0% found this document useful (0 votes)
33 views15 pages

Computer Parts Function and Importance 1

Computer parts and functions

Uploaded by

cyrelljanenasis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views15 pages

Computer Parts Function and Importance 1

Computer parts and functions

Uploaded by

cyrelljanenasis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

COMPUTER PARTS FUNCTION IMPORTANCE

CENTRAL PROCESSIN is the brain of a The processor, also known


UNIT ( CPU) computer, containing all as the CPU, provides the
the circuitry needed instructions and processing
to process input, store power the computer needs
data, and output results. to do its work.

KINDS OF CPU

SINGLE-CORE CPU It is the oldest CPU type Single core


available and employed in processors draw less
most personal and official power than larger, multi-
computers. A core processors. Single
microprocessor with a core processors can be
single core on its die. made a lot more cheaply
It performs the fetch- than multi core systems,
decode-execute cycle once meaning they can be used
per clock-cycle, as it only in embedded systems.
runs on one thread. A
computer using a single
core CPU is generally
slower than a multi-core
system.

DUAL-CORE CPU It is a single CPU that The cores work


comprises two strong cores simultaneously to achieve
and functions like a dual a much faster operating
CPU acting like one. This speed than a single-core
type of processor can processor. The cores can
function as efficiently as a handle the tasks
single processor but can simultaneously because
perform operations up to each core has its own
twice as quickly. cache memory and
controller.

QUAD-CORE CPU is a chip with four In general, quad-core


independent units called processors offer better
cores that read and execute performance and
central processing unit multitasking
(CPU) instructions, such capabilities because they
as add, move data and have twice as many
branch. Inside the chip, processing units as dual-
each core operates in core processors. More
conjunction with other cores means they can
circuits, such as cache, handle more tasks
memory management and simultaneously and
input/output ports. execute instructions faster.
HEXA-CORE is a type of central With a hexa-core
PROCESSORS processing unit (CPU) processor, you'll
with six independent experience smoother
processing units, also gameplay and reduced lag
known as cores, working in graphically demanding
together to handle tasks. It games. The extra cores
offers improved enable better parallel
multitasking and processing, which can
performance compared to handle complex game
dual or quad-core CPUs. physics and artificial
intelligence (AI) tasks
more effectively.
OCTA-CORE
PROCESSORS Octa Core processors are Octa-core processors
generally faster and more are designed for users who
powerful than Dual Core demand power and
processors due to their performance. These
larger number of processors feature eight
processing cores. They are processor cores, making
better suited for them ideal for gaming
demanding applications laptops, high-end
that require high smartphones, workstations,
performance, such and intensive computing
as gaming, video editing, tasks.
and 3D rendering.
DECA-CORE The processor with a dual-
PROCESSORS . A PC or device equipped
core comprises two cores, with a deca-core processor
4 cores are available with is the best option. It is
quad cores; six cores are faster than other
available in hexacore processors and very
processors. The processor successful in multitasking.
with a dual-core comprises
two cores, 4 cores are
available with quad cores;
six cores are available in
hexacore processors.
These processors provide
better performance and
multitasking capabilities
compared to processors
with fewer cores.
MOTHERBOARD It distributes electricity one of the most essential
and facilitates parts of a computer
communication between system. It holds together
and to the central many of the crucial
processing unit (CPU), components of a computer,
random access memory including the central
(RAM), and any other processing unit (CPU),
component of the memory and connectors
computer's hardware. for input and output
devices.
KINDS OF
MOTHERBOARD

ADVANCE It was designed to improve They are widely used in


TECHNOLOGY on the previous AT small to mid-sized server
eXTENDED (ATX) standard by offering better deployments, providing
modularity, accessibility, reliability and flexibility
and ease of use. for various computing and
networking needs.

ADVANCED This board is one of the DI KO PINAKA


oldest types of IMPORTANCE
TECHNOLOGY (AT)
motherboards that consists FUNCTION LAN NA
MOTHERBOARD
of advanced technology KITA KO
(AT) power connectors.
AT motherboards have
bigger physical
dimensions ranging for
hundreds of millimeters.
Due to the size constraint,
they are not the right fit for
mini desktops. Due to the
size issue, new drivers
cannot be installed in such
motherboards.
Six pin plugs and sockets
are used as power
connectors in this type of
motherboard; since power
connectors are not easily
identifiable, users face
difficulties in connecting
and using such
motherboards.

