Midterm Topics It Era
Midterm Topics It Era
Input units
are the units responsible
for entering programs, and
different data for the
device.
Output units
are the units responsible for all
views, and the results are
executed according to the
instructions that the user issues
to them
WHAT ARE THE COMPUTER COMPONENTS?
The CPU is divided into three parts:
Control Unit (CU):
The Arithmetic Logic Unit (ALU):
Coordinates processes between
Performs arithmetic operations, such
different units of the computer,
as subtraction, division, addition,
controlling all inputs and outputs
comparison, order, and sorting.
to and from various units in the
computer.
Main memory:
This memory is usually used in
storing programs, data being
processed, performing business.
INTERNAL
COMPUTER
COMPONENTS
• Are the computer devices that
you can see inside of the system
unit (inside the chassis)
• Connected or built in to your
computer’s motherboard
INTERNAL COMPUTER COMPONENTS
Power Supply: A device located in the back of a computer's box,
providing power for its work and performance.
INTERNAL COMPUTER COMPONENTS
Motherboard: connects directly or
indirectly to every part of the
computer.
Its task is to coordinate cooperation
between different devices, and the
transfer of data and the delivery of
information to different parts of the
computer.
The motherboard is the
computer's main circuit board.
INTERNAL COMPUTER COMPONENTS
Central Processing Unit (CPU)
also called a processor
The processor is the mastermind
that receives all the commands
and works to process them and
gives the results in the form of
different information.
It is sometimes called the brain of
the computer, and its job is to
carry out commands.
INTERNAL COMPUTER COMPONENTS
Memory
There are two types of memory, namely:
a. temporary memory or also known as random memory as well as
permanent memory, as the memory is the memory on which the device
depends mainly on the implementation of various commands and contribute
greatly to increase the speed of the computer and the processing of
different information.
Expansion cards
Most computers have expansion slots on
the motherboard that allow you to add various
types of expansion cards.
These are sometimes called PCI (peripheral
component interconnect) cards.
INTERNAL COMPUTER COMPONENTS
Video card/ graphic card
The video card is responsible for what you
see on the monitor.
Most computers have a GPU (graphics
processing unit) built into the motherboard
instead of having a separate video card.
If you like playing graphics-intensive games, you
can add a faster video card to one of
the expansion slots to get better performance.
INTERNAL COMPUTER COMPONENTS
Network card
The network card allows your computer to
communicate over a network and access the Internet.
It can either connect with an Ethernet cable or through
a wireless connection (often called Wi-Fi).
Many motherboards have built-in network connections,
and a network card can also be added to an expansion
slot.
INTERNAL COMPUTER COMPONENTS
Sound card
Is also called an audio card
is responsible for what you hear in the
speakers or headphones.
Most motherboards have integrated sound,
but you can upgrade to a dedicated sound
card for higher-quality sound.
INTERNAL COMPUTER COMPONENTS
Bluetooth card (or adapter)
Bluetooth is a technology for wireless communication
over short distances.
It's often used in computers to communicate with
wireless keyboards, mice, and printers.
It's commonly built into the motherboard or included in
a wireless network card.
For computers that don't have Bluetooth, you can
purchase a USB adapter, often called a dongle.
INTERNAL COMPUTER COMPONENTS
EXTERNAL
COMPUTER
COMPONENTS
Are the computer devices that
you can see outside of the
system unit
EXTERNAL COMPUTER COMPONENTS
Keyboard
• It is one of the most important
tools used to enter the
information and numbers and
different characters to the
computer to address and get
the results.
EXTERNAL COMPUTER COMPONENTS
Mouse
• It is a tool used to mark
or identify certain
information that appears
on the computer screen,
and it needs a person or
an assistant to manage
it correctly.
EXTERNAL COMPUTER COMPONENTS
Microphone
• A device that specializes
in receiving sounds and
inserting them into the
computer in order to
modify or retain them.
EXTERNAL COMPUTER COMPONENTS
Scanner
• A device that helps to
insert various images
and graphics into a
computer, converting it
from its graphic nature
to another digital nature.
EXTERNAL COMPUTER COMPONENTS
Printer
• Used to output
information, data, such
as numbers, letters, and
images printed on
paper.
