[go: up one dir, main page]

0% found this document useful (0 votes)
53 views24 pages

Lesson 1 - Computer

The document discusses the history and components of computers. It describes how computers evolved from the initial idea of providing a name for "the box" to complex devices that can perform many tasks simultaneously. The core components of a computer are then outlined, including the input/output units, memory, CPU, and storage. Finally, the document explores how information technology developed in the 1990s through advances in communication technologies and the creation of the Internet, and some implications of these changes like cyber crimes and online etiquette.

Uploaded by

yson lagrimas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views24 pages

Lesson 1 - Computer

The document discusses the history and components of computers. It describes how computers evolved from the initial idea of providing a name for "the box" to complex devices that can perform many tasks simultaneously. The core components of a computer are then outlined, including the input/output units, memory, CPU, and storage. Finally, the document explores how information technology developed in the 1990s through advances in communication technologies and the creation of the Internet, and some implications of these changes like cyber crimes and online etiquette.

Uploaded by

yson lagrimas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

The Computer … The Device the Change it All

Presented by
Jayson L. Lagrimas
Whats Inside the BoX

• The idea is to give a proper name for the box


• The Name should be logically coherent with the
picture inside the box
7

7
I

STAND
MAN

BOARD
S

P
G G E

G
E G E
G
G G
E
G
R R
A
T
E E
T
H

A H
T

A W

H H
W A

T
T
T

W W A A

H
I
U
+
+
+
What is a Computer

• An electronic device capable of manipulating data


correspondingly in needs to produce an information
• Performs computations and logical decision
• Computer programs are set of instruction that a
computer process a data
• The basic architecture is the IPO diagram
• Computer literacy is the defined as the knowledge in
using computer effectively and efficiently
The Basic Architecture
• Hardware – The physical components of the
device
• Software – Program that runs on a computer
• Network- communication of device
• People Ware – the end user or developer of
the device
Six Logical Units
• Input Unit – accepts data
• Output Unit – displays information
• Memory Unit – Retains input and processed
information
• Arithmetic and logical Unit – performs calculations
• CPU – supervise operation of other devices
• Secondary Storage Unit- stores data permanently
Interpretive flexibility
of the computer

• The computer is different


– A broad range of uses, where many uses are
substantially different from one another
– This is called multitasking
What Language ?

• Software - is any set of machine-readable


instructions that directs a computer's processor to
perform specific operations. 

• 1. System Software
• 2. Application Software
• 3. Rogue / Malware
The Birth of I.T.
It is in the 90’S

• Information Technology- general term that describes


any technology that produce, manipulate, store,
communicate, and or disseminate information
• Merges computing and high speed communications
links carrying data, sound and video
Communication Technology

• Communication Technology – telecommunications


technology consist of electromagnetic device and
systems for communicating over long distances

• Internet - The Internet is a global system of


interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link
several billion devices worldwide.
Cyber Crimes

• Cyber crime encompasses any criminal act dealing


with computers and networks (called hacking).
Additionally, cyber crime also includes traditional
crimes conducted through the Internet. For example;
hate crimes, telemarketing and Internet fraud,
identity theft, and credit card account thefts are
considered to be cyber crimes when the illegal
activities are committed through the use of a
computer and the Internet.
Etiquette in technology

• Netiquette, a colloquial portmanteau of network 
etiquette or Internet etiquette, is a set of social
conventions that facilitate interaction over networks,
ranging from Usenet and mailing lists to blogs and 
forums. Social network and microblogging
End of Presentation

You might also like