BALANCE This was designed with the Balance technology


TECHNOLOGY purpose of decreasing heat extended was designed to
EXTENDED (BTX) and, eventually, power reduce the problems of the
requirements. circa-1996 ATX standards
by decreasing power
consumption and heat.

The reason behind its use ITX motherboards offer


MINI ITX is its faster cooling ability several advantages.
MOTHERBOARD and low power Firstly, they are compact
consumption. It is one of and take up less space,
the most preferred types of making them ideal for
motherboard that is building small and
preferred in home theater portable systems.
due to its low level of fan Secondly, they consume
noise less power compared to
larger motherboards,
which can be beneficial for
energy efficiency and
reducing heat output.

LOW PROFILE The LPX motherboard The LPX format is a


eXTENSION (LPX) shape elements are specialised variant of the
designed to be used in Baby-AT used in low
small slim line or low profile desktop
profile cases commonly systems and is a loose
located on these types of specification with a variety
desktop systems. The of proprietary
number one design implementations.
purpose at the back of the Expansion slots are located
LPX shape issue on a central riser card,
is decreasing space allowing cards to be
usage (and cost). mounted horizontally.
RANDOM ACCESS is a temporary memory It provides high-speed,
MEMORY (RAM) bank where your computer short-term memory for
stores data it needs to your computer's CPU.
retrieve quickly. RAM
keeps data easily
accessible so your
processor can quickly find
it without having to go into
long-term storage to
complete immediate
processing tasks.

KINDS OF RANDOM
ACCESS MEMORY
(RAM)

DYNAMIC RAM DRAM requires a it allows your computer to


(DRAM) periodic ‘refresh’ of run efficiently by
power in order to providing quick access to
function. The capacitors essential data that your
that store data in DRAM processor needs to operate
gradually discharge at peak performance.
energy; no energy means
the data becomes lost.
This is why DRAM is
called ‘dynamic’ —
constant change or action
(e.g. refreshing) is needed
to keep data intact.
DRAM is also a volatile
memory, which means
that all the stored data
becomes lost once the
power is cut off.

STATIC RAM (SRAM) requires a constant power to provide a direct


flow in order to function. interface with the CPU at
Because of the continuous speeds not attainable by
power, SRAM doesn’t DRAMs and to replace
need to be ‘refreshed’ to DRAMs in systems that
remember the data being require very low power
stored. This is why SRAM consumption.
is called ‘static’ – no
change or action (e.g.
refreshing) is needed to
keep data intact.

RAMBUS RAM is a memory subsystem


(RDRAM) designed to transfer data at
faster rates. RDAM is
made up of a random
access memory (RAM), a
RAM controller and a bus
path that connect RAM to
microprocessors and other
PC devices

GRAPHICS RAM The graphics processing GPUs can process many


(GPUs) unit (GPU) in your pieces of data
device helps handle simultaneously, making
graphics-related work like them useful for machine
graphics, effects, and learning, video editing,
videos.. and gaming applications.
GPUs may be integrated
into the computer's CPU or
offered as a discrete
hardware unit.

VIDEO GRAPHICS is a standard connector It does this by acting as a


ARRAY PORT used for computer video link between the computer
output. and the monitor or
between the computer and
the television screen.

KINDS OF VIDEO
GRAPHICS ARRAY
PORT

SUPER VIDEO is computer display It has high memory


GRAPHICS ARRAY standard that providers a utilization, high resolution,
(SVGA) higher resolution than the and more colors at a time.
standard 640 x 480 video
graphics array (VGA). It
can display more pixels
and colors than the basic
VGA.

EXTENDED is a computer display is a display resolution


GRAPHICS ARRAY standard that provides standard, developed by
(XGA) high-resolution video IBM in 1990 as part of
display mode. their PS/2 computer line.
POWER SUPPLY A power supply provides the backbone of any PC.
electricity to all These devices pull power
components of a computer from your wall outlet and
system. Typically, it's a distribute it throughout
power cord connected your PC. Without the right
from the back of a PC amount of power, your
tower into an electricity machine will not function
socket. A technician may how you need it to and it
troubleshoot the power may not even turn on.
supply by turning off the
computer, unplugging and
detaching the power
supply cord or trying a
new cord or outlet.

