Christmas Term - Week 3-5 - Types & Components of Computer Systems (W & I)
Christmas Term - Week 3-5 - Types & Components of Computer Systems (W & I)
Learning objectives
Define hardware as consisting of physical components of a computer system
Identify internal hardware devices (e.g. motherboards, random access memory
(RAM), read-only memory (ROM), video cards, sound cards and internal hard disk
drives)
Week 3 Identify external hardware devices and peripherals (such as monitors, keyboards,
mice, printers as input and output devices and external storage devices in general)
Suggested teaching activities
Types and components Using one (or more if available) discarded PCs, dissect them to reveal what
components are inside. Pass the components around the classroom.
of Highlight to learners these are the hardware components and they are so because
computer systems W & I) we can physically touch them.
Ask learners what they notice about the components and what role they think each
one plays in the computing system.
Ask learners to note, these components have been brought from inside the
computer system, so they are the internal hardware components.
Ask learners to look around the classroom and observe as many external
hardware devices that they can. They could compete to see who can note down the
most correct external hardware device in one minute. (I)
Looking at what is inside a computer: www.howstuffworks.com/inside-computer.htm
A computer system?
is an electronic device that can take a set of inputs,
process them and create a set of outputs. This is
done by a combination of hardware and
software.
1.1 Hardware and software The computer system has one or more inputs to
provide data. This data is then processed in some
way. The outcome of the processing is sent to an
output or it may be stored until some event happens
to cause it to be output.
For processing to take place, there needs to be a set
of instructions of what needs to be done. This set of
instructions is called a program.
Internal hard disk Used to store information like software and files. It is
where the OS is stored.
Optical disk drive The drive enables all optical disk drive (CD/DVD/Blu-
Ray) to run on the computer.
Hardware …
Power supply unit The is what powers the computer system. The power
supply connects to all the main components of the
computer system including the motherboard, hard
drive, optical drives etc.
Software
Software is not a physical thing (but it can of
course be stored on a physical medium such as a
CD-ROM), it is just a bunch of codes.
Application software
Definition Uses/Functions
Definition Uses/Functions
Definition Uses/Functions
Definition Uses/Functions
Software …
Types of Software System
Software
System Software
Compilers Linkers Device Drivers
Assignment on A.
B.
Information
Program
1.1 Hardware & Software C. Data
D. File
4. Which among the following is not a peripheral hardware device in a computer system?
A. A. Keyboard
B. B. Optical Drive
C. C. HDD (Hrd Disk Drive)
D. D. Printer
Learning objectives
Describe the Central Processing Unit (CPU) including its role
Describe internal memory, i.e. ROM and RAM and the differences between
them
Types and components Define input and output devices and describe the difference between them
of
computer systems … Define secondary/backing storage
Modern and fast CPUs run at around 2.8GHz and above. That means it can
perform almost 3 billion actions every second!
Intel and AMD are the most popular CPU brands.
• Temporary data from Applications in use are held in the Main Memory.
Impact of • The CPU will first check the Cache for the required piece of the data so that it can be
2. The Internal Memories – processed.
Emerging
RAM, ROM and Cache…
•
Technologies … If the data is not in the cache then the CPU will check the RAM and transfer data to the
CPU.
• The Cache will then transfer the next piece of data from the RAM into Cache.
• The CPU will again check the Cache for the next piece of data. This time the CPU will be able
to get the data from the Cache Memory.
Impact
3. Input of
and Output They pass data into the They take data from the
computer.
Emerging
Devices and Their They all take information from
computer.
They all take information from
See next slide/page
Differences …
Technologies the outside world (key presses, the computer and convert it into
hand movements, images), real world things (images, paper
convert them into data and then hardcopy, sound).
send this data into the
computer for processing.
3. What section are the mathematical operations carried out in the CPU?
A. Arithmetic and Logic Unit
B. Control unit
C. Main memory
D. None of the above
RAM (Random Access Memory) is a volatile type of memory which means all data is
lost on startup.
In contrast ROM (Read Only Memory) is non-volatile which means data is not lost on
startup. The ROM memory is Read Only and contains boot up instructions. The RAM
memory hold temporary data which is processed by the CPU.
