...Learning Module ICT Literacy for Secondary School Programme Computer Hardware System Unit PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA ICTL For Secondary School - Computer Hardware Module MODULE 3 SYSTEM UNIT Curriculum Development Centre Ministry of Education Malaysia 1 ICTL For Secondary School - Computer Hardware Module 1. Name of Module : System Unit 2. Learning Outcomes: The students should be able to: • • • identify the components of a system unit state the functions of the main components of a system unit state the functions of cpu, ram, rom and expansions slots found on the motherboard 3. Knowledge and Skills: • main components in the computer system 4. Module Summary: • • • At the end of the module, a student is able to : identify main components of system unit and motherboard state the functions of main components of system unit state the functions of CPU, RAM, ROM and expansion slot This module contains 2 activities: Activity 1 : Identify the components of a system unit Activity 2 : Identify the components of a motherboard As you are doing this module, use the computer in the lab to identify the components in the system unit. 2 ICTL For Secondary School - Computer Hardware Module Notes: What is system unit? Box-like case that contains computer’s electronic components Sometimes called the chassis Figure 1 Examples of System Unit 3 ICTL For Secondary School - Computer Hardware Module Activity 1 : Identify the components of a...
Words: 1581 - Pages: 7
...Table of Contents ............................................................................................................................................................... 1 EXECUTIVE SUMMARY .................................................................................................................... 3 INTRODUCTION ................................................................................................................................. 4 PART 1: OVERVIEW – INTERNET PROPERTIES & MARKETING IMPLICATIONS .................. 6 Website analysis................................................................................................................................. 6 Web and other online content ............................................................................................................. 7 Website properties (table 1.6) ............................................................................................................. 8 Website design and usability features ................................................................................................. 9 Multimedia and interactive features .................................................................................................. 10 PART 2: BENEFIT, COST AND VALUE CREATION ..................................................................... 13 Customer relationship management ..........................................................................................
Words: 10410 - Pages: 42
...There are many input/output ports in a computer; below I’m going to list the different types of ports and their functions. The back panel of a personal computer: PS/2 Mouse Port (also known as Min-Den): is used to plug in mice, and pointing devices PS/2 Keyboard Port: is used to plug in the keyboard Ethernet Ports: This port is used to connect computers to a LAN (Local Area Network) line. SPDIF coaxial digital ports: uses a shielded cable with an RCA connector that’s used to receive signals from broadcast and cable TV and radio. It allows you to listen to FM radio and watch TV broadcasts from the PC. Parallel port (LPT): It was originally designed for use of parallel printers. However this port the most versatile of the I/O ports in the system. You are able to connect CD-ROM, scanners, and zip drives. USB (Universal Serial Bus) Ports: you can connect up to 127 simultaneous devices, it’s hot swappable. USB ports come in different speeds, such as USB 1.1, 2.0 also known as Hi-speed USB, and 3.0 SuperSpeed. Serial port: Are used to connect external modems, serial printers, and PC to PC connections. They have from 9 or 25 pins generally used for streaming multi-media. 1/8-inch mini-jack audio ports: is used by sound cards and motherboard integrated sound for speakers, microphone, and line-in jacks. Most systems and sound cars use the PC99 color coding on the back of the panel * Pink: Microphone in *Light Blue: Line in *Lime Green: Stereo/Headphones out *Brown:...
Words: 715 - Pages: 3
...waiting until those goods are sold. For Michael Dell, founder and CEO of Austin, Texas-based Dell Corporation, very little imagination is required. He has built a company with annual revenues in excess of $40bn entirely around a vision whereby manufacturing of an individual item does not begin until it has been ordered by a customer. Every single Dell product has an end user’s name on it before it even leaves the factory. Visiting a Dell factory gives you an idea of just how effective Michael Dell has been in executing this supply chain management philosophy. At the company’s Irish factory near Limerick, for example, there are 40 doors at one end of the factory that deliver the parts needed to build a variety of products – including desktop computers and servers – and 40 doors at the other end of the factory where the finished goods are dispatched to be delivered to customers. The company never holds more than four hours’ worth of parts inventory at any time – and Dell is not even considered to have acquired the parts until the moment they are offloaded from a truck and brought into the factory. The same process is used in Dell operations throughout the world, including the company’s showcase factory at its US headquarters in Austin. Every single Dell product has an end user’s name on it before it even leaves the factory. After the parts are unloaded, the process of building individual, custom-made systems begins. All the parts that are needed for the assembly of a given system are...
