microsoft office 2013 illustrated fundamentals concepts lecture understanding essential computer...
Post on 23-Dec-2015
216 Views
Preview:
TRANSCRIPT
Microsoft Office 2013Illustrated Fundamentals
Concepts Lecture
Understanding
Essential Computer Concepts
2
Defining Computers
A computer is an electronic device that:
Accepts input Processes data Stores data Produces output
3
Defining Computers
A computer system is made up of:
Hardware—the physical components
Software—the programs or instructions
4
What do computers look like?
Various sizes and shapesPerform the 4 basic functions
5
Four Categories of Computers
Personal ComputersHand-held ComputersMainframe ComputersSupercomputers
6
Categories of computers
Personal Computers Single-user Desktops Laptops or Notebook Tablet Subnotebook Slate
Categories of computers
Hand-held Computers Small, fit in the palm of the hand Usually limited capabilities and
processing power Smartphones MP3 players Some e-readers
7
Categories of computers
Mainframe Computers Found in medium to large businesses
or government agencies Centralized storage and processing Handles large amounts of data Accommodates many users
8
Categories of computers
Supercomputers Found in very large businesses or
government agencies Tremendous processing power Might be used in research to perform
simulations or make predictions
9
10
Essential Components
Processing Modify data to produce information. Performed by electronic components on
the motherboard. Directed by Central Processing Unit (CPU). Controlled by programs (instructions).
Peripherals Provide input, output, and storage
functions.
11
Essential Components
Input devices Converts user data or commands to a
format the electronic components of a computer can understand.
Examples: Keyboard, mouse, microphoneOutput devices
Coverts data or information from a format the computer understands to a format the user can understand.
Examples: Monitor, printer, speakers
12
Essential Components
Storage Temporary storage: where data and
programs are stored while they are in use. Also called memory, primary storage, or RAM.
Secondary storage: where data and programs are permanently stored while not in use. Includes hard drives, USB drives, and CD drives.
Since data is only stored temporarily while in use, it’s important to save your work periodically to secondary storage.
13
How is data stored?
Patterns of zeroes and ones (electric signals “off” or “on”).
Can be stored temporarily (RAM) or permanently (hard drive, USB drive, etc…).
When stored on permanent devices, organized in files.
File management: organization of files.
14
Why so many storage options?
Each storage option has benefits / drawbacks Temporary storage: Very fast for processing
but is erased when the power is turned off. Permanent storage: Slower than temporary
but data can be accessed repeatedly until erased by user.▪ Hard drive is the most common permanent
storage. Fast but not portable.▪ Removable devices provide portability but slower
than most hard drives.
15
Data Representation
Data and programs stored as files A file is a collection of bits (binary
digits) 1 (“on”) and 0 (“off”) are referred to as bits. Eight bits = one byte.
▪ Smallest recognizable unit; represents a unique character
Kilobyte (KB) is about one thousand bytes Megabyte (MB) is about one million bytes Gigabyte (GB), is about one billion bytes Terabyte (GB), is about one trillion bytes
16
Computer Software
Step-by-step instructions that tell the computer hardware how to accomplish the task.
Can refer to a single program or a package.Three basic types of software
System software helps the computer carry out its basic operating tasks.
Application software helps the user carry out a variety of tasks.
Security software helps protect the computer and data from malicious attacks.
17
System Software
Many programs that carry out basic computing functions: Getting input Processing data Storing data Producing output
Vital part of the “computer system” Four categories: Operating system,
device drivers, utilities, and programming languages.
18
System Software
Operating System Manages the computer’s resources Load data and instructions into memory Save data to permanent storage Coordinate use of resources Provide a user interface Many more functions
19
System Software
Device Drivers Coordinates communication between the
computer and peripherals Usually provided by the manufacturer
Utilities Perform specific tasks Reduce burden on operating system
Programming Languages Allow people to write instructions
(programs) for the computer to follow
20
Which operating system (OS)?
Depends on the type of computer Three main operating systems for
personal computers: Windows, MAC OS (Apple computers), and Linux
New computers typically have OS already installed
Hand-held computers usually have a mobile version of an OS or one designed specifically for the device
21
Application Software
Application software enables you to perform specific tasks. Application software for PCs include:
Document production software Spreadsheet software Database management software Graphics and presentation software
Note: Today’s smartphones have thousands of “apps” that perform specific functions.
22
Application Software
Document production software includes word processing, desktop publishing, and Web authoring software that assist you in writing and formatting documents. Often has grammar and spell-checking, thesaurus, search and replace, and template features.
23
Application Software
With spreadsheet software, you can create formulas that perform calculations. Spreadsheet software creates worksheets with columns and rows.
24
Application Software
Database management software creates structured databases to store, sort, and retrieve information.
25
Application Software
Graphics and presentation software allow you to create illustrations, diagrams, and slide shows.
26
Data Communication
Transmit data… from one computer to another
▪ Via cables, telephone, or wireless from the computer to a peripheral device
▪ Via ports and cables connected to computer▪ Expansion cards allow you to add more ports
and thus more communication capabilities or functionality.
from one component of the computer to another▪ Via the data bus
27
Learning About Networks
Networks connect computers and computer devices so that data and resources can be shared.
Require special hardware and software Network Interface Card (NIC) Network software
Types of Networks LAN (local area network) WAN (wide area network) PAN (personal area network) Wireless
28
Learning About Networks
Networks can be found in many places Home
Share printer or files, Internet access, play games
Work Share hardware, files, and Internet access Access special software
School Access to hardware, Internet, special
programs
29
Learning About Networks
Accessing a network account Typically requires a username and password Account permissions determine what
devices or drives can be accessed. Example:
▪ School network gives access to network storage drives and classroom printers.
▪ Home network gives access to different storage drives and devices.
30
Security Threats - Malware
Malware is software that is designed to cause harm to your data or computer or transfer personal information without your knowledge or permission.
▪ Examples: Viruses, Trojans, Worms, Spyware, Rogue software
Transferred to your computer via▪ E-mails and attachments▪ Files transferred on disk▪ Installing software▪ Surfing the web
31
Security Threats – Malware Protection
Antivirus software Detects, disables and/or removes most
viruses, trojans, and worms Anti-spyware software
Detects and removes programs used to track surfing habits or transmit personal information
Firewall Blocks access to your computer without
your permission Hardware or software solution
32
Security Threats - Phishing
Phishing involves two phases Spoofing
▪ The creation of a “fake” web site designed to look like the site of a legitimate business.
▪ The “fake” site is actually designed to steal personal information.
Phishing▪ The process of sending an e-mail containing a
link to a spoofed site to unsuspecting people.▪ The intention is to steal personal information.
33
Security Threats – Phishing Protection
Be wary!▪ Most legitimate businesses will not send you
an e-mail asking for personal information.▪ If the e-mail seems strange, it probably is not
legitimate. If you are not sure, look up the company phone number (don’t use one from the e-mail) and give them a call.
▪ Look for spelling and grammar errors.▪ Point (DON’T CLICK) to the link contained in
the e-mail. The URL of the link will be displayed in the status bar. In many cases the URL will be very different than the actual business URL.
34
Questions
35
Resources
www.howstuffworks.com Many great articles on computer hardware and software
www.microsoft.comLots of help and how-to articles, videos, and training exercises for Windows and Office
www.microsoft.com/protectTons of undated information on protection your computer and your family online
www.google.com (or any search engine)Type in search words to find exactly what you are
looking for
36
Links
Link to video about rogue software Info about protecting family online MS Security YouTube channel
top related