SlideShare ist ein Scribd-Unternehmen logo
1 von 26
A KCSE Computer Studies Presentation
TOPIC:
INTRODUCTION TO COMPUTER
PREPARED BY: Maurice Atika Nyamoti 1
Press enter key(or click) to continue
ACCESS: www.academic.manyamfranchise.com for more
INTRODUCTION TO COMPUTER
ď‚—Definition of a computer
ď‚—Common terminologies used in computer
ď‚—Parts of a computer
ď‚—Examples of peripheral devices
ď‚—Development of Computers
ď‚—Classification of computers
ď‚—Areas where computers are used
ď‚—The computer laboratory
ď‚—Hands-on-Skills
PREPARED BY: Maurice Atika Nyamoti 2
pc
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Definition of a computer
ď‚—Just like other machines, computers make work easier.
Majority of people refer a PC (personal computer) as
the real computer, however a mobile phone, calculator,
weighing machine, watch, washing machines etc are
also computers as such.
ď‚—You can define a computer according to what it does,
thus a computer can be described as a device that
processes data into information
ď‚—A computer can also be described as an electronic
device that saves, transmits and processes data into
information.
ď‚—Example: a calculator is able to add 1+1 to get 2. thus 1+1
represents data and 2 represents information.
PREPARED BY: Maurice Atika Nyamoti 3
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Common terminologies used in computer
ď‚— Data- it simply refers to a collection of
numbers, characters which have no much
meaning to the user.
ď‚— Information-is a sequence of numbers and
characters which can be interpreted as
having meaning. Information can also be
described as processed data
ď‚— A computer Program- is a sequence of
instructions written to perform a specified
task with a computer.
ď‚— Input stage- this stage involves entering
data into the computer using input devices
i.e. keyboard
ď‚— Processing- this stage involves processing
of data using processing devices i.e. the
CPU
ď‚— Output stage- this stage involves the
processing outcome that will be displayed
by output devices i.e. the screen
PREPARED BY: Maurice Atika Nyamoti 4
INPUT
PROCESSING
OUTPUT
STORAGE
FEEDBACKPress enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Parts of a computer
ď‚—A Computer has so many
parts that work together to
process data. However
there are four major parts
that make up a computer
and these include: System
unit, Screen, Keyboard and
mouse
ď‚—Other parts include:
scanners, drives, cards,
modems, speakers, printers
etc.
ď‚—Anything attached to the
system unit is referred to as
a peripheral device
PREPARED BY: Maurice Atika Nyamoti 5
System unit Screen Mouse
Keyboard Drive
Modem printer Card
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Examples of peripheral devices
PREPARED BY: Maurice Atika Nyamoti 6
A computer can have as many peripheral devices as it can hold. They range from
the screen, mouse, keyboard, webcam, camcorder, printer, modem, scanner,
joystick, trackball, projector, digital camera, speakers, microphone, stylus etc
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Development of Computers
ď‚—Abacus, believed to exist before Christ, was used by Asian merchants
to calculate complex mathematical calculations.
ď‚—In 1830s Charles Babbage designed an analytical engine which is
believed to be the mother of all modern computers.
ď‚—In 1939, Howard Aiken of Harvard University designed a fully
automatic calculator called Mark 1.
ď‚—From 1939-1946, at the Univ. of Pennsylvania introduced ENIAC
(electronic numeric integrator and calculator). It is believed to be the
first all-purpose electronic digital computer that used thousands of
vacuum tubes and produced a lot of heat.
ď‚—In 1951,UNIVAC (UNIVersal Automatic Computer) became the first
computer to handle both numeric and alphabetic data with equal
facility; this was the first commercially available computer.
ď‚—1957 to date, smaller but more powerful computers were discovered
which were more capable of transmitting, processing and saving data
of large amounts. Had higher speed, produced less heat and processed
on microprocessors. These computers are today referred to as third
and fourth generation computers
PREPARED BY: Maurice Atika Nyamoti 7
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Development of Computers
The table below shows a summary of development of computers
Age Name Advancements Use
Before
Christ
Abacus It was made of wood and
beads.
Used by Asian merchants to count wealth
1614-1620 Log tables Paper and pen Used to calculate complex mathematical expressions
1647 Mechanical
calculator
calculator To solve complex mathematical expressions
1792-1871 Analytical
engine
Computer Combine arithmetic process with decision based on
its own computer
1946-1956 First
generation
computers
Computer (used thermionic
valves and vacuum tubes to
process data)
Store and Process Data
1957-1963 Second
generation
computers
Computer (used
transistors to process
data)
Store and Process Data
1964-1979 Third
generation
computers
Computer (used integrated
circuits (ICs) to process
data)
Store, transmit and Process data with better
storage and increased speed of processing
1979-1989 Fourth
generation
computers
Computer (used VLSI-very
large scale integrated
circuits to process data)
Store, transmit and Process data with better
storage and increased speed of processing than 3G
computers
1990-
present
Fifth
generation
computers
Computer (use advanced
VLSI in the name of
microprocessor to process
data)
Store, transmit and Process data with better
storage and increased speed of processing, small in
size and emit less heat and consumes less power.
Faster than 4G computers and also portable.
PREPARED BY: Maurice Atika Nyamoti 8
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
ď‚—Computers can be classified according to physical size, functionality
and purpose as shown in the organizational chart below
PREPARED BY: Maurice Atika Nyamoti 9
Classification of computersClassification of computers
1. Physical size1. Physical size 3. Purpose3. Purpose
2. Functionality2. Functionality
1. Classification according to physical size
Physical sizePhysical size
• Super computers• Super computers
• Main frames• Main frames • Mini computers• Mini computers • Micro computers• Micro computers
Classification of computers
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 10
1. Description of computers according to physical size
Size Characteristics Uses
super computers Largest, fastest, powerful and most
expensive. they also generate a lot of
heat
Used for advanced
scientific research such
as nuclear physics.
Main frames Less powerful and less expensive than
super computers. They also have a
large storage capacity
Used to handle all kinds of problems
whether scientific or commercial. I.e.
performing complex mathematical
calculations. they are mostly found in
banks, hospitals, airports etc.
Mini computers Smaller and less powerful than the
main frame
Used in scientific laboratories, research
institutions, engineering plants and
places where processing automation is
required.
Micro computers Smallest, cheapest and relatively least
powerful. Uses a micro processor to
process data. Examples: desktop,
laptop and personal digital assistant
(PDA)
Used to perform a variety of tasks
including research, communication,
banking, learning institutions, libraries
etc.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 11
2. Classification according to functionality
Classification according to functionalityClassification according to functionality
AnalogueAnalogue DigitalDigital HybridHybrid
Computer Characteristics Uses
Analogue Process data that is
discrete in nature
Used by PCs, home appliances, TVs,
Microwaves, wall clocks etc
Digital Process data that is
continuous in nature
Used in manufacturing process control
like monitoring temperatures, pressures,
density etc
Hybrid Designed to process both
analogue and digital data
Used on manufacturing process control.
And returns a digital value. Examples
are:- a digital weighing machine, digital
thermometer etc
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 12
3. Classification according to purpose
Classification according to purposeClassification according to purpose
General purposeGeneral purpose Dedicated computersDedicated computers
Special purposeSpecial purpose
Computer Uses Examples
General purpose Designed to perform a
variety of tasks
PCs, cell phones, notebooks
etc.
Special purpose Designed specifically for
one task
Calculators, robots, cell
phones, thermometers etc
Dedicated computers Designed as a general
purpose but dedicated to
perform a specific task
PCs used for learning
environment, banking,
communication etc.
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 13
Functions of a computer:
The main functions of a
computer are:
•
Saving data
•
Processing data
•
Transmitting data
•
Detecting events
Purpose of a computer
The main purpose of a
computer is to help the user
accomplish a specific
computational task i.e.
calculating mathematical
and logical expressions,
transmitting data signals
and saving data for future
reference.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 14
Areas where computers are used
Just like all other machines, computers are used in a day-to-day life to make work easier and more efficient. Some
important application areas of a computer are given below.
Area Uses
Industry and
Commerce
Saving records, security, real-time response, automating records, communication, process
control, detection, manufacturing, accounting etc
Health Care Save records, diagnose patients, scanning of body parts, security, management of records,
communication, research, consultations, preserving bodies etc
Government
Institutions
To save and manage records of people, vehicles, activities etc, plan government calendars,
security, forecasting and drawing of budgets, communication, research activities, traffic control
etc
Education and
Research
Learning aids, research tools, keeping research records, budgeting, accounting, security,
forecasting, communications, consultations etc
Communication
Industry
Prepare programs on TV/Radio, broadcasting, producing music, tracking activities, automating
communication processes, relay of telephone signals etc
Police and Defense Tracking criminals, keeping records, used in forensic labs to filter DNA and fingerprints,
controlling traffic, communication, automating armory, military vehicles and tanks, controlling
CCTV cameras, keep track of temperatures in nuclear stations etc.
Home and Leisure Entertainment, used as TV, Radio, DVD player etc, communication, security, keeping home
records and budgeting family finances, can be used as a diary, notebook or an address book, etc
Transport and
tourism
Hotel booking system, marketing, air travel, booking and control system, communication and