Words: 978 - Pages: 4
...The marketing mix comprises of the 4 P’s which is product, price, place and promotion. This is the various marketing elements that is in control by an organisation with regards to its target market. This is pivotal to any type of marketing strategy that Intel may have in place because the marketing mix is the foundation of the strategy. In this section, Intel’s marketing mix will be discussed. 1) Product Intel has a range of different products that the company sells. This range varies from products such as desktops, laptops and smartphones to motherboards, chipsets and processors and a host of other products that are related to communications and computing. Intel’s products that are used in other organisations finished products are mainly motherboards, processors and chipsets. These products can be found in a Dell laptop, the Apple I-pad and smartphones such as the Orange San Diego. 2) Price Price is the second element of the marketing mix. The product range that Intel offers is assorted and caters for lower-end products within the market to higher-end products. Examples of this would be the different Intel Core processors that are offered, which consist of the i3, i5 and i7 series. The prices of these processors would range considerably from roughly R1000 on the base i3 processor to R5000 on the best product in the i7 series. 3) Place (Distribution) Intel does not sell directly to resellers of their products, they sell their products through distribution channels...
Words: 330 - Pages: 2
...Apple Computer, Inc. is headquartered in Cupertino, California is a leader in the PC field for home, business and education markets. Their products include the Macintosh line of desktop and notebook computers, the Mac operating system, the iPod digital music player. The manufacturing facilities are located in Sacramento, California and Cork, Ireland. Apple produces their own keyboards and “Mouse” input devices. Apple’s operating segments include the Americas, Europe, and Japan. They sell their products through online stores, direct sales force, third-party wholesalers and resellers, and its own retail stores. As of September 2003, Apple and its subsidiaries worldwide had 11,000 employees and over 2,500 temporary employees. Apple Computers has experienced both good and bad times since it began its garage operation in 1976. Although it has been a leader in computer technology in the past, it has struggled lately with keeping pace in the rapidly developing computer industry. In this extremely competitive industry, the developing technology and evolving computer applications have contributed to this type of business environment. Over the last two decades, the popularity of personal computers has made the computer market attractive to consumers worldwide. As mentioned before, Apple developed as a major player in the computer industry in its early years. Apple grew to a publicly traded company by 1980. Apple continued to experience early success in the industry being the first computer...
Words: 4651 - Pages: 19
...every American family owns at least one personal computer. The personal computer technology has grown greatly improving the personal computer industry. Each year more and more improvements are made. Personal computers today are by far superior to personal computers of 40 years ago. Dimension One The operation of personal computers made today has grown tremendously from personal computers of 40 years ago. In the late 1970s into the 1980s, computers were developed for household use, offering personal productivity, programming and games. Personal computers were made much larger and more expensive systems were aimed for office and small business use. They were difficult to set-up, difficult to operate, and only had 4k bytes of memory. You would need to run several cords, and wires to set-up all the components, it would only operate in basic formats and was costly to upgrade to an expansion memory adapter. It was less expensive to just by the newest model. Dimension Two Nowadays, personal computers are in the workplace, schools, shopping facilities, and almost every household has at least one personal computer in the home. They are a lot more affordable which allows it to be a lot easier to own one. Today’s personal computers are more advanced then they were years ago. They can operate with multiple media for entering programs, for example compact disks, zip disks, and/or a floppy disk. On the other hand, personal computers years ago used cassettes for entering programs...
Words: 599 - Pages: 3
...nnnn ENG 101 10 September 333 How to Configure Windows Startup Computers are not meant for everyone, and the programs associated with them just seem to overcomplicate the whole process. Configuring Windows programming can be a mind boggling task that requires time and some basic computer knowledge. To successfully configure Windows, I am going to walk you through the process so that you can experience the most out of your computer. Connecting the Computer- Once the computer is put in the correct place, it can be connected together. First of all, connect the monitor to the PC. The monitor cable comes from the monitor and has a male plug on the end shaped like a trapezoid with two screws on either side. This is plugged into a trapezoid shaped port on the rear of the PC denoted by a small graphic of a screen. The screws are then turned to achieve a tight fit. Next to be plugged in is the keyboard. The keyboard cable has a pink semi-circle shaped male plug, which plugs into the pink port at the back of the computer, which has a small keyboard graphic next to it. The same goes for the mouse, except this has a green plug and port. The printer cable also has a male trapezoid shaped plug with screws on either side, but it is a lot longer than that of the monitor. It is similarly pushed into the corresponding trapezoid port with the printer...
Words: 1202 - Pages: 5
...for each employee starts. I observed that many of the employees were not following the company’s policies of securing data. When questioned several of the employees stated that they were not aware of the policies. I would recommend that there is a semiannually security awareness training conducted for all employees. I also noted that there were quite a few individuals using personal USB drives with personal photos, music, and documents on them. I would recommend that each time an employee plugs in a personal device to a computer that an automatic scan occur with no way for the employee to stop the scan. The workstation domain is the second domain that I observed data compromising occurring. In my observations I noticed that many of the employees do not log off or lock their computer screens when they are away from their computer thereby making it easy for anyone to walk by and have access to the information they are authorized to use. I have several recommendations for this. One is to post a memo reminding employees to log off or lock their computer screens when they are away from their computer. My second recommendation would to set a standard 30 second idle time before the screen saver/lock screen is activated. I would also make it to where the user would not be able to change the 30 second idle time. Within the LAN to WAN domain there were several employees who had opened attachments from their...
Words: 496 - Pages: 2
...market share by competitors. The company had to quickly find a new niche. After three years, the company was successful again. Comparison and Contrast of the Professional Stories of Michael Dell and Andy Grove Michael Dell Michael Dell became an entrepreneur at the age of 12 when he advertised his business “Dell Stamps” in a local trade journal. While in college, Dell turned his dorm room into a personal computer laboratory and started selling them. In 1984, Dell started Dell Computer Corporation. In 1988, the company went public raising $30 million at its initial public offering (Krames, 2003a). Dell’s philosophy is to put the customer at the center of his business. All computers are custom ordered by the customer. The production process does not start until the customer places an order. This direct one-to-one approach with the customer has helped Dell become successful and stay successful even during hard economic times (Krames, 2003a). Dell believes that customers should be involved from the start. He tried to develop a series of computers, called Olympic, that failed. The main reason for the failure is that the customer was...
Words: 1151 - Pages: 5
...IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy EECS 252 Graduate Computer Architecture Computer Systems Architecture Review of Pipeline and cache memory concepts t Mats Brorsson, professor matsbror@kth.se, tel. 790 4121 Lec 3 – Performance + Pipeline Review Electrical Engineering and Computer Sciences El t i l E i i dC t S i University of California, Berkeley http://www.eecs.berkeley.edu/~pattrsn http://www‐inst.eecs.berkeley.edu/~cs252 David Patterson Review from last lecture • Tracking and extrapolating technology part of architect’s responsibility • Expect Bandwidth in disks DRAM network and Expect Bandwidth in disks, DRAM, network, and processors to improve by at least as much as the square of the improvement in Latency • Quantify Cost (vs. Price) – IC ≈ f(Area2) + Learning curve, volume, commodity, margins Outline • • • • • • • • Review MIPS – An ISA for Pipelining 5 stage pipelining 5 t i li i Structural and Data Hazards Forwarding Branch Schemes Exceptions and Interrupts Conclusion • Quantify dynamic and static power Quantify dynamic and static power – Capacitance x Voltage2 x frequency, Energy vs. power • Quantify dependability – Reliability (MTTF vs. FIT), Availability (MTTF/(MTTF+MTTR) 3/28/2008 CS252-s06, Lec 02-intro 3 3/28/2008 CS252-s06, Lec 02-intro 4 1 IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy MIPS ‐‐ A "Typical" RISC ISA • • •...
