0% found this document useful (0 votes)
30 views40 pages

Understanding Computer Hardware Basics

Chapter 2 covers the fundamentals of computer hardware, including the transition from analog to digital signals and the role of binary in data storage. It details components such as the motherboard, CPU, memory types (RAM, ROM, cache, and flash), and secondary storage options like hard drives and SSDs. Additionally, it introduces cloud computing concepts, deployment models, service models, and emphasizes the importance of data protection against viruses and the need for regular backups.

Uploaded by

Assem Mustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views40 pages

Understanding Computer Hardware Basics

Chapter 2 covers the fundamentals of computer hardware, including the transition from analog to digital signals and the role of binary in data storage. It details components such as the motherboard, CPU, memory types (RAM, ROM, cache, and flash), and secondary storage options like hard drives and SSDs. Additionally, it introduces cloud computing concepts, deployment models, service models, and emphasizes the importance of data protection against viruses and the need for regular backups.

Uploaded by

Assem Mustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter 2:

Hardware
Let’s give it a try

Going Digital
Analog
Digitizing means converting analog
signals to 1s and 0s
(to digital signals)
The simplest digital signals have only two states and
are called binary. All whole numbers can be
represented in binary form as strings of ones and
zeros.
Computers use binary - the digits 0 and 1 - to store
data. A binary digit, or bit, is the smallest unit of
data in computing. It is represented by a 0 or a
1. Binary numbers are made up of binary digits
(bits), eg the binary number 1001.

Digital
The PC System Unit
Programmers write computer
code, and this is converted
by a translator into binary
instructions that the
processor can execute.
All software, music, documents,
and any other information
that is processed by a
computer, is also stored
using binary.
Mother Board
● The system board (main board or mother board)
The system board controls communications for
the entire computer system. Every component
within the system unit connects to the system
board.
● All external devices including the keyboard,
mouse, and monitor connect to the system board.
● The motherboard is a single circuit board
and houses:
○ Microprocessor (Processor)
○ Memory Chips
○ Expansion Slots
○ Ports
The processor or CPU
• provides the instructions and processing
power the computer needs to do its work.
The more powerful and updated your
processor, the faster your computer can
complete its tasks
There are 2 main CPU brands: Intel & AMD

What are cores?


A core is basically the part of the processor
that does the processing. The more cores the
processor has, the more processes it can do
at once.
Primary Memory
Memory is a holding area for data, instructions and
information.
Memory is contained on chips connected to the
system board.
Four types of memory chips:
Random Access Memory (RAM).
Read Only Memory (ROM).
Cache memory
Flash Memory.
RAM (Random Access Memory)
• Volatile & temporary
• Programs/data are loaded into RAM storage
• DATA CAN BE ALTERED
• is lost when the power is turned off
• The speed and performance of your system directly
correlate to the amount of RAM you have installed
• RAM allows your computer to perform many of its
everyday tasks, such as loading applications, browsing the
internet, editing a spreadsheet, or experiencing the latest
game. Memory also allows you to switch quickly among
these tasks, remembering where you are in one task when
you switch to another task. As a rule, the more memory
you have, the better.
ROM (Read Only Memory)
ROM
Read only memory
ROM chips have information stored in them by
the manufacturer.
They are not volatile and cannot be changed by
the user.
For example, ROM stores the instructions for
the computer to start up when it is turned
on again.
Cache Memory
• Cache memory is an extremely fast memory type that
acts as a buffer between RAM and the CPU. It holds
frequently requested data and instructions so that
they are immediately available to the CPU when
needed
10
Copyright Prentice Hall, Inc.

Cache memory –
It is the fastest memory which has faster access time where data is
temporarily stored for faster access.
Primary Memory –
It is memory on which computer works currently. It is small in size
and once power is off data no longer stays in this memory.
Secondary Memory –
It is external memory which is not as fast as main memory but data
stays permanently in this memory.
Flash Memory
● Flash Memory offers a combination of the features of RAM and
ROM.
○ Like RAM, it can be updated to store new information.
○ Like ROM, it doesn’t lose that information when the computer is
turned off.
● Flash memory is used in enterprise data center server, storage
and networking technology, as well as in a wide range of
consumer devices, including USB flash drives -- also known as
memory sticks -- SD cards, mobile phones, digital cameras, tablet
computers and PC cards in notebook computers and
embedded
11
controllers.
Describing the Processor Performance:

Measured in GHz Billions of instructions


per second
Expansion Slots
● Most computers allow users to expand their system
by providing expansion slots on their system board
to accept expansion cards.

