Jomana Islam
@jomanaa
0.0(0)
1 followers
0 following
Level 4
5
77/90 XP

Streak

1

XP

337

flashcards Flashcard (10)
studied byStudied by 0 people
4 days ago
0.0(0)
note Note
studied byStudied by 1 person
4 days ago
0.0(0)
note Note
studied byStudied by 1 person
5 days ago
0.0(0)
flashcards Flashcard (9)
studied byStudied by 0 people
5 days ago
0.0(0)
1. Von Neumann Cycle (Fetch-Decode-Execute Cycle) The Von Neumann architecture follows a structured sequence of steps to i process instructions: 1. Fetch: The CPU retrieves an instruction from memory. 2. Decode: The instruction is interpreted. 3. Execute: The CPU carries out the instruction. Components of the CPU involved in the Cycle: • Memory Address Register (MAR): Holds the address of the instruction/data being accessed. • Memory Data Register (MDR): Holds the actual instruction or data fetched. • Control Unit (CU): Manages data flow and execution of instructions. • Program Counter (PC): Keeps track of the address of the next instruction. • Registers: Small memory units inside the CPU that store temporary data. 2. CPU Performance Factors The CPU’s efficiency depends on multiple factors: • Clock Speed: Measured in Hertz (Hz), higher clock speeds allow more instructions to be processed per second. • Number of Cores: More cores enable simultaneous execution of multiple tasks (parallel processing). • Cache Memory: Stores frequently used data for quick access, reducing delays from fetching data from RAM. • Bus Width: Determines how much data can be transferred at once, impacting system speed. 3. Memory & Storage Types Primary Memory (Volatile) • RAM (Random Access Memory): Stores active programs and data; erased when power is lost. • Cache Memory: Built into the CPU for faster access than RAM. • Registers: Even faster, used for immediate data processing. Secondary Memory (Non-Volatile) • Hard Disk Drive (HDD): Uses magnetic storage, slower but cheaper. • Solid-State Drive (SSD): Faster than HDDs, uses flash memory. • Optical Discs (CD/DVD): Used for media and data backup. Virtual Memory • When RAM is full, part of the hard drive is used as “extra” memory. • Slower than real RAM but prevents system crashes. Read-Only Memory (ROM) • Stores permanent data, such as firmware and system boot instructions. 4. Input & Output Devices Input Devices (Used to Enter Data) • Keyboard, Mouse, Touchscreen • Microphone (For Voice Input) • Scanners & Sensors (For Digital Conversion) Output Devices (Display or Provide Results) • Monitor (Visual Output) • Speakers (Audio Output) • Printers (Physical Document Output) Storage Devices (For Data Retention) • USB Flash Drives, External Hard Drives • Cloud Storage (Online Storage Solutions) 5. Operating Systems (OS) The OS is responsible for managing hardware and software resources: • Functions of an OS: • Memory Management: Allocates RAM efficiently. • Process Management: Manages running programs. • File System Management: Organizes storage. • Security & User Management: Provides user authentication. • Examples of OS: • Windows, macOS, Linux (For PCs) • Android, iOS (For Mobile Devices) 6. Networking & Internet Concepts Types of Networks • LAN (Local Area Network): Covers small areas like homes or offices. • WAN (Wide Area Network): Covers large areas, including the internet. • Wired Networks: Use cables (Ethernet) for fast, stable connections. • Wireless Networks: Use Wi-Fi, Bluetooth, or mobile networks. Networking Concepts • IP Address: Unique identifier for devices on a network. • MAC Address: Hardware address of a device. • Protocols: Rules for communication (e.g., TCP/IP for the internet). 7. Cybersecurity & Threats Types of Cyber Threats • Malware (Viruses, Trojans, Ransomware): Harmful software that damages or steals data. • Phishing: Fake emails or messages tricking users into giving personal data. • Hacking & Unauthorized Access: Breaches in system security. Preventative Measures • Firewalls: Block unauthorized access. • Antivirus Software: Detects and removes malware. • Encryption: Converts data into unreadable format for security. • Multi-Factor Authentication (MFA): Adds extra layers of security beyond passwords. Final Thoughts This document covers essential topics related to computer architecture, hardware, memory, networking, and securit
