13
AZAWADI EMPUN Chapter 2: COMPUTER HARDWARE; 2.2 System Units (also known as CPUs) Functions of the main components of a system unit No . Components Functions 1 Input/ Output port (I/O port) - A port is the point at which a peripheral attaches to a system unit so that the peripheral can send data to or receive information from the computer. - An external device, such as a keyboard, monitor, printer, mouse and microphone is often attached by a cable to a port on the system unit. - The back of the system unit contains so many ports. Some newer personal computers also have ports on the front of the system unit. - Ports have different types of connectors. A connector joins a cable to a peripheral. One end of a cable attaches to the connector on the system unit and the other end of the cable attaches to a connector on the peripheral. 2 Power button To start on computer 3 Reset button Kick of soft boot, instructing the computer to go through the process of shutting down, which would clear memory and reset devices to their initialized state. It simply removes power immediately. 4 Motherboard Main circuit board of the system unit, which has some electronic components attached to it and others built into it. 5 Power Supply Unit (PSU) Convert standard electrical power into the form that computer can use. If a power supply is not providing the necessary power, the computer will not function properly. 6 DVD-ROM drive A device that reads DVD-ROM, also can read audio CDs, CDROMSs, CD-Rs and CD-RWs. 7 CD-ROM drive A device that reads audio CDs, CD-ROMs, CD-Rs and CD- RWs. 8 DVD/CD-RW drive It is a combination drive that reads DVD and CD media, it also writes to CD-RW media. This drive also allows watching a DVD or burn a CD. 9 Zip drive A high-capacity disk drive that reads from and writes on a Zip disk. 10 Floppy drive A device that reads from and writes on a floppy disk 11 Hard disk drive Type of storage device that contains one or more inflexible, circular platters that store data, instructions and information. Also called a hard disk. 12 . Processor Is the hardware within a computer that carries out the instructions of a computer program by 1

Nota Ictl Tingkatan 1

Embed Size (px)

DESCRIPTION

Tentang computer Hardware, Network and Internet.

Citation preview

Page 1: Nota Ictl Tingkatan 1

AZAWADI EMPUN

Chapter 2: COMPUTER HARDWARE; 2.2 System Units (also known as CPUs)

Functions of the main components of a system unit

No. Components Functions

1Input/Output port(I/O port)

- A port is the point at which a peripheral attaches to a system unit so that the peripheral can send data to or receive information from the computer.- An external device, such as a keyboard, monitor, printer, mouse and microphone is often attached by a cable to a port on the system unit.- The back of the system unit contains so many ports. Some newer personal computers also have ports on the front of the system unit.- Ports have different types of connectors. A connector joins a cable to a peripheral. One end of a cable attaches to the connector on the system unit and the other end of the cable attaches to a connector on the peripheral.

2 Power button To start on computer

3 Reset buttonKick of soft boot, instructing the computer to go through the process of shutting down, which would clear memory and reset devices to their initialized state. It simply removes power immediately.

4 MotherboardMain circuit board of the system unit, which has some electronic components attached to it and others built into it.

5Power Supply Unit (PSU)

Convert standard electrical power into the form that computer can use. If a power supply is not providing the necessary power, the computer will not function properly.

6DVD-ROM drive

A device that reads DVD-ROM, also can read audio CDs, CDROMSs, CD-Rs and CD-RWs.

7 CD-ROM drive A device that reads audio CDs, CD-ROMs, CD-Rs and CD-RWs.

8DVD/CD-RWdrive

It is a combination drive that reads DVD and CD media, it also writes to CD-RW media. This drive also allows watching a DVD or burn a CD.

9 Zip drive A high-capacity disk drive that reads from and writes on a Zip disk.10 Floppy drive A device that reads from and writes on a floppy disk

11Hard disk drive

Type of storage device that contains one or more inflexible, circular platters that store data, instructions and information. Also called a hard disk.

12. Processor

Is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system. It is mainly used to process any input data from the input devices.

