SlideShare a Scribd company logo
1 of 45
The Evolution Of Computers ,[object Object]
Overview ,[object Object],[object Object],[object Object],[object Object]
Thesis ,[object Object]
Personal Relevance
What is a Computer? ,[object Object]
Why Computers Are Important? ,[object Object],[object Object]
The history of the Computer
Invention of the First Working Computer ,[object Object],[object Object],[object Object],http://upload.wikimedia.org/wikipedia/commons/5/5a/Schickardmaschine.jpg
First Programmable Computer ,[object Object],[object Object],[object Object],[object Object]
First Programmable Computer
Computers in the 1970s ,[object Object],[object Object],[object Object],[object Object]
Computers in the 1990s ,[object Object],[object Object],[object Object]
Modern Computers Today ,[object Object],[object Object]
Time Line  1930 2010 1970 1975 The Company Microsoft & Apple were founded
Working Safely When Repairing a Computer
Work Environment  ,[object Object],[object Object],[object Object]
Always Unplug The Computer ,[object Object]
Remove all Hand Jewelry ,[object Object],[object Object]
Avoid Capacitors ,[object Object],[object Object]
Never Attempt to Service Non-Serviceable Parts ,[object Object],[object Object],[object Object],http://maven.smith.edu/~orourke/103/CSC103_Pictures_files/CSC103_PowerSupply.jpg
Basic Computer Components
Major Computer Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Central Processing Unit (CPU) ,[object Object],[object Object],[object Object]
Heat-sink ,[object Object],[object Object],[object Object]
Random-Access Memory (RAM) ,[object Object],[object Object],http://im3.ebidst.com/upload_big/6/4/4/1214619692-30617-0.jpg
Hard Disk Drive ,[object Object],[object Object]
Solid State Drive ,[object Object],[object Object],(SSD)
Motherboard ,[object Object]
Video Card ,[object Object],[object Object]
Sound Card ,[object Object],[object Object]
Optical Disk Drive ,[object Object],[object Object],[object Object]
Computer Case ,[object Object],[object Object]
Network Card ,[object Object],(NIC) Wireless Wired
Printer ,[object Object]
Monitor ,[object Object],[object Object],http://star-techcentral.com/archives/2007/5/29/prodit/Philips_1b.jpg http://www.samsung.com/us/system/consumer/product/2009/08/22/ls24kizkfvza/2494SW_Front_Medium.jpg
Screen Burn-In
Types of Monitors
CRT Monitor ,[object Object],(Cathode Ray Tube)
LCD Monitor ,[object Object],[object Object],(Liquid Crystal Display)
Conclusion ,[object Object],[object Object]
Application Website
Class Activity
Works Cited ,[object Object],[object Object],[object Object]
Works Cited ,[object Object],[object Object],[object Object]
Works Cited ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

BESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERSBESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERSBESOR ACADEMY
 
Concepts 7 Unit A Ppt
Concepts 7 Unit A PptConcepts 7 Unit A Ppt
Concepts 7 Unit A Pptguest9cd2256
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computersMuhammad Faisal
 
Basic of computer pptx
Basic of computer pptxBasic of computer pptx
Basic of computer pptxcnkchandru
 
Computer System Hardware Arabelle Capito
Computer System Hardware Arabelle CapitoComputer System Hardware Arabelle Capito
Computer System Hardware Arabelle Capitobelle07
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsSaumya Sahu
 
Understanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In BusinessUnderstanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In BusinessBegum Rokeya University, Rangpur
 
Powerpoint infotech
Powerpoint infotechPowerpoint infotech
Powerpoint infotechjasper_nuqui
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 

What's hot (14)

Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
BESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERSBESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERS
 
Computer and Information Technology
Computer and Information TechnologyComputer and Information Technology
Computer and Information Technology
 
Concepts 7 Unit A Ppt
Concepts 7 Unit A PptConcepts 7 Unit A Ppt
Concepts 7 Unit A Ppt
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
portable computer
portable computerportable computer
portable computer
 
Basic of computer pptx
Basic of computer pptxBasic of computer pptx
Basic of computer pptx
 
Computer System Hardware Arabelle Capito
Computer System Hardware Arabelle CapitoComputer System Hardware Arabelle Capito
Computer System Hardware Arabelle Capito
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Understanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In BusinessUnderstanding of Computer | Introduction | Computer In Business
Understanding of Computer | Introduction | Computer In Business
 
