Upload
guestf7cf98
View
559
Download
5
Tags:
Embed Size (px)
DESCRIPTION
fcs computer rotation
Citation preview
11
99thth Grade Computer Grade ComputerScience RotationScience Rotation
Mr. Fedder/Mr. CrowleyMr. Fedder/Mr. Crowley
22
Why Learn About Why Learn About Computers?Computers?
33
““I’m not a techie”I’m not a techie”
44
True/False: 1950’s vs. True/False: 1950’s vs. 200520051.1. Homes are 20 times more expensive.Homes are 20 times more expensive.
2.2. Cars are 15 times more expensive.Cars are 15 times more expensive.
3.3. Computers are 100,000 times more Computers are 100,000 times more powerful.powerful.
4.4. The development and innovation of The development and innovation of computing technology has resulted in the computing technology has resulted in the greatest cultural revolution in the history greatest cultural revolution in the history of mankind.of mankind.
5.5. You will use computers in some form for You will use computers in some form for the rest of your life.the rest of your life.
55
FactorsFactors
INDUSTRY 1950 2005 FACTORHOMES
Size 983 2,230 2.3Cost 11,000$ 206,300$ 18.8
CARS 2,050$ 30,000$ 14.6
AIRPLANE - 1903 10 2,275 227.5
HUMAN - 1999 15.038 16.134 1.07
66
Number ScaleNumber Scale
Time to count to 1 Quadrillion?
1 count per second = 86,400 counts per day
1,000,000,000,000,000 ÷ 86,400 = 11,574,074,074 days
11,574,074,074 ÷ 365 = 31,710,000 years (Cenozoic Era)
THOUSAND
1,000
MILLION
1,000,000 1 Thousand Thousands
BILLION
1,000,000,000 1 Thousand Millions
TRILLION
1,000,000,000,000 1 Million Millions
QUADRILLION
1,000,000,000,000,000 1 Billion Millions
Kilo
Mega
Giga
Tera
Peta
77
INDUSTRY 19502007
SupercomputerFactor
(SC vs. 1950)
Computer
Memory(bytes) 200 4,000,000,000,000 10,250,000,000
Storage (bytes) 16,000 4,000,000,000,000 250,000,000
IPS 5,000 280,600,000,000 56,120,000,000
Cost $ 500,000 $128,000,000 256
INDUSTRY 1950 2005 PC
Factor(PC vs. 1950)
Computer
Memory(bytes) 200 1,000,000,000 5,000,000
Storage (bytes) 16,000 80,000,000,000 5,000,000
IPS 5,000 9,726,000,000 1,945,200
Cost $ 500,000 $ 1,000 0.0020
Factors - ComputersFactors - Computers
88
IBM Blue Gene - SupercomputerIBM Blue Gene - Supercomputer
99
True/False: 1950 vs. True/False: 1950 vs. 200520051.1. Homes are 20 times more expensive.Homes are 20 times more expensive.
2.2. Cars are 15 times more expensive.Cars are 15 times more expensive.
3.3. Computers are 100,000 times more Computers are 100,000 times more powerful.powerful.
4.4. The development and innovation of The development and innovation of computing technology has resulted in the computing technology has resulted in the greatest cultural revolution in the history greatest cultural revolution in the history of mankind.of mankind.
5.5. You will use computers in some form for You will use computers in some form for the rest of your life.the rest of your life.
1111
SpywareSpyware – Programs that record your surfing behavior and/or – Programs that record your surfing behavior and/or keystrokes and transmit the data to the collector’s database.keystrokes and transmit the data to the collector’s database.
VirusesViruses - Programs that piggyback on real programs. For example, a - Programs that piggyback on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too where it Each time the spreadsheet program runs, the virus runs too where it can reproducecan reproduce (by attaching to other programs) or wreak system havoc. (by attaching to other programs) or wreak system havoc.