KINDS OF POWER
SUPPLY

DC POWER SUPPLIES is a device that creates and


supplies a stable Direct
Current (DC) from the AC
power supply of the outlet.

devices that convert


electrical energy to
LINEAR POWER
provide a stable direct
SUPPLIES
current (DC) output.

also called switching-


switched-mode power mode power supply,
supply (SMPS) switch-mode power
supply, switched power
supply, or simply switcher,
is an electronic power
supply that incorporates a
switching regulator to
convert electrical power
efficiently.

a type of device that


powers equipment, nearly
UNINTERRUPTIBLLE instantaneously, in the
POWER SUPPLY event of grid power
failure, protecting the
equipment from damage.

These power supplies are


designed to minimise
ITX POWER SUPPLY space, allowing you to
build small, portable PCs
or HTPC kits.

is a device that converts


alternating current (AC)
from a wall outlet into
A C ADAPTER direct current (DC) that
can be used by electronic
devices such as computers,
laptops, and smartphones.

it is the smallest available


computer power supply on
the market. Its dimensions
TFX POWER SUPPLY
are usually 175x85x65
mm. Akyga offers it in two
versions: 250 W and 300
W.
COOLING FAN are a computer's system to The fan helps to keep the
decrease overheating. The temperature of the
fan works by blowing air components within a safe
over the hot components range, ensuring the
of the computer, such as longevity of your
the central processing unit computer.
(CPU), graphics
processing unit (GPU),
and other internal
components, to dissipate
the heat.
HARD DRIVE is the hardware component are needed to install
that stores all of your operating systems,
digital content. Your programs and additional
documents, pictures, storage devices, and to
music, videos, programs, save documents. Without
application preferences, devices like HDDs that
and operating system can retain data after they
represent digital content have been turned off,
stored on a hard drive. computer users would not
Hard drives can be be able to store programs
external or internal. or save files or documents
to their computers.

KINDS OF HARD
DRIVE

 Parallel Advanced is an interface standard


used to connect secondary
Technology Attachment
storage devices like floppy
(PATA) drives, hard disks, optic
disc drives to older
computers.

is a command and
Serial Advanced

transport protocol that
Technology Attachment defines how data is
(SATA) transferred between a
computer's motherboard
and mass storage devices,
such as hard disk drives
(HDDs), optical drives and
solid-state drives (SSDs).

 Small Computer System is a set of standards for


Interface (SCSI) physically connecting and
transferring data between
computers and peripheral
devices, best known for its
use with storage devices
such as hard disk drives.
NON-VOLATILE
is a protocol designed to
MEMORY EXPRES
use the PCI Express
(NVMe)
(PCIe) bus to connect SSD
(solid-state drive) storage
to servers or CPUs.
MONITOR A computer monitor is an to display images, text,
electronic device that video, and graphics
displays what's what information generated by
programs are running on the computer via a compu
your computer so a user ter's video card.
can see.
KINDS OF MONITOR

LIQUID CRYSTAL is the most widely used


LIQUID (LCD) monitor in the world.

Light Emitting Diode is among the newest techs


(LED) out there and can be flat or
curved.
it uses organic materials
Organic Light Emitting like carbon, plastic, wood,
Diode (OLED) and polymers to transform
electric current into light.
It is thinner than an LCD
unit and is especially good
for watching movies.

Are older, significantly


Cathode Ray Tub (CRT heavier, and take up more
MONITOR) space than LCD and LED
monitors. This is an
outdated technology as
well, which results in
higher energy
Plasma monitor consumption.
A Plasma monitor panel
uses minuscule coloured
fluorescent lights that
produce image
pixels. Each pixel is
composed of three red,
green, and blue fluorescent
lights, which resemble
small neon lights. along
with the intensity of these
lights. A plasma display is
thinner because it is flat
rather than slightly curved,
like an LCD.
SPEAKER are standard output devices a re used to pr od u They
used with computer ce s ound to hear by the
systems that enable the listener, create surround
listener to listen to a sound sound, add more bass with
as an outcome. a subwoofer. External
speakers are also available
in the market that needs to
attach to the computer or
another device to produce
the sound.
KINDS OF SPEAKER
MULTIMEDIA Otherwise also known as
SPEAKERS computer speakers or 2.0
speakers… A common Joe
that you will find
everywhere.

SOUND BAR A slim profile speaker that


sits under the monitor.

This is the mini speaker


INTERNAL SPEAKERS that is built into your
laptop, tablet, or
smartphone.

BUZZER I just had to add this easter


egg of speakers to the
basket. You will find this
mostly on desktop
computers only.
MOUSE They are used to move the is integral to graphical user
cursor on the screen, select int Common erfaces.
objects and click on
buttons

KIND OF MOUSE

Wired Mouse With a wired mouse, you


can legitimately connect it
to a PC or workstation via
a USB port, and control it
using a cable.
Wireless Mouse A wireless mouse is the
best option for anyone
wanting a cable-free
solution for their
workstation. This mouse
can transmit signals to
your PC or laptop via a
dongle attached to your
device.

Bluetooth Mouse Bluetooth mouse devices


can even be connected to
multiple devices
and gaming furniture at a
time.
Trackball Mouse trackball mouse looks like
and even works like a
regular mouse. The
difference is that it has a
ball with sensors mounted
onto it. This ball acts like a
cursor control pad and it
lets you move the cursor
around the screen using
your thumb over the ball.

Optical mice take pictures


Optical Mouse continuously as they
move, capturing hundreds
of images a second. In
traditional mice, the user’s
movements are tracked.

A laser mouse and optical


mouse have a great deal in
Laser Mouse common in terms of
configuration, but they
differ in one crucial way.
This type of mouse does
not appear to have any
light whatsoever, unlike
optical mice, which use
LED or infrared light.

The Magic Mouse is used


Magic Mouse for Apple PCs and works
like any other mouse. In
addition to multi-touch,
Apple has also made
mouse gesture technology
that you use by moving
your hand over the
mouse’s surface to swipe
and look.
PRINTER is a device that accepts text uses of printers in
and graphic output from a computers include printing
computer and transfers the documents, such as reports
information to paper and essays, producing
high-quality photographs,
creating marketing
materials like brochures
and flyers, generating
labels and stickers, and
printing out important
forms or contracts.

KINDS OF PRINTER
Inkjet printers One of the most common
printing units found across
Australian homes is the
inkjet printer. Despite
being first developed in
the 1950s, inkjet printers
today are still hugely
popular and widely
available.

Laser printers laser printers are best


suited for organisations
that need to print large
volumes of documents
through multiple
connections.

Solid Ink Printers solid ink is basically wax.


When loaded into a solid
ink printing unit, the solid
ink sticks are heated until
melting and then the ink is
transferred onto paper to
produce your desired
results.

Continuous Ink Printers continuous ink printers


still make use of ink and
toner, however, rather than
replacing your cartridges,
the ink is refillable instead.

LED printers are


LED Printers extremely reliable and can
handle large printing runs
without a hitch. Rather
than ink or toner
cartridges, LED printers
uses light-emitting
technology to print your
files.

Dot Matrix Printers dot matrix printers are


almost a thing of the past.
However, if you can
manage to get your hands
on one, dot matrix printers
are extremely beneficial
when looking to keep your
costs down to an absolute
bare minimum.

A3 printers are perfect for


A3 Printers printing, well, A3
documents. While almost
all A3 printers will also
accommodate standard A4
printing, a specialised A3
printer ensures that you do
not lose out on the ability
to print larger documents.

Computer viruses come in various types, each with its own characteristics and impact
on computer performance and security.

1. File Infectors:
- File infectors attach themselves to executable files (e.g., .exe or .dll files) and
replicate by infecting other executable files on the system. They can corrupt or modify
files, leading to system instability, crashes, and data loss.

