SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Hardware:  Input, Processing, and  Output Devices
Learning Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Why Learn About Hardware? ,[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object]
Hardware Devices Analogy:  A Paper-Based Office Secondary Storage Register Storage Output Primary Storage Input
Hardware Components Principles of Information Systems, Eighth Edition
Hardware Components in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Hardware Components in Action Principles of Information Systems, Eighth Edition Figure 3.2: Execution of an Instruction
Processing and Memory Devices: Power, Speed, and Capacity ,[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Processing Characteristics and Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Processing Characteristics and Functions (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Physical Characteristics of the CPU ,[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Physical Characteristics of the CPU (continued) Principles of Information Systems, Eighth Edition Figure 3.3: Moore’s Law
Memory Characteristics and Functions ,[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Storage Capacity Principles of Information Systems, Eighth Edition Table 3.1: Computer Storage Units
Types of Memory Principles of Information Systems, Eighth Edition Figure 3.4: Basic Types of Memory Chips
Types of Memory (Cash Memory) Principles of Information Systems, Eighth Edition Figure 3.5: Cache Memory
Multiprocessing ,[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Parallel Computing ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Parallel Computing (continued) ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Secondary Storage ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Access Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Magnetic Tapes Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object],[object Object]
Magnetic Disks Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object]
Optical Disc Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object]
DVD and HVD Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Memory cards Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object]
Flash Memory Principles of Information Systems, Eighth Edition ,[object Object],[object Object],[object Object],[object Object]
RAID and Virtual Tape ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Enterprise Storage Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Enterprise Storage Options (continued) ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition Figure 3.9: Storage Area Network (SAN)
Input and Output Devices: The Gateway to Computer Systems ,[object Object],[object Object],Principles of Information Systems, Eighth Edition
Characteristics and Functionality  ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Input Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Input Devices (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Input Devices (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Output Devices   ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Special-Purpose Input and Output Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Computer System Types, Selection, and Upgrading ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Computer System Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Computer System Types (continued) ,[object Object],[object Object],Principles of Information Systems, Eighth Edition
Computer System Types (continued) ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Selecting and Upgrading Computer Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Summary ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],Principles of Information Systems, Eighth Edition

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

2 the computer system hardware
2  the computer system hardware2  the computer system hardware
2 the computer system hardware
 
Fundamental of computers by Neeraj Bhandari ( Surkhet.Nepal )
Fundamental of computers by Neeraj Bhandari ( Surkhet.Nepal )Fundamental of computers by Neeraj Bhandari ( Surkhet.Nepal )
Fundamental of computers by Neeraj Bhandari ( Surkhet.Nepal )
 
BAIT1003 Chapter 5
BAIT1003 Chapter 5BAIT1003 Chapter 5
BAIT1003 Chapter 5
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
Digital Fluency
Digital FluencyDigital Fluency
Digital Fluency
 
Chapter 04 storage csc & tts
Chapter 04 storage csc & ttsChapter 04 storage csc & tts
Chapter 04 storage csc & tts
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardware
 
Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycle
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
 
Computer hardware ppt1
Computer hardware ppt1Computer hardware ppt1
Computer hardware ppt1
 
Basicarchitecturememory
BasicarchitecturememoryBasicarchitecturememory
Basicarchitecturememory
 
Processing Data
Processing DataProcessing Data
Processing Data
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Ch6
Ch6Ch6
Ch6
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardware
 
3 computer memory
3   computer memory3   computer memory
3 computer memory
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device Basics
 

Andere mochten auch

Introduction to Structured Computer Organization
Introduction to  Structured Computer OrganizationIntroduction to  Structured Computer Organization
Introduction to Structured Computer OrganizationLiEdo
 
information system introduction
information system introductioninformation system introduction
information system introductionARSHIYA KHAN
 
Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information Systemvasanthimuniasamy
 
information system lecture notes
information system lecture notesinformation system lecture notes
information system lecture notesnaeem_mnm
 
Upos Jan 10
Upos Jan 10Upos Jan 10
Upos Jan 10UPOS
 
8 Dog Breeds That Don't Shed
8 Dog Breeds That Don't Shed8 Dog Breeds That Don't Shed
8 Dog Breeds That Don't ShedAnupam Kundu
 
Evaluation323424
Evaluation323424Evaluation323424
Evaluation323424guest8becc5
 
2010 Eurocom Worldwide Technology Survey
2010 Eurocom Worldwide Technology Survey2010 Eurocom Worldwide Technology Survey
2010 Eurocom Worldwide Technology SurveyEurocom Worldwide
 
New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentationKarl Daniel, M.D.
 
