Sunteți pe pagina 1din 47

Empowerment Technology

Objectives:
Identify the different
parts and components of
a Personal Computer and
their functions.
Can you identify
these different
computer
hardwares?
BASICS
Computer: Definition
 A computer is a machine that can be programmed to
manipulate symbols. Its principal characteristics are:
 It responds to a specific set of instructions in a well-
defined manner.
 It can execute a prerecorded list of instructions (a
program).
 It can quickly store and retrieve large amounts of data.
History of the computer
 The first digital computer and what
most people think of as a computer
was called the ENIAC, built during
World War II (1943-1946) and were
designed to help automate the
calculations being done by human
computers. By doing these
calculations on a computer they could
be done much faster and with fewer
errors.
History of the computer
 Early computers like the ENIAC used
vacuum tubes and were large
(sometimes room size) and only
found in businesses, Universities, or
governments. Later, computers
began utilizing transistors as well as
smaller and cheaper parts that
allowed the ordinary person to own
a computer.
History of the computer
Computer Sizes and Power
 Computers can be generally classified by size
and power as follows, though there is
considerable overlap:
 Personal computer
 Workstation
 Minicomputer
 Mainframe
 Supercomputer
Personal computer

 A small, single-user
computer based on a
microprocessor.
 A computer designed for
use by one person at a
time.
Workstation
 A powerful, single-user
computer. A workstation
is like a personal
computer, but it has a
more powerful
microprocessor and, in
general, a higher-quality
monitor
Minicomputer
 A multi-user computer capable of
supporting up to hundreds of users
simultaneously.
 Minicomputers may contain one or
more processors, support
multiprocessing and tasking, and are
generally resilient to high workloads.
Although they are smaller than
mainframe or supercomputers,
minicomputers are more powerful than
personal computers and workstations.
Mainframe
 A powerful multi-user
computer capable of
supporting many hundreds or
thousands of users
simultaneously.
 Mainframes have much faster
Arithmetic and Processing units
and they have much larger
main memory and auxiliary
storage capacities.
Supercomputer
 The name Supercomputer applies to the largest, fastest and
most expensive type computer available.
 These machines are capable of performing hundreds of millions
of complex scientific calculations per second, operate many
times faster than the largest Mainframes.
 Super computers are designed principally for scientific
applications that require an enormous number of applications
(Calculations). They are used mainly for Weather Forecasting,
Defense and Weapons Analysis, Petroleum Research etc.
Supercomputer

Facebook’s Data Center


Supercomputer

Facebook’s Data Center


Computer software
 Sometimes abbreviated
as SW and S/W, software is
a collection of instructions
that enable the user to
interact with a computer, its
hardware, or perform tasks.
Without software, most
computers would be
useless.
Types of Software
System Software
• System Software is set of
programs to control and
manage the operations of
a computer hardware.
• It enables application
programs to execute
properly.
Types of Software
Application Software
• Application Software includes
programs that do real work for
user.
• Application Software is created
to perform specific tasks for a
user.
• Application software is used to
perform various applications on
the computer
Computer Hardware
 Computer hardware refers to
the physical components that
make up a computer system.
 Abbreviated as HW,
Hardware is best described as
any physical component of a
computer system that
contains a circuit board, ICs,
or other electronics.
Safety and Security
 Malware
 short for malicious software, is an umbrella term
used to refer to a variety of forms of hostile or
intrusive software, including computer viruses,
worms, Trojan horses, ransomware, spyware,
adware, scareware, and other malicious
programs.
 These malicious programs can perform a variety
of functions, including stealing, encrypting or
deleting sensitive data, altering or hijacking core
computing functions and monitoring users'
computer activity without their permission.
List of Common Malware Types
This list of Malware types only scratches the
surface in that Malware is being developed by
those trying to gain access to your computer
for monetary gain. The list of Malware types
focuses on the most common and the general
categories of infection.
List of Common Malware Types

