Premium Essay

Introduction of Computer

In: Computers and Technology

Submitted By SuriaRajan
Words 26839
Pages 108
Introduction to computers

Unit 1
WUC 117/03

Introduction to Computing and Internet

Introduction to Computers

WUC 117/03 Introduction to Computing and Internet

Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena

Mr. Kevin Tan Pooi Soo

Associate Professor Norhaziah Md Salleh

Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling

Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts.

© 2008 Wawasan Open University First revision S1 2011
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU.

Wawasan Open University Jalan Sultan Ahmad Shah, 10050 Penang. Tel: (604) 2180333 Fax: (604) 2279214 Email: Website:

Introduction to computers

Unit 1 Introduction to Computers
Course overview Unit overview Unit objectives 1.1 Computer concepts
Objectives Introduction History of computers Computer defined Computer capabilities Hardware and…...

Similar Documents

Premium Essay

Introductions Into Computers

...In the world of technology and computers, there has always been a way to make programs applications more advanced more simplistic and better than ever before with updates. When everything also is made into the way of life of computers, there’s always one thing to provide out the details and the simplistic trails of operating systems. Without the limitations of these operating systems, many would wonder as a society what could have happened if the operating system was never invented. Without operating systems and computers, things could and would have proceeded into the complications of today and things might not have changed if it wasn’t for the internet and different frustrations of doing many things by hand, but in the ways of introducing technology now is very simplistic. Using computers now in the present have been used as a daily important part of our lives to stay communicated to the world and to the rest of the others in real time. Running on computers have been of choice running operating systems to stay on top of programs and applications to get and take care of the other particles of tasks needed to be done or just for leisure and entertainment. Using operating systems known in short terms for “OS” is all on the society’s choice running what they think is the best for what they can get for the computer. There is all but one OS out of the major ones that is running for free without price, and that would be Linux. In today’s society, there’s a lot that Linux can......

Words: 309 - Pages: 2

Free Essay

Introduction to Computer Security

...CSS150-1302B-04 Introduction to Computer Security Phase 3: Discussion Board 3 Networks, Cryptography, and Malicious Activity Professor: Shawn Murray June 5, 2013 In this paper I will discuss a malicious computer worm that spread rather quickly and affected thousands of people and targeted a company in Utah. I will discuss how the worm spread in detail. Lastly, I will discuss how to prevent / defend against such worms. On January 26, 2004 MyDoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi was a computer worm that affected Microsoft Windows (, 2010). MyDoom in 2004 had set the record for spreading the fastest through email. It was said to be started by e-mail spammers through junk mail being sent. That was one way the worm was sent. MyDoom was also sent out as failure sent messages. One of the messages that MyDoom had sent out was “Andy; I’m just doing my job, nothing personal, sorry.” (, 2010). With messages such as that and sent failure / system error messages, one whom was not knowledgeable of such worms would foolishly open it. These messages including but not limited to the one mentioned above brought suspicion to a lot of people and it was believed that the maker of the worm was paid. To date, the author of MyDoom is not known. It is thought though that MyDoom was created in Russia by a programmer (, 2010). In the result of MyDoom globally internet access had slowed......

Words: 622 - Pages: 3

Free Essay

Introduction Computer Addiction

...Introduction It is undeniable that the computer has become an essential gadget for daily lives of every human being. The Internet is an absolute necessity for both adults and children. It is impossible to believe to do anything without the Internet, especially from the youth’s perspective. Youths today spend too much time on the computer, surfing the Internet for hours. Some have become much too addicted and don’t realize that they actually suffer from Internet Addiction Disorder (IAD). Let’s have a look at how computers directly have effects upon youths nowadays. One of the main consequences of spending too much time on the computer that youths are likely to disregard is personal neglect. When one is too obsessed with surfing the Internet, they tend to pay no attention to their standard of living apart from the computer which they are using. Some may not take bath, clean their room, or eat well as they are much too focused on what they are doing virtually. Because of the long hours spent engaged with a computer, youths often have eating irregularities, such as skipping meals or overeating. This indirectly leads to health disorders, for instance, malnutrition of the youth’s body. Isolation, avoidance and no family bonding at all is another outcome which happens in a youth’s life when they get excessively addicted with the Internet. Because of spending too much time on the computer, youths have a propensity to reduce socializing with others. They tend to feel that......

