Basic Concepts of It-1
Basic Concepts of It-1
BASIC CONCEPTS OF IT
DEFINE THE TERM COMPUTER.
USES OF COMPUTERS
RESTRICTED
1-1
RESTRICTED
COMPONENTS OF A COMPUTER
Computer hardware components include input devices, output devices, a system unit,
storage devices, and communications devices.
RESTRICTED
1-2
RESTRICTED
System Unit
CD ROM drive
Keyboard
Mouse
a. An input device is any hardware component that allows a user to enter data
and instructions into a computer. Six commonly used input devices are the keyboard,
mouse, microphone, scanner, digital camera, and PC camera.
b. An output device is any hardware component that can convey information to
a user. Three commonly used output devices are a printer, a monitor, and speakers.
c. The system unit is a box-like case made from metal or plastic that protects
the internal electronic components of the computer from damage. The system unit
contains the central processing unit and memory. The central processing unit
(CPU) is the electronic device that interprets and carries out the basic instructions
that operate the computer. Memory is a temporary holding place for data and
instructions.
d. A storage device records and retrieves data to and from a storage medium.
Six common storage devices are a floppy disk drive, a Zip ® drive, a hard disk drive, a
CD-ROM drive, a CD-RW drive, a DVD-ROM drive, and a DVD+RW drive.
e. A communications device enables computer users to communicate and
exchange items such as data, instructions, and information with another computer. A
modem is a communications device that enables computers to communicate usually
via telephone lines or cable.
COMPONENTS IN DETAILS
RESTRICTED
1-3
RESTRICTED
n. Com Port - A serial Communications Port. Usually COM1 and COM2 (for
external modems)
o. Serial Port - Round ports on the computer used to connect the computer to
external devices. (Mouse and keyboard)
In addition to the basic Mouse, Monitor, Keyboard and Central Processing Unit, a peripheral
device is any additional device that is connected to the computer. Some examples are
printers, external speakers, joysticks, microphones, modems, network cards, scanners and
digital cameras. The peripheral devices will often require special software to be installed
called, “drivers.” They are usually included with the purchased peripheral device.
RESTRICTED
1-6
RESTRICTED
b. Software is the series of instructions that tells the hardware how to perform
tasks. For instance, when you type in words via the keyboard, the software is
responsible for displaying the correct Letters, in the correct place on the screen.
Know the meaning of the terms, operating systems software and application
software
There are two categories of computer software: system software and application software.
RESTRICTED
1-7
RESTRICTED
EXPLAIN HOW THE CPU USES THE FOUR STEPS OF A MACHINE CYCLE TO PROCESS
DATA
The central processing unit (CPU), also called a processor, significantly impacts overall
computing power and manages most of a computer’s operations. The CPU contains the
control unit and the arithmetic/logic unit.
a. The control unit directs and coordinates most of the operations in the
computer. For every instruction, the control unit repeats a set of four basic
operations called the machine cycle:
b. The arithmetic/logic unit (ALU) performs the execution part of the machine
cycle. Specifically, the ALU carries out three operations:
RESTRICTED
1-8
RESTRICTED
MEMORY
TYPES OF MEMORY
(3) Temporary storage of data items that have been input from the
keyboard or other input device until when instructions call for the data to be
transferred into the CPU for processing.
RESTRICTED
1-9
RESTRICTED
Computer memory is measured in terms of Binary digits (BITS), which are the lowest units of
measurement. To make a single character in a computer, a group of up to eight bits will be
needed. Therefore, one character is equivalent to eight bits. And eight bits are equivalent to
one byte.
Know the definitions of INTERNET, LAN, WAN, WWW, INTRANET, EXTRANET and
the advantages of group working and sharing of resources over the network.
a. A COMPUTER NETWORK
This is an interconnection of two or more computers that allows the sharing of
information and other resources.
b. W.W.W (World Wide Web)
The www is a collection of websites or documents which allows computer users to
locate and view multi-media documents i.e. documents with text, graphics,
animations, audios and videos on almost any subject.
c. INTERNET
RESTRICTED
1-10
RESTRICTED
(1) Computer
(2) Web Browser (i.e., Opera, Internet Explorer, Fire Fox)
(3) Modem
(5) Cables
f. INTRANET
A privately maintained computer network that can be accessed only by authorized
persons, especially members or employees of the organization that owns it.
g. EXTRANET
h. WORKGROUP COMPUTING
The idea of a workgroup is that groups of people working together can share their
resources with each other. People within the workgroup can share information on the
hard disks as well as sharing printers, modems and scanners. Many programs are
also designed to be used within workgroup templates. For instance your organization
might want to use a standard header sheet, If template for this header sheet is held
on a single computer but available to the other entire computer, then this has the
advantage that when you need to make a change to the header you only have to
change one file, rather than change the files on each.
UNDERSTAND THE TERMS PSDN, SATELLITES, FAX, TELEX, and MODEM AND BAUD
(measured in bps – bits per second)
a. PSDN-(Public switched data network) is simply the technical name for the
telephone system in use today.
RESTRICTED
1-11
RESTRICTED
c. Fax- a fax machine allows you to transmit printed material over the telephone
system. The sending fax machine scans the page and converts the information into
sound. The receiving fax converts the sound back into an image of the page for
printing.
d. Telex – Telex is an old system used for sending typed messages via the telex
network, which has largely been replaced by the fax and email system.
f. Baud rate – The baud rate tells you how fast a modem can send/receive
data. Most modern modems have a maximum baud rate of 56kilbits per second
(Kb/sec)
COMPUTER VIRUSES
COMMON VIRUSES
a. TROJAN - Is a virus that hides itself inside another legitimate program. When
the program is used, the virus is released and can begin its work of replication and
annoyance or damage.
b. TIME BOMB - Is a virus which lies dormant until a certain date or time or for a
period of time. At this date or time, the virus suddenly becomes active and carries
out whatever task it is programmed to do. This can include the deletion of everything
on the hard drive.
