Computer Basics Summary
Computer Basics
- Computers are electronic devices that process data through input, processing, output, and storage.
- Consist of hardware (physical components) and software (instructions and data).
Hardware Components
- Input devices: Examples include keyboard, mouse, microphone, scanner, webcam. Commonly used for data entry.
- Output devices: Examples include monitors, printers, speakers. Convert processed data to human-readable form.
Central Processing Unit (CPU)
- The CPU is the brain of the computer, responsible for processing.
- Comprised of:
- Arithmetic Logic Unit (ALU): Performs arithmetic and logical operations.
- Control Unit (CU): Coordinates components, manages instructions.
- Registers: Fast storage for immediate data processing.
Memory Types
- Primary Memory:
- RAM (Random Access Memory): Temporary storage, volatile.
- ROM (Read-Only Memory): Permanent storage, non-volatile.
- Secondary Memory: Permanent data storage. Examples include hard drives, optical disks, flash disks.
Software Types
- System software: Manages hardware components, includes operating systems.
- Application software: Used to perform specific tasks (e.g., word processors, spreadsheets).
Data Understanding
- Data: Unorganized facts.
- Information: Contextualized data, answers questions like who, what, where.
- Knowledge: Applied information, answering how questions.
Characteristics of Computers
- Speed: Fast processing of data (millions of instructions/second).
- Accuracy: High precision in computations.
- Diligence: Can perform tasks without fatigue.
- Storage Capability: Large amounts of data retainable.
- Versatility: Able to perform various tasks seamlessly.
Computer Classifications
- Personal Computer (PC): Single user computer.
- Workstation: More powerful PC.
- Minicomputer: Multi-user support.
- Mainframe: Supports many users simultaneously.
- Supercomputer: Extremely fast, processes millions of instructions.
Virus Types
- Viruses: Attach to programs, replicate and may cause harm.
- Trojan Horses: Disguise as legitimate software but cause damage.
- Worms: Replicate across networks using security holes.
Best Practices
- Install and regularly update antivirus software.
- Conduct virus scans before opening new files.
- Be cautious of files from unknown sources, including online communities.
- Backup important data to prevent loss due to infections.