EXTERNAL COMPUTER COMPONENTS
Plotters
• Used in the output of
geometric drawings, and
in various sizes, and
then printed on paper.
EXTERNAL COMPUTER COMPONENTS
Camera
• which works to capture
different images and
keep them in the device.
EXTERNAL COMPUTER COMPONENTS
Disc unit/
• Data is entered through
a floppy, digital, and
compact discs.
CD-ROM
Floppy Disk
Drive
COMMON COMPUTER
CONNECTOR TYPES
• A computer port is an interface point between
an electronic device, such as a laptop computer,
and another peripheral device or computer.
• This connection point enables functionalities,
such as the transmission of data, power, audio
and video.
• Ports may serve as sources of input, output or
both.
COMMON COMPUTER CONNECTOR TYPES
HDMI (connects
to monitor, TV, or DVI (connects to monitor,
projector) TV, or projector)
LINE IN
(audio device blue)
LINE OUT
(speaker green) MICROPHONE
VGA PORT (connects to
(pink)
monitor, TV, or projector)
COMMON COMPUTER CONNECTOR TYPES
ETHERNET PORT
PS/2 PORT (connect to the
(connects to the network, internet,
mouse) cable, modem)
Software for healthcare applications for seamless connectivity and quick response
Managing information and data in an organization
Managing and checking documents across
Software for educational purposes such as Learning Management Systems and e-
learning systems
Development of visuals and video for presentation purposes
WHAT IS APPLICATION SOFTWARE?
Functions of Application Software
Application software programs are generally designed and developed to help with a
wide range of tasks. Here are a few examples:
Emails, text messaging, audio and video conferencing involved in presentation
Management of accounting, finance, and payroll helping the HR department and
other businesses
Enterprise Resource Planning (ERP)
Customer Relationship Management (CRM)
Management of any small or large scale project
Management of smooth and efficient business processes
WHAT IS APPLICATION SOFTWARE?
Examples of Application Software
The most frequent applications used by millions of people on a daily
basis are listed below.
TYPES OF
NETWORK
DEVICES
• The gate way is a passage that
interlink two networks together.
• Perform a conversion function, even
two protocols are incompatible, the
gateway can connect them on the
same network and allow them to
function together.
ROUTER
PC
TCP / IP
Protocol
TCP/IP
CONTROL
NET
PLC
Control Net
Protocol
• The bridge is a device that joins any
two or more networks or host
segments together that are running
with the same protocols.
• Can also regenerate the signal
• Combination of repeater and MAC
address reading capacity. ROUTER
PC 1 PC 4 PC 5 PC 7
PC 2 PC 3 PC 6 PC 8
Segment 1 Segment 2
• A local area network
• It is a multi-port repeater that connects
multiple wires from different branches.
ROUTER
• Hubs broadcasts the data to all the
recipient.
• Not intelligent device.
• A local area network.
ROUTER
• Intelligent device, it store the Mac
Address table.
• Switch does unicasting
(it can send the data to the exact
recipient)
• A switch is a multi port device that
enhance network efficiency.
Port Device MAC Address
1 Detected ABC.DEF.GHI.JKL
2 Detected BCA.DEF.HIG.KLJ
3 Detected CBA.EFD.IGH.LJK
4 Detected 123.456.789.0
ROUTER
• What brings the internet into your
home or business.
• It modulates outgoing data from a
computer
• It also demodulates ingoing data
from the internet.
It demodulates ingoing data from the internet.
Analog
signals
Digital
signals
TYPES OF
NETWORK
DEVICES
NETWORK TOPOLOGIES
A network refers to the configuration of cables,
computers, and other peripherals.
Address Bar
WAYS TO OPEN A FILE
Double left click the icon menu, select open, select the file
• Note that creating a shortcut does not create a duplicate copy of the folder;
• it's simply a way to access the folder more quickly.
• If you delete a shortcut, it will not delete the actual folder or the files it contains.
• Also note that copying a shortcut onto a flash drive will not work;
• if you want to bring a file with you, you'll need to navigate to the actual location of
the file and copy it to the flash drive.
CREATE SHORTCUTS
SECURING COMPUTING
DEVICES
• Computers and the internet have transformed
almost every aspect of our personal and
professional lives.
