Computer Basics
Computer Basics
Computer Basics
by
IMRAN GHANI
Imran Ghani,2006,[email protected]
What is a Computer?
WELCOME
Speed
Accuracy
Versatility
Storage Capacity
Imran Ghani,2006,[email protected]
Evolution of Computer
WELCOME
Imran Ghani,2006,[email protected]
WELCOME
Evolution of Computer (cont.)
Imran Ghani,2006,[email protected]
WELCOME
First Generation Computers (1940 to 1956)
First generation computers relied on machine
language (binary-coded program) to perform
operations and could solve only one problem at a
time. Punched cards and paper tapes were used
to input data and instructions, and output was
displayed on printouts. Vacuum tubes were used
in the circuitry and magnetic drums for memory. Vacuum tube
Early computers like ENIAC, EDVAC and IBM 650 can all be
classified as first generation computers.
Imran Ghani,2006,[email protected]
ENIAC
WELCOME
Imran Ghani,2006,[email protected]
SecondWELCOME
Generation Computers (1956 to 1963)
Transistors (invented in 1950) and
magnetic core memory were used in
second generation computers. Second
generation of computers was also
characterized by allowing
programmers to specify instructions in
symbolic (or assembly) language
rather than cryptic binary machine
language.
High level programming languages like COmmon Business
Oriented Language (COBOL) and FORmula TRANslation
(FORTRAN) were also being developed at this time.
Imran Ghani,2006,[email protected]
Third WELCOME
Generation Computers (1964 to 1971)
Imran Ghani,2006,[email protected]
WELCOME
Fourth Generation Computers (1971 to present)
In 1970 invent of Large Scale Integration
(LSI) technology and latter Very Large
Scale Integration (VLSI) squeezed
hundreds of thousands of components
onto a single chip. This shrinking trend
continued and led to the introduction of
Intel 80486 DX2
personal computers (PCs).
Hardware Software
Imran Ghani,2006,[email protected]
Schematic Representation of a Computer
WELCOME
Arithmetic
Input Unit Logic Unit Output
Control Unit
Unit
Main
Memory
Secondary
Storage
Imran Ghani,2006,[email protected]
InputWELCOME
Unit
Imran Ghani,2006,[email protected]
Central Processing Unit (CPU)
WELCOME
Imran Ghani,2006,[email protected]
Central Processing Unit (CPU) (cont)
WELCOME
Imran Ghani,2006,[email protected]
Central Processing Unit (CPU) (cont)
WELCOME
CPU or
Microprocessor
RAM
Imran Ghani,2006,[email protected]
Output Unit
WELCOME
Imran Ghani,2006,[email protected]
Secondary Storage
WELCOME
Imran Ghani,2006,[email protected]
OtherWELCOME
Computer Peripherals
Printer
Scanner UPS
Pen Drive
Modem
Joystick Plotter
Imran Ghani,2006,[email protected]
BITSWELCOME
and BYTES
A BIT (an abbreviation for BInary DigiTS), is smallest unit of
data in a computer and can either store a 0 or 1
Imran Ghani,2006,[email protected]
Types of Computer Software (cont)
WELCOME
Application Software:
Imran Ghani,2006,[email protected]
Microsoft (MS) Windows
WELCOME
Imran Ghani,2006,[email protected]
Functions
WELCOMEof Mouse buttons
Scroll while Right button
Left button
Mouse Actions
Left Click : Used to select an item.
Double Click : Used to start a program or open a file.
Right Click : Usually used to display a set of commands.
Scroll while: Used to scroll the pages.
Drag and Drop : It allows you to select and move an item from one
location to another. To achieve this place the cursor over an item on
the screen, click the left mouse button and while holding the button
down move the cursor to where you want to place the item, and then
release it.
Imran Ghani,2006,[email protected]
LayoutWELCOME
of a keyboard
Function keys
Numeric keypad
Imran Ghani,2006,[email protected]
Desktop
WELCOME
Desktop
Background
Icons
Imran Ghani,2006,[email protected]
Control Panel
WELCOME
Imran Ghani,2006,[email protected]
Windows Explorer
WELCOME
Imran Ghani,2006,[email protected]
Computer Networking
WELCOME
Imran Ghani,2006,[email protected]
Use of Computer Network
WELCOME
3. Resource sharing.
Imran Ghani,2006,[email protected]
ModeWELCOME
of Networking
Local Area Network (LAN): small computer network such
as; computers connected in a college lab or in office. UTP
cabling or WiFi are used to connect the computers.
Imran Ghani,2006,[email protected]
Computer Connectivity Options
WELCOME
UTP Cabling:
Data transfer rate: 100-
150 MBPS
Max. cable length: 100mt
Use: LAN
Switch
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont.)
WELCOME
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont..)
WELCOME
Dial-Up
Dial-up provides connecting a
device to a network using
modem over the public
telephone network. Maximum
data transfer rate over a dial-
up connection is limited to 56
kbps (56,000 bits per
second).
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont..)
WELCOME
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont..)
WELCOME
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont..)
WELCOME
Leased Line
Imran Ghani,2006,[email protected]
Computer Connectivity Options (cont..)
