Soumettre la recherche
Mettre en ligne
Ecc 2016 module 1 ppt presentation
•
Télécharger en tant que PPTX, PDF
•
1 j'aime
•
183 vues
D
dgdotson
Suivre
Computer Concepts
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 34
Télécharger maintenant
Recommandé
Access 2016 module 4 ppt presentation
Access 2016 module 4 ppt presentation
dgdotson
Access 2016 module 1 ppt presentation
Access 2016 module 1 ppt presentation
dgdotson
Power point 2016 module 4 ppt presentation
Power point 2016 module 4 ppt presentation
dgdotson
Word 2016 module 3 ppt presentation
Word 2016 module 3 ppt presentation
dgdotson
Power point 2016 module 3 ppt presentation
Power point 2016 module 3 ppt presentation
dgdotson
Access 2016 module 3 ppt presentation
Access 2016 module 3 ppt presentation
dgdotson
Power point 2016 module 2 ppt presentation
Power point 2016 module 2 ppt presentation
dgdotson
Word 2016 module 2 ppt presentation
Word 2016 module 2 ppt presentation
dgdotson
Recommandé
Access 2016 module 4 ppt presentation
Access 2016 module 4 ppt presentation
dgdotson
Access 2016 module 1 ppt presentation
Access 2016 module 1 ppt presentation
dgdotson
Power point 2016 module 4 ppt presentation
Power point 2016 module 4 ppt presentation
dgdotson
Word 2016 module 3 ppt presentation
Word 2016 module 3 ppt presentation
dgdotson
Power point 2016 module 3 ppt presentation
Power point 2016 module 3 ppt presentation
dgdotson
Access 2016 module 3 ppt presentation
Access 2016 module 3 ppt presentation
dgdotson
Power point 2016 module 2 ppt presentation
Power point 2016 module 2 ppt presentation
dgdotson
Word 2016 module 2 ppt presentation
Word 2016 module 2 ppt presentation
dgdotson
Access 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentation
dgdotson
Excel module 3 ppt presentation
Excel module 3 ppt presentation
dgdotson
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentation
dgdotson
Power point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentation
dgdotson
Excel module 2 ppt presentation
Excel module 2 ppt presentation
dgdotson
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentation
dgdotson
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
dgdotson
Linking Into Sales linkedin certificate
Linking Into Sales linkedin certificate
Martin Brossman
How to use pivot table
How to use pivot table
Arlene Jovita
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 Tutorial
SpreadsheetTrainer
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Charts
dnbakhan
Entering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 Tutorial
SpreadsheetTrainer
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm
Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01
Muhammad Umer Aleem
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
Python Fundamentals
Python Fundamentals
pullaravikumar
Windows 10 Module 2.pdf
Windows 10 Module 2.pdf
ssuser536c36
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
sleeperharwell
Chapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
Chapter 1
Chapter 1
GSILPRASIT
Windows 10 Module 1.pdf
Windows 10 Module 1.pdf
ssuser536c36
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
Contenu connexe
Tendances
Access 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentation
dgdotson
Excel module 3 ppt presentation
Excel module 3 ppt presentation
dgdotson
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentation
dgdotson
Power point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentation
dgdotson
Excel module 2 ppt presentation
Excel module 2 ppt presentation
dgdotson
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentation
dgdotson
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
dgdotson
Tendances
(7)
Access 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentation
Excel module 3 ppt presentation
Excel module 3 ppt presentation
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentation
Power point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentation
Excel module 2 ppt presentation
Excel module 2 ppt presentation
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentation
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
En vedette
Linking Into Sales linkedin certificate
Linking Into Sales linkedin certificate
Martin Brossman
How to use pivot table
How to use pivot table
Arlene Jovita
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 Tutorial
SpreadsheetTrainer
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Charts
dnbakhan
Entering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 Tutorial
SpreadsheetTrainer
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm
Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01
Muhammad Umer Aleem
En vedette
(7)
Linking Into Sales linkedin certificate
Linking Into Sales linkedin certificate
How to use pivot table
How to use pivot table
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 Tutorial
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Charts
Entering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 Tutorial
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1
Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01
Similaire à Ecc 2016 module 1 ppt presentation
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
Python Fundamentals
Python Fundamentals
pullaravikumar
Windows 10 Module 2.pdf
Windows 10 Module 2.pdf
ssuser536c36
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
sleeperharwell
Chapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
Chapter 1
Chapter 1
GSILPRASIT
Windows 10 Module 1.pdf
Windows 10 Module 1.pdf
ssuser536c36
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
lorainedeserre
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1
Steve Guinan
Chapter 14 Business Continuity
Chapter 14 Business Continuity
Dr. Ahmed Al Zaidy
Chapter12017
Chapter12017
husmos
Information and communication technology Textbook answers
Information and communication technology Textbook answers
abdurrahman mafhoom
Chapter 03.ppt
Chapter 03.ppt
anisur_rehman
Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6
Steve Guinan
