SlideShare a Scribd company logo
1 of 17
Introduction to
PC Operations NC II/
Computer Education I
Mrs. Lanie P. Plecerda
Instructor 3
MSWord - Wordprocessing
MS Excel – Spreadsheet application
MS Powerpoint – Presentation
Internet – Email and search the web
Introduction
Computer – a machine that performs tasks,
such as calculations or electronic
communications, under the control of a set
of instructions called a program.
Elements of a Computer System
1. Human Resources
2. Hardware
3. Software
Elements of a Computer System
Human Resources – are required to perform the
planning, operations, and some of the controls
external to the physical computer. Ex. Computer
Operator, System Analyst and Computer
Programmer
Hardware – refers to the physical components of a
computer system or an electronic components that
make up the computer system.
Software – is intangible and can only be seen but not
felt. It is an instruction that tell a computer exactly
what to use and what sequence of operations to
perform with the data.
Major Hardware Components
CPU – is the heart and brain of the computer.
It allow the computer to “think” about the
input given.
Memory – is classified either as primary and
secondary
I/O Devices – these are devices attached to
the main unit to facilitate communication (or
interface) between the user and the
computer.
Three Main Components of CPU
1. Control Unit – which is responsible for
maintaining order among the hardware
components. It acts like a traffic director; it
controls and directs the flow of information
between the input/output units and the central
processor.
2. ALU (Arithmetic Logic Unit) – which is
responsible for manipulating the data as required. It
contains all the electronic circuits for performing
the arithmetic calculations and logical comparisons.
3. Registers – which serve as temporary storage
areas for data during processing.
Software
a. Firmware – is software stored permanently in
chips in the computer’s circuitry making in
unalterable by computer users.
b. Operating System – Ex. DOS, Windows XP
c. Application Software – is software that
performs a specific task such as word
processing, spreadsheet design or database
management.
d. System Software – is software that is used to
operate and maintain a computer system.
Light Pen
Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held
pointer contains sensors that send signals to the computer whenever light is recorded. The
computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty
times every second. Because of this, the computer is able to determine the pen’s position by
noting exactly when the pen detects the electron beam passing its tip. Light pens are often used
in computer-aided design and computer-aided manufacture (CAD and CAM) technology because
of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on
a computer display screen.
A personal computer (PC)
enables people to carry out an
array of tasks, such as word
processing and slide
presentations. With a
connection to the Internet,
users can tap into a vast
amount of information on the
World Wide Web, send e-mail,
and download music and
videos. As a family tool, the PC
may be used for school,
research, communication,
record keeping, work, and
entertainment.
Computer System
A typical computer system consists of a central processing unit (CPU), input devices, storage
devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control
section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations.
The registers store data and keep track of operations. The control unit regulates and controls
various operations. The internal bus connects the units of the CPU with each other and with
external components of the system. For most computers, the principal input device is a
keyboard. Storage devices include external floppy disc drives and internal memory boards.
Output devices that display data include monitors and printers.
Memory
ROM (Read Only Memory) – is non-volatile
since its contents are not erased when the power
is off.
RAM (Random Access Memory) – is volatile,
its contents are lost when power is off, thus the
need for secondary storage where documents
and resulting information can be stored.
Primary - it is a storage which is immediately
accessible to the computer.
Secondary – holds data for a long period of
time.
Three Basic Operations
INPUT – computer is supplied with
necessary data and processing
instructions.
PROCESSING/COMPUTING – the
input data is processed and the answers
computed accordingly to the
instructions.
OUTPUT – the answers or results are
reported back to the computer user.
Characteristics of a Modern Computer
1. Electronic
2. Internal storage – used for storing both the
computer program and data being
processed.
3. Stored Program – the program of
instructions which stipulates the sequential
operations that the computer is to carry
out.
4. Program modification – ability to
automatically modify a program.
Advantages of Using a Computer
1. Speed – it saves a tremendous amount of time
2. Accuracy – if the computer is properly programmed and
provided with accurate data, it will do the intended work
with unerring accuracy.
3. Reliability – can work almost twenty-four hours a day
with a little time-out for equipment check up and
maintenance.
4. Retention – can store and save massive files of data and
programs.
5. Economy – the per unit cost of processing data or doing
computations by computer considerably lower than by
alternative actions.
6. Versatility – can used to solve a wide variety of problems
that arise in science and business.
Limitations of Computer
a. Dependence on People – it can only execute the
precise instructions that human beings provide.
b. Time-consuming and programming work – it is
unproductive until it is given the program that tells it
what operations to perform.
c. Disruptiveness – the results can reduced morale,
alienation, confusion and even sabotage.
d. Robot-like Processing – it is a big dumb machine,
dependent entirely on those who control it.
e. Computer Security – other security systems are
computer controlled, responding to specific pre-
recorded voice commands or physical characteristics lie
handprints.
Kinds of Computer
General Purpose Computer – used for a
wide variety of applications such inventory,
payroll, accounting, market research and sales
analysis.
Special Purpose Computer – incorporated
many features of general purpose computers
but support highly specialized data processing
tasks. Ex. Navigational computer on an
airplane.
End of Introduction

More Related Content

What's hot

Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & PackagesMakaha Rutendo
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222Niraj Choudhary
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computerSandeep Menon
 
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre. Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre. ajayskumars
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organizationUniversity of Potsdam
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2Amit Chandra
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)Samiullah Khan
 
Presentation on Basic Computer
Presentation on Basic ComputerPresentation on Basic Computer
Presentation on Basic Computerrimplebaggan
 
Computer skills vocabulary
Computer skills vocabularyComputer skills vocabulary
Computer skills vocabularyEllie Simons
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1Ndubi Amos
 
Computer System - An Overview
 Computer System - An Overview Computer System - An Overview
Computer System - An OverviewHitesh Singh
 
Introduction to computing Lecture no 1
Introduction to computing Lecture no 1Introduction to computing Lecture no 1
Introduction to computing Lecture no 1Ehtashamulhaq17
 

What's hot (20)

Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computer
 
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre. Basic Computer Training Institute in Ambala ! Batra Computer Centre.
Basic Computer Training Institute in Ambala ! Batra Computer Centre.
 
Computer system
Computer systemComputer system
Computer system
 
Components of computer and organization
Components of computer and organizationComponents of computer and organization
Components of computer and organization
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)
 
Presentation on Basic Computer
Presentation on Basic ComputerPresentation on Basic Computer
Presentation on Basic Computer
 
Computer system
Computer systemComputer system
Computer system
 
Computer skills vocabulary
Computer skills vocabularyComputer skills vocabulary
Computer skills vocabulary
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Introduction To ICTs
Introduction To ICTsIntroduction To ICTs
Introduction To ICTs
 
Computer System - An Overview
 Computer System - An Overview Computer System - An Overview
Computer System - An Overview
 
Introduction to computing Lecture no 1
Introduction to computing Lecture no 1Introduction to computing Lecture no 1
Introduction to computing Lecture no 1
 

Viewers also liked

Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)Caroline Kimball
 
Biodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated SiteBiodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated SiteJenil Jariwala
 
Presentaciondelcursohpycy
Presentaciondelcursohpycy Presentaciondelcursohpycy
Presentaciondelcursohpycy Manuel Lopez
 
La lengua y los hablantes
La lengua y los hablantesLa lengua y los hablantes
La lengua y los hablantessacra_bachoco
 
Encuesta Venezuela
Encuesta VenezuelaEncuesta Venezuela
Encuesta Venezuelacravanzini
 
Curriculum Vita eng
Curriculum Vita engCurriculum Vita eng
Curriculum Vita engPiotr Kubiak
 
Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17tzormbas
 
Patricia wright resume 2015
Patricia wright resume 2015Patricia wright resume 2015
Patricia wright resume 2015Patricia Branca
 
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимуществаПрограмма для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимуществаVisitBasis Tech, LLC
 
Boulton on Abatement
Boulton on AbatementBoulton on Abatement
Boulton on AbatementAnn Treacy
 
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)New City Church
 

Viewers also liked (15)

DIB
DIBDIB
DIB
 
Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)Sales Guide to Social Media 1.2 (1)
Sales Guide to Social Media 1.2 (1)
 
What you should know about tech support scams
What you should know about tech support scamsWhat you should know about tech support scams
What you should know about tech support scams
 
CV2016
CV2016CV2016
CV2016
 
Biodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated SiteBiodegradation of Oil Contaminated Site
Biodegradation of Oil Contaminated Site
 
Presentaciondelcursohpycy
Presentaciondelcursohpycy Presentaciondelcursohpycy
Presentaciondelcursohpycy
 
La lengua y los hablantes
La lengua y los hablantesLa lengua y los hablantes
La lengua y los hablantes
 
Encuesta Venezuela
Encuesta VenezuelaEncuesta Venezuela
Encuesta Venezuela
 
Curriculum Vita eng
Curriculum Vita engCurriculum Vita eng
Curriculum Vita eng
 
HAMARATA PROFILE PDF
HAMARATA PROFILE PDFHAMARATA PROFILE PDF
HAMARATA PROFILE PDF
 
Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17Εισαγωγή στο LinuxMint 17
Εισαγωγή στο LinuxMint 17
 
Patricia wright resume 2015
Patricia wright resume 2015Patricia wright resume 2015
Patricia wright resume 2015
 
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимуществаПрограмма для мобильной торговли Visitbasis: цели, возможности, преимущества
Программа для мобильной торговли Visitbasis: цели, возможности, преимущества
 
Boulton on Abatement
Boulton on AbatementBoulton on Abatement
Boulton on Abatement
 
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
Sermon Slide Deck: "The Core Value Of Community" (1 Peter 1:22-25)
 

Similar to Introduction to PC Operations NC II

Computer application in business
Computer application in businessComputer application in business
Computer application in businessshashank singh
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpINFOCHIEF institute
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introductionsriushakeerthi2
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and softwareKarl John Piocos
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptxAyyappanSri
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
introduction to computer
introduction to computerintroduction to computer
introduction to computerarehkelvin
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introductionVhe Cagande
 
Basics Of Computers | The Computer System
Basics Of Computers | The Computer SystemBasics Of Computers | The Computer System
Basics Of Computers | The Computer SystemNehaRohtagi1
 

Similar to Introduction to PC Operations NC II (20)

Intro to computer
Intro to computerIntro to computer
Intro to computer
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Elements of computer and brief introduction
Elements of computer and brief introductionElements of computer and brief introduction
Elements of computer and brief introduction
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Data processing
Data processingData processing
Data processing
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
 
Input
InputInput
Input
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What is computer
What is computerWhat is computer
What is computer
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
 
C with lab
C with labC with lab
C with lab
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Basics Of Computers | The Computer System
Basics Of Computers | The Computer SystemBasics Of Computers | The Computer System
Basics Of Computers | The Computer System
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Introduction to PC Operations NC II

  • 1. Introduction to PC Operations NC II/ Computer Education I Mrs. Lanie P. Plecerda Instructor 3
  • 2. MSWord - Wordprocessing MS Excel – Spreadsheet application MS Powerpoint – Presentation Internet – Email and search the web
  • 3. Introduction Computer – a machine that performs tasks, such as calculations or electronic communications, under the control of a set of instructions called a program. Elements of a Computer System 1. Human Resources 2. Hardware 3. Software
  • 4. Elements of a Computer System Human Resources – are required to perform the planning, operations, and some of the controls external to the physical computer. Ex. Computer Operator, System Analyst and Computer Programmer Hardware – refers to the physical components of a computer system or an electronic components that make up the computer system. Software – is intangible and can only be seen but not felt. It is an instruction that tell a computer exactly what to use and what sequence of operations to perform with the data.
  • 5. Major Hardware Components CPU – is the heart and brain of the computer. It allow the computer to “think” about the input given. Memory – is classified either as primary and secondary I/O Devices – these are devices attached to the main unit to facilitate communication (or interface) between the user and the computer.
  • 6. Three Main Components of CPU 1. Control Unit – which is responsible for maintaining order among the hardware components. It acts like a traffic director; it controls and directs the flow of information between the input/output units and the central processor. 2. ALU (Arithmetic Logic Unit) – which is responsible for manipulating the data as required. It contains all the electronic circuits for performing the arithmetic calculations and logical comparisons. 3. Registers – which serve as temporary storage areas for data during processing.
  • 7. Software a. Firmware – is software stored permanently in chips in the computer’s circuitry making in unalterable by computer users. b. Operating System – Ex. DOS, Windows XP c. Application Software – is software that performs a specific task such as word processing, spreadsheet design or database management. d. System Software – is software that is used to operate and maintain a computer system.
  • 8. Light Pen Light pens are electronic pointers that allow users to modify designs on-screen. The hand-held pointer contains sensors that send signals to the computer whenever light is recorded. The computer’s screen is not lit up all at once, but traced row-by-row by an electron beam sixty times every second. Because of this, the computer is able to determine the pen’s position by noting exactly when the pen detects the electron beam passing its tip. Light pens are often used in computer-aided design and computer-aided manufacture (CAD and CAM) technology because of the flexibility they provide. Here, an engineer uses a light pen to modify a technical drawing on a computer display screen.
  • 9. A personal computer (PC) enables people to carry out an array of tasks, such as word processing and slide presentations. With a connection to the Internet, users can tap into a vast amount of information on the World Wide Web, send e-mail, and download music and videos. As a family tool, the PC may be used for school, research, communication, record keeping, work, and entertainment.
  • 10. Computer System A typical computer system consists of a central processing unit (CPU), input devices, storage devices, and output devices. The CPU consists of an arithmetic/logic unit, registers, control section, and internal bus. The arithmetic/logic unit carries out arithmetical and logical operations. The registers store data and keep track of operations. The control unit regulates and controls various operations. The internal bus connects the units of the CPU with each other and with external components of the system. For most computers, the principal input device is a keyboard. Storage devices include external floppy disc drives and internal memory boards. Output devices that display data include monitors and printers.
  • 11. Memory ROM (Read Only Memory) – is non-volatile since its contents are not erased when the power is off. RAM (Random Access Memory) – is volatile, its contents are lost when power is off, thus the need for secondary storage where documents and resulting information can be stored. Primary - it is a storage which is immediately accessible to the computer. Secondary – holds data for a long period of time.
  • 12. Three Basic Operations INPUT – computer is supplied with necessary data and processing instructions. PROCESSING/COMPUTING – the input data is processed and the answers computed accordingly to the instructions. OUTPUT – the answers or results are reported back to the computer user.
  • 13. Characteristics of a Modern Computer 1. Electronic 2. Internal storage – used for storing both the computer program and data being processed. 3. Stored Program – the program of instructions which stipulates the sequential operations that the computer is to carry out. 4. Program modification – ability to automatically modify a program.
  • 14. Advantages of Using a Computer 1. Speed – it saves a tremendous amount of time 2. Accuracy – if the computer is properly programmed and provided with accurate data, it will do the intended work with unerring accuracy. 3. Reliability – can work almost twenty-four hours a day with a little time-out for equipment check up and maintenance. 4. Retention – can store and save massive files of data and programs. 5. Economy – the per unit cost of processing data or doing computations by computer considerably lower than by alternative actions. 6. Versatility – can used to solve a wide variety of problems that arise in science and business.
  • 15. Limitations of Computer a. Dependence on People – it can only execute the precise instructions that human beings provide. b. Time-consuming and programming work – it is unproductive until it is given the program that tells it what operations to perform. c. Disruptiveness – the results can reduced morale, alienation, confusion and even sabotage. d. Robot-like Processing – it is a big dumb machine, dependent entirely on those who control it. e. Computer Security – other security systems are computer controlled, responding to specific pre- recorded voice commands or physical characteristics lie handprints.
  • 16. Kinds of Computer General Purpose Computer – used for a wide variety of applications such inventory, payroll, accounting, market research and sales analysis. Special Purpose Computer – incorporated many features of general purpose computers but support highly specialized data processing tasks. Ex. Navigational computer on an airplane.