Sunteți pe pagina 1din 17

BASIC COMPONENTS OF A COMPUTER SYSTEM 1. Hardware 2. Software 3.

Peopleware If you use a piano as an analogy, the piano can be thought of as the hardware and the roll of music as the software. The software is a series of very simple computer instructions carefully organized to complete complex tasks. These instructions are written in programming languages to help simplify the development of applications. The hardware is what sits on your desk or table and executes the software instructions. The piano player is useless unless the roll of music has been written correctly. The piano player is the peopleware. 1. HARDWARE COMPONENTS C. Learning Objectives: 1. Know the different components of a Computer System 2. Explain the function of each components 3. Identify the input, output and storage devices 4. Identify the systems unit 5. Correctly reconnect PC peripherals to a system unit 6. Issue commands to a computer via an input device 7. Saves data to an auxiliary storage devices

Hardware refers to the tangible (things you can hold or touch) components of a computer system. It is further divided into 4 groups, namely: 1. Input Devices 2. Output Devices 3. System Unit 4. Storage Devices A. Input Devices -- "How to tell it what to do" The input devices has two most basic computing tasks: data entry (entering data into a computer memory) and issuing commands (tell the processor how to work with the data) 1. Keyboard. The keyboard is the standard input device of most computers. It was patterned after the typewriter. A typical PC keyboard we use is the QWERTY.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

16

Aside from the keys similar to an electronic calculator and the typewriter, other keys were added such as the Esc key, function keys, return or enter key and the cursor keys. The escape Esc key is usually located in the upper-left corner of the keyboard. It is generally used to stop a task in progress or to exit from an application. The Function keys (F1, F2...F12) share the same row with Esc key. Depending on the program, these keys are used to perform specific commands or instructions. The Return or Enter key is used to move down one line. It is also used to indicate the end of a command or instructions issued on a computer. The Cursor keys can be used to move the cursor depending on its direction (left and right one character at a time, or up and down one line at a time). These 4 keys are represented as arrows pointing in 4 directions. Depending on some programs, these keys can have other results if used in combination with Ctrl or Alt keys. The backspace is used to delete character to the left. The spacebar (longest key) is used to generate spaces. 2. Mouse. The mouse is a hand-clicked device used for pointing. Modern mouse has either ball or optic light for movement and has two to three buttons. 3. Trackball. The trackball is like a stationary, upside down mouse. Because it does not move, user can touch and roll the ball to get a similar movement of the cursor as the mouse. 4. Touchpad. The Touchpad is usually included in laptops. As a pointing device, it can be tapped and the user can move his/her finger to get a similar movement of the cursor as the mouse. 5. Joystick. The joystick is an input device commonly used for computer games. It allows for sudden movement in all directions. 6. Light Pen. The light pen is used to draw, write or issue commands when it touches a specially design screen. 7. Digital Camera. Cameras are still images and video digitizers. Photographs and moving video can be easily transferred to computers using camera as the video input device. 8. Scanners. Scanners are text and graphic input devices. Scanners come in 2 forms: flatbed and hand-held. A flatbed scanner is ideal in copying materials printed on a flat surface. A hand-held scanner is used to capture images on materials which are not flat. Scanners which use a process called optical character recognition (OCR) can copy textbooks to avoid the tedious work of typing.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

