Sunteți pe pagina 1din 10

HOLY CHILD JESUS COLLEGE

College Department

FUNDAMENTALS OF COMPUTER

In this Module, You will be able to learn and familiarize the ff:

COMPUTER DEFINITION, FUNCTIONS AND PARTS


BASIC ASSEMBLY AND DISASSEMBLY
CONNECTING OF PERIPHERALS
BE FAMILIAR TO THE TERMS AND USES
HOW DOES VIRUSES SPREAD AND START

1 Module I | FUNDAMENTALS OF COMPUTER


COMPUTER: an electronic device that can accept data, process these data
according to stored set of instruction and produce a meaningful result.

TWO TYPES OF RESULT


1. Hard copy- refers to the tangible result
2. Soft copy- refers to the intangible result

CAPABILITIES OF COMPUTER
1. The computer has the ability to perform arithmetic operations like addition,
subtraction, multiplication, etc.
2. The computer can also perform logical operations
3. The computer has the ability to store and retrieve information because it
has a storage called memory.
4. The computer has the ability to process information at a very high speed.
5. The computer can direct itself in predetermined manner without human
intervention.

LIMITATIONS OF COMPUTER
1. The computer does not think for you
2. The computer cannot correct inaccurate data
3. The computer is subject to breakdown

THE COMPUTER SYSTEM:

System – interrelated parts that works as one

1. LIVEWARE- literate user of the computer also called peopleware, brainware


or know ware
2. DATAWARE- input & output information. Data to be processed by the
liveware.
3. SOFTWARE – The intangible part of Computer set of instructions or
commands
4. HARDWARE – The tangible part of the computer or the machine itself.

FOUR FUNCTIONAL PARTS OF THE COMPUTER HARDWARE

2 Module I | FUNDAMENTALS OF COMPUTER


1. Input device – Translates human language to computer language
2. CPU – where all processing takes place – DESKTOP TYPE AND TOWER TYPE
3. Memory – Storage of the computer
Types of Memory
a) Read Only Memory (ROM) – it contains all the system programs that
are used for start-up operations of the program. When you boot a
computer, these system programs have already been built into the
hardware making it possible for you to use the computer.
b) Random Access Memory (RAM) – it stores data that can either be
read from (retrieved for use in processing) or written to (stored
data). It is the computer’s scratch pad.
4. Output Device – translates computer language to human language
Types of Monitor
a) CRT – CATHODE RAY TUBE
b) LCD – Liquid Crystal Display
c) LED – Light Emitting Diode

STORAGE MEDIA

1. MICRODISK – Commonly known as diskette 1.44 mb storage capacity


2. HARD DISK – Contains large amount of data.
Types of Hard disk
a) Internal Hard disk
b) External hard disk

3. OPTIC STORAGE MEDIA (CD)


Types of CD
a) CDR –Compact Disc Recordacle
b) CDCW – Compact Disc Rewritable
c) DVDR or DVDRW

4. FLASH disk – typically small, lightweight, removable and rewritable. USB


flash drives offer potential advantages over other portable storage devices ,
particularly the floppy disk. They are more compact, faster, hold more data
and are more reliable due to their lack of moving parts, and have a more
durable design.

3 Module I | FUNDAMENTALS OF COMPUTER


TERMS AND ABBREVIATIONS:

Universal Serial Bus (USB) – Use to connect for


transferring data from other device

LAN – Local Area Network – Use


to connect oa access one
computer another computer
within an area.

TYPES OF POWER REGULATOR

Automatic Voltage Regulator(AVR) – to


regulate or control the fluctuation of
electricity

Uninterrupted Power Supply (UPS) – to control


and regulate the fluctuation of electricity it can
stored electricity from 5-15 minutes.

CONNECTING OF PERIPHERAL

(SYSTEM UNIT FRONT PANEL)

4 Module I | FUNDAMENTALS OF COMPUTER


A. Optical Drive – Use to Insert CD or DVD
B. Floppy Disk Drive – Use to Insert Microdisk or Diskette
C. USB port- Use to insert USB type Gadget or Device Such as Flashdisk,
Cellphone, Digicam & etc.
D. Power Button – Long Press to Power Up The CPU
E. Card Slots – Use to insert or Connect Memory Card of Different
F. Hard Crive Activity LED – Light Signal
G. Front Ports Door – For Additional Devices or Drives

SYSTEM UNIT BACK PANEL

5 Module I | FUNDAMENTALS OF COMPUTER


1. EXHAUST FAN – use to minimize/reduce the heat inside the CPU
2. POWER SUPPLY – (Female Plug and Male Plug) Passage of the Electricity
3. PARALLEL PORT – use for the connection of old types of printer
4. LAN PORT – use to connect or access one computer to another computer
within the area
5. MODEM – internet connection through telephones lines.
6. Personal System 2 (PS2) PORT – use to connect the mouse and keyboard
7. SERIAL PORT - connection of old types of mouse
8. Video Graphic Array (VGA) PORT – use to connect display cable of monitor
9. USB Port – Use to connect USB Type gadget or Device such as flashdisk,
cellphone, digicam
10.AUDIO JACKS - Connection of Speakers, Headset, microphone
 Green – Speaker/Headset
 Blue – Secondary Speaker
 Pink – Microphone
TYPES OF SOFTWARE

