Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo
Workplace Software and Skills

1.2 Computer Hardware and Networks

Workplace Software and Skills1.2 Computer Hardware and Networks

Learning Objectives

By the end of this section, you will be able to:

  • Explain the components that make up a computer
  • Describe how computers process and store data
  • Discuss what networks are and how they function
  • Understand how to maintain and clean computer components

You do not need to know how to build a computer from scratch to effectively use a mobile device or other computing technology. However, a basic understanding of how computers operate can help you troubleshoot problems, and with some knowledge of computer terminology, you will be a more informed consumer when you are making technology purchases. Although there are technological and programming differences between computers, tablets, gaming consoles, and mobile devices, all are built around the same basic technology. This technology has evolved through innovations in the field to offer users enhanced features, reduced costs, and increased operating speeds.

This section will cover some basic aspects of computing. These concepts will give you a broader understanding of the technology you are using beyond simply operating the computer or tablet for personal or work tasks.

What Is a Computer?

Although today’s computers look and behave differently from early efforts, they include the same core features. A computer is simply a programmable machine that can execute predefined lists of instructions and respond to new instructions. A very large computers called a mainframe is capable of great processing speed and data storage. Mainframe computers today typically function as servers. Servers are powerful computers that act as a central hub of the technology needs for the organization. Servers support data storage, sharing of computer programs, and hosting websites. Another name for a computer program (language) or set of programs with the end goal of converting data into processes and actions is software. Software, such as Microsoft Word, allows the user to interface with the computer. Accessories such as a keyboard, mouse, printer, and monitor are called hardware. These input and output devices allow us to communicate with the computer and to extract information from it.

There are many different types of computer systems, including workstations, microcomputers, and supercomputers. A workstation is a powerful single-user computer that is similar to a personal computer but more powerful. They are typically used to manage business operations such as invoicing customers, managing online sales, or ordering inventory for the company. A minicomputer is similar in power to mainframe computers but, as the name implies, is much smaller in size and can be used in midsize organizations that need more power than what a typical personal computer might provide. A supercomputer is extremely powerful and has the fastest processor available. These computers can be used to process highly complex scientific data at fast speeds.

Computers are hard to get away from—they’re in all kinds of everyday devices. Appliances, cars, watches, and even the heating and cooling systems in our homes incorporate computer technology that enables us to send and receive information from these devices. Today’s smartphones are essentially minicomputers.

How Computers Work

Most computers consist of a few basic elements. The motherboard is the hardware that runs communications for the computer system (Figure 1.20a). It sits within the system unit, which is the container that houses most of the computer’s electronic components. The central processing unit (CPU) contains a single chip called a microprocessor (the “brains” of a computer system). A microprocessor (Figure 1.20b) consists of a control and what is known as an arithmetic-logic unit, which performs math and logical operations within the computer system.

(a) Photo of a computer motherboard various pieces in different shapes, sizes, and colors. (b) Photo of a silver rounded square computer piece nestled in a dark square piece.
Figure 1.20 Two essential components of a computer’s inner workings are (a) the motherboard and (b) the CPU’s microprocessor. (credit a: modification of “Green Motherboard” by Pixabay/Pexels, CC0; credit b: modification of “Intel Core 2 Duo E6750” by Nao Iizuka/Flickr, CC BY 2.0)

Personal Computers and Devices

Numerous types of computers and devices are available for business or personal use today. A personal computer (PC) is a microcomputer that is suitable for individual use, including a desktop computer, laptop, tablet, smartphone, and wearable device such as a smartwatch. Desktop computers are personal workstations that you set up at a fixed location, such as a desk. They are typically equipped with a tower (where components such as the motherboard are housed), a monitor, and other peripheral accessories, such as a keyboard, mouse, and printer. Laptops are portable and lightweight—small enough to fit into most briefcases. The computer and monitor are combined, and peripheral accessories are optional. Tablets, such as the Kindle, are smaller than laptops and have less functionality but are still very powerful, with many features that support everyday personal use. They are even more portable than laptops, and their touch screens, which don’t require a mouse, are their distinguishing feature.

Operating Systems

As stated earlier, a computer’s operating system is software that is essential to all functionality and use of the computer. It controls the computer’s activities, from memory to processes, and ensures that hardware and software components can “speak” to each other. It provides the interface necessary for humans to communicate with the computer and all its components. Here is where the big players enter the computing scene: Microsoft Windows, Apple macOS, and Google’s Android OS, to name a few. Linux, an open source operating system, is also used, but used more in large mainframe computer systems and servers. As an open source operating system, the computer code can be modified to meet the needs of the users. You will typically interact with Windows and Apple macOS on a laptop or tablet. The programs that we discuss in this text, such as Google Sheets and Microsoft Word, use their respective operating system. The Android and iOS operating systems are used for mobile devices. You are likely to see these operating systems in use daily, both in the workplace and in your personal life.

Information Processing, Storage, and Memory

Businesses take great care in procuring computers that can handle the work that needs to get done. Before selecting computers, they’ll investigate some basic functions that have to do with how fast the devices process information and how well they store data. The information processing cycle is the sequence of events involved in processing information—input, processing, storage, and output:

  • Input consists of entering the data and information into the computer system.
  • Processing involves a series of operations performed by the computer to organize, interpret, or otherwise make use of the information input into the computer.
  • Output entails viewing this processed information in a way that makes sense to the user, either through the monitor or as a printout.
  • Finally, storage is the process of saving information into the computer for future use.

There are two types of storage, primary storage and secondary storage. Primary storage refers to temporary files that are available only when the computer is on. Primary storage is also known as short-term memory, or random access memory (RAM). This type of memory is not meant to save information for future use but allows the computer to operate and process information quickly as it is being used. Secondary storage is considered permanent storage on a computer system or removable device, such as the old floppy disks. You may also be familiar with another type of memory—cache. The computer’s cache holds data that can be retrieved quickly, often including downloads from websites or other information that can be used to load websites faster. The cache operates in the background to help the computer operate more quickly.