17

B. Output Devices -- "How it shows you what it is doing" After processing the data fed into the computer with the use of input devices, the information must now be outputted into a form that can be understood by human beings. For this purpose, computer system components called the output devices are used. Types of Output Devices Output devices are classified according to the output they can produce. An output which you can hold on paper is called the hard copy. Once an output is printed on a hard copy, changes cannot be made without reprinting. The most common and widely used device to produce a hard copy is the printer. On the other hand, output types such as audio, video and information displayed on the screen are referred to as soft copy. Soft copy can be easily modified by the computer. The most common soft copy device is the screen monitor. 1. Printer. Printer provides hard copy outputs on paper. Impact printer (dot matrix) produces output by using a mechanism that presses against an inked ribbon on paper. Non-impact printers like photo printer, ink jet and bubble jet printers spray colored inks on paper; laser printer uses photocopier-like process to transfer ink on paper; plotter uses large ink tanks and make use of electrostatic charges in creating its output is use to print on large paper and tarpaulin. 2. Video monitors or monitor screen. Screen is used to provide soft copy output. It can be monochrome (black & white) or colored (can show a variety of colors). It can be bulky such as the Cathode Ray Tube (CRT) or the anti-glaring one such as the Liquid Crystal Display (LCD) which you can withstand over long hours of work. 3. Speakers. Speakers are used for video output such as beeps, human voice and music. C. System Unit "Process the data brought in" The system unit is the part of computer which is responsible for accepting and processing the data brought in by the input devices. It is also responsible for passing the result of the processing function (information) to the users via output devices. 1. The Main Circuit Board. Usually called the motherboard, all components are either mounted or connected to it. This is where the computers primary electronic circuitry resides. It contains a number of electronic components that are essential in the processing and storage operations in some of the routing and control operations. 2. Ports. A port is a connection from the main circuit board to a peripheral device such as the keyboard, printer and monitor. The peripheral is connected to the port by a special cable. The port is also called an interface- where two of different aspects of the computer system meet to pass data back and forth. 3. Expansion Slots. Expansion slots are the long plug-in strips in the main circuit board. They are used to connect expansion cards to the main circuit board. Aside from the video card, expansion cards are also used to connect the following devices: : Disk drives : Scanners : External CD-ROM : Modems : Audio card

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

18

3. The Bus. The bus is responsible to transporting electronic signals from place to place on specific predefined routes. The main circuit boards bus is an electronic pathway between various computer components. 4. The Central Processing Unit. The central processing unit or the CPU is the computers processing, control and internal storage circuitry. It is an integrated circuit (IC) chip containing the electronic circuitry that controls the interpretation and execution of instructions. The most critical components in the CPU are the arithmetic logic unit (ALU) and the control unit (CU). a. Control Unit (CU) is the part of the CPU that directs the step-by-step operation of the computer. It is in-charge of obtaining and processing instructions. The CU directs electrical impulses between itself, the ALU and the main memory (ROM & RAM). b. Arithmetic Logic Unit (ALU)- is capable of performing arithmetic (add, subtract, divide, multiply) and logical operations (greater than, less than, equal to). The ALU is responsible for making comparisons for the CU in order to determine whether processing operations are mathematical and logical. 5. Memory. The memory works hand in hand with the CPU. Memory is the general term used to describe whether the computer holds data and instruction before and after they are processed. Its job is to store instructions and data in the computer. Classifications: 1. Read-Only Memory (ROM), where permanent instructions are stored. RAM is preprogrammed that can only be read by the computer, and cannot be altered or changed. These permanent instructions are used to start or boot a computer. RAM keeps data even when the computer is off. 2. Random Access Memory (RAM), where data and instructions are temporarily stored. RAM is the computers working memory and is directly controlled by the processor. Together with the CU and ALU, RAM is the third component of the CPU. RAM (in the form of number of ICs electronically connected) is called the main memory, main storage, internal storage or primary storage. RAM is a volatile memory. It means that data are easily replaced by new instructions and data. When the power in the computer goes off, all contents in the RAM are lost. For this reason, auxiliary (secondary) storage is important. 6. Cache. Cache memory as the most technologically advanced, is a place to keep something safe. It is a special set of very fast RAM chips used to store data that the CPU most frequently receives from RAM. D. Storage Devices -- "How it saves data and programs" Let us say, you finished typing a 100-page newsletter. Where are you going to save your work? You cant use ROM because it is read only. You cant use RAM either because it is not safe. In this case, you need an auxiliary or secondary storage device. Secondary storage is permanent storage that supplements primary storage or RAM. Secondary storage is non-volatile. Your work is safe even after the computer is turned off. Common to our use is the Direct- Access Storage Devices (DASDs). They are magnetic disk drives that make use of moving read/write head that scans the magnetic surface of the disk. 1. Floppy Disk. The common size of floppy disk is the 3.5 inch with a capacity of 1,440,000 characters (1.44Mb). It is likely a round sheet of mylar enclosed in a protective coating.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

19

2. Hard Disk. Hard disks can store many times more information that floppy diskettes. They are made of solid, hard material and permanently contained in drive enclosures and not permanently removed since it is often attached inside the computer. An actual hard disk may consist of multiple disks called platters, all mounted in a rotating central axle. The computer treats all platters as one storage device. Aside from storing large amount of information, operating system and applications are installed and run much faster than a floppy. 3. CD-ROM. A CD-ROM drive is a high capacity storage device which lets you read data from the disk, but not write data back. Its an optical disk that approximately holds 650 Mb, equivalent to 452 pieces of 1.44 Mb floppy disks. Flash drive or thumb drive are electrically erasable programmable read-only memory (EEPROM) and comes handy for day to day use. When removing/detaching your flash memory to the Universal Serial Bus (USB) drive, be sure to safely remove the flash memory first.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

20

2. SOFTWARE COMPONENTS D. Learning Objectives: 1. Know the different components of a Computer System 2. Know the different types of software 3. Learn to manage and use an operating system software 4. Use application software for a particular kind of job 5. Learn about software piracy 6. Run utilities to protect your system against threats

Software is the second component of the computer system. This refers to a set of instructions (codes) which the computers understand and execute. This set of instructions is also called program. Without software, a computer would be a useless collection of computer circuitry. Types of SOFTWARE a. Operating System Software b. Application Software c. Programming Languages a. Operating System Software Operating System (OS) software provides a "user interface" for users to manage files, start programs, customize computer settings, and other tasks. The operating system also provides the fundamental core computer functionality for programmers. Intel based PCs use Microsoft Windows XP or Windows Vista as the operating system. Mac PCs use the Macintosh operating system. Free and open source software (FOSS) like the Linux OS which comes in several distribution packages can be installed in Intel based or Mac based PCs.

Windows 7 Operating System b. Applications Software


COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

21

Application software uses the operating system software and provides the real functionality of a computer. Major application categories include: 1. Word Processors (Word, Writer, WordPerfect, Word Pro...) Word Processing program is designed primarily to edit text. The current crop of word processors however, actually has capabilities that reach far beyond simple text editing functions. Essentially, word processing programs allow you to do the following to text: o Easily correct errors o Make additions and deletions o Check spelling and grammar o Change the order of paragraphs A word processor can do all these without the need to manually retype an entire document. Word processor is a timesaver for people and organizations as they make letters, manuals, book and reports regularly.

MS Word- a word processing program 2. Spreadsheets (Excel, Calc, Lotus 1-2-3, Quattro Pro...) Spreadsheets are primarily designed for maintaining numerical tables and calculating formulas using the figures entered into the spreadsheet. Like word processing programs, spreadsheets are major timesavers, calculating results rapidly on even the most complex spreadsheet setup and formulas.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

22

MS Excel-an electronic spreadsheet 3. Presentation (PowerPoint, Impress, Freelance Graphics, Persuasion...) Presentation programs organize text and graphics (drawing and pictures) into several pages called slides, for viewing. Transition and animation effects can be incorporated to add spice to the slides. Audio as well as movie files can also be added.

4. Databases (Access, dBase, Approach, Fox Pro, Clipper, Paradox...) A database program store huge quantities of information and organized them by any number of specified categories. The main purpose of database programs is to maintain and retrieve a large quantity of records of information. 5. Desktop Publishing (Pagemaker, InDesign, Scribus) Desktop publishing (DTP) software takes document preparation a step beyond what word processors can do. DTP give documents a professional finish, creating excellent printed output that looks like is was done by a professional printer or typographer.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

23

6. Graphic Programs Types: Bitmap graphic program (Paint, PaintShop Pro, Photo Paint, PhotoShop) Vector graphic program (CorelDraw, Illustrator, Freehand, Inkscape) Graphic Programs let you draw and paint on your computer. They range from programs with simple black and white and line drawing capabilities- to really professional complex programs that allow you to work with thousand of colors and create photographic- quality artwork.

Motorcycle scaled drawing using CorelDraw. 7. Movie Editing (Premiere, Video Studio) Movie editing software 8. CAD (AutoCAD, ProgeCAD, Caddsman) Computer- Aided Design (CAD) programs are very technically- oriented applications and have powerful mathematics and visual modeling capabilities.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

24

Designing a house using AutoCAD 8. Internet Browsers (Netscape Navigator, MS Internet Explorer, Mozilla Firefox, Google Chrome) A browser is used to open, view or display files posted on the internet. The pages displayed are in html readable format, and may contain text, graphics, audio and video files. 9. Communications (Skype, YahooMessenger) Communication programs allow a PC equipped with modem to connect with other PC through phone lines and exchange information. These are communication services that you can access with your communications program and modem, such as the internet. They let you send electronic e-mail, or send and receive fax messages. Some services even give you up- to- date news, financial, and weather reports. 10. Games Games are for people who want to relax indoor. While it is discouraged in the work place, it is assumed that a peopleware need to play because All works, no play, makes one a dull boy. Games ranges from those that can sharpen memory, develop tactics, amuse or simply kill a time. 11. Anti-virus (McAfee, Norton, PC-Cillin, AVG, Panda, NOD32, Kaspersky, Avira) Anti-virus is a utility software designed to protect and maintain the health of your system. Anti-Virus- can search for viruses and worms and clean infected files on your computer. It is necessary that an anti-virus is often updated to combat virus attacks and ensure the health of your computer. 12. Defragmenter (Disk Defragmenter, defragger)

