bbrother_bbrothe
新手上路
- 注册
- 2004-03-10
- 消息
- 1,724
- 荣誉分数
- 8
- 声望点数
- 0
1. Hardware
Difference between Ram and Rom
RAM ? non permanent, ROM ? permanent
RAM ? memory for programs, ROM ? Boot information
RAM ? Read/Write, ROM ? Read Only
Three Parts of CPU
?Central Processing Unit (CPU) has three basic parts
•Arithmetic Logic Unit (ALU)
?executes all the arithmetic and logic instructions
•Control Unit
?decodes instructions and determines which is next to be executed
•Buses/Registers
?Buses are paths for information entering/exiting the CPU
?Registers are memory for processing information
Formatting (tracks are not recorded)
•checks for bad sectors
•records boot program in boot record
•initializes directory
•sets aside space for FATs
Input and Output Devices
vInput Devices (Get information)
?Keyboard, Mouse, Scanner
vOutput Devices (Give information)
?Screen, Printer, Speaker
2. Software
Four generations of programming languages
?1st generation
•machine language (0’s,1’s)
?2nd generation
•assembly languages (low-level symbolic languages)
•instructions coded using letters & numbers
?3rd generation
•high-level symbolic languages
?4th generation programming languages
•non-procedural languages
Differences between data and files
?Data Files
•created by the user of the computer
?My_Thesis.doc, Assign1.xls
?Program Files
•created by a programmer
?Word, Excel, Windows98
3. Operating System
Functions of Operating System
vOperating Systems
Organize files
Load/Run Programs
Communicate with Peripherals
Why windows is better than MS-DOS (Four reasons)
?Graphical user interface (GUI)
?Multitasking
?Uniformity among applications
?Object linking and embedding
4. Networking
How does information go from here to there (3hardware and software components that make up a local are network)
Cable (medium)
Network Card
Workstations
Servers
Network Operating systems
Network Protocols
What are the first 3 parts of a URL, and what is its function within the URL? (6 marks)
Part Function
Communications type (http://) Type of information to be read
Computer (www.uottawa.ca) Where on the internet it is
File Location, name, type (index.html) The exact file on the computer
TCP/IP (Transmission Control Protocol/Internet Protocol)
File transfer protocol (FTP)
Modem : Converts digital signals into analogue form
Network interface card: It specifies the data transmission rate, the size of message units, the addressing information for each message, and the network topology.
LAN (local area network)
Workstations, Servers, Lines, Network interface card, Token.
Functions of serve
?file server stores shared programs and data files on a large hard disk
?print server controls a shared printer
?communication server controls access to other networks
5. Office
Name two (2) things that can be done to a Word document, to change its overall page count without changing the content. (3 marks)
Change Font Change L/R Margins Change line spacing
Change paragraph spacing Change T/B Margins Change Font Size
In Excel, what does the following formula mean?
=SUM(shop1!a2,shop2!b3)
Add the values A2 from worksheet Shop1 to B3 from worksheet Shop 2
ROUND(number, num_digits)
?round the given number, to the desired number of digits
•=ROUND(3.14159, 1) = 3.1
•=ROUND(3.14159, 3) = 3.142
•=ROUND(3.14159, 0)= 3
•
Differences between PASTE/LINK/EMBED
When Excel worksheet becomes a Word table or Word text becomes text in an Excel worksheet cell, how do we paste information?
Embedding (埋入)
Choose Paste Special from the Edit menu
?select the Paste option button
?select the type of object from the list
Result: The destination program cannot edit the information
Advantage The functionality of the source program is retained
Only can change the information embed, not the source informaiton
Linking
Choose Paste Special from the Edit menu
?select the Paste Link option button
?select the type of object from the list
Advantage: When information is changed in the source, it is automatically updated in the destination since there is only one real version of the object
If u want to change, the source documents will be opened, changing the source information and linked information at the same time.
vPaste, Embed or Link?
