Académique Documents
Professionnel Documents
Culture Documents
COMPUTER
What is a Computer?
A computer is an electronic machine that can be programmed to
accept data (input), process it into useful information (output), and store
it in a storage device for future use
Characteristics of a Computer
•It’s a machine.
•It is electronic.
•It is automatic.
•It can manipulate data.
•It has memory
•It has logical function
Capabilities of a Computer
• Speed
• Accuracy
• Repetitiveness
• Storage
• Programmable
Limitations of a Computer
• Cannot operate without a set of
instructions.
• Cannot derive from objects.
• Can detect errors but cannot correct
them.
• Computer are subjects to occasional
breakdowns.
• Cannot run without electric power.
CLASSIFICATION OF COMPUTERS
ACCORDING TO PURPOSE
(General and Specific)
Special-purpose computers
- designed to perform
specific task, with
limited capabilities, and
the program of
instructions is built into
the machine
Pre-modern Era
Manual-mechanical device
- device powered by hand and
physical effort from the user.
Electro-mechanical device
- powered by electronic motors
and use switches and relays.
Electronic devices
- use only electrical switches and
circuitry instead of mechanical
relays. Principal components; circuit
boards, transistors or silicon chips.
MANUAL-MECHANICAL
Abacus
- The first man-made
computing device that
uses beads. Invented in
Mesopotamia, and
commercially used in
China.
MANUAL-MECHANICAL
John Napier
Napier’s Bones
- An arrangement of bones wherein
numbers are printed
MANUAL-MECHANICAL
William Oughtred
Blaise Pascal
Pascaline
Leibnitz Calculator
Charles Babbage
Herman Hollerith
Howard Aiken
Automatic Sequence
Controlled Calculator (MARK I)
Atanasoff-Berry Computer
(ABC)
Maurice Wilkes
Examples:
Universal Automatic Computer (UNIVAC) –
the first commercial business computer
developed by J. Presper Eckert and John
Mauchly.
Examples:
Tradic – first transistorized computer
UNIVAC II
Examples:
IBM System 360 – the most significant
3rd generation computer
Burroughs B5500
GENERATION OF COMPUTERS
Examples:
Apple II; TRS 80
IBM System 360, System 3090
IBM PC – XT base computers
IBM PC – AT base computers
Motorolla 68030 based computers
GENERATION OF COMPUTERS
Processing Speed?
Personal Computers
Hardware
Software
People ware
Data ware
Hardware is the physical components of
the computer system whether
internal or external that are
tangible in nature.
1.CPU
- this is known as the processor.
Parts of CPU
a. Control unit(CU) - Interprets program instructions
and directs the other parts of the CPU, and communicates with
the external input/output devices and secondary storage media
b. Arithmetic logic(ALU) – it does all the
calculation, comparison or logical operation, s
directed by the CU.
Hardware
• External Memory
• Secondary Memory - Also known as Auxiliary Memory.
- It is a non-volatile type of memory that is
responsible foe keeping files
permanently.
Hardware
Memory
Hardware
Motherboard
Hardware
•Input hardware
•Processing hardware
•Storage hardware
•Output hardware
•Communication hardware
Hardware
Input Hardware
- it accept or collect data and convert it into a form suitable
for processing.
TYPES
• Keyboard- Entry Devices
• Keyboards. It is the most commonly used input device.
• Terminals. It consists of keyboard, video display screen and
a communication line to a mainframe computer.
THREE TYPES OF TERMINAL
•Dumb – can be used only to input data to and receive
information from a computer system.
• Smart – can do input and output and has some limited
processing capability.
• Intelligent – a full fledge microcomputer with a
communication link.
Hardware
JOYSTICK
MOUSE TRACKBALL
Input Hardware
TYPES
• Scanning Device - It translates images of text, drawing, and
photos and the like into forms of data that can be understood by
the computer.
Input Hardware
• Fax Machine (Facsimile Transmission Machine) – it scans an
image and sends it as an electronic signals over telephone
lines
Input Hardware
•Other Devices
•Diskettes
•Hard disks
•Optical storage – use a laser beam to pack information
densely on are movable disk
•Magnetic tapes – a sequential file storage represented by
various arrangements of magnetized spots along the width of
the tape
•Magnetic disk – a metal plotter where data is represented by
magnetized spots on the tracks.
Hardware
Two forms:
•Hardcopy – it is when an information has been recorded in a
tangible medium, such as paper or microfilm
•Softcopy – it is when an output is temporarily displayed on the
screen
• Hardcopy Output Hardware:
•Printer – it is capable of printing characters, symbols and
graphics.
Categories:
•Impact printer – it has contact with papers like daisy wheel
printers, dot-matrix printers and line printers
•Non-impact printers –it has no contact with the paper like
laser printer, ink-jet printers and thermal printers.
