Transcript Document

Understanding
Essential Computer
Concepts
Microsoft Office 2013
Illustrated Fundamentals
Concepts Lecture
A computer is an electronic device that:




Accepts input
Processes data
Stores data
Produces output
2
A computer system is made up of:


Hardware—the physical components
Software—the programs or instructions
3


Various sizes and shapes
Perform the 4 basic functions
4




Personal Computers
Hand-held Computers
Mainframe Computers
Supercomputers
5

Personal Computers
 Single-user
 Desktops
 Laptops or Notebook
 Tablet
 Subnotebook
 Slate
6

Hand-held Computers
 Small, fit in the palm of the hand
 Usually limited capabilities and processing power
 Smartphones
 MP3 players
 Some e-readers
7

Mainframe Computers
 Found in medium to large businesses or
government agencies
 Centralized storage and processing
 Handles large amounts of data
 Accommodates many users
8

Supercomputers
 Found in very large businesses or government
agencies
 Tremendous processing power
 Might be used in research to perform simulations or
make predictions
9

Processing
 Modify data to produce information.
 Performed by electronic components on the
motherboard.
 Directed by Central Processing Unit (CPU).
 Controlled by programs (instructions).

Peripherals
 Provide input, output, and storage functions.
10

Input devices
 Converts user data or commands to a format the
electronic components of a computer can
understand.
 Examples: Keyboard, mouse, microphone

Output devices
 Coverts data or information from a format the
computer understands to a format the user can
understand.
 Examples: Monitor, printer, speakers
11

Storage
 Temporary storage: where data and programs are
stored while they are in use. Also called memory,
primary storage, or RAM.
 Secondary storage: where data and programs are
permanently stored while not in use. Includes hard
drives, USB drives, and CD drives.
 Since data is only stored temporarily while in use, it’s
important to save your work periodically to
secondary storage.
12




Patterns of zeroes and ones (electric signals “off”
or “on”).
Can be stored temporarily (RAM) or permanently
(hard drive, USB drive, etc…).
When stored on permanent devices, organized in
files.
File management: organization of files.
13

Each storage option has benefits / drawbacks
 Temporary storage: Very fast for processing but is
erased when the power is turned off.
 Permanent storage: Slower than temporary but data
can be accessed repeatedly until erased by user.
▪ Hard drive is the most common permanent storage. Fast but
not portable.
▪ Removable devices provide portability but slower than most
hard drives.
14


Data and programs stored as files
A file is a collection of bits (binary digits)
 1 (“on”) and 0 (“off”) are referred to as bits.
 Eight bits = one byte.
▪ Smallest recognizable unit; represents a unique character
 Kilobyte (KB) is about one thousand bytes
 Megabyte (MB) is about one million bytes
 Gigabyte (GB), is about one billion bytes
 Terabyte (GB), is about one trillion bytes
15
Step-by-step instructions that tell the computer
hardware how to accomplish the task.
 Can refer to a single program or a package.
 Three basic types of software

 System software helps the computer carry out its
basic operating tasks.
 Application software helps the user carry out a
variety of tasks.
 Security software helps protect the computer and
data from malicious attacks.
16

Many programs that carry out basic computing
functions:
 Getting input
 Processing data
 Storing data
 Producing output


Vital part of the “computer system”
Four categories: Operating system, device
drivers, utilities, and programming languages.
17

Operating System
 Manages the computer’s resources
 Load data and instructions into memory
 Save data to permanent storage
 Coordinate use of resources
 Provide a user interface
 Many more functions
18

Device Drivers
 Coordinates communication between the computer
and peripherals
 Usually provided by the manufacturer

Utilities
 Perform specific tasks
 Reduce burden on operating system

Programming Languages
 Allow people to write instructions (programs) for the
computer to follow
19




Depends on the type of computer
Three main operating systems for personal
computers: Windows, MAC OS (Apple
computers), and Linux
New computers typically have OS already
installed
Hand-held computers usually have a mobile
version of an OS or one designed specifically for
the device
20
Application software enables you to perform specific
tasks. Application software for PCs include:




Document production software
Spreadsheet software
Database management software
Graphics and presentation software
Note: Today’s smartphones have thousands of “apps” that
perform specific functions.
21

Document production software includes word processing,
desktop publishing, and Web authoring software that assist you in
writing and formatting documents. Often has grammar and spellchecking, thesaurus, search and replace, and template features.22

With spreadsheet software, you can create formulas that
perform calculations. Spreadsheet software creates worksheets
23
with columns and rows.

Database management software creates structured databases
to store, sort, and retrieve information.
24

Graphics and presentation software allow you to create
illustrations, diagrams, and slide shows.
25

Transmit data…
 from one computer to another
▪ Via cables, telephone, or wireless
 from the computer to a peripheral device
▪ Via ports and cables connected to computer
▪ Expansion cards allow you to add more ports and thus more
communication capabilities or functionality.
 from one component of the computer to another
▪ Via the data bus
26


Networks connect computers and computer
devices so that data and resources can be shared.
Require special hardware and software
 Network Interface Card (NIC)
 Network software

Types of Networks
 LAN (local area network)
 WAN (wide area network)
 PAN (personal area network)
 Wireless
27


Networks can be found in many places
Home
 Share printer or files, Internet access, play games

Work
 Share hardware, files, and Internet access
 Access special software

School
 Access to hardware, Internet, special programs
28

Accessing a network account
 Typically requires a username and password
 Account permissions determine what devices or drives
can be accessed.
 Example:
▪ School network gives access to network storage drives and
classroom printers.
▪ Home network gives access to different storage drives and
devices.
29

Malware is software that is designed to cause
harm to your data or computer or transfer
personal information without your
knowledge or permission.
▪ Examples: Viruses, Trojans, Worms, Spyware, Rogue
software

Transferred to your computer via
▪
▪
▪
▪
E-mails and attachments
Files transferred on disk
Installing software
Surfing the web
30

Antivirus software
 Detects, disables and/or removes most viruses,
trojans, and worms

Anti-spyware software
 Detects and removes programs used to track
surfing habits or transmit personal information

Firewall
 Blocks access to your computer without your
permission
 Hardware or software solution
31

Phishing involves two phases
 Spoofing
▪ The creation of a “fake” web site designed to look like
the site of a legitimate business.
▪ The “fake” site is actually designed to steal personal
information.
 Phishing
▪ The process of sending an e-mail containing a link to a
spoofed site to unsuspecting people.
▪ The intention is to steal personal information.
32

Be wary!
▪ Most legitimate businesses will not send you an e-mail
asking for personal information.
▪ If the e-mail seems strange, it probably is not legitimate.
If you are not sure, look up the company phone number
(don’t use one from the e-mail) and give them a call.
▪ Look for spelling and grammar errors.
▪ Point (DON’T CLICK) to the link contained in the e-mail.
The URL of the link will be displayed in the status bar. In
many cases the URL will be very different than the
actual business URL.
33
34
www.howstuffworks.com
Many great articles on computer hardware and software
www.microsoft.com
Lots of help and how-to articles, videos, and training
exercises for Windows and Office
www.microsoft.com/protect
Tons of undated information on protection your computer
and your family online
www.google.com (or any search engine)
Type in search words to find exactly what you are looking for
35



Link to video about rogue software
Info about protecting family online
MS Security YouTube channel
36