1 / 36

Computers and Digital Basics

Chapter 1: Computers and Digital Basics. 2. Chapter Contents. Section B: Digital DevicesSection C: Digital Data RepresentationSection D: Digital ProcessingSection E: Password Security. Chapter 1: Computers and Digital Basics. 3. Digital Devices. Computer BasicsPersonal Computers, Servers, Mainfr

cherlin
Download Presentation

Computers and Digital Basics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Computers and Digital Basics Chapter 1

    2. Chapter 1: Computers and Digital Basics 2 Chapter Contents Section B: Digital Devices Section C: Digital Data Representation Section D: Digital Processing Section E: Password Security

    3. Chapter 1: Computers and Digital Basics 3 Digital Devices Computer Basics Personal Computers, Servers, Mainframes, and Supercomputers PDAs, Portable Players, and Smart Phones Microcontrollers

    4. Chapter 1: Computers and Digital Basics 4 Computer Basics A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions Figure 1-12Figure 1-12

    5. Chapter 1: Computers and Digital Basics 5 Computer Basics Computer input is whatever is typed, submitted, or transmitted to a computer system Output is the result produced by a computer Data refers to the symbols that represent facts, objects, and ideas Computers manipulate data in many ways, and this manipulation is called processing Central Processing Unit (CPU) Microprocessor Figure 1-13Figure 1-13

    6. Chapter 1: Computers and Digital Basics 6 Computer Basics Memory is an area of a computer that temporarily holds data waiting to be processed, stored, or output Storage is the area where data can be left on a permanent basis when it is not immediately needed for processing A file is a named collection of data that exists on a storage medium The series of instructions that tells a computer how to carry out processing tasks is referred to as a computer program Software

    7. Chapter 1: Computers and Digital Basics 7 Computer Basics A stored program means that a series of instructions for a computing task can be loaded into a computer’s memory Allows you to switch between tasks Distinguishes a computer from other simpler devices

    8. Chapter 1: Computers and Digital Basics 8 Computer Basics Application software is a set of computer programs that helps a person carry out a task The primary purpose of system software is to help the computer system monitor itself in order to function efficiently Operating system (OS)

    9. Chapter 1: Computers and Digital Basics 9 Personal Computers, Servers, Mainframes, and Supercomputers A personal computer is a microprocessor-based computing device designed to meet the computing needs of an individual Figure 1-14Figure 1-14

    10. Chapter 1: Computers and Digital Basics 10 Personal Computers, Servers, Mainframes, and Supercomputers The term workstation has two meanings: An ordinary personal computer that is connected to a network A powerful desktop computer used for high-performance tasks Figure 1-15Figure 1-15

    11. Chapter 1: Computers and Digital Basics 11 Example: Workstation Computer http://www.dell.com/

    12. Chapter 1: Computers and Digital Basics 12 Personal Computers, Servers, Mainframes, and Supercomputers A videogame console, such as Nintendo’s Wii, Sony’s PlayStation, or Microsoft’s Xbox, are not generally referred to as personal computers because of their history as dedicated game devices Figure 1-16Figure 1-16

    13. Chapter 1: Computers and Digital Basics 13 Personal Computers, Servers, Mainframes, and Supercomputers The purpose of a server is to serve computers on a network (such as the Internet or a home network) by supplying them with data A mainframe computer (or simply a mainframe) is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users A computer falls into the supercomputer category if it is, at the time of construction, one of the fastest computers in the world A compute-intensive problem is one that requires massive amounts of data to be processed using complex mathematical calculations

    14. Chapter 1: Computers and Digital Basics 14 Personal Computers, Servers, Mainframes, and Supercomputers Figures 1-17 – 1-18Figures 1-17 – 1-18

    15. Chapter 1: Computers and Digital Basics 15 The Digital Revolution A computer network is a group of computers linked by wired or wireless technology to share data and resources The Web is a collection of linked documents, graphics, and sounds that can be accessed over the Internet Cyberspace is a term that refers to entities that exist largely within computer networks

    16. Chapter 1: Computers and Digital Basics 16 PDAs, Portable Players, and Smart Phones A PDA (personal digital assistant) is a pocket-sized digital appointment book with a small qwerty keyboard or a touch-sensitive screen, designed to run on batteries and be used while holding it A handheld computer is essentially a PDA enhanced with features such as removable storage, e-mail, Web access, voice communications, built-in camera, and GPS A smart phone, which in addition to voice communication, includes features such as full qwerty keypad, text messaging, e-mail, Web access, removable storage, camera, FM radio, digital music player, and software options for games, financial management, personal organizer, GPS, and maps iPods and similar devices are classified as portable media players because their main strength is playing music, showing videos, and storing photos

    17. Chapter 1: Computers and Digital Basics 17 PDAs, Portable Players, and Smart Phones Figures 1-19, 1-20, 1-21Figures 1-19, 1-20, 1-21

    18. Chapter 1: Computers and Digital Basics 18 Microcontrollers A microcontroller is a special-purpose microprocessor that is built into the machine it controls Microcontrollers can be embedded in all sorts of everyday devices Figure 1-22Figure 1-22

    19. Chapter 1: Computers and Digital Basics 19 Digital Data Representation Data Representation Basics Representing Numbers, Text, and Pictures Quantifying Bits and Bytes Circuits and Chips

    20. Chapter 1: Computers and Digital Basics 20 Data Representation Data representation refers to the form in which data is stored, processed, and transmitted Digital devices work with distinct and separate data Analog devices work with continuous data Figure 1-23Figure 1-23

    21. Chapter 1: Computers and Digital Basics 21 Representing Numbers, Text, and Pictures Numeric data Binary number system Character data ASCII, Extended ASCII, EBCDIC, and Unicode Digitizing is the process of converting analog data into digital format Figure 1-24Figure 1-24

    22. Chapter 1: Computers and Digital Basics 22 Example: Binary Representation Representing data with binary values has been around for a long time. For example, Morse code uses a series of short and long signals to represent values. http://en.wikipedia.org/wiki/Morse_code

    23. Chapter 1: Computers and Digital Basics 23 Data Representation Figures 1-25 – 1-26Figures 1-25 – 1-26

    24. Chapter 1: Computers and Digital Basics 24 Quantifying Bits and Bytes Figure 1-29Figure 1-29

    25. Chapter 1: Computers and Digital Basics 25 Digital Processing Programs and Instruction Sets Processor Logic

    26. Chapter 1: Computers and Digital Basics 26 Programs and Instruction Sets Computers, portable media players, handheld computers, and smart phones all work with digital data Computer programmers create programs that control digital devices. These programs are usually written in a high-level programming language The human-readable version of a program, like the one above, created in a high-level language by a programmer is called source code

    27. Chapter 1: Computers and Digital Basics 27 Programs and Instruction Sets Figures 1-34 – 1-35Figures 1-34 – 1-35

    28. Chapter 1: Computers and Digital Basics 28 Programs and Instruction Sets Figure 1-36Figure 1-36

    29. Chapter 1: Computers and Digital Basics 29 Password Security Authentication Protocols Password Hacks Password Security

    30. Chapter 1: Computers and Digital Basics 30 Authentication Protocols Security experts use the term authentication protocol to refer to any method that confirms a person’s identity using something the person knows, something the person possesses, or something the person is A user ID is a series of characters—letters and possibly numbers or special symbols—that becomes a person’s unique identifier A password is a series of characters that verifies a user ID and guarantees that you are the person you claim to be A person can also be identified by biometrics, such as a fingerprint, facial features (photo), or retinal pattern

    31. Chapter 1: Computers and Digital Basics 31 Authentication Protocols Figure 1-42Figure 1-42

    32. Chapter 1: Computers and Digital Basics 32 Password Hacks When someone gains unauthorized access to your personal data and uses it illegally, it is called identity theft Hackers can employ a whole range of ways to steal passwords A dictionary attack helps hackers guess your password by stepping through a dictionary containing thousands of the most commonly used passwords The brute force attack also uses password-cracking software, but its range is much more extensive than the dictionary attack

    33. Chapter 1: Computers and Digital Basics 33 Password Hacks If hackers can’t guess a password, they can use another technique called sniffing, which intercepts information sent out over computer networks A keylogger (or keystroke logger) is software that secretly records a user’s keystrokes and sends the information to a hacker

    34. Chapter 1: Computers and Digital Basics 34 Password Security Figure 1-45Figure 1-45

    35. Chapter 1: Computers and Digital Basics 35 Password Security Strive to select a unique user ID that you can use for more than one site Maintain two or three tiers of passwords Figure 1-46Figure 1-46

    36. Chapter 1: Computers and Digital Basics 36 Password Security A password manager is utility software that generates secure passwords and stores them along with user IDs and their corresponding sites Figures 1-47 and 1-48Figures 1-47 and 1-48

    37. Chapter 1 Complete Computers and Digital Basics

More Related