...COMPUTER CONCEPTS NATIONAL ASSOCIATION FOR THE BLIND NEW DELHI Computer Concepts Hardware & software concepts explained for persons with low or no vision for the students of Intel Technology Training Lab at National Association for the Blind, New Delhi Produced and Published by National Association for the Blind Sector-5, R.K Puram, New Delhi E-mail: nab@vsnl.com First Edition October 2001 Reprint: February 2005 TABLE OF CONTENTS 1. Introducing Computers: Introduction to input-process-output sequence, What is a computer?, Where do you use Computer? 2. Hardware Components of the Computer: Input devices, Output devices, Processing Unit, Memory or Storage, Drive letters, Units to Measure Memory 3. Software: System software and application software 4. Important Terms: Files & folders, Mother Board, Ports, Cards, Data Bus 1. INTRODUCING COMPUTER 1.1 Introduction to input-process-output sequence Any activity has an input-process-output sequence. For example, for preparing milk shake, milk, sugar and flavour are the input. These things are processed in a mixer and the milk shake is the final output. Example of Human Beings When the teacher asks the student to ADD 5 & 2. It forms an input to the student. The addition is performed in the brain of the student - process When the result is spoken out by the student, it forms the output 1.2 What is a computer? Computer is a data processing...
Words: 4094 - Pages: 17
...AS Level Module 2 Information: Management and Manipulation Lecture One 11.1 Data Capture Lecturer: Deepak Gautam Email: gautamd@wolverhamptoncollege.ac.uk Room: 120, Wulfrun Campus Telephone: 01902 821133 Overview of Data Capture The process of collecting data in a form suitable for use in an information system is termed data capture. For example, before an electricity board can charge a customer for the use of electricity, the customer’s meter must be read and recorded, or captured, on a suitable form. The data must then be transferred into the computer system by means of an input device appropriate to the method of data capture. Sometimes the data capture form is directly readable by an input device, as, for example, in the case of mark sensitive forms which can be read by optical mark readers (OMRs). On other occasions, the data on the form must be first transferred to a suitable medium by a data entry person using a key-to-storage device. Sometimes the data to be captured is pre-recorded on an item to be sold, as with bar codes, so that a data recording form is not required at all, but in many instances, some sort of data capture form is required. The design of such forms is of great importance, since the clearer and more concise the form, the less chance there is of inaccurate data being recorded. Frequently it is necessary to use questionnaires or observation sheets to collect data for statistical...
Words: 2378 - Pages: 10
...Introduction to ICT and Cyberspace UNIT 2 Structure 2.1 2.2 2.3 2.4 2.5 Introduction Objectives COMPUTER HARDWARE, SOFTWARE AND PACKAGES Evolution and Development of Computing Hardware Components of Computers What is Software? 2.5.1 Difference between System Software and Application Software 2.6 System Software: Functional Categories 2.6.1 2.6.2 System Control Programs System Support Programs 2.7 2.8 2.9 Software Crisis Application Software or Packages Summary 2.10 Terminal Questions 2.11 Answers and Hints 2.12 References and Suggested Readings 2.1 INTRODUCTION Modern computers are equipped with powerful hardware facilities driven by extensive software packages. Today computing speed is very high and it is capable of doing huge amount of work within seconds with proper accuracy. Nowadays computing and telecommunication both controls the whole universe with multiple manners. To access the state of art of computing, it is always better to review the historical milestones in the developments of computers. Nowadays the computer system plays such a vital role that no corporate or individual can survive without it by any means. Starting from the country’s national security to any common issue, the use of the computer system is enormous. In general, the computer accepts inputs, then processes it, and gives the output. 2.2 OBJECTIVES After studying this unit, you will be able to: • • • 18 describe the evolution and development of computing; list...
Words: 4670 - Pages: 19
...A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem. An important class of computer operations on some computing platforms is the accepting of input from human operators and the output of results formatted for human consumption. The interface between the computer and the human operator is known as the user interface. A computer is like a brain which can think, calculate, retrieve and organize information for its human master. This brain is supplied with parts that provide allow for input to it and allow it produce output for presentation to the one using it. Central Processing Unit The thinking part of the brain of the computer is the CPU or Central Processing Unit. This component provides all the control and manages calculations and manipulation of data. Computer manufacturers are always trying to squeeze more speed and multiprocessing capability (doing multiple things at the same time) out of it. This has led to the dual core or multiple core CPU which is popular today. A core is basically a computer so that a dual core computer is really 2 computers in one. Computer speed is usually measured in GHz which means Gigahertz which in turn mean billions of cycles per second. The basic idea is that the higher the number of cycles, the faster the computer is. Today the...
Words: 2046 - Pages: 9
...findings. ___ 6. Melanie will introduce the group and Nicole will follow her, although Nicole would be better presenting the conclusion. ___ 7. Even though he already has an A on the first grammar exam, amazingly, Josh showed up to take the second exam. ___ 8. We need to really focus on grammar and style in this class, both at the beginning and at the end of the semester. ___ 9. Although Shawn Powers has never run a marathon, Sean Painter has. ___ 10. Angela Jones, Adrian Call, and Billy Brown are all planning to get a perfect score on the final exam. For questions 11-15, mark A for phrases, B for dependent clauses, and C for independent clauses. ___ 11. Going to the Homecoming Dance ___ 12. Finding themselves up a creek without a paddle ___ 13. I believe Mike’s the best candidate ___ 14. After Brenda finalizes the budget ___ 15. Tell him what you think Verbs (Voice) Mark C if correct and proper voice is used and I if incorrect and proper voice is not used. Correct the errors. ___ 16. The supervisor reviewed the material, but no recommendations were announced. ___ 17. A title caption describes the contents of the graphic, and the title should be...
Words: 1719 - Pages: 7
...media and anything relating to it. I consider myself pretty media literate, because I know how to communicate and send messages through most media. I am an avid internet user so therefore can use any forms the internet has to offer in order to communicate. This would include social networking , instant messaging and of course e mailing. I’m a big social network user especially Twitter, where like every other social networking site you can communicate with people all over the world. For me the benefits of being media literate are that I am more educated an able to use classes such as this one. My being on the internet so often has allowed me to take online courses to whereas someone who isn’t, would have a much harder time in an online class. I would say a disadvantage of being media-illiterate would be being cut off from people who you would otherwise communicate with on a regular basis. For those who have family in the military, being media literate allows them to keep in touch with their family overseas. A person who has more trouble with media and forms of communication will only struggle in the process of trying to be connected with others that are further than a phone call away. Responses: THURSDAY NOV 8th Michael- In order to be media literate in my opinion means to have knowledge of different forms of communication. For example a good example of mass media...
Words: 6930 - Pages: 28
...for the beginner it is the best which gives the time and opportunity to become familiar with the basics before pursuing further into the field of study in greater detail at the upper secondary level Ministry of Education, Suva. Fiji Islands 28th November 2013. Year 11 Computer Education 2 Acknowledgement This textbook for year 11 Computer Education has been produced by the Computer Education Section of the Technology and Employment Skills Training (TEST) section of the Ministry of Education. It has been written and compiled by writer’s panel comprising of Computer Studies officers and USP lectures: 1. Dr Bibya Sharma(USP) 2. Mr Shaveen Singh (USP) 3. Mr Vijay Singh(USP) 4. Mr Paula Sovakiwai (SGS) 5. Mrs Rihana Hussain (SGS) Graphic design & Type-set: 1. Emily Nadike...
Words: 20027 - Pages: 81
...Computer crime involves: Theft by computer (including identity theft and phis hing) Software piracy and intellectual property misuse Software sabotage (malw are- including worms, viruses, Trojan horses, e tc.) Hacking and electronic trespassing. The computer crime dossier Computer crime: any crime accomplished through knowledge or use of computer technology Businesses and government institutions lose billions of dollars every year to computer criminals The majority of crimes is committed by company insiders Typically covered up or not reported to authorities to avoid embarrassment According to a 2001 survey of over 500 companies and government agencies: 85% detected computer security breaches in the preceding 12 months Financial losses due to security breaches topped $377 million 70% reported that Internet connections were frequent points of attack Only 31% said that internal systems were frequent points of attack. Theft by computer Theft is the most common form of computer crime. Computers are used to steal Money Goods Information Computer resources One common type of computer theft today is the actual theft of computers, such as notebook and PDAs Notebook and PDAs are expensive Data stored on a computer can be more valuable Denial o f Service ( DOS) Attacks bombard servers and Web sites with so much bogus traffic that they are effectively shut down networks, denying service to legitimate customers and clients. Computer security Protecting computer systems...
Words: 7438 - Pages: 30
...present data in a form people can understand. The CPU manipulates the data and controls the tasks done by the other components. Primary storage (internal storage that is part of the CPU) temporarily stores data and program instructions during processing. Secondary storage (external storage such as flash drives) stores data and programs that have been saved for future use. Communication devices manage the flow of data from public networks (e.g., Internet, intranets) to the CPU, and from the CPU to networks. A schematic view of a computer system is shown in Figure TG1.1. REPRESENTING DATA, PICTURES, TIME, AND SIZE IN A COMPUTER ASCII. Computers are based on integrated circuits (chips), each of which includes millions of sub-miniature transistors that are interconnected on a small (less than l-inch-square) chip area. Each transistor can be in either an “on” or an “off” position. The “on-off” states of the transistors are used to establish a binary 1 or 0 for storing one binary digit, or bit. A fixed number of bits representing specific characters—letters, numbers, and special symbols—is known as a byte, usually 8 bits. Because a bit has only two states, 0 or 1, the bits comprising a byte can represent any of 28, or 256, unique characters. The character that the byte...
Words: 8488 - Pages: 34
...SYSTEM CONCEPTS A system can be simply defined as a group of interrelated or interacting elements forming a unified whole. Many examples of systems can be found in the physical and biological sciences, in modern technology, and in human society. Thus, we can talk of the physical system of the sun and its planets, the biological system of the human body, the technological system of an oil refinery, and the socioeconomic system m of or a business organization. producing outputs in an organized transformation process. Such a interacting components or functions: • Input involves capturing and assembling elements that enter the system to be processed. For example, raw materials, energy, data, and human efforts must be secured and organized for processing. • Processing involves transformation process that convert input into output. Examples are a manufacturing process, the human breathing process, mathematical calculations. w w w .k in system (sometimes called a dynamic system) has three basic in d together toward a common goal by accepting inputs and ia A system is a group of interrelated components working .c o 1 • Output involves transferring elements that have been produced by a transformation process to their ultimate destination. services, For example, finished products, human be and management information must transmitted to their human users. Example A manufacturing system accepts raw materials as input...
Words: 27464 - Pages: 110
...Centre for Pre-University Studies FRA/FRB FRA/FRB April Intake Semester 1 2015/2016 Lecture Notes Workbook FPIT1023 Information and Communication Technology Prepared By: chai li kuen, chang pei fah, chik soon leong Name of Student: ________________________________________ Class: ________________________________________ Name of Lecturer/Tutor: ________________________________________ *The contents are not for sale and strictly meant for internal circulation only. Main references supporting the course 1. Gary, B &Shelly 2012, Discovering Computers - Complete: Your Interactive Guide to the Digital World, Course Technology. 2. O’Leary, TJ & O’Leary, L I 2011, Computing Essentials, McGraw-Hill. Additional references supporting the course 1. Morley, D & Parker, CS 2013, Understanding Computers: Today and Tomorrow, 14th edn, Course Technology, Thomson Learning, United States. 2. Williams, BK, Sawyer, SC 2013, Using Information Technology,10th edn, McGraw-Hill. Chapter 1: Introduction to Computers Objectives Overview: * Define the term, computer, and describe the relationship between data and information * Describe the five components of a computer * Discuss the advantages and disadvantages that users experience when working with computers * Distinguish between system software and application software * Differentiate among types, sizes, and functions of computers in each category *...
