SlideShare a Scribd company logo
Welcome T The World OF
Computer Components
Muneeb-Ahmad
CPU(Central Processing Unit)

CPU (Central Processing Unit) kown as the
"Brain" of a computer.

The CPU is responsible for executing a chain of
stored recommendations referred to as a
application. This software will take inputs from
an input device, process the enter come what
may and output the results to an output device.
Cable

A cable is an extended strand of
metallic that is used to switch
knowledge from one aspect or
device on a pc to a further factor
or device (gadget).

Its is mainly created from a
metal one of these copper and
covered with protecting plastic
which is referred to as the
insulator
Celeron

A Celeron is a member of the family of
microprocessors from Intel

Produced from 1998 to present day

It is intel's low-end line up of processors used
for low powered computing purposes
Pentium

A Pentium is a line up of intel processors

Introduced in 1993 with clocked
frequency
ranging from 60 to 66 MHz
• Pentium is rated above the Celeron and
atom processors but rated lower than the
i3 i5 and i7 processors intel makes.
• They are produced in 32 bit 64 bit and
x86 variants and are usually used for
casual computing
Fan

A componenets inside the computer to bring the air
into or outo of a computer case

Fans avoid overheating, instability, malfunction and
harm main to a shortened aspect lifespan

They come in very diferent sizes Ranging from 120mm
to 200mm

May also contain LED for sloely aesthetic prepossess.
MALWARE

Malware are kown as malicious software or
virus. To be specific malware are any program or
file that is harmful to any computer user.

In Spanish, "mal" means "bad," creating the term
"badware," which is a great way to understand
the meaing this term (even if you are not Spanish)

Commonly you get this virus from internet by
downloading free program etc.

Created by human in . Solely reasons, scientist
created these virus for simply to build cash in
their pockets.

Can be preventable with many program. For
example, AVG
Antivirus,RegCurePro,NortornAnitvirus etc.
USB

USB is commonly known as Universal Serial
Bus and is used to allow computers to
communicate with other hardware.

Usb is the most common way of
communication between computers, that are
being used in today life. Its can be used to
connect keyboards, mice, charging cables,
and flash drives etc.

Flash drives are often referred to as USBs.
They are used to transfer data from the one
hardware to the other hardware. Like they are
communicating and exhange information
Floppy

Follpy is also knowns as floppy disks,Like flash drives, used to
store information just like fash drive but flash driver are the
updated version.

Can be read and written in Floppy Disk Drive.

They were first created in 1967

Floppy disks are avilable in three sizes: 8’’, 5.25’’, and
3.5’’

The 3.5’’variant is that the commonest these days
*Power Supply

The power supply is hardware which provides the other
hardware components with power supply
(electricity).

These compents helps the computer turn on

The job of the Power supply is to convert the AC current
from the power outlet into DC current for the use by a
computer
AMD

Asynchronous module definition
(AMD)s is a format is to provide a
solution for modular JavaScript that
developers can use today.

Used in many aplication realted to
building website which helps the
maker to eaily locate the problem
and helps the maker to find the
solution

The polpular used program taht
contain this components is: Brackers,
Sublime etc.
Sound Card

Sound cards are a physical component of
computers which convert digital information into
analog sound, which can be heard through
speakers.

Sound cards have output and input capabilities

Now a days they are rather popluar and they have
begun to become for many indiviuals an inessential
need
Video Card

Also called graphic cards, video
cards are a physical parts of
computers which are used to display
graphics on a monitor screen.

Almost used in every area beside
radios.

Because video cards will generate
heaps of warmth, most video cards
have a conductor.

Some also employ a fan to help with
cooling.
Motherboard

Motherboard knowns because the brain of a compture

The motherboard contains the connectors for attaching further
boards. Frequently, the motherboard involves the CPU, BIOS,
memory, mass storage interfaces, serial and parallel ports,
expansion slots, and all the controllers required to control regular
peripheral instruments, such as visual display unit, keyboard, and
disk pressure.
RAM

RAM stands for Random Access
Memory

A type of computer program tha can
be access randomly

RAM is hardware used to store and
retrieve information

RAM can access data much faster
then ROM, though RAM requires
power to keep the data accessible
ROM

ROM stands for Read-Only Memory

Like RAM, ROM is also hardware used to
store and access data.

ROM can only be read and not modified

Unlike RAM, ROM does not require power to
keep and access data
EPROM

EPROM stands for Erasable
Programmable Read-Only Memory is
programmable that can be erased and
resued.

