be
stored on the medium.
Unit Description Approximate Size
1 bit 1 binary digit
1 nibble 4 bits
1 byte 8 bits 1 character
1 kilobyte 1,024 bytes ≈1/2 page, double spaced
1 megabyte 1,048,576 bytes ≈500,000 pages
1 million bytes
1 gigabyte 1,073,741,824 bytes ≈5 million pages
1 billion bytes
1 terabyte 1 trillion bytes ≈5 billion pages
56. Input Devices
Type of Access
• Sequential - Obtained by proceeding through
the storage medium from the beginning until
the designated area is reached (as in magnetic
tape).
• Random Access - Direct access (as in floppy
and hard disks).
57. Primary Memory
Primary storage or memory: Is where the data and program that are
currently in operation or being accessed are stored during use.
– Consists of electronic circuits: Extremely fast and
expensive.
– Two types:
• RAM (non-permanent)
– Programs and data can be stored here for the computer’s
use.
– Volatile: All information will be lost once the computer
shuts down.
• ROM (permanent)
– Contents do not change.
58. The Central Processing Unit
The Central Processing Unit ( CPU)
– Often referred to as the “brain” of the computer.
– Responsible for controlling all activities of the
computer system.
– The three major components of the CPU are:
1. Arithmetic Unit (Computations performed)
Accumulator (Results of computations kept here)
2. Control Unit (Has two locations where numbers are kept)
Instruction Register (Instruction placed here for analysis)
Program Counter (Which instruction will be performed next?)
3. Instruction Decoding Unit (Decodes the instruction)
– Motherboard: The place where most of the
electronics including the CPU are mounted.
59. Output Devices
Output units store and display information
(calculated results and other messages) for
us to see and use.
– Floppy disk drives and Hard disk drives.
– Display monitors: Hi-resolution monitors come in
two types:
• Cathode ray tube (CRT) - Streams of electrons make
phosphors glow on a large vacuum tube.
• Liquid crystal display (LCD) - A flat panel display that
uses crystals to let varying amounts of different colored
light to pass through it.
– Developed primarily for portable computers.
60. Output Devices
Audio Output Devices
– Windows machines need special audio card for
audio output.
– Macintosh has audio playback built in.
– Audio output is useful for:
• Music
– CD player is a computer.
– Most personal computers have CD players that can access
both music CDs and CD-ROMs.
• Voice synthesis (becoming more human sounding.)
• Multimedia
• Specialized tasks (i.e.: elevator’s floor announcements)
61. Output Devices
Optical Disks: CD-ROM and DVD
– CD-ROM (Compact Disk - Read Only Memory)
• By its definition, CD-ROM is Read Only.
• Special CD drives “burn” information into blank CDs.
– Burn: A laser is used to “burn” craters into the surface to
represent a binary 1.
– Two main types of CDs:
» CD-R (Compact Disk - Recordable)
» CD-WR (Compact Disk - ReWritable)
• It takes longer to write to a CD-R than a hard drive.
• Special software is needed to record.
62. Output Devices
DVD (Digital Versatile Disk)
– Allows up to 17 gigabytes of storage (from
4.7 GB to 17 GB).
– Compatible with older CD-ROM
technology.
– The four versions of the DVD:
63. Output Devices
Storage Requirements: How much storage
capacity is needed for…
– One keystroke on a keyboard. 1 byte (8 bits)
– One page single-spaced document. 4.0 K
– Nineteen pages formatted text. 75 K
– One second of high-fidelity sound. 95-110 K
– Complete word processing program. 8.4 MG
Storage Capacity: How much data can be
stored on…
– One inch of 1/2 in. wide magnetic tape. 4 K
– One 3 1/2” floppy disk, high density. 1.4 MG
– One Compact Disk. 650 MG
– One DVD. up to 17 GB
64. Moving Information
Within the Computer
How do binary numerals move into, out of,
and within the computer?
– Information is moved about in bytes, or multiple
bytes called words.
• Words are the fundamental units of information.
• The number of bits per word may vary per computer.
• A word length for most large IBM computers is 32 bits:
65. Moving Information
Within the Computer
Bits that compose a word are
passed in parallel from place
to place.
– Ribbon cables:
• Consist of several wires,
molded together.
• One wire for each bit of
the word or byte.
• Additional wires
coordinate the activity of
moving information.
• Each wire sends
information in the form
of a voltage pulse.
66. Moving Information
Within the Computer
Example of sending
the word WOW over
the ribbon cable
– Voltage
pulses
correspondi
ng to the
ASCII
codes
would pass
through the
cable.
67. Packaging the Computer
The many physical forms of the
general purpose computer:
– All follow general
organization:
• Primary memory
• Input units
• Output units
• Central Processing Unit
– Grouped according to
speed, cost, size, and
complexity.
Super Computers
Mainframe Computers
Minicomputers
Microcomputer
Palmtop Computer
Calculator
Fast Expensive Complex Large
Slow Cheap Simple Small
68. Software Tools for Maintaining
Your Computer Hardware
Utility Programs exist that can help diagnose and solve computer
hardware problems.
– Four major problem areas where utility programs
are helpful:
• Finding and fixing problems.
– Testing Input/Output peripherals.
– Testing RAM, motherboard, video cards.
– Recovering deleted files or fixing damaged disks.
• Improving computer performance.
– De-fragmenting a disk (Packs all files closer together).
• Preventative maintenance.
• Troubleshooting.
– Locates incompatible programs.
69. Overview
The PC consists of common external
and internal components.
Each component has a specific task.
Communication ports connect to
external devices.
Storage devices are classified and
primary or secondary.