Computing Fundamentals-Chall

advertisement
Computing Fundamentals IC3
Computers and Computer
Systems
Computing Fundamentals
1
Major Unit Concepts







Understand the importance of computers.
Define computers and computer systems.
Classify computers.
Use computer systems.
Identify system components.
Identify types of storage devices.
Explore computers in your future.
Computing Fundamentals
2
Vocabulary






arithmetic/logic
unit (ALU)
central
processing unit
(CPU)
circuit board
computer
control unit
Data







hard disk
hardware
information
memory
mobile device
motherboard
notebook
computer
Computing Fundamentals
3
Vocabulary







random access memory
(RAM)
read-only memory
(ROM)
server
software
supercomputer
tablet PC
USB flash drive
Computing Fundamentals
4
Understanding the Importance of
Computers


The computer is one of the most important
inventions of the past century.
You find computers and computer
technology everywhere—from businesses
and financial organizations, to home
electronics and appliances, to personal
applications.
Computing Fundamentals
5
Understanding the Importance of
Computers (continued)
Computers are used everyday:





Educational institutions use computers to enhance
instruction and learning.
Video game systems are computerized.
Banks use ATM’s so you can withdrawal money from
you bank account in almost any location in the
world.
Computers are used by television and at the movies.
Mobile computing, text messaging, or email allow
you to communicate with people almost everywhere.
Computing Fundamentals
6
Understanding the Importance of
Computers (continued)
Computers have been around for more
than 60 years.
 A Brief History of the Computer:




The first computers were developed in the late
1940s and early 1950s for use by the military
and government.
In 1971, Dr. Ted Hoff developed the
microprocessor.
The first Apple computer was built in 1976 by
Steve Jobs and Steve Wozniak.
The IBM PC was introduced in 1981 by Bill
Gates. He worked with IBM to develop the first
Disk Operating System.
Computing Fundamentals
7
Defining Computers and Computer
Systems


A computer is an electronic device that receives data
(input), processes data, stores data, and produces a
result (output).
A computer system includes hardware, software,
data, and people.
Computing Fundamentals
8
Defining Computers and Computer
Systems (continued)




The actual machine—wires, transistors, and
circuits—is called hardware.
Software consists of instructions or
programs for controlling the computer.
Data is text, numbers, sound, images, or
video.
The computer receives data through an
input device, process the data, produces
the output (or information), and stores the
data and information on a storage device.
Computing Fundamentals
9
Defining Computers and Computer
Systems (continued)
Computers perform only 2
operations:
 Arithmetic Computations: addition,
subtraction, multiply, divide, and
comparisons.
 Logical Operations: AND, OR, and
NOT
Computing Fundamentals
10
Classifying Computers







Special-purpose computers are used mostly
to control something else.
General-purpose computers are divided into
categories, based on their physical size,
function, cost, and performance:
Desktop and notebook
computers
Server
Mobile devices
Tablet PC
Mainframe computer






Computing Fundamentals
Supercomputer
Embedded computers
Portable players
Calculators
Computer game systems
Electronic book readers
11
Using Computer Systems

Computers are used for all kinds of tasks.
They take raw data and change it into
information. An example of the procedure:




You enter programs and data with some
type of input device.
The computer uses instructions to process
the data and to turn it into information.
You send the information to some type of
output device.
You store it for later retrieval.
Computing Fundamentals
12
Using Computer Systems
(continued)

Computer components
Computing Fundamentals
13
Identifying System Components

The motherboard is a circuit board that
contains integral components—central
processing unit, memory, connectors, and
expansion ports and slots.
Computing Fundamentals
14
Identifying System Components
(continued)
The Central
Processing Unit:
 The central
processing unit
(CPU) is the brains
of the computer.
 The CPU has two
primary sections:
the arithmetic/logic
unit and the control
unit.
Computing Fundamentals
15
Identifying System Components
(continued)






The Arithmetic/Logic Unit:
The arithmetic/logic unit (ALU) performs
arithmetic computations and logical operations.
The Control Unit:
The control unit coordinates all of the
processor’s activities.
You communicate with the computer through
programming languages.
The computer uses machine language, or
binary code, which contains only 1s and 0s.
Computing Fundamentals
16
Identifying System Components
(continued)
Recognizing How a Computer Represents Data:
 In machine language, the control unit sends out
necessary messages to execute the instructions. A
single zero or a single one is a bit. A byte is a
single character. Each bit is equal to 1 byte.
Computing Fundamentals
17
Identifying System Components
(continued)
Memory



