21
BASIC COMPUTER CONCEPTS COMPUTER – is an electronic device that performs tasks based on instructions given by the user. - Is a digital electronic device that combines hardware and software to accept the input of data, process and store the data, and produce some useful output Uses of Computer - To keep records. - For mathematical computations. - To perform repetitive task. - For publishing. - For entertainment. - For communication. COMPUTER SYSTEM – composed of hardware and software COMPUTER LITERACY – is working understanding of the fundamental of computers and their uses 3 Measurements to Asses the Level of Computer Literacy 1. AWARENESS – Studying the importance of computers. 2. KNOWLEDGE – Learning what computers are and how they function. - requires knowing some technical jargon in order to understand the computer language. 3. INTERACTION – Using the computer directly EVOLUTION OF COMPUTER 500 B.C. – the ABACUS was the first used by the Babylonians as an aid to simple arithmetic at sometime around this date. The ABACUS in the form we are most familiar with was first used in China around 1300 A.D. 1614 – John Napier published a paper outlining his discovery of the logarithm and invented the NAPIER’S RODS / NAPIER’S BONES (an ingenious system of movable rods) 1623 – Wilhelm Schickard made a CALCULATING CLOCK ( a mechanical machine capable of adding and subtracting up to 6 digit numbers and warned of an overflow by ringing a bell) 1642 – Blaise Pascal invented the mechanical calculation machine (PASCALINE / ADDING MACHINE) – capable of adding up to 8 digit numbers 1671 – Gottfried Leibniz designed the STEPPED RECKONER (a machine to carry out multiplication) 1801 – Joseph Marie Jacquard developed an automatic loom that was controlled by punched cards 1820 – Charles Xaviers Thomas de Colmar made his ARITHMOMETER (the first mass-produced calculator)

COMM109 (Autosaved)

Embed Size (px)

DESCRIPTION

Communication

Citation preview

BASIC COMPUTER CONCEPTSCOMPUTER is an electronic device that performs tasks based on instructions given by the user. Is a digital electronic device that combines hardware and software to accept the input of data, process and store the data, and produce some useful output

Uses of Computer To keep records. For mathematical computations. To perform repetitive task. For publishing. For entertainment. For communication.COMPUTER SYSTEM composed of hardware and softwareCOMPUTER LITERACY is working understanding of the fundamental of computers and their uses

3 Measurements to Asses the Level of Computer Literacy

1. AWARENESS Studying the importance of computers.2. KNOWLEDGE Learning what computers are and how they function.- requires knowing some technical jargon in order to understand the computer language.3. INTERACTION Using the computer directly

