Professional Documents
Culture Documents
Bahan Persentasi - Apl - Bahasainggris
Bahan Persentasi - Apl - Bahasainggris
Most machines are designed to do one job. Computers are different: they are
general purpose machines. By changing the program instruction, computers can be
used to process information in very different ways. For example: a word processor
program allows the computer to process text. A spreadsheet program enables the
computer to perform calculations, a database program is used for searching and sorting
records, and a browser program is used for looking at pages on internet (the internet is
the connection of computers from different parts of the world).
Computers are therefore used in almost every type of work and are found almost
everywhere. Computer equipment is called hardware and computer programs and data
are know as software. A variety of devices can be attached to computer. Input devices
are used to enter data into the computer for processing. An input device called a
magnetic character reader (MICR) is used to read characters printed using magnetic ink
character are commonly found on bank cheques.
An optical input device called a barcode reader uses the reflection of a light beam to
read a sequence of printed parallel bars call a barcode. The bars are of different
thickness and each sequence of bars represent a different number according to
standard code. Barcode labels are used to code items. Each item can be identified by a
computer, using a barcode reader to scan the labels. Barcodes are used in industry,
shops and supermarkets for stock control and to allow a computer to look up the price
of items being purchased.
2 TYPES OF COMPUTER
A computer is a device that takes in data, processes it according to program, and then
outputs the processed data in some form. There is an increasing variety of computers of
different sizes and designed for different purposes. One of the most important
considerations when buying a computer is deciding how it is going to be used.
There is an increasing variety of portable micros that can be grouped according to their
size. They can usually be powered from batteries and are useful in many different
situations. However, as computer get smaller. It becomes increasingly difficult to use
them with a keyboard. One of the reasons that notebook portables are popular is
because their screens and keyboards are just big enough to use for word processing.
They can also be powerful enough to be used for multimedia. The relative size of some
of the most common types of computers are indicated below, although there are other
types that are not mentioned and new types are currently being developed.
Supercomputers Mainframes
Minicomputers
Desktops Microcomputers
(Personal Computers)
Portables Laptops
Notebooks
Subnotebooks
Handhelds
Palmtops
3 PARTS OF COMPUTER
Most computers consist of an electronic central processing unit (CPU) to which are
attached different input devices, output devices and storage devices. The main parts of
a desktop computer are enclosed in a box called system unit. This contains an
electronic board called the motherboard that holds and connect together the main
electronic components. There are shown as follow:
⚫ ROM (Read Only Memory): stores the program instructions the computer needs to
start up.
The motherboard usually has empty electronic connectors, called expansion slots,
into which additional electronic boards can be plugged. This allows extra electronic
components to be added. For example. More memory can be added by plugging
memory boards (called SIMMS) into the memory slots.
Sound facilities can be added by plugging a sound card into an expansion slot. This
is one way of upgrading computer. Another way is to replace the motherboard with a
newer and better one. The system unit usually also contains a small speaker, the power
supply, and some storage devices. These often include:
- a hard disk drive with a fixed disk that can store a very large amount of data;
- a CD-ROM drive that is used for reading CD-ROM disks (particularly in multimedia
computers).
Some other devices may be included in the system unit but most input and output
devices are plugged into the back of the system unit using connectors known as ports.
Power is a function of both speed and capacity. The power of a computer depends on
the combination of all the components. When buying a computer, you can often choose
between different components. In particular, you can choose between different
processor speeds, amounts of memory and hard disk sizes. Unit of measurement
commonly used in computing are shown below:
Hertz are measured using decimal system but bytes are measured using the binary
system. The values of the unit prefixes vary in these two system as shown in the table
below:
The computer keyboard is an electronic device with keys arranged like earlier
typewriter keyboards, but with extra keys. Because the output of the keys are controlled
by the computer program, their function can vary. For example, print screen key
sometimes copies the screen to memory and copies it to printer, depending on program
used. The arrangement of the keys varies but most desktop PCs have an extended
keyboard with keys divided into sections including the main keyboard, the function keys,
the editing keys, and the numeric keypad.
The connection of computers throughout the world is known as the internet. This
allows users to send electronic mail messages (email) to each other. Each user has his
or her own unique email address. The email address is made up of two main parts, the
user identifier and the computer system identifier.
For example:
Bob. Smith @ ed.ac.uk
(user identifier) (computer system identifier)
The @ sign is used to separate these main identifiers. A dot is used to separate the
parts of each identifier. There is usually no dot at the end of an email address.
Linked document pages on the internet from what is known as the World Wide Web
(WWW). Each web page has its own unique address.Web addresses often begin with
htttp://www. The two forward slashes are commonly read as double slash. A dot is used
to separate each main part of an address and slashes are used to separate sub-areas
of the address.
5 COMPUTER VIRUS
A computer virus is an unwanted program that has entered your system without knowing
about it. It has two parts, Infector and detonator. They have two different jobs. One of the
features of a computer virus that separates it from other kinds of computer program is that
replicates itself, so that it can spread (via floppies transported from computer to computer, or
networks) to other computers.
After the Infector has copied the virus elsewhere, the detonator performs the virus’s main
work. Generally, that work is either damaging data on your disks, altering what you see on your
computer display, or doing something else that interferes with the normal use of your computer.
Do not worry too much about viruses. You may never see one. There are just a few ways to
become infected that you should be aware of. The source seem to be service people, pirated
games, entering floppies in publicly available PCs without write protect tabs, commercial
software, and software distributed over computer bulletin board system.
Many viruses have spread through pirated - illegally copied or broken - games. This is easy
to avoid. Pay for your games, fair and square. If you use a share PC or a PC that has public
access, such as one in collage PC library, be very careful about entering floppies into that PC’s
drives without a write-protect tab.
