SlideShare a Scribd company logo
UNDERSTANDING
COMPUTER
Computer is one of the most brilliant
inventions of mankind. Thanks to the
computer technology, we were able
to achieve storage and processing to
huge amounts of data; we could rest
our brains by employing computer
memory capacities for storing
information
-Speed up daily work
-Carry out critical transactions
-Achieve accuracy and precision in work.
DIFFERENT TYPES OF COMPUTERS
Based on the operational principle of computers, they are categorized as analog,
digital and hybrid computers.
ANALOG COMPUTERS
These are almost extinct today. These are different from a digital computer because an
analog computer can only perform several mathematical operations simultaneously. It
uses continues variables for mathematical operations and utilizes mechanical or
electrical energy.
DIGITAL COMPUTERS
They use digital circuits and are designed to operate on two states, namely bits 0 and 1.
They are analogous to states ON and OFF. Data in these computers is represented as a
series of 0s and 1s. Digital computers are suitable for complex computations and have
higher processing speeds.. They are programmable.
HYBRID COMPUTERS
These are combination of both digital and analog computers. In this type of computers, the
digital segments perform process control by conversation of analog signals to digital
ones.
Classificationof Computers
MAINFRAME COMPUTERS
Large organizations use mainframes for highly critical applications such as bulk data
processing and ERP (Enterprise Resource Planning) Most of the mainframe computers
have the capacities to host multiple operating systems and operate as a number of
virtual machines and can substitute for several small servers.
The following are the classification of the different types of computers
based on their sizes and functionalities..
MINI COMPUTERS
In terms of size and processing capacity,
minicomputers lie between mainframes and
minicomputers. Minicomputers are also called
mid-range systems or workstations. The term
began to be popularly used in the 1960s to
refer to relatively smaller third generation
computers.
SERVERS
They are computers designed to provide services to
client machines in a computer network. Running
on them are programs that serve client requests
and allocate resources like memory and time to
client machines. Usually they are very large in
size, as they have large processors and many
hard drives, They are designed to be fail-safe
and resistant to crash.
SUPER COMPUTER
The highly calculation-intensive tasks can be effectively performed by means
of supercomputers. Quantum physics, mechanics, weather forecasting,
molecular theory are best studied by means of supercomputers. Their
ability of parallel processing and their well-designed memory hierarchy
give the supercomputers, large transaction processing powers.
MICROCOMPUTERS
A computer with a microprocessor and its central processing unit it is known
as a microcomputer. They do not occupy space as much as mainframes do.
When supplemented with a keyboard and a mouse, microcomputers can be
called personal computers. These computers can fit on desks or tables and
prove to be the best choice for single-user tasks.
Desktops
DESKTOP COMPUTER
A desktop is intended to be used on a single location. The spare parts of a
desktop computer are readily available at relatively lower costs. Power
consumption is not as critical as that in laptops. Desktops are widely
popular for daily use in the workplace and households.
Laptops
Similar in operation to desktops, laptop computers are miniaturized and
optimized for mobile use. Laptops run on a single battery or an external
adapter that charges the computer batteries.
Types of Personal Computer
Net books
They fall in the category of laptops, but are inexpensive and relatively smaller
in size. They had a smaller feature set and lesser capacities in comparison
to regular laptops, at the time they came into the market.
PDA (Personal Digital Assistants)
It is a handheld computer and popularly known as palmtop. It has a touch
screen and a memory card for storage of data. PDAs can also be used as
portable audio players, web browsers and smart phones. Most of them can
access the Internet by means of Bluetooth or Wi-Fi communication
TABLET COMPUTERS
Tablets are mobile computers that are very handy to use. They use the touch
screen technology. Tablets come with an onscreen keyboard or use a stylus
or digital pen. Apple’s iPod redefined the class of tablet computers
Wearable Computers
These computers can be worn on the body and are often used in the study of
behavior modeling and human health.
DIRECTION: Identify the type of computer being describe in the following
sentences and write your answer on a 1/2 sheet of paper.
____ 1. These are mobile computers that are vey handy to use.
____ 2. They are computers designed to provide services to client machines in a
computer network.
____ 3. They are also called mid-range systems or workstations.
____ 4. A computer with a microprocessor and its central processing unit.
____ 5. They fall in the category of laptops, but are inexpensive and relatively
smaller size.
____ 6. A type of computer which is intended to used on a single location.
____ 7. They use digital circuits and are designed to operate on two states,
namely bits 0 and 1.
____ 8. Computers that have capacities to host multiple operating systems and
operate as a number of virtual machines and can use substitute for
several small servers.
____ 9. It is a handheld computer and popularly known as a palmtop.
____ 10. These computers can be worn on the body and are often used in the
study of behavior modeling and a human health.
COMPUTER SYSTEMS, DEVICES AND
PERIPHERALS
WHAT IS AN OPERATING SYSTEM?
> The most important program that runs on a computer.
> Performs basic tasks, such as recognizing input from the keyboard,
sending output to the display screen, keeping track of files
and directories on the disk, and controlling peripheral devices such as disk
drives and printers.
>Responsible for security, ensuring that unauthorized users do not
access the system
Operating System can be classified as follows:
Multi-user: Allow two or more users to run programs at the same time.
Some operating systems permit hundreds or even thousands of concurrent
users.
Linux
Unix
Windows 2000
Multiprocessing: Supports running a program on more than one CPU.
Linux
Unix
Windows 2000
Multitasking: Allows more than one program to run concurrently.
Unix
Windows 7 and Windows multi point
Multithreading: Allows different parts of a single program to run
concurrently.
Linux
Unix
Windows 2000 and
Windows 7
Real Time: Responds to input instantly. General-purpose operating systems,
such as DOS and UNIX, are not real-time.
Microsoft Operating System
Windows 1.0 (1985)
Windows 2.0 (1987)
Windows 3.x (1990, 1992)
Windows 95 (1995)
Windows 98 (1998)
Windows 2000 (2000)
Windows ME (2000)
Windows XP (2001)
Windows Vista (2006)
Windows 7 (2009)
Windows 8 (2012)
Windows 8.1 (2013)
Windows 10 (2015)
Windows 10 (Anniversary Update) (2016
DIRECTION: Identify the type of operating system being describe in the following sentences
and write your answer on a 1/4 sheet of paper.
_____ 1. Allows more than one program to run concurrently.
_____ 2. Responds to input instantly.
_____ 3. Allow two or more users to run programs at the same time.
_____ 4. Allows different parts of a single program to run concurrently.
_____ 5. Supports running a program on more than one CPU.
_____ 6. The latest version of Microsoft Office operating system.
_____ 7. What is the logo of the LINUX operating system.
_____ 8. The successor of windows 7.
_____ 9. What is the most important program that runs on a computer?
_____ 10. Other operating system aside from LINUX and Microsoft OS?