Erasure is caused by shining an intense
ultraviolet light through a window that
is designed into the memory chip

Due to ultraviolet light clears its
contents, making it possible to reproram
the memory

The most frequent use for an EPROM
memory chip is to store pc BIOS.
Client

The client is a part of a client-server architecture. Often, a client is
an utility that runs on a private pc or workstation and relies on a
server to perform some operations. For instance, an electronic mail
client is an application that enables you to ship and receive e mail.
Email Address

A name that identifies an electronic post workplace box on a network
wherever e-mail is sent. Different varieties of networks have completely
different formats for e-mail addresses. On the Internet, all e-mail addresses
have the form:

@<domain name >

For example,webmaster@sandybay.com

Every user on the web contains a distinctive e-mail address. Th term e-
address is a symbol that is commonly used for e-mail address
CACHE

A cache is a place to store
something transitorily in a
computing environment. It's
pronounced CASH.

Is used to speed up the retrival
process in computer

In computing, active data is often
cached to abbreviate data access
times, reduce latency and
ameliorate input/output. Because
virtually all computer application
workload is dependent upon
input and output operations,
caching is utilized to amend
application performance.
CD ROM

CD ROM stands for Compact Disc-Read-Only Memory,

a type of optical disk capable of storing large amounts of data -- up to 1GB

A single CD-ROM has the storage capacity of 700 floppy disks

To read a CD, you need a CD-ROM player. Thats is installed in almost
every computer.

You can use cd to store or play videogame, audio, movie etc.

To add or store some data on the Cd Rom. You need Cd writer.Which are
used by many coftware industries.
DVD-RW

A DVD-RW disc is a rewritable optical
disc with equal storage capacity to a
DVD-R, typically 4.7 GB

Developed by Pioneer in November 1999

The primary advantage of DVD-RW(DVD
Writer) over DVD-R(DVD Read Only) is
the ability to erase and rewrite to a DVD-
RW disc.

One benefit to using a rewritable disc is if
there are writing errors when recording
data, the disc is not ruined and can still
store data by erasing the faulty data.

Data can thus be written, erased and re-
written.
Modem

Modem a device thats is used for computer to send the data to
other technology. For example Computer information is stored
digital form, whereas information transmitted over telephone lines
is transmitted in the form of analog waves.Which computer cannot
understand nor the data from the computer(understand only
didgital,not analog) to telephone(only understand analog, no
didgital). So to help them commuincate A modem is used, to
converts the waves or data between these two forms. From didtal to
analog, From analog to digital.Which help them communicate.
MP3

Stand s for MPEG-1 Audio Layer-3

MP3 is a lossy data compression format for audio

Is used to make smaller computer file containing digitale music
and other sounds.

Maintaing nearly the same Cd quality sound.

Because of its small size and pleasent reliability, MP3 files have
become a popular way to store music file both in computer in
phone like ipod etc.Which now are used to listen music
VIRUS

A computer virus is a program or piece
of code thats is that is loaded onto your
computer without your knowledge from
internet or anyother software that
download from internet and its runs
against your wishes on your PC.

Many virus that are used they make a
copy of thmselves consuming your
avaliable memory which brings the
system to halt. All computer viruses are
man-made.

An even more dangerous type of virus is
capbale of bypassing the security of a
computer maikng the computer unable
to block any virus.
Technology Term Definition  By Muneeb-Ahmad
Technology Term Definition  By Muneeb-Ahmad
Technology Term Definition  By Muneeb-Ahmad
Technology Term Definition  By Muneeb-Ahmad
Technology Term Definition  By Muneeb-Ahmad
Technology Term Definition  By Muneeb-Ahmad

More Related Content

What's hot

Ghel os
Ghel osGhel os
Ghel os
ghel albanio
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
K. A. M Lutfullah
 
Lecture-2(1): Computer Hardware & System Components
Lecture-2(1): Computer Hardware & System Components Lecture-2(1): Computer Hardware & System Components
Lecture-2(1): Computer Hardware & System Components
Mubashir Ali
 
Parts of a computer
Parts of a computerParts of a computer
Parts of a computer
kjosorio00
 
General Information About Information Technologies
General Information About Information TechnologiesGeneral Information About Information Technologies
General Information About Information Technologiestechgajanan
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
Sonnie Bars
 
Computer basics
Computer basicsComputer basics
Computer basics
Kumar Sambhav
 
18. the components of the system unit
18. the components of the system unit18. the components of the system unit
18. the components of the system unit
Zambales National High School
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02theiluminados
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devicesShaharizan Hassan
 