EVOLUTION OF COMPUTER

500 B.C. the ABACUS was the first used by the Babylonians as an aid to simple arithmetic at sometime around this date. The ABACUS in the form we are most familiar with was first used in China around 1300 A.D. 1614 John Napier published a paper outlining his discovery of the logarithm and invented the NAPIERS RODS / NAPIERS BONES (an ingenious system of movable rods) 1623 Wilhelm Schickard made a CALCULATING CLOCK ( a mechanical machine capable of adding and subtracting up to 6 digit numbers and warned of an overflow by ringing a bell) 1642 Blaise Pascal invented the mechanical calculation machine (PASCALINE / ADDING MACHINE) capable of adding up to 8 digit numbers 1671 Gottfried Leibniz designed the STEPPED RECKONER (a machine to carry out multiplication) 1801 Joseph Marie Jacquard developed an automatic loom that was controlled by punched cards 1820 Charles Xaviers Thomas de Colmar made his ARITHMOMETER (the first mass-produced calculator) 1821 Charles Babbage (father of computers) invented the first modern computer design and made a machine to automatically solve mat problems. 1842 Ada Lovelace (the first computer programmer) made the program for the invention of Charles Babbage which is the Difference Engine 1852 George Boole developed binary algebra (BOOLEAN ALGEBRA) 1890 Herman Hollerith founded Tabulating Machine Company (later named as International Business Machine / IBM Corporation) 1939 David Hewlett and William Packard formed Hewlett-Packard (HP) a coin toss in a garage decided the name 1940 John Von Neumann presented a paper outlining the stored-program concept 1942 John Atanasoft and Clifford Berry invented the first all-electronic computer (the first computer to use electricity in the form of vacuum tubes) called the ABC (ATANASOFT-BERRY COMPUTER) 1943 Alan Turing (British mathematician who made history) used vacuum tube technology to build British COLOSSUS, to counteract the German Code scrambling device (Enigma) 1944 Howard Aiken is a Ph. D. student at Harvard University when he built the MARK (the first automatic sequence-controlled calculator, use by military to compute ballistic data, with a capacity of 23 digits plus sign) 1945 Presper Eckert and John Mauchly built the ENIAC (ELECTRONIC NUMERICAL INTEGRATORS AND COMPUTER) the second general purpose electronic digital computer, was over 1,000 times faster than Mark I and could perform 5,000 additions per second 1949 Maurice Wikes built the EDSAC (ELECTRONIC DELAY STORAGE AUTOMATIC CALCULATOR) the firs stored program computers 1949 Presper Eckert, John Mauchly and John Von Neumann built the EDVAC (ELECTRONIC DISCRETE VARIABLE AUTOMATIC COMPUTER) 1949 An Wang developed Magnetic Core Memory (was the fastest type memory until the 1980s) 1949 Jay Forrester organized magnetic core memory to be more efficient 1950 Alan Turing built the ACE which some consider it to be the first programmable digital computer 1950 Grace Hopper (found the first Computer Bug) developed the UNIVAC I Compiler 1951 Presper Eckert and John Mauchly built UNIVAC I (UNIVERSAL AUTOMATIC COMPUTER I) - the first computer designed and sold commercially (specifically for business data processing applications) 1957 John Backus, one of a group of IBM engineers to develop FORTRAN or FORmula TRANslation (is an example of high level programming language) 1959 Jack Kilby and Robert Noyce developed and perfected the IC (INTEGRATED CIRCUIT ) also known as CHIP 1961 Grace Hopper developed COBOL (COMMON BUSINESS ORIENTED LANGUAGE) 1963 Ken Olsen founded DEC (Digital Equipment Corporation) and produced the PDP 1 (the first minicomputer) 1965 John Kemeny and Thomas Kurts developed BASIC (BEGINNERS ALL-PURPOSE SYMBOLIC INSTRUCTION CODE) programming language the objectives of this programming language to help teach people how to program 1968 Robert Noyce and few friends founded INTEL 1969 U.S. Department of Defense started ARPANET (for research into networking) 1970 Hoff developed the famous INTEL 4004 microprocessor chip 1972 the first international connections to ARPANET are established 1975 Robert (father of microcomputer) designed ALRTAIR 8800 which is the first microcomputer 1975 Bill Gates and Paul Allen formed the Microsoft 1976 Wozniak and Jobs founded the Apple Computer, Inc. 1976 - Cray developed CRAY I SUPERCOMPUTER 1977 Steve Jobs and Steve Wozniak designed and built the first APPLE MICROCOMPUTER 1982 William Gibson invented the term cyberspace 1985 Alexey Pazhitnov (Russian) wrote the Tetris 1985 Philips invented the CD-ROM 1988 Robert Morris lunched an Internet WORM 1989 Tim Berners-Lee (who saw the need for a global information exchange) invented the World Wide Web 1977 IBMs Deep Blue (the first computer to beat a reigning World Chess Champion, Gary Kasparov) Amdahl designed the IBM SYSTEM / 360 series mainframe computers (the first general purpose digital computers to use integrated circuits) Daniel Bricklin and Bob Frankston designed the VISICALC (VISIBLE CALCULATOR) the first spreadsheet program / an electronic spreadsheet.TECHNOLOGICAL EVOLUTION OF COMPUTERS1. First Generation (1951 - 1959) Computers were powered by thousands of VACUUM TUBES (can store data in memory).2. Second Generation (1959 - 1965) TRANSISTOR were smaller, faster and cheaper, required less power, and produced less heat than vacuum tubes.3. Third Generation (1965 - 1971) INTEGRATED CIRCUITS / ICs / CHIP a single wafer that can hold many transistor and electronic circuits.4. Fourth Generation (1971 - PRESENT) Computers lie in the technique of implementation of integrated circuits by using Large Scale Integration (LSI) of chips with several thousand transistors. In the middle of 1970s the development of Very-Large-Scale Integration (VLSI) produced a chip containing a MICROPROCESSOR5. Fifth Generation (FUTURE) Creation and use with Artificial Intelligence (AI) ARTIFICIAL INTELLIGENCE (AI) indicates the ability to perform humanlike thinking and reasoning.COMPONENTS OF A COMPUTER SYSTEMThe Elements of a Computer System1. PEOPLE. People are the most important element of a computer system. They use and operate the computer.2. SOFTWARE. Software is the programs or instructions that a computer must follow to do its task. The purpose of software is to process data into useful information for people. Software gives flexibility to computers.3. HARDWARE. Hardware id the physical equipment that you can feel and touch. The hardware needs software to function properly. Hardware comes in a variety of shapes, size, price, and computing power.4. DATA. Raw data are normal inputs entered into the computer. The software installed in the computer determines largely the resulting output. Processed data are called information and they are useful to people.5. CONNECTIVITY. A computer must be connected to other computers especially through the internet. Using the internet, people can share and access data and greatly expand ones capability and reach.6. PROCEDURE. The step by step instructions to follow when using hardware, software and data. The procedures are normally written in manuals of hardware and software manufacturer.

