Skip to main content

CHAPTER 6 (Inside Computers And Mobile Devices)


CHAPTER 6 INSIDE COMPUTERS AND MOBILE DEVICES

Objective Overview
1)    Describe the various computer and mobile device cases and the contents they protect
2)    Describe multi-core processors the components of a processor, and the four steps in a machine cycle
3)    Explain the advantages and services of cloud computing
4)    Define a bit, and describe how a series of bits represents data
5)    Describe the purpose of adapter cards, USB adapters, and ExpressCard modules
6)    Explain the purpose of a power supply and batteries
7)    Understand how to care for computers and mobile devices

Inside The Case 

Desktop
·         Motherboard : The main circuit board of the computer
·         Video card
·         Sound card
·         Processor Memory module
·         Power supply and fan
Laptop
·         Battery
·         Processor
·         Memory module
·         Integrated sound parts and circuity

Processors

Central Processing Unit (CPU) : Interprets and carries out the basic instructions that operate a computer

Multi-core processor : A single chip with two or more separate processor cores

Control Unit : The component of the processor that directs and coordinates most of the operations in the computer

Arithmetic Logic Unit (ALU):Performs arithmetic, comparison, and other operations

For every instruction, a processor repeats a set of four basic operations, which consist of a machine cycle

A processor chip generates heat that could cause the chip to malfunction or fail

Require additional cooling

-       Heat sinks
-       Liquid cooling technology
-       Cooling mats

Cloud Computing 

1)    Accessibility
2)    Cost savings
3)     Space savings
4)    Scability

Data Representation

         Analog signals are continuous and vary in strength and quality
         Digital signals are in one of two states: on or off

Memory

-      The operating system and other programs
-      Applications
-      Data being processed and the resulting information

Volatile memory

Nonvolatile memory

         Loses its contents when power is turned off

Does not lose contents when power is removed

         Example includes RAM

Examples include ROM, flash memory, and CMOS



·        Read-Only Memory (ROM) : Memory chips storing permanent data and instructions
·        Flash memory : can be erased electronically and rewritten

Adapters 

·         Plug and play : the computer automatically can recognize peripheral devices as you install them

Power Supply and Battery

·         The power supply or laptop AC adapter converts the wall outlet AC power into DC power
·         Mobile computers and devices can run using either a power supply or batteries
·         Batteries typically are rechargeable lithium-ion batteries







Comments

Popular posts from this blog

CHAPTER 4 - Programs And Apps

CHAPTER 4 Programs and apps Objectives overview §   Identify the general categories of programs and apps §   Describe how an operating system interacts with applications and hardware §   Differentiate among the ways you can acquire programs and apps §   Identify key features of productivity applications §   Identify the key features of graphics and multimedia applications §   Identify the uses of personal interest applications §   Identify the purpose of software used in communications §   Identify the key features of security tools §   Identify the key features of file and disk management tools Program, Software and Application PROGRAM SOFTWARE APPLICATION A set of instructions telling a computer what to do. The programs and other operating information used by a computer. Software can be made up of more than one program. All-encompassing term that is often used in contrast to hardware ...

CHAPTER 5 (Digital Safety And Security)

CHAPTER 5 DIGITAL SAFETY AND SECURITY Objectives Overview 1)     Define the term, digital security risks, and briefly describe the types of cybercriminals 2)       Describe various types of Internet and network attacks, and explain ways to safeguard against these attacks 3)     Discuss techniques to prevent unauthorized computer access and use 4)     Discuss how encryption, digital signatures, and digital certificates work 5)     Explain the ways that software manufacturers protect against software piracy 6)     Identify safeguards against hardware theft, vandalism, and failure 7)     Explain the options available for backing up 8)     Identify risks and safeguards associated with wireless communications Digital Security Risks Digital Security Risks : any event or action that could cause a loss of or damage to a computer or mobile...

CHAPTER 8 (Digital Storage)

CHAPTER 8 Digital Storage  Storage Storage is the physical material on which a computer keeps data, information, programs, and applications. Cloud Storage   Another storage option, in which the actual online storage media used is transparent to the user. Access time measures :  - The amount of time it takes a storage device to locate an item on a storage medium  - The time required to deliver an item from memory to the processor Hard Disks v   A hard disk contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. The characteristics of a hard disk include : 1)     Bezel 2)     Sealed chamber 3)     Disk platters 4)     Head arm 1)     Head actuator 2)     Drive electronics PCB 3)     Head electronics 4)     A...