Informatics practices project by sagar mandloi
Informatics practices project by sagar mandloiInformatics practices project by sagar mandloi
Informatics practices project by sagar mandloi
sagar mandloi
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Laura Gálvez
 
Cat info mgt
Cat info mgtCat info mgt
Cat info mgt
Isle of Man College
 
Computer Hardware - Platforms and Technologies
Computer Hardware - Platforms and TechnologiesComputer Hardware - Platforms and Technologies
Computer Hardware - Platforms and Technologieselectricgeisha
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
Yousaf Alam
 
A1.1 Hardware Components
A1.1 Hardware ComponentsA1.1 Hardware Components
A1.1 Hardware ComponentsJenny Duong
 

What's hot (19)

Ghel os
Ghel osGhel os
Ghel os
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Lecture-2(1): Computer Hardware & System Components
Lecture-2(1): Computer Hardware & System Components Lecture-2(1): Computer Hardware & System Components
Lecture-2(1): Computer Hardware & System Components
 
Parts of a computer
Parts of a computerParts of a computer
Parts of a computer
 
General Information About Information Technologies
General Information About Information TechnologiesGeneral Information About Information Technologies
General Information About Information Technologies
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Sound analysis draft 2
Sound analysis draft 2Sound analysis draft 2
Sound analysis draft 2
 
18. the components of the system unit
18. the components of the system unit18. the components of the system unit
18. the components of the system unit
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02
 
Notacd03
Notacd03Notacd03
Notacd03
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devices
 
Informatics practices project by sagar mandloi
Informatics practices project by sagar mandloiInformatics practices project by sagar mandloi
Informatics practices project by sagar mandloi
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)
 
Cat info mgt
Cat info mgtCat info mgt
Cat info mgt
 
Computer Hardware - Platforms and Technologies
Computer Hardware - Platforms and TechnologiesComputer Hardware - Platforms and Technologies
Computer Hardware - Platforms and Technologies
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Definitions 2
Definitions 2Definitions 2
Definitions 2
 
A1.1 Hardware Components
A1.1 Hardware ComponentsA1.1 Hardware Components
A1.1 Hardware Components
 

Viewers also liked

About Us
About UsAbout Us
About Us
HapmanMoves
 
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation MethodStealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
Zoltan Kemeny
 
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razaviDeobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
Muhammad Tariq
 
Prophesies of-aulia-allah-paish-goee
Prophesies of-aulia-allah-paish-goeeProphesies of-aulia-allah-paish-goee
Prophesies of-aulia-allah-paish-goee
Muhammad Tariq
 
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiênQT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
Công ty cổ phần GMPc Việt Nam | Tư vấn GMP, HS GMP, CGMP ASEAN, EU GMP, WHO GMP
 
Sp17 undergraduate research workshop
Sp17 undergraduate research workshopSp17 undergraduate research workshop
Sp17 undergraduate research workshop
Arizona State University
 
Led Zeppelin Presence off the record
Led Zeppelin Presence off the recordLed Zeppelin Presence off the record
Led Zeppelin Presence off the record
giuanne
 

Viewers also liked (7)

About Us
About UsAbout Us
About Us
 
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation MethodStealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
Stealth, Bullet & Explosion Proof, Battlefield Fuel Transportation Method
 
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razaviDeobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
Deobandion kay 12 aterazat ka dandan shikan jawab by sufi aziz ahmad razavi
 
Prophesies of-aulia-allah-paish-goee
Prophesies of-aulia-allah-paish-goeeProphesies of-aulia-allah-paish-goee
Prophesies of-aulia-allah-paish-goee
 
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiênQT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
QT.ĐK.06.03 - Quy trình thẩm định, xét duyệt hồ sơ ưu tiên
 
Sp17 undergraduate research workshop
Sp17 undergraduate research workshopSp17 undergraduate research workshop
Sp17 undergraduate research workshop
 
Led Zeppelin Presence off the record
Led Zeppelin Presence off the recordLed Zeppelin Presence off the record
Led Zeppelin Presence off the record
 

Similar to Technology Term Definition By Muneeb-Ahmad

BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
LordelynFrancoYusi
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
ehillpamlico
 
Parts of the computer 1.ppt
Parts of the computer 1.pptParts of the computer 1.ppt
Parts of the computer 1.ppt
ChemOyasan1
 
Hardware
HardwareHardware
Hardware
reghayrusha
 
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdfLecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
AyaulymNurdilda1
 
ICF2 (2).ppt
ICF2 (2).pptICF2 (2).ppt
ICF2 (2).ppt
IrishAbrematia
 
Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)  Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)
Kamleshwar Pandey
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1AmieBodkin
 
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfzSystem-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
IrishAbrematia
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsUday Pal
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
mite6025.hku
 
Ghel os
Ghel osGhel os
Ghel os
ghel albanio
 
GCSE ICT Revision
GCSE ICT RevisionGCSE ICT Revision
GCSE ICT Revision
Kelvin Lam
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Zo Sangpy
 

Similar to Technology Term Definition By Muneeb-Ahmad (20)

BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Parts of the computer 1.ppt
Parts of the computer 1.pptParts of the computer 1.ppt
Parts of the computer 1.ppt
 
Hardware
HardwareHardware
Hardware
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdfLecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
Lecture 2_006ce463f6b1f768ce13b30d3bca6eea.pdf
 
ICF2 (2).ppt
ICF2 (2).pptICF2 (2).ppt
ICF2 (2).ppt
 
Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)  Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1
 
Icdl Medual 1
Icdl Medual 1Icdl Medual 1
Icdl Medual 1
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfzSystem-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
System-Unit.ppt hvigxcogfogfogclgxufsfixkvxjfz
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Ghel os
Ghel osGhel os
Ghel os
 
GCSE ICT Revision
GCSE ICT RevisionGCSE ICT Revision
GCSE ICT Revision
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Chapter 1r
Chapter 1rChapter 1r
Chapter 1r
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Technology Term Definition By Muneeb-Ahmad

