SlideShare une entreprise Scribd logo
1  sur  34
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter TwoChapter Two
ComputerComputer BasicsBasics
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Learning ObjectivesLearning Objectives
 Understand the basic hardware andUnderstand the basic hardware and
software components of asoftware components of a Desk TopDesk Top
Personal Computer (PC).Personal Computer (PC).
 The difference betweenThe difference between OperatingOperating
SystemsSystems andand Applications softwareApplications software..
 The difference between andThe difference between and Flat FileFlat File
andand Relational DatabaseRelational Database
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Binary Number SystemBinary Number System
A mathematical countingA mathematical counting
schemescheme
that has only two digits – zerothat has only two digits – zero
(0) and one (1) which are(0) and one (1) which are
combined to represent our ten-combined to represent our ten-
digit counting scheme.digit counting scheme.
Today’s computers use thisToday’s computers use this
off/on scheme to representoff/on scheme to represent
thethe binary digitsbinary digits, commonly, commonly
referred to asreferred to as bitsbits, 1 and 0., 1 and 0.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
It is simple for computers to translate binaryIt is simple for computers to translate binary
digits into a sixteen digit-based code calleddigits into a sixteen digit-based code called
hexadecimalhexadecimal. This coding system is a. This coding system is a
compromise between our abilities and thecompromise between our abilities and the
computer that allows us tocomputer that allows us to interface.interface.
Binary Number SystemBinary Number System
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
ASCIIASCII
The standard computer code configurationThe standard computer code configuration
that works with computer bits is called thethat works with computer bits is called the
American Standard Code for InformationAmerican Standard Code for Information
Interchange (ASCII).Interchange (ASCII).
A byte is eight bits,
or a series of eight ones
and zeros.
Binary digits
Byt
e
ASCII
Words you can read!
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Interface Means to InteractInterface Means to Interact
 User interface is howUser interface is how
we interact with thewe interact with the
computer, e.g. thecomputer, e.g. the
keyboard and mousekeyboard and mouse
are user interfaceare user interface
inputsinputs and theand the
monitor is themonitor is the
computer’s usercomputer’s user
interfaceinterface outputoutput
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
A computer system can considered asA computer system can considered as
three broad categories of components:three broad categories of components:
 HardwareHardware
 SoftwareSoftware
 FirmwareFirmware
Your Computer as a SystemYour Computer as a System
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Your Computer as a SystemYour Computer as a System
The user is a human being.
The input devices are the
computer keyboard, mouse,
and microphone.
The output devices are the
monitor, speakers, printer,
and various storage media.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
HardwareHardware
Input/output devices areInput/output devices are
referred to asreferred to as peripheralperipheral
devicesdevices. Think of a. Think of a
peripheral device as anyperipheral device as any
devicedevice notnot inside theinside the
computer case.computer case.
They communicate with theThey communicate with the
main part of the computermain part of the computer
usingusing portsports..
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
HardwareHardware
In addition to receiving information directly fromIn addition to receiving information directly from
human users via input devices, computers canhuman users via input devices, computers can
receive information from other computers. Thisreceive information from other computers. This
is done via a network, e.g. the Internet.is done via a network, e.g. the Internet.
Network information can come to the computersNetwork information can come to the computers
through:through:
 Hard linesHard lines (standard telephone line)(standard telephone line)
 WirelessWireless (via radio signals)(via radio signals)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
HardwareHardware
Computers have theComputers have the
ability to storeability to store
information:information:
 Floppy DisksFloppy Disks
 Compact DiscsCompact Discs
(CDs)(CDs)
 Digital Video DiscsDigital Video Discs
(DVDs)(DVDs)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
TheThe systems boardsystems board,,
oror motherboardmotherboard, is, is
the brain of thethe brain of the
computer. Thecomputer. The
motherboardmotherboard
contains a series ofcontains a series of
micro chips that aremicro chips that are
connected togetherconnected together
by circuitry.by circuitry.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
Circuits, like wires or cables, transmitCircuits, like wires or cables, transmit
electrical signals containing binaryelectrical signals containing binary
data between the various microchips.data between the various microchips.
TheThe microchipsmicrochips in the computer canin the computer can
detect the presence or absence ofdetect the presence or absence of
electronic impulses.electronic impulses.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
The Motherboard contains three typesThe Motherboard contains three types
of memory chips:of memory chips:
 TheThe Central Processing Unit (CPU)Central Processing Unit (CPU)
 TheThe Read-only Memory (ROM)Read-only Memory (ROM)
 TheThe Random Access MemoryRandom Access Memory
(RAM)(RAM)
Inside The ComputerInside The Computer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
The CPU has three core sets ofThe CPU has three core sets of