13
Expansion Slots and Cards
Examples on expansion cards include:
● Graphics cards provide high-quality 3-D graphics and
animation for games and simulations.
● Sound cards accept audio input from a microphone and
convert it into a form that can be processed by the
computer.

Plug and play is the ability for a computer to recognize a device


without human interaction.

14
System Board

15
16
Copyright Prentice Hall, Inc.

Putting It All Together - Ports

● Ports
○ For example : USB

➢ Any H/W device


connected to the
computer is
called a
Peripheral
17
Copyright Prentice Hall, Inc.

Understanding the factors which impact on a computer’s performance

● The higher the GHz speed, the faster the computer.


● The more memory you have the faster the PC will operate.
● Number of Microprocessors inside the Computer
● The more programs which are running at the same time, the slower each
one will run.
Storing and
Retrieving
Information
Secondary Memory
Secondary Storage
Unlike memory, secondary storage holds data and
programs even if electrical power is not available.
The most important types of secondary media are:
• Hard disks: store programs and very large data files magnetically.
• Solid-state storage: Saves data and information electronically
similar to RAM except that it is non volatile.
• Examples on Solid-state storage are: Solid-state drives (SSD), and
USB drives.
• SSDs require less power and produce far less heat than spinning
hard disk drives
20
Copyright Prentice Hall, Inc.

Hard drive

● Magnetic Hard Drives are used to store data


and programs on desktops and laptops
● Magnetic tape drives are usually used for large
server / systems backups.
● Advantages
○ Cheap Storage per MB (especially tape drives!)
○ Relatively quick read / write speeds.
● Disadvantages
○ Easily broken if dropped
○ Slow read /write compared to new SSD drives.
○ High energy uses as it uses moving parts (lower
battery life on laptops)
21
Copyright Prentice Hall, Inc.

Solid-state storage
● Today, almost all new laptops and desktop computers use SSDs for
non-volatile data storage
● New gaming consoles — like the PS5 and Xbox Series X — now use
SSDs instead of hard disks.
● SDs offer extremely fast data storage and retrieval, and they’re
smaller and lighter than HDDs, giving computer manufacturers more
design flexibility.
● SSDs have low power requirements, contributing to better battery life
in laptops and tablets. SSDs are also shock resistant, which reduces
the chances of data loss when mobile devices are dropped.
Cloud
Computing
What is cloud computing?
Cloud computing refers to the delivery of computing services over the internet,
including storage, processing power, and software applications.
It allows users to access resources and services on-demand,
without the need for physical infrastructure or local servers.

Cloud Computing
• On-Demand Self-Service: Users can provision resources
and services as needed, without requiring human
interaction with service providers.
Characteristics of Cloud

• Broad Network Access: Services are accessible over the


internet via standard protocols and devices.
computing

• Resource Pooling: Computing resources are pooled

Introduction
together to serve multiple users, allowing for efficient
utilization and scalability.
• Rapid Elasticity: Resources can be scaled up or down
quickly to meet changing demands.
• Measured Service: Cloud service usage is measured,
monitored, and billed based on actual consumption.
Deployment Models
Cloud Deployment Models

Public Cloud

• Services are provided over a public network


and available to anyone who wants to use
them.
• It is a cost-effective option for businesses
and individuals looking for scalability and
flexibility.
• Public cloud providers, such as AWS, Azure,
and GCP, offer a wide range of services
accessible to the general public.
Cloud Deployment Models

Private Cloud
• Infrastructure is dedicated to a single
organization and may be located on-
premises or off-premises.
• Private cloud environments are designed to
meet specific security, compliance, or
performance requirements.
• They offer enhanced control, customization,
and privacy but require significant upfront
investment.
Cloud Deployment Models

Hybrid Cloud
• Combines public and private cloud
environments, allowing for flexibility and
data sharing between the two.
• Organizations can leverage the benefits of
both public and private clouds, ensuring
optimal resource allocation.
• Hybrid cloud deployments enable workload
portability and seamless integration
between different environments.
Cloud Deployment Models

Community Cloud

• Community cloud is a deployment model where


infrastructure and services are shared among a
specific community or group of organizations.
• It caters to the needs of a particular community,
such as government agencies, educational
institutions, or research organizations.
• Community cloud provides a cost-effective
solution while addressing specific requirements
and compliance standards of the community.
Service Models

Infrastructure as a Service (IaaS)

IaaS provides virtualized computing resources over


the internet. Users have control over the operating
systems, storage, and networking components.

They can provision and manage virtual machines


(VMs), storage, and networks according to their
requirements. Examples of IaaS providers include
AWS EC2, Azure Virtual Machines, and Google
Compute Engine.
What is Infrastructure as a Service ?
● A category of cloud services which provides capability to provision processing, storage,
intra-cloud network connectivity services, and other fundamental computing resources
of the cloud infrastructure.

Source- [ITU –Cloud Focus Group]

Diagram Source: Wikipedia


Service Models

Platform as a Service (PaaS)

PaaS offers a platform for developing, testing, and


deploying applications.
Users can focus on application development
without worrying about infrastructure management.
PaaS providers manage the underlying
infrastructure, including servers, storage, and
networking.
Developers can leverage pre-configured
environments, development frameworks, and
deployment tools.
Examples of PaaS providers include Heroku, Google
App Engine, and AWS Elastic Beanstalk.
Service Models

Software as a Service (SaaS)

SaaS delivers software applications over the internet


on a subscription basis.
Users can access and use applications directly
through a web browser or APIs.
The provider hosts and manages the underlying
infrastructure, application, and data.
Users can typically customize certain aspects of the
application to fit their needs.
Examples of SaaS include Salesforce, Microsoft
Office 365, and Google Workspace.
Benefits of Cloud
• Cost Savings: Pay for what you use, with no upfront infrastructure costs.
• Scalability: Easily scale resources up or down based on demand.
• Flexibility: Access resources and applications from anywhere with an internet connection.
• Reliability: Cloud providers typically offer high uptime and data redundancy.
• Collaboration: Enable seamless collaboration and data sharing among teams.
Common Cloud Computing Use Cases
• Data Storage and Backup: Store and back up large amounts of data securely.
• Software Development and Testing: Rapidly create and deploy applications in a scalable
environment.
• Web and Mobile Applications: Host web and mobile applications in the cloud for global
accessibility.
• Big Data Analytics: Process and analyze vast amounts of data using cloud resources.
• Disaster Recovery: Maintain data backups and recovery plans in the cloud for business
continuity.
Computer
Viruses and
Backup
36
Copyright Prentice Hall, Inc.

Viruses and Virus Protection (anti virus and


backup)
● A virus program
○ It is man-made
harmful program
○ Infects programs,
documents,
databases and CAN
DESTROY ALL DATA
○ It can hide and
reproduce
○ It can lay dormant
and then activate
37
Copyright Prentice Hall, Inc.

Sources of Computer Viruses

● Three primary sources


○ The Internet
■ Via downloads and exchanges
○ Exchanging disks
○ Computer networks
■ Can spread from one network
to another
38
Copyright Prentice Hall, Inc.

Virus Protection

● Antivirus program
○ Must install and keep updated
○ What it will do:
■ Delete e-mails that are
suspicious
■ Alert you before opening a file
■ Scans downloaded files
■ Cleans virus
39
Copyright Prentice Hall, Inc.

Backing up Files

● Safeguard your contents


○ Choose a backup plan
■ Full
■ Selective
■ Incremental
○ Choose your media
■ High-capacity
■ Portable hard disk
■ Server
■ Another PC
■ And more…
40
Copyright Prentice Hall, Inc.

Your Data is valuable .. Protect it


The most valuable term is DATA

● Use user ID and password.


● Back up regularly
● Use Anti Virus
● Encryption “encoding data”
● Etc……

You might also like