More Related Content

What's hot

Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
jvs71294
 
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
JonathanOcampo23
 
Cabling
CablingCabling
Cabling
Bong Bandola
 
Grade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docxGrade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docx
Angelito Villalon
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
Perla Pelicano Corpez
 
Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10
Bogs De Castro
 
K-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware ServicingK-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware Servicing
Renz Cuaresma
 
Quarter ii css 9
Quarter ii css 9Quarter ii css 9
Quarter ii css 9
Rechieboy Corcelles
 
Maintaining training facilities
Maintaining training facilitiesMaintaining training facilities
Maintaining training facilities
Johnny Jean Tigas
 
Types of components and objects to be measured_Lesson Plan
Types of components and objects to be measured_Lesson PlanTypes of components and objects to be measured_Lesson Plan
Types of components and objects to be measured_Lesson Plan
Bryan Corpuz
 
PC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptxPC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptx
ErwinIruma
 
Carry out-mensuration-and-calculation
Carry out-mensuration-and-calculationCarry out-mensuration-and-calculation
Carry out-mensuration-and-calculation
Emelinda Alejo
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Manila Central University
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
Marvin Bronoso
 
Computer operation
Computer operationComputer operation
Computer operation
Munim Chaudhry
 
K to 12 TLE Curriculum Guide for Computer Hardware Servicing
K to 12 TLE Curriculum Guide for Computer Hardware ServicingK to 12 TLE Curriculum Guide for Computer Hardware Servicing
K to 12 TLE Curriculum Guide for Computer Hardware Servicing
Dr. Joy Kenneth Sala Biasong
 
Lesson 3
Lesson 3Lesson 3
CSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSSCSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSS
Marvin Bronoso
 
TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)
Leonel Rivas
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
Hanzel Metrio
 

What's hot (20)

Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
 
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).pptComputer Assembly and Disassembly (2nd Lesson part 2).ppt
Computer Assembly and Disassembly (2nd Lesson part 2).ppt
 