2. Boot Sector Viruses:


- Boot sector viruses infect the master boot record (MBR) or boot sector of a storage
device, such as a hard drive or USB flash drive. They execute when the infected
device is booted, allowing them to spread to other devices connected to the system.
Boot sector viruses can prevent the system from booting properly, resulting in startup
failures and data loss.

3. Macro Viruses:
- Macro viruses infect documents and spreadsheets that contain macros, such as
those created in Microsoft Word or Excel. They exploit the macro programming
language to execute malicious code when the infected document is opened. Macro
viruses can damage or modify documents, compromise sensitive information, and
spread to other documents through email attachments or shared files.

4. Polymorphic Viruses:
- Polymorphic viruses use encryption and mutation techniques to change their
appearance each time they infect a new file or system. This makes them difficult to
detect by antivirus software, as their signatures change with each infection.
Polymorphic viruses can evade detection and spread rapidly, causing widespread
damage to systems and networks.
5. Worms:
- Worms are standalone programs that replicate themselves and spread across
networks without requiring user intervention. They exploit vulnerabilities in operating
systems or network protocols to infect systems and propagate to other devices.
Worms can consume network bandwidth, overload servers, and create backdoors for
remote attackers to exploit.

6. Trojan Horses:
- Trojan horses masquerade as legitimate software or files to trick users into
executing them. Once activated, they perform malicious actions, such as stealing
sensitive information, installing backdoors, or downloading additional malware.
Trojan horses can compromise system security and privacy, leading to data breaches
and financial loss.

7. Ransomware:
- Ransomware encrypts files on the infected system and demands a ransom payment
in exchange for decryption keys. It can encrypt critical files, rendering them
inaccessible, and display ransom notes demanding payment to restore access.
Ransomware can cause significant data loss, financial damage, and disruption to
business operations.

Overall, computer viruses can have severe consequences for computer performance
and security, ranging from data corruption and loss to system crashes and
unauthorized access. Protecting against viruses requires proactive measures, such as
using antivirus software, keeping software updated, practicing safe computing habits,
and regularly backing up important data.

To prevent virus infections and protect your computer from malware, including
viruses, you can implement several proactive measures and best practices.

1. Install Antivirus Software:


- Use reputable antivirus software and keep it updated with the latest virus
definitions and security patches. Antivirus software can detect and remove viruses, as
well as provide real-time protection against malware threats.

2. Keep Software Updated:


- Regularly update your operating system, web browsers, applications, and plugins
to patch security vulnerabilities. Enable automatic updates whenever possible to
ensure timely protection against emerging threats.

3. Exercise Caution with Email Attachments:


- Be cautious when opening email attachments, especially from unknown or
suspicious senders. Avoid downloading attachments or clicking on links in unsolicited
emails, as they may contain malware, including viruses.

4. Be Wary of Downloads:
- Download software, files, and media content only from reputable and trusted
sources. Avoid downloading pirated software, cracked applications, or files from
peer-to-peer networks, as they may contain viruses or other malicious software.
5. Enable Firewall Protection:
- Enable the built-in firewall on your computer or use a third-party firewall solution
to monitor and control incoming and outgoing network traffic. Firewalls can help
block unauthorized access and prevent malware from communicating with remote
servers.

6. Use Strong Passwords:


- Use strong, unique passwords for your accounts and change them regularly. Avoid
using easily guessable passwords and consider using a password manager to securely
store and manage your passwords.

7. Practice Safe Browsing Habits:


- Exercise caution when browsing the internet and visiting websites. Avoid clicking
on suspicious ads, pop-ups, or links, and be wary of visiting unfamiliar or unsecured
websites that may host malicious content.

8. Secure Your Network:


- Secure your home or office network with strong encryption (e.g., WPA2) and
change the default administrator passwords for routers and other network devices.
Limit access to your network and consider using a virtual private network (VPN) for
added privacy and security.

9. Backup Your Data Regularly:


- Regularly back up your important files and data to an external storage device or
cloud service. In the event of a virus infection or data loss, you can restore your files
from backup copies without risking permanent data loss.

By following these prevention methods and best practices, you can significantly
reduce the risk of virus infections and protect your computer from malware threats.
Remember to stay vigilant, keep your software updated, and adopt a proactive
approach to cybersecurity.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy