Chapter Orientation:

1. Identify the basic components of computer system
2. Turn system on/off
3. Identify the major components of the window desktop
4. Use the mouse and keyboard
5. Start and exit a software program
6. Use the menu bar, toolbar, and sizing buttons
7. Crate, save, and print documents using word
8. Describe the difference between the internet and the web
9. Use a browser
10. Use a search engine to find information.
11. Create, read, and reply to e-mail.

Desktop Computer Components
1. Storage Devices- Floppy Disk, CD drive, DVD drive, USB chip(flash drive)
2. Monitor
3. Printer
4. Speakers
5. Keyboard
6. Mouse
7. System Unit (CPU and RAM)

Chapter 1 Objectives:

1. Explain why most computers are digital 0 - 1
2. Describe the role of a microporcessors ALU, control unit, registers, and instruction set.
3. List the factors that affect microprocessor performance.
4. List facts about RAM that are important to computer buyers and owners.
5. Difference between magnetic, optical and solid state storage.
6. User criteria such as versatility, durability, capacity, access time, and data transfer rates to compare Floppy, hard, tapes, cd, dvd and usb flash drives
7. CRT, LCD or Plasma
8. Printers, ink jet, solid ink, thermal, dye sublimation, laser, dot matrix
9. Describe a computers expansion bus, expansion slots PCI  ISA
10. hardware compatibility considerations, device drivers and procedures involved in installing peripheral device.
 11.. Super computers, main frames, mini computers, PCs', file server, web server.
12. Operating systems - windows, Mac OS, Unix, Cisco, Linux
13. Applications - word, excel, access, power point, graphics, etc.
14. ASCII 8 bits = byte, byte=A-Z,a-z,0-9, American puncation.-255
15. Unicode 16 bits=byte, byte=all known written languages on the planet-65,536
16. Email -
17,  Synchronous communication - both parties online - chat rooms, web conferencing, Skype
18. Asynchronous communication - post messages - email, Facebook, blogs, twitter
19. World wide web - documents, graphics, and sound access over the internet.
20. Convergence - smart phone -pda, camera, phone, internet access
21. Globalization - internet allows commerce to flow between countries. everyone dependent upon everyone else.
22. Microcontrollers - cpu with a specific purpose built into a machine.
23.Passwords - how to secure.  What is good password.  Fake websites, phishing, hacker, keylogger
24.Password manager
25. NSA tracking technology Patriot act.
26. Internet Marketing - Business to Business, Business to government, Consumer to Consumer, Consumer to Business,  Banking now done online.  Electronic deposits, auto pay.

Chapter 2
1. Peripheral devices-input, output, storage devices.
2. System unit-case that hold computer
3. Keyboard - primary input device
4.Mouse -input device.
5. Hard Disk - storage device
6.Opticaldrive - storage device with CD, DVD, Blueray
7. Sound system- mono to stereo using sound board
8. Display system- graphic cards, monitors, LCD, LED
9. Network and internet:   Ethernet 802.11 CSMACD, HTTP:
10. Printer-inkjet, laser -output device.
11. Form factor - size and dimensions of a component.
12. Desktop - set on a desk and use power from wall socket. 200 to 1500 dollars.
13. Portable -  all in one battery or power outlet.
14. Notebook aka laptop small open like clam shell.  Battery or power outlet.
15. Tablet - touch screen used a writing or drawing pad.
16. Netbook -much small then laptop. No dvd or cd.
17. Home computer systems have become much more powerful.  Most users access networks and the internet. Can also be home office system.
18. PC platforms -  windows, MacOs, Linux. If you have mac with intel chip set you can install windows on it.
19. Upgrading of PC is adding memory, new cpu, external HD, new graphics card, new ports USB or HDMI, new monitor, dvd new speakers.
20.MOD - is a custom hand built modification to a computer system component 
21. CPU - multicore - more that one processer in chip.
22.  Front side bus - circuitry going into cpu - faster the better
23. CPU cache - special high speed memory - increase performance.
24. Word size = number of bits that  a processor can execute.
25. CISC - complex instruction set computer. 
26. RISC - reduced instruction set computer - faster then CISC
27. Serial processing -must complete all steps before it begins next instruction set.
28. Pipelining - can begin executing an instruction before it completes the previous instruction..
29, Parallel processing -multiple instructions are executed at the same time.
30. Benchmarks - test run on various computers to test there functioning.
31. Windows Index - entered in the search box will return the benchmark.

Chapter 3 Objectives:

1. Describe the components of a typical software package.
2. Trace the development of computer program from its inception as a set of high-level language instructions into machine language.
3. Describe the differences between system software and application software.
4. Describe the way an operating system manages each computer resource.
5. Identify operating systems for personal computers, PDA, and servers.
6. Explain the key features and uses for word processing, desktop publishing, and web authoring software.
7. Describe the major features of spreadsheet software.
8. Describe the key features of database software.
9. List the types of software available for graphics, video, music, education and reference, entertainment, and business.
10. Explain how to install and uninstall software, whether is supplied on CD or a web download.
11. Describe the differences among new software versions, software patches, and service packs.
12. Describe the rights granted by copyright law, commercial software licenses, share ware licenses, freeware licenses, open source licenses, and public domain software.
13, System Software - operation systems, Device Drivers, Utilities, Programming Languages
14. Application Software - AKA productivity software is any type of software that has the potential to help people do thier work
15. Groupware - help people collaborate on a project..
16.Utility Software - help monitor and configure settings for you computer system - antivirus, pop up ad blockers, firewalls, spam filters.   Also security software. Adobe reader.
17. desktop widget is specialized utility software - calendars, clocks, etc.  On the desktop
18. Device driver are used by peripheral devices to establish communication with computer - printer, scanner, etc.
19. Word processing software -use for letters, envelops.  Word, Wordperfect, OpenOffice writer.  Mail merge with a table or database.
20. Desktop publishing -use graphic design to enhance the format and appearance of a document.
21. Web authoring software - design and develop Web pages - dreamweaver, expression web.
22.Clip art,  word art, smart art.
23.Spread Sheet - Excel, Lotus123, use row and columns ofl numbers to create a model or representation of a real situation.  What if analysis.use standard functions and can write formulas.
24. Statistical software analyze large sets of data to discover relationships and patterns.
25. Mathematical software tools for solving a wide range of math, science, and engineering problems.
26. Money management software. tools for tracking monetary transactions  and investments.
27.Tax preparation software - help prepare your taxes.
28. Database sofware collection of data store in computer-fields, records, tables, joins. Query, Structure Query Language used to extract data from tables., keyword search.
29.Graphic software - create, minipulae and print graphics.   Paint, Coral draw,  Photo editing - Adobe Photoshop. Drawing  software - adobe illustrator, CorelDraw.  3-D graphics set of tools for creating wire frames that represent three dimensional objects.  CAD -computer aided design- AutoCad , TurboCAD- Presentation - PowerPoint ,Work Keynote.
30. Music Software -audio editing software, Computer-aided music software  is designed to generate unique musical compositions. MIDI sequencing forsound effects and controlling keyboards and other digital instruments.
31. Video editing used for editing videos with the computer.
32.DVD authoring used for creating DVD.
33. Educational used for educational   reader rabbit, Word dective, SAT,GMAT and LSAT
34. Entertainment - computer games - multiplayer games - Pong to World of Warcraft, Halo, EverQuest on internet servers.
35.Business software - Vertical market, horizontal market, payroll, accounting, project management .
36. Software suite is a collection of software applications sold as a single package.
37. System requirements specify the operation system and minimum hardware capacities necessary for a software product to work.
38. Software is found in many places - apps -  sold online.
39. Copy write legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.
40. Pirated software - stolen
41. Software license is a legal contract that defines the ways in which you may use a computer program.
42. Single user license limits use to one person at a time.
43. Site license for all computer in  a specific location.
44. Shrink wrap license goes into effect as soon a you open the pacakage.
45. EULA - end user license agreement.
46. Public domain software not copyright - never had or it experied.
47. Demo ware - distributed free.
48. Shareware - try before you buy.
49. Freeware- copywriter software for free.
50. Open source software makes source code available to programmers. - Linux
51. Software package is made up of many files.  .exe, .dll, .dat, etc.
52. Software installation is a process that places a program into a compouter so the it can be run or executed.
53. Local application is softwarethtis designed to resideon acompouters hard disk.
54. Setup program -copies files or downloads to specific folder, uncompress files, analyzes the computers resources., and analyzes hardware components,
looks for any system files and players that are required to run the program., updates necessary system files.
55. Windows registrey is a database tha tkeeps track of your computers peripheral devices, software, preferences, andsettings.

Chapter 4 Objectives:

1. Create valid names for files and folders, plus demonstrate that you can construct and trace file paths.
2. Demonstrate how to use file management features of application software and operating system utilities.
3. Explain how file viruses, boot sector viruses, macro viruses, Trojan horses, worms, and denial of service attacks affect files and disrupt computer operations.
4. Describe how a computer owner can use antivirus software to avoid, find, and remove viruses.
5. Demonstrate that you can implement a viable backup and restore plan.
6. Compare the advantages and disadvantages of using tapes, floppy disks, a second hard disk, cds, zip disks, networks and web sites for backups.