Memory is where data is stored on the
motherboard.
Memory can be short term or long term.
When you want to store a file or
information permanently, you use
secondary storage devices such as the
computer’s hard drive or a USB drive. You
might think of this as long term memory.
Computing Fundamentals
18
Identifying System Components
(continued)


Random Access Memory
The memory on the motherboard is short
term, called random access memory (RAM).
Data, information, and program
instructions are stored temporarily on a
RAM chip and disappear when the computer
is turned off.
Computing Fundamentals
19
Identifying System Components
(continued)


Random Access Memory (cont)
The instruction cycle is the amount of time
it takes to retrieve instructions to perform a
specified task and complete the command.
The execution cycle refers to the amount of
time it takes the CPU to execute the
instruction and store the results in RAM.
Computing Fundamentals
20
Identifying System Components
(continued)

Random Access Memory (cont)
Together, the instruction cycle and one or
more execution cycles create a machine
cycle.
Computing Fundamentals
21
Identifying System Components
(continued)
Random Access Memory (cont):

For every instruction, a processor repeats a set of
four basic operations, which compose a machine
cycle:
1.
Fetching is the process of obtaining a program
instruction or data item from RAM
2.
Decoding refers to the process of translating the
instruction into signals the computer can
execute.
3.
Executing is the process of carrying out the
commands.
4.
Storing, in this context, means writing the
result to memory (not to a storage medium).
Computing Fundamentals
22
Identifying System Components
(continued)

Random Access Memory (cont):
Computing Fundamentals
23
Identifying System Components
(continued)




Read-Only Memory:
Another type of memory found on the
motherboard is read-only memory (ROM).
ROM chips store specific instructions that
are needed for computer operations. These
instructions remain on the chip even when
the power is turned off.
The more common of these is the BIOS
ROM, containing instructions to start the
system when you turn on the computer.
Computing Fundamentals
24
Identifying Types of Storage
Devices
To keep a permanent copy of data,
you must store it on a storage
device.
Magnetic Storage Devices:



Data is stored in numbered Tracks.
Tracks are labeled and kept in a special
log on the disk called a file allocation
table (FAT).
Types of magnetic storage media
include hard disks, magnetic, tape, 3 ½
-inch disks and zip disks.
Computing Fundamentals
25
Identifying Types of Storage
Devices
Hard Disks:





Also called hard drives
Store date inside the computer
Can be internal or external
Internal hard disks advantages: speed and
capacity
Size measured in gigabytes or terabytes.
Computing Fundamentals
26
Identifying Types of Storage
Devices (continued)
Optical Storage
Devices:




Use laser technology to read
and write data on plastic
platters that contain a metal
layer, like CDs and DVDs.
CD-R - Can be ready only by
CD-ROM drive. After it is
written, it cannot be changed.
CD-RW- Rewritable type that
allows you to write on it
several times.
Blu-Ray – Provides more than
5 times the storage capacity of
traditional DVD’s. Can hold up
to 50 GB and was developed
for HD videos.
Computing Fundamentals
27
Identifying Types of Storage
Devices (continued)
Solid-State Storage Media




Removable medium that uses integrated circuits, such as
a USB flash drive.
Processed electronically and contains no mechanical
devices.
Can be used in cameras, smart phones, and computers.
USB flash drive is most popular removable storage device.
Computing Fundamentals
28
Identifying Types of Storage
Devices (continued)



Network Drives
Hard drive or tape drive connected to a
network server and is available to and
shared by multiple users.
Located on a computer other than the local
user’s computer.
Remote storage is used to extend disk
space on a server and to eliminate the
addition of more hard disks or other
storage devices.
Computing Fundamentals
29
Caring for Storage Media






Keep away from magnetic fields.
Avoid extreme temperatures.
Remove media from drives and store them
properly when not in use.
When handling DVDs and other optical
discs, hold them at the edges.
Never try to remove the media from a drive
when the drive indicator light is on.
Keep discs in a sturdy case when
transporting.
Computing Fundamentals
30
Exploring Computers in Your
Future



A major focus of new types of computers is
connectivity, or the ability to connect with
other computers.
Wireless and mobile devices are now as
common as wired desktop machines.
Computer literacy, which is the knowledge
and understanding of computers and their
uses, will become even more important.
Computing Fundamentals
31
Assignments






TIC-TAC-TOE
Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—
horizontally, vertically, or diagonally—or in the 4
corners, you made decide to be finished. Or you
may decide to keep going and complete more
activities.
Star the activities you plan to complete. Color in the
box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE
Review
Take end of section quiz
Computing Fundamentals
32
Continue on to next section
Computing Fundamentals
33
Computing Fundamentals IC3
Input, Output,
and Processing
Computers and Computer Systems
34
Major Unit Concepts




Identify and describe standard and
specialized input devices.
Identify and describe standard and
specialized output devices.
Connect input and output devices to
a computer.
Consider computer performance
factors.
Computing Fundamentals
35
Vocabulary







audio input
biometrics
digital camera
expansion slot
FireWire
inkjet printer
input







keyboard
laser printer
modem
monitor
mouse
output
plug and play
Computing Fundamentals
36
Vocabulary (continued)






pointing device
port
printer
scanner
trackball
Universal Serial Bus (USB)
Computing Fundamentals
37
Standard Input Devices



Input , which is data , must be
entered into computer and then
stored on a storage media device.
To turn the data into information,
CPU (Central Processing Unit)
processes the data.
After data is processed, it is
“presented” to the user through an
output device.
Computing Fundamentals
38
Standard Input Devices
(continued)




Input devices allow you to enter
data and commands.
A modem is a device that allows
one computer to talk to another.
Keyboards
The keyboard is the most commonly
used input device for entering text
and numbers into a computer.
Computing Fundamentals
39
Standard Input Devices
(continued)

Keyboards
(continued):






Ergonomic
Cordless/wireless
Specialized
Security
Foldable/flexible
Laser/virtual
Computing Fundamentals
40
Standard Input Devices
(continued)



Pointing Devices:
A pointing device is an input device you
use to position the pointer on the
screen.
The most common pointing device for
personal computers is the mouse.







Mechanical
Optomechanical
Optical
Wireless
Trackball mouse
Radio frequency
Foldable mouse
Computing Fundamentals
41
Standard Input Devices
(continued)



Pointing Devices (continued):
The trackball works like a mouse turned
upside down; the ball is on top of the
device.
A common feature on laptop computers is
the touchpad, with a specialized surface
that can convert the motion and position of
your fingers to a relative position on
screen.
Computing Fundamentals
42
Standard Input Devices
(continued)



Pointing Devices (continued):
Some notebook computers contain a
pointing stick, a pressure-sensitive device
that looks like a pencil eraser and is located
on the keyboard, generally between the G,
H, and B keys.
Audio input is sound entered into a
computer.
Computing Fundamentals
43
Standard Output Devices



Output is data processed into a useful
format.
Monitors:
Desktop computers typically use a monitor
as their display device, including CRT, LCD,
and gas plasma.
Computing Fundamentals
44
Standard Output Devices
(continued)






Printers:
Printers produce a paper copy, or hard
copy, of processing results.
A laser printer produces high-quality
output.
An inkjet printer provides good-quality
color printing for less expense.
Speakers:
Speakers and headsets generate sound.
Computing Fundamentals
45
Specialized Input Devices


Digital Cameras:
The pictures you take are stored digitally
and then transferred to the computer’s
memory.
Computing Fundamentals
46
Specialized Input Devices
(continued)


Game Controllers:
You use joysticks and wheels most
often for games.
Computing Fundamentals
47
Specialized Input Devices


Scanners/Bar Code Readers:
Scanners are devices that can change
images into codes for input to the
computer.
 Image scanners
 Bar code scanners
 Magnetic scanners
 Wireless scanners
 Optical character recognition (OCR) and
optical mark recognition (OMR) scanners
Computing Fundamentals
48
Specialized Input Devices
(continued)


Touch Display Screen:
A special screen that reacts to direct
touches within the display area, usually
from a person’s finger or hand.
Computing Fundamentals
49
Specialized Input Devices
(continued)


Stylus:
A stylus and digital
pen are pen-like
writing instruments
used to enter
information by
writing on a screen
on a mobile device
or using the pen as a
pointer.
Computing Fundamentals
50
Specialized Input Devices
(continued)




Environmental Probes and Sensors:
Workers can view information such as the
temperature and humidity of a remote
environment, smoke detector readings, and
pollution control readings.
Remote Controls:
Used to manage devices such as
televisions, lights, and fans.
Computing Fundamentals
51
Specialized Input Devices
(continued)