Adware
 The least
dangerous and
most lucrative
Malware. Adware
displays ads on
your computer.
List of Common Malware Types
Spyware
 Spyware is software that
spies on you, tracking
your internet activities in
order to send advertising
“Adware” back to your
system.
List of Common Malware Types
Virus
 A virus is a contagious program or
code that attaches itself to
another piece of software, and
then reproduces itself when that
software is run. Most often this is
spread by sharing software or
files between computers.
List of Common Malware Types
Worm
 A program that replicates
itself and destroys data and
files on the computer.
 Worms eat the system
operating files and data files
until the drive is empty.
List of Common Malware Types
Trojan
 Trojan Horses and Worms are
both considered to be Viruses.
They both multiply, and spread
themselves to other computers
and can cause damage. Trojans
get into your computer via a
program then damage and
destroy programs and files.
List of Common Malware Types
 Phishing
 This is another way hackers try to get personal
information from you. They use email to do this. They
send you a fake request acting like it is from a bank, or
other institution asking for personal information. You
click a link in the email and it takes you to a fake
website imitating the institution. If you give your
personal information it can result in Identity Theft.
List of Common Malware Types
 Rootkit
 This one is likened to the burglar hiding in the attic, waiting
to take from you while you are not home. It is the hardest
of all Malware to detect and therefore to remove. Many
experts recommend completely wiping your hard drive and
reinstalling everything from scratch. It is designed to permit
the other information gathering Malware in to get the
identity/information from your computer without you
realizing anything is going on.
List of Common Malware Types
 Backdoors:
 Backdoors are much the same as Trojans or
worms, except that they open a backdoor' onto
a computer, providing a network connection for
hackers or other Malware to enter or
for viruses or malwares to be sent.
List of Common Malware Types
 Keyloggers
 Records everything you type on your keys; in
order to glean your login names, passwords,
and other sensitive information, and send it on
to the source of the keylogging program. Many
times keyloggers are used by corporations and
parents to acquire computer usage
information.
List of Common Malware Types
 Ransomware:
 If you see this screen that
warns you that you have been
locked out of your computer
until you pay for your
cybercrimes. Your system is
severely infected with a form
of Malware called
Ransomware. It is not a real
notification, but, rather an
infection of the system itself.
List of Common Malware Types
 Browser Hijacker:
 When your homepage changes to one
that looks like those in the images
inserted next, you may have been
infected with one form or another of a
BrowserHijacker. This dangerous
Malware will redirect your normal
search activity and give you the
results the developers want you to
see. Its intention is to make money off
your web surfing.
What are bits, bytes, and
other units of measure for
digital information?
 A bit is a binary digit, the smallest increment of
data on a computer. A bit can hold only one of two
values: 0 or 1, corresponding to the electrical
values of off or on, respectively.
 Because bits are so small, you rarely work with
information one bit at a time. Bits are usually
assembled into a group of eight to form a byte. A
byte contains enough information to store a
single ASCII character, like "h".
 A kilobyte (KB) is 1,024 bytes, not one thousand
bytes as might be expected, because computers
use binary (base two) math, instead of a decimal
(base ten) system.
 Computer storage and memory is often measured
in megabytes (MB) and gigabytes (GB). A medium-
sized novel contains about 1 MB of information. 1
MB is 1,024 kilobytes, or 1,048,576 (1024x1024)
bytes, not one million bytes.
 Similarly, one 1 GB is 1,024 MB, or 1,073,741,824
(1024x1024x1024) bytes. A Terabyte (TB) is 1,024 GB; 1
TB is about the same amount of information as all of
the books in a large library, or roughly 1,610 CDs worth
of data. A Petabyte (PB) is 1,024 TB. 1 PB of data, if
written on DVDs, would create roughly 223,100 DVDs,
i.e., a stack about 878 feet tall, or a stack of CDs a mile
high. Indiana University is now building storage
systems capable of holding Petabytes of data. An
Exabyte (EB) is 1,024 PB. A zettabyte (ZB) is 1,024 EB.
Finally, a yottabyte (YB) is 1,024 ZB.
 0= 0  11 = 1011
 1= 1  12 = 1100
 2 = 10  13 = 1101
 3 = 11
 14 = 1110
 4 = 100
 15 = 1111
 5 = 101
 16 = 10000
 6 = 110
 17 = 10001
 7 = 111
 8 = 1000  18 = 10010

 9 = 1001  19 = 10011
 10 = 1010  20 = 10100
Write your name in Binary Form
Assessment
Short Quiz
1. This program(s) can perform a variety of functions, including
stealing, encrypting or deleting sensitive data, altering or hijacking
core computing functions and monitoring users' computer activity
without their permission.
2. Built during World War II (1943-1946) and were designed to help
automate the calculations being done by human computers, this
machine is considered to be the first digital computer.
3. When your homepage changes to one that looks like those in the
images inserted next, you may have been infected with one form or
another of this malware.
4. They multiply, and spread themselves to other computers and can
cause damage. This malware get into your computer via a program
then damage and destroy programs and files.
Short Quiz
5. The least dangerous and most lucrative Malware. This
malware displays ads on your computer.
6. This is another way hackers try to get personal
information from you. They use email to do this. They
send you a fake request acting like it is from a bank, or
other institution asking for personal information.
7. Records everything you type on your keys; in order to
glean your login names, passwords, and other sensitive
information, and send it on to the source of the
keylogging program.
Short Quiz
8. Is a collection of instructions that enable the user
to interact with a computer, its hardware, or
perform tasks.
9. best described as any physical component of a
computer system that contains a circuit board, ICs,
or other electronics.
10. It is a machine that can be programmed to
manipulate symbols and responds to a specific set
of instructions in a well-defined manner.
Short Quiz
11. A powerful, single-user computer but has a more
powerful microprocessor and, in general, a higher-
quality monitor.
12. These machines are capable of performing
hundreds of millions of complex scientific
calculations per second, designed principally for
scientific applications that require an enormous
number of calculations.
13. A single-user computer designed for use by one
person at a time.
Short Quiz
14. A powerful, single-user computer but has a
more powerful microprocessor and, in general,
a higher-quality monitor.
15. A set of programs to control and manage the
operations of a computer hardware?
16. Is a collection of instructions that enable the
user to interact with a computer, its hardware,
or perform tasks?
Short Quiz
17 – 20. Give four (4) pre - Google search engines
that became famous during their era.

S-ar putea să vă placă și