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
Dr. Ahmed Al Zaidy
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
dgdotson
Word Module 1 Lesson
Word Module 1 Lesson
GulledgeE
Lecture 3.pptx
Lecture 3.pptx
DuncanWachira3
Computing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming Log
LynellBull52
Similaire à Ecc 2016 module 1 ppt presentation
(20)
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Python Fundamentals
Python Fundamentals
Windows 10 Module 2.pdf
Windows 10 Module 2.pdf
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
Chapter 9 Client and application Security
Chapter 9 Client and application Security
Chapter 1
Chapter 1
Windows 10 Module 1.pdf
Windows 10 Module 1.pdf
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1
Chapter 14 Business Continuity
Chapter 14 Business Continuity
Chapter12017
Chapter12017
Information and communication technology Textbook answers
Information and communication technology Textbook answers
Chapter 03.ppt
Chapter 03.ppt
Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
Word Module 1 Lesson
Word Module 1 Lesson
Lecture 3.pptx
Lecture 3.pptx
Computing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming Log
Dernier
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Sujit Pal
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Dernier
(20)
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ecc 2016 module 1 ppt presentation
1.
1 Essential Computer Concepts Module
1 Understanding Essential Computer Concepts © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
2.
2 • Recognize you
live and work in the digital world • Distinguish types of computers • Identify computer system components • Compare types of memory • Differentiate between input devices • Explain output devices Module Objectives (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
3.
3 • Describe data
communications • Define types of networks • Access security threats • Understand system software • Describe types of application software Module Objectives (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
4.
4 • The internet,
computers, and mobile devices such as smartphones and tablets provide us with a world of information, literally at our fingerprints • Over the last 25 years, we can use the Internet to: • Instantly communicate with friends and coworkers • Store music and movies and access them anywhere • Search and apply for jobs without leaving home • Quickly access information • Shop for anything from clothing to food to cars • Manage finances, deposit checks, and pay at the cash register using a mobile device • Get directions, view maps, and find nearby restaurants Recognize You Live and Work in the Digital World (Slide 1 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
5.
5 • We can
use the Web to get work done by: • Searching for information • Communicating with others through email or videoconferencing • Telecommuting • Cloud computing Recognize You Live and Work in the Digital World (Slide 2 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
6.
6 • How to
be a good online citizen •Your internet activities can have lasting repercussions on your work and life •For example, employers are known to keep an eye on social media accounts of current or prospective employees •Be aware of copyright laws when using an item on-line for reports or presentations Recognize You Live and Work in the Digital World (Slide 3 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
7.
7 Recognize You Live
and Work in the Digital World (Slide 4 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7 • Couple using videoconferencing to communicate • Employee telecommuting from home
8.
8 • Types of
personal computers: • Desktop computers • Laptop computers • Tablets • Smartphones • Mainframe computers and supercomputers Distinguish Types of Computers (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
9.
9 • Touchscreens • Microsoft
Windows 10 was also developed to work with touchscreen monitors, tablets, and smartphones • Many tasks are, in fact, easier to accomplish with a touchscreen device because they are designed for use with gestures instead of a mouse Distinguish Types of Computers (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
10.
10 Distinguish Types of
Computers (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Desktop • Laptop, smartphone, and tablet • Supercomputer
11.
11 • A computer
system includes computer hardware and software • Hardware refers to the physical computers • Software refers to the intangible components of a computer system, particularly the programs, or data routines, that the computer uses to perform a specific task Identify Computer System Components (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
12.
12 • An Overview
of computer system components • Architecture • Data • Processing • Motherboard or CPU • Cards or removable circuit boards • Input and input devices • Output and output devices • Peripheral devices Identify Computer System Components (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
13.
13 • Motherboard Identify Computer
System Components (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Flow of information through a computer system
14.
14 • Memory is
one of the most important components of personal computer hardware as it stores instructions and data • Types of memory include: •Random access memory (RAM) which holds info while the computer is on •Cache memory is high-speed memory •Virtual memory •Read-only memory is a chip that stores the BIOS (Basic Input-Output System) •CMOS memory is a chip that stores the date, time and system parameters Compare Types of Memory (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
15.
15 • Upgrading Ram
is one of the easiest ways to make your computer run faster • The more RAM a computer has, the more instructions and data can be stored there • You can often add more RAM by installing additional memory cards on the motherboard Compare Types of Memory (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
16.
