Summary Basics of IT



Similar documents
Module 1 Concepts of Infor mation Technology (IT) Module Goals

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

Conducting Virtual Meetings

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre

lesson 1 An Overview of the Computer System

Before you start your SKE course:

CIS Mid Semester Examinations

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES

Chapter 12 - Software. Unit 1 Role and function of application software

ERA6 OBJECTIVE QUSESTION

EZblue BusinessServer The All - In - One Server For Your Home And Business

1 PERSONAL COMPUTERS

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

EZblue BusinessServer The All - In - One Server For Your Home And Business

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall

Chapter One Introduction to Computer

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

Understanding Digital Components

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

The computer's internal components

How To Store Data On A Computer (For A Computer)

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O

Computer Basics: Chapters 1 & 2

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

Network Projector Operation Guide

ICT THEORY 4 MAIN AREAS

Question Bank June 2015 R001 Mock

Setting up for Adobe Connect meetings

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Internet and Computing Core Certification Guide Module A Computing Fundamentals

N600 Wireless Dual Band Router

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

Fall Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

FAQ. F-Secure Online Backup

Assiut University, Administration Building, Room 210, Tel

Minimum Computer System Requirements

Kaspersky Internet Security

Chapter 9 The Internet

The Internet and Network Technologies

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance

Join & Leave Meetings

Available on VitalSource

FAQ. F-Secure Online Backup 2.1

User's Guide. Copyright 2012 Bitdefender

FreeAgent GoFlex Home User Guide

HOSTING A LIFEWAY SIMULCAST

Discovering Computers. Technology in a World of Computers, Mobile Devices, and the Internet. Chapter 7. Input and Output

Hassle-Free Meetings. Hold meetings anytime anywhere.

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

Microsoft Office 2010 system requirements

Determining Your Computer Resources

ORGANIZER QUICK REFERENCE GUIDE. Install GoToMeeting. Schedule a Meeting. Start a Scheduled Meeting. Start an Instant Meeting.

Q. The Internet is a global network of computer networks that connects millions of computers. A TRUE B FALSE

Basic Concepts of Information Technology (IT)

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Welcome To VIRTUAL WITHOUT THE VIRTUAL TM. imvp Setup Guide for Windows. imvp with RDP Lab Setup Guide For Windows 1

Computer Hardware HARDWARE. Computer Hardware. Mainboard (Motherboard) Instructor Özgür ZEYDAN

Prof. Dr. M. H. Assal

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

In this chapter you will find information on the following subjects:

Getting Started with Microsoft Office Live Meeting. Published October 2007

Kaspersky Internet Security User Guide

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Help. F-Secure Online Backup

Lecture 6: Operating Systems and Utility Programs

Chap-02, Hardware and Software. Hardware Model

Spontania User Setup Guide

Chapter 5: System Software: Operating Systems and Utility Programs

HOSTED DESKTOP MANUAL

UNIFIED MEETING 5 HELP

How To Watch A Live Webcast On A Pc Or Mac Or Ipad (For Pc Or Ipa)

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

Primary Memory. Input Units CPU (Central Processing Unit)

DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS

Hosting a Lifeway Simulcast

Spontania User Setup Guide

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

BlackArmor NAS 110 User Guide

Some important words and phrases:

8x8 Virtual Room User Guide

Willem Wiechers 3 rd March 2015

User Guide for Windows 10

Introduction to Computer Applications CISY Dr. Zahoor Khan

Contents Chapter 1: Getting Help

A+ Practical Applications Solution Key

SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J A N D O B J 3-2)

It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.

Information and Digital Technology

PolyU Connect Service. Lync Setup and User Guide

Block diagram of typical laptop/desktop

CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX

Major upgrade versions. To see which features each version of Windows 7 has, go to Microsoft's Compare Windows page.

How do I Check if My Computer is Compatible with Windows 7

Web Conferencing from Brother BOARDROOM QUALITY WEB AND VIDEO CONFERENCING MADE EASY.

Discovering Computers

About Parallels Desktop 7 for Mac

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Dragon speech recognition Nuance Dragon NaturallySpeaking 13 comparison by product. Feature matrix. Professional Premium Home.

