Professional Documents
Culture Documents
By Tadesse M (MSc).
Chapter One
Introduction to Computer
Contents
What is computer?
Over view of computer
Uses of computer
Classification of computer
Characteristics of computer
The Computer Systems
Data Representation
Number Systems and Coding System
Computer maintenances
Computer network
What is Computer
According to purpose
1. General Purpose :
General-purpose computers are designed to solve a
large variety of problems.
• That is they can be given different programs to
solve different types of problems
Most digital computers are general computers.
problems.
Most analogue computers are special purpose computers.
1, Analog Computer
Analog computer is that computer, which is use to process
data.
It is very limited memory
– Minicomputer
– Mainframe computer
– Super computer
1, Microcomputer
An antiquated term, a microcomputer is now
desktops
2, Minicomputer
Minicomputer, Computer that is smaller, less expensive,
1. Speed of Computer
The computer is capable of performing many tasks per
second.
Computers are much faster to perform mathematical
auxiliary storage
some of them are:
measurements
adjustments
repair
replacement
Types of Maintenances
1, Preventative Maintenances
2, Corrective Maintenances
Preventive maintenance can be described as
maintenance of equipment or systems before fault
occurs. It can be divided into two subgroups:
A, Planned maintenance and,
B, Condition-based maintenance.
The main difference of subgroups is
a, Determination of maintenance time or
b, Determination of moment when maintenance should
be performed.
Preventive maintenance is conducted to keep
equipment working and/or extend the life of the
equipment.
Corrective maintenance, sometimes called "repair",
is conducted to get equipment working again.
Goals of preventive maintenance
Is conducted to keep working and /or extending the life of
the equipment
To prevent the failure of equipment before it occurs.
lifespan.
It helps to prevent wear and tear, and keeps the system
functioning smoothly.
software.
Instead, a Trojan threat is hidden in software