Spu 07102 Lecture Two-2
Spu 07102 Lecture Two-2
COMPUTER APPLICATIONS
2
THE HARDWARE COMPONENT
3
Hardware represents the physical and tangible
components of a computer i.e. the components that
can be seen and touched.
4
Those components found outside are referred to as
peripheral devices.
5
A computer hardware can be an input device, output
device, storage device or internal/processing
component.
6
Input Devices
These are devices used to enter data/information
into the computer for storage or processing.
7
Keyboard
Keyboard is the most common and very popular
input device which helps in inputting data to the
computer.
8
Keyboards are of two sizes 84 keys or 101/102 keys, but
now days keyboards with 104 keys or 108 keys are also
available for Windows and Internet.
9
The letters in the keyboard are not arranged in any
alphabetical order.
10
11
Mouse
Mouse is most popular pointing device.
12
Generally, it has two buttons called left and right
button and a wheel is present between the buttons.
13
Advantages
Easy to use
14
Scanner
Scanner is an input device which works more like a
photocopy machine.
Uses no Ink
15
Scanner captures
images from the
source which are
then converted into
the digital form that
can be stored on the
disc.
16
Microphone
Microphone is an input
device to input sound that
is then stored in digital
form.
The main
advantages of MICR
is that it is fast and
less error prone.
19
Optical Character Reader (OCR)
OCR is an input device used to
read a printed text.
23
Optical Mark Reader (OMR)
OMR is a special type of optical scanner used to
recognize the type of mark made by pen or pencil.
Therefore, a digital
camera is used as an
input device for both
still pictures and
videos.
28
Output Devices
An output device is any peripheral that receives data
from a computer, usually for display, projection, or
physical reproduction.
29
Monitor
Alternatively referred to as a video display terminal (VDT)
and video display unit (VDU).
31
Projector/Image Projector
Is an optical device that projects an image (or moving
images) onto a surface, commonly a projection
screen.
35
Speaker
Computer speakers, or multimedia speakers, are
speakers sold for use with computers, although
usually capable of other audio uses.
36
The signal input connector is often a 3.5 mm jack
plug.
37
Speakers are used to
output audio data
stored in the
computer or directly
from the
Microphone
38
COMPUTER PORTS
39
Computer ports are the interfaces that connect the
peripherals to the computer.
40
For Laptop computers, ports are found at the back
and on the sides of the system unit.
41
Video Graphic Array (VGA) Port
Used to connect computer with the display (monitor,
projector, Television)
42
43
VGA carries
only picture
and not sound.
44
Higher Definition Media Interface (HDMI) Port
Like the VGA, it is used to connect computer with the
display (monitor, projector, Television)
45
46
HDMI carries
both picture
and sound.
47
Display Port
A variation of the HDMI Port for most of the desktop
computers.
48
49
Universal Serial Bus (USB) Port
The common port that connects most of peripherals.
52
53
PS/2 Port
Used to connect keyboard or mouse using the 6-pin
connector called PS/2 cable.
58
Storage Devices
A memory is just like a human brain.
60
Types of Memory
Cache Memory
Secondary Memory
61
Cache Memory
Cache memory is a very high speed semiconductor
memory which can speed up CPU.
63
64
Primary Memory (Main Memory)
Holds only those data and instructions on which
computer is currently working.
66
Characteristics of Main Memory
These are semiconductor memories.
Usually volatile memory (data lost when computer is
powered off).
It is working memory of the computer.
Faster than secondary memories.
A computer cannot run without primary memory.
67
68
Secondary Memory
This type of memory is also known as external
memory or non-volatile.
69
CPU directly does not access these memories instead
they are accessed via input-output routines.
70
Characteristic of Secondary Memory
These are magnetic and optical memories
71
It is used for storage of data in a computer.
72
73
Processing Device
The CPU is the part of a computer system that is
commonly referred to as the "brains" of a computer.
74
It stores data, intermediate
results and instructions
(program).
76
Most
importantly, the
motherboard
allows hardware
components to
communicate
with one
another.
77
MOTHERBOARD FEATURES
Component Description
Motherboard/System The main computer circuit board that connects all computer
board components.
CPU The central processing unit that gets data from the memory and
performs mathematical or logical operations to process the data.
Memory (RAM) chips The temporary holding area inside the computer where data is
stored electronically and make it accessible for processing. Data
must be stored in memory, so that the processor can process it. RAM
stands for Random Access Memory
Memory (RAM) slots The slots on the motherboard used to hold memory (RAM) chips.
Expansion Cards Removable circuit boards used to add new peripherals or increase
computer capabilities.
Expansion Slots The slots used to hold expansion cards.
78
79
80
THE SOFTWARE COMPONENT
81
Software is a set of programs, which is designed to
perform a well-defined function.
83
These software products comprise of programs
written in low-level languages which interact with the
hardware at a very basic level.
84
Operating System (OS)
Is a special computer program that is present on
every desktop or notebook computer, in addition to
many others ranging from mainframes to PDAs.
85
The operating system manages the various hardware
components, including the CPU, memory, storage
devices, and peripheral devices.
86
87
Operating System Architecture
Like the processor architecture, operating
system also can have architecture of 32bits or
64bits but not both.
88
On the other hand, a 64bits OS supports all
application software (32bits and 64bits application
software) while a 32bits OS supports only 32bits
application software.
89
32bits OS or 64bits OS?
The main difference of 32bits OS and
64bits OS is the size of memory (RAM) they
support.
93
What happen if more than 4GB RAM
is installed in a 32bits OS computer?
The rest of the memory will be hidden and
will not be used.
94
What happen if more than 4GB RAM
is installed in a 32bits OS computer?
Computer speed is determined with the
processor.
98
Application Software
Comprised of programs that enable you to
accomplish tasks and use the computer in a
productive manner.
99
There are many different kinds of application
software, although they often fall into one of several
general categories, each of which has a different
purpose.
100
You might be most familiar with productivity
software, which includes the following applications
101
Word processing software
Used to create, edit, format, and save documents and
other text-based files.
102
Revisions to existing documents can be made quickly and
easily, without having to re-create the entire document.
103
Spreadsheet software
Spreadsheet software enables you to perform
calculations and other mathematical tasks.
106
Databases help you to enter, store, sort, filter,
retrieve, and summarize the information they contain
and then generate meaningful reports.
107
Presentation software
Because of presentation software, lecturers no longer
need to rely on flip charts, slide projectors, or overhead
transparencies for their presentations.
109
COMPUTER MALWARE
110
Malware (malicious software) is any software
intentionally designed to cause damage to a
computer, server, client, or computer network.
111
Programs are also considered malware if they secretly act
against the interests of the computer user.
112
Wide variety of types of malware exist, including
computer viruses, worms, Trojan horses, ransomware,
spyware, adware, rogue software, and scareware
113
Virus
Like their biological namesakes, viruses attach
themselves to clean files and infect other clean files.
115
Spyware
No surprise here — spyware is malware designed to
spy on you.
116
Worms
Worms infect entire networks of devices, either local or
across the internet, by using network interfaces.
118
Top Five 2021 Ransomware Attacks
https://www.raconteur.net/technology/the-five-
most-important-ransomware-attacks-of-2021/
125
Keyloggers
Also called system monitors, are used to see nearly
everything a user does on their computer.
126
How to Protect Against Malware
When it comes to malware, prevention is better than
a cure.
127
i. Don’t trust strangers online! “Social engineering”,
which can include strange emails, abrupt alerts, fake
profiles, and curiosity-tickling offers, are the #1
method of delivering malware. If you don’t know
exactly what it is, don’t click on it.
128
ii. Double-check your downloads! From pirating sites
to official storefronts, malware is often playing just
around the corner. So before downloading, always
double-check that the provider is trustworthy by
carefully reading reviews and comments.
129
iii. Get an ad-blocker! Malvertising – where hackers
use infected banners or pop-up ads to infect your
device – is on the rise. You can’t know which ads
are bad: so it’s safer to just block them all with a
reliable ad-blocker.
130
iv. Careful where you browse! Malware can be found
anywhere, but it’s most common in websites with
poor backend security, like small, local websites. If
you stick to large, reputable sites, you severely
reduce your risk of encountering malware.
131
The End
132