The document discusses various concepts related to computers and technology. It covers the information processing cycle of input, processing, output, and storage. It describes different input devices like keyboards, mice, scanners, and digital cameras. It discusses processing components like the processor, memory, and motherboard. Output devices covered include monitors, printers, and speakers. Storage methods like hard drives, CDs, DVDs, and flash drives are also summarized. The document then discusses computer software, networks, the internet, security issues, email etiquette, and computer ethics.
You may navigate through this presentation while in Slide Show view. Click on a skill on this slide to advance directly to the related topic slide. To return to this slide, click the Concepts button located in the bottom right corner of any slide. Alternatively, you may choose to advance through the presentation one slide at a time by clicking the Next button. Go back a slide by clicking the Previous button. The Next and Previous buttons are located in the bottom right corner of any slide.
Computers process information in the same way that humans make decisions. We use our eyes and ears to read or input facts and data into our brains. We use our brains to process that data and organize it into information. The resulting output is a thought or decision that we can display or present by drawing it, writing it, or making a voice recording of it. If we decide to keep the results for future use, we store the paper or recording in a file cabinet.Input involves getting data into the computer so that it can be processed.A computer’s central function is to process data. Processing can involve calculating numbers, editing text, modifying pictures, and performing other information management tasks. The central processing unit (CPU) is the brain of the computer that handles those tasks. The rate at which the CPU can process data is known as the clock speed.Output is processed data that can be used immediately or stored in computer-usable form for later use. Output may be produced in either hard copy or soft copy, or in both forms. Hard copy is a permanent version of output, such as a letter printed on paper using a printer. Soft copy is a temporary version and includes any output that cannot be physically handled. The storage portion of the information processing cycle refers to recording output so that it will be available after the computer has been shut off and RAM has been erased.
Twelve keys labeled F1 through F12, as well as several other named keys, can be programmed to perform special functions in software applications.Moving the mouse on the desktop causes a pointer to move on the screen.Most laptop computers provide a touchpad instead of a mouse as a pointing device. Commonly used at airport check-in counters, touch screens allow travelers to obtain boarding passes and check luggage by touching options on the monitor. You have probably used a touch screen if you use ATM machines for banking. They are also used at information kiosks to provide an easy way to select items of interest, without the necessity of a keyboard. Servers at restaurants use them to place orders. Touch screens are much easier to clean than keyboards, and they can be used with only one hand.
A scanner is a tool to input either pictures or text.Some handheld and laptop computers now accept “handwritten” input with a digitizing pen called a stylus.Tablet PCs are useful for handwriting notes when in a meeting or on the road.Most often used to control fast-moving images in computer games, joysticks can also be used by people who have difficulty using a mouse.Digital cameras can be used to transfer still and moving pictures into the computer. Webcams are a popular example of a video camera that can be used in combination with headphones and a microphone to communicate with people all over the world.
Microphones can stand on the desk or be worn as part of a headset. Bar code readers are also used for entering the Universal Product Code (UPC) found on items in grocery and retail stores.Although usually thought of as storage devices, compact discs (CDs), digital video discs (DVDs), flash drives, and hard drives allow you to reenter data into the computer quickly and easily, without having to retype it.
Most IBM-compatible PCs use a central processing unit made by Intel or AMD. They process data at clock speeds from 2.0 to 4.0 gigahertz (GHz). Many CPUs include multiple processors on a single chip. These dual-core or quad-coreprocessors can process multiple instructions simultaneously for better performance. Some CPUs have six processors in one. Single-core processors use a technique called multitasking in which one processor switches between programs so quickly that the user doesn’t perceive any interruption, but both programs are actually running more slowly than they would with two separate processors, or with one dual-core processor.The user workspace is called random access memory (RAM) because the CPU has quick access to it and does not have to search through it page by page. The amount of RAM a personal computer needs depends on the operating system it runs. Having a large amount of RAM is like having a large work table where you can spread out books, papers, pencils, a calculator, and other tools you need to do your work. RAM is considered volatile or temporary storage because it disappears completely when the power to the computer is shut off. A computer running Windows XP needs 512 megabytes (MB) of RAM; a Windows 8 or Windows 7 system requires at least 1 gigabyte (GB). A gigabyte equals about 1 billion bytes. Read only memory (ROM) is nonvolatile and contains the getting-started instructions that the PC needs when the power is first turned on. As its name implies, ROM can only be used as programmed by the PC manufacturer.