instructions that it carries out:instructions that it carries out:
 Mathematical computations (addition,Mathematical computations (addition,
subtraction, division);subtraction, division);
 Moving data or information from oneMoving data or information from one
memory location to another; and,memory location to another; and,
 Making decisions and moving to aMaking decisions and moving to a
different set of instructions based upondifferent set of instructions based upon
those decisions.those decisions.
Inside your ComputerInside your Computer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
Random Access Memory (RAM)Random Access Memory (RAM)
chips contain information onlychips contain information only
when your computer is on. Whenwhen your computer is on. When
you turn off the computer, theyou turn off the computer, the
memory in the RAM disappears.memory in the RAM disappears.
Also known as
Volatile storage!
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
 Read Only Memory (ROM) Contains the basicRead Only Memory (ROM) Contains the basic
set of instructions that are required to start theset of instructions that are required to start the
computer.computer.
 Memory was installed during theMemory was installed during the
manufacturing process.manufacturing process.
 ROM (BIOS instructions) is a permanent partROM (BIOS instructions) is a permanent part
of the chip.of the chip.
Also known as
Non- Volatile storage!
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
 The Motherboard contains…..The Motherboard contains…..
 AA Complementary Metal Oxide Semi-Complementary Metal Oxide Semi-
conductor (CMOS)conductor (CMOS) configuration chip.configuration chip.
 A system clock.A system clock.
 Expansions slots.Expansions slots.
 RAMRAM memory.memory.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
 The CMOS Chip:The CMOS Chip:
 Responsible for remembering whatResponsible for remembering what
hardware is in your computer.hardware is in your computer.
 Necessary for your computer to initiallyNecessary for your computer to initially
organize itself. If you added a new drive,organize itself. If you added a new drive,
card, or peripheral device, your CMOScard, or peripheral device, your CMOS
information would change.information would change.
 Volatile (information can be lost) so it has itsVolatile (information can be lost) so it has its
own battery with constant powerown battery with constant power
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
 Random Access Memory (RAM)Random Access Memory (RAM)
………….………….
 Contains information your computer isContains information your computer is
working with now (What is on the screen).working with now (What is on the screen).
 Has to be limited in the amount ofHas to be limited in the amount of
information it can contain.information it can contain.
 Once you are finished using the RAM andOnce you are finished using the RAM and
move on to another project, what was inmove on to another project, what was in
RAM is dumped.RAM is dumped.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
Cache MemoryCache Memory contains memorycontains memory
your computer anticipates youyour computer anticipates you
might need, similar to the humanmight need, similar to the human
brain. It makes assumptions aboutbrain. It makes assumptions about
what information you might needwhat information you might need
based on certain programming.based on certain programming.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
 A BUS Contains theA BUS Contains the
electrical pathways andelectrical pathways and
directions for use of thosedirections for use of those
pathways that thepathways that the
information uses whileinformation uses while
inside a computer.inside a computer.
 The small metal tracings inThe small metal tracings in
the circuit board take thethe circuit board take the
place of wires to conductplace of wires to conduct
electricity.electricity.
 The bus is these traces andThe bus is these traces and
the instructions for theirthe instructions for their
use.use.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Inside your ComputerInside your Computer
CMOS Chips Continually hold theCMOS Chips Continually hold the
information on the configuration of yourinformation on the configuration of your
computer. When you turn on the computer,computer. When you turn on the computer,
the startup process is called athe startup process is called a bootingbooting..
When a computer is booted from the power-When a computer is booted from the power-
off condition, it is called a “off condition, it is called a “hard boothard boot.” If.” If
you push the reset button, you areyou push the reset button, you are
performing a “performing a “soft boot.”soft boot.”
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
TheThe Random Access Memory (ROM)Random Access Memory (ROM) containscontains
a set of permanent instructions known as thea set of permanent instructions known as the
basic input/output system (BIOS).basic input/output system (BIOS). SometimesSometimes
referred to as thereferred to as the ROM BIOSROM BIOS or Flash BIOSor Flash BIOS..
ROM chips are a hybrid of both hardware andROM chips are a hybrid of both hardware and
software. It is a physical component withsoftware. It is a physical component with
embedded software. ROM chips areembedded software. ROM chips are
sometimes referred to assometimes referred to as firmwarefirmware..
Inside your ComputerInside your Computer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Information on the Motherboard, exceptInformation on the Motherboard, except
the ROM chip, isthe ROM chip, is volatilevolatile..
Long term or secondaryLong term or secondary
storage are non-volatile:storage are non-volatile:
 Hard disks;Hard disks;
 Zip disks;Zip disks;
 Floppy disks; CassetteFloppy disks; Cassette
tapes;tapes;
 CD-ROMs; and,CD-ROMs; and,

