Essential Computer Hardware Understanding the Building Blocks of Modern Technology and Securing Your Digital World
You'll begin this course with basic computer fundamentals, setting the foundation for critical hardware components that power every computing device. From motherboards to processors, you'll gain a solid understanding of how these elements work together to create a functioning computer. As...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Elluminet Press
[2019]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009843330006719 |
Tabla de Contenidos:
- Intro
- About the Author
- Acknowledgements
- Computer Fundamentals
- Representing Data
- ASCII code
- Unicode
- Binary Numbers
- Convert Binary to Decimal
- Convert Decimal to Binary
- Binary Addition
- Binary Multiplication
- Two's Complement
- Binary Shift
- Binary Fractions
- Floating Point
- Hexadecimal Numbers
- Convert Decimal to Hexadecimal
- Convert Hexadecimal to Decimal
- Boolean Logic
- AND Gate
- OR Gate
- XOR Gate
- NOT Gate
- NAND Gate
- NOR Gate
- Putting it Together
- Harvard Architecture
- Von Neumann Architecture
- Fetch Execute Cycle
- Instruction Sets
- RISC
- CISC
- Data Compression
- Lossy &
- Lossless
- Huffman Coding
- Run Length Encoding
- Data Encryption
- Sorting Algorithms
- Bubble Sort
- Merge Sort
- Data Storage Units
- Hardware Components
- Types of Hardware
- Internal Hardware
- External Peripherals
- Primary Storage Devices
- Random Access Memory (RAM)
- Read Only Memory (ROM)
- Cache Memory
- Volatile and Non-Volatile Memory
- Secondary Storage
- Hard Disc Drive (HDD)
- Solid State Drive (SSD)
- CD/DVD/Blu-ray Drive
- Memory Cards
- USB Flash Drives
- External Hard Disc
- NAS Drives
- CPU / Processor
- Types of CPU
- Inside the CPU
- Other Internal Components
- Sound Card
- Video Card
- Expansion Slots
- The Motherboard
- The Chipset
- North &
- South Bridge
- CPU Socket
- The BIOS
- UEFI
- Computer Peripherals
- Printers
- Inkjet Printer
- Laser Printer
- Other Peripherals
- Data Ports
- USB
- USB-C
- Ethernet
- FireWire
- ThunderBolt
- eSATA
- Video Ports
- DVI
- HDMI
- VGA
- Component Video
- Composite Video
- Audio Ports
- 1/8" (3.5mm) Phono Jack
- 1/4" (6.35mm) Phono Jack
- 3 Pin XLR
- RCA Audio
- Types of Computer
- Micro Computer
- Desktop
- Desktop: All-in-one
- Netbook
- Chromebook.
- Tablet Computers
- Hybrids
- Mainframe Computer
- Super Computer
- Embedded System
- Understanding Hardware Specifications
- So Many Machines
- Mac or PC?
- Decoding the Jargon
- Computer Specs
- Printer Specs
- Computer Software
- The Operating System
- User Interfaces
- The Command Line (CLI)
- Graphical User Interface (GUI)
- Mobile User Interface
- Process Management
- Non Pre-emptive Scheduling
- Pre-emptive Scheduling
- First Come, First Served
- Round Robin
- Multilevel Feedback Queueing
- File Management
- File Systems
- FAT32
- exFAT
- NTFS
- APFS
- EXT2, 3, and 4
- Memory Management
- Memory Partitioning
- Segmentation
- Paging
- Virtual Memory
- Apps &
- Applications
- Anti-Virus Software
- Windows Defender
- Avast
- AVG
- Computer Networks
- Local Area Networks (LANs)
- Metropolitan Area Networks (MANs)
- Wide Area Networks (WANs)
- Peer-to-peer Network
- Client-server Network
- Network Layers
- Network Topologies
- Star
- Bus
- Ring
- Ethernet
- Cellular Networks
- WiFi
- Dual Band or Single Band?
- WiFi Extenders
- Wireless Standards
- Wireless Security
- The Internet
- Internet Connections
- DSL
- Fibre Optic
- Cable
- Satellite
- 3G/4G/5G
- Web Servers and DNS
- DHCP Servers
- IP Addresses
- TCP/IP
- TCP/IP Model
- Ports and Sockets
- Packet Switching
- What is a URL?
- HTML
- Where are the HTML Files Stored?
- Cloud Computing
- Data Transfer Rates
- Internet Security
- Malware
- Virus
- Worm
- Trojan
- Rootkit
- Ransomware
- Social Engineering
- Phishing
- Pharming
- Pretexting
- Shouldering
- Threat Prevention
- Biometric Measures
- Strong Passwords
- 2-Factor Authentication
- Public Key Cryptography
- Firewalls
- Index
- Blank Page.