Chapter 5 Objectives:

1. Describe the characteristics of various networks such as homeplc, homepna, Ethernet, Wi-Fi, token ring, FDDI, Mans, Wans, Lans, Nans, Pans, client/server and peer to peer.
2. Diagram Shannon's model of a communications network
3. List the type of cable and other links typically used for data communication networks.
4. make a list of network devices, explain the role of each one, and indicate wherever they are typically used on the internet or with LANs.
5. Describe the role of communications protocols and list some protocols associated with internet and lans.
6. Explain the difference between packet switching and circuit switching technology.
7. Briefly recount the history of the internet.
8. Draw a conceptual diagram illustrating the internet backbone, NAP, NSP, routers and ISP.
9. Explain when and why you might use Ping and Tracer route utilities.
10. Explain the differences between permanent IP address, dynamic Ip address, private IP address, and domain names.
11. Describe the advantages and disadvantages of dial up, cable modem, DSL, ISDN, T1, T3, and wireless internet access.
12. Explain when and why it is important to implement security measures, such as antivirus software, firewalls, and network address translation.


1. What is the definition of a computer in the dictionary as per the text book.
2. Computer Sizes
    a. PDA
    b. PC - Microcomputer
    c. Mini
    d. Main Frame
    e. Super Computer
    f. Clock speed
    g. expansion slots
        2) ISA
3. Computer Chips
    a. ROM
    b. PROM
    c. EPROM
    d. EEROM
    e. CMOS
    f. RAM
    g. CPU - I/O, Logic, Math

4. Relation operators
    a. >
    b. <
    c. =
    e. <=
    f. <>
    g. =

5. Logic Operators
    a. and
    b. or
    c. xor
    d. Not

6. Conductors
    a. Twisted Pair - Shielded and unshielded
    b. Coaxial
    c. Fiber Optic
    d. Wireless
    e. semi-conductor
    f. Super Conductor
    g. Frequency -Hz

7. Networks
    a. LAN
    b. WAN
    c. MAN
    d. Internet - publicly owned
        1. IP - 32 bit 
        2. TCP
        3. ISP
        4. NIC - Ethernet-CSMACD
        5. HTML
        6. HTTP
        7. e-mail , SMTP, Slip, POP, MIME
        8. Workstation - client
        9. Server - host 
    e. Intranet - privately owned
    f. routers
    g. repeaters
    h. firewall
    i. gateway
    j. Topology
        1. star
        2. ring
        3. bus
    k. Backbone
    l. Client/Server
    m. Peer to Peer
     n. Packet switching
    o. Circuit switching 
    p. Full Duplex
    q. FTP

8. Window explorer move, copy, delete, rename files
    a. Click-Shift Click- mark contiguous block of files, text, records, cells
    b. Ctrl - Click- mark non-contiguous block of files, text, records, cells
    c. Folder
    d. Alt-Tab
    e. Alt - PriScn - capture active widow and move into clipboard

9. System Maintenance
    a. Clean Disk
    b. Defrag
    c. Back Up

10. Code
    a. ASCII - 8 bit=byte
    b. Unicode

11. Operating Systems file lengths
    a. DOS
    b. Windows
    c. Linux
    d. Unix
     e. NOS
     f. IOS

12. Auxiliary Storage
    a. Hard Drive - platter- Random access
    b. Floppy Drive random access
    c. CD - random access
    d. CD RW Random Access
    e. USB Flash Memory random access
    f. Tape - sequential access
    g. Format  disk
        1. address
        2. tracks, sectors, clusters
        3. FAT
        4. BIOS

13. Modem -
    a. binary to analog - modulation
    b. analog to binary - demodulation

14. File extents
    a. HTM
    b. PNP
    c. exe
    d. JPG
    e. BMP
    f. JPG
    g. TIF
    h. MP3

15. File transfer FTP
    a. Upload
    b. Download
    c. Uplink
    d. Downlink
    e. Dial Up - slowest 45 to 64KB
    f. DSL -  Faster 1.5 MB
    g. Cable Modems - Fastest
    h. DSS- Wireless- 500KB
    i. T1 - 1.55MB
    j. T3 - 43MB

16. Applications
    1. Word - word processing
    2. Excel - spreadsheet
    3. Paint - graphics
    4. Access - database
    5. Power Point - presentation
    6. FrontPage - Web
    7. Outlook - e-mail
    7. Site license
    8. Anti Virus

17. Size
    a. Mega
    b. Extra

18. Virus   
    a. boot sector
    b. worm

19. Software License
    a. Commercial
    b. Shareware- try before you buy
    c. Freeware - for free
    d. Open Source software - source code available
    e. Public domain - freely copied. cannot be copyrighted.