DVDs.DVDs.
Inside Your Computer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
SoftwareSoftware
 Instructions that tellInstructions that tell
hardware what tohardware what to
do; or,do; or,
 A set of instructionsA set of instructions
written in awritten in a
language that thelanguage that the
computer cancomputer can
understand.understand.
Two broad classificationsTwo broad classifications
of software:of software:
 Operating SystemsOperating Systems (also(also
called platform)called platform)
 ApplicationsApplications
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Operating SystemsOperating Systems
 Tells the computerTells the computer
what to do.what to do.
 The computerThe computer
software that controlssoftware that controls
and coordinates theand coordinates the
interaction among theinteraction among the
hardware elementshardware elements
and between theand between the
hardware and thehardware and the
application programs.application programs.
The operating
system is the
computer’s
traffic cop.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
After your computer has booted and CMOSAfter your computer has booted and CMOS
hands your computer over to the operatinghands your computer over to the operating
system the operating system has twosystem the operating system has two
primary functions:primary functions:
 Managing the hardware and software.Managing the hardware and software.
 It provides application program interfaceIt provides application program interface
(API).(API).
Operating SystemsOperating Systems
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Disc Operating SystemDisc Operating System
DOSDOS is probably the most common operating system.is probably the most common operating system.
Users interface with a DOS in one of three ways:Users interface with a DOS in one of three ways:
 A command driven interface;A command driven interface;
 A menu-driven interface; or,A menu-driven interface; or,
 An icon-driven interface.An icon-driven interface.
MostMost policepolice employees work with an icon-drivenemployees work with an icon-driven
interface that is also called ainterface that is also called a graphical usergraphical user
interface (GUI).interface (GUI).
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
ApplicationsApplications
ApplicationsApplications softwaresoftware
allows the user toallows the user to
work with informationwork with information
in the computer.in the computer.
Applications areApplications are
specific programs thatspecific programs that
allow the user to doallow the user to do
specific tasks such asspecific tasks such as
word processing.word processing.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
DatabasesDatabases
A collection of organized informationA collection of organized information
that is centrally located and designedthat is centrally located and designed
to meet the needs of users. There areto meet the needs of users. There are
two classifications of databases:two classifications of databases:
 Flat fileFlat file
 Relational DatabaseRelational Database
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Forced Choice FormatsForced Choice Formats
Many state and localMany state and local policepolice
agencies use software that allowsagencies use software that allows
them to configure data entries tothem to configure data entries to
match their specific datamatch their specific data
dictionary.dictionary.
Through the use ofThrough the use of forced-choiceforced-choice
formatsformats, GUI software restricts, GUI software restricts
data entries to previouslydata entries to previously
determined attributes, propertiesdetermined attributes, properties
or characteristics.or characteristics.
Screen capture provided by Crimestar Corporation
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Useful TermsUseful Terms
 Multi-mediaMulti-media is the different forms of media beingis the different forms of media being
used by any particular application.used by any particular application.
 Multimedia applications can include graphics, animation, sound, andMultimedia applications can include graphics, animation, sound, and
video elementsvideo elements
 AA scalablescalable system can be adapted andsystem can be adapted and
expanded to meet increased needs.expanded to meet increased needs.
 Most legacy systems areMost legacy systems are proprietaryproprietary..
 The system manufacturer (either hardware, software,The system manufacturer (either hardware, software,
or both) will not reveal the systems specifications soor both) will not reveal the systems specifications so
that other firms may not duplicate the product.that other firms may not duplicate the product.
 Also known as aAlso known as a closed architectureclosed architecture..
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
DiscussDiscuss criminal justicecriminal justice issuesissues
www.criminaljustice-online.comwww.criminaljustice-online.com

Contenu connexe

Tendances

Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossaryJTHSICT
 
Lec no. 3 comp hardware components
Lec no. 3 comp hardware componentsLec no. 3 comp hardware components
Lec no. 3 comp hardware componentsNadine Guevarra
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Iaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd Iaetsd
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The InternetTerriS
 
Iaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd Iaetsd
 
Integrating Technology Into The Classroom
Integrating Technology Into The ClassroomIntegrating Technology Into The Classroom
Integrating Technology Into The Classroomabutcher3306
 

Tendances (15)

Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
File000122
File000122File000122
File000122
 
Diccionario en ingles
Diccionario en inglesDiccionario en ingles
Diccionario en ingles
 
Lec no. 3 comp hardware components
Lec no. 3 comp hardware componentsLec no. 3 comp hardware components
Lec no. 3 comp hardware components
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Internet basic
Internet basicInternet basic
Internet basic
 
Iaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developers
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
Notacd03
Notacd03Notacd03
Notacd03
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The Internet
 
Iaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd the universal brain for all robots
Iaetsd the universal brain for all robots
 
Integrating Technology Into The Classroom
Integrating Technology Into The ClassroomIntegrating Technology Into The Classroom
Integrating Technology Into The Classroom
 

En vedette

English basic computer vocabulary
English  basic computer vocabularyEnglish  basic computer vocabulary
English basic computer vocabularyRoberto Rodriguez
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_edaswathy ck
 
Basic components of computer system
Basic components  of computer systemBasic components  of computer system
Basic components of computer systemTECHNOHABIT
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computerJoshua Hernandez
 
BASIC COMPUTER ARCHITECTURE
BASIC COMPUTER ARCHITECTURE BASIC COMPUTER ARCHITECTURE
BASIC COMPUTER ARCHITECTURE Himanshu Sharma
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of ComputerRhenan Belisario
 
Basic Computer Architecture
Basic Computer ArchitectureBasic Computer Architecture
Basic Computer ArchitectureYong Heui Cho
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computerDanielAtkinson96
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer TroubleshootingMeredith Martin
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system pptSuaj
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsBrent Muir
 

En vedette (15)

English basic computer vocabulary
English  basic computer vocabularyEnglish  basic computer vocabulary
English basic computer vocabulary
 
Basic computer for_b_ed
Basic computer for_b_edBasic computer for_b_ed
Basic computer for_b_ed
 
Introduction to Coding
Introduction to CodingIntroduction to Coding
Introduction to Coding
 
Basic components of computer system
Basic components  of computer systemBasic components  of computer system
Basic components of computer system
 
Lesson 3.0 basic parts and functions of computer
Lesson 3.0   basic parts and functions of computerLesson 3.0   basic parts and functions of computer
Lesson 3.0 basic parts and functions of computer
 