1. System Software – it supervises the operation of the CPU, controls the


input/output functions of the computer system and provides various
support services. Ex. Windows, DOS, Linux
2. Application Software – the general terms for programs that perform
specific user-oriented tasks such a word processing, spreadsheet

6 Module I | FUNDAMENTALS OF COMPUTER


application, and programming. Ex. MS Word, MS Excel, Powerpoint, Adobe,
Games, Internet

Vital Information Resource Under Siege (VIRUS) – simply a computer program. It


is intentionally written so that it will spread by creating copies of itself and
attaching the copies to other files.

A self-replicating piece of code that can attach itself to files or programs and will
run without your wishes

Virus behaviour can range from annoying to destructive even relatively harmless
viruses still tend to cause some harm

Trojan Horse – often designed to cause damage or do something malicious


to a system, but are disguised as something useful.

Worms –are like viruses in that they do replicate themselves. However,


instead of spreading from file to file, they spread from computer to computer,
infecting an entire system.

How Is a Virus Spread?

a) Viruses enter your system via e-mail, downloads from the internet, infected
floppy disks, homemade CDs and ‘fun’ websites
b) Currently the preferred method of spreading computer viruses is e-mail
 Viruses arrive on a computer as an attachment
 when opened by the user, sends further copies of itself to everyone
in the user’s address book
c) In the case of infected CDs or floppy disks, the disk acts as a carrier
spreading the virus into each machine when it is placed into the drive .

Types of Computer Virus

A. Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard
drive, where the Master Boot Record (MBR) is stored. The Master Boot
Record (MBR) stores the disk's primary partition table and to store

7 Module I | FUNDAMENTALS OF COMPUTER


bootstrapping instructions which are executed after the computer's BIOS
passes execution to machine code. If a computer is infected with Boot
Sector Virus, when the computer is turned on, the virus launches
immediately and is loaded into memory, enabling it to control the
computer.
B. File Deleting Viruses: A File Deleting Virus is designed to delete critical files
which are the part of Operating System or data files.
C. Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS
outlook for e-mail addresses which are stored in the address book and
replicate by e-mailing themselves to the addresses stored in the address
book of the e-mail program.
D. Macro viruses: Macro viruses are written by using the Macro programming
languages like VBA, which is a feature of MS office package. A macro is a
way to automate and simplify a task that you perform repeatedly in MS
office suit (MS Excel, MS word etc). These macros are usually stored as part
of the document or spreadsheet and can travel to other systems when
these files are transferred to another computers.
E. Polymorphic Viruses: Polymorphic Viruses have the capability to change
their appearance and change their code every time they infect a different
system. This helps the Polymorphic Viruses to hide from anti-virus
software.
F. Armored Viruses: Armored Viruses are type of viruses that are designed
and written to make itself difficult to detect or analyze. An Armored Virus
may also have the ability to protect itself from antivirus programs, making
it more difficult to disinfect.

A. Stealth viruses: Stealth viruses have the capability to hide from operating
system or anti-virus software by making changes to file sizes or directory
structure. Stealth viruses are anti-heuristic nature which helps them to hide
from heuristic detection.
B. Retrovirus: Retrovirus is another type virus which tries to attack and
disable the anti-virus application running on the computer. A retrovirus can
be considered anti-antivirus. Some Retroviruses attack the anti-virus
application and stop it from running or some other destroys the virus
definition database.
C. Multiple Characteristic viruses: Multiple Characteristic viruses has different
characteristics of viruses and have different capabilities.

8 Module I | FUNDAMENTALS OF COMPUTER


Some of the common virus activities are as follows:

A. The computer may not boot


B. The window may crash
C. Data may automatically delete.
D. The size & format of the file may change
E. The computer becomes slow
F. Computer perform wrong data & instructions

How to save computer from Viruses:

A. Computer must be kept in safe & clean place with optimum temperature
B. Floppy disk or pen drive must be carefully used.
C. A strong antivirus must be installed & update regularly using internet.
D. Don't use others pen drive until you are sure that there is no virus.

Why do I need Anti-virus Software?

A. There are thousands of viruses that will damage your documents,


applications and operating system
B. Some viruses are capable of completely erasing all data on a hard disc
C. Antivirus software is now a vital piece of software needed to maintain your
computer system effectively, protecting your files and storage devices from
damage .

There are many antiviruses like Avira, Norton, Kaspersky, K7, Panda, Avast,
etc.
(Their way of usage is different according to different version &
product. So we go on practically. )

List of Viruses

Abrahams Bro_act
Acid

9 Module I | FUNDAMENTALS OF COMPUTER


Brain – 1st considered computer virus Little Girl
for PC New Sunday
Christmas Tree Payday
Cinderella Pingpong
Death Elk cloner
Diablo Friday 13th

10 Module I | FUNDAMENTALS OF COMPUTER

S-ar putea să vă placă și