Music Magazine Coursework Planning!
Music Magazine Coursework Planning!Music Magazine Coursework Planning!
Music Magazine Coursework Planning!haylz4000
 
Radisson Hotel Whittier Feb2010 Powerpoints
Radisson Hotel Whittier Feb2010 PowerpointsRadisson Hotel Whittier Feb2010 Powerpoints
Radisson Hotel Whittier Feb2010 Powerpointststyoung
 
Backupify cloud inno presentation rob may
Backupify cloud inno presentation   rob mayBackupify cloud inno presentation   rob may
Backupify cloud inno presentation rob mayDatto
 

Andere mochten auch (20)

Introduction to Structured Computer Organization
Introduction to  Structured Computer OrganizationIntroduction to  Structured Computer Organization
Introduction to Structured Computer Organization
 
information system introduction
information system introductioninformation system introduction
information system introduction
 
Mis Mac
Mis MacMis Mac
Mis Mac
 
Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information System
 
information system lecture notes
information system lecture notesinformation system lecture notes
information system lecture notes
 
Upos Jan 10
Upos Jan 10Upos Jan 10
Upos Jan 10
 
8 Dog Breeds That Don't Shed
8 Dog Breeds That Don't Shed8 Dog Breeds That Don't Shed
8 Dog Breeds That Don't Shed
 
My himachal
My himachalMy himachal
My himachal
 
Evaluation323424
Evaluation323424Evaluation323424
Evaluation323424
 
Menieres slides-050518
Menieres slides-050518Menieres slides-050518
Menieres slides-050518
 
2010 Eurocom Worldwide Technology Survey
2010 Eurocom Worldwide Technology Survey2010 Eurocom Worldwide Technology Survey
2010 Eurocom Worldwide Technology Survey
 
1
11
1
 
New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentation
 
Försvarsutskottet 10 04-27
Försvarsutskottet 10 04-27Försvarsutskottet 10 04-27
Försvarsutskottet 10 04-27
 
Bf c mp.january 08.pps-1
Bf c mp.january 08.pps-1Bf c mp.january 08.pps-1
Bf c mp.january 08.pps-1
 
Music Magazine Coursework Planning!
Music Magazine Coursework Planning!Music Magazine Coursework Planning!
Music Magazine Coursework Planning!
 
Radisson Hotel Whittier Feb2010 Powerpoints
Radisson Hotel Whittier Feb2010 PowerpointsRadisson Hotel Whittier Feb2010 Powerpoints
Radisson Hotel Whittier Feb2010 Powerpoints
 
I talk3
I talk3I talk3
I talk3
 
Backupify cloud inno presentation rob may
Backupify cloud inno presentation   rob mayBackupify cloud inno presentation   rob may
Backupify cloud inno presentation rob may
 
Xampp
XamppXampp
Xampp
 

Ähnlich wie I.o devices 3

Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It ArchitectureUMaine
 
Types Of The Computer System And Processing Cycle
Types Of The Computer System And Processing CycleTypes Of The Computer System And Processing Cycle
Types Of The Computer System And Processing Cyclemanesh Makheja
 
Three Central Processing Unit
Three   Central Processing UnitThree   Central Processing Unit
Three Central Processing UnitMISY
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to misJob Thomas
 
Lecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsLecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsJack Hyman
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentationKereen Tatham
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...Kaushal Mehta
 
bit, Byte, Kilobyte
bit, Byte, Kilobyte bit, Byte, Kilobyte
bit, Byte, Kilobyte Poliano123
 
hardware software basics
hardware software basicshardware software basics
hardware software basicsDeepa Rani
 