BASIC COMPUTER ARCHITECTURE
BASIC COMPUTER ARCHITECTURE BASIC COMPUTER ARCHITECTURE
BASIC COMPUTER ARCHITECTURE
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
Basic Computer Architecture
Basic Computer ArchitectureBasic Computer Architecture
Basic Computer Architecture
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 

Similaire à Computer Basics

Module1 computerbasics1
Module1 computerbasics1Module1 computerbasics1
Module1 computerbasics1Usman Shah
 
Computer Hardware and Networking Tutorial for beginners
Computer Hardware and Networking Tutorial for beginnersComputer Hardware and Networking Tutorial for beginners
Computer Hardware and Networking Tutorial for beginnersMohammedRizwanSharie
 
Hardware & software
Hardware & softwareHardware & software
Hardware & softwareIsabelop
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardwareSCHOOL
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwarekasmraj1
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardwareNIKHIL KRISHNA
 
Fundamentalsofcomputer
FundamentalsofcomputerFundamentalsofcomputer
FundamentalsofcomputerRam Pukar
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Zo Sangpy
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2Makk Quak
 
hardware software basics
hardware software basicshardware software basics
hardware software basicsDeepa Rani
 
Using of computer tech
Using of computer tech Using of computer tech
Using of computer tech Hardini_HD
 
The fundamentals of computer renew
The fundamentals of computer renewThe fundamentals of computer renew
The fundamentals of computer renewRam Pukar
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp0112richa
 

Similaire à Computer Basics (20)

Module1 computerbasics1
Module1 computerbasics1Module1 computerbasics1
Module1 computerbasics1
 
Computer Hardware and Networking Tutorial for beginners
Computer Hardware and Networking Tutorial for beginnersComputer Hardware and Networking Tutorial for beginners
Computer Hardware and Networking Tutorial for beginners
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardware
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardware
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardware
 
AGGREY REPAIR
AGGREY REPAIRAGGREY REPAIR
AGGREY REPAIR
 
Wk 2 - computers
Wk 2 - computersWk 2 - computers
Wk 2 - computers
 
Day1
Day1Day1
Day1
 
Fundamentalsofcomputer
FundamentalsofcomputerFundamentalsofcomputer
Fundamentalsofcomputer
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
Computer conceptsok
Computer conceptsokComputer conceptsok
Computer conceptsok
 
Using of computer tech
Using of computer tech Using of computer tech
Using of computer tech
 
The fundamentals of computer renew
The fundamentals of computer renewThe fundamentals of computer renew
The fundamentals of computer renew
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01
 
Network
NetworkNetwork
Network
 
Hardware
HardwareHardware
Hardware
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 

Plus de Hi Tech Criminal Justice

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisHi Tech Criminal Justice
 

Plus de Hi Tech Criminal Justice (20)