Capabilities of Computers1. SPEED. Computer operates on data and commands at incredibly fast speed. Billions or trillions of operations are done by the computer in a second.2. STORAGE. Computer can store enormous amount of data and information in its memory. This information easily transferred and used anytime and anywhere3. RELAIBILITY. Computers made of modern technology rarely breakdown and when they are easily repaired. They could operate the whole day, even months and years without interruption in some application.4. CONSSISTENT. If you input the same data into the computer using the same program, it will give you the same result all the same.5. COMMUNICATE. Computers have made it possible to talk and see other people. Information n all forms is shared faster and easier as well.Dangers of Using Computer1. SAFETY. Be careful in using sharing personal information.2. HEALTH RISK. Long and improper use of the computer can lead to injuries and hazards to the user.3. ENVIRONMENT. Old computer must be disposed off properly. Computer parts could release toxic or dangerous materials into the environment. Heat generated by the computer maybe small but if there are so many they could add to pollution and global warming, contributing to an already fragile worldwide environmental condition.4. USE OF POWER. Computers need electricity to run.5. PRIVACY VIOLTION. Personal information when stored in a computer can be viewed and stolen.Limitations of Computer1. Dependence on prepared instructions.2. It is subject to human control.3. It cannot correct wrong instructions.4. It is subject to occasional breakdown.CLASSIFICATION OF COMPUTERAccording to Capacity1. SUPERCOMPUTERS. The fastest computers in the world. They have very high processing capacity, speed of calculation, and are able to perform multiple tasks.2. MAINFRAME COMUTERS. Refers to computers manufactured by IBM that are compatible and descendant of the system/360 line. They are used by large corporations and organizations for bulk data processing such as bank transactions, consumer statistics and large database. They are less powerful than the supercomputers but are still capable of great processing speeds, multi-tasking capability and high data storage.3. SERVER COMPUTERS. Used as the main computers in a network serving and connected to several to other computers. They have the capability to handle multiple requests for data and other processing tasks.4. PERSONAL COMPUTERS. A computer designed to be operated by an individual whose size, price, and capabilities are determined by the usual application the person uses it for.

