0% found this document useful (0 votes)
11 views11 pages

LO 1 Computer

The document provides an overview of computer functionality, covering types of computers, core components, input/output/storage devices, software types, memory, and communication networks. It distinguishes between various computer types such as supercomputers, mainframes, and microcomputers, and explains the roles of different software and memory types. Additionally, it addresses internet-related concepts and encourages discussions on security tools and safe computing practices.

Uploaded by

Simamkele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views11 pages

LO 1 Computer

The document provides an overview of computer functionality, covering types of computers, core components, input/output/storage devices, software types, memory, and communication networks. It distinguishes between various computer types such as supercomputers, mainframes, and microcomputers, and explains the roles of different software and memory types. Additionally, it addresses internet-related concepts and encourages discussions on security tools and safe computing practices.

Uploaded by

Simamkele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Understanding How Computers

Function
LO1: Apply knowledge of how
computers function in general
Presented by [N Cekiso-Smith]
Learning Outcome 1 (LO1)
• • Identify different types of computers
• • Understand components and devices
• • Differentiate between software types
• • Explain memory and networks
Types of Computers
• Type | Capacity | Speed | Cost | Users
• Supercomputer | Extremely high | Extremely
fast | Very costly | Scientific research
• Mainframe | Very high | High | Costly | Large
organizations
• Minicomputer | Medium | Moderate |
Moderate | SMEs
• Microcomputer | Low | Varies | Affordable |
Individuals
Core Components of a Computer
• • CPU (Processor)
• • Motherboard
• • RAM
• • Power Supply
• • Hard Drive
Input, Output & Storage Devices
• Input Devices: Keyboard, Mouse, Scanner,
Webcam
• Output Devices: Monitor, Printer, Speakers
• Storage Devices: SSD, HDD, USB Drive, Cloud
Types of Computer Software
• System Software: OS, Utility Programs, Device
Drivers
• Application Software: Word Processors,
Spreadsheets, Browsers
Understanding Memory
• Primary Memory: RAM, ROM
• Secondary Storage: HDD, SSD-
• Solid state drives (SSD) and hard disk drives
(HDD) are data storage devices.
• SSDs store data in flash memory, while HDDs
store data in magnetic disks.
• SSDs are a newer technology that uses silicon's
physical and chemical properties to offer more
storage volume, speed, and efficiency.
• Measurement Units: Bit, Byte, KB, MB, GB, TB
Communication Networks
• LAN: Local Area Network - Small area like an
office
• MAN: Metropolitan Area Network - Covers a
city
• WAN: Wide Area Network - Covers a large
area like the internet
Internet, Intranet, Extranet &
WWW
• Internet: Public global network
• Intranet: Private internal network
• Extranet: Limited access for external partners
• WWW: Web-based services over the Internet
(websites)
Summary of Key Concepts
• • Computer types
• • Main components
• • Devices
• • Software
• • Memory
• • Networks
• • Web-related terms
Let’s Discuss
Not exceed 5pages include references, Tahoma-12,1.5,justify
• ASS-G-1-8
Which computer type or network are you most familiar and what
Share your Healthy and safe computing environment

Contextually differentiate and apply Security tools for data protection in your organization
Describe and discuss Malicious software and viruses and protective ways against

Discuss and explain ways of protecting computers and computing resources in your own
environment

Contextually discuss and assess Security tools used to protect data from fraud,

Apply your contextual knowledge on hackers and other technology interruptions


Contextually discus rules of netiquette in your organization

You might also like