You are on page 1of 20

 

What I Need to Know 


 
Lesson 5 – COMPUTER OPERATIONS & INTERNET NAVIGATIONS (COIN) 
Sub Topics: 
-Computer System Elements (Hardware, Software, People ware) 
-Computer Operations (Input, Process, Output, Storage) 
-Web Browsers and Search Engines 
-Netiquette 
-Cyber safety 
After going through this module, you are expected to: 
1. Identify the parts and functions of the computer system 
2. Categorize and name input, output, process computer system  
3. Unlock basic internet terminologies, features, and functions 
4. Observe internet etiquettes (netiquette) in using on-line sources 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

2
 
 
TABLE OF CONTENTS 
Lesson​ ​5 
Computer systems are made up of hardware and software. 
Hardware 
Software 
Peopleware 
Features of Internal Hardware Computer Components 
Features of External Hardware Computer Components 
Web Browsers and Search Engines 
Netiquette 
Cybersecurity 
 
 
 
 
 
 
 
 
 

3
Lesson  Lesson 5: Computer 
5  Operations and Internet 
Navigations (COIN)
 

What’s In 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

4
What is a computer system?
Components form the complete computer system. A
computer system is made up of 4 main types of
components:
● Input Devices (keyboard, mouse etc)
● Output Devices (monitor, speakers etc)
● Secondary Storage Devices (hard disk drive,
CD/DVD drive etc)
● Processor and Primary Storage Devices (cpu, RAM)

 
 

What is It 
 
"All the different pieces of electrical hardware that join together
make up the complete computer system."

Computer systems​ are made up of ​hardware​ and ​software​.  


Computer hardware​ is made up of the parts of the computer that you can 
touch: its physical components. 
Software​ is the programs, instructions and data that controls the operation 
of a computer and enables the computer to carry out a task. 
Hardware 
When you look at a computer and all the peripheral devices that are 
attached to it, you can see examples of hardware such as: 
-monitor -mouse -speakers 
-keyboard -printer -scanner 
 

5
 
Can you identify each of the seven examples of hardware listed in this 
picture? 

 
 
Software 
-There are two types of software that are used to operate a computer. 

Peopleware 
-is sometimes considered a third aspect that takes into account the 
importance of humans in the computing process​. 
 
Examples of peopleware include individual people, groups of people, project 
teams, businesses, developers, and end users. While peopleware can mean 
many different things, it always refers to the ​people who develop or use 
computer​ systems​. 
 

6
Features of Internal Hardware Computer Components 
Internal computer components are designed to fit ​INSIDE​ the computer 
system and they all carry out important roles. 
● Motherboard ​(this does something with the data to make it useful 
information) 
● Processor ​(central processing unit) 
● Internal Memory ​(RAM and ROM) 
● Video Card ​(aka graphics card) 
● Sound Card 
● Internal Hard Disk Drive 
Motherboard 
-​The motherboard is ​central​ to any computer system. 
-All components ​plug into the motherboard​ either directly (straight into 
the circuit board) or indirectly (via USB ports). 
-Once connected to the motherboard, the components can ​work together​ to 
form the ​computer system​. 
-Components communicate and ​send signals​ to each other via the ​BUS 
Network​. 

7
 
Processor (CPU / Central Processing Unit) 
-The Central Processing Unit (CPU) is the ​brain of the computer​. 
-The CPU ​'controls'​ what the computer does and is responsible for 
performing ​calculations​ and ​data processing​. It also handles the 
movement of data to and from system memory. 
-CPU's come in a variety of speeds which are known as ​'clock rates'​. Clock 
rates are measured in ​'Hertz'​. Generally, the faster the clock rate, the faster 
the performance of the computer. 
-There are two main brands of CPU currently on the market... AMD and 
Intel: 

Internal Memory (RAM and ROM) 


-There are two types of internal memory - ​RAM​ and ​ROM​. 
-RAM and ROM are used to ​store computer data​ and this can be directly 
accessed by the CPU. 
-RAM and ROM are sometimes referred to as ​'Primary Storage'​. 
 