research, traffic light system, shipping and sea navigation, security etc.
Agriculture Keeping inventory record, controlling farm machinery, keeping track of plants and livestock,
research and consultations, diagnosing farm diseases and pests, tracking livestock movements,
breeding and health records, irrigation etc.
Press enter key(or click) to continue
PREPARED BY: Maurice Atika Nyamoti 15
The computer laboratory
A computer lab is a room set aside for installation and use of computers.
Safety precautions and practices in the computer lab
Computer systems are expensive to acquire and maintain, and should therefore handled with care.
Causes of computer damage and measures to avoid them
1. Dust and Smoke
- dust and smoke damage the surface of the hard disk and other moving parts. To avoid them:
•Avoid smoking in the computer lab
•Cover computers with dust covers
•Put curtains along the windows
•Avoid entering the lab with muddy shoes
•Use the dust blower to blow off dust from the computers more often
2. Water and Humidity
- humidity is the amount of water vapor in the air. Water and humidity can cause rusting and if
water spills on sensitive computer parts, it can cause short circuiting thus damaging the
components. To avoid this kind of scenario:
•Avoid entering the computer lab with drinks and beverage.
•Install the computer lab with humidifiers and dehumidifiers to keep humidity at bay.
•Don’t put a water based fire extinguisher in the computer lab
•Avoid splashing water when washing the computer lab. Though, vacuum cleaning is
recommended.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 16
•Temperature
initially computers are installed with a heat sink and a fan to cool down the CPU when it’s processing.
Too much heat can break down the CPU or cause delay in processing. Therefore the computer lab must
be kept with cool temperatures in the following ways:
Causes of computer damage and measures to avoid them
•Avoid overcrowding of computers and users
•The computer lab should be well ventilated
•Consider installing air conditioning system
•Uncover computers when using them
•Power Fault
-Electricity is the most precious need in any computer lab. It is also the most dangerous if not properly
used. Power surge and brownouts are responsible for damaging computers. To avoid this:
• Avoid unnecessary movements in the computer lab to avoid hitting power cables
• Keep water off the power sockets
• Switch off the computer and the monitor immediately incase power fault has been detected
• Avoid children/pets in the computer lab
• Consider installing AVS switches (automatic voltage switches) to stabilize power
• Use UPS (uninterruptible power supply) to regulate power before entering into the computer. They can
also be used to alert the user when power goes off.
• Electric lines should always be insulated to avoid electrical shocks. They should pass in trunks along
the edges of the wall into the strategically positioned sockets.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 17
Data security and burglar proofing
-data theft and stealing of computers should be kept into consideration when building
the computer lab. To avoid this:
• Install security alarms
• Shut down the computer using the right procedure
• Put metallic grills at the doors and windows, strong roof and CCTV (closed circuit
television) cameras
• Usually use passwords and encrypt confidential data. A password is a secret code
the user must provide before accessing computer resources. Data encryption is the
process of encrypting/encoding data in way that only the sender and the receiver can
understand. For one to read this data, an encryption key (like a password) is required.
• Consider hiring security personnel
• Do not welcome strangers into the computer lab.
Fire
- fire can physically damage computers. To avoid fire:
• Do not smoke in the computer lab
• Install a gaseous fire extinguishers
• All electrical cables should be laid properly.
Causes of computer damage and measures to avoid them
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 18
Measures to protect the user
• All cables should be insulate and laid away from busy
paths
• Provide standard furniture i.e. the seat should have a
straight backrest and the table should be strong enough
to support computers and their peripheral devices
• Avoid overcrowding
• Provide anti radiation (anti-glare) screens to filter light.
as shown in the diagram below:
• The room should be properly lit and ventilated
Causes of computer damage and measures to avoid them
Anti-radiation/glare screen
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Hands-on-Skills
PREPARED BY: Maurice Atika Nyamoti 19
STARTING A COMPUTER
•Starting a computer is easy for the user since it involves pressing the
power button of the monitor then that of the system unit. WHY? While
the system unit is switched on, it checks whether all components
(hardware) attached to it are functioning in a process called POST (power-
on-self-test). Therefore the screen should be switched on first in order to
enable POST to take place. Power button is denoted by the following
symbol:
• The process of starting up a computer is referred to as booting
•There are two types of booting, namely,
1. Cold booting- a process of starting a computer that was initially
off.
2. Warm booting- a process of re-starting a computer/starting a
computer that is already on.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 20
HOW A COMPUTER STARTS STEP -BY –STEP
STEP 1: when you press the power button, the computer sends a signal to the power
supply to convert AC (alternating current) into DC (direct current). In order to
supply the computer with proper electric current and voltage.
STEP 2: once power has been received by every component and no error is reported,
a signal is sent to the motherboard by the CPU that the computer is ready to
processes instructions contained in the (BIOS) basic input/output system.
STEP3: once the computer looks at the BIOS, it begins the POST process. This
ensures that all peripheral devices are present and functioning properly. If one
device fails the test, booting process halts.
STEP 4: NEXT the computer looks at the memory located at the complimentary
metal oxide semiconductor(CMOS) chip. Which is kept alive by the internal battery.
CMOS keeps manufacturer’s settings and system date and time. That is why the
CMOS must always be on even though the computer is switched off, thanks to the
internal battery.
STEP5: The computer will then start comparing system settings of your CMOS with
the operating system (i.e. Windows XP) installed in your computer. If no errors
occur, the post will start to load basic drivers for your hardware and interrupt
handlers such as the mouse, keyboard, network adapters etc this enables programs
to communicate with devices and allow booting process to carry on.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 21
HOW A COMPUTER STARTS STEP -BY –STEP
STEP6: the POST will check the real-time clock (RTC) or system timer and the computer system
bus to make sure both of these are properly working on the computer. Finally, you'll get a picture
on your display after the POST has loaded the memory contained on the display adapter and has
made it part of the overall system BIOS
STEP7: Next, the BIOS will check to see if it's currently performing a cold boot or warm boot
(reboot) by looking at the memory address 0000:0472, if it sees 1234h the BIOS knows that this is
a reboot and will skip the remainder of the POST steps.
If 1234h is not seen, the BIOS know that this is a cold boot and will continue running additional
POST steps. Next, it tests the computer memory (RAM) installed in the computer by writing to
each chip. With many computers, you'll know it's performing this step if you see the computer
counting the total installed memory as its booting.
STEP8: the POST will send signals to the computer floppy, optical, and hard drive to test these
drives. If all drives pass the test, the POST is complete and instructs the computer to start the
process of loading the operating system.
STEP9: After the computer has passed the POST, the computer will start the boot process. This
process is what loads the operating system and all of it’s associated files. . Because Microsoft
Windows is the most commonly used operating system, this section will cover the process of
loading Microsoft Windows.
STEP10: After the computer has loaded the operating system, hardware attached to the
computer must be able to communicate with the CPU. Once the operating system has finished
loading, a log in display window is displayed for the user to access the computer resources.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 22
•Shutting down a computer is a procedural
process just like starting up a computer.
Instant shutdown can damage computer
programs and components thus making a
system to malfunction.
•Before shutting down a computer, make
sure that all active programs are closed and
important documents are saved to avoid loss
of unsaved data. Then proceed as follows:
1.From the taskbar, click the start button.
2.From the sidekick menu that appears,
select turn off computer
3.Then click turn off from the dialog window
that appears.
4.Wait until the system shuts down by itself
then press the power button of the monitor
to shut it off.
5.Finally, switch off the power source.
SHUTTING DOWN A COMPUTER
Task bar
Turn off window
Start menu
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 23
KEYBOARD SKILLS
How to use actual/physical keyboard effectively
1. Sit upright and maintain an alert posture
2. Place the material to be typed in a position you can read without straining
3. Put feet flat on the floor
4. Arch your wrist
5. Keep a good eye line
6. Position hands on home row (left hands: a, s, d, f, right hand: j, k, l,;,)
7. Use your left index finger to hit the g, t, r, v, b, 5, and 6 keys.
8. Use your left middle finger to hit the e, c, and the 3 keys
9. Use your left ring finger to hit the w, x, and 2 keys
 10. Use your left ring finger to hit the w, x, and 2 keys
11. Use your left pinky to hit the q, z, and the 1 key.
12. Use your right index finger to hit the y, u, h, n, m, 6, 7, and 8 keys.
13. Use your right middle finger to hit the u, <, and 9 keys.
14. Use your right ring finger to hit the o, ., and the 0 keys.
15. Use your thumbs to strike the space bar.
16. Use your right hand on the num pad. Place your index finger on the 4. Your middle finger on the 5. 
Your ring finger on the 6, and your pinky on the enter key. Place your thumb on the 0. Strike the 7 and 1 
with your index finger. Strike the 8 and 2 with your middle finger. Strike the 9 and 3 with your ring finger. 
Strike the - and + with your pinky.
 