Hardware
Communication Hardware
It facilitate the connection between computers connected with a
network of computers over phone lines and other channels.
Includes:
Modems - it converts digital signals to analog signals.
Cable – commonly used in networking, to facilitate the
communication between those computers.
Fax modems – a modem with fax capability installed as a
circuit board in the motherboard of a computer
Multiplexers – it combines several low-speed transmission into
one high-speed transmission.
Concentrator- it collects data in a temporary storage area,
then send it forward when enough has been accumulated.
Front-end Processor- a computer that handles
communications for mainframes.
Software
Categories of Software
1. System software- facilitating applications programs.
Types of system software
a. operating system - refers to a group of related programs
that supervise the execution of an
application program
b. operating environment - refers to programs that sit on top
of OS
c. utilities - a single term for all types of programming aids
d. programming damages - the programs used to write other
programs
e. language processor - used to convert source program into
a form suitable for execution
• compliers
• assemblers
• interpreters
Software
Categories of Software
Examples of Dataware:
• Instruction Manuals
• Operating Procedures
• Processing Procedures
• Recipe Cooking
SUMMARY OF
MIDTERM
Number system
- is any
prepositional Decimal Binary Octal Hexadecimal
notation were in 10 2 8 16
(10)A
each digit has it
(11)B
own wait and value. (12)C
(13)D
(14)E
(15)F
Radix *Note:
- Base on a number N- any number
n- radix or base of any number
system. system
I. Conversion from decimal to binary
Note:
N = number
R = Remainder
Example #1: convert the decimal number 523 to binary form. (52310N2)
Solution :
Q R
2 /523 1
2 /261 1
2 /130 0 Answer:
2 /65 0 52310 = 100000100112
2 /32 0
2 /16 0
2 /8 0
2 /4 0
2 /2 0
2 /1 1
0
Fractional Part
Example #1: Convert 0.562510 to binary.
Solution:
0.5625 0.1250 0.2500 0.5000
x 2 x 2 x 2 x 2
1.1250 0.2500 0.5000 1.0000
1 0 0 1
Read in this direction
to form the answer
Answer: 0.562510 = 0.10012
Example #2: Convert to 0.86210 to octal. (up to 4 precision)
Solution:
0.862 0.168 0.344 0.752
x 2 x 8 x 8 x 8
6.896 1.344 2.752 6.016
6 1 2 6
3 x 8 =3
1
6 x 8 = 48
2
4 x 8 = 256
EAC
Step 3: + 1
111102 Answer
Case II. The minuend is less than the subtrahend.
111102 Answer
SUMMARY OF
FINALS
E-mail
Internet
Internet is a vast network of networks that electronically connects to
billions of people nationwide.
Web
The web presents information through multimedia formats, graphics, sound,
animation & video.
Acronyms to remember
Computer Virus
- A program designed to attach itself to a file, reproduce and spread from one file
to another, destroying data, displaying an irritating message or otherwise
disrupting computer operations.
Crackers
-People who break into a computer system with intent to damage files or steal data.
Cyberpunks
– People who break into computers, especially Internet computers, to steal data
modify files or plant viruses
Hackers
-People who are once meant as computer hobbyists or computer novice. Today they are
referred to as people who has gained illegal access in a computer system.
Types of Viruses
password.
Worm
- It is designed to enter a computer system, usually a network, through security “holes”
and replicates itself.
Other terminologies
Time bomb
– a type of computer program that stays in a computer system undetected until it is
triggered at a certain date or time.
Antivirus
– A computer program used to scan a computer’s memory and disks to identify,
isolate, and eliminate viruses.
Data security
- Techniques that provide protection for data.
Biometrics
– Biological measurements, such as fingerprinting, that are used in the context of
computers to verify a person’s identity.
User rights
-Rules that specify the directories and files that an individual user can access.
Key
-In the context of data encryption, a key is the method used to encrypt or decipher
information as in which numbers in a code match each letters of the alphabet.
Trap door
-A way to bypass the normal security precautions and enter a computer
system. It is often created during computer installation and testing but
should be removed before the computer is placed into service.
Encryption
-The process of scrambling or hiding information so that it cannot be
understood without the key necessary to change it back into it’s original
form.
-A popular public
Pretty Good Privacy (PGP)
- key encryption system.
Public key encryption (PKE)
-An encryption method that uses a pair of keys, a public key (known to
everyone) that encrypts the message and a private key (known only to the
recipient) that decrypts it.
Firewall
- A method for preventing hostile pro – grams, such as Java applets, from
entering a network usually by installing firewall software that filters out
suspicious packets.
Spreadsheets
Using Spreadsheets