Security Devices:
Biometrics is an authentication technique
using automated methods of recognizing a
person based on a physiological or
behavioral characteristic.
 Enrollment
 Submission
 Verification
Computing Fundamentals
52
Specialized Input Devices
(continued)


Virtual Devices:
Use the synchronized positioning of lightemitting and sensing devices to detect user
input.
Computing Fundamentals
53
Specialized Input Devices
(continued)




Touch-Sensitive Pads:
On a portable device, enables you to scroll
through a list, adjust the volume, play
music, view videos or pictures, and
customize settings.
Input Devices for the Physically
Challenged:
A variety of special input devices are
available for the physically challenged.
Computing Fundamentals
54
Specialized Output Devices
Projectors
 Fax machines and fax modems
 Multifunction printer
 Control devices/robots
Specialized Printers:
 Thermal
 Mobile
 Label and postage
 Plotters/large-format


Computing Fundamentals
55
Specialized Output Devices
(continued)

Output Devices for the
Physically Challenged:



Screen magnifiers
Screen readers
Voice synthesizers
Computing Fundamentals
56
Connecting Input and Output
Devices to a Computer




Ports and Connectors:
A port, also called a jack, is an interface to
which a peripheral device attaches to or
communicates with the system unit or
other peripheral devices.
A Universal Serial Bus (USB) port can
connect up to 127 peripheral devices with a
single connector and transfer data at rates
of up to 200 million bits per second (Mbps).
Plug and play refers to the ability of a
computer system to configure expansion
boards and other devices automatically.
Computing Fundamentals
57
Connecting Input and Output
Devices to a Computer (continued)




Ports and Connectors (continued):
Another type of external bus is FireWire, which
supports data transfers up to 400 Mbps and can
connect up to 63 external devices.
Special-purpose ports are:
 SCSI
 IrDA
 Bluetooth
Expansion slots are openings on the motherboard
where an expansion board can be inserted.
Computing Fundamentals
58
Connecting Input and Output
Devices to a Computer (continued)



Hardware Installation:
For most hardware devices to work, they
need a set of instructions that
communicates with the computer’s
operating system. This set of instructions is
called a driver.
If the operating system already
contains the driver, it performs an
automatic plug and play, installation
for newly connected devices.
Computing Fundamentals
59
Considering Computer
Performance Factors

A variety of factors can affect a computer’s
performance.
 Microprocessor: The higher the
generation, the faster and better the
processing speed.
 Random Access Memory (RAM): Helps to
speed up the processing cycle.
 Hard disk: The bigger and faster the
hard drive, the faster it can process
data.
 Video: Need adequate video memory.
Computing Fundamentals
60
Assignments






TIC-TAC-TOE
Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—
horizontally, vertically, or diagonally—or in the 4
corners, you made decide to be finished. Or you
may decide to keep going and complete more
activities.
Star the activities you plan to complete. Color in the
box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE
Review
Take end of section quiz
Computing Fundamentals
61
Continue to the Next Section:
Computing Fundamentals
62
Computing Fundamentals IC3
Computer Protection
Computers and Computer Systems
63
Major Unit Concepts




Protect from hardware from theft.
Data Protection
Identify environmental factors that can
damage computers.
Identify common hardware problems.
Computing Fundamentals
64
Vocabulary








backup
 uninterruptible
data theft
power supply
driver
(UPS)
encryption
humidity
ping
power spikes
surge suppressor
Computing Fundamentals
65
Protecting Computer Hardware
from Theft and Damage


In addition to the capital loss of equipment
and the related down time until it is
replaced, losing sensitive and confidential
information through theft or damage could
have long-term consequences.
One safeguard you can use to prevent theft
in the workplace is to physically secure
equipment, especially items such as
notebook computers, handheld devices, cell
phones, and other transportable devices.
Computing Fundamentals
66
Protecting Computer Hardware from
Theft and Damage (continued)

In addition, apply the following safeguards to help
protect computer hardware from theft:
 Use security locks and/or tabs to secure the
equipment to the desk or other furniture.
 Attach an alarm that will sound if the equipment
is moved from its designated location.
 Mark all equipment with an identification tag or
symbol that can be traced.
 Insure the equipment.
 Use a designated schedule to back up data to a
separate system.
Computing Fundamentals
67
Protecting Computer Hardware from
Theft and Damage (continued)