Transcription:

Summary Basics of IT

1. Hardware Hardware is all the components of the computer and peripheral devices all the parts you can touch: monitor, printer, mouse, computer, hard drive 1.1. Input devices are devices used to input data Mouse, keyboard, Touchpad: to move the cursor on notebooks Touchscreen: Smartphones, Tablets, ebook Reader, navigation devices, machines like ticket machines, ATM s (Automatic teller machines) at banks have a touchsensitive monitor which is operated with finger or stylus. A touchscreen is an input and output device! Scanner: to digitize images, texts. Files in the computer are generated from photos and printed texts. Large companies such as for example insurance immediately scan every letter they receive. The clerks receive, read and edit the scanned documents only on the PC. Webcam: for video transmission via the Internet Microphone 1.2. Output devices make data visible or audible Printer: Laser printer or inkjet printer Screen/monitor Speaker 1.3. Types of computers Mainframe computers or mainframes Large computers storing very large amounts of data. Mainframes are used by large companies like banks, insurance companies or medical aids. Personal Computers (PCs) are used by individuals (in contrast to mainframes): Desktop computers: Computers that are on or adjacent to a table Notebook/Laptop: portable computer Tablet PC: refers to a portable computer with a touch screen without a keyboard. Unlike with notebooks, the user can input with stylus or your finger directly on the screen. 1.4. Main parts of the computer Processor - CPU (Central Processing Unit) The CPU is the central processing unit of a computer. Ports/Interfaces: USB (universal serial bus): for the connection of a variety of external devices such as mouse, keyboard, printer, scanner, Hard drives, USB flash drives, cameras, printers... (Parallel and serial ports have been replaced by USB.) HDMI: (High Definition Multimedia Interface) for the connection of monitors and projectors www.easy4me.info Page 2

Network connection Mouse with USB port HDMI Main Memory / working memory (RAM) for the short-term storage of data. 1.5. Which factors affect computer performance? Processor speed (= CPU speed): is measured in MHz (megahertz) or GHz (gigahertz). Current processors have a clock frequency of up to 4 GHz. Working memory/random access memory (RAM): the larger the RAM memory, the computer less frequently has to read from the much slower hard disk. Current PCs have 4 GB and more RAM. Special activities such as Video editing may require more RAM (up to 64 GB!). An older, slower computer can be made faster by installing more additional RAM. Hard drive: current PCs have hard drive sizes from 500 GB up to 3 TB storage capacity. Number of running programs: when a computer slows down while you are working, close any unnecessary programs to free up RAM space, this speeds up the computer again. 1.6. Storage of data Storage sizes Bit: the smallest unit of information is. It is the State of 0 or 1. Byte: 1 byte Kilobytes (KB) = 8 bits 1,000 bytes Megabytes (MB) 1,000 KB Gigabyte (GB) Terabyte (TB) Mass storage devices 1,000 MB 1,000 GB CD-ROM (Compact Disc): an optical storage medium for music and various forms of data. CD-ROMs are burnt with a CD writer containing a laser light. USB flash drives and memory cards (SD card need a card reader) Instead of writing the correct conversion number of 1024 (= 2¹º), it is simpler to just write it as 1000. Comparison of Storage Capacity DVDs: distinguished from CD-ROMs by their higher storage capacity. www.easy4me.info Page 3

Blue-ray disks: for storing videos A hard disk consists of one or more magnetic discs, which store data permanently. Hard drives can be installed in your PC or be external devices. Current PCs have hard drives of 500 GB to 3 TB. NAS (Network Attached Storage) are storage devices connected to the network. Online storage: offered by service providers on the Internet. Working Memory (RAM = Random Access Memory) The RAM is the amount of working memory (RAM) of a computer. When the computer starts up, a part of the operating system is loaded into RAM. The RAM is a volatile memory: when the electricity is switched off, the memory content is lost. A current PC has RAM memory of 4 GB or more. ROM (Read Only Memory) ROM is also a memory, normally its content can only be read, but not written over. The content of the memory is not deleted by turning off the computer. Each PC has a ROM memory where the BIOS is stored (BIOS Basic Input Output System). The task of the BIOS is, among other things, to make the PC functional after switching it on, and to start up (boot up) the operating system. 2. Software All types of computer programs are called software. Distinction is made between the Operating System (OS) and Application Software (Apps). 2.1. Operating systems An operating system is the software that enables you to use a computer. It manages the access to the hardware (storage, input and output devices) and controls the execution of programs. Well-known operating systems are Windows 7, Windows 8, Windows Vista, Linux, Android (for smartphones), and MacOS. 2.2. Application programs Word processing: E.g. Word or LibreOffice Writer Spreadsheet program: E.g. such as Excel or LibreOffice Calc Databases work with large amounts of data that is entered in tables: E.g. Access or LibreOffice Base. Presentation: E.g. PowerPoint or LibreOffice Impress. With a presentation program, you can make slides for a lecture. The contents of the page can be animated and accompanied with sound / graphics / video. E-mail programs: E.g. Outlook, Windows Mail, Thunderbird Web browser: E.g. Internet Explorer, Firefox, Google Chrome, Opera, Safari You can edit images with an image editing program: E.g. Photoshop, GIMP Computer games www.easy4me.info Page 4