Cabling
CablingCabling
Cabling
 
Grade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docxGrade-10-DLP-CSS-June 5-6.docx
Grade-10-DLP-CSS-June 5-6.docx
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10Computer Hardware Servicing Learner's Material Grade 10
Computer Hardware Servicing Learner's Material Grade 10
 
K-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware ServicingK-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware Servicing
 
Quarter ii css 9
Quarter ii css 9Quarter ii css 9
Quarter ii css 9
 
Maintaining training facilities
Maintaining training facilitiesMaintaining training facilities
Maintaining training facilities
 
Types of components and objects to be measured_Lesson Plan
Types of components and objects to be measured_Lesson PlanTypes of components and objects to be measured_Lesson Plan
Types of components and objects to be measured_Lesson Plan
 
PC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptxPC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptx
 
Carry out-mensuration-and-calculation
Carry out-mensuration-and-calculationCarry out-mensuration-and-calculation
Carry out-mensuration-and-calculation
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
 
Computer operation
Computer operationComputer operation
Computer operation
 
K to 12 TLE Curriculum Guide for Computer Hardware Servicing
K to 12 TLE Curriculum Guide for Computer Hardware ServicingK to 12 TLE Curriculum Guide for Computer Hardware Servicing
K to 12 TLE Curriculum Guide for Computer Hardware Servicing
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
CSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSSCSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSS
 
TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 

Viewers also liked

Computer Network
Computer NetworkComputer Network
Computer Network
EILLEN IVY PORTUGUEZ
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Materials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing DevicesMaterials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing Devices
EILLEN IVY PORTUGUEZ
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
EILLEN IVY PORTUGUEZ
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
SaahilIT
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
EILLEN IVY PORTUGUEZ
 
Computer Network
Computer NetworkComputer Network
Computer Network
Aadarsh Shrestha
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
raniseetha
 
Internet Terminologies
Internet TerminologiesInternet Terminologies
Internet Terminologies
Boris Agranovich
 
My school
My schoolMy school
My school
Mer Sh-yan
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
Samrat Sikri
 
Mps learning commons ppt
Mps learning commons pptMps learning commons ppt
Mps learning commons ppt
MPS2014
 
Waterloo September 00 Presentations
Waterloo September 00 PresentationsWaterloo September 00 Presentations
Waterloo September 00 Presentations
brighteyes
 

Viewers also liked (20)

Computer Network
Computer NetworkComputer Network
Computer Network
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Materials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing DevicesMaterials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing Devices
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 
Networking
NetworkingNetworking
Networking
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
Internet Terminologies
Internet TerminologiesInternet Terminologies
Internet Terminologies
 
My school
My schoolMy school
My school
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 
Mps learning commons ppt
Mps learning commons pptMps learning commons ppt
Mps learning commons ppt
 
Waterloo September 00 Presentations
Waterloo September 00 PresentationsWaterloo September 00 Presentations
Waterloo September 00 Presentations
 

Similar to Understanding Computer

UNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptxUNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptx
RHONELYNHARO1
 
UNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptxUNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptx
JersonERodriguez
 
Classification of Computers
Classification of ComputersClassification of Computers
Classification of Computers
Hina Anjum
 
Classification and Types of Computer
Classification and Types of ComputerClassification and Types of Computer
Classification and Types of Computer
chelsiejeansienes
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
umardanjumamaiwada
 
lecture 2
lecture 2 lecture 2
lecture 2
umardanjumamaiwada
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
umardanjumamaiwada
 
CLASSIFICATION 0F COMPUTERS.pdf
CLASSIFICATION 0F COMPUTERS.pdfCLASSIFICATION 0F COMPUTERS.pdf
CLASSIFICATION 0F COMPUTERS.pdf
Aman kashyap
 
Computer new
Computer newComputer new
Computer new
maynard23
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9
Frya Lora
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
Sonet Hossain
 
Type of coputer
Type of coputerType of coputer
Type of coputer
Mohit Saini
 
Q1_Module_5_ICT_7.pdf.pdf
Q1_Module_5_ICT_7.pdf.pdfQ1_Module_5_ICT_7.pdf.pdf
Q1_Module_5_ICT_7.pdf.pdf
FlorenceFernandez7
 
Computer ppt by ashish n akanksha
Computer ppt by ashish n akankshaComputer ppt by ashish n akanksha
Computer ppt by ashish n akanksha
Ashish Nagpal
 
Grace
GraceGrace
types of computer from scratch up to present
types of computer from scratch up to presenttypes of computer from scratch up to present
types of computer from scratch up to present
SandieAbito1
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
AnezkaJaved
 
types_of_computers.pptx
types_of_computers.pptxtypes_of_computers.pptx
types_of_computers.pptx
Subramanian Mani
 