COMPUTER HARDWARE

1. PROCESS DEVICES

a) CPU(Central Processing Unit) the brain of computerMOCROPROCESSOR small chip contained inside a CPU. Controls the flow of data throughout the computer system.3 BASIC COMPONENTS: ALU (Arithmetic Logic Unit) does the arithmetic and logical operaions of the computer. CONTROL UNIT it directs the sequence of operation that the CPU follows. MEMORY UNIT holds or manages every data. b) MOTHERBOARD (SYSTEM BOARD) the main base of the computer hardware systemc) VIDEO CARD (GRAPHICS ACCELERATO CARD/GRAPHICS CARD) a computer component whose main function is to generate video and images to a monitor.

2. INPUT DEVICES used to input data into the computer. Tools used to feed data into the computer and permit the communication between the user and the computer.EXAMPLES:Keyboard, Mouse, Scanner, Digital Camera, Video Recorder, Microphone, Joystick, Gamepad.

3. OUTPUT DEVICES allow the user to see the result of the data that has been processed.- The data entered into the computer into a form such as printed reports or visual display.EXAMPLES:Monitor, Printer, Speaker, Projectors

INPUT/OUTPUT DEVICES computer components that function as input and output devices.EXAMPLES:a) MODEM (Modulator Demodulator) a communication device that allows the computer to receive and send data and information to and from the other computers.b) TOUCH SCREEN - a display that can sense the incidence and position of a touch within the screen area.c) HEADSET a device that has a microphone and a headphone.

4. STORAGE DEVICES where data is kept for future use- retains information even when power is turned off.

STORAGE a means to hold and store data, programs, and information for the present and future use.VOLATILE STORAGE a storage that loses its contents when power is off.EXAMPLES: RAM, Register

NON-VOLATILE STORAGE the storage that retains its contents,EXAMPLES: Floppy disk, Optical Disc, Flash Drives, Memory Card, Hard Disk, and Solid-state Disk

WRITING is the process of saving data, programs and information into the storage device.READING is the process of retrieving data, programs and information from the storage device.

3 KINDS OF MEMORY

a. RAM (Random Access Memory)b. ROM (Read Only Memory)c. CMOS (Complimentary Metal-Oxide Semiconductor)

SOFTWARE

COMPUTER SOFTWARE is a set of instruction that tells the computer what to do and how to arrive at a desired result.

SOFTWARE PIRACY the unauthorized duplication or use of computer software.

1. SYSTEM SOFTWARE set of rules on hoe the hardware and software should work together.- They are also used as a base to launch application software and make them work with the hardware resources.

A. OPERATING SYSTEM a program responsible for the coordination, management and sharing of hardware resources and tasks in the computer. WINDOWS MACINTOSH LINUX

B. UTILITY SOFTWARE a program that performs maintenance tasks.

C. DEVICE DRIVER a program that allows a particular hardware device to work and communicate with the computer system.

2. APPLICATION SOFTWARE program that performs specific tasks.a. WORD PROCESSOR a program that allows the user to create and change documents or reports.b. SPREADSHEET a program where rows and columns of data organized and calculations are performed.c. PRESENTATION SOFTWARE used to convey information, ideas, messages, or products to a target group of persons.d. DATABASE PROGRAM created to organize data and information in a manner desired by the user.e. GRAPHICS SOFTWARE a program for drawing and coloring. They can also edit pictures.f. VIDEO SOFTWARE a program allows user to create, modify and enhance, add and remove segments and other effects a user may want to apply to video files.g. COMPUTER AIDED DESIGN (CAD) SOFTWARE a program optimized for designing and drawing of houses, buildings, cars, airplanes and other machineries.h. ELECTRONIC MAIL (E-MAIL) used to compose, send and receive messages from a mail server.i. INTERNET BROWSER used to find and view web pages.