16 •Relationships between types
of computer memory Compare Types of Memory (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
17.
17 •Since RAM retains
data only while the power is on, your computer must have a more permanent storage option •Types of storage media include •Magnetic storage devices such as a hard drive •Optical storage devices use laser technology to store data and include a CD, CD-ROM and DVD •Flash Memory •Solid-state drive (SSD) is intended as a replacement for a traditional hard disk drive •Solid-state hybrid drive (SSHD) combines the speed of an SSD with benefits of a traditional hard disk drive Summarize Types of Media (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
18.
18 Summarize Types of
Media (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Storage devices and RAM
19.
19 Differentiate Between Input
Devices (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • To accomplish a task, a computer first needs to receive the data and commands you input • In a typical system, you provide this information using an input device such as a keyboard or a mouse but wireless devices can also perform this function • There are many types of input devices • Keyboard • Pointing device, such a mouse, scroll wheel or trackball • Touchscreen, which accepts commands from fingers • Microphone • Scanner
20.
20 Differentiate Between Input
Devices (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Personal computer pointing devices: mouse, trackball, and touchpad
21.
21 • An output
device is any hardware peripheral that communicates the results of data processing • Output devices may connect to computers with cables or wirelessly • Output devices include: • Monitor • Printer • Speakers Explain Output Devices © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
22.
22 • Data communications
is the transmission of data from one computer to another or to a peripheral device • One computer sends the data over some type of channel such as telephone, coaxial cable or wirelessly • A device driver or driver handles the transmission protocols, which establishes the rules for data transfer • A driver is a computer program that can establish communication because it understands the characteristics of your computer and of the device Describe Data Communications (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
23.
23 • Computers communicate
in multiple ways such as through a: • USB (Universal Serial Bus) • Ethernet port • Modem Describe Data Communications (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
24.
24 Describe Data Communications
(Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Computer Expansion Ports
25.
25 • A network
connects one computer to other computers and peripheral devices, enabling you to share data and resources with others • To connect with a network via Ethernet, a computer must have a network interface card, which creates a communications channel between the computer and the network • Many desktops PC’s and laptops come with a NIC built-in, and an Ethernet cable is used to make the connection to a router or modem • A router is a device that controls traffic between network components • Network software is also essential, establishing the communication protocols that will be observed on the network Define Types of Networks (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
26.
26 • There are
a variety of network types • Peer-to-peer network • Local area network (LAN) • Wide area network (WAN) • Wireless local area network (WLAN) • Personal area network (PAN) • Infrared technology use infrared light waves to “beam” data from one device to another Define Types of Networks (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
27.
27 Define Types of
Networks (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Typical network configuration
28.
28 • Security refer
to the steps a computer user takes to prevent unauthorized use of or damage to a computer • Malware is a broad term that describes any program designed to cause harm or transmit information without permission of the computer owner • In order to protect computers against a virus, users should use antivirus software • Spyware is software that secretly gathers information from your computer and then sends this data to a company or person that created it • A firewall is like a locked door on your computer or network and prevents other computers on the internet from accessing it Assess Security Threats (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
29.
29 • Criminals are
relentlessly searching for new and aggressive ways of accessing computer users’ personal information and passwords • A spoofed site is a fake website set up to look like a legitimate website • Phishing refers to the practice of sending email to customers or potential customers of a legitimate website encouraging them to click a link in the email • Pharming occurs when a criminal breaks into a DNS server and redirects any attempts to access a particular website to the spoofed site Assess Security Threats (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
30.
30 • Windows Defender
scan in progress Assess Security Threats (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
31.
31 • System software
allocates system resources, manages storage space, maintains security, and detects equipment failure • Components of system software: • The operating system manages the system resources, which includes controlling basic data input and output • Utility software helps analyze, optimize, configure, and maintain a computer • Protecting information with passwords • To prevent anyone from guessing your passwords, always create and use strong passwords • A strong password consists of at least eight characters of upper and lowercase letters and numbers Understand System Software (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
32.
32 • Relationships between
system software and other system components Understand System Software (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
33.
33 • Application software
enables you to perform specific tasks such as writing letters, creating presentations, analyzing statistics, creating graphics, enhancing photos, and much more • Typical application software includes the following: •Document production software, which allows you to write and format text documents •Spreadsheet software, of which Microsoft Excel is an example •Database management software lets you collect and manage data •Presentation software allows you to create a visual slide show as with Microsoft PowerPoint •Multimedia authoring software allows you to record and manipulate image files •Information and task management software •Website creation and management software Describe Types of Application Software (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
34.
34 • Automatic spell
checking in Microsoft Word Describe Types of Application Software (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Editing a worksheet in Microsoft Excel
Télécharger maintenant