13. Processor FanIt is used to cool down the heat from the processor and reduce the temperatures of the motherboard.

14. CMOS BatteryComplementary Metal-Oxide-Semiconductor. The main function is to keep the real-time clock (RTC) going even when the PC is offline.

15. Internal Cards

There are 3 types of internal cards;i. Sound Card – enhanced the audio qualityii. Graphics Card – Improved display performance. Also known

as Video Cardiii. Network Interface Card – Connect the PC to the network

16.

Random Access Memory (RAM)

A form of computer data storage. A random-access device allows stored data to be accessed quickly in any random order. Also a temporary storage to a running program in a computer. The memory is lost when the program is closed or the PC is shut down.

17.IDE/ SATA Cables

Being used to connect various drives (HDD, DVD, Floppy ) to the motherboard.

1

Page 2: Nota Ictl Tingkatan 1

AZAWADI EMPUN

2.3 DEFINITION & TYPES OF PERIPHERAL

Peripheral Device

External hardware devices attached to the computer are called peripheral devicesThere are 5 types of peripheral devices :

a. Input devicesb. Output devicesc. Storage devicesd. Network Devicese. Processing Devices

Input Devices- Input devices are any electronic device that are connected to a computer and produces input

signals.

Output Devices- Output is the result of data processing activity when it is presented externally to the system.

The output from a computer can be printed or displayed form.- An output device is hardware that is capable of delivering or showing information to one or

more users. An output device shows, prints and presents the results of a computer’s work.

Storage Devices- Information and documents are stored in a computer storage so that it can be retrieved

whenever they are needed later on. - Computer storage is the holding of data in an electromagnetic form for access by a computer

processor.

Network Devices- Also known as Networking hardware. These devices are used to connect the PC or laptop to

a network (wired or wireless)

Processing Devices- A device that process the instructions (data) sent by the input devices. Every raw data MUST

go through this device before the data can be sent to any output devices.(refer to Data Process Cycle)

Data Process CyclesUnits for Data Measurement• Bit• Byte• Kilobyte (KB)• Megabyte (MB)• Gigabyte (GB)• Terabytes (TB)

2

Storage Devices

Page 3: Nota Ictl Tingkatan 1

AZAWADI EMPUN

CHAPTER 3: COMPUTER SOFTWARESoftware is also called a computer program. It consists of a series of instructions that tells the hardware of a computer what to do or how to do it. For example, some instructions direct the computer to allow you to input data from a keyboard and store it in the memory. Other instructions cause data stored in memory to be used in calculations.

Usage Of Software Software is used so that you can interact with the program through its user interface. This

user interface controls how you enter data, instructions and how information is displayed on the screen.

There are two types of computer softwareo System Softwareo Application Software

3.1. System Software

System software consists of programmed that control the operations of the computer and its devices. System software serves as the interface between the users, the application software and the computer hardware. System Software is also used to control and manage computer devices and operations. There are two types of system software:

A. Operating System: A set of programs that coordinates all the activities among the computer hardware devices. It controls the hardware in the computer, peripherals, manages memory and files. It enables the user to communicate with the computer and other software. This program is needed to kick start a computer. (Example Windows, LINUX, DOS, UNIX, Mac OS X [Cheetah, Mountain Lion, Snow Leopard], Google Chromium OS)

B. Utility Programme: A type of system software that allows a user to perform maintenance tasks. Example, scandisk, antivirus programs, defrag, backup, restore, etc)

3.2. Application Software

Application software is a program that performs specific tasks for users. There are many types of application software;

i. Word processing softwareii. Spreadsheet software iii. Database software iv. Presentation software v. E-Mail and Web browser Softwarevi. Media based Software

z

Examples of application software.

3

Page 4: Nota Ictl Tingkatan 1

AZAWADI EMPUN

4

Page 5: Nota Ictl Tingkatan 1

AZAWADI EMPUN

5

COMPUTER NETWORK

Page 6: Nota Ictl Tingkatan 1

AZAWADI EMPUN

THE INTERNET

The internet or the Net is the world’s largest computer network which connects millions of computer all over the world. Many organizations including private as well as government agencies, educational institutions and individuals are connected to the Internet.