RAM (Random Access Memory) 
-RAM is used to ​temporarily store information​ that is ​currently  
in use​ by the computer. This can include anything from word  
documents to videos. 
-RAM can be ​read from and written to​ and so the information stored 
in RAM can change all the time (it depends what tasks you are using 
the computer for). 
-RAM is a ​fast memory​. Data can be written to and read from RAM 
very quickly. RAM is generally measured in GB (Gigabytes). 
-RAM is ​Volatile Memory​. This means that information stored in 
RAM is deleted as soon as the computer is turned off. 
-The ​more RAM​ you have installed in your computer -- the ​faster it 
can perform​. You can open and use more programs at the same time 
without slowing the computer down. 

8
 

ROM (Read Only Memory) 


-ROM is used to ​permanently store instructions​ that tell the  
computer how to ​boot​ (start up). It also ​loads the operating  
system​ (e.g. Windows). 
These instructions are known as the ​BIOS​ (Basic input/output 
system) or the boot program. 
-Information stored in ROM is known as ​READ ONLY​. This means 
that the contents of ROM cannot be altered or added to by the user. 
-ROM is ​fast memory​. Data stored in ROM can be accessed and read 
very quickly. 
-ROM is ​Non-Volatile​ memory. This means that stored information is 
not lost when the computer loses power. 
-Other examples of ROM include: 
​DVD/CD ROMS​ bought in stores containing pre-recorded music  
and movie files. These are played back at home but cannot be   
altered. 
​ROM​ in printers which is used to store different font types. 

9
Video Card (graphics card) 
 
-​Graphics cards are hardware devices that plug into the motherboard and 
enable the computer to ​display images on the monitor​. 
-Graphics cards usually require the ​installation of software​ alongside the 
hardware. The software ​instructs the computer how to use the graphics 
card​ and also allows you to ​alter settings​ to change image quality and size. 

 
 
 
 
 
Sound Card 
-Sound cards are ​internal hardware devices​ that plug into the 
motherboard​. 
-A sound card's main function is to allow the computer system to ​produce 
sound​ but they also allow users to ​connect microphones​ in order to ​input 
sounds​ into the computer. 
-Sound cards are also useful in the ​conversion of analogue data into 
digital​ and ​vice versa​. 

10
Storage Devices (secondary backing storage) 
-Secondary storage devices are used to store data that is ​not instantly 
needed​ by the ​computer​. 
-Secondary storage devices ​permanently store data​ ​and programs​ for as 
long as we need. These devices are also used to ​back-up data​ in case 
original copies are lost or damaged. 
-There are two categories of storage devices: 
Internal Storage​ - Internal Hard Disk Drives 
External Storage​ - External Hard Disk Drive, Memory Stick etc 

Features of External Hardware Computer Components


External computer components connect to a computer system from 
OUTSIDE​. They are not necessary for the system to function but make our 
experiences easier or better. 
 
● Input Devices ​(used to get data into a computer) 
● Output Devices ​(used to get information out of a computer) 

 
 
 
 

11
Input Devices 
-Hardware devices that allow data to be ​entered into the computer. 

 
 
 
 
 
 
 
 

12
Output Devices 
 
-Hardware devices that allow information to be ​sent out of a computer 
system. 
 

 
 
 
-Some devices produce a ​temporary output. 
For example: a computer monitor produces images on the screen that 
constantly refreshes and change 
 
-Some devices produce a ​permanent output. 
​For example: a printer produces outputs as hard copies on paper 
 
 
 
 
 
 
 

13
 
Data Storage 
-It is where we put data in a ‘known’ place (save) which we can come back to 
later and get the data back again (read). 
 

 
 
Some terms that you need to be aware of when we talk about data storage: 
 
Writing of data​ - storing data (also known as ​saving​) 
Reading data​ - getting our data back (also known as ​opening​) 
 
Data can either be stored ​temporary​ or ​permanent 
 
● RAM​ (computer memory) is used to store data ​temporarily 
● Backing Storage Devices​ are used to store data ​permanently 
 

 
 
 

14
Web Browsers and Search Engines 
Web Browser 
-is considered a software application that allows people to access, retrieve 
and view information on the internet 
-The information that may be “browsed” can be in the form of text content 
on a web page, an image, video, audio etc. 
-The most popular web browsers currently in use are Firefox, Google 
Chrome, Internet Explorer, Opera and Safari. 