?paste objects that you will never want to change
?embed objects that you will want to edit later
?link objects if you want several programs to share the same version of an object
Algorithm and Visual Basic
What is one difference between the data type "double" and "long" (2 marks)
Double Real Number, Long is Integer, Number of bytes stored (Double 8, Long 4), Ranges (Double 10^300, Long 2 trillion)
What are the 6 basic tasks a computer can do, which would be the basis for writing an algorithm or computer program? (6 marks)
Input/Get Information
Output/Give Information
Storage
Math
Logic
Repetition
Data Types
vSINGLE (4 bytes)
?Real numbers
•± 10^30 with 7 significant digits of accuracy
vDOUBLE (8 bytes)
?Real numbers
•± 10^300 with 15 significant digits of accuracy
vCURRENCY (8 bytes)
?Real numbers
•4 digits to the right of the decimal point
•15 digits to the left of the decimal point
vDATE (8 bytes)
?Storage of specific dates
•Jan 01, 100 to Dec 31, 9999
•vSTRING (1 byte per character)
?Up to 2 billion characters per string
•Use the * symbol to denote size
•Some numbers should be defined as strings
?Student number, SIN, telephone number
Security
vDefinitions : Viruses and Trojans
VIRUS is an autonomous program that modifies the normal operation of a computer system (normal is what it was before the insertion of the virus).
è To be effective, a virus should : 1 ? Propagate itself
2 ? Replicate itself before it reveals its presence
by its destructive effects
3 ? Be able to affect the normal operation of the
computer systemF A TROJAN virus is one that is hidden inside another program
Protection:
vThree Types of Detection :
1 - Scanning a file for known viral code
2 - Comparing the mathematical characteristics of a file with a previous, clean version (a simple comparison criteria is the length of the file in bytes)
3 - Heuristic scanning of a file which involves intelligent analysis of the code (looking for suspicious instructions such as those which modify disk partitions or the file allocation table)
SPYWARE
Through a network connection : there are currently 2 types of spyware : Passive and Active Spyware
- Passive Spyware "listens" to what the spied user does
- Active Spyware is designed to gain control of the victimized computer
Thanks to supports from Pauline,小贵儿,琳琳。
Difference between Ram and Rom
RAM ? non permanent, ROM ? permanent
RAM ? memory for programs, ROM ? Boot information
RAM ? Read/Write, ROM ? Read Only
Three Parts of CPU
?Central Processing Unit (CPU) has three basic parts
•Arithmetic Logic Unit (ALU)
?executes all the arithmetic and logic instructions
•Control Unit
?decodes instructions and determines which is next to be executed
•Buses/Registers
?Buses are paths for information entering/exiting the CPU
?Registers are memory for processing information
Formatting (tracks are not recorded)
•checks for bad sectors
•records boot program in boot record
•initializes directory
•sets aside space for FATs
Input and Output Devices
vInput Devices (Get information)
?Keyboard, Mouse, Scanner
vOutput Devices (Give information)
?Screen, Printer, Speaker
2. Software
Four generations of programming languages
?1st generation
•machine language (0’s,1’s)
?2nd generation
•assembly languages (low-level symbolic languages)
•instructions coded using letters & numbers
?3rd generation
•high-level symbolic languages
?4th generation programming languages
•non-procedural languages
Differences between data and files
?Data Files
•created by the user of the computer
?My_Thesis.doc, Assign1.xls
?Program Files
•created by a programmer
?Word, Excel, Windows98
3. Operating System
Functions of Operating System
vOperating Systems
Organize files
Load/Run Programs
Communicate with Peripherals
Why windows is better than MS-DOS (Four reasons)
?Graphical user interface (GUI)
?Multitasking
?Uniformity among applications
?Object linking and embedding
4. Networking
How does information go from here to there (3hardware and software components that make up a local are network)
Cable (medium)
Network Card
Workstations
Servers
Network Operating systems
Network Protocols
What are the first 3 parts of a URL, and what is its function within the URL? (6 marks)
Part Function
Communications type (http://) Type of information to be read
Computer (www.uottawa.ca) Where on the internet it is
File Location, name, type (index.html) The exact file on the computer
TCP/IP (Transmission Control Protocol/Internet Protocol)
File transfer protocol (FTP)
Modem : Converts digital signals into analogue form
Network interface card: It specifies the data transmission rate, the size of message units, the addressing information for each message, and the network topology.