AIDS for people with disabilities: Speech recognition software allows you to input commands and texts with spoken instructions. So you can control the computer without keyboard or mouse. A screen reader program reads the contents of a page on the screen. This way the visually impaired and blind can work with a PC. (Also possible on cellphones) 2.3. Graphical User Interface (GUI) To operate a PC commands and data must be entered into your computer. Nowadays this is done using a graphical user interface (GUI ). A GUI makes it possible to operate application software by means of graphical elements, like icons, shortcuts, buttons, etc. Most of the time this is done by using a mouse to click on or select the graphical Items. In smartphones and tablets it is done on a touch screen. 3. Network terminology LAN (Local Area Network): network within a school or a company. WAN (Wide Area Network): connects distant computers, also across countries. (e.g. the Internet is a WAN). W-LAN (Wireless-Local Area Network): multiple hosts are connected through wireless network cards (almost all laptops have Wi-Fi). Client: E.g. a student computer. Several Client computers can be connected to one Server computer. Server: a computer that provides services to clients is such as File server, Print server, Mail server, Web server... Intranet: is a network (LAN), which is available only within a company (usually in the same building). Extranet: offers the possibility to access the company s network from the Internet. E.g. a representative abroad may log on to the internal corporate network to determine prices, orders, invoices etc. Internet: is the largest computer network. It consists of many smaller networks that link millions of computers. The most important services of the Internet are: E-Mail (electronic mail), WWW (World Wide Web), and FTP (file transfer) 3.1. Data transfer Upload, download and transfer speed of data Upload: you copy data from your computer onto the Internet - for example, a Photo on schuelervz. Download: you download something from the Internet to your own PC - such as a Music file or a program. Bit rate = transfer speed = data transfer rate: It is measured in: bps or bit/s (bits per second) = the number of bits transmitted each second kpbs or Kbit/s (kilobits per second) = 1024 bps (approx. 1000 bps) Mbps (megabits per second) = 1 048 576 bps (approx. 1 million bps) A faster Internet connection (broadband connection) can reach up to 50 Mbps. www.easy4me.info Page 5

4. Information technology in everyday life With the rapid development of computer technology, our everyday life has changed significantly. Many jobs were created in the IT (Information Technology) or ICT (Information and Communication Technology) sectors: Technician, network administrator, programmer, Web Designer... 4.1. Technical terms: E-Commerce (elektronic-commerce): Shopping over the Internet, such as ebay, Amazon or mail orders. It is not bound by time and you can shop from the comfort of your own home! E-banking or online banking: Previously you had to go to the bank to transfer money. Nowadays you can transfer money and ask for the account balance via online banking. E-Government means governing and managing with the help of IT: - submit electronic questions and requests to authorities online - receive information electronically - cut through bureaucracy E.g. by downloading forms, submitting employee tax assessments at the tax office over the Internet, etc. - also see help.gv.at E-learning: Learning on the computer e.g. using platforms such as Moodle or easy4me.info or various other tutorials. - CBT (Computer Based Training): using tutorials on DVD s and CD s. - WBT (Web Based Training): Learning via the Internet - You can learn (almost) anywhere, anytime - Tutorials with pictures and movies, make learning more interesting and easier. Telework from home: the results of the work are transmitted to the company via the Internet. - Advantages: fewer trips to work, flexible working hours, less office space needed in the company. - Disadvantages: less contact with colleagues, team work is more difficult. 4.2. Electronic communications E-Mail: Electronic mail Instant Messaging: Conversations in real time: chat via Facebook, Google chat or Microsoft Live Messenger Internet telephoning (VOIP: Voice over IP) E.g. with Skype. The conversation is transmitted over the Internet. A broadband connection is a high speed internet connection. Typically a monthly flat rate is paid. A PC with a broadband connection is constantly online. It must therefore be protected against attacks from the Internet: Regular updates for antivirus and firewall are absolutely necessary to ensure the security for the computer. www.easy4me.info Page 6