Although older picture-tube type cathode ray tube (CRT) monitors are still in use, new PCs are sold with flat screen, liquid crystal display (LCD) or light-emitting diode (LED) monitors. In an LCD, liquid crystals are sandwiched between two sheets of material. Electric current passing through the crystals causes them to twist. This twisting effect blocks some light waves and allows other light waves to pass through, creating images on the screen. In an LED monitor, the LCD method of light transmission is enhanced by positioning red, green, and blue LEDS behind the liquid crystals. An LED monitor provides a more vibrant, colorful display than a LCD monitor can.There are several printing technologies available, including ink-jet, which uses liquid ink squirted on the paper, and laser, which fuses powdered toner to the paper.
Hard drive capacities vary; an average desktop PC might have a hard drive that holds 500 GB.Portable external hard drives are available in a variety of sizes, styles, and colors.CDs can hold about 700 MB of data. You can play your favorite music CDs in the CD drive of your PC.A Blu-ray disc can hold 25 GB to 50 GB.The flash drives on the market today can hold from 128 megabytes to 256 gigabytes of data on a printed circuit board inside a protective plastic case. They are the size and shape of a person’s thumb or a package of chewing gum. Some drives even provide fingerprint authorization. Flash drives connect directly to a USB port and thus do not require the installation of any device driver programs to support them.
In Slide Show view, click the Answer button after you believe that you know the correct answer to Question 1. The correct answer will be displayed. Then click the Next Question button and Question 2 will appear. Continue repeating these steps for all four questions.These Checkpoints are designed to provide you with an opportunity to reflect on a few concepts at a time.
USB cables and connector plugs are smaller, thinner, and more flexible. They transmit data at up to 5 gigabitsper second (Gbps) for a USB 3.0 port. As many as 127 devices can be connected to the computer host at once through a daisy-chain-style connection setup. USB hubs provide extra connection options for computers with only one or two USB ports. You might even discover that you can make backup copies of your data to an external hard drive that is connected to your computer via the USB port on your keyboard.
We can touch the disk that contains the software, but not the lines of programming code that make up the software.The original personal computer operating system, MS-DOS (Disk Operating System), used a command-line interface. You typed commands into a text prompt, and the computer returned text output to the monitor. If a PC has an older CPU with a clock speed that is too slow, or not enough RAM, the PC will run slowly or it won’t be able to run the operating system at all. Windows 8 and Windows 7 require, at a minimum, a CPU that runs at 1 GHz and has 1 GB of RAM. Windows XP requires a 233 MHz CPU and 128 MB of RAM.The operating system for the Apple Macintosh is Mac OS. The tenth version of the Mac operating system is called Mac OS X. Since its initial introduction in 2001, several updates to it have been released, each one with an animal code name. Mountain Lion (version 10.8)was released in July 2012. Previous versions included Lion, Snow Leopard, Leopard, Tiger, Panther, Jaguar, Puma, and Cheetah.
People with no technical knowledge of how a PC works can use it to balance their checkbooks or to insert a photograph into a personalized greeting card, print it out, and send it to a friend.Word processing software was originally designed as a replacement for the typewriter. Microsoft Word is a word processing program that includes several formatting features that can be applied to words, lines, paragraphs, pages, or entire documents.An Excel spreadsheet can calculate elements of a sales report, such as quarterly sales, and display them in a chart as represented in the image on this slide.
Information can be entered into an Access database by using a form designed for that purpose. An Access database report is a selection of data in a database. The user chooses which types of information should be included in the report, and the database automatically finds and organizes the corresponding data. You can filter the data to display only those items that match your criteria, such as the names of customers who spent more than $500 at your online music store last year. Database software can easily do simple calculations, such as showing monthly subtotals and an annual total for each of your customers, but complex math is usually best left to spreadsheet software.PowerPoint can combine text, graphics, sounds, and videos. The shows can include clip art, graphs and charts, photos, drawings, video clips, sound, and text. Features such as arrows and boxes that “fly” into the screen and slide transition effects can add interest and emphasis to the content of a presentation.
PaintShop Pro and Photo Elements allow you to edit photographs by cropping, removing the red-eye effect, or by making more advanced changes such as putting one person’s head on another person’s body. Video editing software such as Adobe Premiere can be used to edit video clips to remove the shots dislike, to add music, or to rearrange the scenes to create a more logical flow—or a more creative one. Nero StartSmart is an audio editing program that lets you transfer music from cassette tapes and vinyl records to CDs, iPods, and MP3 players. With it you can remove noise, clicks, and crackle; add reverb and other effects; remove the vocals by using a Karaoke filter; and tweak various other sound qualities.Visio is a graphics application that focuses more on technical and business drawings, flow charts, and organizational charts to illustrate complex processes. Visio is vector graphics-based, meaning that it uses points, lines, curves, and geometric shapes to create images. Another method is “raster-based,” which uses groups of pixels (picture elements) to make an image. If you can see tiny squares when you magnify an image, you are viewing its individual elements.A digitized pen and tablet may seem to be a requirement for using drawing applications, but you can do amazing things with a mouse by, for example, picking a circle from a group of shapes and making it larger or smaller or turning it into an oval. Free graphics and drawing software include Inkscape, Skencil, and Open Office DRAW.