A hard disk is considered secondary storage where users can save files and retrieve data and programs. There are two types of hard disks, internal and external. An internal disk drive is housed within the computer unit, and users update and produce copies of all files they need. Figure 1.21 shows a few types of external disk drive. These are portable, allowing the user to save information outside of the computer unit for use elsewhere.

Before an operating system loads and is ready to use, the computer needs hardwired instructions, called read-only memory (ROM). Businesses should be sure to procure computers with sufficient RAM and to make sure that data storage solutions are in place to handle their needs. The amount of RAM impacts the speed at which programs run. Computers with less RAM are slower and can hinder work productivity in the workplace. Often businesses will begin with less RAM and eventually upgrade to higher levels as their business and needs expand.

(a) An image of a floppy disk. (b) An image of a CD. (c) An image of a flash drive.
Figure 1.21 Different types of storage devices used over the years include (a) floppy disks, which are no longer used, (b) CD-ROM disks, and (c) flash drives. (credit a: modification of “Floppy Disk Data” by OpenClipart-Vectors/Pixabay, CC0; credit b: modification of “Dvd Cd-Rom Compact Disk” by OpenClipart-Vectors/Pixabay, CC0; credit c: modification of “Usb Disk Disc” by Clker-Free-Vector-Images/Pixabay, CC0)

Networks

Talk about networks is common in the workplace. You will hear that the network “has gone down” or “is running slow.” What does this mean? What is a network, anyway? A network is a connection of two or more computer systems, as well as devices, by either a cable or a wireless connection. Networks may be simple or complex, self-contained within a small area like your home or dispersed over a large geographic area.

These different types of networks are called personal area networks (PANs), local area networks (LANs), and wide area networks (WANs). Personal area networks typically connect personal computers and devices within a small area. Local area networks (LANs) are primarily used by colleges and universities as a way of linking computers and sharing printers and other resources. Wide area networks (WANs) allow access to regional service providers and span distances greater than 100 miles. The internet is a wide area network.

Network Hardware

In order to function properly, networks depend on a router. These devices perform two functions: they direct the data traffic, so to speak, from one network to another, and they allow multiple computers to use the same internet connection. Routers can vary in shape and size and also by performance. Switches coordinate direct flow of data between components. Gateways are devices that allow one local area network to be linked to other LANs or larger networks. The purpose of a hub is to send a received message to all connected devices rather than just the intended ones.

Network Servers

A client is a device that requests and uses resources available from other devices on the same network. For example, if you use a computer at your local library or a computer located on your campus, you are using a client device. In the workplace, the computers that employees have at their workstations are often connected through the network and are clients to that network. A server connects devices and allows for resource sharing across the network. Servers may have different functions. Examples are application servers, communication servers, database servers, file servers, print servers, and web servers.

Network adapter cards connect computers and devices to a network, enabling the sharing of hardware, software, and data across the network. The network adapter card connects the system unit to the network via a network cable. These cards used to be purchased separately in the early days of personal computers, but most computers today come with integrated cards embedded in their motherboard. The devices sending and receiving data are identified by transmission control protocol/internet protocol (TCP/IP), which organizes the information into small packets for transmission through the network and across the internet. One of the most widely used internet protocols, used for web traffic, is hypertext transfer protocol (HTTP). HTTPS is a more secure protocol than HTTP, for users and website owners alike, because users’ information is protected with a “pass” safety inspector embedded within the protocol. Before exchanging confidential information, such as credit card information, online, users should always verify if the website begins with https. And even with this safer and more secure connection, you should always be cautious when sharing information.

Secure File Transfer Protocol (SFTP) is a secure version of file transfer protocol; it provides a secure connection for transferring files. User datagram protocol (UDP) is a communication protocol that works across the internet for time-sensitive transmissions such as video playback. Its main goal is to speed up communication by establishing connection before data is transferred. Another security protocol that uses encryption to help ensure privacy of information and communications across the internet is secure sockets layer (SSL). Cybersecurity is a major concern of computer users, both personally and professionally. As encryption technology has progressed, there have been several iterations of SSL protocols. Today, the encryption is referred to as TLS (transport layer security), but the intent is the same—providing protection of data that is shared via the internet.

Spotlight on Ethics

Secure Information Transfers

One of the most common types of cybercrimes is identity theft, which occurs when a hacker steals an individual’s identity for economic gain. The increase of hackers, individuals who gain unauthorized access to computer systems in an attempt to steal someone’s information, has become a major issue and has led to the development of such software programs as Norton Antivirus and LifeLock to protect consumers’ identities.

Another major safety concern when using computers is the existence of malware and viruses—software that can damage or slow down a computer system by opening an insecure portal into your computer. Malware can also damage files and allow hackers access to files and information stored on your computer. Depending on how these programs are written, they may only damage the computer that initiated the virus/malware, or the malware may flow throughout networks by attaching itself to other files that are exchanged across the network.

Users should be very careful when opening files sent to them in email or when clicking links to unfamiliar websites. Phishing scams are very common. These are attempts by hackers to gain access to your personal information, such as the credentials you may use to access financial and other sensitive accounts. Phishing most often occurs through email that appears to come from a reputable source, or via social media. It is always best to avoid logging into accounts through links sent in email, clicking on links that are not secure or recognizable, or opening files unless you know who the sender is and what is being sent.

Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/workplace-software-skills/pages/1-chapter-scenario
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/workplace-software-skills/pages/1-chapter-scenario
Citation information

© Apr 15, 2024 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.