1 / 25

Discovery1

Discovery

guest105341
Download Presentation

Discovery1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personal Computers and Applications Networking for Home and Small Businesses – Chapter 1

  2. Objectives • Identify the purpose and uses of personal computers and describe local and network applications. • Compare and contrast different types of computing devices. • Explain the binary representation of data. • Determine appropriate components and peripheral devices to meet requirements. • Install, verify, and upgrade computer components and peripherals.

  3. Purpose and Uses of Personal Computers • Multiple uses for computers

  4. Purpose and Uses of Personal Computers • Common local and network applications

  5. Types of Computing Devices • Different types of Computers

  6. Types of Computing Devices • Types and features of servers

  7. Types of Computing Devices • Features of a desktop personal computer (PC)

  8. Types of Computing Devices • Features of a workstation

  9. Types of Computing Devices • Types and features of portable devices

  10. Binary Representation of Data • Digital (binary) representation of various common forms of data • Using the proper units for measuring information

  11. Binary Representation of Data • Convert approximately between bits, bytes, Kilobytes, Megabytes, and Gigabytes

  12. Binary Representation of Data • Measuring speed, resolution and frequency

  13. Determining Appropriate Components and Peripheral Devices • Plan for computer purchase: preassembled or custom

  14. Determining Appropriate Components and Peripheral Devices • Motherboard

  15. Determining Appropriate Components and Peripheral Devices • Central Processing Unit (CPU)

  16. Determining Appropriate Components and Peripheral Devices • Random Access Memory (RAM)

  17. Determining Appropriate Components and Peripheral Devices • Adapter cards add functionality to a computer system

  18. Determining Appropriate Components and Peripheral Devices • Storage Devices and Requirements

  19. Determining Appropriate Components and Peripheral Devices • Peripheral device purposes and requirements

  20. Determining Appropriate Components and Peripheral Devices • Importance of UPS and Surge Protector

  21. Install, Verify and Upgrade Components and Peripherals • Computer Repair Best Practices

  22. Install, Verify and Upgrade Components and Peripherals • Connect Computer System components and verify operation

  23. Install, Verify and Upgrade Components and Peripherals • Installing Peripherals and Verifying Operation

  24. Summary • Computers are used all over the world and in all types of environments including: government, medical, education, manufacturing, legal and leisure. • There are many different types of computers available including: Mainframes, Servers, Desktop PCs, Workstations, Laptops and Hand-held portable devices. • Data is represented by binary digits (bits) organized into bytes (B), kilobytes (kB ), megabytes (MB), gigabytes (GB), and terabytes (TB). Data transfer rates are measured by bits per second. Computer screen resolution is measured in pixels. Analog frequencies, wireless transmissions and radio frequencies are measured in Hertz. • Things to consider when purchasing a computer: Motherboard, CPU, RAM, Adapter Cards, Storage, Peripherals, UPS, Surge Suppressors • Computers are a collection of very complex components and peripherals. Safety procedures must be followed when working inside a computer, both to protect the equipment and prevent harm to the technician.

More Related