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

25

Defragmenter increase speed, performance and reliability of the system by physically arranging and organizing contents of disk to store pieces of file close together and make it accessible by the system in a less possible time. C. Programming Languages 1. Interpreter- Program designed runs side-by-side with the application in which it is created. 2. Compiler- Program made in this category can run as a stand-alone after is it compiled and become executable. SOFTWARE PIRACY Software piracy refers to illegal use and/or distribution of copyrighted computer programs. Aside from legal sanctions for software piracy, pirated software can be a source of computer viruses. Furthermore, pirated software may not properly function as expected and may end up loosing more in the end. In order to reduce software piracy in networked computer installations, legal use of software were given options for a site license (legal installation of program on several numbers of computers.) The concept of Shareware is another strategy used in the battle against software piracy. A shareware is a program that is distributed free on a trial basis. If the user is interested in the software, then the user is requested to pay the developer. Another concept called Freeware is probably the most effective strategy against software piracy because the programs are distributed for free. However, Freeware programs are not as powerful as copyrighted software because developing powerful programs requires a considerable amount of capital outlay and software companies expect returns. COMPUTER AND ETHICS Computers have simplified tasks of human being and have dramatically changed the way people live and do. Computers can finish works faster, and in some cases, replaced humans in performing tasks which are either dangerous or monotonous. Computers are catalyst of change. It can bring warmth to life or damage to property. It can be used for the benefit or downfall of man. For instance, while it can help doctors diagnose illness and perform life-saving operations, it can destroy humanity through design and launching of weapons and nuclear missiles. In the moral side, while it can help business establishments to become efficient in its delivery of services, it can also lead to displacement of workers.

COMPUTER CRIMES Computer crimes can be carried out by anybody outside or inside of the firm. For the banking system for example, highly intellect person view that hacking of the application or breaking into the system is a sort of game just to beat the computer system. If undetected, a fraction of a centavo altered on some bank accounts would accumulate to millions. This is called theft of funds and considered as a crime. Moreover, unauthorized entry into the system is also a criminal act. In an academic scenario, if a student can break into the system and change his failing grade into a passing grade, it is comparable to breaking into someones house and robbing every belongings therein. Students can also copy a program or work of a classmate and passing it as his own work. These are immoral acts.
COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

26

Aside from those mentioned, stealing computer time is also an act of computer- related crimes. There is no intention of stealing or getting other work or information, instead the user intends to use the computer for personal purposes (ex: playing games or making his own term papers). Hardware theft is a more serious crime. For example, stealing a CPU would result to severe loss of information, securities and resources where companies solely rely on softcopy. That is why, web hosting companies and internet service providers installed anti-burglary system and bullet-proof facilities for their computers. Removing keyboard caps, transferring wires, or stealing mouse is considered an act of vandalism. Such acts will delay the flow of work in the process. Remember that your fellow students, even yourself can be affected by those acts. THE BIG BROTHER SYNDROME The big brother syndrome (note the concept in a big brother house where there are plenty of cameras) is a fear brought about by the idea that someone are using information stored in computer systems for their personal intentions. For example, your personal information filed with yahoo email system can be stolen anytime by someone who would be motivated enough and use this information to discredit you. ROGUE SOFTWARE In 1950s, computer scientists started to entertain the idea of a self-replicating program. The notion is that, a program can replicate on its own just like an organic substance is capable of doing. Because the program shared the characteristics of a biological virus, it was eventually called a computer virus. Computer virus is a sub-class of a broader class called Rogue software. Rogue software is a program that runs on a computer without prior consent or knowledge of the user. When it becomes unmanageable and destructive, it leads to downtime in computer systems. Sub classification of a Rogue software: 1. Back Door (Trap Door) Its a code used to bypass the normal security measures of computer systems. A programmer can include a special code into the program so that he can access the computer systems without being noticed. For instance, a house has a secret door in one of the walls and even if all the doors and windows are locked, a person who knows the presence of the secret entrance cal still get inside the house without being noticed. 2. Chameleons A chameleon program can mimic a behavior of or imitate another program inorder to gather information. The gathered information can then be used by the one who created the chameleon to access program or installation it has infected. This program is comparable to having a duplicate key for all rooms in a house. 3. Logic Bombs Logic bomb are programs which can destroy other programs when a certain trigger is encountered. The trigger can be a pre-defined time, date or command. This is commonly used by programmers to either lock or self- destruct a program after its trial period if the buyer refuses to pay for the program.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