Words: 635 - Pages: 3
...Contents 1.0 Introduction…………………………………………………………………3 2.0 Overview of Industry Life Cycle……………………………………………4 3.0 Literature review of Information Technology………………………………4 4.0 Conclusion for Industry Life Cycle…………………………………………5 5.0 Industry Level Analysis (Dell)………………………………………………6 6.0 Business Strategy……………………………………………………………7 7.0 Enterprise Solutions and service…………………………………………….8 8.0 PEST Analysis of Dell Company…………………………………………...11 9.0 Porters Five Forces of Dell………………………………………………….13 10.0 Stage of Industry Lifecycle of Dell…………………………………………16 11.0 Recommendation to improve performance of Dell…………………………17 12.0 Conclusion…………………………………………………………………..18 Bibliography………………………………………………………………………....19 Appendix…………………………………………………………………………….21 Overview of Industry Life Cycle Industry Life Cycle (ILC) is the stages of evolution through which an industry progresses as it moves from conception to stabilization and stagnation. Different analyses posit different stages of an industry life cycle (usually four to five), but all emphasize that an industry has a beginning, with technological innovation; a period of rapid growth; maturity and consolidation; and finally decline and possibly death. Industry dynamic impacts firm strategy and survival, and it is important to managers understanding that whether firm should compete or cooperate at different stages of the industry life cycle (Wilson & Hynes, 2009). One of the main tenets of how firms and industries evolve is that, as...
Words: 3165 - Pages: 13
...David Stein 6924 Woodman Ave Van Nuys CA 91405 April 18, 2013 Mountorama Inc. 727 Crocker St Los Angeles CA 90021 Within desktop support, as well as, serving as a network administrator, I handled a number of technical, maintenance, and support issues for corporate and branch locations at S3 Business Techs. Specifically, I configured and installed hardware, software, and peripherals — and diagnosed and troubleshot complications pertaining to the local area network (LAN). I worked with virus protection software and utility programs, ensuring that company policies and procedures were followed and that each new feature addressed technological advancements. Stepping up to the plate, you’ll discover I have applied the bulk of my energies to installing the LAN system at ITT Techs in just over 9 months, saving $950,000 in fines — integrated an EDI system and mailboxes. I saved up to $150,000 the first year by implementing a self-help process for end users that eliminated the need for costly technical support on small problems. Specific relevant IT skills include: * Managed LAN network lifecycles on a Windows platform, from software and hardware applications to equipment layout and technical support * In-depth knowledge of LAN maintenance and troubleshooting, including desktop support, configuration, and workstation issues, from initial problem analysis to final end resolution * Integrate amongst technical support, ensuring multiple tasks and parallel...
Words: 266 - Pages: 2
...integration and networking differs from one department to another while some departments work manually. The payroll department currently carries out its own data processing using a mini computer. Due to expansion of the business and complexity of the billing process these processes are automated throughout Florida offices. The marketing and sales department which is headed by Bob Jones runs as a Local Area Network limited the sales and marketing division itself. This connects every personal computer of each account representative. When we come to Accounts receivable division which is headed by Jane Van Dyke, a powerful microcomputer server provides database for both customer billing and bad debts. The accounts payable division that is led by john Lawson functions with its own vender data base stored on an old minicomputer server. This data base holds billing details such as billings of ODI to NDAS and also this division is responsible for the payroll process. A LAN can be established as well since employees here also got PC’s on their desk similar to accounts receivable division. Peter Browne, the maintenance supervisor of the fleet maintenance division refuses to automate his division’s record keeping processes and satisfied with the usual way. Therefore this division has no computer capability. Fleet maintenance division has another part which is ‘Dispatch’. This section also processes its work manually. What is task is to bundle incoming packages. At present this...
Words: 2218 - Pages: 9
...Wireless LAN (WLAN) is being very helpful to connect the more than one devices and it provides the easy internet connection. So that more than one or two PCs (Personal computers) can be connect to Wireless Local Area Network to ease in providing internet connection. PROBLEMS TO RUN MORE THAN ONE PCs ON A WIRELESS LOCAL AREA NETWORK: If a girl wants to connect her four PCs with Wireless Local Area Network then she has to face several problems: LOW SPEED OF INTERNET: The first problem that she faces will be low speed of internet so she will face the problem in running her business that she will have great problem in opening her mail and receiving her important mails and documents regarding to her business. The interference of the signal is the major problem of the low speed of internet. Wireless network may interfere other radiations or network working in the house. Such as radio signals may interrupted by this networking due to which not only internet signals will be reduced but also radio signals will also be affected. And her computer may be infected by internet worm so the speed may slow. Speed of Internet also dependent to the service provider. As the connections are directly related with the speed. The greater the number of connections connected, greater will be distributions of the signals, hence more time will be consumed. So speed will be slowed down. It is much slower than the wired networks. She will be handled more carefully. LARGE NETWORK: Next problem...
Words: 710 - Pages: 3