INFORMATIONWhy people require information? ENLIGHTENMENT and ENTERTAINMENT

How people require information? Viewing television Watching movies Listening to the radio Reading magazines, books, news paper Browsing internet (Researching) Interviewing people

DATA vs. INFORMATION

Data derived from the Latin datum Given or fact (form of a number, statement or a picture) The raw material in the production of information

Information - data that have been collected and process into a meaningful form. Processed data Information refers to the knowledge obtained from reading, investigation, study or research.Data Processing manipulation of data to produce meaningful information

CHARACTERISTICS OF USEFUL INFORMATION

1. RELEVANT Information must pertain to the problem at hand.2. COMPLETE Partial information is often worse than no information.3. ACCURATE Erroneous information might lead to disastrous decisions.4. CURRENT Decisions ore often based on the latest information available.5. ECONOMICAL In a business setting, the cost of obtaining information must be considered as one cost element involved in any decision.

COMMMUNICATION

COMMUNICATION - is an act of transmitting messages. It is a process whereby information is exchanged between individuals by symbols, signs or verbal interactions Communication is important in order to gain knowledge. With knowledge, we are more confident in expressing our thoughts and ideas.

TECHNOLOGY - is the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs. Technology is vital in communication.

Aiding CommunicationTelephone and fax machines are the devices used in extending communication.

Spreading InformationTo broadcast information such as news or weather reports effectively. Radio, television, satellites and the World Wide Web (www) are powerful tools that can be used.

TECHNOLOGY TIMELINE

TechnologyYear

In 3500 BC, the Sumerians developed cuneiform writing.

In 1500 BC, the Phoenicians developed the alphabet

In 105 BC, Tsai Lun of China invented paper.

In 1454, the first printing began with the creation of a printing machine.

In 1793, the telegraph line was invented.

In 1876, the first telephone was introduced.

In 1925, television was made known to public.

In 1941, the computer was created.

In 1958, the photocopier machine was introduced.

In 1963, the communication satellite was introduced.

In 1969, the first Internet known as ARPANET was introduced.

INFORMATION AND COMMUNICATION TECHNOLOGY - is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.USAGE OF ICT IN DAILY LIFESCHOOL

TeachersTeachers use computers to research for teaching materials, participate in online forums and online conferences as well as to aid their teaching.

StudentsStudents use the computers as a reference tool. They use computers to browse the internet to look for information.

ResearchersResearchers use computers to collect and process data.

School AdministratorSchool administrators use computers for administrative purposes to make sure that the entire operation runs smoothly.

BANKINGElectronic banking provides 24 hour services. The services include: Automated Teller Machine (ATM) Cheque Deposit Electronic Fund Transfer Direct Deposit Pay by phone system Personal computer banking/ internet banking

BusinessmenBusinessmen can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.

Bank administratorsBank administrators can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic transfer and others by referring to the banking system.

INDUSTRY

WorkersWorkers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.

Researchers

Researchers use computers to analyze and collect research data for future reference.

AdministratorsAdministrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

E-COMMERCE

CustomersCustomers use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.

SuppliersSuppliers use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.

EmployeesEmployees use computers and telephones to communicate with their customers for any enquiries.The system helps employees to get the latest updates on inventory to be informed to the customers.

OTHER SECTOR

IMPACT OF ICT ON SOCIETY1. Faster communication speed2. Lower communication cost3. Reliable mode of communication4. Effective in sharing of information5. Paperless environment6. Borderless of communication7. Social problems8. Health problems

THE TEN COMMANDMENTS OF COMPUTER ETHICS

1. You shall not use a computer to harm other people.2. You shall not interfere with other people's computer work.3. You shall not snoop around in other people's computer files.4. You shall not use a computer to steal.5. You shall not use a computer to bear false witness.6. You shall not copy or use proprietary software for which you have not paid.7. You shall not use other people's computer resources without authorization or proper compensation.8. You shall not appropriate other people's intellectual output.9. You shall think about the social consequences of the program you are writing or the system you are designing.10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.

