Professional Documents
Culture Documents
Computer - Fundamentals (Module - One)
Computer - Fundamentals (Module - One)
Computer Fundamentals
Computer Fundamentals
• An electronic device that accepts data and processes it into useful information.
• There are two main aspects of the computer:
• Input:
• The data we enter the computer is called the input.
• Inputs are raw facts for which we want the system to process and give us result.
• Output:
• The output is the result that the computer provides in return of the raw data entered.
Flash Mother
Keyboard Monitor
Memory Board
Random
Microphone Speaker Local Drives Access
Memory
Switched
Magnetic
Light Pen DVD Mode Power
Disk
Supply
Web Camera
Computer Components
• Whether it's a gaming system or a home PC, the five main components that make up a
typical, present-day computer include:
• A motherboard
• A Central Processing Unit (CPU)
• A Graphics Processing Unit (GPU), also known as a video card
• Random Access Memory (RAM), also known as volatile memory
• Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)
Computer Memory
• The performance of computer system depends upon the memory and CPU.
CPU is capable to store only instructions required to operate the computer.
Therefore, it is mandatory to have the memory to run a computer properly.
• Memory is a set of memory cells known as building block of memory. Each
memory cell has a unique index number or identification number known as
the unique address of that specific memory cell.
• A computer system is built using a combination of these types of computer
memory, and the configuration can be optimized to produce the maximum
data processing speed or the minimum cost, or some compromise between
these two.
Computer Memory Hierarchy
Computer
Memory
Primary Secondary
Memory Memory
SRAM SSD
DRAM
Number System
0,1,2,3,4,5,6,7,8,9, (F0)
Hexadecimal 16 int val=0xF0;
A,B,C,D,E,F 16
Operating System
What is an Operating System?
1 The operating system offers users an appropriate interface to use the computer system.
It helps us to hide the information related to the hardware resources from the users.
2
3 The operating system provides the sharing of resources among users and programs in an efficient way.
The operating system is useful to monitor and handle the execution of other programs. 6
Features of an Operating System
Error
Detecting Aids
Processor
02 06 Job Accounting
Management
Performance
Data Sharing
Backup
Reliable
Security
Scalability
Software/Hardware Compatibility
Computer Networks: Performance
Transmission
Source Transmitter Receiver Destination
System
Model Description
Source Data to be transmitted is generated by this device, example: telephones, personal computers etc.
Transmitter Transforms and encodes the data in such a form to produce electromagnetic waves or signals.
Transmission A transmission system can be a single line or a complex network connecting source and destination.
System
Receiver Accepts the signal from the transmission system and converts it into a form managed by the destination.
Mesh
Topology
Hybrid
Topology
Bus Topology
• Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Ring Topology
• It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Star Topology
• In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node, and all other nodes are connected to the central node.
Mesh Topology
• It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
Tree Topology
• It has a root node, and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Hybrid Topology
• It is two different types of topologies which is a mixture of two or more topologies. For
example, if in an office in one department ring topology is used and, in another star, topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Computer Network Types
Computer
Networks
• In MAN, various LANs are connected with each other through telephone lines.
• It is mainly hold and operated by single private company or a public company.
• The size of the MAN is larger than LANs and smaller than WANs.
• A MANs covers the larger area of a city or town that is around 50 Kms.
WAN (Wide Area Network)
Transmission
Modes
Half-Duplex Full-Duplex
Simple Mode
Mode Mode
Simple Transmission Mode
• In this mode, We can send data in both the directions at the same time.
• No delays in communication as both can send and receive data simultaneously.
• Example of Full Duplex is a Telephone Network i.e., communication
between two persons by a telephone line, using which both can talk and listen
at the same time.
Internet
Internet
Productivity Email is usually packaged with a calendar, address book, instant messaging,
01 Tools and more for convenience and productivity.
Access to Web If you want to sign up for an account like Facebook or order products from
02 services like Amazon, you will need an email address so you can be safely
Services identified and contacted.
Easy Mail Email service providers have tools that allow you to file, label, prioritize, find,
03 Management
group, and filter your emails for easy management. You can even easily
control spam, or junk email.
Communication You can send an email to multiple people at once, giving you the option to
04 with People include as few as or as many people as you want in a conversation.
Anywhere You don’t have to be at home to get your mail. You can access it from any
05 Anytime computer or mobile device that has an Internet connection.
WebMail Providers
• The top three webmail providers are Yahoo!, Outlook.com, and Google's Gmail.
• These providers allow you to access your email account from anywhere
• There are several email service providers available in the market with their
enabled features such as sending, receiving, drafting, storing an email and much
more.
• Availability: Ensuring that authorized people have access to the information when
needed; this keeping them current with upgrades, using backups to safeguard
against disruptions or data loss, etc.
Knowledge Check
Knowledge
Check
Which of the following is not considered hardware?
1
A. Operating System
B. CPU
C. Keyboard
D. Hard Disk
Knowledge
Check
Which of the following is not considered hardware?
1
A. Operating System
B. CPU
C. Keyboard
D. Hard Disk
The operating system (OS) is a software that acts as an interface between a computer and a user.
Knowledge
Check
What is five main components of a computer system?
2
A.
CPU, CD-ROM, Mouse, Keyboard, Sound card
B.
Memory, Video card, Monitor, Software, Hardware
C.
Modem, Keyboard, Word Processor, Printer, Screen
D.
CPU, Memory, System bus, Input, Output
Knowledge
Check
What is five main components of a computer system?
2
A.
CPU, CD-ROM, Mouse, Keyboard, Sound card
B.
Memory, Video card, Monitor, Software, Hardware
C.
Modem, Keyboard, Word Processor, Printer, Screen
D.
CPU, Memory, System bus, Input, Output
None
Knowledge
Check
A term that refers to the way in which the nodes of a network are linked together.
3
A. Network
B. Topology
C. Connection
D. Interconnectivity
Knowledge
Check
A term that refers to the way in which the nodes of a network are linked together.
3
A. Network
B. Topology
C. Connection
D. Interconnectivity
Topology is a term that refers to the way in which the nodes are connected. There are 4 major topology
networks.
Knowledge
Check
Which of the following isn’t a type of transmission mode?
4
A. Physical
B. Simplex
C. Full Duplex
D. Half Duplex
Knowledge
Check
Which of the following isn’t a type of transmission mode?
4
A. Physical
B. Simplex
C. Full Duplex
D. Half Duplex
There are three modes of transmission: simplex, half duplex and full duplex.
Knowledge
Check
The process of verifying the identity of a user.
5
A. Authentication
B. Identification
C. Validation
D. Verification
Knowledge
Check
The process of verifying the identity of a user.
5
A. Authentication
B. Identification
C. Validation
D. Verification