Words: 3466 - Pages: 14
...Android 4.3, Jelly Bean Android 4.3, an even sweeter Jelly Bean, is available now on Nexus phones and tablets. Restricted profiles limit access to apps and content, at home with your family and at work. Bluetooth Smart support makes Android ready for a whole new class of mobile apps that connect to fitness sensors. Games look great thanks to the 3D realistic, high performance graphics powered by OpenGL ES 3.0. And there's a lot more new in this release: Audio * Virtual surround sound - enjoy movies from Google Play with surround sound on Nexus 7 (2013 edition) and other Nexus devices. Surround sound is powered by Fraunhofer Cingo™ mobile audio technology. Dial pad * Autocomplete - just start touching numbers or letters and the dial pad will suggest phone numbers or names. To turn on this feature, open your phone app settings and enable “Dial pad autocomplete.” Graphics * OpenGL ES 3.0 - Android now supports the latest version of the industry standard for high performance graphics. * Wireless Display for Nexus 7 (2013 edition) and Nexus 10 - project from your tablet to a TV. Internationalization and localization * Additional language support - Android is now translated in Africaans, Amharic (አማርኛ), Hindi (हिंदी), Swahili (Kiswahili), and Zulu (IsiZulu). * Hebrew, Arabic, and other RTL (right-to-left) - now supported in the home screen, settings, and Phone, People, and Keep apps. Keyboard & input * Easier text input - an improved...
Words: 4352 - Pages: 18
...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...
Words: 47755 - Pages: 192
...the planet. ‘Apple is Steve Jobs and Steve Jobs is apple’ he said. Apple was grieved to find out that its visionary and charismatic chief executive was bereft of life and the whole world including its huge customer base where all in a dilemma of hurt and uncertainty. 3.0 HR ISSUES Focusing on apple’s strategic framework (as developed by Sparrow and Pettigrew), it faces a number of human resource issues some of which are a. If apple was to create cheaper products, it needs cheaper or less expensive components which could be developed in an inexpensive environment with cheap labour. The question that comes to mind is what manufacturer could apple possibly work with or even acquire? What region of the globe would be the best to site the chip manufacturer? And how would apple evade cross cultural/tax issues to keep focus on its overall business goal. b....
Words: 2964 - Pages: 12
...International Journal of Advances in Engineering & Technology, May 2011. ©IJAET ISSN: 2231-1963 STRATEGIES & METHODOLOGIES FOR LOW POWER VLSI DESIGNS: A REVIEW Kanika Kaur1 and Arti Noor2 1 2 KIIT College of Engineering, Gurgaon, India kanika.kiit@gmail.com artinoor@cdacnoida.in Centre for Development of Advanced Computing, Noida, India, Abstract Low power has emerged as a principal theme in today’s world of electronics industries. Power dissipation has become an important consideration as performance and area for VLSI Chip design. With shrinking technology reducing power consumption and over all power management on chip are the key challenges below 100nm due to increased complexity. For many designs, optimization of power is important as timing due to the need to reduce package cost and extended battery life. For power management leakage current also plays an important role in low power VLSI designs. Leakage current is becoming an increasingly important fraction of the total power dissipation of integrated circuits. This paper describes about the various strategies, methodologies and power management techniques for low power circuits and systems. Future challenges that must be met to designs low power high performance circuits are also discussed. Keywords: Power Dissipation, low power, process nodes, leakage current, power management. 1. Introduction The advantage of utilizing a combination of low-power components in conjunction with low-power design...
Words: 3236 - Pages: 13