• Most modern organization depend on computers,
yet this necessity also carries risk.
• Protecting business data is an important
consideration for any organization, making
computer safety a priority.
• Sensitive information is often valuable, making
computer systems targets to thieves and hackers.
SECURITY THREAT BEST PRACTICES WEB BROWSING
COMPUTER SECURITY
• Computer security refers to measures and
controls that ensure the confidentiality, integrity
and availability of the information processed and
stored by a computer.
• This includes everything from protecting physical
information assets, to data security and computer
safety practices.
• Computer security ensures that a business’s data
and computer systems are safe from breaches
and unauthorized access.
SECURITY THREAT BEST PRACTICES WEB BROWSING
PHISING Attackers send fraudulent correspondence that seems to come from legitimate sources, usually via
email.
MALVERTISING Online advertising controlled by hackers, which contains malicious code that infects a user’s
computer when they click, or even just view the ad.
BAITING A malware-infected physical device, like a USB, where the target can find it.
Once the target inserts the device into their computer, they unintentionally install the malware.
SECURITY THREAT BEST PRACTICES WEB BROWSING
Application Security
Application Security
Application Security
• Network security is the practice of securing a
Information Security computer network from unauthorized access or
attacks.
Application Security
• Internet of Things (IoT) refers to the network of
Information Security connected devices, such as smartphones, smart
homes, and wearables.
Use a Secure Browser Update Web Browser Don’t store password Be careful about entering
Beware suspicious emails, links, and downloads in your web browser private data on public
computers
Be aware when reading email and browsing the web.
Internet Explorer
The senderisofnot Malicious
an email can software
be spoofed. If an email is If you store your Public computers may
recommended
suspicious,asdoa not follow
often
any takes advantage
links or download passwords in your be infected with
general-use browser. IfIf you
attachments. of security
you are unsure, flaws
hover overina link to browser they may be malware intended to
use an online service
see where that
it points. common programs and viewable by someone steal private data. Avoid
requires Internet Explorer, operating systems. else using your entering private data
reserve it solely for that These flaws are computer, or retrievable including passwords and
use, and use a modern routinely discovered by an attacker. credit card numbers on
browser for general web and fixed in updates. public computers.
browsing.
SECURITY THREAT BEST PRACTICES WEB BROWSING
RULE
RULE
SELL
RECYCLE
VENDOR
DONATE Donating it to a local school or nonprofit organization
RECYCLE
VENDOR
DONATE Donating it to a local school or nonprofit organization
VENDOR
DONATE Donating it to a local school or nonprofit organization
CRT Monitor
• Scanners contain toxic materials
that, if thrown in the trash, may
prove an environmental hazard.
• Donate the scanner to a
manufacturer or retailer or contact
a waste management authority.
Scanner
• Manufacturers of alkaline
batteries today have largely
eliminated mercury from their
products, so disposing of these
batteries in the trash is safe.
Batteries
• Different ink and toner
manufacturers may include
different materials in their product.
• You should avoid throwing these
cartridges in the trash.
Hard Drive
• LCDs consume much less energy than
CRTs and do not emit nearly as much
electromagnetic radiation as CRTs do.
Bluetooth
POWER STRIP
a device that attaches to a power outlet in
order to provide more outlets for you to use.
SURGE PROTECTOR
provides additional outlets of a power strip
with the added benefit of protecting
connected devices from surges.
Uninterruptible Power Supply (UPS)
A device that provide power to connected
devices in the event of a general power
failure without interruption.
Data backup
A type of information protection
scheme that enables you to store
copies of critical files and folders
on another medium for
safekeeping.
Backup Frequency and Schedules
• Should be regularly done
• Schedule of back up must be set
Backup Storage Device
• Back up storage device
• Locally attached storage
• Offsite/cloud-based
• Network-attached storage (NAS)
Data Restoration
• a type of information
protection scheme that
enables you to recover
stored copies of critical
files and folders from
another medium.
Data Restoration
• Software management involves installing and updating operating
system features, applications, and drivers, as well as obtaining
the appropriate licenses.
Hyper-X Fury
Ryzen 5 DDR4 3200MHz
2400GE(3.2GHz,
35W,L3:4M,4C)
• Unable to print
• No network connectivity
• Hardware device not
working properly