 
 
How does a browser work? 
The process begins with the user inputting a URL (Uniform Resource 
Locator) like http, https, ftp, file etc. (example: 
https://www.computer-geek.net/​). 
The browser then displays the resource by passing the HTML (main 
markup language for web pages) to the browser’s layout engine to be 
translated from markup to an interactive document that you can view on 
your screen. 
 
 

15
 
Search Engines 
-The main purpose of a search engine is to search for information on the 
Internet. 
-They are software programs that search for websites based on keywords 
that the user types in. 
-The search engine then goes through their databases of information in 
order to locate the information you are looking for. The main search engines 
currently used are Google, Bing, and Yahoo. 

 
How does a search engine work? 
Search engines send out “web crawlers” or “spiders” (automated 
computer programs that browse the internet in a methodical and automated 
manner) to create a copy of all the web pages they have been to so the 
search engine can then index the pages to create web site listings that 
facilitate faster searches.  
A user types a query into the search engine and the search engine 
then sorts through millions of pages in its database to find a match to that 
specific query. The search engine then produces the results to your query in 
a ranked order according to relevancy. 
 

16
 
Netiquette  
- a combination of the words ​net​work and ​etiquette and is defined as a set of 
rules for acceptable online behavior.  
- online ethics focuses on the acceptable use of online resources in an online 
social environment. 
- both phrases are frequently interchanged and are often combined with the 
concept  of  a ’netizen’ which itself is a contraction of the words inter​net and 
citi​zen  and  refers  to  both  a  person  who  uses  the  internet  to  participate  in 
society,  and  an  individual  who  has  accepted  the responsibility of using the 
internet in productive and socially responsible ways. 
 
10 Netiquette Guidelines Online Students Need to Know 
1. NO YELLING, PLEASE 
There’s  a  time  and  a  place  for  everything—BUT  IN  MOST  SITUATIONS 
TYPING  IN  ALL  CAPS  IS  INAPPROPRIATE.  Most  readers  tend  to  perceive it 
as  shouting  and  will  have  a  hard  time  taking  what  you  say  seriously,  no 
matter how intelligent your response may be. If you have vision issues, there 
are  ​ways  to  adjust  how  text  displays  so  you  can  still  see  without  coming 
across as angry. 
2. Sarcasm can (and will) backfire 
Sarcasm has been the source of plenty of misguided arguments online, as it 
can  be incredibly difficult to understand the commenter’s intent. What may 
seem like an obvious joke to you could come across as off-putting or rude to 
those who don’t know you personally.  
3. Don’t abuse the chat box 
Chat  boxes  are  incorporated  into  many  online  classes  as  a  place  for 
students to share ideas and ask questions related to the lesson. It can be a 
helpful  resource  ​or a​   major  distraction.  Treat  it  like  the  learning  tool  it’s 
meant  to  be,  and  try  not  to  distract  your  classmates  with  off-topic 
discussions. 
4. Attempt to find your own answer 
Attempt  to  find  the  answers  to  any  other  questions  on  your  own  using  a 
search engine. If your questions remain unanswered after a bit of effort, feel 
free to bring them up with your instructor. 

17
5. Stop ... grammar time! 
Always  make  an  effort  to  use  proper  punctuation,  spelling  and  grammar. 
Trying  to  decipher  a  string  of  misspelled  words  with  erratic  punctuation 
frustrates the reader and distracts from the point of your message. 
6. Set a respectful tone 
A  certain  level  of  formality  is  still  expected  in  your  communication  with 
everybody.  In  addition  to  proper  punctuation  and  spelling,  it’s  good 
netiquette  to  use  respectful  greetings  and  signatures,  full  sentences  and 
even the same old “please” and “thank you” you use in real life. 
7. Submit files the right way 
Knowing how to properly submit your work online is key to your success as 
an  online  student.  Instructors  often  establish  ground  rules  for  file 
assignment  submissions.  Ignoring  these  instructions is a common example 
of bad netiquette. If you don’t follow instructions, you’re taking the risk that 
your instructor won’t be able to find or open your assignment. Save yourself 
and  your  instructor a headache and read their instructions carefully before 
submitting. 
8. Read first 
Take  some  time  to  read  through  each  of  the  previous  discussion  post 
responses  before  writing  your  own  response.  If  the  original  post  asked  a 
specific  question,  there’s  a  good  chance  someone  has  already  answered  it. 
Submitting an answer that is eerily similar to a classmate’s indicates to the  
9. Think before you type 
A  passing  comment  spoken  in  class  can  be  forgotten  a  few  minutes  later, 
but  what  you  share  in  an  online  classroom  is  part  of  a  permanent  digital 
record.  
10. Be kind and professional 
Online  students  probably  don’t  have  the  complete  anonymity  that  comes 
with  using  a  screen  name,  but  you  could still fall prey to treating someone 
poorly because of the distance between screens. Make a point to be kind and 
respectful in your comments—even if you disagree with someone. 
 
 

18
 
Cybersecurity 
Technology allows students access to more information than ever 
before. By learning safe online habits now, students can make smarter 
online decisions with what they decide to share and do online. Students can 
also teach their friends or parents how to be safer digital citizens for the rest 
of their lives.  
1. Keep your personal information private, including the names of your 
family members, your school, your telephone number, and your 
address.  
2. Avoid sharing your whereabouts online to avoid cyberstalking. Wait to 
post those concert or trip pictures until you get home so criminals are 
not aware when you aren’t home 
3. Think twice before you post or say anything online; once it is in 
cyberspace, it is out there forever. Remember that what you post may 
impact you getting a job and keeping a job in the future. 
4. Only do and say things online that you would do or say in real life. 
Think about how your decisions on what you post or say online can 
have positive or negative consequences later.  
5. Speak up. If you see something inappropriate, let the website know 
and tell an adult you trust. Don’t stand for bullying — online or off.  
6. Use strong passwords with eight characters or more that also use a 
combination of numbers, letters, and symbols. Don’t share your 
passwords with anyone.  
7. Think before you click — don’t open e-mails from strangers and don’t 
click on links for unfamiliar sites.  
8. Be careful who you friend online. Simply because someone with 
mutual friends wants to add you on a website or app does not mean 
they are trustworthy. 
9. Use privacy settings on social networking websites such as Twitter, 
Instagram, SnapChat, and Facebook.  
10. Be cautious when downloading applications on your smartphone — 
they may contain malware that could infect your device. 
11. Be sure to review and understand the details of an app before 
installing it, and be wary of the information it requests.  

---- end ---- 

19
 
 
 
References 
 
Brooks, Ashley (2019, January 1). ​10 Netiquette Guidelines Online Students 
Need to Know. Retrieved from 
https://www.rasmussen.edu/student-experience/college-life/netiquette-gui
delines-every-online-student-needs-to-know/ 
 
Christensson, P. (2009, August 10). ​Peopleware Definition.​ Retrieved from 
https://techterms.com 
 
Cybersecurity/ Internet safety tips (n.d.) Retrieved from 
https://nj50000493.schoolwires.net/site/Default.aspx?PageID=1349 
 
Most Popular Web Browsers 1993 - 2020 ( 2020, April 18). Retrieved from 
https://www.youtube.com/watch?v=W4wWdmfOibY 
 
The ICT Lounge. (n.d.) Retrieved from 
https://www.ictlounge.com/html/typesofcomputers.htm 
 
Top 10 Most Popular Search Engines (2009-2020)! Best Search Engine 
(2020, May 9). Retrieved from 
https://www.daneshgah.ac/watch/enqGzKhodIGfdns/top-10-most-popular
-search-engines-2009-2020-best-search-engine 
 
Types and components of computer systems (n.d.) Retrieved from 
https://resources.collins.co.uk/free/IGCSE_ICT/IGCSE-ICT-sampleunit.pdf 
 
What Is The Difference Between A Web Browser And A Search Engine? 
(2012, May 1). Retrieved from 
https://www.computer-geek.net/what-is-the-difference-be-va-47.html 
What is Netiquette? A Guide to Online Ethics and Etiquette. (2004-2021) 
Webroot Inc., Retrieved from 
https://www.rasmussen.edu/student-experience/college-life/netiquette-gui
delines-every-online-student-needs-to-know/ 
Wpuict (2011, August 24). Computer System Elements – Hardware. 
Retrieved from 
https://wpuict.wordpress.com/2011/08/24/computer-system-elements-ha
rdware/ 
 

20

You might also like