flashcards Flashcard (10)
studied byStudied by 0 people
15 days ago
0.0(0)
1. Von Neumann Cycle (Fetch-Decode-Execute Cycle) The Von Neumann architecture follows a structured sequence of steps to i process instructions: 1. Fetch: The CPU retrieves an instruction from memory. 2. Decode: The instruction is interpreted. 3. Execute: The CPU carries out the instruction. Components of the CPU involved in the Cycle: • Memory Address Register (MAR): Holds the address of the instruction/data being accessed. • Memory Data Register (MDR): Holds the actual instruction or data fetched. • Control Unit (CU): Manages data flow and execution of instructions. • Program Counter (PC): Keeps track of the address of the next instruction. • Registers: Small memory units inside the CPU that store temporary data. 2. CPU Performance Factors The CPU’s efficiency depends on multiple factors: • Clock Speed: Measured in Hertz (Hz), higher clock speeds allow more instructions to be processed per second. • Number of Cores: More cores enable simultaneous execution of multiple tasks (parallel processing). • Cache Memory: Stores frequently used data for quick access, reducing delays from fetching data from RAM. • Bus Width: Determines how much data can be transferred at once, impacting system speed. 3. Memory & Storage Types Primary Memory (Volatile) • RAM (Random Access Memory): Stores active programs and data; erased when power is lost. • Cache Memory: Built into the CPU for faster access than RAM. • Registers: Even faster, used for immediate data processing. Secondary Memory (Non-Volatile) • Hard Disk Drive (HDD): Uses magnetic storage, slower but cheaper. • Solid-State Drive (SSD): Faster than HDDs, uses flash memory. • Optical Discs (CD/DVD): Used for media and data backup. Virtual Memory • When RAM is full, part of the hard drive is used as “extra” memory. • Slower than real RAM but prevents system crashes. Read-Only Memory (ROM) • Stores permanent data, such as firmware and system boot instructions. 4. Input & Output Devices Input Devices (Used to Enter Data) • Keyboard, Mouse, Touchscreen • Microphone (For Voice Input) • Scanners & Sensors (For Digital Conversion) Output Devices (Display or Provide Results) • Monitor (Visual Output) • Speakers (Audio Output) • Printers (Physical Document Output) Storage Devices (For Data Retention) • USB Flash Drives, External Hard Drives • Cloud Storage (Online Storage Solutions) 5. Operating Systems (OS) The OS is responsible for managing hardware and software resources: • Functions of an OS: • Memory Management: Allocates RAM efficiently. • Process Management: Manages running programs. • File System Management: Organizes storage. • Security & User Management: Provides user authentication. • Examples of OS: • Windows, macOS, Linux (For PCs) • Android, iOS (For Mobile Devices) 6. Networking & Internet Concepts Types of Networks • LAN (Local Area Network): Covers small areas like homes or offices. • WAN (Wide Area Network): Covers large areas, including the internet. • Wired Networks: Use cables (Ethernet) for fast, stable connections. • Wireless Networks: Use Wi-Fi, Bluetooth, or mobile networks. Networking Concepts • IP Address: Unique identifier for devices on a network. • MAC Address: Hardware address of a device. • Protocols: Rules for communication (e.g., TCP/IP for the internet). 7. Cybersecurity & Threats Types of Cyber Threats • Malware (Viruses, Trojans, Ransomware): Harmful software that damages or steals data. • Phishing: Fake emails or messages tricking users into giving personal data. • Hacking & Unauthorized Access: Breaches in system security. Preventative Measures • Firewalls: Block unauthorized access. • Antivirus Software: Detects and removes malware. • Encryption: Converts data into unreadable format for security. • Multi-Factor Authentication (MFA): Adds extra layers of security beyond passwords. Final Thoughts This document covers essential topics related to computer architecture, hardware, memory, networking, and securit
note Note
studied byStudied by 0 people
15 days ago
0.0(0)
flashcards Flashcard (25)
studied byStudied by 0 people
21 days ago
0.0(0)
note Note
studied byStudied by 0 people
21 days ago
0.0(0)
No content found

They're not following anyone

Start following them and they
might follow you back 😉