UNETHICAL COMPUTER CODE OF CONDUCTS

Examples of unethical computer code of conducts include:

modifying certain information on the Internet, affecting the accuracy of the information selling information to other parties without the owners permission using information without authorization involvement in stealing software invasion of privacy

ETHICAL COMPUTER CODE OF CONDUCTS

Examples of ethical computer code of conducts include: sending warning about viruses to other computer users asking permission before sending any business advertisements to others using information with authorization

INTELLECTUAL PROPERTY RIGHTSIntellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place. In our daily lives, we are surrounded by things that are protected by IP.INTELLECTUAL PROPERTY LAW - cover ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes and more.

INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWSAs businesses continue to expand globally, business owners must realize the importance of getting professional advice on how to establish and safeguard their intellectual property rights. These include:

Trademarks Service marks Trade/company names Domain names Geographical indications Copyrights Patents

INTELLECTUAL PROPERTY PROTECTION Patents for inventionsUtility, design or plant patents that protect inventions and improvements to existing inventions

Trademarks for brand identity Words, names, symbols, devices and images that represent products, goods or services

Design for product appearanceLiterary and artistic material, music, films, sound recordings and broadcasts, including software and multimedia

Copyright for materialThe features of, in particular, the lines, contours, colors, shape, texture or material of the product itself or its ornamentation

PRIVACY IN COMPUTER USAGE

Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

WHAT IS PRIVACY?

Privacy in IT refers to data and information privacy. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.How does computer technology threaten the privacy of our data? It is done through:

Cookies - enable web sites to collect information about your online activities and store them for future use, and then the collected details will be sold to any company that requests for it.

Electronic profile - electronic profile is the combining of data in a database that can be sold to the Internet by the company to the interested parties.

Spyware - refers to a program that collects user information without the users knowledge. Can enter computers, sneaking in like a virus.

PRIVACY CAN BE PROTECTED BY?Utilities software Example: anti-spam program, firewall, anti-spyware and antivirus.

AUTHENTICATIONSAuthentication is a process where users verify that they are who they say they are. The user who attempts to perform functions in a system is in fact the user who is authorized to do so.

METHODS OF AUTHENTICATION

1. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database.

BIOMETRIC DEVICES

Fingerprint Recognition In order to prevent fake fingers from being used, many biometrics fingerprint systems also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.

Facial Recognition Facial recognition analyses the characteristics of an individual's face images captured through a digital video camera. Facial recognition is widely used, touted as a fantastic system for recognizing potential threats (Whether terrorists, scam artists, or known criminals).

Hand Geometry Scanning Hand scanning involves the measurement and analysis of the shape of one's hand.

Iris Scanning Iris scanning analyses the features that exist in the colored tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.

Retinal Scanning Retinal biometrics involves the scanning of retina and analyzing the layer of blood vessels at the back of the eye.

Voice Recognition Voice recognition system compares a persons live speech with their stored voice pattern.

Signature Verification System Signature verification system uses special pen and tablet. After pre-processing the signature, several features are extracted.

2. Callback system refers to the checking system that authenticates the user.

The callback system is commonly used in the bank operation and business transaction.For example, when you book for the taxi service, the operator will ask you to hang up and she will call you back to confirm for the service required.

VERIFICATION

Verification is the act of proving or disproving the correctness of a system with respect to a certain formal specification.

METHODS OF VERIFICATION

1. USER IDENTIFICATIONUser identification refers to the process of validating the user.The examples of validating process using the user identification are: Key in the user name to log-in to a system and the system will verify whether the user is valid or invalid user Show the exam slip to verify that you are the valid candidate for the exam. Show a passport before departure.

2. PROCESSED OBJECTProcessed object refers to something the user has such as identification card, security token and cell phone.

The examples of validating process using the processed object are: the policeman will check on the drivers license to identify the valid driver employees have to swipe their security card to enter the building buy blouses at the mall using a credit