Words: 522 - Pages: 3

Premium Essay

An Introduction to the Computer Security Problem

...Essay 1 What Is There to Worry About? An Introduction to the Computer Security Problem Donald L. Brinkley and Roger R. Schell This essay provides an overview of the vulnerabilities and threats to information security in computer systems. It begins with a historical presentation of past experiences with vulnerabilities in communication security along with present and future computer security experiences. The historical perspective demonstrates that misplaced confidence in the security of a system is worse than having no confidence at all in its security. Next, the essay describes four broad areas of computer misuse: (1) theft of computational resources, (2) disruption of computational services, (3) unauthorized disclosure of information in a computer, and (4) unauthorized modification of information in a computer. Classes of techniques whereby computer misuse results in the unauthorized disclosure and modification of information are then described and examples are provided. These classes are (1) human error, (2) user abuse of authority, (3) direct probing, (4) probing with malicious software, (5) direct penetration, and (6) subversion of security mechanism. The roles of Trojan horses, viruses, worms, bombs, and other kinds of malicious software are described and examples provided. In the past few decades, we have seen the implementation of myriads of computer systems of all sizes and their interconnection over computer networks. These systems handle and are required to......

Words: 13185 - Pages: 53

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security......

Words: 1194 - Pages: 5

Free Essay

Introduction to Computer and Network Hardware:

...Best Device for Your Needs Introduction to Computer and Network Hardware: ITCO103 - 1401A – 01 IP 1 Best Device for Your Needs Many people are updating their smartphones, laptops and desktops. There are so many options to choose from brand, size and performance. This paper will discuss and compare some of today’s best bargain laptops and computers that will also offer some of today’s most updated software and features. I will also discuss two of the most popular smartphones comparing and contrasting each devices features. While shopping on the internet for the best computer system I had hundreds of choices. I decided to narrow my choices down by picking a device that had all the features I needed in a computer system, but had a reasonable price tag for a full time worker and a part time student budget. The best option for me is the Dell Inspiron 660, and the Canon PIXMA MG2220 all-n-one printer it has all the features and needs that I would need in a personal home desktop system. The price point for this desktop is around $529.00. This device can be purchased at Wal-Mart, Best Buy, and Hhgreeg making it accessible to most for in store purchase. This desktop is also available for purchase online as well from the dell website directly for the price listed above. The system software consists of OS Provided Microsoft Windows 7 Home Premium 64-bit Edition. The system setup......

Words: 1468 - Pages: 6

Premium Essay

Introduction to Computers

...Windows 7 Presentation APTECH COMPUTER EDUCATION What is an OS ? • Operating systems provide a software platform on top of which other programs, called application programs, can run. History of Microsoft Windows • 1980-MS-DOS • 1982–1985: Introducing Windows 1.0 • 1987–1992: Windows 2.0–2.11—More windows, more speed • 1990–1994: Windows 3.0–Windows NT—Getting the graphics • Windows NT • 1995–2001: Windows 95—the PC comes of age (and don't forget the Internet) • 1998–2000: Windows 98, Windows 2000, Windows Me Continue… • Windows 2000 Professional • 2001–2005: Windows XP—Stable, usable, and fast • 2006–2008: Windows Vista—Smart on security • 2009–Today: Windows 7(The version of Kernel is 7.0 or above 6.0) • Expecting Windows 8 Hardware Requirements Flavors of Windows 7 • • • • • • Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate Editions of Windows 7 Windows 7 Ultimate Windows 7 Home Premium Windows 7 Enterprise Windows 7 • Standard Professional consumer edition Consumers Windows 7 Home • Does not include Premium Windows 7 Home Basic Windows 7 Starter business features Windows 7 Targeted for value PCs enthusiasts for want all all for accessing for edition in targeted markets, in environments, • Business-focused edition,emergingwhomanagedWindows 7 small factor PCs full Windows The Professional editioncustomer. and lowermeant markets7 standardtechnicalfor......

Words: 2139 - Pages: 9

Free Essay

Introduction to Computer Addiction

...Since my freshman year of high school, I have used a computer for at least an hour (a conservative minimum) virtually every single day. At one point I would return from soccer practice at 6pm, shower, eat dinner, and then play about three hours of computer games before beginning my homework. My friends and I would plan computer game matches during 4 th period calculus rather than pay attention. My vision has declined since then from 20/20 to 20/25. I can easily spend hours on the computer, but I often tell myself that I do not have time to go running. The first thing I do when I return to my apartment is check my email. When I experience “writer's block” while using Microsoft Word, I have an overpowering urge to sign onto AOL Instant Messenger. Once “online,” I find it extremely difficult to sign off. Help me, Dr. Phil. The inspiration of this project is based on the following assumptions: A significant amount of college students share my experience of computer abuse. They find themselves staying on their computers longer than expected and sacrificing their daily objectives as a consequence. Because time is a scarce resource, computer use must be replacing other activities. Also, as the technology sector grows, jobs are becoming less physically demanding. Many employees sit down for hours, whether they are secretaries, programmers, researchers, administrative officials, etc, concentrating on small characters on their computer monitors. Not only is this substituting more......

