More!

Friday, October 8, 2010

Basic Computer Concepts Lesson Summarization

PRELIM TO FINAL LECTURE

PRELIM Lecture

Personal Computer is an electronic device that performs certain task.


Abacus

  • Ultimate ancestors of today’s computer.
  • Became the arithmetic tool of early merchants
  • The only relation that can be claimed between abacus and computers is that they are both used to aid in handling/logical computations.



Charles Babbage (1791-1871)

  • Called as the “Father of Computing”
  • Invented the Analytical and Difference Engines.
  • Born on December 26, 1791 in Teignmouth, Devonshire in the UK.


Difference Engine

  • Conceived to perform quick tabular calculations, the workings of which were based on the Method of Differences, an algorithm that lent itself to the easy creation of a wide range of mathematical tables.
  • Was powered by steam
  • Embodied the basic concepts and elements of a modern general – purpose computer.

Analytical Engine



  • Utilized I / O media called Jacquard’s punched cards, originally used to lay down thread arrangements in weaving.



Joseph Marie Charles (called or nicknamed) Jacquard

(7 July 1752 (Lyon, France) – 7 August 1834 (Oullins, France)) played an important role in the development of the earliest programmable loom (the "Jacquard loom"), which in turn played an important role in the development of other programmable machines, such as computers.


Generation of Computers


The First Generations

• Computers was based on the used wired circuits containing vacuum tubes, which utilized punch cards as the main storage and designed for a specific task.

• Used binary codes of “machine language”


Electronic Numerical Integrator and Computer (ENIAC)

- Hulk of machinery

- Consisted of 18,000 vacuum tubes

- 70,000 resistors

- 5 million soldered joints and occupied a space equal to a small warehouse.


Electronic Discrete Variable Automatic Computer (EDVAC)

- pioneer in implementing von Neumann’s architecture

- the key to which was the Central Processing Unit, which allowed all computer functions to be coordinated through a single source.


The Second Generation

- Development of “transistor”

- smaller size and increased reliability

-resulted to smaller computers, which were faster and more energy efficient than their predecessors.


The Third Generation

- Integration – a process in which numerous electronic components are brought together to compose a system unit

(an integrated circuit)

- The first integrated circuit (IC) was invented independently by Jack Kilby and Robert Noyce


The Fourth Generation

- Development of user – friendly software packages that offered non – technical users many of the advantages of computer applications.


The Fifth Generation

- Computer that can understand human speech, can recognize patterns like faces and other complex images


Artificial intelligence

• Expert System

• Natural Language Processing

COMPUTER APPLICATION

  • Business
  • Mathematics and Science
  • Engineering
  • Education
  • Medicine
  • Entertainment

Terminologies


Data – Symbol that represent people, events, things and ideas.

Information – data presented in a format that people ca

n understand and use.

Bit – binary codes used by computers consisting of either 1 or 0

Byte – eight bits are used to represent one character


ASCII

- American Standard Code for Information Interchange

- Requires only 7 bit for each character

Extended ASCII

- superset of ASCII

- eight bit

- provides 128 additional character

EBCIDIC

- Extended Binary Coded Decimal Interchange Code

- Alternative 8 bit code usually used by IBM Main Frame Computer


Unicode

- provides codes for 65,000 characters


Midterm Lecture

Motherboard – also known as main board. It is the computer’s main circuit board.


FAMILIARIZATION OF MOTHERBOARD

  • Processor
  • Zero Insertion Force – ZIF socket

  • Memory Socket

- SDRAM/ DDR1/ DDR2

  • Memory Module
  • Cooling System (Heat Sink and Cooling Fan)
  • PCI SLOT
  • PCI EXPRESS
  • AGP SLOT
  • ISA SLOT (obsolete)

IDE Connector (CD/DVD ROM/HARD DISK)

- Integrated Drive Electronic

FDD Connector

- Floppy Disk Drive

IDE Cable – connector for CD ROM/ Hard Disk

SATA CONNECTOR – Serial Advance Technology Attachment

PATA CONNECTOR – Parallel Advance Technology Attachment

- ATX Power Connector

- Power Supply

- Rear panel

  • Parallel Port
  • Media Port
  • Serial Port
  • USB Port
  • Com1 Port
  • PS2 Keyboard Port
  • PS2 Mouse Port
  • Audio Port

- CMOS Battery

- Front Panel


Intel

- worlds largest chipmaker

- introduced the worlds first processor


AMD (Advanced Micro Devices)

- intel’s chief rival.



Flowcharting – a graphical representation of the sequence

of operations a computer is to perform.


Remote Administrator

- is a product of Famatech International Corp. It is a remote control software for Microsoft Windows which uses the Mirror Driver (Video Hook Driver) to remotely control another computer.


PRE-FINAL LECTURE

NETWORKING

- is the problem of delivering the message from a source to destination.


Use of Computer Networks


Network for Companies

- Resource Sharing

- Dynamic Rerouting


Networks for People

- Access to remote information

- Person – to – person communication

- Interactive communication

Types of Network Topologies


Bus Network – a common channel that allows all devices.



Ring Network – all messages travel in a ring, either in clockwise or counterclockwise direction.



Tree Network – integrates multiple star topologies



Star Network – a central connection point called the Hub, is used and all devices connect through it.


Mesh Network – involves the concept of routes, where a message is sent on the network can take any of several possible paths from a source to destination.


Final Lecture

TRENDS AND ISSUES

  • Web Technology
  • Artificial Intelligence
  • Commerce
  • Education
  • Careers and Professional Outlook
  • Health Issues
  • Information Ethics

Web Technology


Hypertext – a computer system that could store literary documents, link them according to logical relationships and permit readers to comment and annotate what they read.


HTML (Hypertext Markup Language) – document refers to plain text or ASCII or document with embed.


ETHICS


Privacy

- refers to the right of people not to reveal information about themselves.

- Right to keep personal information such as email, messages, medical histories, student records, financial information from getting into the wrong hands.

  • Issue of privacy is important because data on an in dividual can be collected, stored and used without that persons knowledge or consent.

Privacy at Work

  • Some experts believe that there will be a collision between workers who want their privacy and companies that demand to know more about their employees.
  • Computer – monitoring systems the directly into computerized workstations; specialized computer programs can track every keystroke made by user.

3 Kinds of Ethics

  • Ethics
  • Business Ethics
  • Information Ethics

Service Theft

- some people are using their employer’s computer time to play game.

- Biggest abuse is probably wasting time with electronic mail and internet.

- Theft of telephone services has increased significantly.


Data Alteration/ Theft

- Intentional use of illegal and destructive programs to alter

or destroy data is as much as crime as destroying tangible goods.

- Most common of these types of programs are viruses and worms.


Malicious Access

- Crimes involving illegal system access and use of compu

ter services are a concern to both government and business.

- Federal, State, Local government computers are sometimes left unattended over weekends without proper security.

- University computers are often used for commercial purposes under the pretense of research or other legitimate academic pursuits.


Hacker – a person who enjoys computer technology and spends time learning using computer systems.


Criminal Hacker or Cracker – a computer – savvy person who

attempts to gain unauthorized or illegal access to computer systems.


Virus – program that attached itself to other programs.


Worm – function as an independent program, replicating its own program files until it interrupts the operation of network and computer systems.


Application Virus

- infects executable application files

- infects computer system

- can often be detected by checking the length or size

of the file


System Virus

- typically infects operating system programs or other system files

- usually infects the system as soon as the computer is started


Logic Bomb

- application or system virus designed to “explode” or execute at a specified time and date.


Trojan Horse

- program that appears to be useful but actually masks the destructive program.


Macro Virus

- virus that uses an applications own macro virus programming language to distribute itself.


Unshielded Twisted Pair (UTP)


UTP cables are found in many Ethernet networks and telephone systems. For indoor telephone applications, UTP is often grouped into sets of 25 pairs according to a standard 25-pair colored code originally developed by AT&T. A typical subset of these colors (white/blue, blue/white, white/orange, orange/white) shows up in most UTP cables.

For urban outdoor telephone cables containing hundreds or thousands of pairs, the cable is divided into smaller but identical bundles. Each bundle consists of twisted pairs that have different twist rates.

The bundles are in turn twisted together to make up the cable. Pairs having the same twist rate within the cable can still experience some degree of crosstalk. Wire pairs are selected carefully to minimize crosstalk within a large cable.

UTP cable is also the most common cable used in computer networking. Modern Ethernet, the most common data networking standard, utilizes UTP cables. Twisted pair cabling is often used in data networks for short and medium length connections because of its relatively lower costs compared to optical fiber and coaxial cable.

Straight-through Cable


Straight-through cable is a type of twisted pair copper wire cable for local area network (LAN) use for which the RJ-45 connectors at each end have the same pinout (i.e., arrangement of conductors).

It is identical to crossover cable, except that in the latter the wires on the cable are crossed over so that the receive signal pins on the connector on one end are connected to the transmit signal pins on the connector on the other end.

Straight-through cable is also commonly referred to as patch cable. However, this might be confusing in some situations because patch cable also has a broader definition that emphasizes the fact that there is a connector
on each end rather than the equality (or lack thereof) of the pinouts.

Straight-through cable is used to connect computers and other end-user devices (e.g., printers) to networking devices such as hubs and switches. It can also be used to directly connect like devices (e.g., two hubs or two switches) if the cable is plugged into an uplink port on one (but not both) of the devices. Crossover cable is used to connect two like devices without the use of an uplink port.

Crossover Cable


A crossover cable connects two devices of the same type, for example DTE-DTE or DCE-DCE, usually connected asymmetrically (DTE-DCE), by a modified cable called a crosslink. Such distinction of devices was introduced by IBM.

The crossing wires in a cable or in a connector adaptor allows:

* connecting two devices directly, output of one to input of the other,
* letting two terminal (DTE) devices communicate without an interconnecting hub knot, i.e. PCs,
* linking two or more hubs, switches or routers (DCE) together, possibly to work as one wider device.

source: wikipedia

Assembling and Disassembling of the Central Processing Unit (CPU)


The CPU is the main brain of the computer. It is the one who controls and manage all the doings of the individual to the computer.


Disassembling:


  • First, you must be sure that you unplug the PC to any electric devices.
  • To avoid static experience, hold the frame of the CPU for about 5 to 10 seconds. You may use anti – static wrist band. Attach it to the frame of the CPU then wear it on your wrist. It is also needed for your safety.
  • Remove the connectors between CPU to the monitor or LCD and to the AVR.
  • After opening the CPU, unplug all the connectors safely inside it. After unplugging, unscrew all the screws inside of it including all the items or things inside of it including POWER SUPPLY, FLOPPY DISK, HARD DISK, RANDOM ACCESS MEMORY (RAM), HEAT SINK AND COOLING FAN, VIDEO CARD, PROCESSOR and the MOTHERBOARD.
  • We must be sure that we hold and keep every little thing that we remove from the CPU. Hold and put it in a place safely to avoid damages.

Assembling:


  • Clean all the necessary parts of the frame of the CPU for it to be clean. And of course, you do need to clean too all the items that you remove on it. Be sure you use the proper cleaning utensils for it to avoid any damages.
  • Put the items on its proper places.
  • Connect all the connectors in their respective places.
  • Screw all the parts that are needed to be screwed.
  • Connect it to the computer and open the PC.

Note:

If the PC won’t work, there are wires/connectors that are not in their proper places. Check the CPU and fix it again.

No comments:

Post a Comment