Get a typing tutor installed in your computer. You can get this from us at a reasonable fee.
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
PREPARED BY: Maurice Atika Nyamoti 24
MOUSE SKILLS
Just like a keyboard, a mouse is used to input data into the computer. As the mouse
moves, it moves the pointer on the screen into a position defined by the user. Pressing
on the mouse button is referred to as clicking. Clicking performs a number of functions
but the most important is to enable the user to execute a command in the computer
comparable to pressing the enter key on the keyboard.
Mouse Terminologies
Clicking:
pressing the left mouse button once
Double clicking:
pressing the left mouse button twice in quick succession to open a file/folder
Drag and Drop:
placing the pointer on a file/folder/graphic, then press the left button and hold.
Move the pointer to the designated place and let go the left button. Used to move
objects from one location to another.
Right clicking:
pressing the right mouse button once. Provides a dropdown list for the user to
choose from. comparable to pressing the menu key on the keyboard.
Scrolling:
rolling the scroll wheel at the top of the mouse to view hidden data across
windows
Press enter key(or click) to continue
ACCESS:www.academic.manyamfranchise.comformore
Conclusion
ď‚— Did you enjoy the lesson? Well if you did, give us your feedback and perhaps
areas we need to improve, like or appreciation. Just click
http://www.facebook.com/ManyamFranchise . to add!
ď‚— The contents displayed in this presentation offers an overview of what you can
find in levelone computer studies KCSE book1. Get a copy of your own now!
Contact: 0723450425.
ď‚— This presentation is not for sale! Download it for free at
academic.manyamfranchise.com . Manyam franchise will not be responsible for
anything if you got it from a third party.
ď‚— Maurice Atika Nyamoti studied computer engineering at Maseno university /99
has taught various computer colleges, St Mary’s Girls Thigio and attended
various workshops of computer studies and computer and society. He is now the
Director of manyamfranchise.com a firm that deals with computers and
computer learning materials. He is also the author and publisher of KCSE
levelone computer studies book 1. connect with Maurice on facebook:
http://www.facebook.com/andus.a.nyamoti
PREPARED BY: Maurice Atika Nyamoti 25
ACCESS:www.academic.manyamfranchise.comformore
THANK YOU FOR VISITING OUR
WEB SITE AND HOPEFULLY YOU
WILL VISIT AGAIN FOR MORE.
PREPARED BY: Maurice Atika Nyamoti 26
CLICK HERE
TO DOWNLOAD
COMPUTER
SYSTEMS
PRESENTATION

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerPrabesh Shrestha
 
What Is Computer
What Is ComputerWhat Is Computer
What Is ComputerLUZ PINGOL
 
Output devices of Computer
Output devices of ComputerOutput devices of Computer
Output devices of ComputerShaikh Alam
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersRIAH ENCARNACION
 
Types of computer
Types of computerTypes of computer
Types of computerFrya Lora
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAasim Mushtaq
 
equipment and components of computer
equipment and components of computerequipment and components of computer
equipment and components of computeruni of Gujrat
 
Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and softwareVisualBee.com
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationAna Tan
 
Introduction to computers new 2010
Introduction to computers new 2010Introduction to computers new 2010
Introduction to computers new 2010Cyrus Kyle
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Adarsh Kumar Yadav
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer SystemAhsan Rahim
 
Input devices
Input devicesInput devices
Input devicesAdnan Malak
 
Application software
Application softwareApplication software
Application softwareshalivale
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentalsarchikabhatia
 
Basics of computer applications
Basics of computer applicationsBasics of computer applications
Basics of computer applicationsPrakash Lambha
 

Was ist angesagt? (20)

Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
Output devices of Computer
Output devices of ComputerOutput devices of Computer
Output devices of Computer
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
equipment and components of computer
equipment and components of computerequipment and components of computer
equipment and components of computer
 
Types of Computers
Types of ComputersTypes of Computers
Types of Computers
 
Computer Hardware and software
Computer Hardware and softwareComputer Hardware and software
Computer Hardware and software
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Introduction to computers new 2010
Introduction to computers new 2010Introduction to computers new 2010
Introduction to computers new 2010
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer System
 
Input devices
Input devicesInput devices
Input devices
 
COMPUTER SYSTEM
COMPUTER SYSTEMCOMPUTER SYSTEM
COMPUTER SYSTEM
 
Application software
Application softwareApplication software
Application software
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Basics of computer applications
Basics of computer applicationsBasics of computer applications
Basics of computer applications
 

Andere mochten auch

Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to ComputerHalimaton Sa'adiah
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Historical evaluation of computer
Historical evaluation of computerHistorical evaluation of computer
Historical evaluation of computerKasib Monna
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1Amit Chandra
 
Classification of computer
Classification of computerClassification of computer
Classification of computerVicky Maliks
 
ICT Reflective Practice Essay - Seminar 1
ICT Reflective Practice Essay - Seminar 1ICT Reflective Practice Essay - Seminar 1
ICT Reflective Practice Essay - Seminar 1Miles Berry
 
Int 2 computer structure 2010
Int 2 computer structure 2010Int 2 computer structure 2010
Int 2 computer structure 2010iarthur
 
Modul 1 dunia komputer bm
Modul 1 dunia komputer bmModul 1 dunia komputer bm
Modul 1 dunia komputer bmMohd Zainudin
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitmariolinov
 
Structure And Role Of The Processor
Structure And Role Of The ProcessorStructure And Role Of The Processor
Structure And Role Of The Processorpy7rjs
 
Processor structure and funtions
Processor structure and funtionsProcessor structure and funtions
Processor structure and funtionsMuhammad Ishaq
 
How to Manufacture Disinfectants, Soaps and Detergents
How to Manufacture Disinfectants, Soaps and Detergents How to Manufacture Disinfectants, Soaps and Detergents
How to Manufacture Disinfectants, Soaps and Detergents Ajjay Kumar Gupta
 
01 basic computer structure(20070122)
01 basic computer structure(20070122)01 basic computer structure(20070122)
01 basic computer structure(20070122)Prasanna Das
 
Introduction To Electronics
Introduction To ElectronicsIntroduction To Electronics
Introduction To Electronicsritchiek
 
chap 18 multicore computers
chap 18 multicore computers chap 18 multicore computers
chap 18 multicore computers Sher Shah Merkhel
 
Cs100 lec 3 (1 day) hardware types of computer
Cs100 lec 3 (1 day) hardware   types of computerCs100 lec 3 (1 day) hardware   types of computer
Cs100 lec 3 (1 day) hardware types of computerJhĂśvs Laganson
 
Parts of the computer
Parts of the computerParts of the computer
Parts of the computerFelsy Sepulveda
 
12 processor structure and function
12 processor structure and function12 processor structure and function
12 processor structure and functionSher Shah Merkhel
 

Andere mochten auch (20)

Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to Computer
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
What is a computer?
What is a computer?What is a computer?
What is a computer?
 
Historical evaluation of computer
Historical evaluation of computerHistorical evaluation of computer
Historical evaluation of computer
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
ICT Reflective Practice Essay - Seminar 1
ICT Reflective Practice Essay - Seminar 1ICT Reflective Practice Essay - Seminar 1
ICT Reflective Practice Essay - Seminar 1
 
Int 2 computer structure 2010
Int 2 computer structure 2010Int 2 computer structure 2010
Int 2 computer structure 2010
 
Modul 1 dunia komputer bm
Modul 1 dunia komputer bmModul 1 dunia komputer bm
Modul 1 dunia komputer bm
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
Structure And Role Of The Processor
Structure And Role Of The ProcessorStructure And Role Of The Processor
Structure And Role Of The Processor
 
Processor structure and funtions
Processor structure and funtionsProcessor structure and funtions
Processor structure and funtions
 
How to Manufacture Disinfectants, Soaps and Detergents
How to Manufacture Disinfectants, Soaps and Detergents How to Manufacture Disinfectants, Soaps and Detergents
How to Manufacture Disinfectants, Soaps and Detergents
 
01 basic computer structure(20070122)
01 basic computer structure(20070122)01 basic computer structure(20070122)
01 basic computer structure(20070122)
 
Introduction To Electronics
Introduction To ElectronicsIntroduction To Electronics
Introduction To Electronics
 
chap 18 multicore computers
chap 18 multicore computers chap 18 multicore computers
chap 18 multicore computers
 
Cs100 lec 3 (1 day) hardware types of computer
Cs100 lec 3 (1 day) hardware   types of computerCs100 lec 3 (1 day) hardware   types of computer
Cs100 lec 3 (1 day) hardware types of computer
 
Parts of the computer
Parts of the computerParts of the computer
Parts of the computer
 
Basic Computer Skills
Basic Computer SkillsBasic Computer Skills
Basic Computer Skills
 
12 processor structure and function
12 processor structure and function12 processor structure and function
12 processor structure and function
 

Ă„hnlich wie Introduction to computer office 2003

Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computersuganya2411
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptxTadeseBeyene
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in HospitalityPriya Roy
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of ComputerRajGopalAgrawal
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerbaharia said
 
PIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI ComputerPIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI ComputerAmir Hussain Noshahi
 
introduction to computer created by shehazad havaldar
introduction to  computer     created by  shehazad havaldar       introduction to  computer     created by  shehazad havaldar
introduction to computer created by shehazad havaldar ShehazadHavaldar
 
Computar ppt by shehazad
Computar ppt by shehazadComputar ppt by shehazad
Computar ppt by shehazadShehazadHavaldar
 
Atharva Patil_28_9th lilies_Computer Project2.pptx
Atharva Patil_28_9th lilies_Computer Project2.pptxAtharva Patil_28_9th lilies_Computer Project2.pptx
Atharva Patil_28_9th lilies_Computer Project2.pptxAtharvaPatil48
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit iAndreaTugwell
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit iAndreaTugwell
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersObibiniimedia
 
Information technology
Information technologyInformation technology
Information technologyManoj Soni
 
Unit-1 Introduction To Computer System.pptx
Unit-1 Introduction To Computer System.pptxUnit-1 Introduction To Computer System.pptx
Unit-1 Introduction To Computer System.pptxNarayanSharma82
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1Ranz
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamentalTanya Soumya
 
introduction to computer
introduction to computerintroduction to computer
introduction to computerarehkelvin
 
computer concepts.pptx
computer concepts.pptxcomputer concepts.pptx
computer concepts.pptxDishantGola
 
Introduction to computer_hardware
Introduction to computer_hardwareIntroduction to computer_hardware
Introduction to computer_hardwarenaadiya_khuda_bux
 
Unit I Foc
Unit I FocUnit I Foc
Unit I FocJAYA
 

Ă„hnlich wie Introduction to computer office 2003 (20)

Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptx
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in Hospitality
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
PIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI ComputerPIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI Computer
 
introduction to computer created by shehazad havaldar
introduction to  computer     created by  shehazad havaldar       introduction to  computer     created by  shehazad havaldar
introduction to computer created by shehazad havaldar
 
Computar ppt by shehazad
Computar ppt by shehazadComputar ppt by shehazad
Computar ppt by shehazad
 
Atharva Patil_28_9th lilies_Computer Project2.pptx
Atharva Patil_28_9th lilies_Computer Project2.pptxAtharva Patil_28_9th lilies_Computer Project2.pptx
Atharva Patil_28_9th lilies_Computer Project2.pptx
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Information technology
Information technologyInformation technology
Information technology
 
Unit-1 Introduction To Computer System.pptx
Unit-1 Introduction To Computer System.pptxUnit-1 Introduction To Computer System.pptx
Unit-1 Introduction To Computer System.pptx
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
computer concepts.pptx
computer concepts.pptxcomputer concepts.pptx
computer concepts.pptx
 
Introduction to computer_hardware
Introduction to computer_hardwareIntroduction to computer_hardware
Introduction to computer_hardware
 
Unit I Foc
Unit I FocUnit I Foc
Unit I Foc
 

KĂĽrzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

KĂĽrzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Introduction to computer office 2003