Words: 361 - Pages: 2

Premium Essay

Introduction to Computer

...Topics: Chapter 1 – Working Together Computers are everywhere. Watching television, driving a car, using a charge card, ordering fast food, and the more obvious activity of typing a term paper on a personal computer, all involve interaction with computers. For one day, have each member of your team make a list of every computer he or she encounters (be careful not to limit yourselves just to the computers you see). Meet with the members of your team and combine your lists. Consider how each computer is used. How were the tasks the computers perform done before computers? Use PowerPoint to create a group presentation and share your findings with the class. Chapter 2 – Working Together This chapter lists 12 types of Web sites: portal, news, informational, business/marketing, educational, entertainment, advocacy, blog, wiki, online social network, content aggregator, and personal. Working as a team, use the Internet to find at least two examples of each type of Web site. For each Web site, identify the Web address, the multimedia elements used, the purpose of the Web site, and type of Web site. Explain why you classified each site as you did. Then, keeping in mind the purpose of each Web site, rank the sites in terms of their effectiveness. Share your findings in a report and/or a PowerPoint presentation with the class. Chapter 3 – Working Together In any software application, each program is not exactly the same. Different spreadsheet programs, for......

Words: 539 - Pages: 3

Free Essay

Introduction to Computers

...Introduction to Computers and the Internet 2 1) Basic browser buttons: The same picture is blown up twice below, so that the labels are easier to read. 2) Favorites: A favorite (or a bookmark, depending on your browser) is a link to a page that you store in your web browser. This makes it easier to pull up that page because you do not have to remember its full address, search for it, or click through links on a page to get to it. If there is a page you want to remember or like to go to a lot, you may want to add it to your favorites. Here you can see the pages that are currently saved on your computer or add a new one. 3) Home Page(s): The home page is the page or pages that the browser pulls up when you first open it. You can set it to open more than one, and you can choose what it opens first. To do this, you will want to use the “home” icon. [pic] Clicking on the icon will make the browser pull up the home page, but by clicking on the arrow immediately to the left of it, you can set a new home page. Here you can see the current home page highlighted and the options to change or remove home pages. If you choose to add or change, you will see this: You can either make the page you are currently on the home page, or tell the browser to bring it up in addition to the page(s) it is already opening. If you find that you have too many home pages, you may want to remove some, like......

Words: 355 - Pages: 2

Premium Essay

Introduction to Human Computer Interaction

...Introduction of Human Computer Interaction Human computer interaction is communication between user and system, and is the study of the way in which computer technology influences human work and activities. With the rapid advancement of technology, our lives almost depend on computer or any kind of machine. For example computer, Global Positioning System (GPS), cell phone, and even for tuning musical instrument you have a digital device that helps tune your instrument. Therefore it is very important that the interface of any device should be very user friendly, meaning the person who does not have much knowledge of system should be able to use it. Because not all of our populations are computer or technology literate, but still they have to use it because of requirement and necessity (Dix, A. 2009, pp. 1327-1331). Analysis of Google Home Page The strength of Google is the simple look and feel which every single user can access and gain useful information. The speed of the search engine is amazing and can gain any information within no time. Google has the provision to integrate with various languages and its localized search is an added features compared to other search engines. The information is well organized. Google’s products are its major strength which has created a huge user base. This enhances the trust to its customers and shareholders. Google search indexes has various file formats including the very popular PDF file format and Microsoft Office files...

Words: 1339 - Pages: 6

Premium Essay

Essential Introduction Computer

...Essential Introduction to Computers 1. Define the term computer and discuss the four basic computer operations: input, processing, output, and storage 2. Define data and information 3. Explain the principle components of the computer and their use 4. Describe the use and handling of floppy disks and hard disks 5. Discuss computer software and explain the difference between system software and application software 6. Identify several types of personal computer application software 7. Discuss computer communications channels and equipment and the Internet and World Wide Web 8. Explain how to purchase, install, and maintain a personal computer, a notebook computer, and a handheld computer 9. Define e-commerce 1. Computer: Input, Processing, Output, and Storage In today's world, computers are used for almost every task imaginable. Routine activities such as paying bills, buying groceries, or communicating with a friend can be done with a computer. That is why it is important not only to know how to use a computer, but also to understand the components of a computer and what they do. Recent studies report that almost 40% of homes surveyed have personal computers, and this number is growing. Given the widespread use of computers, computer literacy - a knowledge and understanding of computers and computer uses - has become an essential ingredient in the recipe for success in today's world. Florida was the first state to demand computer......

