Sei sulla pagina 1di 21

Types of

Computers &
Computer
Hardware

Lecture 5
Basic Terminology
 Software
 Computer  A computer program that tells the
 A device that accepts input,
computer how to perform
processes data, stores data, particular tasks.
and produces output, all
according to a series of stored  Network
instructions.  Two or more computers and
other devices that are connected,
 Hardware for the purpose of sharing data
 Includes the electronic and
and programs.
mechanical devices that
process the data; refers to the
 Peripheral devices
 Used to expand the computer’s
computer as well as
peripheral devices. input, output and storage
capabilities.
Basic Terminology
 Input - Whatever is put into a computer system.
 Data - Refers to the symbols that represent facts, objects, or
ideas.
 Information - The results of the computer storing data as bits
and bytes; the words, numbers, sounds, and graphics.
 Output - Consists of the processing results produced by a
computer.
 Processing - Manipulation of the data in many ways.
 Memory - Area of the computer that temporarily holds data
waiting to be processed, stored, or output.
 Storage - Area of the computer that holds data on a permanent
basis when it is not immediately needed for processing.
Types of Computers
Microcomputer
 A personal computer;
designed to meet the
computer needs of an
individual.
 Provides access to a wide
variety of computing
applications, such as word
processing, photo editing,
e-mail, and internet.
Desktop Microcomputer
 A microcomputer that fits on
a desk and runs on power
from an electrical wall
outlet.
 The CPU can be housed in
either a vertical or a
horizontal case.
 Has separate components
(keyboard, mouse, etc.) that
are each plugged into the
computer.
Laptop Computer
 A portable, compact
computer that can run on
an electrical wall outlet or
a battery unit.
 All components
(keyboard, mouse, etc.)
are in one compact unit.
 Usually more expensive
than a comparable
desktop.
 Sometimes called a
Notebook.
Workstation
 Powerful desktop computer
designed for specialized
tasks.
 Can tackle tasks that
require a lot of processing
speed.
 Can also be an ordinary
personal computer attached
to a LAN (local area
network).
Supercomputer
A computer that was the fastest in the world at the
time it was constructed.
 Can tackle tasks that would not be practical for
other computers.
 Typical uses
 Breakingcodes
 Modeling weather systems
Mainframe
 Large expensive computer
capable of simultaneously
processing data for
hundreds or thousands of
users.
 Used to store, manage,
and process large amounts
of data that need to be
reliable, secure, and
centralized.
 Usually housed in a closet
sized cabinet.
Server
 Purpose is to “serve.”
 A computer that has the
purpose of supplying its
users with data; usually
through the use of a LAN
(local area network).
Handheld
 Also called a PDA (Personal
Digital Assistant).
 A computer that fits into a
pocket, runs on batteries, and is
used while holding the unit in
your hand.
 Typically used as an
appointment book, address
book, calculator, and notepad.
 Can be synchronized with a
personal microcomputer as a
backup.
Computer Hardware
System unit
 Casethat holds the
power supply, storage
devices, and the circuit
boards (including the
motherboard).
CPU (Central Processing Unit)

 Where the processing in a computer takes place, often


called the brain of the computer.
Input Devices
 Units that gather information and transform that
information it into a series of electronic signals for
the computer.
Output Devices
 Devicesthat display, print, or transmit the results
of processing from the computer’s memory.
Storage Devices
 Usedto keep data when the power to the computer is
turned off.
MEMORY
PROCESSING HARDWARE
ROM ROM
READ ONLY MEMORY READ ONLY MEMORY
 Small  Small
 Instructions are installed  Instructions are installed
permanently at the factory permanently at the
 Cannot be changed factory
 Cannot be changed
 These instructions check
 These instructions
the computer’s resources check the computer’s
and looks for Operating resources and looks for
System Operating System
Protecting your Computer
 Install an antivirus program. Installing an antivirus program
and keeping it up-to-date can help defend your computer against
viruses. Antivirus programs scan for viruses trying to get into
your email, operating system, or files
 Don't open email messages from unfamiliar senders, or
email attachments that you don't recognize. Many viruses are
attached to email messages and will spread as soon as you open
the email attachment.
 Use a pop-up blocker with your browser. Pop-up windows
are small browser windows that appear on top of the website
you're viewing. Although most are created by advertisers, they
can also contain malicious or unsafe code. The Pop-up Blocker
feature in Internet Explorer is turned on by default..
Protecting your Computer
 Keep Windows updated. Periodically, Microsoft releases special security updates that can
help protect your computer. These updates can help prevent viruses and other computer
attacks by closing possible security holes.
 Use a firewall.‌Windows Firewall or any other firewall program can help alert you to
suspicious activity if a virus or worm attempts to connect to your computer. It can also block
viruses, worms, and hackers from attempting to download potentially harmful programs to
your computer.
 Use your browser's privacy settings. Being aware of how websites might use your private
information is important to help prevent targeted advertising, fraud, and identity theft.
 Turn on User Account Control (UAC). When changes are going to be made to your
computer that require administrator-level permission, UAC notifies you and gives you the
opportunity to approve the change. UAC can help keep viruses from making unwanted
changes.
 Clear your Internet cache and your browsing history. Most browsers store information
about the websites you visit, and information that websites might ask you to provide (such as
your name and address). While it can be helpful to have these details stored on your computer,
there are times when you might want to delete some or all of them, for example when you're
using a public computer and don't want to leave personal information behind.

Potrebbero piacerti anche