  • 1. Welcome T The World OF Computer Components Muneeb-Ahmad
  • 2. CPU(Central Processing Unit)  CPU (Central Processing Unit) kown as the "Brain" of a computer.  The CPU is responsible for executing a chain of stored recommendations referred to as a application. This software will take inputs from an input device, process the enter come what may and output the results to an output device.
  • 3. Cable  A cable is an extended strand of metallic that is used to switch knowledge from one aspect or device on a pc to a further factor or device (gadget).  Its is mainly created from a metal one of these copper and covered with protecting plastic which is referred to as the insulator
  • 4. Celeron  A Celeron is a member of the family of microprocessors from Intel  Produced from 1998 to present day  It is intel's low-end line up of processors used for low powered computing purposes
  • 5. Pentium  A Pentium is a line up of intel processors  Introduced in 1993 with clocked frequency ranging from 60 to 66 MHz • Pentium is rated above the Celeron and atom processors but rated lower than the i3 i5 and i7 processors intel makes. • They are produced in 32 bit 64 bit and x86 variants and are usually used for casual computing
  • 6. Fan  A componenets inside the computer to bring the air into or outo of a computer case  Fans avoid overheating, instability, malfunction and harm main to a shortened aspect lifespan  They come in very diferent sizes Ranging from 120mm to 200mm  May also contain LED for sloely aesthetic prepossess.
  • 7. MALWARE  Malware are kown as malicious software or virus. To be specific malware are any program or file that is harmful to any computer user.  In Spanish, "mal" means "bad," creating the term "badware," which is a great way to understand the meaing this term (even if you are not Spanish)  Commonly you get this virus from internet by downloading free program etc.  Created by human in . Solely reasons, scientist created these virus for simply to build cash in their pockets.  Can be preventable with many program. For example, AVG Antivirus,RegCurePro,NortornAnitvirus etc.
  • 8. USB  USB is commonly known as Universal Serial Bus and is used to allow computers to communicate with other hardware.  Usb is the most common way of communication between computers, that are being used in today life. Its can be used to connect keyboards, mice, charging cables, and flash drives etc.  Flash drives are often referred to as USBs. They are used to transfer data from the one hardware to the other hardware. Like they are communicating and exhange information
  • 9. Floppy  Follpy is also knowns as floppy disks,Like flash drives, used to store information just like fash drive but flash driver are the updated version.  Can be read and written in Floppy Disk Drive.  They were first created in 1967  Floppy disks are avilable in three sizes: 8’’, 5.25’’, and 3.5’’  The 3.5’’variant is that the commonest these days
  • 10. *Power Supply  The power supply is hardware which provides the other hardware components with power supply (electricity).  These compents helps the computer turn on  The job of the Power supply is to convert the AC current from the power outlet into DC current for the use by a computer
  • 11. AMD  Asynchronous module definition (AMD)s is a format is to provide a solution for modular JavaScript that developers can use today.  Used in many aplication realted to building website which helps the maker to eaily locate the problem and helps the maker to find the solution  The polpular used program taht contain this components is: Brackers, Sublime etc.
  • 12. Sound Card  Sound cards are a physical component of computers which convert digital information into analog sound, which can be heard through speakers.  Sound cards have output and input capabilities  Now a days they are rather popluar and they have begun to become for many indiviuals an inessential need
  • 13. Video Card  Also called graphic cards, video cards are a physical parts of computers which are used to display graphics on a monitor screen.  Almost used in every area beside radios.  Because video cards will generate heaps of warmth, most video cards have a conductor.  Some also employ a fan to help with cooling.
  • 14. Motherboard  Motherboard knowns because the brain of a compture  The motherboard contains the connectors for attaching further boards. Frequently, the motherboard involves the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control regular peripheral instruments, such as visual display unit, keyboard, and disk pressure.
  • 15. RAM  RAM stands for Random Access Memory  A type of computer program tha can be access randomly  RAM is hardware used to store and retrieve information  RAM can access data much faster then ROM, though RAM requires power to keep the data accessible
  • 16. ROM  ROM stands for Read-Only Memory  Like RAM, ROM is also hardware used to store and access data.  ROM can only be read and not modified  Unlike RAM, ROM does not require power to keep and access data
  • 17. EPROM  EPROM stands for Erasable Programmable Read-Only Memory is programmable that can be erased and resued.  Erasure is caused by shining an intense ultraviolet light through a window that is designed into the memory chip  Due to ultraviolet light clears its contents, making it possible to reproram the memory  The most frequent use for an EPROM memory chip is to store pc BIOS.
  • 18. Client  The client is a part of a client-server architecture. Often, a client is an utility that runs on a private pc or workstation and relies on a server to perform some operations. For instance, an electronic mail client is an application that enables you to ship and receive e mail.
  • 19. Email Address  A name that identifies an electronic post workplace box on a network wherever e-mail is sent. Different varieties of networks have completely different formats for e-mail addresses. On the Internet, all e-mail addresses have the form:  @<domain name >  For example,webmaster@sandybay.com  Every user on the web contains a distinctive e-mail address. Th term e- address is a symbol that is commonly used for e-mail address
  • 20. CACHE  A cache is a place to store something transitorily in a computing environment. It's pronounced CASH.  Is used to speed up the retrival process in computer  In computing, active data is often cached to abbreviate data access times, reduce latency and ameliorate input/output. Because virtually all computer application workload is dependent upon input and output operations, caching is utilized to amend application performance.
  • 21. CD ROM  CD ROM stands for Compact Disc-Read-Only Memory,  a type of optical disk capable of storing large amounts of data -- up to 1GB  A single CD-ROM has the storage capacity of 700 floppy disks  To read a CD, you need a CD-ROM player. Thats is installed in almost every computer.  You can use cd to store or play videogame, audio, movie etc.  To add or store some data on the Cd Rom. You need Cd writer.Which are used by many coftware industries.
  • 22. DVD-RW  A DVD-RW disc is a rewritable optical disc with equal storage capacity to a DVD-R, typically 4.7 GB  Developed by Pioneer in November 1999  The primary advantage of DVD-RW(DVD Writer) over DVD-R(DVD Read Only) is the ability to erase and rewrite to a DVD- RW disc.  One benefit to using a rewritable disc is if there are writing errors when recording data, the disc is not ruined and can still store data by erasing the faulty data.  Data can thus be written, erased and re- written.
  • 23. Modem  Modem a device thats is used for computer to send the data to other technology. For example Computer information is stored digital form, whereas information transmitted over telephone lines is transmitted in the form of analog waves.Which computer cannot understand nor the data from the computer(understand only didgital,not analog) to telephone(only understand analog, no didgital). So to help them commuincate A modem is used, to converts the waves or data between these two forms. From didtal to analog, From analog to digital.Which help them communicate.
  • 24. MP3  Stand s for MPEG-1 Audio Layer-3  MP3 is a lossy data compression format for audio  Is used to make smaller computer file containing digitale music and other sounds.  Maintaing nearly the same Cd quality sound.  Because of its small size and pleasent reliability, MP3 files have become a popular way to store music file both in computer in phone like ipod etc.Which now are used to listen music
  • 25. VIRUS  A computer virus is a program or piece of code thats is that is loaded onto your computer without your knowledge from internet or anyother software that download from internet and its runs against your wishes on your PC.  Many virus that are used they make a copy of thmselves consuming your avaliable memory which brings the system to halt. All computer viruses are man-made.  An even more dangerous type of virus is capbale of bypassing the security of a computer maikng the computer unable to block any virus.