Computer Basics
A Bit about Bytes and the Binary System
Link to questions:
http://kenhead.weebly.com/uploads/8/7/7/3/8773652/abitaboutbytesworksheet.pdf
Define the following:
A. Hertz or Hz: Named after Heinrich Hertz, hertz is the measuring of the waves or frequencies or electric changes each second. In computer terms it is used to measure a monitors refresh rate.
B. Bit: A unit of computer information equal to the result of on or off.C. Byte: A unit of storage that holds a single character. 8 bits equal a byte.
D. Kilobyte or KB: Equals 1024 bytes
E. Megabyte or MB: Equals 1,048,576 bytes
F. Gigabyte or GB: Equals 1,073,741,824 bytes
G. Binary Code: A way of representing text on a computer using 0's and 1's.
64,8,4,1 are on and equal 77
1. 169
2. 85
3. 180
4. 87
5. 41
6. 15
7. 96
8. 130
128 / 64 / 32 / 16 / 8 / 4 / 2 / 1
1= 0 0 0 0 0 0 0 1
2= 0 0 0 0 0 0 1 0
3= 0 0 0 0 0 0 1 1
4= 0 0 0 0 0 1 0 0
5= 0 0 0 0 0 1 0 1
6= 0 0 0 0 0 1 1 0
7= 0 0 0 0 0 1 1 1
8= 0 0 0 0 1 0 0 0
9= 0 0 0 0 1 0 0 1
10=0 0 0 0 1 0 1 0
14=0 0 0 0 1 1 1 0
25=0 0 0 0
36=0 0 1 0 0 1 0 0
49= 0 0 1 1 0 0 0 1
57=0 0 1 1 1 0 0 1
84=0 1 0 1 0 1 0 0
100=0 1 1 0 0 1 0 0
106=0 1 1 0 1 0 1 0
115=0 1 1 1 0 0 1 1
127=0 1 1 1 1 1 1 1
128=1 0 0 0 0 0 0 0
50 = 0 0 1 1 0 0 1 0
90 = 0 1 0 1 1 0 1 0
0 0 1 0 1 1 1 1= 47
1 0 1 0 1 0 1 0=170
http://kenhead.weebly.com/uploads/8/7/7/3/8773652/abitaboutbytesworksheet.pdf
Define the following:
A. Hertz or Hz: Named after Heinrich Hertz, hertz is the measuring of the waves or frequencies or electric changes each second. In computer terms it is used to measure a monitors refresh rate.
B. Bit: A unit of computer information equal to the result of on or off.C. Byte: A unit of storage that holds a single character. 8 bits equal a byte.
D. Kilobyte or KB: Equals 1024 bytes
E. Megabyte or MB: Equals 1,048,576 bytes
F. Gigabyte or GB: Equals 1,073,741,824 bytes
G. Binary Code: A way of representing text on a computer using 0's and 1's.
64,8,4,1 are on and equal 77
1. 169
2. 85
3. 180
4. 87
5. 41
6. 15
7. 96
8. 130
128 / 64 / 32 / 16 / 8 / 4 / 2 / 1
1= 0 0 0 0 0 0 0 1
2= 0 0 0 0 0 0 1 0
3= 0 0 0 0 0 0 1 1
4= 0 0 0 0 0 1 0 0
5= 0 0 0 0 0 1 0 1
6= 0 0 0 0 0 1 1 0
7= 0 0 0 0 0 1 1 1
8= 0 0 0 0 1 0 0 0
9= 0 0 0 0 1 0 0 1
10=0 0 0 0 1 0 1 0
14=0 0 0 0 1 1 1 0
25=0 0 0 0
36=0 0 1 0 0 1 0 0
49= 0 0 1 1 0 0 0 1
57=0 0 1 1 1 0 0 1
84=0 1 0 1 0 1 0 0
100=0 1 1 0 0 1 0 0
106=0 1 1 0 1 0 1 0
115=0 1 1 1 0 0 1 1
127=0 1 1 1 1 1 1 1
128=1 0 0 0 0 0 0 0
50 = 0 0 1 1 0 0 1 0
90 = 0 1 0 1 1 0 1 0
0 0 1 0 1 1 1 1= 47
1 0 1 0 1 0 1 0=170
Computer Performance
Boot Process
The events that happens between turning the computer on and becomes ready for use.
