Premium Essay

Intro to Pc Notes

In:

Submitted By SSouza
Words 300
Pages 2
Computer Structure & Logic Notes 9/21/13(Overview)
Computer – An electronic device that will take data & process data into information Binary – Only language a computer understands
Computer Cycle/Machine cycle – Four parts: 1.Fetch – Go get the instructions 2.Decode – Machine code = binary code

3.Execute – Solve the instructions 4.Store – Puts the answer in temporary locations called registers (motherboard)
What is a computer system? - Five Parts (Hardware, Software, Communications, Data, Users, and procedures. 1.Hardware – The machine(four parts) 1)Input Devices – hardware used to input info, IE: Keyboard, mouse, touchscreen, touchpad, microphone, scanner, camera, biometric, bar code reader, OMR, MICR, gaming, midi, sensors 2)Processing (five parts) A)Microprocessor = Chip = CPU 1)Control Unit – the “heart”, fetches and decodes 2)ALU – “the brain”, “Arithmetic Logic Unit”, solves B)Motherboard C)Memory 1)ROM – Permanent memory, manufactured memory 2)RAM – Main memory 3)CACHE - $ D)Busses E)Registers 3)Output – Soft & Hard A)Soft – Monitor, LCD, CRT B)Hard – Printers, lasers, ink-jet, blotters 4)Storage A)Magnetic Media – Hard Drive, “C”, partition B)Optical Media – CD/DVD C)Solid State Drive D)Flash - (USB) E)Cloud – Dropbox, Skydrive, GRFID

2.Software – Program(A problem to be solved with the computer)(two parts) 1)Applications

Similar Documents

Free Essay

Computer Ethics

...Computer Ethics Angel L Rivera CIS106020VA016-1146-001 (Intro to Info Technology) Prof MERRITT, JENNIFER 8.7.2014 1-Describe two (2) potential computer ethics issues associated with holding computers hostage. A- Computer Crime: Attacks on Software through Back Doors or Trojan Horses- The intruder creates a malicious code just like they would to create other types of malware. The code is specifically designed to take control of your computer and then hijack all of your files. The files are then placed in an encrypted format so you no longer have access to them. B- Computer Crime: Attacks on People - Sabotage/Destruction of Data
-If you fail to pay, the intruder is capable of creating additional malicious code that will destroy the content of your PC a little bit at a time until you pay up. Another type of ransomware presents itself in the form of a Trojan, which scans all of your PC's directories and drives, and then automatically encrypts all of your files so you cannot access them. The Trojan places the finishing touch on the intrusion by leaving a ransom note. 2-Propose two (2) methods that computer users could use to prevent this type of attack. A- Your best defense is to not click on e-mail attachments from unknown sources and avoid clicking anything in a pop up window that you receive while browsing the Internet. B- Make sure your anti-malware software has the latest and greatest definition files so that it is prepared for the current batch...

Words: 512 - Pages: 3

Premium Essay

Common Lab Tasks

...your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You...

Words: 2387 - Pages: 10

Premium Essay

Common Lab Tasks

...your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You...

Words: 2388 - Pages: 10

Free Essay

Macpro Killer $4000

...MacPro Killer: By: killa hafiz Intro: The purpose of this article is to build a computer that can either perform at the same level as the MacPro 2013 for the same or less money. I have recently been told by people (Mac FanBoys) that I can’t build a pc just as fast for equal cost hence the necessity of this article. Note For this article we will be building a pc that is comparable to the 6-core configuration, so that sets my budget at a $4,000 limit. Processor: The Processor used in the Mac Pro is equal to an Intel Xeon E5-1650 running at 3.5 GHz. It has 6 processing cores and 12 threads. The processor I will be using in my build is Intel Core I7-4930K. It has 6 cores 12 threads and runs at 3.4 GHz. I have chosen the Core I7, because not only is it faster, but it is also half the price of the Xeon E5. The only advantage the Xeon has is that it can use Error correcting memory and the core I7 cannot. This means that I would have the potential for a higher ram upgrade by going with the Xeon but I don’t care, in the end of the day The core I7 is faster out of the box, can be over clocked, costs $500 less, and what’s to stop me from upgrading in the future. Intel Core I7-4930K Pass Mark Score: 13,550 Intel Xeon E5-1650 Pass Mark Score: 12,396 My Choice: Intel Core-I7 4930K $500 Motherboard: I will be using Asus Rampage IV Gene. As far as features and performance is concerned this one here is a no brainer. The only thing that hurts is that it only supports a maximum...

Words: 886 - Pages: 4

Free Essay

Networking

...NT1210 FINAL PROJECT INTRO TO NETWORKING Computer lab design Item | Qty | Description | Price | Item code | Total | HP All-in-One PC | 32 | 18-5110 (G4B05AA#ABA) AMD Dual-Core Processor E1-2500 (1.40GHz) 4GB DDR3 500GB HDD 18.5" Windows 8.1 | $309.99 | Item#: N82E16883280514 | $9,919.68 | Tri-Band Gigabit Wireless Router | 1 | NETGEAR R8000-100NAS Nighthawk X6 AC3200 | $299.99 | Item#: N82E16833122611 | $299.99 | Laser Printer | 2 | Samsung SL-C1860FW/XAA Up to 19 ppm Color Wireless 802.11b/g/n | $224.99 | Item#: N82E16828112551 | $250.00 | 48-Port Fast Ethernet Smart Switch | 1 | NETGEAR ProSAFE FS750T2NA w/ 2 Gigabit Ports 10/100 Mbps | $214.50 | Item#: N82E16833122082 | $214.50 | Pivot-Plug Surge Protector | 3 | BELKIN BP112230-08 8 Feet 12 Outlets 4320 Joules | $33.99 | Item#: N82E16812107131 | $101.97 | Printer/Fax Stand | 1 | Safco 5206BL Under desk, 1-Shelf, 19w x 16d x 13-1/2h, Black | $56.99 | Item#: N82E16848045141 | $56.99 | Wireless Keyboard and Mouse Combo - Black | 32 | Logitech MK520 2.4GHz | $39.95 | Item #: N82E16823126192 | $1278.40 | Black Cat 6 Network Cable | 8 | Link Depot C6M-25-BKB 25 FT | $7.99 | Item #: N82E16812189032 | $63.92 | | | | | Total | 12,185.45 | Labor charge | $22.00 | 5 Technical assemblers | 20 hrs. | | $2,200 | | | | | Total | 14,385.45 | taxes | $.07 | | | | $.07 | | | | | Total | 15,392.432 | Justification for product necessity. In order to turn this classroom into a computer...

Words: 538 - Pages: 3

Premium Essay

Syllabus

...Alabama 36082 Office: 334-670-3195 office jteng@troy.edu Dr. Joe Teng Troy University Chair, Information Systems and Quantitative Methods 334-670-3195 jteng@troy.edu Telephone: E-Mail: Troy Department Chair: The syllabus for this class includes the TROY Department Chair contact information for Dr. Teng. This is provided in the event you cannot resolve a situation with me, your instructor. PLEASE do not contact (e-mail or phone) Dr. Teng with a question, problem, or concern unless you have first contacted me and you have not received a response from me within 24-48 hours, or if you do not agree with my response. Thank you for your help in this matter. Students: Please place IS 2241 XTIC in the subject line of any emails sent to me. NOTE: For a course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via email or Blackboard announcement, when changes are made in the requirements and/or grading of the course. INSTRUCTOR EDUCATION: Ph.D., Management Information Systems. The University of Memphis, Memphis, Tennessee MBA., Arkansas State University, Jonesboro, Arkansas. B.Sc., Electrical Engineering, Southern Illinois University, Carbondale Illinois. BA., Psychology, Southern Illinois University, Carbondale Illinois. Page 1 of 11 IS2241 – Dr. Joe Teng TEXTBOOK(S) AND/OR OTHER REQWUIRED MATERIALS: The textbook provider for eTROY is MBS Direct....

Words: 5096 - Pages: 21

Free Essay

Laptop Versus Tablet: Which One to Buy?

...Assignment 1: Laptop Versus Tablet: Which One to Buy? Jana Brown Dr. Laurant Jolly CIS Intro Mgt. Info Systems April 24, 2016 Laptop or tablet that is the question, it is always very hard to make this decision. Going for a laptop is generally considered the better choice and use to be the more popular choice. You can over work you brain trying to figure out what band, style, size, color, etc. Table and laptop both have endless feature and option so you can see why you can lose your top. Here is the mean question you should ask yourself before buying What am I using my system for? By asking this question first I will help narrow down some of your options. By asking yourself this question you can focus on the laptop or tablet that fits your needs. So if you going to use the device at work and are going to need a lot of computer power to create things such as documents, presentation and spreadsheets, you will want to choice a laptop. The tablet can perform all these functions, if used consistently for this purpose, the speed and computing power will make a laptop more efficient. So if the device is going to be used for work but will be moved around from home and work or whatever then you will not need a lot of storage capacity will not be needed and a tablet will be a great choice. Most tablets the features of a laptop in which you will need or want to get a USB connections and keyboard. Technologies has emerged to allow you to be flexible and connect a keyboard when...

Words: 804 - Pages: 4

Premium Essay

Video Game Industry- 5 Forces Analysis

...Esmir Hadzic 661035592 Intro to Management 2/4/14 Five Forces Analysis of the Video Game Industry As in every industry, there are five competitive forces that determine the intensity of competition between the different players. These competitive forces are; the threat of entry of a new company in the industry, the threat of substitution by another product, the bargaining power of the buyers, the bargaining power of the suppliers, and rivalry among currently existing competitors. These competitive forces are easily seen in the video game industry, as there is already immense competition in the industry due to the similarities between the few major companies at play. Sony, Nintendo, and Microsoft are the three large players in the present day video game industry. Sony Computer Entertainment Inc. has been a dominant company in the industry for over a decade with the PlayStation 1 and PlayStation 2 platforms; however, it is struggling to stay at the helm of the industry due to the presence of these competitive forces. The threat of entry of a new company in the video game industry is a relatively weak competitive force for Sony. The video game industry is already dominated by three major players (Sony, Nintendo, and Microsoft), thus the possibility of a new entrant in the industry is very low. Nintendo was established well before Sony as a major player, and Microsoft came into the industry in 2001 with the original Xbox. When Sony came in with the PlayStation 1, they...

Words: 1451 - Pages: 6

Free Essay

Documentation Tactics

...Getting Started Important note: The Burning Crusade is an expansion set to World of Warcraft. You must already have a properly installed copy of World of Warcraft in order to install and play this expansion. Installing the Game (PC) TM Welcome Back to the World of Warcraft! System Requirements: OS: Windows 2000 (Service Pack 4); Windows XP (Service Pack 2). Processor: Intel Pentium 3 800MHz, or AMD Duron 800MHz. Memory: 512 MB RAM, 1 GB RAM is recommended. Video: Minimum: 32 MB 3D graphics processor with Hardware Transform and Lighting, such as an NVIDIA GeForce 2 class card or above. Recommended: 64MB VRAM 3D graphics processor with Vertex and Pixel Shader capability, such as an NVIDIA GeForce FX 5700 class card or above. For a complete list of supported 3D cards, please visit: http://www.blizzard.com/support/wow/?id=aww0830p Sound: DirectX-compatible sound card. Install Size: 10 gigabytes of hard disk space. Installation Instructions Place The Burning Crusade CD/DVD into your CD-ROM or DVD-ROM drive. If your computer has autoplay enabled, an installation window will automatically pop up on your Windows desktop. Click the Install Burning Crusade button and follow the onscreen instructions to install The Burning Crusade to your hard drive. If the installation window does not appear, open the My Computer icon on your desktop and double-click on the drive letter corresponding to your CD-ROM or DVD-ROM drive to open it. Double-click on the Install.exe icon...

Words: 7288 - Pages: 30

Free Essay

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly...

Words: 3168 - Pages: 13

Free Essay

Matlab & Ss

...File | New | M-file. In UNIX, the Editor window pops up when you type in the command window: edit filename (‘filename’ is the name of the file you want to create). The command window is the main window in which you communicate with the MATLAB interpreter. The MATLAB interpreter displays a command >> indicating that it is ready to accept commands from you. • View the MATLAB introduction by typing >> intro at the MATLAB prompt. This short introduction will demonstrate some basic MATLAB commands. • Explore MATLAB’s help capability by trying the following: >> help >> help plot >> help ops >> help arith • Type demo and explore some of the demos of MATLAB commands. • You can use the command window as a calculator, or you can use it to call other MATLAB programs (M-files). Say you want to evaluate the expression [pic], where a=1.2, b=2.3, c=4.5 and d=4. Then in the command window, type: >> a = 1.2; >> b=2.3; >> c=4.5; >> d=4; >> a^3 + sqrt(b*d) - 4*c ans = -13.2388 Note the semicolon after each variable assignment. If you omit the semicolon, then MATLAB echoes back on the screen the variable value. Arithmetic Operations There are four different arithmetic operators: + addition...

Words: 2151 - Pages: 9

Premium Essay

Apple vs Microsoft

...is on pace with the speed of PC laptops. Windows users have less and less reasons to remain Windows users. Running parallel to the increasing reasons to consider Mac over Windows is the fact that our world has evolved from a desktop world to a laptop world. Laptops are so fast and well-equipped nowadays that they serve the needs of not only consumer users, but also professional users such as graphic designers and high-end Photoshop users. There's now only two groups of users that should even consider buying desktops:1. mega-power users. This includes hardcore gamers, 3d animation users and professional video editors. These guys need the fastest machines available to make their processor-hogging routines running faster and faster.2. super-budget users. You can get a nice desktop for $500 nowadays. nice laptops go for about $1000+.That leaves the rest of us. And that's a large group. Laptops offer a freedom that no desktop (or even an iMac) can offer: Portability. Use the laptop on the couch while watching TV. Use it at your desk to get serious work done. Use it on the deck to enjoy the spring weather. Use it at the coffee shop or library to simply look cool. Plus, they save a ton of space. Laptops are so powerful that it would be foolish to consider buying a desktop. MAC VS. MICROSOFTPROCESSOR The speed debates are much more clear cut these days since macs and pcs are running the same processor. Mac laptops run with the Intel Core 2 Duo. Most PCs run with the Intel Core 2 Duo...

Words: 7892 - Pages: 32

Free Essay

Rakamakafoo

...C O U R S E 5 6 5 Networking Technologies Volume 1 This document should only be used by a Novell-certified instructor. Ifyouthinkthisdocumentwaspirated,call1-800-PIRATESor1-801-861-7101. Networking Technologies Instructor Guide (Volume 1) Education INSTRUCTOR GUIDE 100-004273-001 Revision 1.0 Proprietary Statement Copyright © Novell, Inc. 1994, 1997, 1998. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc. 1555 North Technology Way Orem, Utah 84097-2399 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of NetWare software...

Words: 27853 - Pages: 112

Free Essay

Project

...1   Table  of  Contents   Executive  Summary   ...............................................................................................  3   Intro  ......................................................................................................................  4   Issues  &  Outlook  Profile  .........................................................................................  6   Mission  and  Strategy  ........................................................................................................................................  6   Key  Issues  ..............................................................................................................  8   Slow  to  Innovate  .................................................................................................................................................  8   PC  Market  in  Decline  ........................................................................................................................................  8   Mobile  Device’s  Poor  Performance  ............................................................................................................  9   The  External  Environment  ....................................................................................   10   PESTEL  Analysis  ............................................................................

Words: 8505 - Pages: 35

Free Essay

Led 8x8x8

...Home Sign Up! Browse Community Submit All Art Craft Food Games Green Home Kids Life Music Offbeat Outdoors Pets Photo Ride Science Tech LED Cube 8x8x8 by chr on November 16, 2010 Table of Contents LED Cube 8x8x8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro: LED Cube 8x8x8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1: Skills required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2: Component list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . File Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3: Ordering components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 21520 - Pages: 87