Grade 7 Topic.pptx
Grade 7 Topic.pptxGrade 7 Topic.pptx
Grade 7 Topic.pptx
CharlesCArsolon
 
Types of computer
Types of computerTypes of computer
Types of computer
Kartik Chauhan
 

Similar to Understanding Computer (20)

UNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptxUNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptx
 
UNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptxUNDERSTANDING COMPUTER.pptx
UNDERSTANDING COMPUTER.pptx
 
Classification of Computers
Classification of ComputersClassification of Computers
Classification of Computers
 
Classification and Types of Computer
Classification and Types of ComputerClassification and Types of Computer
Classification and Types of Computer
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
lecture 2
lecture 2 lecture 2
lecture 2
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
CLASSIFICATION 0F COMPUTERS.pdf
CLASSIFICATION 0F COMPUTERS.pdfCLASSIFICATION 0F COMPUTERS.pdf
CLASSIFICATION 0F COMPUTERS.pdf
 
Computer new
Computer newComputer new
Computer new
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Type of coputer
Type of coputerType of coputer
Type of coputer
 
Q1_Module_5_ICT_7.pdf.pdf
Q1_Module_5_ICT_7.pdf.pdfQ1_Module_5_ICT_7.pdf.pdf
Q1_Module_5_ICT_7.pdf.pdf
 
Computer ppt by ashish n akanksha
Computer ppt by ashish n akankshaComputer ppt by ashish n akanksha
Computer ppt by ashish n akanksha
 
Grace
GraceGrace
Grace
 
types of computer from scratch up to present
types of computer from scratch up to presenttypes of computer from scratch up to present
types of computer from scratch up to present
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
types_of_computers.pptx
types_of_computers.pptxtypes_of_computers.pptx
types_of_computers.pptx
 
Grade 7 Topic.pptx
Grade 7 Topic.pptxGrade 7 Topic.pptx
Grade 7 Topic.pptx
 
Types of computer
Types of computerTypes of computer
Types of computer
 

More from EILLEN IVY PORTUGUEZ

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
EILLEN IVY PORTUGUEZ
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
EILLEN IVY PORTUGUEZ
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
EILLEN IVY PORTUGUEZ
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
EILLEN IVY PORTUGUEZ
 
Web design principles
Web design principlesWeb design principles
Web design principles
EILLEN IVY PORTUGUEZ
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
EILLEN IVY PORTUGUEZ
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
EILLEN IVY PORTUGUEZ
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
EILLEN IVY PORTUGUEZ
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
EILLEN IVY PORTUGUEZ
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
EILLEN IVY PORTUGUEZ
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
EILLEN IVY PORTUGUEZ
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
EILLEN IVY PORTUGUEZ
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
EILLEN IVY PORTUGUEZ
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
EILLEN IVY PORTUGUEZ
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
EILLEN IVY PORTUGUEZ
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
EILLEN IVY PORTUGUEZ
 

