SlideShare uma empresa Scribd logo
1 de 24
Personal Computers and Applications Networking for Home and Small Businesses – Chapter 1
[object Object],Personal Computer Hardware Personal Computers & Applications How and Where Computers are Used
Personal Computer Hardware Personal Computers & Applications How and Where Computers are Used ,[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Personal Computers & Applications Local and Network Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Personal Computers & Applications Local and Network Applications ,[object Object],[object Object],[object Object],Activity 1.1.2
Personal Computer Hardware Types of Computers Classes of Computers ,[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Types of Computers  Servers, Desktops and Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Activity 1.2.2
Personal Computer Hardware Types of Computers  Portable Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.2.3
Personal Computer Hardware Binary Representation of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lab & Activity 1.3.2
Personal Computer Hardware Binary Representation of Data ,[object Object],[object Object],Lab & Activity 1.3.3
Personal Computer Hardware Computers Components and Peripherals Computer System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Motherboard, CPU and RAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Adapter Cards ,[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Storage Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Storage Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Computer Hardware Computers Components and Peripherals Peripheral Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers Components and Peripherals Cases and Power Supplies
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers System Components Safety and Best Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personal Computer Hardware Computers System Components Installing Peripherals and Verifying Operation Activity 1.5.3
 

Mais conteúdo relacionado

Mais procurados (20)

Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Basic of computers
Basic of computersBasic of computers
Basic of computers
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Intro to computer system
Intro to computer systemIntro to computer system
Intro to computer system
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
BAIT1003 Chapter 2
BAIT1003 Chapter 2BAIT1003 Chapter 2
BAIT1003 Chapter 2
 
Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)Unit 3 - Computer Components (P1)
Unit 3 - Computer Components (P1)
 
A Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & PeripheralsA Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & Peripherals
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Hardware
HardwareHardware
Hardware
 
Hwswb
HwswbHwswb
Hwswb
 
Network
NetworkNetwork
Network
 

Semelhante a Chapter 1r

Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of ComputerJack Frost
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basicJiian Francisco
 
002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdfMarioCaday2
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basicsehillpamlico
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to misJob Thomas
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentalsPANKHURI JAIN
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.pptAnkita Shirke
 
Basic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifBasic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifSadiq Khalif
 
hardware software basics
hardware software basicshardware software basics
hardware software basicsDeepa Rani
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwarephazeddl
 
Basic computer hardware and software
Basic computer hardware and software Basic computer hardware and software
Basic computer hardware and software leidy5566
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareJuan Camilo Piñerez
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareDavid RC
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareandresaguilar06
 
Basic Computer Hardware & Software
Basic Computer Hardware & SoftwareBasic Computer Hardware & Software
Basic Computer Hardware & SoftwareJVGAJJAR
 

Semelhante a Chapter 1r (20)

Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of Computer
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.ppt
 
Basic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalifBasic computer hardware and software by Eng sadiqkhalif
Basic computer hardware and software by Eng sadiqkhalif
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and software Basic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware_and_software
Basic computer hardware_and_softwareBasic computer hardware_and_software
Basic computer hardware_and_software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
Basic Computer Hardware & Software
Basic Computer Hardware & SoftwareBasic Computer Hardware & Software
Basic Computer Hardware & Software
 

Último

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Chapter 1r

  • 1. Personal Computers and Applications Networking for Home and Small Businesses – Chapter 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  

Notas do Editor

  1. Kebanyakan komputer untuk melakukan fungsi, ada tiga hal yang harus bekerja sama:
  2. Komputer ini hanya berguna untuk program atau aplikasi pd komp itu.
  3. Perangkat portabel bervariasi dalam ukuran, kekuatan dan kemampuan grafis dan meliputi: Laptop atau notebook PC Tablet PC Pocket PC Personal Digital Assistant (PDA) Perangkat game Ponsel Laptop juga dapat dipasang ke sebuah docking station yang memungkinkan pengguna untuk menggunakan monitor yang lebih besar, tikus, berukuran penuh keyboard danmemiliki pilihan koneksi yang lebih
  4. Komputer menggunakan kode biner untuk mewakili dan menafsirkan huruf, angka dankarakter khusus dengan bit. Sebuah kode yang biasa digunakan adalah American Standard Kode untuk Informasi Interchange (ASCII). Dengan ASCII, setiap karakter diwakili oleh string bit. Sebagai contoh: Modal huruf: A = 01000001 Setiap kelompok dari delapan bit, seperti representasi dari huruf dan angka, dikenal sebagai byte Ketika mengacu pada ruang penyimpanan, kita menggunakan istilah byte (B), kilobyte(KB), megabyte (MB), gigabyte (GB), dan terabyte (TB).
  5. Data Rate menentukan berapa lama waktu yang dibutuhkan untuk mentransfer file. Semakin besar file, lama waktu yang dibutuhkan, karena banyak informasi  untuk ditransfer. Kecepatan transfer data diukur dalam ribuan bit per detik (Kbps) atau jutaan bit per detik (Mbps).
  6. Random Access Memory (RAM)  penyimpanan sementara menyimpan data yang sedang diproses oleh CPU Mengapa pengguna membutuhkan lebih banyak RAM? Beberapa aplikasi yang berjalan pada waktu yang sama Beberapa CPU Jumlah RAM yang tersedia ditentukan oleh motherboard
  7. bagaimana data sampai ke lokasi
  8. Bila daya dihapus dari komputer, setiap data yang tersimpan dalam RAM akan hilang. Program dan data pengguna harus disimpan dalam bentuk yang tidak akan hilang ketika power akan dihapus. Ini dikenal sebagai non-volatile penyimpanan. Jenis non-volatile penyimpanan yang tersedia untuk sistem komputer termasuk: Perangkat penyimpanan magnetik Optik perangkat penyimpanan Statis memori (flash) drive Penyimpanan magnetik Ini menyimpan perangkat informasi dalam bentuk medan magnet. Mereka termasuk: Hard disk drive Floppy drive Tape drive
  9. Optical Drive Perangkat penyimpanan optik menggunakan sinar laser untuk merekam informasi dengan menciptakan perbedaan dalam kepadatan optik. Perangkat ini meliputi CD dan DVD yang terdiri dari tiga format yang berbeda: Baca saja: CD, DVD Tulis sekali: CD-R, DVD-R Menulis banyak: CD-RW, DVD-RW Statis Memory dan Memory Sticks Perangkat memori statis menggunakan chip memori untuk menyimpan informasi Karena ukuran dan bentuk, perangkat ini dikenal sebagai kunci memori USB atau flash drive
  10. Surge Protector   mencegah kerusakan pada komputer UPS (Uninterruptible Power Supply) menyediakan daya cadangan tanpa gangguan untuk waktu singkat
  11. Perbaikan Komputer Best Practices Matikan PC dan cabut listrik Menentukan apakah bagian hot-swappable (jika demikian, tidak ada kebutuhan untuk mematikan listrik sebelum menambahkan atau menghapus bagian) Jangan power supply terbuka atau monitor   keduanya mengandung tegangan tinggi Perhatian terhadap Electrostatic Discharge (ESD)   transfer listrik dari tubuh Anda ke bagian listrik