LAN (local area network)
Workstations, Servers, Lines, Network interface card, Token.
Functions of serve
?file server stores shared programs and data files on a large hard disk
?print server controls a shared printer
?communication server controls access to other networks
5. Office
Name two (2) things that can be done to a Word document, to change its overall page count without changing the content. (3 marks)
Change Font Change L/R Margins Change line spacing
Change paragraph spacing Change T/B Margins Change Font Size
In Excel, what does the following formula mean?
=SUM(shop1!a2,shop2!b3)
Add the values A2 from worksheet Shop1 to B3 from worksheet Shop 2
ROUND(number, num_digits)
?round the given number, to the desired number of digits
•=ROUND(3.14159, 1) = 3.1
•=ROUND(3.14159, 3) = 3.142
•=ROUND(3.14159, 0)= 3
•
Differences between PASTE/LINK/EMBED
When Excel worksheet becomes a Word table or Word text becomes text in an Excel worksheet cell, how do we paste information?
Embedding (埋入)
Choose Paste Special from the Edit menu
?select the Paste option button
?select the type of object from the list
Result: The destination program cannot edit the information
Advantage The functionality of the source program is retained
Only can change the information embed, not the source informaiton
Linking
Choose Paste Special from the Edit menu
?select the Paste Link option button
?select the type of object from the list
Advantage: When information is changed in the source, it is automatically updated in the destination since there is only one real version of the object
If u want to change, the source documents will be opened, changing the source information and linked information at the same time.
vPaste, Embed or Link?
?paste objects that you will never want to change
?embed objects that you will want to edit later
?link objects if you want several programs to share the same version of an object
Algorithm and Visual Basic
What is one difference between the data type "double" and "long" (2 marks)
Double Real Number, Long is Integer, Number of bytes stored (Double 8, Long 4), Ranges (Double 10^300, Long 2 trillion)
What are the 6 basic tasks a computer can do, which would be the basis for writing an algorithm or computer program? (6 marks)
Input/Get Information
Output/Give Information
Storage
Math
Logic
Repetition
Data Types
vSINGLE (4 bytes)
?Real numbers
•± 10^30 with 7 significant digits of accuracy
vDOUBLE (8 bytes)
?Real numbers
•± 10^300 with 15 significant digits of accuracy
vCURRENCY (8 bytes)
?Real numbers
•4 digits to the right of the decimal point
•15 digits to the left of the decimal point
vDATE (8 bytes)
?Storage of specific dates
•Jan 01, 100 to Dec 31, 9999
•vSTRING (1 byte per character)
?Up to 2 billion characters per string
•Use the * symbol to denote size
•Some numbers should be defined as strings
?Student number, SIN, telephone number
Security
vDefinitions : Viruses and Trojans
VIRUS is an autonomous program that modifies the normal operation of a computer system (normal is what it was before the insertion of the virus).
è To be effective, a virus should : 1 ? Propagate itself
2 ? Replicate itself before it reveals its presence
by its destructive effects
3 ? Be able to affect the normal operation of the
computer systemF A TROJAN virus is one that is hidden inside another program
Protection:
vThree Types of Detection :
1 - Scanning a file for known viral code
2 - Comparing the mathematical characteristics of a file with a previous, clean version (a simple comparison criteria is the length of the file in bytes)
3 - Heuristic scanning of a file which involves intelligent analysis of the code (looking for suspicious instructions such as those which modify disk partitions or the file allocation table)
SPYWARE
Through a network connection : there are currently 2 types of spyware : Passive and Active Spyware
- Passive Spyware "listens" to what the spied user does
- Active Spyware is designed to gain control of the victimized computer
Thanks to supports from Pauline,小贵儿,琳琳。