More than one billion people around the world use the internet daily for a variety of reasons, including the following:

• Communicate with and meet other people• Access a wealth of information, news, and research findings• Shop for goods and services• Bank and invest• Take a class• Access sources of entertainment and leisure, such as online games, videos, books and magazines• Download music• Share information

ADVANTAGES OF THE INTERNET

1. Data and information rich, including a range of media.2. Anyone can publish online (tripod.com and other hosting sites)3. Learners can become researchers because of easier access to data4. Search engines that are fast and powerful5. Easy to use.6. Smaller, faster, cheaper all the time

DISADVANTAGES OF THE INTERNET

1. Information overload.2. No librarians for quality control (with some exceptions, like Kids Click! And other sites for children).3. Need for quality control in the data that student find and use.4. Search engine that show result base on who pays the most.5. Not enough training for effective use.6. Push to upgrade constantly.

REQUIREMENTS NEED TO ACCESS THE INTERNET

1. Network Interface Card ( NIC )2. Access Account3. Wireless Network Interface Card4. Modem ( internal and external )5. Hub / Switch6. Router7. Wireless Access Point

Various forms of communications on the Internet

• E-mailing • Chatting • Conferencing (audio and video) • Net Meeting • Newsgroup • Forum

Peripherals used for communications

        Web camera         Microphone         Earphone

6

Page 7: Nota Ictl Tingkatan 1

AZAWADI EMPUN

ACTIVITY :

        CREATE AN EMAIL

        CHAT WITH SKYPE

        CREATING WEBSITE WITH MS WORD

INTERNET APPLICATION (NOTA 2)

WORLD WIDE WEB

The World Wide Web (commonly shortened to the Web) is a system of interlinked, hypertext documents accessed via the Internet. With a web browser, a user views web pagesthat may contain text, images, videos, and other multimedia and navigates between them using hyperlinks.

These pages are written in Hypertext Markup Language (HTML). Every website has an address or Uniform Resource Locator (URL). The URL is formed by the

protocol, domain, directory and the document name. The World Wide Web was created in 1989 by Sir Tim Berners-Lee, working at CERN in Geneva,

Switzerland.

WEB BROWSER

A web browser is a software application that enables a user to display and interact with text, images, videos, music and other information typically located on a Web page at a website on the World Wide Web or a local area network. Text and images on a Web page can contain hyperlinks to other Web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many Web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a Web page may differ between browsers.

Some of the Web browsers are:

• Internet Explorer

• Mozilla Firefox

• Safari

• Opera

NETIQUETTE (NOTA 3)

1. Meaning of Netiquette

Netiquette is etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden Rule. The need for a sense of netiquette arises mostly when sending or distributing e-mail, posting on Usenet groups, or chatting. To some extent, the practice of netiquette depends on understanding how e-mail, the Usenet, chatting, or other aspects of the Internet actually work or are practiced.

2. List out the Dos and Don’ts while communicating online

a) Do unto others, as you'd have others do unto you

Be polite and courteous at all times. Remember that you're not communicating with a computer screen, but with a human being who has thoughts and feelings just like you. So, always think of the person on the receiving end of your messages.

b) Do not TYPE ALL IN CAPITAL LETTERS for emphasis

7

Page 8: Nota Ictl Tingkatan 1

AZAWADI EMPUN

IT LOOKS LIKE YOU ARE SHOUTING. If you need to emphasize a word, use asterisks, like *this* or lines, like _this_.

c) Remember that the written word is hard to interpret

When you speak to someone, that person can hear the tone of your voice. If they can see you, they can take visual clues from your face and body to better understand your meaning. All of this is lost in text, and sometimes responses can come across as mean or rude, even when you did not intend them this way. This is the reason some people use emoticons (visual clues) in their e-mails, it saves a lot of confusion.

d) Be careful not to use rude or bad language online

Many providers will terminate your account.

e) Don't break any laws

When you're on the net, follow the same rules of behaviour that you would in real life. Remember, if it is against the law in the real world, it is against the law in cyberspace.

f) Be universal

Other users have different Web browsers, different online services, different e-mail programs etc. So don't, for example, send out e-mail with text formatting -- boldface, italics, indentations, etc. -- because many other programs will not be able to read the formatting and the recipients will receive your e-mail filled with muddled codes.

g) Be brief whenever possible

No one wants to read through a lot of unnecessary information. If you are replying to an e-mail, try editing out unimportant information and anything that is repeated.

h) Always identify yourself

If your parents require you to use an online name instead of your real one, that's fine - use your online name consistently. Never send e-mail without including your name at the bottom of the e-mail. Similarly, don't post forum messages without identifying yourself, this is seen as rude.

i) Make a good impression

Remember that the written word is the only way you can represent yourself online, so spelling and grammar count. If you are going to be writing a large amount of text for other people to see, make sure you break it up using paragraphs, it will make it easier on the eye for those that will read it.

j) Be patient with newcomers

Once you have become an Internet expert, it is easy to forget that you started out as a newbie too. Learning the rules of cyberspace is much like learning a new language; it takes practice, and includes making mistakes. So if you come across someone else's mistakes on the net, don't put them down, just politely point them in the right direction for guidance (send them a copy of these rules to get them started on their way!).

3 Adhere to netiquette in various forms of online communications

• Listing netiquette items:

     Avoid spamming

• Spam is a term used on the Internet to refer to unsolicited e-mail and Usenet postings. These messages are usually intended to entice the recipient into buying a product or service of some kind or into participating in a get-rich-quick scheme.

• The senders (known as spammers) usually distribute their messages to thousands or even millions of people at once, and they do not ask their recipients beforehand if they want to receive such mail. Therefore, you will often hear these messages called bulk e-mail, unsolicited e-mail, or junk e-mail.

8

Page 9: Nota Ictl Tingkatan 1

AZAWADI EMPUN

     Avoid Flaming

• Abusive or insulting massages sent using the internet. • Do not send rude or offensive e-mails or postings. It's bad manners and can get seriously out of hand (flame

wars). So don't flame others and if you are flamed, do not respond: you will never win. If you are flamed in a forum or chat room, or if you receive hateful e-mail, let your parents or teachers know.

     Use emoticons wisely

Basic Emoticons

:) or :-) Happy :-/ or :\ Confused:( or :-( Sad :Q or :-Q Questioning:] or :-] Really Happy :S or :-S At a loss for words:[ or :-[ Really Sad :@ or :-@ Shock or screaming:D or :-D Laughing :O or :-O "Uh Oh" or "oh no":I or :-I Indifference <S> Smiling<G> Grinning <Y> Yawning<J> Joking<L> Laughing

CYBER LAW (NOTA 5)

Various forms of communications on the Internet (NOTA 4) • E-mailing • Chatting • Conferencing (audio and video) • Net Meeting • Newsgroup • Forum

ACTIVITY :

        CREATE AN EMAIL

        CHAT WITH SKYPE (NEEDS COMMUNICATION PERIPHERALS)

        CREATING WEBSITE USE WITH MS WORD

What is Cyber Law?

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

The Cyber Law Acts In Malaysia

The Malaysian Government has already passed several cyber laws to control and reduce Internet abuse. These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998

Beside these cyber laws, there are three other cyber laws being drafted. • Private Data Protection Bill • Electronic Government Activities Bill • Electronic Transactions Bill

9

Page 10: Nota Ictl Tingkatan 1

AZAWADI EMPUN

Digital Signature Act 1997

Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.

Computer Crimes Act 1997

Gives protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks.

Users can protect their rights to privacy and build trust in the computer system. The government can have control at a certain level over cyberspace to reduce cyber crime activities.

Telemedicine Act 1997

The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected.

This act provides future development and delivery of healthcare in Malaysia.

Communications And Multimedia Act 1998

The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia. NEEDS FOR CYBER LAW

Examples of Cyber abuse on the users

• sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market

10