RESTRICTED
1-12
RESTRICTED
SOURCES OF VIRUSES
b. computer viruses originates from programmers who creates them and send
them through the Internet to other large organizations then they program an anti-
virus for the same virus and then sell the anti-virus to the organizations with the aim
of making money.
a. Anti-virus software scans files for pieces of code, called signatures, which it
recognizes as part of a virus. A signature is a distinctive series of commands which
are only found in the virus concerned. Scanning therefore involves analyzing
programming code in search of signatures embedded in legitimate programs.
b. Updating anti-virus software mostly involves updating the signatures file. This
should be done on as frequent as basis as possible. This is even more the case when
you receive files regularly from outside sources. The actual anti-virus program itself
will be updated from time to time. These updates will include additional features and
improved methods of scanning.
RESTRICTED
1-13
RESTRICTED
a. Install good anti-virus software and update it on a regular basis, for example
at least once a month but preferably once a week. But always remember, anti-virus
software is not perfect. It cannot be the only measure you take.
b. Scan all diskettes before reading them.
c. Enable the auto-protection feature on the anti-virus software to scan emails.
d. Be wary of emails from unknown sources, particularly if they contain
attachments. Some very careful users delete emails they are unsure of without
opening them.
e. Use an Internet Service Provider that scans emails before delivery.
f. Do not download software from unknown Internet sites.
g. Be careful of using diskettes from unknown sources.
h. Do not install pirated software.
Disinfecting’ Files - When a virus is detected, the software will attempt to remove the
virus. This is called cleaning or disinfecting. Disinfecting involves removing the code of
the virus from the file it is attached to. It sometimes happens that the system can detect the
virus but not get rid of it. In this case, you will usually be given the option of deleting or
quarantining the infected file. When a file is quarantined, it is made unusable and so
unable to spread the virus. A future update of the software may be able to remove the virus.
If it can the quarantine is removed.
Disks
a. Remember to never place your disks near a magnetic field. It can actually
erase your files.
b. Keep your disks away from direct sunlight or intense heat from being left in a
hot vehicle.
c. Always back up or make a copy of your very old disks in case they physically
wear out over time.
d. Remember that floppy disks are only temporary storage, so make sure you
have an extra copy of an important file.
e. CDR (Recordable Compact Disk) is the best way to save many files other than
your hard drive.
Computer
RESTRICTED
1-14
RESTRICTED
a. When you purchase a computer, make sure you get a high quality, grounded
power strip that will offer you surge protection.
Monitor
Keep your monitor screen clean with a soft cloth or use a product specially designed
to clean a monitor. Always turn off the monitor prior to cleaning and do not use any
detergents or chemicals.
Keyboard
You may use a soft cloth dampened with rubbing alcohol to clean your keyboard. Try
to refrain from eating food while using your computer, since small pieces could
become lodged in the keyboard.
a. Make sure that cables are safely secured; you should always use the
power cables that were supplied with your computer or cables of similar quality.
Make sure that the cables are safely secured at the back of the desk and that you
have power points located near the desk.
d. Glare from screens, you should take regular breaks to avoid constantly
staring at the screen and straining your eyes.
e. Bad posture, when sitting at your computer you should have a monitor at
eye level that can be adjusted to suit you.
RESTRICTED
1-15
RESTRICTED
a. The primary mouse button is typically the left mouse button and the
secondary mouse button is typically the right mouse button. This can be reversed for
left-handed individuals through the control panel.
b. Point means you move the mouse across a flat surface until the mouse
pointer rests on the item of choice on the desktop.
c. Click means you press and release the primary mouse button. You must point
to an item before you click.
d. Right-click means you press and release the secondary mouse button. You
will point to an object on the screen prior to right-clicking. Whenever you right-click
an object, a context-sensitive, or shortcut, menu will display. The use of shortcut
menus speeds up your work and adds flexibility to your interface with the computer
e. Double-click means you quickly press and release the primary mouse button
twice without moving the mouse. You must point to an item before you double-click.
If you have problems double-clicking, click once on the item (it should be highlighted)
now pressing the Enter button. This will accomplish a double-click.
f. Drag means you point to an item, hold down the primary mouse, move the
item to the desired location on the screen, and then release the mouse button. You
can move any open window to another location on the desktop by pointing to the title
bar of the window and dragging the window.
g. Right-drag means you point to an item, hold down the secondary (right)
mouse button, move the item to the desired location, and then release the mouse
button. It will usually prompt you for the next step such as “move or copy object
Here”.
d. Home - This will take you to the beginning of the current line.
e. Ctrl + Home - This will take you to the beginning of your document, page or
section.
RESTRICTED
1-16
RESTRICTED
f. Tab - This will take you to the next field (or cell) to the right
g. Shift + Tab - This will take you back to the previous field (or cell ) to the left
h. End -This will take you to the end of the current line.
j. Ctrl + End - This will take you to the end of the document, page or section.
t. Ctrl + Alt+ Delete -This is a way to log-off, shut down or access your task
manager
u. Alt +F4 key - Use these two keystrokes to exit a frozen program
RESTRICTED
1-17