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Computer Basics

  • 1. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter TwoChapter Two ComputerComputer BasicsBasics
  • 2. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Learning ObjectivesLearning Objectives  Understand the basic hardware andUnderstand the basic hardware and software components of asoftware components of a Desk TopDesk Top Personal Computer (PC).Personal Computer (PC).  The difference betweenThe difference between OperatingOperating SystemsSystems andand Applications softwareApplications software..  The difference between andThe difference between and Flat FileFlat File andand Relational DatabaseRelational Database
  • 3. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Binary Number SystemBinary Number System A mathematical countingA mathematical counting schemescheme that has only two digits – zerothat has only two digits – zero (0) and one (1) which are(0) and one (1) which are combined to represent our ten-combined to represent our ten- digit counting scheme.digit counting scheme. Today’s computers use thisToday’s computers use this off/on scheme to representoff/on scheme to represent thethe binary digitsbinary digits, commonly, commonly referred to asreferred to as bitsbits, 1 and 0., 1 and 0.
  • 4. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond It is simple for computers to translate binaryIt is simple for computers to translate binary digits into a sixteen digit-based code calleddigits into a sixteen digit-based code called hexadecimalhexadecimal. This coding system is a. This coding system is a compromise between our abilities and thecompromise between our abilities and the computer that allows us tocomputer that allows us to interface.interface. Binary Number SystemBinary Number System
  • 5. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond ASCIIASCII The standard computer code configurationThe standard computer code configuration that works with computer bits is called thethat works with computer bits is called the American Standard Code for InformationAmerican Standard Code for Information Interchange (ASCII).Interchange (ASCII). A byte is eight bits, or a series of eight ones and zeros. Binary digits Byt e ASCII Words you can read!
  • 6. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Interface Means to InteractInterface Means to Interact  User interface is howUser interface is how we interact with thewe interact with the computer, e.g. thecomputer, e.g. the keyboard and mousekeyboard and mouse are user interfaceare user interface inputsinputs and theand the monitor is themonitor is the computer’s usercomputer’s user interfaceinterface outputoutput
  • 7. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond A computer system can considered asA computer system can considered as three broad categories of components:three broad categories of components:  HardwareHardware  SoftwareSoftware  FirmwareFirmware Your Computer as a SystemYour Computer as a System
  • 8. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Your Computer as a SystemYour Computer as a System The user is a human being. The input devices are the computer keyboard, mouse, and microphone. The output devices are the monitor, speakers, printer, and various storage media.
  • 9. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond HardwareHardware Input/output devices areInput/output devices are referred to asreferred to as peripheralperipheral devicesdevices. Think of a. Think of a peripheral device as anyperipheral device as any devicedevice notnot inside theinside the computer case.computer case. They communicate with theThey communicate with the main part of the computermain part of the computer usingusing portsports..
  • 10. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond HardwareHardware In addition to receiving information directly fromIn addition to receiving information directly from human users via input devices, computers canhuman users via input devices, computers can receive information from other computers. Thisreceive information from other computers. This is done via a network, e.g. the Internet.is done via a network, e.g. the Internet. Network information can come to the computersNetwork information can come to the computers through:through:  Hard linesHard lines (standard telephone line)(standard telephone line)  WirelessWireless (via radio signals)(via radio signals)
  • 11. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond HardwareHardware Computers have theComputers have the ability to storeability to store information:information:  Floppy DisksFloppy Disks  Compact DiscsCompact Discs (CDs)(CDs)  Digital Video DiscsDigital Video Discs (DVDs)(DVDs)
  • 12. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer TheThe systems boardsystems board,, oror motherboardmotherboard, is, is the brain of thethe brain of the computer. Thecomputer. The motherboardmotherboard contains a series ofcontains a series of micro chips that aremicro chips that are connected togetherconnected together by circuitry.by circuitry.
  • 13. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer Circuits, like wires or cables, transmitCircuits, like wires or cables, transmit electrical signals containing binaryelectrical signals containing binary data between the various microchips.data between the various microchips. TheThe microchipsmicrochips in the computer canin the computer can detect the presence or absence ofdetect the presence or absence of electronic impulses.electronic impulses.