Another type of theft that is
sometimes overlooked involves
employees accessing in a
company’s computer for personal
use.
Computing Fundamentals
68
Safe Guarding Data


Data Thieves steal laptops and
servers, they can access company’s
network and bypass companies
security measures.
Data theft can occur when older
systems are discarded and the data
is not completely deleted.
Computing Fundamentals
69
Safeguarding Data



In most instances, hardware can be replaced when it
is stolen or damaged.
Data, on the other hand is a critical component of
most businesses and is not easily replaced.
The risk and severity of data theft is increasing due
to four predominant factors:
 The value of data stored on computers.
 Massive amounts of confidential data being
stored.
 Increased use of mobile devices outside a secure
network.
 Increased proficiency of data hackers and
thieves.
Computing Fundamentals
70
Safeguarding Data (continued)

Many businesses and organizations use data
encryption to protect their data. Encryption is a
secure process for keeping confidential information
private. The data is scrambled mathematically with
a password or a password key and is unreadable
until it is decrypted.
Computing Fundamentals
71
Safeguarding Data (continued)
Data Backup:


Even saved data can be lost or corrupted by:
 Equipment failure
 Software viruses
 Hackers
 Fire or water damage
 Power irregularities
Because data is so valuable, you must back up
important files regularly to removable disks or some
other independent storage device.
Computing Fundamentals
72
Safeguarding Data (continued)


A hard disk crash can result in serious loss
of data if not properly backed up.
Backup procedures should place priority on
files that would be difficult or impossible to
replace or reconstruct if they were lost,
such as a company’s financial statements,
important projects, and works in progress.
Computing Fundamentals
73
Identifying Environmental Factors
that Can Damage Computers




Environmental factors such as temperature,
humidity, and electrical fields also can
contribute to hardware and software
damage.
Temperature:
A temperature range of 68 to 75 degrees is
optimal for system reliability.
You should not operate computer
equipment in a room where the
temperature exceeds 85 degrees.
Computing Fundamentals
74
Identifying Environmental Factors that
Can Damage Computers (cont.)





Humidity:
A high level of humidity can cause
computers to short circuit, resulting in the
loss of data and damage to hardware.
Components to rust.
For optimal performance, the relative
humidity of the computer room should be
above 20 percent and below the dew point.
Environments that require high reliability
should have a humidity alarm.
Computing Fundamentals
75
Identifying Environmental Factors that
Can Damage Computers (cont.)





Water Damage:
Modern computer systems contain a cut-off
device that is triggered if sprinklers turn
on.
If a computer suffers water damage, make
sure it is completely dry before restoring
the power.
Storage devices and printouts can be
damaged or destroyed by water.
Water damage may also occur from
flooding or broken pipes.
Computing Fundamentals
76
Identifying Environmental Factors that
Can Damage Computers (cont.)






Magnetic Fields and Static
Electricity:
A single spark from static electricity can damage the
internal electronics of a computer.
Grounding prevents damaging a computer with a
static electrical spark.
Computer rooms should have tile floors and
antistatic carpet to reduce static electricity.
Hard drives are sensitive to magnetic fields.
Do not store magnets directly on a computer.
Computing Fundamentals
77
Identifying Environmental Factors that
Can Damage Computers (cont.)





Physical Damage:
Prevent damage to desktop computers by arranging
equipment so it is stable and cannot fall or be
knocked over.
Notebook computers are more prone to physical
wear and tear because they are portable.
Most portable systems are insulated with shock
absorbing material.
Transport devices with care, such as in padded
cases.
Computing Fundamentals
78
Identifying Environmental Factors that
Can Damage Computers (cont.)



Poor Maintenance:
One of the best ways to cut down on
computer repair is through preventive
maintenance.
Follow a monthly maintenance schedule to
keep computer devices in good working
order.
Computing Fundamentals
79
Protecting Computers from Power
Loss and Fluctuation



An unexpected power outage can wipe out
any data that has not been properly saved.
Secure electric cords so that they cannot be
disconnected accidentally.
Protect computers from power
spikes with a surge suppressor.
Computing Fundamentals
80
Protecting Computers from Power
Loss and Fluctuation


An uninterruptible power supply (UPS) can
prevent data loss due to power outages.
A UPS contains a battery that temporarily
provides power if the normal current is
interrupted.
Computing Fundamentals
81
Identifying Common Computer
Hardware Problems