WELCOME
Radio or RF Link
Throughput: 4 Mbps.
Use: WAN
Imran Ghani,2006,[email protected]
WELCOME
Internet Protocols
Protocol defines a set of rules or code of behavior. In the
context of networking, protocol defines a language of
conventions and rules that specify how the data will be
packaged, sent and acknowledged.
IP Address
The Internet Protocol (IP) address is an unique number that
defines the location of your computer, such that it is an
identifiable machine within all the computers connected to the
Internet. This is a 32-bit number and is divided into four octets.
For example, the IP address (10.0.0.2.)
00001010 00000000 00000000 00000010
Imran Ghani,2006,[email protected]
Domain Naming System (DNS)
WELCOME
Imran Ghani,2006,[email protected]
Internet
WELCOME
Imran Ghani,2006,[email protected]
WorldWELCOME
Wide Web (www)
Imran Ghani,2006,[email protected]
Website
WELCOME
individual or by an organization.
Imran Ghani,2006,[email protected]
Uniform Resource Locator (URL)
WELCOME
For example :
http://www.du.ac.in
http://people.du.ac.in/~ighani
Imran Ghani,2006,[email protected]
WELCOME
Internet Browser or Web Browser
Imran Ghani,2006,[email protected]
Search Engines
WELCOME
Search Engines are specific type of
Internet
http://www.google.com
E-mailing is one of the most common and popular uses of the Internet.
You can send or receive mails from anywhere in the world almost
instantaneously. Through e-mail, you can send and receive any type of
file image, video, sound, and plain text. It is a very versatile and open
If you wish to send and receive e-mails, you will need to create an e-mail
Imran Ghani,2006,[email protected]
Internet Chat
WELCOME
(anywhere in the world, but logged on to the Net at the same time
There are various free chat sites that you can use to communicate
Imran Ghani,2006,[email protected]
Downloading
WELCOME Information from Internet
Imran Ghani,2006,[email protected]
Internet Explorer Security
WELCOME
Internet Explorer (IE) provides a number of features that
help to protect your privacy and make your computer and
your personally identifiable information more secure.
Privacy settings:
1.Specify how your computer deals with cookies.
Cookies are files created by a Web site that store
information on your computer, such as your
preferences when visiting that site. Cookies may also
store personally identifiable information, such as your
name or e-mail address.
2.Privacy alerts that let you know when you try to gain
access to a site that doesn't meet the criteria in your
privacy settings.
Imran Ghani,2006,[email protected]
Internet Explorer Security (cont.)
WELCOME
Security features:
1. Help to prevent people from gaining access to information
that you have not given them permission to access, such
as credit card information you enter when shopping on
the Internet.
2. Security features can also protect your computer from
unsafe software.
3. Block most pop-up windows.
4. Update, disable, or re-enable Web browser add-ons.
5. Enhanced security features to warn you when a Web site
is trying to download files or software to your computer.
Imran Ghani,2006,[email protected]
Internet Explorer Security (cont.)
WELCOME
Imran Ghani,2006,[email protected]
Antivirus
WELCOME
What is a Virus?
Source of Virus:
Shared files, networks, floppy disks
E-mail attachments
Web-based e-mail
Downloads
Malicious Web sites
Imran Ghani,2006,[email protected]
WhatWELCOME
can Virus do?
1. A virus (worm) can copy itself multiple times and infect
your computer by occupying hard disk space, choking
your network bandwidth etc.
2. Some viruses contain code that inflicts extra damage by
deleting files or lowering your security settings, inviting
further attacks.
3. A virus even format hard disk of your computer.
4. A type of virus (called Trojan Horses) can scan your hard
disk and send important information to the source.
5. An e-mail virus can scan your address book and send e-
mails using your e-mail account.
Imran Ghani,2006,[email protected]
Antivirus (cont)
WELCOME
Imran Ghani,2006,[email protected]
Windows Update
WELCOME
Imran Ghani,2006,[email protected]
Windows Update (cont.)
WELCOME
Imran Ghani,2006,[email protected]
PC Maintenance
WELCOME
Imran Ghani,2006,[email protected]
Backup.
WELCOME
Imran Ghani,2006,[email protected]
Cleaning Disk
WELCOME
Disk Cleanup:
This tool will detect your PC for
temporary files, old setup files, and for
not required application software and
remove it from your PC.
Imran Ghani,2006,[email protected]
Disk-Defragmenter.
WELCOME
Imran Ghani,2006,[email protected]
PC Maintenance
WELCOME and Security-Tips
1. Work with your computer with user logon, not with
administrator logon for day-to-day work.
2. Keep your computer updated with the latest critical
updates and security patches.
3. Keep your Antivirus up-to-date and run regularly.
4. Keep your Office update with the latest critical
updates.
5. Keep your Firewall always ON.
6. Back up data regularly.
7. Download files only from trusted sites.
8. Run Disk Cleanup and Disk Defragmenter tools
periodically.
Imran Ghani,2006,[email protected]
Thanks.
WELCOME
IMRAN GHANI
SR. SYSTEM PROGRAMMER
DUCC, UNIVERSITY OF DELHI
DELHI-110007
E-mail: [email protected]
[email protected]
Imran Ghani,2006,[email protected]