27

4. Trojan Horse A Trojan horse virus disguises itself as a useful program but when it invades your system, it does more harm than doing something useful. It gets its name from the story of Troy. The Greeks made a huge wooden horse as a gift of peace to the city of Troy. When the wooden horse was brought inside the city, the Trojan feasted and many of them passed out because of too much drinking. When the Trojans fall asleep, the Greek warriors emerged from the wooden horse, killed the Trojans and successfully invaded the city. 5. ANSI Bombs ANSI bombs are a program that changes the behavior of the keyboard in a peculiar way. For example, if a letter A is pressed, the computer will interpret it as a different letter. It can also make the monitor as if it is not working. COMPUTER VIRUS In its general, a virus is a type of Rogue software. It stands for Vital Information Resource Under Siege. A worm, which is a less threatening virus, replicates itself without infecting any host program, but pose annoyance to the user. A virus can duplicate itself by infecting other programs. It can display text or graphics, play a sound, misbehave a system, destroy files or erase the entire contents of the hard disk. In short, viruses are created by very bad programmers to threat or destroy other programs. There are two accepted reasons why bad programmers creates virus: 1. Revenge. Disgruntled programmers can write a virus in-order to get even with a former employer. 2. Fame. Programmers think that creating a virus is their ticket to fortune. A virus can be triggered to cause destruction in several ways: 1. Randomly-triggered viruses are designed to attack at random. 2. Date- activated viruses wait for a pre-defined date before it attacks. 3. Boot-count viruses will count the number of times the computer is booted. When it reaches the pre-defined number, the virus attacks. 4. Time-since virus attacks after the computer is left open for a specified period of time. 5. Keystroke-triggered viruses will activate itself after a pre-defined number of keystrokes. Here are some of thee indicators of a virus infection: 1. System slowdown 2. Unexpected display of messages or encrypted files 3. Unexpected graphics on screen 4. Unexpected file date or time change 5. Unexpected music 6. Change of file size or capacity 7. Presence of fake folder and files that mimic as legitimate ones 8. Corruption of system or data files

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

28

3. PEOPLEWARE COMPONENTS E. Learning Objectives: 1. Know the people component and its function in the System 2. Know the different career opportunities in IT 3. Learn how peopleware can help towards environment-friendly computing THE PEOPLEWARE IN THE ORGANIZATION This component is made up of people responsible for maintaining, programming and analyzing the output generated by the computer system. LET US FACE THE FACT Computer- literate job seekers have an edge over their computer- illiterate counterparts as more and more computers and information systems are used in the businesses. Note that most job opportunities will require applicants who are knowledgeable in computers. If you are planning a career in the field of Information Technology, a wide range of opportunities is available for you to choose from. THE INFORMATION SYSTEM DEPARTMENT The IS department is considered as the data and information nerve center of the company. Its primary function is to provide the software and operational support needed to produce information from data supplied by end- users. IS departments are generally divided into seven career groups, namely: 1. Management 2. Systems Analysts 3. Programming 4. Data Communications 5. Operations 6. Technical Support, and 7. Training 1. Management An Information System department is typically headed by a senior executive, general manager or a chief information manager or CIO. The head of this department is usually the most experienced individual within the organization. At least half of the time of the CIO is spent interacting with functional managers and executives. The CIO is also responsible for initiating the development of new systems if the need arises. The CIO must also manage the daily operations of the IS department. 2. Systems Analysis Group A Systems analyst is responsible for designing information systems based on the processing requirements of end- users. Systems analysts are responsible for feasibility studies, system reviews, security assessments, long- range planning and sometimes, hardware selection.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