Computer summary
Computer summaryComputer summary
Computer summaryBarira Khan
 

Ähnlich wie I.o devices 3 (20)

Multimedia Technology
Multimedia TechnologyMultimedia Technology
Multimedia Technology
 
Chap08
Chap08Chap08
Chap08
 
Lecture_3.pptx
Lecture_3.pptxLecture_3.pptx
Lecture_3.pptx
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
 
Types Of The Computer System And Processing Cycle
Types Of The Computer System And Processing CycleTypes Of The Computer System And Processing Cycle
Types Of The Computer System And Processing Cycle
 
Three Central Processing Unit
Three   Central Processing UnitThree   Central Processing Unit
Three Central Processing Unit
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Computer and its types
Computer and its typesComputer and its types
Computer and its types
 
Lecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsLecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating Systems
 
Cat info mgt
Cat info mgtCat info mgt
Cat info mgt
 
Hardware
HardwareHardware
Hardware
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Hwswb
HwswbHwswb
Hwswb
 
Network
NetworkNetwork
Network
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentation
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
 
bit, Byte, Kilobyte
bit, Byte, Kilobyte bit, Byte, Kilobyte
bit, Byte, Kilobyte
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
Computer summary
Computer summaryComputer summary
Computer summary
 

Mehr von kitturashmikittu (20)

Airtel project report
Airtel project reportAirtel project report
Airtel project report
 
Karvy project report
Karvy project reportKarvy project report
Karvy project report
 
Anil raythour
Anil raythourAnil raythour
Anil raythour
 
Airtel ranjeet
Airtel ranjeetAirtel ranjeet
Airtel ranjeet
 
Airtel distribution expansion in rural areas
Airtel distribution expansion in rural areasAirtel distribution expansion in rural areas
Airtel distribution expansion in rural areas
 
Airtel distribution expansion & market services in rural areas
Airtel distribution expansion & market services in rural areasAirtel distribution expansion & market services in rural areas
Airtel distribution expansion & market services in rural areas
 
Sanjay sharma01
Sanjay sharma01Sanjay sharma01
Sanjay sharma01
 
Transfer vidhi
Transfer vidhiTransfer vidhi
Transfer vidhi
 
Training
TrainingTraining
Training
 
System software-loaders
System software-loadersSystem software-loaders
System software-loaders
 
Sourcefinance
SourcefinanceSourcefinance
Sourcefinance
 
Semiconductor memories
Semiconductor memoriesSemiconductor memories
Semiconductor memories
 
Selection
SelectionSelection
Selection
 
Segmentation
SegmentationSegmentation
Segmentation
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Research methodology concept
Research methodology conceptResearch methodology concept
Research methodology concept
 
Research design
Research designResearch design
Research design
 
Recruitment
RecruitmentRecruitment
Recruitment
 
Promotion
PromotionPromotion
Promotion
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

I.o devices 3

  • 1. Hardware: Input, Processing, and Output Devices
  • 2.
  • 3.
  • 4.
  • 5. Hardware Devices Analogy: A Paper-Based Office Secondary Storage Register Storage Output Primary Storage Input
  • 6. Hardware Components Principles of Information Systems, Eighth Edition
  • 7.
  • 8. Hardware Components in Action Principles of Information Systems, Eighth Edition Figure 3.2: Execution of an Instruction
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Physical Characteristics of the CPU (continued) Principles of Information Systems, Eighth Edition Figure 3.3: Moore’s Law
  • 14.
  • 15. Storage Capacity Principles of Information Systems, Eighth Edition Table 3.1: Computer Storage Units
  • 16. Types of Memory Principles of Information Systems, Eighth Edition Figure 3.4: Basic Types of Memory Chips
  • 17. Types of Memory (Cash Memory) Principles of Information Systems, Eighth Edition Figure 3.5: Cache Memory
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.