Purposes:
Runs a diagnostic test to make sure everything works as it should.
Loading the Operating System so the computer can preform basic operations
6 events of the Boot Process
Power up
Start boot program
Power-on Self-Test
Identify peripheral devices
Load operation system
Check configuration and customization
Circuits
The path from one part of a computer to another.
Data runs through circuits
Circuits run between
RAM and the microprocessor
Ram and other storage devices
Silicon Chip
Silicon is melted sand.
Silicon is what circuits are enclosed in to keep stable
Megahertz (mHz)
A measurement used to measure the speed of the computer system
A megahertz is equal to one million cycles per second
1.3 GHz means that the microprocessor’s clock operates at a speed of 1.3 billion cycles per second.Page 2
Pentium
Title of the CPU Chip
Pentium is the 5th generation of the Intel processor.
Other generations were called
• 80-88 / 286/ 386 / 486
RAM vs. ROM
RAM-- Random access memory
The ability of a storage device to go right to a specific storage location with out having to search in sequence from the beginning
Loses all data when computer is turned off
Very volatile
ROM-- Read Only Memory
Drives can read data from disks, but new data cannot be stored on them
One or more integrated circuits that have permanent instructions that the computer uses when it turns on
Binary Number System
A method for showing letters or numbers using only two digits, 0 and 1
Bit
•Each 0 or 1
Byte
•8 bits
Also referred to as Base 2 Binary Code.
Memory Measurements
Bit
The smallest unit of a data that the computer can use
Byte
Equal to 8 bits
Kilobyte
About 1000 bytes
Exactly 1,024 bytesPage 3
Megabyte
About 1,000,000 bytes
Exactly 1,048,576 bytes
Gigabyte
About 1 billion bytes
Terabyte
About 1 trillion bytes
Storage Devices
Used to store data when the computer is not on and be transferred to another computer
Medium/media
Place or device where data is stored
Hard Disk
Usually put in the Computers system unit (tower)
Can store billions of characters of data.
Stated in form of bytes: megabytes or gigabytes
Magnetic Storage
o Recording of data onto disks or tape by magnetizing particles of an oxide based surface coating.
o A fairly permanent type of storage that can be modified.
o Damage can be made by: Magnets, dust, liquid, etc
Floppy Disk
Round piece of flexible mylar covered with a thin layer of magnetic oxide sealed inside a protective coating
May be referred to as a “floppy”
3½ disk capacity is 1.44 MB or 1,440,000 bytes
Floppy Disk Options
Formatted
Preparing the disk for use by the computer
Write-protected
Setting the disk so nothing can be written to by the computer
Jump, Flash or Thumb Drives
Replaced Zip drives because:
Smaller - Size of key
Faster - no bulky cables to hook up-inserts into usb port.
Cheaper-512 mb for $30
Digital Audio Tape
A way of storing large amounts of data on tape using helical scan technology to write data
Optical Storage
A way of recording data as light and dark spots on a CD or DVD
Reading is done through a low-power laser light.
Pits
Dark spots
Lighter and non-spotted surface areas
Lighter, non-spotted surface areas
CD-ROM
CD - Read only memory
Also called CD-R
Storage device using laser technology to read data permanently stored on compact disks.
Can't be used to write data on a disk (700mb)
CD-RW
CD - Read write
A storage device that reads data from CD’s and can also write data to CD’s
Similar to a _____CD - Rom__________ but has the ability to write numerous times.
DVD-ROM
Digital video disks
Read only memory (4gb)
Reads data from CD’s; both audio and data, and DVD’s data or movies
This can be used to write data on a disk if it is a DVD-RW
Computer Viruses
Computer Technology
Name:_______________________Kevin____________________________ Period:___________1___________
Computer Viruses
VIRUSES
______________Computer Virus______________________: Set of program instructions that attaches itself to a
file, reproduces itself, and/or spreads to other files.
It can
Corrupt files
__________Destroy data____________________
Display irritating messages
_____________Corrupt computer systems__________________
Spreading Viruses
Viruses spread because people distribute infected files by exchanging disks and CDs, sending
e-mail attachments, and ______Downloading_______________________ documents from the Internet.
Viruses attach themselves to ___________files________________.
When you open the infected file, the virus opens and waits to infect the next program you run
or disk you use.
Spreading Viruses (continued)
Viruses have the ability to lurk in a computer for days or months, quietly _______replicating____________
themselves.
You may not even know your computer has a virus, thus making it easier to spread the virus.
Trigger Events
An event that activates a task often associated with a computer virus.
________Time Bomb________________________: Watches for the PC clock to reach a certain date to
activate the virus.
Example:________Michelangelo virus____________________________
Damages files on March 6 the artist’s birthday
_____________Logic Bomb___________________: Watches for a specific set of input to activate the virus.
Classification of Viruses
File Virus
Virus that attaches to an ___________Word________________ program.
Example: __________Chernobyl____________________
Notorious for overwriting a section of the hard disk, making it impossible to
access data.Computer Technology
Boot Sector Virus
Infects the system files that your computer uses every time it is turned __on______.
Cause widespread damage and recurring problems.
Example:____________Stoned Virus______________________
Every time you turn on your computer the virus is activated and infects any nonwrite-protected files including your hard disk.
Macro Virus
______Macro____________: A miniature program that usually contains legitimate instructions to
automate a document or task.
This virus infects a macro.
Example: ___________Melissa Virus____________________
Attaches itself to Microsoft Word documents.
Example: _____Codemas Virus__________________________
Attaches itself to Microsoft Excel spreadsheets.
Other Viruses
___________Trojan Horse______________________: Computer program that seems to perform one function while
actually doing something else.
Different from a virus because it does not make copies of itself.
Different tasks that can be affected
_________Stealing passwords____________________
Deleting files
______Worm_________: Software program designed to enter a computer system usually through a network,
through security holes and then replicate itself.
Spreads from computer to computer.
Protecting yourself from viruses
_______Antivirus software_____________________________
Set of utility programs that looks for and eradicates a wide spectrum of problems,
including viruses, Trojan horses, and worms.
Example: _____________McAffee Virus scan_____________________
Don’t open ___________e-mails attachment ______________________________ that have strange names or are
from people you don’t recognize.
Name:_______________________Kevin____________________________ Period:___________1___________
Computer Viruses
VIRUSES
______________Computer Virus______________________: Set of program instructions that attaches itself to a
file, reproduces itself, and/or spreads to other files.
It can
Corrupt files
__________Destroy data____________________
Display irritating messages
_____________Corrupt computer systems__________________
Spreading Viruses
Viruses spread because people distribute infected files by exchanging disks and CDs, sending
e-mail attachments, and ______Downloading_______________________ documents from the Internet.
Viruses attach themselves to ___________files________________.
When you open the infected file, the virus opens and waits to infect the next program you run
or disk you use.
Spreading Viruses (continued)
Viruses have the ability to lurk in a computer for days or months, quietly _______replicating____________
themselves.
You may not even know your computer has a virus, thus making it easier to spread the virus.
Trigger Events
An event that activates a task often associated with a computer virus.
________Time Bomb________________________: Watches for the PC clock to reach a certain date to
activate the virus.
Example:________Michelangelo virus____________________________
Damages files on March 6 the artist’s birthday
_____________Logic Bomb___________________: Watches for a specific set of input to activate the virus.
Classification of Viruses
File Virus
Virus that attaches to an ___________Word________________ program.
Example: __________Chernobyl____________________
Notorious for overwriting a section of the hard disk, making it impossible to
access data.Computer Technology
Boot Sector Virus
Infects the system files that your computer uses every time it is turned __on______.
Cause widespread damage and recurring problems.
Example:____________Stoned Virus______________________
Every time you turn on your computer the virus is activated and infects any nonwrite-protected files including your hard disk.
Macro Virus
______Macro____________: A miniature program that usually contains legitimate instructions to
automate a document or task.
This virus infects a macro.
Example: ___________Melissa Virus____________________
Attaches itself to Microsoft Word documents.
Example: _____Codemas Virus__________________________
Attaches itself to Microsoft Excel spreadsheets.
Other Viruses
___________Trojan Horse______________________: Computer program that seems to perform one function while
actually doing something else.
Different from a virus because it does not make copies of itself.
Different tasks that can be affected
_________Stealing passwords____________________
Deleting files
______Worm_________: Software program designed to enter a computer system usually through a network,
through security holes and then replicate itself.
Spreads from computer to computer.
Protecting yourself from viruses
_______Antivirus software_____________________________
Set of utility programs that looks for and eradicates a wide spectrum of problems,
including viruses, Trojan horses, and worms.
Example: _____________McAffee Virus scan_____________________
Don’t open ___________e-mails attachment ______________________________ that have strange names or are
from people you don’t recognize.
Operating System
Name_____________Kevin_________________________________ Period _____1_______
Operating Systems
Development of computers
1
st
Generation computers
Used vacuum tubes
Vacuum tubes are electronic devices that control the flow of electrons.
Had no operating systems.
Used custom application programs, which were made for the specific task that the computer was to
perform.
_________________________ were necessary for every aspect of the computing job.
2
nd
Generation computers
Used transistors
Transistors performed functions similar to vacuum tubes, but they were smaller, cheaper, less powerhungry, and more reliable.
Ran programming language compilers.
Used English like commands rather than binary numbers.
Made it possible to develop software.
3
rd
Generation computers
Smaller and less powerful than 1
st
and 2
nd
generation computers, but had the ability to run multiple
programs for multiple users simultaneously.
4
th
Generation computers
Used integrated circuits.
Computer systems were smaller, faster, and less expensive than 3
rd
generation computers.Operating System Software
Master controller for all activities that take place within a computer; primary purpose is to help the computer
system _______monitor_________________itself in order to function efficiently.
Interacts with application software, device drivers, and hardware to manage a computer’s _____resources_________.
Ensures that _____input________ and _________output__________ proceed in an orderly manner.
Platform
Underlying ______hardware______________ and _________software___________ of the computer system.
Two popular platforms
PC
MAC
Multitasking
_____Running more than one program at a time_________________________________________________________________________________
Making sure that the instructions and data from one area of memory don’t interfere with memory allocated for
other program
GUI (Graphical User Interface)
A type of user interface that features on-screen objects, such as menus and icons, manipulated by a __mouse___
Abbreviation is pronounced “_____gooey________”.
Definitions
________Program____________
Set of detailed, step-by-step instructions that tell a computer how to solve a problem or carry out a
task.
______Application software______________
Set of computer programs that help a person carry out a task.
________Drive_____________
A location on a network that is set aside for the collection of data
________folder_____________
The subdirectory or subdivision, of a drive that can contain files or other folders.
_________File____________
A named collection of data that exists on a storage medium. (a document)
Operating Systems
Development of computers
1
st
Generation computers
Used vacuum tubes
Vacuum tubes are electronic devices that control the flow of electrons.
Had no operating systems.
Used custom application programs, which were made for the specific task that the computer was to
perform.
_________________________ were necessary for every aspect of the computing job.
2
nd
Generation computers
Used transistors
Transistors performed functions similar to vacuum tubes, but they were smaller, cheaper, less powerhungry, and more reliable.
Ran programming language compilers.
Used English like commands rather than binary numbers.
Made it possible to develop software.
3
rd
Generation computers
Smaller and less powerful than 1
st
and 2
nd
generation computers, but had the ability to run multiple
programs for multiple users simultaneously.
4
th
Generation computers
Used integrated circuits.
Computer systems were smaller, faster, and less expensive than 3
rd
generation computers.Operating System Software
Master controller for all activities that take place within a computer; primary purpose is to help the computer
system _______monitor_________________itself in order to function efficiently.
Interacts with application software, device drivers, and hardware to manage a computer’s _____resources_________.
Ensures that _____input________ and _________output__________ proceed in an orderly manner.
Platform
Underlying ______hardware______________ and _________software___________ of the computer system.
Two popular platforms
PC
MAC
Multitasking
_____Running more than one program at a time_________________________________________________________________________________
Making sure that the instructions and data from one area of memory don’t interfere with memory allocated for
other program
GUI (Graphical User Interface)
A type of user interface that features on-screen objects, such as menus and icons, manipulated by a __mouse___
Abbreviation is pronounced “_____gooey________”.
Definitions
________Program____________
Set of detailed, step-by-step instructions that tell a computer how to solve a problem or carry out a
task.
______Application software______________
Set of computer programs that help a person carry out a task.
________Drive_____________
A location on a network that is set aside for the collection of data
________folder_____________
The subdirectory or subdivision, of a drive that can contain files or other folders.
_________File____________
A named collection of data that exists on a storage medium. (a document)