[go: up one dir, main page]

0% found this document useful (0 votes)
175 views7 pages

It 301 - Adet Lesson 1

This document provides an introduction to computer hardware and software. It defines hardware as the physical parts of a computer system, including components like the CPU, memory, storage drives, motherboard, etc. It then discusses hardware concepts like registers, primary storage, instruction time, and machine cycles. The document also covers computer network topologies like mesh, star, bus, ring, and hybrid. Finally, it defines software and discusses its key characteristics, including reliability, usability, efficiency, and maintainability. It categorizes software based on functionality, portability, and replaceability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views7 pages

It 301 - Adet Lesson 1

This document provides an introduction to computer hardware and software. It defines hardware as the physical parts of a computer system, including components like the CPU, memory, storage drives, motherboard, etc. It then discusses hardware concepts like registers, primary storage, instruction time, and machine cycles. The document also covers computer network topologies like mesh, star, bus, ring, and hybrid. Finally, it defines software and discusses its key characteristics, including reliability, usability, efficiency, and maintainability. It categorizes software based on functionality, portability, and replaceability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

[ it 301 – adet ] lesson 1: introduction to hardware

It 301 – application development and emerging technologies


Sir marlon d. Hernandez, deng

Introduction to hardware 4. Register 


(Computer hardware is also known as A high-speed storage area in the
hardware)
CPU used to temporarily hold
small units of computer-generated
 The set of physical parts or
instructions and data immediately
can be seen from the naked
before, during, and after
eye. Hardware of the computer
execution by the CPU.
consist of a different peripheral
including the monitor,
5. Primary Storage (main
Keyboard, Mouse, System
memory; memory) 
Unit, hard disk drive (HDD),
The part of the computer that
graphic cards, sound cards,
process program instructions and
memory, motherboard etc.,
data.
The mention example are
tangible.
6. Instruction time (I-time) 
The time it takes to perform the
Hardware components fetch-instruction and decode
instruction steps of the instruction
1. Central Processing Unit phase.
(CPU) 
The part of the computer that 7. Execution time (E-time) 
consists of three associated The time it takes to execute an
elements: the arithmetic/logic instruction and store the results.
unit, the control unit, and the
register areas. 8. Machine Cycle 
The instruction phase followed by
2. Arithmetic/Logic Unit (ALU)  the execution phase.
The part of the CPU that performs
mathematical calculations and 9. Pipelining 
[ it 301 – adet ] lesson 1: introduction to hardware

Terminologies 2. Star Topology


 Application Each device in the network is
 Bit connected to a central device
called hub. Unlike Mesh
 Cache
topology, star topology doesn’t
 CD-ROM
allow direct communication
 CD-Rewritable disk
between devices, a device must
 CPU have to communicate through hub
 DVD (Digital Versatile
Disc)
 File
 Flash Drive
 Graphical User Interface
(GUI) 3. Bus Topology
The main cable and all the
 Hard Drive
devices are connected to this
 Random Access Memory
main cable through drop lines.
(RAM)
There is a device called tap that
 Modem
connects the drop line to the main
 Monitor cable.
 Motherboard

Computer network
topologies
4. Ring Topology
1. Mesh Topology Each device is connected with the
Each device is connected to every two devices on either side of it.
other device on the network There are two dedicated point to
through a dedicated point-to-point point links a device has with the
link devices on the either side of it.
This structure forms a ring thus it
is known as ring topology.
[ it 301 – adet ] lesson 1: introduction to hardware

5. Hybrid Topology What is software?


Combination of two or more Software is a collection of data or
topology is known as hybrid computer instructions that tell the
topology.  For example, a computer how to work. This is in
combination of star and mesh contrast to physical hardware,
topology is known as hybrid from which the system is built
topology. and actually performs the work.
In computer science and software
engineering, computer software is
all information processed by
computer systems, programs and
data. Computer software includes
computer programs, libraries and
related non-executable data, such
Compatibility issues and as online documentation or digital
common errors media.
 When it comes to computers
compatibility and common Characteristics of
errors most of the computer are
very vulnerable in this kind of
software
problems. Software is used differently by
different individuals. This is due
 Example issues and errors.
to that individual may involve
▪ Compatibility issue of
with the software but used in
software
different ways. For instance, users
▪ Compatibility issue of
want software to do task
RAM
according to their needs. Same as
▪ Compatibility issue of
with the developers where
driver
developers need to design, code
▪ Common errors of screen
and maintain the software.
▪ Common errors of mouse
Therefore, software
▪ Common errors of
characteristics are classified into
computer USB dysfunctional
six components.
port 
[ it 301 – adet ] lesson 1: introduction to hardware

- accurateness - recoverability
This relates to the Ability to return a
accuracy of the functions, the broken system to complete
ATM can have a cash-out service, including data and
function, but is the sum correct? network links.
- interoperability
Usually, a single 3. usability – describes the extent
program feature or device does to which the software can be
not work in isolation. This sub- utilized with ease.
characteristic concerns the ability Sub-characteristics
of the software component to - understandability
communicate with other modules Determines the
or structures. simplicity with which the system
- compliance function can be interpreted,
Where applicable, applies to user conceptual
some business (or government) representations of human
rules and standards must be computer interface approaches.
complied with, i.e., SOX. SOX. - learnability
This sub characteristic describes Learning activities for
the compatible functionality of various people / users, i.e.,
the program. beginner, professional, casual,
- security etc.
This sub characteristic - operability
refers to improper access to the The capacity of the
features of the program. software to be conveniently
controlled by the operator in a
given context.
2. reliability – describes the
ability of the software to deliver 4. efficiency - describes the
required capability under the ability of the software to use
given restrictions. system in an effective and
Sub-characteristics efficient manner of the available
- maturity resources.
[ it 301 – adet ] lesson 1: introduction to hardware

5. maintainability - - Conformance
DESCRIBES THE EASE THAT Similar to functionality
CAN BE MADE IN SEVERAL compliance, but this attribute
MODIFICATIONS IN A applies to portability. One
SOFTWARE SYSTEM TO illustration will be Open SQL
EXTEND ITS compliance, which refers to the
FUNCTIONALITY, portability of the database used.
PERFORMANCE - Replaceability
IMPROVEMENT, OR ERRORS Characterizes the
CORRECTION. plug-and - play feature of the
Sub-characteristics software modules, which is how
- Analyzability simple it is to replace a particular
Characterizes the software component within a
capacity to determine the root given framework.
cause of a technological issue.
- Changeability Classifications of
Characterizes the
software
amount of system required to
 Business, education, social
reform the method.
division, and other fields where
- Stability
all can be applied in Software.
Characterizes the
In which designed to meet
vulnerability of the system to
specific goals such as data
adjustment that is the detrimental
manipulation, sharing of
effect that can be caused by
information, and others. It
improvements to the system.
classified depends on the range
- Testability
of the application
Characterizes the
effort taken to validate (test) a
1. system software
shift in the method.
It is a set of programs, which is in
charge in utilizing computer
6. portability – describes the ease
resources efficiently and
of the developers in which can
effectively. This class of software
transfer software from one
[ it 301 – adet ] lesson 1: introduction to hardware

2. real-time software 6. web-based software


A real-time system ensures an This class of software acts as a
answer to an outside event within crossing point between the user
a specified period of time. The and the Internet. Data on the
software that examines, evaluates, Internet is in the form of text,
and commands real world events audio, or video format, linked
as they take place. For an with hyperlinks. Web browser is a
instance, software that is used to software that displays web pages
read the required amount as input from the Internet. Provides Apart
by the user to withdraw a specific from providing routing on the
amount from an automatic teller Web and establishes additional
machine. features that are useful while
surfing
3. business software the Internet.
This is a software that holds
relevant data from a database in 7. personal computer (pc)
which users can access to be used software
in a specific transaction such as This class of software is used for
payroll, accounting, inventory both formal and personal use. The
and the like. This software personal computer software
facilitates cost-effective structure marketplace has grown in the last
in business operations and in two decades from simple
management decisions. application to complicated
application. This software is used
4. engineering and scientific predominantly in almost every
software field, whether home, school,
This software is meant to execute business, and the like. It has
accurate computations on emerged as a versatile tool for
complicated statistical data that routine applications.
are attained during real time
environment. Applications that Types of software
are heavily dependent on
maintenance
engineering and scientific
[ it 301 – adet ] lesson 1: introduction to hardware

1. corrective maintenance - It also includes removing


deals with the day-to-day systems elements from a system that are
functions to repair faults and not useful and operational.
defects, software design, logic Perfective maintenance accounts
and coding where bugs and 50-55% of most maintenance
defects can be found: work. Quezada, N. (2020, May
▪ Design bugs - occur when 29).
changes made to the
software are incomplete, 3. preventive maintenance
incorrect or change of Preventive maintenance describes
request is misunderstood. changes made to improve the
▪ Logical bugs - result from awareness and maintainability of
incorrect test and your software in the long run. It
conclusions, invalid test of focused in decreasing the
data, wrong logic flow, and weakening of your software in the
incorrect implementation of long run. Reorganizing,
designs. improving code and revising
▪ Coding bugs - is a documentation are common
program that produces an preventive maintenance.
incorrect and unexpected result. Preventive maintenance execution
reduces the amount of unstable
2. adaptive maintenance effects a software can have in the
Is the execution of modifications long term. Preventive
in a part of the system, which maintenance accounts for only
affects by a change that happened 5% of all the maintenance
in some other part of the system. activities. Quezada, N. (2020,
It consists of adapting software to May 29)
changes inside the hardware or
the operating system such as the
conditions and the influences
which act (from outside) on the
system. For instance, rules in
businesses, task patterns, and

You might also like