A computer is a device that accepts information and instructions from the user, processes the data in a way in which the user designates, and displays the information in a form stipulated by the user. It is an electronic device using electronic signals to manipulate the data.

There are many different types of computers on the market today. They include but by no means limited to: Personal Digital Computers, Desktop Computers, laptops or notebook computers, handheld computers, cell phones, mainframe computers, and supercomputer.

A computer system includes all the computer’s hardware and software. Hardware is anything that is tangible or the physical components of a computer. It is any part of the system that you can actually touch. Software is the intangible component such as programs. Programs are lists of instructions that instruct the hardware to perform certain tasks.

Hardware works with software to process data. Data can be words, numbers, figures, sounds, and graphics. Data is processed according to instructions (software).

System software manages the operations of the computer such as loading programs, executing programs, displaying information, etc. It essentially consists of the operating system with additional utilities, drivers, and program languages. System software is located either in the root directory (C:\) or the windows directory on Drive C. The user should not change or rename any system folder. If these files and/or folders are changed, the computer may not function properly.

Application software consists of lists of instructions that tell the hardware what to do.

Application software includes programs such as Microsoft Word, Microsoft Excel, Microsoft PowerPoint, MicroType, etc.

APPLICATION software helps the USER perform specific tasks; whereas the SYSTEM software helps the COMPUTER perform specific tasks.

APPLICATION/USER

SYSTEM/COMPUTER

An input device allows the user to insert or input data into the computer for processing. The most common input device is the keyboard. Other input devices include the mouse and scanner. Input devices enter data as well as issue commands to the computer.

These devices display output. The two main output devices are the monitor and the printer.

The main permanent storage on any computer system is the hard drive. The hard drive is a compact disk found on the inside of computer. The computer system sets aside an area for storage of your personal documents. This is called the My Documents Folder.

Another permanent storage device is a flash drive. This is a portable external storage device that plugs into your computer.

The flash drive is more durable and holds more memory and is faster than a floppy disk.

The floppy disk was used for many years as an external permanent storage device. However, it was unreliable and not very durable. The flash drive that was sold by IBM in 1998 took the place of the floppy disk. The newer computers don’t have floppy drives making the floppy disk outdated.

Other storage devices include:

· CD-R which is compact disc recordable;

· CD-RW which is compact disc rewritable;

· CD-ROMS which is compact disc read-only memory.

· DVD which is digital versatile disc DVD-R, recordable

· DVD-RW rewritable

· DVD-ROMS. Read only memory

CD-ROM means you can read only and can’t modify the data such music CDs and software programs that are on CDs.

RAM memory is Random Access Memory. It temporarily stores data. When the computer is turned off, the data is gone. RAM is a form of data storage. Random refers to the fact that data can be accessed in any order or random order regardless of where it is located.

The user should always save his/her data before turning off the computer. Adding more RAM can help your computer run faster.

ROM is Read Only Memory. ROM is non-volatile or permanent memory. ROM stays constant whether the computer is on or off.

ROM contains instructions for the computer to check the components to make sure they are working properly and to activate the system software.

The computer doesn’t recognize letters of the alphabet or numbers in the way humans do. Computers are electronic devices, and they recognize switches that are either on or off much like the light switch. If the switch is on, it is represented as a “1”. If the switch is off, it is represented by a “0”. These numbers are referred to as binary digits or bits. A series of 8 bits is called a byte. A byte represents one keystroke. A byte is abbreviated as “B,” and a bit is abbreviated as “b.”

If you see 10MB (10 megabytes, it means 10 million bytes; 10GB (gigabytes) means 10 billion bytes; 10KB (Kilobytes) means 10 thousand bytes; and TB or terabyte means approximately one trillion bytes.

KB, MB, GB, and TB refer file sizes, storage capacity, and processing capacity. A CD can store up to 700 MB; a DVD can store between 4.7 GB and 15.9 GB. A DVD with a storage capacity of 4.7 GB can hold nine hours of video.