29

3. Programming Group Programmers are responsible for creating the various system components based on the design of the systems analyst. 4. Data Communications Group The Data Communications group is responsible for the design and maintenance of computer network that link computers and other devices for data communications. They are also the ones who select and install the needed hardware devices such as modems, down- line processors, and front- end processors. 5. Operations Group This group is responsible for performing hardware- based activities needed in keeping the operation systems operational. Here are some of the available job opportunities within this group: a. An Operator is responsible for software routine initializations, mounting of needed storage devices, printers and troubleshooting. b. A librarian is responsible for safekeeping of files and storage devices. Requests for needed storage devices are monitored and furnished by the librarian. c. A control clerk is responsible for monitoring input to and output from the computer center. The control clerk makes use of standard operating procedures in validating the accuracy of output prior to distribution to end- users. d. The data entry operator or encoder is responsible for inputting data prior o processing. An encoder must possess good typing skills. 6. Technical Support Group This group is responsible for maintenance and sometimes, development of systems software such as operating systems, database management systems and language compilers. The database administrator is a position under this group is involved with the widespread use of database management systems. The database administrator is responsible for the design, creation, integration and routine maintenance of the companys database. 7. Training Group The group is responsible for all company- related computer training and activities. Here are some of the responsibilities of the training group: - Scheduling of computer specialists for regular technical updates - Conduct training to end-users especially when implementing a new system or installing a new application software - Determine the computer- related training needs of both computer specialists and end- users.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

30

OTHER CAREER OPPORTUNITIES 1. Office Automation Specialists Officer Automation Specialists help in the automation of various activities related to office work. They help users to implement and make effective use of office systems. 2. Microcomputer specialist Microcomputer specialists are responsible for helping users overcome the difficulties related to the use of microcomputer and its software. 3. User liaisons User liaison serves as the interface between end- users and the information systems department. This person must make sure that the needs of the end- users are understood by the IS department and vice- versa. 4. Service vendors Service vendors provide technical support such as repairs and hardware upgrades.

5. Hardware vendors Hardware vendors serve as retail and wholesale outlets for computer hardware products. Vendors of branded or clone PCs may sell peripheral devices ranging from mouse pads to modems or computer systems complete with pre- installed software. 6. Software vendors Software vendor s can design and create software packages for a particular- computer based system or application. 7. Computer instructors The IT industry will not have specialists for all its IT needs if there are no instructors to teach aspiring professionals. Environment-Friendly Computing We just cant stop using computers and once again start using typewriters. The solution to this is to change some of our computing habits which tend to put more pressure on the environment than what is actually needed. You can help preserve our environment by following these steps: 1. Recycle paper. You can use the second side of a used paper in printing drafts. 2. Get used to the idea of editing your documents on screen, rather than generating a printed copy. 3. Maximize the used of E-MAIL and other means of sending messages without having to use paper. 4. Recycle floppy disks. Doing so will reduce the quantity if new ones that must be bought. 5. Turn of the computer when it is not going to be used for several hours. However, turning it off every time you leave the workplace is not advisable since computers tend to consume more power during startup. 6. If you are using a printer, have old ribbons and toner cartridges refilled before buying new ones.

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

31

7. Support computer manufactures who make use of recycled materials for items such as carton boxes, manuals and the like. Safety computing Tips 1. Never boot from a diskette unless you are sure that it is virus free. 2. Check all new software for the presence of viruses. You can use commercially available antivirus software such as Norton Anti-virus, Mcaffees Scan, PCSCAN, Thuderbyte Anti-virus (TBAV), Dr. Solomons etc. 3. If you own a laptop, make sure that it is stored in a safe place. 4. Keep diskettes containing important information in a safe place. Protect it against theft and the elements. 5. Make it a habit to backup regularly. If something happens to your computer, you can always restore it using the backup. Do not forget to write-protect diskettes. 6. Know the computer that you are using. Observe sudden changes in its performance. System slowdown can be caused by a virus infection. 7. Keep your password secured. Avoid sharing it with others or storing it in a place where it can be read by others. 8. Avoid letting just anyone use your computer. Scan your friends diskette if you allow him to use it. For heavily used computers, memory resident anti-virus software would be recommendable.

References: http://www.zerocut.com/tech/c_terms.html White, Ron. How Computers Work. Ziff-Davis Press, 1993 Computer Fundamentals, STI Inc., 1997

COMPUTER FUNDAMENTALS For USM-KCC Computer Laboratory Use. Prepared by the USMKCC ICT Section

32

S-ar putea să vă placă și