  • 14. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond The Motherboard contains three typesThe Motherboard contains three types of memory chips:of memory chips:  TheThe Central Processing Unit (CPU)Central Processing Unit (CPU)  TheThe Read-only Memory (ROM)Read-only Memory (ROM)  TheThe Random Access MemoryRandom Access Memory (RAM)(RAM) Inside The ComputerInside The Computer
  • 15. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond The CPU has three core sets ofThe CPU has three core sets of instructions that it carries out:instructions that it carries out:  Mathematical computations (addition,Mathematical computations (addition, subtraction, division);subtraction, division);  Moving data or information from oneMoving data or information from one memory location to another; and,memory location to another; and,  Making decisions and moving to aMaking decisions and moving to a different set of instructions based upondifferent set of instructions based upon those decisions.those decisions. Inside your ComputerInside your Computer
  • 16. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer Random Access Memory (RAM)Random Access Memory (RAM) chips contain information onlychips contain information only when your computer is on. Whenwhen your computer is on. When you turn off the computer, theyou turn off the computer, the memory in the RAM disappears.memory in the RAM disappears. Also known as Volatile storage!
  • 17. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer  Read Only Memory (ROM) Contains the basicRead Only Memory (ROM) Contains the basic set of instructions that are required to start theset of instructions that are required to start the computer.computer.  Memory was installed during theMemory was installed during the manufacturing process.manufacturing process.  ROM (BIOS instructions) is a permanent partROM (BIOS instructions) is a permanent part of the chip.of the chip. Also known as Non- Volatile storage!
  • 18. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer  The Motherboard contains…..The Motherboard contains…..  AA Complementary Metal Oxide Semi-Complementary Metal Oxide Semi- conductor (CMOS)conductor (CMOS) configuration chip.configuration chip.  A system clock.A system clock.  Expansions slots.Expansions slots.  RAMRAM memory.memory.
  • 19. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer  The CMOS Chip:The CMOS Chip:  Responsible for remembering whatResponsible for remembering what hardware is in your computer.hardware is in your computer.  Necessary for your computer to initiallyNecessary for your computer to initially organize itself. If you added a new drive,organize itself. If you added a new drive, card, or peripheral device, your CMOScard, or peripheral device, your CMOS information would change.information would change.  Volatile (information can be lost) so it has itsVolatile (information can be lost) so it has its own battery with constant powerown battery with constant power
  • 20. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer  Random Access Memory (RAM)Random Access Memory (RAM) ………….………….  Contains information your computer isContains information your computer is working with now (What is on the screen).working with now (What is on the screen).  Has to be limited in the amount ofHas to be limited in the amount of information it can contain.information it can contain.  Once you are finished using the RAM andOnce you are finished using the RAM and move on to another project, what was inmove on to another project, what was in RAM is dumped.RAM is dumped.
  • 21. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer Cache MemoryCache Memory contains memorycontains memory your computer anticipates youyour computer anticipates you might need, similar to the humanmight need, similar to the human brain. It makes assumptions aboutbrain. It makes assumptions about what information you might needwhat information you might need based on certain programming.based on certain programming.
  • 22. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer  A BUS Contains theA BUS Contains the electrical pathways andelectrical pathways and directions for use of thosedirections for use of those pathways that thepathways that the information uses whileinformation uses while inside a computer.inside a computer.  The small metal tracings inThe small metal tracings in the circuit board take thethe circuit board take the place of wires to conductplace of wires to conduct electricity.electricity.  The bus is these traces andThe bus is these traces and the instructions for theirthe instructions for their use.use.
  • 23. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Inside your ComputerInside your Computer CMOS Chips Continually hold theCMOS Chips Continually hold the information on the configuration of yourinformation on the configuration of your computer. When you turn on the computer,computer. When you turn on the computer, the startup process is called athe startup process is called a bootingbooting.. When a computer is booted from the power-When a computer is booted from the power- off condition, it is called a “off condition, it is called a “hard boothard boot.” If.” If you push the reset button, you areyou push the reset button, you are performing a “performing a “soft boot.”soft boot.”
  • 24. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond TheThe Random Access Memory (ROM)Random Access Memory (ROM) containscontains a set of permanent instructions known as thea set of permanent instructions known as the basic input/output system (BIOS).basic input/output system (BIOS). SometimesSometimes referred to as thereferred to as the ROM BIOSROM BIOS or Flash BIOSor Flash BIOS.. ROM chips are a hybrid of both hardware andROM chips are a hybrid of both hardware and software. It is a physical component withsoftware. It is a physical component with embedded software. ROM chips areembedded software. ROM chips are sometimes referred to assometimes referred to as firmwarefirmware.. Inside your ComputerInside your Computer