Widely used versions of the Microsoft Office suite contain the word processing program, Word; the spreadsheet program, Excel; the database manager, Access; and the presentation manager, PowerPoint.Quicken and Microsoft Money are two money management software applications with an interface that resembles a checkbook. Users can not only write and print checks, but also track their spending habits, create a budget, generate cash flow reports, download their credit card charges, and keep track of their savings and investments.TurboTax and TaxCut are income tax preparation programs that prompt you to enter your tax information, then print a duplicate of the state and federal forms with your data on the appropriate lines.
Smartphones such as the Blackberry include PDA software that tracks appointments and stores contact information. Many PIMs also contain a scheduler with an alarm to alert you of a meetings. Smartphones and handheld devices can synchronize with your computer’s PIM program so you can carry your information everywhere you go.Businesses often find the need to have several people collaborate on a project. Collaboration software, also known as groupware, can help team members stay connected. A calendar feature allows users to schedule meetings at times when others are free. Both email and instant messaging (IM) functions are used, providing real-time communication among team members wherever they are in the world. SharePoint allows direct editing of documents through Word, Excel, or PowerPoint and also provides controlled access to shared documents via the Web.
Computer games have come a long way since the Solitaire program included in the first versions of Windows. You can even play games over the Internet with players in other cities and countries. Some games, especially those that include realistic simulations, require a lot of computing power. You will need a fast CPU and plenty of RAM for the best performance. Entertainment and gaming software can be so lifelike they look like actual TV broadcasts. Baseball, football, auto racing, and fantasy games are just a small part of a fast-growing industry.OpenOffice is a suite of applications that is considered open source and includes a word processor, a spreadsheet program, a presentation application, a drawing application, and a database manager. These applications can save and open data files from Microsoft Office, and provide many of the same capabilities as the equivalent retail products.The programming source code is also provided without charge and anyone is allowed to modify and improve it. For further details or to download OpenOffice for free, go to www.openoffice.org.
Computer networks are created when people want to share something such as a printer, an Internet connection, the specific information within the confines of their businesses, or the wide and abundant variety of information found on the Web. Networks allow computers to communicate and to share these resources.The network also includes a server, which is a computer that manages the network, and a shared printer. Most LANs are not stand-alone systems; they connect to the Internet as well, so users can take advantage of online resources such as the Web and email.A company might have several LANs, each in a different location or branch office. The key difference between a LAN and a WAN is that in a WAN, the company does not own all the pathways between the computers. The data has to go out in “public” to reach its destination, whether that is a leased phone line or the Internet. Leaving the protected local area carries security risks, but also connectivity benefits. Large companies lease dedicated phone lines (T1 or T3 lines) or satellite connections to connect their LAN. Many smaller companies find it more affordable to connect their branch offices via the existing Internet infrastructure.
Computer networks require specialized hardware and software designed for the sharing of information and other collaborative functions.In a client-server network, clients request information from the servers. In this type of network structure, displayed in the image on this slide, the networking paths allow a client computer to send information to a server, which then can relay the information back to the client computer or to another client on the same network. In this network, fax machines and printers can be shared resources, available through their respective servers. In addition, the file server can provide access to a shared hard disk.For small networks, the same computer can function as both client and server in a peer-to-peer network where all computers are equal and each one is both data requester and data provider, as shown in the image on this slide. Servers can hold large databases of information that users access to compile the reports that keep their organizations running smoothly. Servers might also be used as the storage location for everything every user creates, so that everyone else has easy access to it.
Within a LAN, all the computers and other network-enabled devices (such as printers) must have a way of communicating with one another. Switches and routers serve as central hubs for that communication. A switch is a box into which each computer connects via a cable, as pictured in the top image on this slide. A router is a more sophisticated version of a switch and is pictured in the bottom image on this slide. A switch that connects devices via radio frequency (RF) rather than via cables is called a wireless access point. A router can pass data from one LAN to another, and throughout the Internet. Routers can be wired, wireless, or both.
UTP cable is rated by category, with higher categories of cable needed for faster networks. Standard home networks use Cat 5 or Cat 5e cables; for business use, Cat 6 cable is the norm.Wireless connections are used where cables are difficult to install or where the users are mobile or not close to a switch or router. Commonly called Wi-Fi, these connections are known by their technical 802.11 protocol specifications. See the following slides for details on them.
A protocol is a generally accepted agreement on how to behave in a certain situation. Computer protocols are international agreements on how to manufacture hardware and software, and how to send data from one computer to another. As wireless connectivity finds its way into the home computer market, more people are becoming aware of its associated technical labels.