Powerpoint infotech
Powerpoint infotechPowerpoint infotech
Powerpoint infotech
 
Itt course – unit i chapter 3
Itt course – unit i   chapter 3Itt course – unit i   chapter 3
Itt course – unit i chapter 3
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 

Viewers also liked

Roaring 20s full
Roaring 20s fullRoaring 20s full
Roaring 20s fullmikedunton
 
Theme 4 part 2
Theme 4 part 2Theme 4 part 2
Theme 4 part 2tysenq
 
NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013vinhbinh2010
 
Russian 9-11 Memorial
Russian 9-11 MemorialRussian 9-11 Memorial
Russian 9-11 Memoriallocalshops
 
Chapter 5 power point
Chapter 5 power pointChapter 5 power point
Chapter 5 power pointclperki2
 
USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013vinhbinh2010
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processingguevarra_2000
 
Computing Without Computers - Oct08
Computing Without Computers - Oct08Computing Without Computers - Oct08
Computing Without Computers - Oct08Ian Page
 
History.text.pearson
History.text.pearsonHistory.text.pearson
History.text.pearsonsidharth7
 
The English in North America
The English in North AmericaThe English in North America
The English in North AmericaAlex
 
Liberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksLiberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksTim Sherratt
 
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Emma Sinclair
 
Panama Canal Course Day 1 final
Panama Canal Course Day 1 finalPanama Canal Course Day 1 final
Panama Canal Course Day 1 finalAdolf89
 
Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010almataki
 
Henry II
Henry IIHenry II
Henry IIPato_Ch
 

Viewers also liked (20)

Roaring 20s full
Roaring 20s fullRoaring 20s full
Roaring 20s full
 
US in WWI
US in WWIUS in WWI
US in WWI
 
Thedoctorthedictator test
Thedoctorthedictator testThedoctorthedictator test
Thedoctorthedictator test
 
Theme 4 part 2
Theme 4 part 2Theme 4 part 2
Theme 4 part 2
 
NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013
 
Russian 9-11 Memorial
Russian 9-11 MemorialRussian 9-11 Memorial
Russian 9-11 Memorial
 
Group 2 Exam
Group 2  ExamGroup 2  Exam
Group 2 Exam
 
Chapter 5 power point
Chapter 5 power pointChapter 5 power point
Chapter 5 power point
 
10.3
10.310.3
10.3
 
USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processing
 
Computing Without Computers - Oct08
Computing Without Computers - Oct08Computing Without Computers - Oct08
Computing Without Computers - Oct08
 
History.text.pearson
History.text.pearsonHistory.text.pearson
History.text.pearson
 
TAKE THAT
TAKE THATTAKE THAT
TAKE THAT
 
The English in North America
The English in North AmericaThe English in North America
The English in North America
 
Liberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksLiberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networks
 
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
 
Panama Canal Course Day 1 final
Panama Canal Course Day 1 finalPanama Canal Course Day 1 final
Panama Canal Course Day 1 final
 
Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010
 
Henry II
Henry IIHenry II
Henry II
 

Similar to Sgp Computersfinal

Computer History SGP
Computer History SGPComputer History SGP
Computer History SGPjsedgwick
 
Computer Hardware Introduction
Computer Hardware IntroductionComputer Hardware Introduction
Computer Hardware IntroductionSeenivasan SR
 
Computer Hardware Introduction
Computer Hardware IntroductionComputer Hardware Introduction
Computer Hardware IntroductionSeenivasan SR
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1rjsuthar56
 
Computer Based Presentation.pptx
Computer Based Presentation.pptxComputer Based Presentation.pptx
Computer Based Presentation.pptxShivamYadav362790
 
Overview of Computer Systems
Overview of Computer SystemsOverview of Computer Systems
Overview of Computer SystemsWathsala Godage
 
Computers types
Computers typesComputers types
Computers typesOfun Emma
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015Aron Kondoro
 
all coputer parts.pptx
all coputer parts.pptxall coputer parts.pptx
all coputer parts.pptxchere3
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computersNeha Kurale
 
What is a computer
What is a computerWhat is a computer
What is a computerOfun Emma
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerkapitanbasa
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsKristi Anderson
 

Similar to Sgp Computersfinal (20)

Computer History SGP
Computer History SGPComputer History SGP
Computer History SGP
 
Computer Hardware Introduction
Computer Hardware IntroductionComputer Hardware Introduction
Computer Hardware Introduction
 
Computer Hardware Introduction
Computer Hardware IntroductionComputer Hardware Introduction
Computer Hardware Introduction
 
Lecture 1.pdf
Lecture 1.pdfLecture 1.pdf
Lecture 1.pdf
 
Ch 1 introduction and 2 computer software 1
Ch 1 introduction  and 2 computer software 1Ch 1 introduction  and 2 computer software 1
Ch 1 introduction and 2 computer software 1
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer Based Presentation.pptx
Computer Based Presentation.pptxComputer Based Presentation.pptx
Computer Based Presentation.pptx
 
Input devices
Input devicesInput devices
Input devices
 
Overview of Computer Systems
Overview of Computer SystemsOverview of Computer Systems
Overview of Computer Systems
 
Computers types
Computers typesComputers types
Computers types
 
ICF2 (2).ppt
ICF2 (2).pptICF2 (2).ppt
ICF2 (2).ppt
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
 
The Computer
The ComputerThe Computer
The Computer
 
The Computer
The ComputerThe Computer
The Computer
 
all coputer parts.pptx
all coputer parts.pptxall coputer parts.pptx
all coputer parts.pptx
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computers
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Day 1
Day   1Day   1
Day 1
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer Components
 

Recently uploaded

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

Sgp Computersfinal

Editor's Notes

  1. http://upload.wikimedia.org/wikipedia/commons/5/5a/Schickardmaschine.jpg http://images.apple.com/imac/images/overview_hero1_20091020.pnghttp://en .wikipedia.org/wiki/File:Apple-logo.png
  2. While computers have been around for decades their components inside keep evolving. In order to keep up with this evolving technology a Network Administrator will need to receive the proper certifications and training.
  3. This topic is important to me because I feel that people do not know any of the history of how the computer was invented, what all of the components inside a computer do, and how much work goes into building and designing a new computer
  4. http://www.dictionary.com A computer is just a device that you give it a set of instructions and it will perform the desired tasks that you told it to do. ALso, computers are also in everything that we have today in this day in age. Computers are in our watches, car, cell phones, etc.
  5. In this section of the powerpoint I will be telling you the history of computers, and the people that invented them. http://laptops.webhostingoverview.com/wp-content/uploads/2007/06/176.jpg http://images.apple.com/macbookpro/images/design-hero20090915.jpg
  6. William Schockard was born in 1592 in Germany he was a universal scientist, and a professor in astronomy. While he was in college he mainly researched mathematics, and astronomy. Schockard was also one of the first people to build a working calculating machine back in 1623. The calculating machine that he invented and built was designed to calculate astronomical tables. The machine that he built could only perform simple tasks such as add and subtract six digit numbers.
  7. Konrad Zuse was not the inventor of the first computer, but he invented the first computer that was fully functional and programmable. Replicas only exist because Zuse’s original computer was destroyed when the allies bombed Berlin in 1943. All photos, and original documents of the machine were also destroyed. Some facts about his computer are that the original one consumed over 4000 watts of electricity, it took .8 seconds to add & 3 seconds to multiply, and it weighed over 2,200 pounds.
  8. The picture to the left is a picture of Konrad Zuse, and the picture to the right is a replica of the Z3, Konrad Zuse’s invented. http://upload.wikimedia.org/wikipedia/commons/4/4c/Z3_Deutsches_Museum.JPG
  9. Early computers were all hand built because there was not enough demand for them. The demand for the computer was not great because they were very expensive. It cost $666.66 ($2,500 adjusted for inflation 2009) for the Apple I that was introduced to the public in 1976. Also, the early computer could only perform simple tasks such as running a spreadsheet program. http://upload.wikimedia.org/wikipedia/commons/2/27/Apple_I.jpg
  10. http://upload.wikimedia.org/wikipedia/commons/d/d8/Macintosh_classic.jpg http://www.abalonbusinessmachines.com/nss-folder/pictures/dell-dimension 4550.jpg
