bengkel penyelenggaran komputer · bengkel penyelenggaran komputer 6 oktober 2006 (jumaat) 8.30 am...

46
BENGKEL PENYELENGGARAN KOMPUTER 6 OKTOBER 2006 (JUMAAT) 8.30 AM – 12.30 PM TEMPAT: DEWAN TAKLIMAT FTM Prof Madya Azizi Zakaria Fakulti Teknologi Maklumat [email protected] Pejabat: FTM 3030 HP: 013-4811990 or 017-4699120 http://azportal.uum.edu.my

Upload: others

Post on 11-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • BENGKEL PENYELENGGARAN KOMPUTER

    6 OKTOBER 2006 (JUMAAT)8.30 AM – 12.30 PM

    TEMPAT: DEWAN TAKLIMAT FTM

    Prof Madya Azizi ZakariaFakulti Teknologi Maklumat

    [email protected]: FTM 3030

    HP: 013-4811990 or 017-4699120http://azportal.uum.edu.my

    mailto:[email protected]

  • Agenda

    IntroductionFormatting PCInstalling and Configuring Windows XP SP2Software InstallationPC Protection From Malicious ProgramsBasic Troubleshooting TechniquesExploring Computer Hardware

    While installing, I will talk on:Component of System Unit

  • Windows XP License Key

    D366C-VX7WR-V448P-FGV4T-Y98XT

    Back to Agenda

  • SOFTWARE IN THE CD

    The are 20 software in the CD (700MB):1. ACDSee PRO2. Active Desktop Calendar3. Adobe Reader (PDF)4. Checkit (Checking hardware)5. Cyberlink Power DVD6. Karspersky Anti-Virus 7. Nero Burning (CD Burning software)8. Microsoft Office 20039. Norton Partition Magic 10. Perfect Disk V7 (Defragmentation software)11. Quicktime (Play quicktime video)

    Back To Agenda

  • SOFTWARE IN THE CD

    The are 20 software in the CD (700MB):12. Realplayer Plus 9 13. Tuneup Utilities 2006 (Fine tune windows)14. Vista Transformation Pack (Transform XP GUI to Vista)15. Waktu Solat16. Web Browser (Mozilla and Opera)17. WinRAR (Compression Software)18. WinAMP (MP3 Player)19. Winzip (Compression Software)20. Xoftspy (Anti-spyware)21. Hacking Windows XP (E-BOOK)Back To Agenda

  • Malicious Software

    Malicious software or malware is software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

  • Malicious Software

    VIRUSA virus is a piece of computer code that attaches itself to a program or file so it can spread from computer to computer, infecting as it travels. Viruses can damage your software, your hardware, and your files.

  • Malicious Software

    WORMA worm generally spreads without user action and distributes complete copies (possibly modified) of itself across networks. A worm can consume memory or network bandwidth, thus causing a computer to stop responding.

  • Malicious Software

    SPYWARESpyware is any technology that aids in gathering information about a person or organization without their knowledge. It can overload your system and shutdown other services.

  • Malicious Software

    SPYWARESpyware is any technology that aids in gathering information about a person or organization without their knowledge. It can overload your system and shutdown other services.

  • Malicious Software

    TROJAN HORSEA Trojan Horse is a computer program that appears to be useful software, but instead compromises your security and causes a lot of damage.

    Back to Agenda

  • The Components of the System Unit

  • The System Unit

    What is the system unit?

    p. 184 Fig. 4-1 Next

    Case that contains electronic components of the computer used to process data

    Sometimes called the chassis

  • The System Unit

    What are common components inside the system unit?

    p. 185 Fig. 4-2 Next

    MemoryAdapter cards

    Sound cardVideo card

    PortsDrive baysPower supply

    power supply

    ports

    drive bays

    processor

    memory

    sound cardvideo card

    Processor

  • The System Unit

    What is the motherboard?

    p. 186 Fig. 4-3 Next

    Main circuit board in system unitContains adapter cards, processor chips, andmemory chipsAlso calledsystem board

    Click to view Web Link,click Chapter 4, Click Web Linkfrom left navigation, then click Motherboards below Chapter

  • Processor

    Which processor should you select?

    p. 191 Fig. 4-7 Next

    The faster the processor, the more expensive the computer

    Celeron

    Itanium or Xeon

    Pentium family

    1.3 GHz and up

    3.0 GHz and up

    2.4 GHz to 3.0 GHz

    Up to 2.4 GHz

    2.2 GHz and up

    Intel Processor Desired Clock Speed

  • Processor

    What is the system clock?

    p. 189 Next

    Each tick Each tick is a is a

    clock cycleclock cycle

    Pace of system Pace of system clock is clock is clock speedclock speed

    Most clock speeds are Most clock speeds are in the gigahertz (GHz) in the gigahertz (GHz)

    range (1 GHz = one range (1 GHz = one billion ticks of system billion ticks of system

    clock per second)clock per second)

    Processor speed can Processor speed can also be measured in also be measured in

    mmillions of illions of iinstructions nstructions pper er ssecond econd (MIPS)(MIPS)

    Controls timing of all computer operationsGenerates regular electronic pulses, or ticks, that set operating pace of components of system unit

  • Processor

    What are the guidelines for selecting a processor?

    Next

  • Processor

    What are heat sinks, heat pipes, and liquid cooling?

    p. 193 Fig. 4-9 Next

    Heat sink—component with fins that cools processorHeat pipee—smaller device for notebook computersLiquid cooling—uses a continuous flow of fluids to transfer heat away

  • Memory

    What is memory?

    p. 197 Fig. 4-15 Next

    Electronic components that store instructions, data, and resultsConsists of one or more chips on motherboard orother circuit boardEach byte stored in unique location called an address, similar to seats in a concert hall

  • Memory

    How is memory measured?

    p. 197 Fig. 4-16 Next

    Term Abbreviation Approximate Size

    Kilobyte KB or K 1 thousand bytes

    Megabyte MB 1 million bytes

    Gigabyte GB 1 billion bytes

    Terabyte TB 1 trillion bytes

    By number of bytes available for storage

  • Memory

    What is random access memory (RAM)?

    p. 198 Next

    The more RAM a The more RAM a computer has, the computer has, the faster it respondsfaster it responds

    Also called Also called main memory main memory

    or primary or primary storagestorage

    Most RAM is Most RAM is volatile, it is lost volatile, it is lost when computerwhen computer’’s s

    power is power is turned offturned off

    Memory chips that can be Memory chips that can be read from and written read from and written

    to by processorto by processor

    Click to view Web Link,click Chapter 4, Click Web Linkfrom left navigation, then click RAM below Chapter

  • Memory

    Where does memory reside?

    p. 199 Fig. 4-18 Next

    Resides on small circuit board called memory moduleMemory slots on motherboard hold memory modules

    memory chip

    memory slot

    dual inline memory module

  • Memory

    p. 199 Next

    How much RAM does an application require?Depends on the types of software you plan to useFor optimal performance, you need more than minimum specifications

  • Memory

    How much RAM do you need?

    p. 200 Fig. 4-19 Next

    Depends on type of applications you intend to runon your computer

    RAM

    Use

    256 MB to 1 GB 512 MB to 2 GB 2 GB and up

    • Home and business

    users managing

    personal finance

    • Using standard

    application software

    such as word processing

    • Using educational

    or entertainment

    CD-ROMs

    • Communicating with

    others on the Web

    • Users requiring more advanced

    multimedia capabilities

    • Running number-intensive

    accounting, financial, or

    spreadsheet programs

    • Using voice recognition

    • Working with videos, music, and

    digital imaging

    • Creating Web sites

    • Participating in video conferences

    • Playing Internet games

    • Power users creating

    professional Web sites

    • Running sophisticated

    CAD, 3D design, or

    other graphics-intensive

    software

  • Memory

    What is cache?

    p. 201 Fig. 4-20 Next

    L1 cache built into processorL2 cache slower but has larger capacityL2 advanced transfer cache is faster, built directly on processor chipL3 cache is separate from processor chip on motherboard (L3 is only on computers that use L2 advanced transfer cache)

    Helps speed computer processes by storing frequently used instructions and dataAlso called memory cache

    Click to view Web Link,click Chapter 4, Click Web Link from left navigation, then click Cache below Chapter

  • Memory

    What is CMOS?

    p. 203 Next

    Uses battery power to retain

    information when other power is

    turned off

    Stores date, time, and

    computer’s startup

    information

    Complementary metal-oxide

    semiconductor memory

    Used in some RAM chips, flash

    memory chips, and other types of memory chips

  • Expansion Slots and Adapter Cards

    What is an adapter card?

    p. 204 Fig. 4-24 Next

    Enhances system unit or provides connections to external devices called peripheralsAlso called an expansion card

    Click to view Web Link,click Chapter 4, Click Web Linkfrom left navigation, then click Sound Cards below Chapter 4

  • Expansion Slots and Adapter Cards

    What is an expansion slot?

    p. 204 - 205 Fig. 4-25 Next

    An opening, or socket, on the motherboard that can hold an adapter cardWith Plug and Play, the computer automatically configures cardsand other devices as you install them

  • Expansion Slots and Adapter Cards

    What are PC cards, and flash memory cards?

    p. 205 Fig. 4-26–4-27 Next

    A PC card adds memory, storage, sound, fax/modem, communications, and other capabilities to notebook computersA flash memory card allows users to transfer data from mobile devices to desktop computers

    USB Flash drive

    Click to view Web Link,click Chapter 4, Click Web Linkfrom left navigation, then click Removable Flash Memory Devices below Chapter 4

  • Ports and Connectors

    What are ports and connectors?

    p. 206 Fig. 4-28 Next

    Port connects external devices to system unitConnector joins cable to peripheral

    Available in one of two genders: male and female

    Click to view Web Link,click Chapter 4, Click Web Linkfrom left navigation, then click Ports and Connectors below Chapter 4

  • Ports and Connectors

    What are different types of connectors?

    p. 207 Fig. 4-29 Next

  • Third USB device connects to second USB

    device, and so on

    Third USB device connects to second USB

    device, and so on

    Second USB device connects

    to first USB device

    Second USB device connects

    to first USB deviceFirst USB

    device connects to USB port on computer

    First USB device connects

    to USB port on computer

    Single USB port can be used to attach

    multiple peripherals in a daisy chain

    Single USB port can be used to attach

    multiple peripherals in a daisy chain

    PCs typically have six to eight USB ports

    on front or back of the system unit

    PCs typically have six to eight USB ports

    on front or back of the system unit

    Ports and Connectors

    What are USB ports?

    p. 208 Next

    USB (universal serial bus) port can connect up to 127 different peripherals together

    with a single connector type

    USB (universal serial bus) port can connect up to 127 different peripherals together

    with a single connector type

    USB 2.0

  • External peripherals might use an AC

    adapter, which is an external power supply

    Power Supply

    What is a power supply?

    p. 213 Next

    ConvertsAC Power

    intoDC Power

    Fan keepssystem unit components

    cool

  • Mobile Computers and Devices

    What is a mobile computer?

    p. 213 - 214 Fig. 4-37 Next

    Notebook, weighing between 2.5 and 9 pounds, or mobile device such as a PDA

  • Mobile Computers and Devices

    What ports are on a notebook computer?

    p. 214 Fig. 4-38 Next

  • Mobile Computers and Devices

    What ports and slots are on a tablet PC?

    p. 214 Fig. 4-39 Next

  • Putting It All Together

    What are suggested processor, clock speed, and RAM requirements based on the needs of various types of users?

    p. 215 Fig. 4-40 Next

  • Keeping Your Computer Clean

    Over time, the system unit collects dust – even in a clean environment

    p. 216 Fig. 4-41 Next

    Preventative maintenance requires a few basic products:

