0% found this document useful (0 votes)
21 views38 pages

Presentation12level 2 2017

The document outlines a Level II curriculum for Hardware and Networking Service, focusing on computer hardware components, including internal and external peripherals. It details the functions and characteristics of various hardware elements such as motherboards, CPUs, power supplies, and storage devices, as well as external peripherals like monitors, keyboards, and printers. Additionally, it addresses network security measures and the importance of application security in protecting against cyber threats.

Uploaded by

kebesena9898
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views38 pages

Presentation12level 2 2017

The document outlines a Level II curriculum for Hardware and Networking Service, focusing on computer hardware components, including internal and external peripherals. It details the functions and characteristics of various hardware elements such as motherboards, CPUs, power supplies, and storage devices, as well as external peripherals like monitors, keyboards, and printers. Additionally, it addresses network security measures and the importance of application security in protecting against cyber threats.

Uploaded by

kebesena9898
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Hardware and Networking Service

Level II

Based on March, 2022, Curriculum Version I

Module Title: Caring for Network and Computer Hardware


Module Code: EIS HNS2 M08 0322
Nominal Duration: 30 Hours
• UNIT ONE: IDENTIFY COMPUTER HARDWARE COMPONENTS
Overview of Internal and External Hardware Peripherals
Hardware
Computer hardware refers to the physical parts of a computer and
related devices. Internal hardware devices include motherboards,
hard drives, and RAM. External hardware devices include
monitors, keyboards, mice, printers, and scanners etc.
The internal hardware parts of a computer are often referred to as
components, while external hardware devices are usually called
peripherals. Together, they all fall under the category of computer
hardware. Software, on the other hand, consists of the programs
and applications that run on computers. Because software runs on
computer hardware, software programs often have system
requirements that list the minimum hardware required for the
software to run.
Note: Peripheral devices are the devices that are attached to the
Overview of Internal and External Hardware Peripherals

Internal Hardware Peripherals


Introduction
Computer Hardware is the physical part of a computer, as distinguished
from the computer software that executes or runs on the hardware. The
hardware of a computer is infrequently changed, while software and
data are modified frequently. The term soft refers to readily created,
modified, or erased. These are unlike the physical components within the
computer which are hard.
When you think of the term computer hardware you probably think of
the guts inside your personal computer at home or the one in your
classroom. However, computer hardware does not specifically refer to
personal computers. Instead, it is all types of computer systems.
Computer hardware is in embedded systems in automobiles, microwave
ovens, CD players, DVD players, and many more devices. In 2003, only
0.2% of all microprocessors sold were for personal computers. How many
other things in your house or your classroom use computer hardware?
Inside Computer
Motherboard
• Motherboard is the body or mainframe of the
computer, through which all other components
interface. It is the central circuit board making up
a complex electronic system. A motherboard
provides the electrical connections by which the
other components of the system communicate.
The mother board includes many components
such as: central processing unit (CPU), random
access memory (RAM), firmware, and internal
and external buses.
Motherboard
• Components directly attached to the motherboard include:
• The central processing unit (CPU) performs most of the calculations
which enable a computer to function, and is sometimes referred to as the
"brain" of the computer. It is usually cooled by a heat sink and fan. Newer
CPUs include an on-die Graphics Processing Unit (GPU).
• The chip set mediates communication between the CPU and the other
components of the system, including main memory.
• RAM (random-access memory) stores resident part of the current
running OS (OS core and so on) and all running processes (application
parts, using CPU or input/output (I/O) channels or waiting for CPU or I/O
channels).
• The BIOS includes boot firmware and power management. The Basic
Input Output System tasks are handled by operating system drivers.
Newer motherboards use Unified Extensible Firmware Interface instead
of BIOS.
• Internal buses connect the CPU to various internal components and to
Central Processing Unit
• The Central Processing Unit (CPU; sometimes just called
processor) is a machine that can execute computer programs.
It is sometimes referred to as the brain of the computer.
• There are four steps that nearly all CPUs use in their
operation: fetch, decode, execute, and writeback. The first
step, fetch, involves retrieving an instruction from program
memory. In the decode step, the instruction is broken up into
parts that have significance to other portions of the CPU.
During the execute step various portions of the CPU, such as
the arithmetic logic unit (ALU) and the floating point unit
(FPU) are connected so they can perform the desired
operation. The final step, writeback, simply writes back the
results of the execute step to some form of memory.
Power supply
Power supply
:
•Inside a custom-built computer: the power supply at the bottom has its
own cooling fan.
•A power supply unit (PSU) converts alternating current (AC) electric
power to low-voltage DC power for the internal components of the
computer. Some power supplies have a switch to change between 230
V and 115 V. Other models have automatic sensors that switch input
voltage automatically, or are able to accept any voltage between those
limits. Power supply units used in computers are nearly always
switch mode power supplies (SMPS). The SMPS provides regulated
direct current power at the several voltages required by the
Removable media devices
CD (compact disc)
The most common type of removable media, suitable for music and data.
o CD-ROM Drive - a device used for reading data from a CD.
o CD Writer - a device used for both reading and writing data to
and from a CD.