  11. Many of the modern computers that are made today are designed to be lightweight, and be very cheap. Besides the advantages of having a small computer with the low cost and portability, there are many disadvantages when it comes to a small and cheap computer. Firstly with a small computer, since there is less space inside the computer the components become smaller and the electronics tend to become very hot and overheat fast. Also, when computers are becoming cheaper then the parts become more mass produced and then today’s computers are not are durable as they were 5 years ago. As technology evolves, then the computers that are made today are hundreds of times more powerful regarding processor speed. Also when computers were first available they consumed about 20,000 watts of electricity, and today computers can use as little as 30 watts of power http://i.dell.com/resize.aspx/inspiron-1012-right-black-standard-500/149 http://media.laptoplogic.com/data/news/images/2615/dell-new-inspirons.jp g
  12. On April 4, 1975 Bill Gates founded the company Microsoft On April 1, 1975 Steve Jobs and Steve Wozniak founded the Apple Computer computer
  13. Keeping a work environment clean is important because of many reasons. -when dusk gets between metal contacts, it could cause a device to not work properly -always use a antistatic mat and antistatic wrist strap because static electricity can short out electrical components causing them not to work.
  14. Always unplug before servicing anything, because if you don’t, you could receive a potentially deadly shock. Also, some of the electronics that make up a computer retain energy when you unplug a computer, so first unplug the device, and wait a couple minutes. Unplugging a computer could also reduce energy costs, come of the components in a computer can still consume energy even when the computer is off.
  15. It is always important to remove anything that is conductive from your hands and wrists because if you don’t you can get a electrical shock and you can short out electrical components.
  16. Capacitors look like small batteries and they are deceiving because you cannot visibly tell if they are currently storing electricity. Some capacitors can store electricity for a period of time even when they are disconnected from a power source. To discharge a capacitor you should get a screw driver and touch the two leads, and then the capacitor is safe to touch or handle. http://rsk.imageg.net/graphics/product_images/pRS1C-2264681t98.jpg http://rsk.imageg.net/graphics/product_images/pRS1C-2266188t98.jpg http://rsk.imageg.net/graphics/product_images/pRS1C-2264549t98.jpg
  17. Never service parts that are not designed to be serviced because they contain sensitive parts that are not made to be touched. Some parts are not designed to be serviceable because parts are not available for the product, and some items can be serviced, but by only a qualified professional.
  18. http://img.alibaba.com/photo/10969385/Secound_Hand_RAM_Graphic_Card_CD_ROM_CD_RW_Power_Supply.jpg
  19. The CPU is commonly referred to as the brain of the computer because it is the place were most calculations of the computer take place. Also, the CPU is the most important element of a computer heattsink http://www.product-reviews.net/wp-content/userimages/2008/05/budget-45nm-penryn-cpu.jpg http://www.digitalworldtokyo.com/entryimages/2008/01/080130_CPU.jpg
  20. Heat-sinks are very important because heat is one of electronics worst enemy. Because if a device overheats you could potentially destroy the computer. Heat-sinks operate off of the principle that it attaches to a device that is hot and it absorbs and dissipates the heat because it is cooler. The heat-sink then transfers the heat from the fins of the heat-sink to the air through a fan. http://www.dictionary.com http://www.build-your-own -computer.net/image-files/cpu-heatsink-basic.jpg http://www.electropages. com/articleImages/large/14307.jpg http://www.simplyheatsinks.com/simheat/B asics/Principle.aspx
  21. RAM is a volatile type memory which means that it will lose all of its contents once power is lost to the chip, compared to a hard drive which keeps its contents stored even when the power is lost. RAM is a type of computer memory that stores all of your applications and files that are open on the computer. How RAM works is that when you open a application the computer loads the application from the hard drive to the RAM in which it runs from until you close the application. Why is having enough RAM important? RAM is important because the lack of RAM is usually the main bottle neck in computer performance Also, adding RAM to your computer can also be one of the “Cheapest” ways to speed up your computer.
  22. A hard drive is a non-volatile type of storage that magnetically stores data on a platter or disk. The hard drive is also a important part to a computer because it stores all of the user date and information required to run a computer. Hard drives are very fragile because it has a precisely balanced disk and even the slightest bump can knock off its alignment. If the hard drive is damaged in any way you can permanently lose everything on the disk forever. Non-volatile memory is a type of memory that can store information even when it is powered off. http://globaltech-ow.com/Products/Storage%20devices/images/TTB.jpg http://img16.imageshack.us/i/1020064.jpg/