Computer equipment and stored data are subject to
computer hardware issues.
 “Crashed” hard drive-caused by software
corruption or hardware defects.
 Damaged media
 Printer and monitor problems
 Loss of network or Internet connectivity
 General failure
You can solve many problems on your own, while
others may require a professional.
Computing Fundamentals
82
Identifying Common Computer
Hardware Problems (continued)



Crashed Hard Drive:
Hard drives can stop working if they become
overheated, are dropped or shaken, become worn
out, or are infected with a virus.
To evaluate the condition of the drive:
 Use a boot disk to determine if the drive is
readable.
 Use diagnostic and data recovery programs to
locate and recover bad sectors.
 Use a data recovery service.
Computing Fundamentals
83
Identifying Common Computer
Hardware Problems (continued)



Damaged Media:
Hard drives and other media eventually fail.
In many instances, you can recover data.
 First, move the damaged media to a secure
environment.
 Second, inspect or test the media to determine
what type of damage has occurred. The type of
damage determines the type of recovery method
to use.
 Another option is to locate a disaster data
recovery company to recover data from the
computer.
Computing Fundamentals
84
Identifying Common Computer
Hardware Problems (continued)




Printer Problems:
Paper jams stop
printers from printing
a file.
Using the wrong paper
or using wrinkled or
torn paper can cause a
paper jam.
Always pull the paper
in the direction of the
paper path.
Computing Fundamentals
85
Identifying Common Computer
Hardware Problems (continued)



Printer Problems (continued):
If ink or toner comes off the paper when
touched, the fuser assembly might be
damaged or need to be replaced; the toner
cartridge could be defective; or some toner
may have spilled into the printer.
If the printed image is faded, the toner
might be low, the print density set too low,
or economy mode printing is turned on.
Computing Fundamentals
86
Identifying Common Computer
Hardware Problems (continued)



Display Problems:
The hardware of a display consists of
the monitor and the video card.
To troubleshoot a display problem:



Check that the power cord is plugged in and
the monitor cable is connected to the
computer.
Verify that the monitor is turned on and
settings are correct.
Update the video driver.
Computing Fundamentals
87
Identifying Common Computer
Hardware Problems (continued)




Inoperable Hardware Devices:
When a hardware device does not work, it could be
a software problem, an electrical problem, or a
mechanical problem.
A small program called a driver instructs the
operating system on how to operate specific
hardware.
Other causes are incorrect installation of the
software or hardware failure.
Computing Fundamentals
88
Identifying Common Computer
Hardware Problems (continued)


Loss of Network or Internet
Connectivity:
Common causes of connectivity problems:
 The network provider’s system is not
working properly.
 Network adapters and switch ports do
not match.
 The network adapter is incompatible with
the motherboard or other hardware
components.
Computing Fundamentals
89
Identifying Common Computer
Hardware Problems (continued)


Loss of Network or Internet
Connectivity (continued):
Troubleshooting options:

Use the DOS ping command to test
connectivity and isolate hardware
problems and mismatched
configurations.
Computing Fundamentals
90
Identifying Common Computer
Hardware Problems (continued)

Loss of Network or Internet
Connectivity (continued):
Computing Fundamentals
91
Identifying Common Computer
Hardware Problems (continued)

Loss of Network or Internet
Connectivity (continued):
 Verify that other computers on the same
network and those plugged into the
same switch are also experiencing
network connectivity problems.
 Restart the router.
 Check the computer’s network card or
board and verify it is using appropriate
settings as indicated by the
manufacturer.
Computing Fundamentals
92
Identifying Common Computer
Hardware Problems (continued)

Loss of Network or Internet
Connectivity (continued):
 Try another network cable.
 If you are using a wireless router within
a home, beware of signal interference
from other home appliances.
Computing Fundamentals
93
Assignments






TIC-TAC-TOE
Directions: Chose activities in a tic-tac-toe design.
When you have completed the activities in a row—
horizontally, vertically, or diagonally—or in the 4
corners, you made decide to be finished. Or you
may decide to keep going and complete more
activities.
Star the activities you plan to complete. Color in the
box when you finish the activity.
Discuss and provide Feedback to TIC-TAC-TOE
Review
Take end of section quiz
Computing Fundamentals
94
References

Computer Literacy BASICS: A
Comprehensive Guide to IC3, 4th
Edition, Morrison / Wells
Computing Fundamentals
95
Download