E-mail VirusesE-mail Viruses – An E-mail virus is transmitted via e-mail messages – An E-mail virus is transmitted via e-mail messages and usually replicates automatically by mailing a copy of itself to and usually replicates automatically by mailing a copy of itself to dozens of people in the victim's e-mail address book. dozens of people in the victim's e-mail address book.
WormsWorms - Software that use computer networks and security holes to - Software that use computer networks and security holes to replicate itself. A copy of the worm scans the network for another replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from machine using the security hole, and then starts replicating from there, as well. there, as well.
Trojan HorsesTrojan Horses – A software program that claims to do one thing (it – A software program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate may erase your hard disk). Trojan horses have no way to replicate automatically. automatically.
Malicious SoftwareMalicious Software
1212
Malicious Software: Deal with Malicious Software: Deal with it!it! SpywareSpyware
Pay attention to what you click.Pay attention to what you click.
Don’t click on “too good to be Don’t click on “too good to be
true” ads.true” ads.
Google it! Check for hoaxes.Google it! Check for hoaxes.
Get Anti-Spyware software (2)Get Anti-Spyware software (2)
• Ad-AwareAd-Aware
• CounterSpyCounterSpy
• SpyBotSpyBot
1313
VirusesViruses Don’t click on Don’t click on executablesexecutables!!
Don’t open suspicious eMail.Don’t open suspicious eMail.
Install Anti-Virus SoftwareInstall Anti-Virus Software
Malicious Software How to Malicious Software How to Deal?Deal?
• AVG Anti-AVG Anti-
VirusVirus
• Anti-VirAnti-Vir
1515
Phishing Phishing ThreatThreat
1616
Computer TermsComputer Terms
01001101 = “M”BYTE
NIBBLE
1717
TermsTerms
MegaMega GigaGiga TeraTera NanoNano ENIACENIAC IBMIBM DECDEC AppleApple RFIDRFID
HardwareHardware SoftwareSoftware CPUCPU Disk/Hard DriveDisk/Hard Drive Batch Batch
ProcessingProcessing TimesharingTimesharing MIPS/FLOPSMIPS/FLOPS KiloKilo GUIGUI
1818
1.1 History of Computers1.1 History of Computers
NanocomputerCPUMemory Board
1919
1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s1941
1949
2020
1800 square feet, 30 1800 square feet, 30 tons and consumed tons and consumed 160 kilowatts of 160 kilowatts of electrical power. electrical power.
1000 times faster than 1000 times faster than any other calculating any other calculating machine to date. machine to date. Performed 5,000 Performed 5,000 additions (5 KIPS), 357 additions (5 KIPS), 357 multiplications or 38 multiplications or 38 divisions (FLOPS)divisions (FLOPS)
Programming ENIAC Programming ENIAC entailed flipping entailed flipping switches and moving switches and moving plug cords.plug cords.
Developed by John Developed by John Mauchley and J. Presper Mauchley and J. Presper EckertEckert
18 months and $500,000 18 months and $500,000 tax dollars to build.tax dollars to build.
Military Uses:Military Uses: Calculate trajectoriesCalculate trajectories Design hydrogen Design hydrogen bombbomb Weather predictionWeather predictionWind-tunnel design.Wind-tunnel design.
17,468 vacuum tubes, 17,468 vacuum tubes, 70,000 resistors, 10,000 70,000 resistors, 10,000 capacitors, 1,500 relays, capacitors, 1,500 relays, 6,000 manual switches 6,000 manual switches and 5 million soldered and 5 million soldered joints.joints.
1946 - ENIACENIACENIAC
1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s
21211946 - ENIAC
1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s
2222
1.1 History of Computers – 1.1 History of Computers – 1940’s1940’s
1945 - Vannevar Bush“As we May Think”
• Bush calls for a new relationship between “thinking man and the sum of our knowledge“.
•Proposes “Memex” - a machine that stores vast amounts of information, where users could:
Create information trails
Use Links b/n related texts and illustrations
Store data and use for future reference.