  • 1. A KCSE Computer Studies Presentation TOPIC: INTRODUCTION TO COMPUTER PREPARED BY: Maurice Atika Nyamoti 1 Press enter key(or click) to continue ACCESS: www.academic.manyamfranchise.com for more
  • 2. INTRODUCTION TO COMPUTER ď‚—Definition of a computer ď‚—Common terminologies used in computer ď‚—Parts of a computer ď‚—Examples of peripheral devices ď‚—Development of Computers ď‚—Classification of computers ď‚—Areas where computers are used ď‚—The computer laboratory ď‚—Hands-on-Skills PREPARED BY: Maurice Atika Nyamoti 2 pc Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 3. Definition of a computer ď‚—Just like other machines, computers make work easier. Majority of people refer a PC (personal computer) as the real computer, however a mobile phone, calculator, weighing machine, watch, washing machines etc are also computers as such. ď‚—You can define a computer according to what it does, thus a computer can be described as a device that processes data into information ď‚—A computer can also be described as an electronic device that saves, transmits and processes data into information. ď‚—Example: a calculator is able to add 1+1 to get 2. thus 1+1 represents data and 2 represents information. PREPARED BY: Maurice Atika Nyamoti 3 Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 4. Common terminologies used in computer ď‚— Data- it simply refers to a collection of numbers, characters which have no much meaning to the user. ď‚— Information-is a sequence of numbers and characters which can be interpreted as having meaning. Information can also be described as processed data ď‚— A computer Program- is a sequence of instructions written to perform a specified task with a computer. ď‚— Input stage- this stage involves entering data into the computer using input devices i.e. keyboard ď‚— Processing- this stage involves processing of data using processing devices i.e. the CPU ď‚— Output stage- this stage involves the processing outcome that will be displayed by output devices i.e. the screen PREPARED BY: Maurice Atika Nyamoti 4 INPUT PROCESSING OUTPUT STORAGE FEEDBACKPress enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 5. Parts of a computer ď‚—A Computer has so many parts that work together to process data. However there are four major parts that make up a computer and these include: System unit, Screen, Keyboard and mouse ď‚—Other parts include: scanners, drives, cards, modems, speakers, printers etc. ď‚—Anything attached to the system unit is referred to as a peripheral device PREPARED BY: Maurice Atika Nyamoti 5 System unit Screen Mouse Keyboard Drive Modem printer Card Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 6. Examples of peripheral devices PREPARED BY: Maurice Atika Nyamoti 6 A computer can have as many peripheral devices as it can hold. They range from the screen, mouse, keyboard, webcam, camcorder, printer, modem, scanner, joystick, trackball, projector, digital camera, speakers, microphone, stylus etc Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 7. Development of Computers ď‚—Abacus, believed to exist before Christ, was used by Asian merchants to calculate complex mathematical calculations. ď‚—In 1830s Charles Babbage designed an analytical engine which is believed to be the mother of all modern computers. ď‚—In 1939, Howard Aiken of Harvard University designed a fully automatic calculator called Mark 1. ď‚—From 1939-1946, at the Univ. of Pennsylvania introduced ENIAC (electronic numeric integrator and calculator). It is believed to be the first all-purpose electronic digital computer that used thousands of vacuum tubes and produced a lot of heat. ď‚—In 1951,UNIVAC (UNIVersal Automatic Computer) became the first computer to handle both numeric and alphabetic data with equal facility; this was the first commercially available computer. ď‚—1957 to date, smaller but more powerful computers were discovered which were more capable of transmitting, processing and saving data of large amounts. Had higher speed, produced less heat and processed on microprocessors. These computers are today referred to as third and fourth generation computers PREPARED BY: Maurice Atika Nyamoti 7 Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 8. Development of Computers The table below shows a summary of development of computers Age Name Advancements Use Before Christ Abacus It was made of wood and beads. Used by Asian merchants to count wealth 1614-1620 Log tables Paper and pen Used to calculate complex mathematical expressions 1647 Mechanical calculator calculator To solve complex mathematical expressions 1792-1871 Analytical engine Computer Combine arithmetic process with decision based on its own computer 1946-1956 First generation computers Computer (used thermionic valves and vacuum tubes to process data) Store and Process Data 1957-1963 Second generation computers Computer (used transistors to process data) Store and Process Data 1964-1979 Third generation computers Computer (used integrated circuits (ICs) to process data) Store, transmit and Process data with better storage and increased speed of processing 1979-1989 Fourth generation computers Computer (used VLSI-very large scale integrated circuits to process data) Store, transmit and Process data with better storage and increased speed of processing than 3G computers 1990- present Fifth generation computers Computer (use advanced VLSI in the name of microprocessor to process data) Store, transmit and Process data with better storage and increased speed of processing, small in size and emit less heat and consumes less power. Faster than 4G computers and also portable. PREPARED BY: Maurice Atika Nyamoti 8 Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 9. ď‚—Computers can be classified according to physical size, functionality and purpose as shown in the organizational chart below PREPARED BY: Maurice Atika Nyamoti 9 Classification of computersClassification of computers 1. Physical size1. Physical size 3. Purpose3. Purpose 2. Functionality2. Functionality 1. Classification according to physical size Physical sizePhysical size • Super computers• Super computers • Main frames• Main frames • Mini computers• Mini computers • Micro computers• Micro computers Classification of computers Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 10. PREPARED BY: Maurice Atika Nyamoti 10 1. Description of computers according to physical size Size Characteristics Uses super computers Largest, fastest, powerful and most expensive. they also generate a lot of heat Used for advanced scientific research such as nuclear physics. Main frames Less powerful and less expensive than super computers. They also have a large storage capacity Used to handle all kinds of problems whether scientific or commercial. I.e. performing complex mathematical calculations. they are mostly found in banks, hospitals, airports etc. Mini computers Smaller and less powerful than the main frame Used in scientific laboratories, research institutions, engineering plants and places where processing automation is required. Micro computers Smallest, cheapest and relatively least powerful. Uses a micro processor to process data. Examples: desktop, laptop and personal digital assistant (PDA) Used to perform a variety of tasks including research, communication, banking, learning institutions, libraries etc. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 11. PREPARED BY: Maurice Atika Nyamoti 11 2. Classification according to functionality Classification according to functionalityClassification according to functionality AnalogueAnalogue DigitalDigital HybridHybrid Computer Characteristics Uses Analogue Process data that is discrete in nature Used by PCs, home appliances, TVs, Microwaves, wall clocks etc Digital Process data that is continuous in nature Used in manufacturing process control like monitoring temperatures, pressures, density etc Hybrid Designed to process both analogue and digital data Used on manufacturing process control. And returns a digital value. Examples are:- a digital weighing machine, digital thermometer etc Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 12. PREPARED BY: Maurice Atika Nyamoti 12 3. Classification according to purpose Classification according to purposeClassification according to purpose General purposeGeneral purpose Dedicated computersDedicated computers Special purposeSpecial purpose Computer Uses Examples General purpose Designed to perform a variety of tasks PCs, cell phones, notebooks etc. Special purpose Designed specifically for one task Calculators, robots, cell phones, thermometers etc Dedicated computers Designed as a general purpose but dedicated to perform a specific task PCs used for learning environment, banking, communication etc. ACCESS:www.academic.manyamfranchise.comformore