DVD (digital versatile disc)


A popular type of removable media that is the same dimensions as a CD but
stores up to 12 times as much information. It is the most common way of
transferring digital video, and is popular for data storage.
o DVD-ROM Drive - a device used for reading data from a DVD.
o DVD Writer - a device used for both reading and writing data to
and from a DVD.
o DVD-RAM Drive - a device used for rapid writing and reading
of data from a special type of DVD.
Blu-ray Disc
a high-density optical disc format for data and high-definition video. Can
store 70 times as much information as a CD.
o BD-ROM Drive - a device used for reading data from a Blu-ray
disc.
o BD Writer - a device used for both reading and writing data to
and from a Blu-ray disc.
HD DVD (short for High-Definition/Density DVD)
Is a discontinued high-density optical disc format for storing data and high-
definition video. Supported principally by Toshiba, HD DVD was envisioned
to be the successor to the standard DVD format. However, in February 2008,
after a protracted high definition optical disc format war with rival Blu-ray
Disc, Toshiba abandoned the format, announcing it would no longer develop
or manufacture HD DVD players or drives. However, the HD DVD physical
disk specifications (but not the codecs) are still in use as the basis for the
CBHD (China Blue High-Definition Disc) formerly called CH-DVD. The HD
DVD Promotion Group was dissolved on March 28, 2008.
Removable media devices
•Secondary storage
Hardware that keeps data inside the computer for later use and remains persistent even when the
computer has no power.
A Hard disk drive (HDD also hard drive or hard
disk) is a non-volatile, random access digital magnetic
data storage device. It features rotating rigid platters
on a motor-driven spindle within a protective
enclosure. Data is magnetically read from and written
to the platter by read/write heads that float on a film of
air above the platters. Introduced by IBM in 1956,
hard disk drives have decreased in cost and physical
size over the years while dramatically increasing in
capacity.
Hard disk drives have been the dominant device for
secondary storage of data in general purpose
computers since the early 1960s. They have
maintained this position because advances in their
recording density have kept pace with the
requirements for secondary storage. Today's HDDs
operate on high-speed serial interfaces; i.e., serial
ATA (SATA) or serial attached SCSI (SAS).
•ASecondary storage
solid-state drive (SSD)
sometimes called a solid-state disk or electronic disk,
is a data storage device that uses solid-state memory to
store persistent data with the intention of providing
access in the same manner of a traditional block i/o
hard disk drive. SSDs are distinguished from
traditional magnetic disks such as hard disk drives
(HDDs) or floppy disk, which are electromechanical
devices containing spinning disks and movable
read/write heads. In contrast, SSDs use microchips
which retain data in non-volatile memory chips and
contain no moving parts. Compared to
electromechanical HDDs, SSDs are typically less
susceptible to physical shock, are silent, have lower
access time and latency, but are more expensive per
gigabyte (GB). SSDs use the same interface as hard
disk drives, thus easily replacing them in most
applications.
•Secondary storage