Despite low incidence of actual viruses, it can’t hurt to run virus checking program now and
then. There are two kinds of antivirus programs: virus shields, which detect viruses as they are
infecting your PC, and virus scanners, which detect viruses once they have infected you.
Viruses are something to worry about, but not a lot. A little common sense and the occasional
virus scan will keep you virus free. Remember these four points:
➢ Before running an antivirus program, be sure to cold boot from write-protected floppy.
➢ Don’t boot from floppies except reliable DOS disks or your original production disks.
Device Function
Digital Camera
Device Function
A printer is a very common output device. It is used to printer computer output on paper.
Colour printer are available but most printing is done using a mono printer that prints only in
black. There are three main kinds of printers: dot matrix, inkjet and laser. Each type of printer
has its own advantages and disadvantages.
A monitor is the most common type of output device. It displays the output from the
computer on screen. Because the user sees the computer in action using the monitor screen,
the quality of monitor can make a tremendous difference to the way the user interacts with the
computer and feels about the computer. The display image on a monitor screen can be thought
of as being made up of a series of dots. The quality of image depends on a number factors
including:
- the space between dots: affected by the aperture grill pitch ( or dot pitch)
- how often the dots are refreshed by the beam of light affected by refresh rate.
-the size of the dots: affected by the size of the screen and the resolution.
Although technical factors are discussed in this unit, subjective preference are important when
choosing a monitor. The only way to choose a good monitor is by trying to use it.
8 STORAGE DEVICES
The electronic memory inside a computer inside a computer is of limited capacity and can
only hold data when the computer is switched on. A storage device is used to store data that is
not being processed and to save the data when the computer is switched off. There are a
variety of storage media available. These include magnetic devices (for example floppy disk
drives, hard disk drives, tape drives), optical devices and magneto-optical devices.
Disk have to be treated with care if you do not want to damage them or the data stored on
them. Damage can be caused by physical strain , dust, smoke particles, fingermarks, sunlight,
heat and magnetism, depending on the type of media used. When in use, a disk rotates at high
speed and a read/write head is brought very close to its surface. If the disk is removed when the
drive is in use, the read/write head and the disk surface may be damaged. If extra labels are
attached to the disk, it can very easily get stuck in the drive. In this case, it should not be
removed forcibly in the case the drive mechanism or the surface of the disk is damaged.
A hard disk particularly easily damaged because it contains more than one disk and
read/write head. The read/write heads are extremely close to the surface of the disks and the
disks spin at a very high speed. Even a small smoke or dust particle can destroy the drive. It is
enclosed in a vacuum sealed case. If a hard disk suddenly fails completely, the disk is said o
have crashed.
When comparing storage devices, the following factors have to be taken into account:
◆ What is the storage cost per megabyte?
◆ How fast are they at reading and writing data?
◆ What is their maximum storage capacity?
◆ Do they conform to a standard?
◆ Are they fixed or removable?
◆ Do they use random or serial access?
It is important to keep back up copies of stored data. Magnetic tape is often used because it is
very cheap and can hold extremely large amounts of data. It is common to use a backup
scheme where a number of tapes are used in rotation.
9 GRAPHICAL USER INTERFACE
An operating system is a group of program that tell a computes how to perform basic
function. For example: how to respond when a key on the keyboard is pressed, how to display a
character on the monitor screen, or how to read and write to a disk. The operating system is
started automatically when a computer is switch on. It is then used to start up and control other
programs. The operating system determines how the user interacts with the computer.
Some operating systems require the user to type commands, but an operating system with
a graphical user interface (GUI) makes it easier for the user to control the computer. The most
common type of graphical user interface is WIMP (windows, icons, menus, pointer) system,
such as Microsoft windows operating system.It should be noted that the recycle bin icon used in
the Microsoft windows system has the same function as trashcan icon used in the Apple Mac
system, for example to access the program that stores deleted files, and allow them to be
recovered.
When Information has to be given to the user or information has to be input by the user, a
window known as a dialog box is often used. Notice that the American spelling dialog is
commonly used in this context, although British spelling dialogue is also found. Dialog boxes
can contain a variety of elements to gather information from the user including: text boxes, drop-
down list boxes, check boxes, and command button. A find dialog box is used to gather
information from the user about the files they wish to find. Note that you can search for a piece
of text in a file, or search for a file in a folder, but you search for a file on a disk.
10 COMPUTER NETWORK
In simple terms, the understanding of computer networks is the relationship between two
or more computer systems through communication media to communicate data with one
another.
Types of Network
1. PAN (Personal Area Network)
Personal Area Network (PAN) is a computer network used for communication between
computer devices (including telephones and digital personal assistants) near one person. The
device may or may not belong to that person. The range of PAN is usually several meters.
PANs can be used for communication between their own personal devices (intrapersonal
communication), or for connecting to higher levels and Internet networks (an uplink). Personal
area of wired network is possible with computer buses such as USB and Fire wire. A wireless
personal area network (WPAN) can also be made possible with network technologies such as
IrDA, Bluetooth, UWB, Z-Wave and ZigBee.
Metropolitan Area Network (MAN) is a network in a city with high-speed data transfer
that connects various locations such as campuses, offices, government, and so on.
Network Topology
Types of Topology:
1. Bus Topology
• Nodes - nodes are connected serially along the cable, and at both ends of the
cable are closed with a terminator
• Very simple in installation
• Very economical in cost
• Data packages intersect on a cable
• No hub is needed, which is much needed T-connector on each Ethernet card
• A problem that often occurs is that if one node is damaged, the entire network
can be down, so that all nodes cannot communicate within the network.
2. StarTopology
Picture 6. STAR Topology
3. Ring Topology
Picture 8. MeshTopology