Understanding Essential Computer Concepts Microsoft Office 2013 Illustrated Fundamentals Concepts Lecture A computer is an electronic device that: Accepts input Processes data Stores data Produces output 2 A computer system is made up of: Hardware—the physical components Software—the programs or instructions 3 Various sizes and shapes Perform the 4 basic functions 4 Personal Computers Hand-held Computers Mainframe Computers Supercomputers 5 Personal Computers Single-user Desktops Laptops or Notebook Tablet Subnotebook Slate 6 Hand-held Computers Small, fit in the palm of the hand Usually limited capabilities and processing power Smartphones MP3 players Some e-readers 7 Mainframe Computers Found in medium to large businesses or government agencies Centralized storage and processing Handles large amounts of data Accommodates many users 8 Supercomputers Found in very large businesses or government agencies Tremendous processing power Might be used in research to perform simulations or make predictions 9 Processing Modify data to produce information. Performed by electronic components on the motherboard. Directed by Central Processing Unit (CPU). Controlled by programs (instructions). Peripherals Provide input, output, and storage functions. 10 Input devices Converts user data or commands to a format the electronic components of a computer can understand. Examples: Keyboard, mouse, microphone Output devices Coverts data or information from a format the computer understands to a format the user can understand. Examples: Monitor, printer, speakers 11 Storage Temporary storage: where data and programs are stored while they are in use. Also called memory, primary storage, or RAM. Secondary storage: where data and programs are permanently stored while not in use. Includes hard drives, USB drives, and CD drives. Since data is only stored temporarily while in use, it’s important to save your work periodically to secondary storage. 12 Patterns of zeroes and ones (electric signals “off” or “on”). Can be stored temporarily (RAM) or permanently (hard drive, USB drive, etc…). When stored on permanent devices, organized in files. File management: organization of files. 13 Each storage option has benefits / drawbacks Temporary storage: Very fast for processing but is erased when the power is turned off. Permanent storage: Slower than temporary but data can be accessed repeatedly until erased by user. ▪ Hard drive is the most common permanent storage. Fast but not portable. ▪ Removable devices provide portability but slower than most hard drives. 14 Data and programs stored as files A file is a collection of bits (binary digits) 1 (“on”) and 0 (“off”) are referred to as bits. Eight bits = one byte. ▪ Smallest recognizable unit; represents a unique character Kilobyte (KB) is about one thousand bytes Megabyte (MB) is about one million bytes Gigabyte (GB), is about one billion bytes Terabyte (GB), is about one trillion bytes 15 Step-by-step instructions that tell the computer hardware how to accomplish the task. Can refer to a single program or a package. Three basic types of software System software helps the computer carry out its basic operating tasks. Application software helps the user carry out a variety of tasks. Security software helps protect the computer and data from malicious attacks. 16 Many programs that carry out basic computing functions: Getting input Processing data Storing data Producing output Vital part of the “computer system” Four categories: Operating system, device drivers, utilities, and programming languages. 17 Operating System Manages the computer’s resources Load data and instructions into memory Save data to permanent storage Coordinate use of resources Provide a user interface Many more functions 18 Device Drivers Coordinates communication between the computer and peripherals Usually provided by the manufacturer Utilities Perform specific tasks Reduce burden on operating system Programming Languages Allow people to write instructions (programs) for the computer to follow 19 Depends on the type of computer Three main operating systems for personal computers: Windows, MAC OS (Apple computers), and Linux New computers typically have OS already installed Hand-held computers usually have a mobile version of an OS or one designed specifically for the device 20 Application software enables you to perform specific tasks. Application software for PCs include: Document production software Spreadsheet software Database management software Graphics and presentation software Note: Today’s smartphones have thousands of “apps” that perform specific functions. 21 Document production software includes word processing, desktop publishing, and Web authoring software that assist you in writing and formatting documents. Often has grammar and spellchecking, thesaurus, search and replace, and template features.22 With spreadsheet software, you can create formulas that perform calculations. Spreadsheet software creates worksheets 23 with columns and rows. Database management software creates structured databases to store, sort, and retrieve information. 24 Graphics and presentation software allow you to create illustrations, diagrams, and slide shows. 25 Transmit data… from one computer to another ▪ Via cables, telephone, or wireless from the computer to a peripheral device ▪ Via ports and cables connected to computer ▪ Expansion cards allow you to add more ports and thus more communication capabilities or functionality. from one component of the computer to another ▪ Via the data bus 26 Networks connect computers and computer devices so that data and resources can be shared. Require special hardware and software Network Interface Card (NIC) Network software Types of Networks LAN (local area network) WAN (wide area network) PAN (personal area network) Wireless 27 Networks can be found in many places Home Share printer or files, Internet access, play games Work Share hardware, files, and Internet access Access special software School Access to hardware, Internet, special programs 28 Accessing a network account Typically requires a username and password Account permissions determine what devices or drives can be accessed. Example: ▪ School network gives access to network storage drives and classroom printers. ▪ Home network gives access to different storage drives and devices. 29 Malware is software that is designed to cause harm to your data or computer or transfer personal information without your knowledge or permission. ▪ Examples: Viruses, Trojans, Worms, Spyware, Rogue software Transferred to your computer via ▪ ▪ ▪ ▪ E-mails and attachments Files transferred on disk Installing software Surfing the web 30 Antivirus software Detects, disables and/or removes most viruses, trojans, and worms Anti-spyware software Detects and removes programs used to track surfing habits or transmit personal information Firewall Blocks access to your computer without your permission Hardware or software solution 31 Phishing involves two phases Spoofing ▪ The creation of a “fake” web site designed to look like the site of a legitimate business. ▪ The “fake” site is actually designed to steal personal information. Phishing ▪ The process of sending an e-mail containing a link to a spoofed site to unsuspecting people. ▪ The intention is to steal personal information. 32 Be wary! ▪ Most legitimate businesses will not send you an e-mail asking for personal information. ▪ If the e-mail seems strange, it probably is not legitimate. If you are not sure, look up the company phone number (don’t use one from the e-mail) and give them a call. ▪ Look for spelling and grammar errors. ▪ Point (DON’T CLICK) to the link contained in the e-mail. The URL of the link will be displayed in the status bar. In many cases the URL will be very different than the actual business URL. 33 34 www.howstuffworks.com Many great articles on computer hardware and software www.microsoft.com Lots of help and how-to articles, videos, and training exercises for Windows and Office www.microsoft.com/protect Tons of undated information on protection your computer and your family online www.google.com (or any search engine) Type in search words to find exactly what you are looking for 35 Link to video about rogue software Info about protecting family online MS Security YouTube channel 36