0% found this document useful (0 votes)
19 views132 pages

Spu 07102 Lecture Two-2

Uploaded by

josephdaud224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views132 pages

Spu 07102 Lecture Two-2

Uploaded by

josephdaud224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 132

SPU 07102

COMPUTER APPLICATIONS

Lecture Two: Components of Computer System


Mr. Shabani Bakari Juma
0717 387899
[email protected]
1
A computer system consists of two main
components;
 Hardware Component
 Software Component

Each of these two components can be divided further


into minor components based on their functions and
location.

2
THE HARDWARE COMPONENT

3
Hardware represents the physical and tangible
components of a computer i.e. the components that
can be seen and touched.

Some of the hardware components are found inside


the computer system unit while others are found
outside.

4
Those components found outside are referred to as
peripheral devices.

Peripheral devices are connected to the system units


by means of cables or wireless media.

Example of peripheral devices include keyboard,


mouse, printer, scanner, monitor/display etc.

5
A computer hardware can be an input device, output
device, storage device or internal/processing
component.

6
Input Devices
These are devices used to enter data/information
into the computer for storage or processing.

These devices include Keyboard Mouse, Joy Stick,


Light pen, Track Ball, Scanner, Digital Camera, Graphic
Tablet, Microphone, Magnetic Ink Card Reader, Optical
Character Reader, Bar Code Reader, Optical Mark
Reader.

7
Keyboard
Keyboard is the most common and very popular
input device which helps in inputting data to the
computer.

The layout of the keyboard is like that of traditional


typewriter, although there are some additional keys
provided for performing additional functions.

8
Keyboards are of two sizes 84 keys or 101/102 keys, but
now days keyboards with 104 keys or 108 keys are also
available for Windows and Internet.

9
The letters in the keyboard are not arranged in any
alphabetical order.

Instead, they have been arranged in such a way that a


user can easily type using English language.

Thus, the most frequently used English letters are


placed in a position where can easily be clicked.

10
11
Mouse
Mouse is most popular pointing device.

It is a very famous cursor - control device having a


small palm size box with a round ball at its base which
senses the movement of mouse and sends
corresponding signals to CPU when the mouse
buttons are pressed.

12
Generally, it has two buttons called left and right
button and a wheel is present between the buttons.

Mouse can be used to control the position of cursor


on screen, but it cannot be used to enter text into the
computer.

13
Advantages
Easy to use

Not very expensive

Moves the cursor


faster than the
arrow keys of
keyboard.

14
Scanner
Scanner is an input device which works more like a
photocopy machine.

It is used when some information is available on a


paper and it is to be transferred to the hard disc of the
computer for further manipulation.

Uses no Ink

15
 Scanner captures
images from the
source which are
then converted into
the digital form that
can be stored on the
disc.

 These images can be


edited before they
are printed.

16
Microphone
Microphone is an input
device to input sound that
is then stored in digital
form.

The microphone is used for


various applications like
adding sound to a
multimedia presentation or
for mixing music.
17
Magnetic Ink Card Reader(MICR)
MICR input device is generally used in banks because
of a large number of cheques to be processed every
day.

The bank's code number and cheque number are


printed on the cheques with a special type of ink that
contains particles of magnetic material that are
machine readable.
18
This reading
process is called
Magnetic Ink
Character
Recognition (MICR).

The main
advantages of MICR
is that it is fast and
less error prone.

19
Optical Character Reader (OCR)
OCR is an input device used to
read a printed text.

OCR scans text optically


character by character, converts
them into a machine readable
code and stores the text on the
system memory.
20
21
Bar Code Readers
Bar Code Reader is a device used for reading bar
coded data (data in form of light and dark lines).

Bar coded data is generally used in labelling goods,


numbering the books etc.

It may be a hand held scanner or may be embedded


in a stationary scanner.
22
Bar Code Reader
scans a bar code
image, converts it
into an
alphanumeric
value which is then
fed to the
computer to which
bar code reader is
connected.

23
Optical Mark Reader (OMR)
OMR is a special type of optical scanner used to
recognize the type of mark made by pen or pencil.

It is used where one out of a few alternatives is to be


selected and marked.

It is specially used for checking the answer sheets of


examinations having multiple choice questions.
24
25
26
Digital Camera
A digital camera or digicam is a camera that captures
photographs in digital memory.

Many more cameras are now incorporated into


mobile devices like smartphones, which can, among
many other purposes, use their cameras to initiate live
video-telephony and directly edit and upload imagery
to others
27
Many digital cameras
can also record moving
videos with sound.

Therefore, a digital
camera is used as an
input device for both
still pictures and
videos.

28
Output Devices
An output device is any peripheral that receives data
from a computer, usually for display, projection, or
physical reproduction.

Some examples of output devices are


monitor/display, printer, speakers and projector.

29
Monitor
Alternatively referred to as a video display terminal (VDT)
and video display unit (VDU).

It monitor encompasses a display screen for video images


and casing that holds it.

In its most common usage, monitor refers only to devices


that contain no electronic equipment other than what is
essentially needed to display and adjust the characteristics of
an image.
30
Like most early TVs,
the early computer
monitors were
comprised of a CRT
(Cathode Ray Tube)
and a fluorescent
screen. Today, all
monitors are created
using flat panel
display technology
(LCD, TFT and LED).

31
Projector/Image Projector
Is an optical device that projects an image (or moving
images) onto a surface, commonly a projection
screen.

Most projectors create an image by shining a light


through a small transparent lens, but some newer
types of projectors can project the image directly, by
using lasers.
32
33
Printer
A printer is an external hardware output device
responsible for taking electronic data stored on a
computer or computing device and generating a hard
copy of that data.

Printers are one of the most commonly used


peripherals on computers and are commonly used to
print text and photos.
34
Today, the most
common printers
used with a
computer are Inkjet,
LaserJet and Dot
Matrix printers.

35
Speaker
Computer speakers, or multimedia speakers, are
speakers sold for use with computers, although
usually capable of other audio uses.

Most such speakers have an internal amplifier and


consequently require a power source, which may be
by a mains power supply often via an AC adapter,
batteries, or a USB port.

36
The signal input connector is often a 3.5 mm jack
plug.

Battery-powered wireless Bluetooth speakers require


no connections at all.

Most computers have speakers of low power and


quality built in; when external speakers are connected
they disable the built-in speakers.

37
 Speakers are used to
output audio data
stored in the
computer or directly
from the
Microphone

38
COMPUTER PORTS

39
Computer ports are the interfaces that connect the
peripherals to the computer.

Depending on the device being connected, different


types of ports are available.

For desktop computers, ports are found in front and


at the back of the system unit.

40
For Laptop computers, ports are found at the back
and on the sides of the system unit.

To the inside, these ports connect with expansion


cards mounted on the expansion slots of the
motherboard.

Some of these ports are the VGA, USB, AV, HDMI,


RJ45, PS/2 and Display ports

41
Video Graphic Array (VGA) Port
Used to connect computer with the display (monitor,
projector, Television)

Plugged to it is the so called VGA cable.

Some computers especially notebook have no VGA port

42
43
VGA carries
only picture
and not sound.

44
Higher Definition Media Interface (HDMI) Port
Like the VGA, it is used to connect computer with the
display (monitor, projector, Television)

Plugged to it is the so called HDMI cable.

Unlike the VGA, HDMI is capable of transferring Higher


Definition pictures (HD).

45
46
HDMI carries
both picture
and sound.

47
Display Port
A variation of the HDMI Port for most of the desktop
computers.

It carries both images in HD and sound.

Not all computers have this port, especially most of


the laptop does not posses it.

48
49
Universal Serial Bus (USB) Port
The common port that connects most of peripherals.

They varies in version ranging from USB1.1, USB 2.0,


USB3.0 and the latest version USB 3.1

The higher the version the higher the speed.

Can be used to transmit both data and electricity


50
51
Audio Video (AV) Port
Used to connect Computer with speaker or Display
like multimedia projector.

Consists of three ports, Yellow for video/picture,


white and red for sound.

52
53
PS/2 Port
Used to connect keyboard or mouse using the 6-pin
connector called PS/2 cable.

Available on desktop computers.

Most of the new desktop lack this port as the


keyboards and mice are now connected with either
USB or wirelessly.
54
55
Registered Jack 45 (RJ45) Port
A standardized telecommunication network interface for
connecting voice and data equipment to a service
provided by a local exchange carrier or long distance
carrier.

In computers, RJ45 is used for network access.

Plugged to it is the RJ45 terminator of the network cable.


56
57
Connecting Computer and its Peripherals

58
Storage Devices
A memory is just like a human brain.

It is used to store data and instructions.

Computer memory is the storage space in computer


where data to be processed and instructions required
for processing the data are stored.
59
The memory is divided into large number of small
parts called cells.

Each location or cell has a unique address which


varies from zero to memory size minus one.

60
Types of Memory

Cache Memory

Primary Memory/Main Memory

Secondary Memory

61
Cache Memory
Cache memory is a very high speed semiconductor
memory which can speed up CPU.

It acts as a buffer between the CPU and main


memory.

It is used to hold those parts of data and program


which are most frequently used by CPU.
62
The parts of data and programs are transferred from
disk to cache memory by operating system, from
where CPU can access them.

Cache memory has limited capacity.

It is very expensive.

63
64
Primary Memory (Main Memory)
Holds only those data and instructions on which
computer is currently working.

It has limited capacity and data is lost when power is


switched off.

It is generally made up of semiconductor device.


65
These memories are not as fast as registers.

The data and instruction required to be processed


reside in main memory.

It is divided into two subcategories RAM (Random


Access Memory) and ROM (Read Only Memory).

66
Characteristics of Main Memory
These are semiconductor memories.
Usually volatile memory (data lost when computer is
powered off).
It is working memory of the computer.
Faster than secondary memories.
A computer cannot run without primary memory.

67
68
Secondary Memory
This type of memory is also known as external
memory or non-volatile.

It is slower than main memory.

These are used for storing data/Information


permanently.

69
CPU directly does not access these memories instead
they are accessed via input-output routines.

Contents of secondary memories are first transferred


to main memory, and then CPU can access it.

Example of these memories are disk (Hard Disk), CD,


DVD, Flash Disk, Memory Card etc.

70
Characteristic of Secondary Memory
These are magnetic and optical memories

It is known as backup memory.

It is non-volatile memory.

71
It is used for storage of data in a computer.

Computer may run without secondary memory.

Slower than primary memories.

72
73
Processing Device
The CPU is the part of a computer system that is
commonly referred to as the "brains" of a computer.

The CPU is also known as the processor or


microprocessor.

It performs all type of data processing operations.

74
It stores data, intermediate
results and instructions
(program).

It controls the operation of


all parts of computer.

A processor can have a


32bits architecture or a
64bits architecture but not
both.
75
The Computer Motherboard
The motherboard is a printed circuit board that is the
foundation of a computer, located at the bottom of
the computer case.

It hosts the CPU, RAM, and all other computer


hardware components.

76
Most
importantly, the
motherboard
allows hardware
components to
communicate
with one
another.

77
MOTHERBOARD FEATURES
Component Description
Motherboard/System The main computer circuit board that connects all computer
board components.
CPU The central processing unit that gets data from the memory and
performs mathematical or logical operations to process the data.
Memory (RAM) chips The temporary holding area inside the computer where data is
stored electronically and make it accessible for processing. Data
must be stored in memory, so that the processor can process it. RAM
stands for Random Access Memory
Memory (RAM) slots The slots on the motherboard used to hold memory (RAM) chips.

Expansion Cards Removable circuit boards used to add new peripherals or increase
computer capabilities.
Expansion Slots The slots used to hold expansion cards.

78
79
80
THE SOFTWARE COMPONENT

81
Software is a set of programs, which is designed to
perform a well-defined function.

A program is a sequence of instructions written to


solve a particular problem.

In a computer system, software component is divided


into two sub-components, system software and
application software.
82
System Software
The system software is collection of programs
designed to operate, control, and extend the
processing capabilities of the computer itself.

System software in most cases are prepared by


computer manufactures or hardware vendors.

83
These software products comprise of programs
written in low-level languages which interact with the
hardware at a very basic level.

System software serves as the interface between


hardware and the end users.

System software is further divided into two


components, Operating System (OS) and Device
drivers.

84
Operating System (OS)
Is a special computer program that is present on
every desktop or notebook computer, in addition to
many others ranging from mainframes to PDAs.

The operating system controls the way the computer


works from the time it is turned on until it is shut
down.

85
The operating system manages the various hardware
components, including the CPU, memory, storage
devices, and peripheral devices.

It also coordinates with the various software


applications that might be running.

86
87
Operating System Architecture
Like the processor architecture, operating
system also can have architecture of 32bits or
64bits but not both.

A 32bits OS can be installed in any computer


(32bits or 64bits computer) while a 64bits OS
can only be installed in 64bits computer.

88
On the other hand, a 64bits OS supports all
application software (32bits and 64bits application
software) while a 32bits OS supports only 32bits
application software.

In a computer, a 32bits architecture is denoted as x86


while a 64bits architecture is denoted as x64

89
32bits OS or 64bits OS?
The main difference of 32bits OS and
64bits OS is the size of memory (RAM) they
support.

The maximum size of the memory


supported by an OS is a function of the
number of bits of that OS.
90
32bits OS or 64bits OS?
That is, an OS of n-bits support a memory
size up to 2n bits.

Thus, 32bits OS support up to 4GB RAM


while there is almost no memory limit for
64bits OS.
91
OS Maximum Memory (RAM) Supported
architecture
= 232 bits
= 4, 294, 967, 296 bits
32 bits = 4, 194, 304 bytes
= 4, 096 Megabytes (MB)
= 4 Gigabytes (GB)
264 bits
= 18, 446, 744, 073, 709, 551,616 bits
= 18, 014, 398, 509, 481, 984 bytes
64 bits = 17, 592, 186, 044,416 Megabytes (MB)
= 17, 179, 869, 184 Gigabytes (GB)
Approx. 17.2 Billion GB 92
What happen if more than 4GB RAM
is installed in a 32bits OS computer?
If more than 4GB RAM (let say 8GB) is
installed in a computer running 32bits
architecture OS, the OS will only see and use
4GB of the memory (usable memory).

93
What happen if more than 4GB RAM
is installed in a 32bits OS computer?
The rest of the memory will be hidden and
will not be used.

Bear in your mind that, RAM has nothing to


do with computer speed.

94
What happen if more than 4GB RAM
is installed in a 32bits OS computer?
Computer speed is determined with the
processor.

RAM determine the number of


tasks/applications your computer can run
simultaneously (multitask).
95
Device Driver
Is a program that controls a particular type of device
that is attached to your computer.

There are device drivers for printers, displays, CD-


ROM readers, diskette drives, and so on.

When you buy an operating system, many device


drivers are built into the product.
96
Examples of Computer Operating Systems
Operating Variant/Distribution Open/closed
System source
Microsoft XP, VISTA, 7, 8.x, 10, 11 Closed
Windows® etc
Linux Ubuntu, Mint, Debian, Open
Fedora, Red Hat etc
Mac OS Classic, OS X Closed
97
Examples of Mobile Operating Systems
Operating System Owner

iOS Apple Inc.

Android Google Inc.

Symbian BlackBerry Inc.

Microsoft Windows 8 Microsoft Inc.

98
Application Software
Comprised of programs that enable you to
accomplish tasks and use the computer in a
productive manner.

 Application software cannot work if operating


system is not working.

99
There are many different kinds of application
software, although they often fall into one of several
general categories, each of which has a different
purpose.

These categories include financial and business-


related software, graphics and multimedia software,
educational and reference software, entertainment
software, and communication software.

100
You might be most familiar with productivity
software, which includes the following applications

101
Word processing software
Used to create, edit, format, and save documents and
other text-based files.

Word processing software enables you to create or


edit letters, reports, memos, and many other types of
written documents and print them out.

102
Revisions to existing documents can be made quickly and
easily, without having to re-create the entire document.

Documents created with this type of software can also


include graphics, charts, and other graphic elements.

Microsoft Word, Lotus Word Pro, and Corel WordPerfect


are all examples of word processing programs.

103
Spreadsheet software
Spreadsheet software enables you to perform
calculations and other mathematical tasks.

Similar to the documents used by accountants,


spreadsheets contain data entered in columns and
rows and enable you to perform calculations, create
scenarios, perform “what-if ” analyses, chart and
graph data, and format the worksheet layout.
104
A key advantage of spreadsheet software is its
capability to recalculate spreadsheets without user
intervention.

When data used in a calculation or formula is


changed, the spreadsheet software automatically
updates the worksheet with the correct result.

Microsoft Excel, Lotus 1-2-3, and Corel Quattro Pro


are examples of spreadsheet programs.
105
Database software
Databases are used to store and organize large
amounts of data.

Typically, database software can be used to manage


various types of information, such as that found in
large mailing lists, inventories, order histories, and
invoicing.

106
Databases help you to enter, store, sort, filter,
retrieve, and summarize the information they contain
and then generate meaningful reports.

Common database programs include Microsoft


Access, Lotus Approach, and Corel Paradox.

107
Presentation software
Because of presentation software, lecturers no longer
need to rely on flip charts, slide projectors, or overhead
transparencies for their presentations.

This software is used to create graphic presentations,


known as slide shows that can be shown to large groups
by means of an overhead projector or displayed on the
Web.
108
Presentation software is also used to create audience
handouts, speaker notes, and other materials that can
be used during an oral presentation or for distribution
to an audience.

Microsoft PowerPoint, Lotus Freelance Graphics, and


Corel Presentations are examples of presentation
software programs.

109
COMPUTER MALWARE

110
Malware (malicious software) is any software
intentionally designed to cause damage to a
computer, server, client, or computer network.

By contrast, software that causes unintentional harm


due to some deficiency is typically described as a
software bug.

111
Programs are also considered malware if they secretly act
against the interests of the computer user.

For example, at one point Sony music Compact discs


silently installed a rootkit on purchasers' computers with
the intention of preventing illicit copying, but which also
reported on users' listening habits, and unintentionally
created extra security vulnerabilities.

112
 Wide variety of types of malware exist, including
computer viruses, worms, Trojan horses, ransomware,
spyware, adware, rogue software, and scareware

113
Virus
Like their biological namesakes, viruses attach
themselves to clean files and infect other clean files.

They can spread uncontrollably, damaging a system’s


core functionality and deleting or corrupting files.

They usually appear as an executable file (.exe).


114
Trojans
This kind of malware disguises itself as legitimate
software, or is hidden in legitimate software that has
been tampered with.

It tends to act discreetly and create backdoors in your


security to let other malware in.

115
Spyware
No surprise here — spyware is malware designed to
spy on you.

It hides in the background and takes notes on what


you do online, including your passwords, credit card
numbers, surfing habits, and more.

116
Worms
Worms infect entire networks of devices, either local or
across the internet, by using network interfaces.

It uses each consecutively infected machine to infect others.

Can self-replicate without a host program and typically


spreads without any human interaction or directives from the
malware authors.
117
Ransomware
This kind of malware typically is designed to infect a
user's system and encrypt the data.

Cybercriminals then demand a ransom payment from


the victim in exchange for decrypting the system's
data.

118
Top Five 2021 Ransomware Attacks

https://www.raconteur.net/technology/the-five-
most-important-ransomware-attacks-of-2021/

Retrieved 16th November, 2021


119
5. CNA Financial, 21-03
Attacker Phoenix
Demanded Unknown
Ransom
Paid Ransom Unconfirmed (reported to be $40m by
people close to the incident)
Attack Vector Unknown (believed to be malicious
browser update delivered via a legitimate
website)
120
4. Brenntag, 26-04
Attacker DarkSide
Demanded $7.5M
Ransom
Paid Ransom $4.4M
Attack Vector Stolen Credentials

Brenntag, a German chemical distribution company


operating in more than 70 countries. 121
3. Ireland’s Health Service Executive (HSE), 14-05
Attacker Conti (Wizard Spider)
Demanded $20M
Ransom
Paid Ransom None
Attack Vector Unconfirmed (Intelligence report suggests
TrickBot, IcedID or BazarLoader malware –
usually executed through phishing attacks)
HSE is the publicly funded healthcare system in the Republic of Ireland,
responsible for the provision of health and personal social services
122
2. Kaseya, 02-07
Attacker REvil
Demanded $70M
Ransom
Paid Ransom None (Key recovered on 22nd July, 2021)
Attack Vector Previously unknown “zero-day” vulnerabilities
in Kaseya’s Virtual System Administrator
(VSA) software
Kaseya Remote Control enables technicians and administrators to remotely
troubleshoot and manage end user computers regardless of their location.
Quickly access endpoints without disrupting users to proactively resolve issues.
123
1. Colonial Pipeline, 07-05
Attacker DarkSide
Demanded $5M
Ransom
Paid Ransom $4.4M
Attack Vector Single compromised virtual private network
(VPN) account password

Colonial Pipeline, Largest USA Oil Supply Company


124
Adware
Though not always malicious in nature, aggressive
advertising software can undermine your security just
to serve you ads — which can give other malware an
easy way in.

Plus, let’s face it: pop-ups are really annoying.

125
Keyloggers
Also called system monitors, are used to see nearly
everything a user does on their computer.

This includes emails, opened web-pages, programs


and keystrokes.

126
How to Protect Against Malware
When it comes to malware, prevention is better than
a cure.

Fortunately, there are some common sense, easy


behaviors that minimize your chances of running into
any nasty software.

127
i. Don’t trust strangers online! “Social engineering”,
which can include strange emails, abrupt alerts, fake
profiles, and curiosity-tickling offers, are the #1
method of delivering malware. If you don’t know
exactly what it is, don’t click on it.

128
ii. Double-check your downloads! From pirating sites
to official storefronts, malware is often playing just
around the corner. So before downloading, always
double-check that the provider is trustworthy by
carefully reading reviews and comments.

129
iii. Get an ad-blocker! Malvertising – where hackers
use infected banners or pop-up ads to infect your
device – is on the rise. You can’t know which ads
are bad: so it’s safer to just block them all with a
reliable ad-blocker.

130
iv. Careful where you browse! Malware can be found
anywhere, but it’s most common in websites with
poor backend security, like small, local websites. If
you stick to large, reputable sites, you severely
reduce your risk of encountering malware.

131
The End

132

You might also like