  • Storage

    What is storage?

    p. 354 Fig. 7-1 Next

    Holds data, instructions, and information for future useStorage medium is physical material used for storage

    Also called secondary storage

  • Storage

    What is capacity?

    p. 356 Next

    Kilobyte (KB) 1 thousand

    Megabyte (MB) 1 million

    Gigabyte (GB) 1 billion

    Terabyte (TB) 1 trillion

    Petabyte (PB) 1 quadrillion

    Number of bytes (characters) a storage medium can hold

    Exabyte (EB) 1 quintillion

    Zettabyte (ZB) 1 sextillion

    Yottabyte (YB) 1 septillion

  • Floppy Disk Small files to be transported

    Secondary Storage

    Primary Storage

    Hard Disk

    Flash Memory Cards and USB Flash Drives

    CDs and DVDs

    Tape

    Items waiting to be interpretedand executed by the processor

    Operating system, applicationsoftware, user data and information

    Digital pictures or files to be transported

    Software, backups, movies, music

    Backups

    Memory (most RAM)

    Stores …Transfer rates

    What is access time?Time it takes storage device to locate item on storage medium

    Storage

    p. 357 Fig. 7-4 Next

    Time required to deliver item from memory to processor

    fastertransfer

    rates

    slowertransfer

    rates

  • Perpendicular recording

    Magnetic Disks

    What is a hard disk?

    p. 358 Fig. 7-6 Next

    hard disk installedin system unit

    High-capacity storageConsists of several inflexible, circular platters that store items electronicallyComponents enclosed in airtight, sealed case for protection

    Click to view Web Link,click Chapter 7, Click Web Linkfrom left navigation, then click Perpendicular Recording below Chapter 7

    Longitudinal recording

  • Optical Discs

    What are CD-Rs and CD-RWs?

    p. 371 Next

    Must haveCD recorder

    or CD-R drive

    Cannot erasedisc’s contents

    CD-R (compact disc-recordable)—cdisc you can write on once

    CD-RW (compact disc-rewritable)—ceerasable disc you can write on

    multiple timesMust have

    CD-RW softwareand CD-RW drive

    Click to view Web Link, click Chapter 7, Click Web Link from left navigation, then click CD-Rs and CD-RWsbelow Chapter 7

  • Optical Discs

    What is a DVD-ROM (digital versatile disc-ROM or digital video disc-ROM)?

    p. 372 Fig. 7-24 Next

    Must have DVD-ROM drive or DVD player to read DVD-ROMStores databases, music, complex software, and moviesBlu-ray discs have storage capacity of up to 27 GBHD-DVD discs have storage capacity of up to 45 GBUMD can store up to 1.8 GB

  • Optical Discs

    How does a DVD-ROM store data?

    p. 372 Fig. 7-25 Next

    Two layers of pits are used, lower layer is semitransparent so laser can read throughSome are double-sidedMany types of recordable and rewritable DVDs are available

    DVD-R and DVD+RDVD-RW and DVD+RW

    Click to view Web Link,click Chapter 7, Click Web Linkfrom left navigation, then click DVDsbelow Chapter 7

    AgendaWindows XP License KeySOFTWARE IN THE CDSOFTWARE IN THE CDMalicious SoftwareMalicious SoftwareMalicious SoftwareMalicious SoftwareMalicious SoftwareMalicious SoftwareThe System UnitThe System UnitThe System UnitProcessorProcessorProcessorProcessorMemoryMemoryMemoryMemoryMemoryMemoryMemoryMemoryExpansion Slots and Adapter CardsExpansion Slots and Adapter CardsExpansion Slots and Adapter CardsPorts and ConnectorsPorts and ConnectorsPorts and ConnectorsPower SupplyMobile Computers and DevicesMobile Computers and DevicesMobile Computers and DevicesPutting It All TogetherKeeping Your Computer CleanStorageStorageStorageMagnetic DisksOptical DiscsOptical DiscsOptical Discs