RAID array controller
A device to manage several internal or external hard
disks and optionally some peripherals in order to
achieve performance or reliability improvement in
what is called a RAID array.
Sound card
Enables the computer to output sound to audio
devices, as well as accept input from a microphone.
Most modern computers have sound cards built-in to
the motherboard, though it is common for a user to
install a separate sound card as an upgrade. Most
sound cards, either built-in or added, have surround
sound capabilities.
External hardware peripherals

Examples of External hardware peripheral devices include:


Monitor
A monitor, also known as a visual display unit (VDU) or screen, is like a
television screen. It is measured diagonally in inches — the distance from
one corner of the screen area to the opposite corner. The quality of a
monitor is determined by its resolution. Resolution is calculated based on
the number of pixels, which are individual dots that create the images you
see on your monitor. Flat panel monitors are now becoming a popular
choice due to their portability and compactness.
External hardware peripherals

Keyboard
A combination of a typewriter keyboard and numeric
keypad, a keyboard enables you to enter data into a
computer. Computer keyboards are similar to
electric typewriter keyboards but include additional
keys.
External hardware peripherals

Mouse
A mouse is a device that controls the movement of
the cursor on a screen. A mouse is a small object you
can roll along a flat surface, to help you navigate your
computer. Mice also have a variety of buttons, which
can have different purposes depending on what
program is running. There is usually a left mouse
button (which is used to select an object and perform
an action), right mouse button (which typically
displays a shortcut menu of options) and a scroll
wheel (to help a user scroll through documents).
External hardware peripherals

• Printers
• A printer is a device that allows you to obtain hard
copies of the data you have created on your computer
system. Printers are classified by:
• 1 Their quality
• 2 The speed of printing — pages per minute
• 3 The print/image resolution — measured in dots
per inch (dpi).
• In the case of speed, the faster the better, and in the
case of dpi, the higher the better. There are different
types of printers due to the different methods of
transferring ink to paper. Two common types for the
Hardware Requirement
Inkjet printer — sprays ink onto a sheet of paper, and can
produce high-quality text and photo images.

Laser printer — produces very high-quality text and


graphics, using a process similar to a photocopier to produce
print. It creates dot-like images on a drum, using a laser beam
light source.

Scanner
A scanner is a device that captures text or illustrations on paper and
converts the information into a form the computer can use. One of
the most common kinds of scanners is called a flatbed scanner. It has
a glass surface on which you lay paper, magazines, or other
documents that you want to scan. Sometimes scanners can be
manufactured so that they are combined with a printer thus can also
be used as a photocopier and fax machine.
External hardware peripherals
USB flash drive
A small, portable device that plugs into a computer’s USB port and
operates as a portable hard drive. USB flash drives are considered to
be an ideal method to transport data, as they are small enough to be
carried in a pocket and can plug into any computer with a USB drive.
Other names for flash drives are thumb drives, pen drives or USB
drives.