Words: 2855 - Pages: 12

Premium Essay

Introduction to Computers - Key Terms

...Chapter 1 - Introduction to Computers - Key Terms (pages 1-15) Barcode - (p. 7, 294) used to index documents scanned within a document management systems. Bit - (p. 294) the level of voltage (low or high) in a computer that provides the binary states of 0 and 1 that computers use to represent characters. Bluetooth port - (p. 294) technology that uses radio waves to provide hands-free cellular phone communications. Blu-Ray disc - (p. 294) storage device, similar to CDs and DVDs, but are able to store even larger amounts of data. Bus network - (p. 294) computers networked together that are lined up on a single cable. Byte - (p. 294) eight bits treated as a single unit by a computer to represent a character. Cache memory - (p. 294) a type of memory located on the central processing unit (CPU) that can also be on a part of the processor. Central processing unit (CPU) - (p. 295) the brain of the computer, or the circuits that make the electrical parts function. Client/server network - (p. 295) large networks that could run hundreds of computers in various counties or states. Compact disc (CD) - (p. 296) discs that use a finely focused laser beam to write and read data. Computers on wheels (COWs) - (p. 296) term used to refer to notebook computers mounted on carts and moved with the user. Daisy chain network - (p. 296) the easiest way to add more computers into a network by connecting each computer to the next in a series. Device driver - (p. 297) a specific type......

Words: 1585 - Pages: 7

Free Essay

Introduction to Computer

...1) A computer is unique compared to any other machine because of its ability to ________. process large amounts of information simultaneously process complex math functions change its programming use many different types of software Score: 1 2) Bits are used to measure ________. storage capacity data transfer and Internet connection rates the size of files the amount of time a user is connected to the Internet Score: 1 3) The smallest, most lightweight, and inexpensive computer is the ________. notebook laptop netbook client Score: 0 4) Distributed computing distributes ________. the processing of tasks across a group of computers power ability across all users Internet usage across the entire network disk storage for all computer users Score: 1 5) Smartphones use ________ technology, allowing users to perform several functions with one device. embedded design invisible computing convergence grid computing Score: 1 6) The intersection of a row and a column in a spreadsheet is called a ________. field text cell record Score: 1 7) Shaynia has been working with her colleagues on a......

Words: 2580 - Pages: 11

Free Essay

Computer Introduction

...vedere la matrice assegnata a ciascuna variabile, semplicemente digitare il nome della variabile. Numeri MATLAB usa notazione decimale e convenzionale, con un punto decimale e opzionale ed indicando quantit` positive o il segno meno, per numeri negativi. La notazione scientifica usa la lettera e per a specificare la potenza decimale.I numeri immaginari usano i o j, come un suffisso. Degli esempi di numeri legali sono: 3 9.6397238 1i -99 1.60210e-20 -3.14159j 10 0.0001 6.02252e23 3e5i Tutti i numeri che usano il format long specificato dall’IEEE sono immagazzinati internamente con lo standard floating-point. I numeri floating-point hanno una precisione limitata di 16 cifre decimali significative e una serie limitata da 10^-308 a 10^308+. (Il computer di VAX usa una configurazione diversa, ma la sua precisione e serie sono quasi le stesse.) Operatori Le espressioni usano operatori di aritmetica familiari e le regole della precedenza. + * / \ Addizione Sottrazione Moltiplicazione Divisione Left division (sono descritte nella sezione su matrici e Algebra Lineare in MATLAB) ^ ’ () potenza Asse coniugato complesso trasposto Valutazione specifiche di ordine. Funzioni MATLAB prevede un gran numero di funzioni matematiche standard,incluso abs, sqrt, exp, e sin. La radice quadrata o il logaritmo di un numero negativo non ` un errore; il risultato complesso ` prodotto e e automaticamente. MATLAB prevede anche funzioni matematiche molto pi` avanzate, incluso Bessel u e gamma function.......

Words: 9607 - Pages: 39

Dragon Ball – Bảy Viên Ngọc Rồng chap 495 | Thám Tử Lừng Danh Conan chap 990 | blackwhaster