under the hood by shane ghiringhelli 1 period 2/5/13

12
Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Upload: malcolm-hines

Post on 13-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Under the Hood

by Shane Ghiringhelli

1 period

2/5/13

Page 2: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

5 Places to Save a File 1)File section in

computer

2)CD

3) External Hard Drive

4) Flash Drive

5) I Cloud

Page 3: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

SoftwareSystem Software: System software

refers to the files and programs that make up your computer’s operating system. System files include libraries of function, system service, drivers for printers and other hardware. The programs that are part of the system software include assemblers, compliers, file management tools, and debuggers.

Application: application software is a defined subclass of computer software that creates the capabilities of a computer directly to a task that a user wishes to do.

Data: Data quality is a perception or an assessment of datas fitness to serve its purpose in a given context.

Page 4: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

5 Pieces of Hardware• Monitor: A monitor displays

the graphics and videos on the computer.

• Mouse: An input device used to move things around on the screen.

• Speakers: The speakers play sound for the user to listen to things being played on the computer.

• Keyboard: A panel of keys that operate a computer.

• CPU: The brain of the computer, it performs all the tasks the user wishes to be done on a computer.

Page 5: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

5 More Pieces of Hardware• Mother Board: motherboard is an

electronic circuit board in a computer which interconnects hardware devices attached to it.

• Hard Drive: A high-capacity, self-contained storage device.

• RAM: Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell.

• Video Card: The video card is an expansion card that allows the computer to send graphical information to a video display like the monitor.

• Sound Card: A device that can be slotted into a computer to allow the use of audio components.

Page 6: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Computer Timeline • 1) David Packard and Bill Hewlett found Hewlett-Packard in a Palo Alto,

California garage. Their first product was the HP 200A Audio Oscillator, which rapidly becomes a popular piece of test equipment for engineers. (1939)

• 2) Konrad Zuse finishes the Z3 computer. The Z3 was an • early computer built by German engineer Konrad Zuse working in

complete isolation from developments elsewhere (1941)

• 3) The Williams tube won the race for a practical random access memory.(1947)

• 4) Tandy Radio Shack is founded.  Tandy Radio Shack (TRS) was formed by the 1963 merger of Tandy Leather Company and Radio shack. (1963)

• 5) Intel´s 8008 microprocessor made its debut.(1972)

• 6) featured the ability to address up to 4.3 gigabytes of virtual memory, providing hundreds of times the capacity of most minicomputers.(1978)

• 7) Seagate Technology created the first hard disk drive for microcomputers, the ST506 (1980)

• 8) The Mosaic web browser is released. (1993)

• 9) Yahoo is founded (1994)

• 10) Google is introduced (1997)

Page 7: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Nine Measurements• 1) Bit Single Binary Digit (1 or 0)

Byte 8 bits

Kilobyte (KB) 1,024 Bytes

Megabyte (MB) 1,024 Kilobytes

Gigabyte (GB) 1,024 Megabytes

Terabyte (TB) 1,024 Gigabytes

Petabyte (PB) 1,024 Terabytes

Exabyte (EB) 1,024 Petabytes

Zettabyte 1000 exabytes

Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell

Page 8: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

The First PC’s and Laptops• The personal computer (PC), which is

also called the microcomputer, was designed for use by one person. This was first developed for businesses in the early 1970s. Digital Equipment Corporation made the PDP8 for scientific laboratories. However,Steve Wozniak and Steve Jobs, college dropouts who founded Apple Computer in 1976, are credited with inventing the first computer for home use.

In particular, Bill Moggridge was responsible for pushing for a computer design which included a flat-panel screen that folded down onto the device's own keyboard, along with compact circuitry to keep it portable. He invented the first clamshell – style laptop.

Page 9: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Viruses, Worms and Trojan Horses

A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.

Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses.

A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.

Page 10: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

5 Famous Computer Companies

• Apple

• Dell

• Sony

• HP

• Toshiba

Steve Jobs

Michael S. Dell

Masaru Ibuka

David Packard William Hewlett

Hisashige Tanaka

Page 11: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Bibliography • http://www.techterms.com/definition/systemsoftware

• http://www.sciencedaily.com/articles/a/application_software.htm

• http://searchdatamanagement.techtarget.com/definition/data-quality

• http://pcsupport.about.com/od/componentprofiles/p/p_monitor.htm

• http://cs.sru.edu/~mullins/cpsc100book/module03_internalHardware/module03-00_internalHardware.html

• http://www.howstuffworks.com/ram.htm

• http://www.computerhistory.org/timeline/?year=1993

• http://www.howstuffworks.com/ram.htm

• http://www.enotes.com/history/q-and-a/who-invented-first-personal-computer-288815/

Page 12: Under the Hood by Shane Ghiringhelli 1 period 2/5/13

Computers in The Future

I think that in the future computers will have holograms on them. I think that you would be able click a link and everything on the screen would become a 3D hologram. I think that the keyboards will be a projection on the desk in front of you and type that way. I also think that some computers could do things on their own, almost like a robot. I also think that they will have transparent screens so it would look like things on the screen are floating.