  23. There are many advantages of having a solid state drive than a Hard drive. Solid state drives are 3-5 times faster than a hard drive, They are completely silent, they have a very high reliability because of the lack of moving parts, they use less power (this is key for laptops), and in a SSD there is twice the data density than a hard drive. SOme disadvantages of SSD’s are more expensive than a hard drive (.10 per gigabyte for a hard drive and 2.00 per gigabyte for a SSD), and they will wear out after about 2,000,000 write cycles. http://compreviews.about.com/od/storage/a/SSD.htm http://tathya.net/wp-content/uploads/2010/03/Soli dStateHardDrive.jpg http://laptoping.com/wp-content/transcend_SSD_32 GB.jpg
  24. The motherboard is a computers primary circuit board that holds all of the computer chips and links them together. http://www.newegg.com/Product/ImageGallery.aspx?CurImage=13-130-234-TS&SpinSet=13-130-234-SS&ISList=13-130-234-234&Depa=0&WaterMark=1&Description=MSI%20G31TM-P21%20LGA%20775%20Intel%20G31%20Micro%20ATX%20Intel%20Motherboard
  25. A video is important to a computer because without one you would not be able to display any graphics that the computer is trying to display. Also, video cards come in two different types: separate expansion cards, and video cards that are imbedded into the motherboard. The main difference between the two types of video cards is that the separate cards are better because they are faster than the ones that come with the motherboard. http://students.apsweb.org/~amunguia/hardware/video%20card.jpg http://upload.wikimedia.org/wikipedia/commons/c/c5/Gpu-connect ions.png
  26. http://www.cybercafelatino.com/wp-content/uploads/2010/02/Sound-Card.jpg http://www.wisegeek.com/what-is-a-sound-card.htm http://142.22.38.253/kn owledgeroot/uploads/image/sound_card.jpg Sound c ards can be built into the motherboard, but usual ly they are disabled for a better quality add-on sound card. T he sound cards that are built into the motherboard are for people who are the “average” user, but the add-on card is more for professional sound editing or people that want surpurb sound quality. Sound cards can range in price from $15-$400.
  27. http://en.wikipedia.org/wiki/File:Asus_CD-ROM_drive.jpg http://www.hardwarezone.com/img/data/articles/2005/1558 /optical_Drive.jpg Optical disk drives are important because they are the primarily media to install new programs or files to your computer.
  28. http://www.digitgeek.com/wp-content/uploads/2008/02/antec900.jpg http://img.diytrade.com/cdimg/597243/5046304/0/1199863647/Sell_c omputer_case.jpg
  29. http://www.wisegeek.com/what-is-a-network-interface-card.htm http://www.petervaldivia.com/technology/networks/image/netwo rk-card.jpg http://media.photobucket.com/image/wireless%20network%20ada pter/D4niel_photos/Carpc/F5D7001uk.jpg?o=57
  30. http://www.thedealdepot.ca/images/products/1252350563-00535_samsung-printer.jpg
  31. A computer monitor is also the part of the computer that displays the graphics that are produced from a computer. There are two types of monitors that are widely used today. The two major types of monitors are the CRT monitor, & LCD monitor display monitor. All of these two monitors do the same thing, but in a different way. There are two other types of monitor but they are not widely used today. The first type is a Plasma monitor, and a Projection type monitor. Plasma monitors are not widely used because they are expensive, they are usually only available in sizes on 40 inches of bigger, and they are suspitable to screen burn in. ALso main people do not use projectors and a display monitor because they have a low screen resolution, and have very large screens. Projectors are mainly used for presenting or showing a movie to a large group of people. http://star-techcentral.com/archives/2007/5/29/prodit/Philips_1b.jpg http://www.samsung.com/us/system/consumer/product/2009/08/22/ls24kiz kfvza/2494SW_Front_Medium.jpg h h h
  32. Screen burn in can cause irreversible damage to a computer screen. Screen burn in mostly occurs on Plasma monitors and CRT monitors, but any monitor is suspitable to screen burn in http://upload.wikimedia.org/wikipedia/commons/4/45/Screen_burn_screen_off.png http://en.wikipedia.org/wiki/File:Emerson-McDonalds_CNN_Burn-In.jpg
  33. http://www.wisegeek.com/what-is-a-lcd-monitor.htm
  34. http://www.wisegeek.com/what-is-a-lcd-monitor.htm
  35. http://blog.tmcnet.com/blog/tom-keating/images/cisco-logo.gif http://3.bp.blogspot.com/_DmtdGP6kzMQ/S3lfaBmbjWI/AAAAAAAANZg /u5nd6vwMGbA/s200/logo-CompTIA.jpg Website: http://jsedgwick10.wikispaces.com /