A printer is a device that can print data on paper. Laser printers are the most popular because of their high-quality output. The speed of the laser printer is dependent upon how many pages per minute it can produce. Dot matrix printers transfer ink to the paper by striking a ribbon with pins. The speed of the dot matrix printer is measured in characters per inch or cps.

A network connects one computer to another. Any computer on a network must have a Network Interface Card or NIC. The NIC allows interaction and/or communication between the computer and the network. A NIC is connected to the network via a cable.

A server is a computer that is the central storage location for programs and user data. When a client is combined with a server, you have a client/server network. The clients are the individual computers and the server provides shared software and storage for these computers.

You can network computers in order to play games, but this isn’t a client/server environment. This is just a client/client network where each client is equal.

The internet is a worldwide collection of networks that allow people to communicate and share information.

WWW stands for the World Wide Web or just web. The web is a service the internet offers that enables users to communicate with each other. It is a system of web servers with web pages.

Web pages are specially formatted documents created in programming languages such as HTML or SML or ASP.

These are programming languages for writing and creating web pages.

HTML stands for hypertext markup language; XML means Extensive Markup Language and ASP means Active Server Pages.

If you are on a web page, click on the main menu VIEW go down and click on SOURCE, you will see the programming language the web page was written in.

A web server stores web sites; the web server (computer) manages and displays pages on a web site.

A web site is a collection of web pages that have the same theme. These web sites are stored on web servers belonging to individuals, companies, and/or organizations.

connect one web page to another web page. These web pages usually have the same theme. The hyperlink can be a word, phrase or icon and are usually underlined or have a different color.

An ISP is an Internet Service Provider. An ISP is a company that sells internet access. Examples of ISP are Bellsouth, Insight, AOL, PeoplePC, etc.

A web browser is software used to access, retrieve, and interact with web pages.

It allows different operating systems to communicate over the internet. Examples of web browsers are Internet Explorer, Safari, and FireFox. You must have a browser in order to access the web.

The URL or Uniform Resource Locator is the address of a web site you want to retrieve. For an example:

http://www.kytech.ky.gov/

http://www.uky.edu/

http://louisville.edu/

https:// The “s” indicates the site is a secure site.

The http stands for hypertext transfer protocol; www stands for World Wide Web; kytech.ky.gov is the domain name where the server is located.

. The Internet Protocol address is the address of the computer. It is like your home address. Every computer has an address which is a set of 4 numbers separated by a period. For example: 123.143.23.14. No number can be above 254.

All computers and servers have IP addresses. Instead of keying in the IP address, users can key in domain/computer names. Users remember names better than numbers.

All computers users need to take the appropriate steps to keep unauthorized persons from gaining access to their computer in order to do harm.

Malware (malicious software) is software created in order to bring harm or convey information taken from your computer to use in a harmful way.

Virus-protection software searches out malware and erases or disables the malware commands that would do harm.

Spyware programs are designed to keep track of a user’s internet usage and send the information back over the internet to the company or person who created it. This is usually done without the permission of the owner. Some spyware programs now can interfere with the computer such as changing computer settings and interfering with software applications.

A spoofed site is a site that looks exactly like an authentic site. An example of a spoofed web page is one that looks exactly like your bank’s web page. The spoofed site is created in order to get your personal banking information. A user doesn’t realize it isn’t the authentic site; therefore may give personal information. The spoofed web site can even have the “s” in the URL indicating it is a secure site.

Viruses are programs that can copy themselves and infect a computer without the knowledge of the user. They are designed to spread through attachments and emails. Viruses don’t infect compressed files or write-protected files. The sole purpose for the creation of a virus is to do harm to your computer system.

A worm can spread from computer to computer without any action on the part of the user. Once it is on your computer, it replicates itself thousands of times. It can copy itself to everyone in your address book. The biggest threat of the worm is taking up space on your computer, a network, or the internet. It can slow down a system quickly.

A Trojan Horse can be more annoying than malicious like changing the icons on the desktop, but can delete and destroy files. Trojans will make itself look like a legitimate system file.