SlideShare une entreprise Scribd logo
1  sur  24
Personal Computers and Applications Networking for Home and Small Businesses – Chapter 1
[object Object],Personal Computer Hardware Personal Computers & Applications How and Where Computers are Used
Personal Computer Hardware Personal Computers & Applications How and Where Computers are Used ,[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Personal Computers & Applications Local and Network Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Personal Computers & Applications Local and Network Applications ,[object Object],[object Object],[object Object],Activity 1.1.2
Personal Computer Hardware Types of Computers Classes of Computers ,[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Activity 1.2.2
Personal Computer Hardware Types of Computers  Portable Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.2.3
Personal Computer Hardware Binary Representation of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lab & Activity 1.3.2
Personal Computer Hardware Binary Representation of Data ,[object Object],[object Object],Lab & Activity 1.3.3
Personal Computer Hardware Computers Components and Peripherals Computer System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Adapter Cards ,[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Storage Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Storage Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Peripheral Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers Components and Peripherals Cases and Power Supplies
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers System Components Safety and Best Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers System Components Installing Peripherals and Verifying Operation Activity 1.5.3
 

Contenu connexe

Tendances (20)

Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Basic of computers
Basic of computersBasic of computers
Basic of computers
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Intro to computer system
Intro to computer systemIntro to computer system
Intro to computer system
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
BAIT1003 Chapter 2
BAIT1003 Chapter 2BAIT1003 Chapter 2
BAIT1003 Chapter 2
 
Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)
 
A Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & PeripheralsA Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & Peripherals
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Hardware
HardwareHardware
Hardware
 
Hwswb
HwswbHwswb
Hwswb
 
Network
NetworkNetwork
Network
 

Similaire à Chapter 1r

Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of ComputerJack Frost
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basicJiian Francisco
 
002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdfMarioCaday2
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basicsehillpamlico
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to misJob Thomas
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentalsPANKHURI JAIN
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.pptAnkita Shirke
 
Basic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifBasic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifSadiq Khalif
 
hardware software basics
hardware software basicshardware software basics
hardware software basicsDeepa Rani
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwarephazeddl
 
Basic computer hardware and software
Basic computer hardware and software Basic computer hardware and software
Basic computer hardware and software leidy5566
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareJuan Camilo Piñerez
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareDavid RC
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareandresaguilar06
 
Basic Computer Hardware & Software
Basic Computer Hardware & SoftwareBasic Computer Hardware & Software
Basic Computer Hardware & SoftwareJVGAJJAR
 

Similaire à Chapter 1r (20)

Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of Computer
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.ppt
 
Basic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifBasic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalif
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and software Basic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware_and_software
Basic computer hardware_and_softwareBasic computer hardware_and_software
Basic computer hardware_and_software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic Computer Hardware & Software
Basic Computer Hardware & SoftwareBasic Computer Hardware & Software
Basic Computer Hardware & Software
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Chapter 1r

  • 1. Personal Computers and Applications Networking for Home and Small Businesses – Chapter 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  

Notes de l'éditeur

  1. Kebanyakan komputer untuk melakukan fungsi, ada tiga hal yang harus bekerja sama:
  2. Komputer ini hanya berguna untuk program atau aplikasi pd komp itu.
  3. Perangkat portabel bervariasi dalam ukuran, kekuatan dan kemampuan grafis dan meliputi: Laptop atau notebook PC Tablet PC Pocket PC Personal Digital Assistant (PDA) Perangkat game Ponsel Laptop juga dapat dipasang ke sebuah docking station yang memungkinkan pengguna untuk menggunakan monitor yang lebih besar, tikus, berukuran penuh keyboard danmemiliki pilihan koneksi yang lebih
  4. Komputer menggunakan kode biner untuk mewakili dan menafsirkan huruf, angka dankarakter khusus dengan bit. Sebuah kode yang biasa digunakan adalah American Standard Kode untuk Informasi Interchange (ASCII). Dengan ASCII, setiap karakter diwakili oleh string bit. Sebagai contoh: Modal huruf: A = 01000001 Setiap kelompok dari delapan bit, seperti representasi dari huruf dan angka, dikenal sebagai byte Ketika mengacu pada ruang penyimpanan, kita menggunakan istilah byte (B), kilobyte(KB), megabyte (MB), gigabyte (GB), dan terabyte (TB).
  5. Data Rate menentukan berapa lama waktu yang dibutuhkan untuk mentransfer file. Semakin besar file, lama waktu yang dibutuhkan, karena banyak informasi  untuk ditransfer. Kecepatan transfer data diukur dalam ribuan bit per detik (Kbps) atau jutaan bit per detik (Mbps).
  6. Random Access Memory (RAM)  penyimpanan sementara menyimpan data yang sedang diproses oleh CPU Mengapa pengguna membutuhkan lebih banyak RAM? Beberapa aplikasi yang berjalan pada waktu yang sama Beberapa CPU Jumlah RAM yang tersedia ditentukan oleh motherboard
  7. bagaimana data sampai ke lokasi
  8. Bila daya dihapus dari komputer, setiap data yang tersimpan dalam RAM akan hilang. Program dan data pengguna harus disimpan dalam bentuk yang tidak akan hilang ketika power akan dihapus. Ini dikenal sebagai non-volatile penyimpanan. Jenis non-volatile penyimpanan yang tersedia untuk sistem komputer termasuk: Perangkat penyimpanan magnetik Optik perangkat penyimpanan Statis memori (flash) drive Penyimpanan magnetik Ini menyimpan perangkat informasi dalam bentuk medan magnet. Mereka termasuk: Hard disk drive Floppy drive Tape drive
  9. Optical Drive Perangkat penyimpanan optik menggunakan sinar laser untuk merekam informasi dengan menciptakan perbedaan dalam kepadatan optik. Perangkat ini meliputi CD dan DVD yang terdiri dari tiga format yang berbeda: Baca saja: CD, DVD Tulis sekali: CD-R, DVD-R Menulis banyak: CD-RW, DVD-RW Statis Memory dan Memory Sticks Perangkat memori statis menggunakan chip memori untuk menyimpan informasi Karena ukuran dan bentuk, perangkat ini dikenal sebagai kunci memori USB atau flash drive
  10. Surge Protector   mencegah kerusakan pada komputer UPS (Uninterruptible Power Supply) menyediakan daya cadangan tanpa gangguan untuk waktu singkat
  11. Perbaikan Komputer Best Practices Matikan PC dan cabut listrik Menentukan apakah bagian hot-swappable (jika demikian, tidak ada kebutuhan untuk mematikan listrik sebelum menambahkan atau menghapus bagian) Jangan power supply terbuka atau monitor   keduanya mengandung tegangan tinggi Perhatian terhadap Electrostatic Discharge (ESD)   transfer listrik dari tubuh Anda ke bagian listrik