Transcript Document
Understanding
Essential Computer
Concepts
Microsoft Office 2013
Illustrated Fundamentals
Concepts Lecture
A computer is an electronic device that:
Accepts input
Processes data
Stores data
Produces output
2
A computer system is made up of:
Hardware—the physical components
Software—the programs or instructions
3
Various sizes and shapes
Perform the 4 basic functions
4
Personal Computers
Hand-held Computers
Mainframe Computers
Supercomputers
5
Personal Computers
Single-user
Desktops
Laptops or Notebook
Tablet
Subnotebook
Slate
6
Hand-held Computers
Small, fit in the palm of the hand
Usually limited capabilities and processing power
Smartphones
MP3 players
Some e-readers
7
Mainframe Computers
Found in medium to large businesses or
government agencies
Centralized storage and processing
Handles large amounts of data
Accommodates many users
8
Supercomputers
Found in very large businesses or government
agencies
Tremendous processing power
Might be used in research to perform simulations or
make predictions
9
Processing
Modify data to produce information.
Performed by electronic components on the
motherboard.
Directed by Central Processing Unit (CPU).
Controlled by programs (instructions).
Peripherals
Provide input, output, and storage functions.
10
Input devices
Converts user data or commands to a format the
electronic components of a computer can
understand.
Examples: Keyboard, mouse, microphone
Output devices
Coverts data or information from a format the
computer understands to a format the user can
understand.
Examples: Monitor, printer, speakers
11
Storage
Temporary storage: where data and programs are
stored while they are in use. Also called memory,
primary storage, or RAM.
Secondary storage: where data and programs are
permanently stored while not in use. Includes hard
drives, USB drives, and CD drives.
Since data is only stored temporarily while in use, it’s
important to save your work periodically to
secondary storage.
12
Patterns of zeroes and ones (electric signals “off”
or “on”).
Can be stored temporarily (RAM) or permanently
(hard drive, USB drive, etc…).
When stored on permanent devices, organized in
files.
File management: organization of files.
13
Each storage option has benefits / drawbacks
Temporary storage: Very fast for processing but is
erased when the power is turned off.
Permanent storage: Slower than temporary but data
can be accessed repeatedly until erased by user.
▪ Hard drive is the most common permanent storage. Fast but
not portable.
▪ Removable devices provide portability but slower than most
hard drives.
14
Data and programs stored as files
A file is a collection of bits (binary digits)
1 (“on”) and 0 (“off”) are referred to as bits.
Eight bits = one byte.
▪ Smallest recognizable unit; represents a unique character
Kilobyte (KB) is about one thousand bytes
Megabyte (MB) is about one million bytes
Gigabyte (GB), is about one billion bytes
Terabyte (GB), is about one trillion bytes
15
Step-by-step instructions that tell the computer
hardware how to accomplish the task.
Can refer to a single program or a package.
Three basic types of software
System software helps the computer carry out its
basic operating tasks.
Application software helps the user carry out a
variety of tasks.
Security software helps protect the computer and
data from malicious attacks.
16
Many programs that carry out basic computing
functions:
Getting input
Processing data
Storing data
Producing output
Vital part of the “computer system”
Four categories: Operating system, device
drivers, utilities, and programming languages.
17
Operating System
Manages the computer’s resources
Load data and instructions into memory
Save data to permanent storage
Coordinate use of resources
Provide a user interface
Many more functions
18
Device Drivers
Coordinates communication between the computer
and peripherals
Usually provided by the manufacturer
Utilities
Perform specific tasks
Reduce burden on operating system
Programming Languages
Allow people to write instructions (programs) for the
computer to follow
19
Depends on the type of computer
Three main operating systems for personal
computers: Windows, MAC OS (Apple
computers), and Linux
New computers typically have OS already
installed
Hand-held computers usually have a mobile
version of an OS or one designed specifically for
the device
20
Application software enables you to perform specific
tasks. Application software for PCs include:
Document production software
Spreadsheet software
Database management software
Graphics and presentation software
Note: Today’s smartphones have thousands of “apps” that
perform specific functions.
21
Document production software includes word processing,
desktop publishing, and Web authoring software that assist you in
writing and formatting documents. Often has grammar and spellchecking, thesaurus, search and replace, and template features.22
With spreadsheet software, you can create formulas that
perform calculations. Spreadsheet software creates worksheets
23
with columns and rows.
Database management software creates structured databases
to store, sort, and retrieve information.
24
Graphics and presentation software allow you to create
illustrations, diagrams, and slide shows.
25
Transmit data…
from one computer to another
▪ Via cables, telephone, or wireless
from the computer to a peripheral device
▪ Via ports and cables connected to computer
▪ Expansion cards allow you to add more ports and thus more
communication capabilities or functionality.
from one component of the computer to another
▪ Via the data bus
26
Networks connect computers and computer
devices so that data and resources can be shared.
Require special hardware and software
Network Interface Card (NIC)
Network software
Types of Networks
LAN (local area network)
WAN (wide area network)
PAN (personal area network)
Wireless
27
Networks can be found in many places
Home
Share printer or files, Internet access, play games
Work
Share hardware, files, and Internet access
Access special software
School
Access to hardware, Internet, special programs
28
Accessing a network account
Typically requires a username and password
Account permissions determine what devices or drives
can be accessed.
Example:
▪ School network gives access to network storage drives and
classroom printers.
▪ Home network gives access to different storage drives and
devices.
29
Malware is software that is designed to cause
harm to your data or computer or transfer
personal information without your
knowledge or permission.
▪ Examples: Viruses, Trojans, Worms, Spyware, Rogue
software
Transferred to your computer via
▪
▪
▪
▪
E-mails and attachments
Files transferred on disk
Installing software
Surfing the web
30
Antivirus software
Detects, disables and/or removes most viruses,
trojans, and worms
Anti-spyware software
Detects and removes programs used to track
surfing habits or transmit personal information
Firewall
Blocks access to your computer without your
permission
Hardware or software solution
31
Phishing involves two phases
Spoofing
▪ The creation of a “fake” web site designed to look like
the site of a legitimate business.
▪ The “fake” site is actually designed to steal personal
information.
Phishing
▪ The process of sending an e-mail containing a link to a
spoofed site to unsuspecting people.
▪ The intention is to steal personal information.
32
Be wary!
▪ Most legitimate businesses will not send you an e-mail
asking for personal information.
▪ If the e-mail seems strange, it probably is not legitimate.
If you are not sure, look up the company phone number
(don’t use one from the e-mail) and give them a call.
▪ Look for spelling and grammar errors.
▪ Point (DON’T CLICK) to the link contained in the e-mail.
The URL of the link will be displayed in the status bar. In
many cases the URL will be very different than the
actual business URL.
33
34
www.howstuffworks.com
Many great articles on computer hardware and software
www.microsoft.com
Lots of help and how-to articles, videos, and training
exercises for Windows and Office
www.microsoft.com/protect
Tons of undated information on protection your computer
and your family online
www.google.com (or any search engine)
Type in search words to find exactly what you are looking for
35
Link to video about rogue software
Info about protecting family online
MS Security YouTube channel
36