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Understanding Computer

  • 2. Computer is one of the most brilliant inventions of mankind. Thanks to the computer technology, we were able to achieve storage and processing to huge amounts of data; we could rest our brains by employing computer memory capacities for storing information -Speed up daily work -Carry out critical transactions -Achieve accuracy and precision in work.
  • 3. DIFFERENT TYPES OF COMPUTERS Based on the operational principle of computers, they are categorized as analog, digital and hybrid computers. ANALOG COMPUTERS These are almost extinct today. These are different from a digital computer because an analog computer can only perform several mathematical operations simultaneously. It uses continues variables for mathematical operations and utilizes mechanical or electrical energy.
  • 4. DIGITAL COMPUTERS They use digital circuits and are designed to operate on two states, namely bits 0 and 1. They are analogous to states ON and OFF. Data in these computers is represented as a series of 0s and 1s. Digital computers are suitable for complex computations and have higher processing speeds.. They are programmable.
  • 5. HYBRID COMPUTERS These are combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversation of analog signals to digital ones.
  • 6. Classificationof Computers MAINFRAME COMPUTERS Large organizations use mainframes for highly critical applications such as bulk data processing and ERP (Enterprise Resource Planning) Most of the mainframe computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can substitute for several small servers. The following are the classification of the different types of computers based on their sizes and functionalities..
  • 7. MINI COMPUTERS In terms of size and processing capacity, minicomputers lie between mainframes and minicomputers. Minicomputers are also called mid-range systems or workstations. The term began to be popularly used in the 1960s to refer to relatively smaller third generation computers.
  • 8. SERVERS They are computers designed to provide services to client machines in a computer network. Running on them are programs that serve client requests and allocate resources like memory and time to client machines. Usually they are very large in size, as they have large processors and many hard drives, They are designed to be fail-safe and resistant to crash.
  • 9. SUPER COMPUTER The highly calculation-intensive tasks can be effectively performed by means of supercomputers. Quantum physics, mechanics, weather forecasting, molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-designed memory hierarchy give the supercomputers, large transaction processing powers.
  • 10. MICROCOMPUTERS A computer with a microprocessor and its central processing unit it is known as a microcomputer. They do not occupy space as much as mainframes do. When supplemented with a keyboard and a mouse, microcomputers can be called personal computers. These computers can fit on desks or tables and prove to be the best choice for single-user tasks.
  • 11. Desktops DESKTOP COMPUTER A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relatively lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in the workplace and households.
  • 12. Laptops Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries.
  • 13. Types of Personal Computer
  • 14. Net books They fall in the category of laptops, but are inexpensive and relatively smaller in size. They had a smaller feature set and lesser capacities in comparison to regular laptops, at the time they came into the market.
  • 15. PDA (Personal Digital Assistants) It is a handheld computer and popularly known as palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be used as portable audio players, web browsers and smart phones. Most of them can access the Internet by means of Bluetooth or Wi-Fi communication
  • 16. TABLET COMPUTERS Tablets are mobile computers that are very handy to use. They use the touch screen technology. Tablets come with an onscreen keyboard or use a stylus or digital pen. Apple’s iPod redefined the class of tablet computers
  • 17. Wearable Computers These computers can be worn on the body and are often used in the study of behavior modeling and human health.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. DIRECTION: Identify the type of computer being describe in the following sentences and write your answer on a 1/2 sheet of paper. ____ 1. These are mobile computers that are vey handy to use. ____ 2. They are computers designed to provide services to client machines in a computer network. ____ 3. They are also called mid-range systems or workstations. ____ 4. A computer with a microprocessor and its central processing unit. ____ 5. They fall in the category of laptops, but are inexpensive and relatively smaller size. ____ 6. A type of computer which is intended to used on a single location. ____ 7. They use digital circuits and are designed to operate on two states, namely bits 0 and 1. ____ 8. Computers that have capacities to host multiple operating systems and operate as a number of virtual machines and can use substitute for several small servers. ____ 9. It is a handheld computer and popularly known as a palmtop. ____ 10. These computers can be worn on the body and are often used in the study of behavior modeling and a human health.
  • 35.
  • 36. COMPUTER SYSTEMS, DEVICES AND PERIPHERALS WHAT IS AN OPERATING SYSTEM? > The most important program that runs on a computer. > Performs basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. >Responsible for security, ensuring that unauthorized users do not access the system
  • 37. Operating System can be classified as follows: Multi-user: Allow two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users. Linux Unix Windows 2000
  • 38. Multiprocessing: Supports running a program on more than one CPU. Linux Unix Windows 2000
  • 39. Multitasking: Allows more than one program to run concurrently. Unix Windows 7 and Windows multi point
  • 40. Multithreading: Allows different parts of a single program to run concurrently. Linux Unix Windows 2000 and Windows 7
  • 41. Real Time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
  • 42. Microsoft Operating System Windows 1.0 (1985) Windows 2.0 (1987) Windows 3.x (1990, 1992) Windows 95 (1995) Windows 98 (1998) Windows 2000 (2000) Windows ME (2000) Windows XP (2001) Windows Vista (2006) Windows 7 (2009) Windows 8 (2012) Windows 8.1 (2013) Windows 10 (2015) Windows 10 (Anniversary Update) (2016
  • 43.
  • 44. DIRECTION: Identify the type of operating system being describe in the following sentences and write your answer on a 1/4 sheet of paper. _____ 1. Allows more than one program to run concurrently. _____ 2. Responds to input instantly. _____ 3. Allow two or more users to run programs at the same time. _____ 4. Allows different parts of a single program to run concurrently. _____ 5. Supports running a program on more than one CPU. _____ 6. The latest version of Microsoft Office operating system. _____ 7. What is the logo of the LINUX operating system. _____ 8. The successor of windows 7. _____ 9. What is the most important program that runs on a computer? _____ 10. Other operating system aside from LINUX and Microsoft OS?