Learning objectives
Define and describe operating systems which contain a Command Line
Interface (CLI)
Types and components Define and describe operating systems which contain a Graphical User
Interface (GUI)
of
computer systems … Describe the differences, including the benefits and drawbacks, between
operating systems which contain a CLI and those which contain a GUI
Suggested teaching activities
Using two simple tasks that can be done on a computer every day, e.g.
opening a document and saving a document. Compare carrying out these
tasks on GUI to carrying them out on a CLI. It would be best to represent this
through the use of Windows for a GUI and the command line in Windows for
CLI.
1.3 Operating
System …
Post GUI allows the use of pinching, scrolling, expanding
User Interfaces - GUI
CLI GUI
1.3 Operating In CLI we can obtain high precision. While in it, low precision is obtained.
System …
CLI is faster than GUI. The speed of GUI is slower than CLI.
User Interfaces
CLI operating system needs only While GUI operating system need
keyboard. both mouse and keyboard.
CLI GUI
- Laptops
Standalone Networked
• Smart phones can use traditional methods to make phones calls and send
messages using mobile network.
• Smart phones have operating systems which allows them to run multiple
applications.
• Like the Tablets Computers Smart Phones have many features including:
• Touch Technology
• Internet connection (Wireless/3G/4G)
• Sensors
1.4 Types of Computers • Cameras
Uses
- Smart Phones
• Sending and receiving of emails, text, photographs and multimedia messages
• Registering contacts
• Calculator, currency, alarm, etc. functions
• Browsing the internet using a mobile browser
• Playing games
• Video chat
• Point of sale terminal when paying for goods or services
• Barcode scanning
• creating high quality photographs or video
• Determining user's exact location utilizing GPS (global positioning system) satellites
9/28/2023 Created by Anozie C. (ICT, Dowen College Lagos 54
Type of computer Advantages Disadvantages
The advantages Laptop computer • Its portable due to small size and
weight.
• Limited battery life.
• Laptops are difficult to repair and
and • Battery can be recharged.
• Can connect wireless to internet.
upgrade.
• Can be stolen or lost.
Examples:
As seen in the movies AI could be potentially used in the military and police force.
❑ Finger Printing
Impact of • Staff can scan their finer prints to sign in and out of work.
Impact of Emerging Technologies
Emerging…
• Police can use finger print to authenticate an individual’s identity.
• Some laptops use finger prints biometrics to gain access to the system
Technologies … ❑ Eye Recognition
• The iris of the eye is scanned for recognition purposes.
• No physical contact is required to scan the iris which may be useful in some cultures.
• Immigration at airports use eye recognition to prevent people travelling with fraudulent
documentation
Impact of
Impact of Emerging Technologies
Emerging
…
Technologies … • The vision enhancement system amplifies infrared light so that an image can be
clearly seen even in darkness.
• Militaries across the world use this technology to complete missions and carry
out surveillance at night
❑ Benefits of robots
Impact of • No human intervention is required once the robot has been programmed.
Impact of Emerging Technologies
Emerging
… • Robots can complete tasks with more precision including robotic surgery.
• Robots can work in extreme conditions or environments
Technologies …
❑ How Robots are used factories
Impact of
Impact of Emerging Technologies
Emerging
…
Technologies …
Impact of
Impact of Emerging Technologies
Emerging
…
Technologies …
https://www.youtube.com/watch?v=Vx
0Z6LplaMU
This is where users store their documents, programs and data on the Internet rather than on
their own computers with internet connections.
2(c) a robot 1
9/28/2023 C r e a t e d b y A n o z i 2(d)
e C biometrics
. ( I C T , D1o w e n C o l l e g e L a g o s 74
ANSWER
June 2018, Paper 11
14 Many computer systems use
virtual reality. 14(a) Two from:
(a) Explain what is meant by virtual Three-dimensional, computer generated environment
reality. It can be explored and interacted with, by a person
................................................................. Can manipulate objects or perform a series of actions
............................................ Replicates an environment
Makes use of the sensory experience
................................................................. 2
.................................................................
.................................................................
.....................................................
.................................................................
................................................................. 14(b) Two from:
......... [2] Virtual reality headset / head mounted display / Virtual reality
(b) Name two pieces of hardware goggles
used in virtual reality systems. Speakers / headphone
1.............................................................. The tactile glove
Joystick / controllers / driving wheel
............................................. 2
2..............................................................
.........................................[2]
quantum cryptography 1