Dial up access: E.g. Mobile Internet access via the mobile phone network. The Internet access is only established when needed. RSS feed: Service on Web pages similar to a news ticker, it contains the headings with a short text and a link to the original webpage. Web log (blog): a kind of diary on the Internet E.g. http://scienceblogs.de RSS feed Podcast: Podcasting refers to the production and supply of audio or video files over the Internet. Podcast is composed of the two words ipod and broadcasting. You can regard podcasts as radio or television broadcasts which you can view or listen to independent of broadcasting times. You'll find many podcasts on www.podcast.at 4.3. Online communities - virtual communities E.g. facebook, twitter, myspace, flickr have thousands to millions of members have and provide an opportunity for geographically distant people to form a community. Young people and children should observe a few rules: Be sparse with your personal/private information: don t use your complete name and address, use you first name or nickname only. Think about your profile image - you cannot know what others will do with your picture! Rather choose neutral and harmless images, and not over-the-top pictures. The whole world can see this picture! Beware of online friends you have never met in person! You cannot be sure whether someone really is who they say they are. Be very careful of meeting online friends - only meet in public and safe places! Posts in forums are visible to the public: write only what you still want to read in some years! Careless statements can still be found years later, when you might have a completely different opinion. Don t use pictures or videos of other people without asking their permission! Copyright issues can result in high fines. Do not join in cyber-bullying; rather help the victims of bullying! Bullying is not only despicable behaviour; in some cases it is even considered a criminal offence! www.easy4me.info Page 7

4.4. Ergonomics and health Ergonomics aims to protect workers from physical harm caused by their work. The workplace and its surroundings should be optimally designed: Proper lighting - no glare - no backlight (E.g. monitor at a right angle to the window) Correct position of the keyboard and monitor - height-adjustable, swivel chair. Long working hours on the computer - you should take breaks in-between, stand up and stretch. Un-ergonomic workplaces can lead to physical ailments and chronic conditions! 4.5. Computers and the environment - What can I do? Printer and toner cartridges - if possible, re-fill or recycle. Electricity - PC needs to be turned off computer when not in use. Current PCs go into a sleep-mode with minimal power consumption when not in use. 5. Data security 5.1. Not everyone has access to data - user identification On many computers, important data is stored which not everyone should read or copy. Users must therefore log on with a user name and password so that they only have access to the data to which they are entitled. Your user name and password is confidential and may not be passed on to unauthorised persons. A good password is a password that cannot be guessed easily: use capital and small case letters use numbers use special characters the password should be more than 8 characters the password should not be from a dictionary 5.2. Backup securing data The computer is broken - where is my data? If a hard disk is faulty or if a fire breaks out, computer data can be destroyed. Therefore making security copies (backups) on external disk (Hard drives, DVDs, etc.) which you store in a different location helps you recover data in the event of an accident. Also through computer theft data can be lost. Notebooks can be protected against theft by a steel cable with a lock. www.easy4me.info Page 8

5.3. Firewall The firewall controls data transfer between computers. It protects computers from unwanted access over the network. Modern operating systems like Linux, Windows XP, Vista and Windows 7 have a firewall software, but it can also be provided through other hardware (E.g. Many routers also have a firewall feature). 5.4. Computer viruses - malicious software What is a computer virus? Computer viruses are unwanted programs that spread independently. If the computer responds more slowly than usual, or no longer works as usual, a computer virus can be the cause. Computer viruses can spy out important personal data and forward it or even destroy it, therefore you should seriously avoid a virus attack! How does a virus get on my PC? Infected files can be sent as an E mail attachment or copied to your PC from Internet downloads. When an infected program is opened, the virus spreads. Also when you visit a Web page, your computer can be infected. The risk is particularly high when using an operating system or browser without the latest security updates. How do I protect myself against computer viruses? don t install any programs from unsafe sources don t open any E-mail attachments from unknown senders install free anti virus software such as Microsoft Security Essentials, Avira, AVG Antivirus free Antivirus programs must be updated daily if possible so that they recognize the latest viruses. The latest security updates for your operating system should be installed. 6. Copyright Every person who writes a text, paints a picture, composed music, takes photos automatically owns the copyright. He can sell copies of his work and can claim financial compensated for illegal copies. So if someone copies third-party images or text without permission and publishes them on his home page, he commits a breach of copyright that may result in paying a fine. There are several terms that describe the permitted use for software: Freeware: Freeware can be used free of charge. Shareware: These programs may be used free of charge for a certain period of time to test them. After this trial period expires, the program will prompt the user to purchase the full version. www.easy4me.info Page 9

OpenSource: in addition to allowing users to share this software with others freely, it also allows users to view its source code and to make changes to it. Examples of this are the Linux operating system and the programs LibreOffice, Firefox, GIMP, and many other programs. Commercial software - such as Microsoft Word, Excel, PowerPoint, Windows 8, Photoshop... You need to buy this software, copying it is illegal! At the time of purchase often a registration code is given which needs to be entered when installing the program for the first time. The permitted use of a purchased program is regulated in the user license or end user license: it usually states that the program may only be installed on one computer. Lawfully purchased (licensed) software can be recognized by the product ID and Product Registration to your name or company name. 7. Epilogue Help to improve this text! If you have suggestions write to the team at easy4me.info www.easy4me.info Page 10