  • 25. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Information on the Motherboard, exceptInformation on the Motherboard, except the ROM chip, isthe ROM chip, is volatilevolatile.. Long term or secondaryLong term or secondary storage are non-volatile:storage are non-volatile:  Hard disks;Hard disks;  Zip disks;Zip disks;  Floppy disks; CassetteFloppy disks; Cassette tapes;tapes;  CD-ROMs; and,CD-ROMs; and,  DVDs.DVDs. Inside Your Computer
  • 26. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond SoftwareSoftware  Instructions that tellInstructions that tell hardware what tohardware what to do; or,do; or,  A set of instructionsA set of instructions written in awritten in a language that thelanguage that the computer cancomputer can understand.understand. Two broad classificationsTwo broad classifications of software:of software:  Operating SystemsOperating Systems (also(also called platform)called platform)  ApplicationsApplications
  • 27. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Operating SystemsOperating Systems  Tells the computerTells the computer what to do.what to do.  The computerThe computer software that controlssoftware that controls and coordinates theand coordinates the interaction among theinteraction among the hardware elementshardware elements and between theand between the hardware and thehardware and the application programs.application programs. The operating system is the computer’s traffic cop.
  • 28. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond After your computer has booted and CMOSAfter your computer has booted and CMOS hands your computer over to the operatinghands your computer over to the operating system the operating system has twosystem the operating system has two primary functions:primary functions:  Managing the hardware and software.Managing the hardware and software.  It provides application program interfaceIt provides application program interface (API).(API). Operating SystemsOperating Systems
  • 29. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Disc Operating SystemDisc Operating System DOSDOS is probably the most common operating system.is probably the most common operating system. Users interface with a DOS in one of three ways:Users interface with a DOS in one of three ways:  A command driven interface;A command driven interface;  A menu-driven interface; or,A menu-driven interface; or,  An icon-driven interface.An icon-driven interface. MostMost policepolice employees work with an icon-drivenemployees work with an icon-driven interface that is also called ainterface that is also called a graphical usergraphical user interface (GUI).interface (GUI).
  • 30. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond ApplicationsApplications ApplicationsApplications softwaresoftware allows the user toallows the user to work with informationwork with information in the computer.in the computer. Applications areApplications are specific programs thatspecific programs that allow the user to doallow the user to do specific tasks such asspecific tasks such as word processing.word processing.
  • 31. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond DatabasesDatabases A collection of organized informationA collection of organized information that is centrally located and designedthat is centrally located and designed to meet the needs of users. There areto meet the needs of users. There are two classifications of databases:two classifications of databases:  Flat fileFlat file  Relational DatabaseRelational Database
  • 32. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Forced Choice FormatsForced Choice Formats Many state and localMany state and local policepolice agencies use software that allowsagencies use software that allows them to configure data entries tothem to configure data entries to match their specific datamatch their specific data dictionary.dictionary. Through the use ofThrough the use of forced-choiceforced-choice formatsformats, GUI software restricts, GUI software restricts data entries to previouslydata entries to previously determined attributes, propertiesdetermined attributes, properties or characteristics.or characteristics. Screen capture provided by Crimestar Corporation
  • 33. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Useful TermsUseful Terms  Multi-mediaMulti-media is the different forms of media beingis the different forms of media being used by any particular application.used by any particular application.  Multimedia applications can include graphics, animation, sound, andMultimedia applications can include graphics, animation, sound, and video elementsvideo elements  AA scalablescalable system can be adapted andsystem can be adapted and expanded to meet increased needs.expanded to meet increased needs.  Most legacy systems areMost legacy systems are proprietaryproprietary..  The system manufacturer (either hardware, software,The system manufacturer (either hardware, software, or both) will not reveal the systems specifications soor both) will not reveal the systems specifications so that other firms may not duplicate the product.that other firms may not duplicate the product.  Also known as aAlso known as a closed architectureclosed architecture..
  • 34. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology DiscussDiscuss criminal justicecriminal justice issuesissues www.criminaljustice-online.comwww.criminaljustice-online.com