Computer Basics Summary

Computer Basics

  • Computers are electronic devices that process data through input, processing, output, and storage.
  • Consist of hardware (physical components) and software (instructions and data).

Hardware Components

  • Input devices: Examples include keyboard, mouse, microphone, scanner, webcam. Commonly used for data entry.
  • Output devices: Examples include monitors, printers, speakers. Convert processed data to human-readable form.

Central Processing Unit (CPU)

  • The CPU is the brain of the computer, responsible for processing.
  • Comprised of:
    • Arithmetic Logic Unit (ALU): Performs arithmetic and logical operations.
    • Control Unit (CU): Coordinates components, manages instructions.
    • Registers: Fast storage for immediate data processing.

Memory Types

  • Primary Memory:
    • RAM (Random Access Memory): Temporary storage, volatile.
    • ROM (Read-Only Memory): Permanent storage, non-volatile.
  • Secondary Memory: Permanent data storage. Examples include hard drives, optical disks, flash disks.

Software Types

  • System software: Manages hardware components, includes operating systems.
  • Application software: Used to perform specific tasks (e.g., word processors, spreadsheets).

Data Understanding

  • Data: Unorganized facts.
  • Information: Contextualized data, answers questions like who, what, where.
  • Knowledge: Applied information, answering how questions.

Characteristics of Computers

  • Speed: Fast processing of data (millions of instructions/second).
  • Accuracy: High precision in computations.
  • Diligence: Can perform tasks without fatigue.
  • Storage Capability: Large amounts of data retainable.
  • Versatility: Able to perform various tasks seamlessly.

Computer Classifications

  • Personal Computer (PC): Single user computer.
  • Workstation: More powerful PC.
  • Minicomputer: Multi-user support.
  • Mainframe: Supports many users simultaneously.
  • Supercomputer: Extremely fast, processes millions of instructions.

Virus Types

  • Viruses: Attach to programs, replicate and may cause harm.
  • Trojan Horses: Disguise as legitimate software but cause damage.
  • Worms: Replicate across networks using security holes.

Best Practices

  • Install and regularly update antivirus software.
  • Conduct virus scans before opening new files.
  • Be cautious of files from unknown sources, including online communities.
  • Backup important data to prevent loss due to infections.