This slide continues from the previous slide and providesa list of common protocols, including HTTPS (HyperText Transfer Protocol), POP3, SMTP (Simple Mail Transfer Protocol), and FTP (File Transfer Protocol).
Wired network connections commonly use RJ-45 connectors. These are similar to telephone connectors (which are RJ-11 or RJ-14) but they use eight wires instead of the usual 2 or 4. An RJ-45 connector is slightly wider than its telephone counterpart.
In Slide Show view, click the Answer button after you believe that you know the correct answer to Question 1. The correct answer will be displayed. Then click the Next Question button and Question 2 will appear. Continue repeating these steps for all four questions.These Checkpoints are designed to provide you with an opportunity to reflect on a few concepts at a time.
The Internet is a global network of computers that allows data of all types and formats to be passed freely from one computer to another. The Web, email, and FTP are different parts of the Internet.Many, but not all sites on the World Wide Web start with the three letters “www.” The Web is only a part of the Internet, albeit a very large one.
The image in this slide outlines the Internet network. Communications systems include computer hardware and communications software that allow computer users to exchange data around the house or around the world.
Google’s Gmail, as displayed in this slide, is a popular web-based email application.The FTP site pictured on this slide shows files available for viewing or downloading. FTP was originally used for exchanging data between incompatible mainframe systems, such as those made by IBM and those made by UNIVAC.
Viruses are stored in executable (program) files; when the program runs, the virus code executes, causing damage and copying itself into the computer’s memory, where it infects other programs. A virus is typically spread via an email attachment. Some viruses send themselves out via automatically generated emails to everyone in your address book. The image in this slide shows how a virus attacks. When you forward an email with an attachment such as a picture, you may be spreading a damaging virus.
Worms are usually designed to damage a network, in many cases by simply clogging up the network’s bandwidth and slowing its performance. The image at the top of this slide shows how a worm attacks. A worm reproduces itself and attacks all the computers on a network.Trojans open a “back door” to your system for malicious hackers. When you run the program, you let the Trojan into your system. The image at the bottom of this slide shows how a Trojan attacks. A Trojan pretends to be a useful program but ends up opening your system to hackers.
Spyware takes advantage of cookies, the small files that websites put on your computer to remember who you are on your next visit. Products such as Windows Defender, which is displayed in the image on this slide, scan your computer for malware and help prevent it from downloading in the first place.Although annoying, adware is not usually destructive, but it can slow down your processor and your Internet access significantly.
Phishers pretend to be representatives of the victim’s bank or a government agency by sending official-looking emails with obscure links back to websites that look exactly like the real website. The information they gather is then used in schemes involving identity theft that allow them to gain access to the victim’s bank account, which they empty of funds.
Keep your protection software up to date by downloading the latest “signature” files of known viruses.The installation of an antivirus software program such as Symantec AntiVirus, as shown in this slide, is essential for computers connected to the Internet. Keeping these virus definitions up to date will significantly help in the fight against viruses.To minimize infection, always update your computer with the latest security patches as they become available.
When applied to computer communication, improper etiquette can result in serious misunderstandings or ill will among coworkers. It can even lead to the loss of a lucrative business contract or the loss of a job.
The rules of ethicshelp guide our choices and actions, both in our personal lives and in our business lives.
It is important to remember that what you write in an email message can be misinterpreted, forwarded, or accidentally sent to the wrong person.
This slide and the next slide provide ten rules of email etiquette.
This slide continues from the previous slideand provides rules of email etiquette.
Copyright laws in the United States and most (but not all) other countries state that authors, music composers, TV show and movie creators, artists, and publishers own the works they create and distribute and that no one is allowed to use or copy their work without specific permission. The same rules apply to all copyrighted material including music CDs, DVDs, and songs available on the Web. The copyright notice on The New York Times home page displayed in this slide reminds visitors that the content of the site is copyrighted. When you install a software application, you must agree to accept the license agreement that describes the legal contract between the user (you) and the software developer. If you do not accept the agreement, the installation process will stop. By accepting the agreement, you agree with everything it says.Software piracy is a felony, but even if it were not, other compelling reasons exist for why you should not copy programs, music, or DVDs. It hurts the people who spend a lot of time and money creating products for your enjoyment.Formerly known as the Software Publishers Association, the Software & Information Industry Association (SIIA, www.siia.net) encourages people who witness software piracy to inform them so that they can investigate the situation. Software license agreements might specify that you can make one backup copy, but you cannot give that copy to a friend.
In Slide Show view, click the Answer button after you believe that you know the correct answer to Question 1. The correct answer will be displayed. Then click the Next Question button and Question 2 will appear. Continue repeating these steps for all four questions.These Checkpoints are designed to provide you with an opportunity to reflect on a few concepts at a time.