  • 13. PREPARED BY: Maurice Atika Nyamoti 13 Functions of a computer: The main functions of a computer are: • Saving data • Processing data • Transmitting data • Detecting events Purpose of a computer The main purpose of a computer is to help the user accomplish a specific computational task i.e. calculating mathematical and logical expressions, transmitting data signals and saving data for future reference. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 14. PREPARED BY: Maurice Atika Nyamoti 14 Areas where computers are used Just like all other machines, computers are used in a day-to-day life to make work easier and more efficient. Some important application areas of a computer are given below. Area Uses Industry and Commerce Saving records, security, real-time response, automating records, communication, process control, detection, manufacturing, accounting etc Health Care Save records, diagnose patients, scanning of body parts, security, management of records, communication, research, consultations, preserving bodies etc Government Institutions To save and manage records of people, vehicles, activities etc, plan government calendars, security, forecasting and drawing of budgets, communication, research activities, traffic control etc Education and Research Learning aids, research tools, keeping research records, budgeting, accounting, security, forecasting, communications, consultations etc Communication Industry Prepare programs on TV/Radio, broadcasting, producing music, tracking activities, automating communication processes, relay of telephone signals etc Police and Defense Tracking criminals, keeping records, used in forensic labs to filter DNA and fingerprints, controlling traffic, communication, automating armory, military vehicles and tanks, controlling CCTV cameras, keep track of temperatures in nuclear stations etc. Home and Leisure Entertainment, used as TV, Radio, DVD player etc, communication, security, keeping home records and budgeting family finances, can be used as a diary, notebook or an address book, etc Transport and tourism Hotel booking system, marketing, air travel, booking and control system, communication and research, traffic light system, shipping and sea navigation, security etc. Agriculture Keeping inventory record, controlling farm machinery, keeping track of plants and livestock, research and consultations, diagnosing farm diseases and pests, tracking livestock movements, breeding and health records, irrigation etc. Press enter key(or click) to continue
  • 15. PREPARED BY: Maurice Atika Nyamoti 15 The computer laboratory A computer lab is a room set aside for installation and use of computers. Safety precautions and practices in the computer lab Computer systems are expensive to acquire and maintain, and should therefore handled with care. Causes of computer damage and measures to avoid them 1. Dust and Smoke - dust and smoke damage the surface of the hard disk and other moving parts. To avoid them: •Avoid smoking in the computer lab •Cover computers with dust covers •Put curtains along the windows •Avoid entering the lab with muddy shoes •Use the dust blower to blow off dust from the computers more often 2. Water and Humidity - humidity is the amount of water vapor in the air. Water and humidity can cause rusting and if water spills on sensitive computer parts, it can cause short circuiting thus damaging the components. To avoid this kind of scenario: •Avoid entering the computer lab with drinks and beverage. •Install the computer lab with humidifiers and dehumidifiers to keep humidity at bay. •Don’t put a water based fire extinguisher in the computer lab •Avoid splashing water when washing the computer lab. Though, vacuum cleaning is recommended. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 16. PREPARED BY: Maurice Atika Nyamoti 16 •Temperature initially computers are installed with a heat sink and a fan to cool down the CPU when it’s processing. Too much heat can break down the CPU or cause delay in processing. Therefore the computer lab must be kept with cool temperatures in the following ways: Causes of computer damage and measures to avoid them •Avoid overcrowding of computers and users •The computer lab should be well ventilated •Consider installing air conditioning system •Uncover computers when using them •Power Fault -Electricity is the most precious need in any computer lab. It is also the most dangerous if not properly used. Power surge and brownouts are responsible for damaging computers. To avoid this: • Avoid unnecessary movements in the computer lab to avoid hitting power cables • Keep water off the power sockets • Switch off the computer and the monitor immediately incase power fault has been detected • Avoid children/pets in the computer lab • Consider installing AVS switches (automatic voltage switches) to stabilize power • Use UPS (uninterruptible power supply) to regulate power before entering into the computer. They can also be used to alert the user when power goes off. • Electric lines should always be insulated to avoid electrical shocks. They should pass in trunks along the edges of the wall into the strategically positioned sockets. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 17. PREPARED BY: Maurice Atika Nyamoti 17 Data security and burglar proofing -data theft and stealing of computers should be kept into consideration when building the computer lab. To avoid this: • Install security alarms • Shut down the computer using the right procedure • Put metallic grills at the doors and windows, strong roof and CCTV (closed circuit television) cameras • Usually use passwords and encrypt confidential data. A password is a secret code the user must provide before accessing computer resources. Data encryption is the process of encrypting/encoding data in way that only the sender and the receiver can understand. For one to read this data, an encryption key (like a password) is required. • Consider hiring security personnel • Do not welcome strangers into the computer lab. Fire - fire can physically damage computers. To avoid fire: • Do not smoke in the computer lab • Install a gaseous fire extinguishers • All electrical cables should be laid properly. Causes of computer damage and measures to avoid them Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 18. PREPARED BY: Maurice Atika Nyamoti 18 Measures to protect the user • All cables should be insulate and laid away from busy paths • Provide standard furniture i.e. the seat should have a straight backrest and the table should be strong enough to support computers and their peripheral devices • Avoid overcrowding • Provide anti radiation (anti-glare) screens to filter light. as shown in the diagram below: • The room should be properly lit and ventilated Causes of computer damage and measures to avoid them Anti-radiation/glare screen Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 19. Hands-on-Skills PREPARED BY: Maurice Atika Nyamoti 19 STARTING A COMPUTER •Starting a computer is easy for the user since it involves pressing the power button of the monitor then that of the system unit. WHY? While the system unit is switched on, it checks whether all components (hardware) attached to it are functioning in a process called POST (power- on-self-test). Therefore the screen should be switched on first in order to enable POST to take place. Power button is denoted by the following symbol: • The process of starting up a computer is referred to as booting •There are two types of booting, namely, 1. Cold booting- a process of starting a computer that was initially off. 2. Warm booting- a process of re-starting a computer/starting a computer that is already on. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 20. PREPARED BY: Maurice Atika Nyamoti 20 HOW A COMPUTER STARTS STEP -BY –STEP STEP 1: when you press the power button, the computer sends a signal to the power supply to convert AC (alternating current) into DC (direct current). In order to supply the computer with proper electric current and voltage. STEP 2: once power has been received by every component and no error is reported, a signal is sent to the motherboard by the CPU that the computer is ready to processes instructions contained in the (BIOS) basic input/output system. STEP3: once the computer looks at the BIOS, it begins the POST process. This ensures that all peripheral devices are present and functioning properly. If one device fails the test, booting process halts. STEP 4: NEXT the computer looks at the memory located at the complimentary metal oxide semiconductor(CMOS) chip. Which is kept alive by the internal battery. CMOS keeps manufacturer’s settings and system date and time. That is why the CMOS must always be on even though the computer is switched off, thanks to the internal battery. STEP5: The computer will then start comparing system settings of your CMOS with the operating system (i.e. Windows XP) installed in your computer. If no errors occur, the post will start to load basic drivers for your hardware and interrupt handlers such as the mouse, keyboard, network adapters etc this enables programs to communicate with devices and allow booting process to carry on. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 21. PREPARED BY: Maurice Atika Nyamoti 21 HOW A COMPUTER STARTS STEP -BY –STEP STEP6: the POST will check the real-time clock (RTC) or system timer and the computer system bus to make sure both of these are properly working on the computer. Finally, you'll get a picture on your display after the POST has loaded the memory contained on the display adapter and has made it part of the overall system BIOS STEP7: Next, the BIOS will check to see if it's currently performing a cold boot or warm boot (reboot) by looking at the memory address 0000:0472, if it sees 1234h the BIOS knows that this is a reboot and will skip the remainder of the POST steps. If 1234h is not seen, the BIOS know that this is a cold boot and will continue running additional POST steps. Next, it tests the computer memory (RAM) installed in the computer by writing to each chip. With many computers, you'll know it's performing this step if you see the computer counting the total installed memory as its booting. STEP8: the POST will send signals to the computer floppy, optical, and hard drive to test these drives. If all drives pass the test, the POST is complete and instructs the computer to start the process of loading the operating system. STEP9: After the computer has passed the POST, the computer will start the boot process. This process is what loads the operating system and all of it’s associated files. . Because Microsoft Windows is the most commonly used operating system, this section will cover the process of loading Microsoft Windows. STEP10: After the computer has loaded the operating system, hardware attached to the computer must be able to communicate with the CPU. Once the operating system has finished loading, a log in display window is displayed for the user to access the computer resources. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 22. PREPARED BY: Maurice Atika Nyamoti 22 •Shutting down a computer is a procedural process just like starting up a computer. Instant shutdown can damage computer programs and components thus making a system to malfunction. •Before shutting down a computer, make sure that all active programs are closed and important documents are saved to avoid loss of unsaved data. Then proceed as follows: 1.From the taskbar, click the start button. 2.From the sidekick menu that appears, select turn off computer 3.Then click turn off from the dialog window that appears. 4.Wait until the system shuts down by itself then press the power button of the monitor to shut it off. 5.Finally, switch off the power source. SHUTTING DOWN A COMPUTER Task bar Turn off window Start menu Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 23. PREPARED BY: Maurice Atika Nyamoti 23 KEYBOARD SKILLS How to use actual/physical keyboard effectively 1. Sit upright and maintain an alert posture 2. Place the material to be typed in a position you can read without straining 3. Put feet flat on the floor 4. Arch your wrist 5. Keep a good eye line 6. Position hands on home row (left hands: a, s, d, f, right hand: j, k, l,;,) 7. Use your left index finger to hit the g, t, r, v, b, 5, and 6 keys. 8. Use your left middle finger to hit the e, c, and the 3 keys 9. Use your left ring finger to hit the w, x, and 2 keys  10. Use your left ring finger to hit the w, x, and 2 keys 11. Use your left pinky to hit the q, z, and the 1 key. 12. Use your right index finger to hit the y, u, h, n, m, 6, 7, and 8 keys. 13. Use your right middle finger to hit the u, <, and 9 keys. 14. Use your right ring finger to hit the o, ., and the 0 keys. 15. Use your thumbs to strike the space bar. 16. Use your right hand on the num pad. Place your index finger on the 4. Your middle finger on the 5.  Your ring finger on the 6, and your pinky on the enter key. Place your thumb on the 0. Strike the 7 and 1  with your index finger. Strike the 8 and 2 with your middle finger. Strike the 9 and 3 with your ring finger.  Strike the - and + with your pinky.   Get a typing tutor installed in your computer. You can get this from us at a reasonable fee. Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 24. PREPARED BY: Maurice Atika Nyamoti 24 MOUSE SKILLS Just like a keyboard, a mouse is used to input data into the computer. As the mouse moves, it moves the pointer on the screen into a position defined by the user. Pressing on the mouse button is referred to as clicking. Clicking performs a number of functions but the most important is to enable the user to execute a command in the computer comparable to pressing the enter key on the keyboard. Mouse Terminologies Clicking: pressing the left mouse button once Double clicking: pressing the left mouse button twice in quick succession to open a file/folder Drag and Drop: placing the pointer on a file/folder/graphic, then press the left button and hold. Move the pointer to the designated place and let go the left button. Used to move objects from one location to another. Right clicking: pressing the right mouse button once. Provides a dropdown list for the user to choose from. comparable to pressing the menu key on the keyboard. Scrolling: rolling the scroll wheel at the top of the mouse to view hidden data across windows Press enter key(or click) to continue ACCESS:www.academic.manyamfranchise.comformore
  • 25. Conclusion ď‚— Did you enjoy the lesson? Well if you did, give us your feedback and perhaps areas we need to improve, like or appreciation. Just click http://www.facebook.com/ManyamFranchise . to add! ď‚— The contents displayed in this presentation offers an overview of what you can find in levelone computer studies KCSE book1. Get a copy of your own now! Contact: 0723450425. ď‚— This presentation is not for sale! Download it for free at academic.manyamfranchise.com . Manyam franchise will not be responsible for anything if you got it from a third party. ď‚— Maurice Atika Nyamoti studied computer engineering at Maseno university /99 has taught various computer colleges, St Mary’s Girls Thigio and attended various workshops of computer studies and computer and society. He is now the Director of manyamfranchise.com a firm that deals with computers and computer learning materials. He is also the author and publisher of KCSE levelone computer studies book 1. connect with Maurice on facebook: http://www.facebook.com/andus.a.nyamoti PREPARED BY: Maurice Atika Nyamoti 25 ACCESS:www.academic.manyamfranchise.comformore
  • 26. THANK YOU FOR VISITING OUR WEB SITE AND HOPEFULLY YOU WILL VISIT AGAIN FOR MORE. PREPARED BY: Maurice Atika Nyamoti 26 CLICK HERE TO DOWNLOAD COMPUTER SYSTEMS PRESENTATION

Hinweis der Redaktion

  1. PREPARED BY: Maurice Atika Nyamoti www.manyamfranchise.com
  2. www.manyamfranchise.com PREPARED BY: Maurice Atika Nyamoti
  3. Cont..d www.manyamfranchise.com PREPARED BY: Maurice Atika Nyamoti
  4. www.manyamfranchise.com PREPARED BY: Maurice Atika Nyamoti