Web cam
Web cams are small cameras that plug into your computer which allow
the user to share a moving image of themselves with others on other
computers through the Internet.
Digital camera
Digital cameras
 Digital cameras store images digitally onto a storage device,
either a memory card or a floppy disk, rather than recording
them on film. Once a picture has been taken, it can be
downloaded to a computer system, and then manipulated or
printed
1. Determine any requirements as specified by the hardware
manufacturer
•Warranties and support
1. Warranties
• A warranty is an agreed upon term which covers a computer or
computer component. Generally, most computers have a 1- or 3-
year warranty. This warranty may or may not cover the service,
repair and replacement of computer parts.
Determine any requirements as specified by
the hardware manufacturer
2. Service and support
• It is important to know what kind of support services are
offered by the prospective supplier. There are many questions
to consider such as:
• If a device requires repairs does it have to be sent back to the
supplier (called ‘Return to base’) or will they provide on-site
visits?
• What is the average response time if service is required?
3. System specifications
• It is important to find out the specifications of the computer
system you are planning to connect the peripheral device to.
Many newer types of peripheral devices require a specific
amount of memory, CPU speed, hard disk space, and may only
be compatible with certain operating systems
 The advantage of this is that in-line security appliances are
able to stop data packets that have been flagged as potential
threats, whereas out-of-line appliances simply monitor traffic and
send alerts when they detect something malicious.
 Network security software, which includes antivirus
applications, can be installed on devices and nodes across the
network to provide added detection and threat remediation.
 Cloud services refer to offloading the infrastructure to a cloud
provider.
 The set-up is generally similar to how network traffic passes
through in-line hardware appliances, but incoming network traffic is
redirected to the cloud service instead.
 The cloud service does the work of scanning and blocking potential
threats for you before the traffic is allowed onto your network.
Different types of network security devices
and tools
Access control. This refers to controlling which users have access to
the network or especially sensitive sections of the network. Using
security policies, you can restrict network access to only recognized
users and devices or grant limited access to noncompliant devices
or guest users.
• Antivirus and anti-malware software. Malware, malicious
software,” is a common form of cyber-attack that comes in many
different shapes and sizes.
 Some variations work quickly to delete files or corrupt data,
while others can lie dormant for long periods of time and quietly
allow hackers a back door into your systems.
 The best antivirus software will monitor network traffic in
real time for malware, scan activity log files for signs of
suspicious behavior or long-term patterns, and offer threat
Application security
Each device and software product used within your
networking environment offers a potential way in for
hackers. For this reason, it is important that all
programs be kept up-to-date and patched to prevent
cyber attackers from take advantage of weaknesses
to access sensitive data.
Application security refers to the combination of
hardware, software, and best practices you use to
monitor issues and close gaps in your security
coverage
Application security

 Behavioral analytics.
 Data loss prevention
 Distributed denial of service prevention.
Distributed denial of service (DDoS) attacks is
becoming increasingly common.
 Email security
Email is an especially important factor to
consider when implementing networking security
tools.
Firewalls. Firewalls are another common element
of a network security model.
Application security
Mobile device security. The vast majority of us
have mobile devices that carry some form of
personal or sensitive data we would like to keep
protected
 Network segmentation. Dividing and
sorting network traffic based on certain
classifications streamlines the job for security
support personnel
Application security
Security information and event management.
These security systems (called SIEMs) combine
host-based and network-based intrusion detection
systems that combine real-time network traffic
monitoring with historical data log file scanning to
provide administrators with a comprehensive
picture of all activity across the network.
Web security. Web security software serves a few
purposes
The principles of network security
The principles of network security

There are three principles within the idea of network security


• Confidentiality
• integrity
• Availability
which together are sometimes referred to as the “CIA triad.” A network can only be
considered secure when it has all three elements in play simultaneously.
Confidentiality
• It works to keep sensitive data protected and sequestered away from where it can
be accessed by the average user.
Availability
• The principle of availability, which seeks to ensure that data and resources are
kept accessible for those who are authorized to access them.
• Challenges to availability can include DDoS attacks or equipment failure
Integrity.
• The principle of integrity seeks to protect information from intentional or
accidental changes in order to keep the data reliable, accurate, and trustworthy.
Every decision made regarding network security should be working to further at least
one of these principles..
• Why are these network security concepts so important?
• Cyber-attacks are on the increase, with a recent report
from Positive Technologies showing that government
and healthcare organizations are becoming prime
targets for hackers. The report also shows the goal of
more than half of cybercrimes is data theft, and that
financial gain was the motivation behind 42% of cyber-
attacks against individuals—and behind 30% of cyber-
attacks against organizations.
• As our world becomes increasingly digitized, we rely
more and more on the internet and networks to
function. This in turn requires that the internet and
networks provide us with reliable and secure service.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy