Podcast
Questions and Answers
What are the three broad disciplines in higher education that produce the majority of entry-level employees in the computer industry?
What are the three broad disciplines in higher education that produce the majority of entry-level employees in the computer industry?
What is computer information systems (CIS)?
What is computer information systems (CIS)?
What is computer science (CS)?
What is computer science (CS)?
What is computer engineering (CE)?
What is computer engineering (CE)?
Signup and view all the answers
A web application is a web site that allows you to access and interact with software from any computer or device that is connected to the internet.
A web application is a web site that allows you to access and interact with software from any computer or device that is connected to the internet.
Signup and view all the answers
What is the difference between a 'lossy' and a 'lossless' file compression method?
What is the difference between a 'lossy' and a 'lossless' file compression method?
Signup and view all the answers
What are some ways to protect your personal information online?
What are some ways to protect your personal information online?
Signup and view all the answers
What is ergonomics, and why is it important in the workplace?
What is ergonomics, and why is it important in the workplace?
Signup and view all the answers
A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
Signup and view all the answers
What are the different types of network topologies?
What are the different types of network topologies?
Signup and view all the answers
The internet originated as ARPANET in September 1969 with the goal of allowing scientists at different locations to share information and work together.
The internet originated as ARPANET in September 1969 with the goal of allowing scientists at different locations to share information and work together.
Signup and view all the answers
What is the difference between a URL and a Web address?
What is the difference between a URL and a Web address?
Signup and view all the answers
What are some examples of Internet services, besides e-mail?
What are some examples of Internet services, besides e-mail?
Signup and view all the answers
A cookie is a small file on your computer that contains data about you.
A cookie is a small file on your computer that contains data about you.
Signup and view all the answers
What is the purpose of a firewall in computer security?
What is the purpose of a firewall in computer security?
Signup and view all the answers
What is the difference between 'hardware theft' and 'hardware vandalism'?
What is the difference between 'hardware theft' and 'hardware vandalism'?
Signup and view all the answers
A 'back door' is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource.
A 'back door' is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource.
Signup and view all the answers
Computer vision syndrome (CVS) is a condition that can cause eye strain, headaches, and blurred vision.
Computer vision syndrome (CVS) is a condition that can cause eye strain, headaches, and blurred vision.
Signup and view all the answers
What is the main purpose of 'green computing'?
What is the main purpose of 'green computing'?
Signup and view all the answers
Study Notes
Module 1: Introduction to the Profession
- Module 1 introduces the computing profession
- FEU Alabang, FEU Diliman, and FEU Tech are involved in this module
- The module is technology-driven by innovation
- Subtopic 1: Introduction to the Computing Industry
- Objectives of this subtopic include Understanding different knowledge areas in computing Describing career opportunities available in various computer industry segments
Subtopic 1 (cont.): What is Computer Science?
- Computer science encompasses theory, programming, and cutting-edge computing solutions
- It provides a foundation for adapting to new technologies and ideas
- Computer science programs usually require a mathematical background
- Computer scientists' work falls into three categories Designing and building software Developing effective computing solutions (e.g., database management, network transmission, security) Devising innovative ways of using computers (e.g., robotics, computer vision, digital forensics)
Subtopic 1 (cont.): What is Information Systems?
- Information Systems (IS) focuses on the information computer systems provide to organizations for goal attainment -IS professionals understand both technical and organizational factors
- IS aids organizations in defining and achieving goals by enabling better business processes.
Subtopic 1 (cont.): What is Information Technology?
- Information technology (IT) is used as a label for all computing
- As an undergraduate degree course, it prepares students to meet the computer technology needs of various organizations (e.g., business, government, healthcare)
- IT professionals handle both information technology infrastructure and users
- They select, integrate, and manage hardware and software for the organization.
Subtopic 1 (cont.): The Computer Industry
- Computer industry professionals are in high demand currently, at roughly 10.5 million workers
- The growth rate for workers in the field is estimated at 2–3% annually.
- The number of students majoring in computer-related fields is declining
Subtopic 1 (cont.): Careers in the Computer Industry
- Various job opportunities within the computing industry are available across several sectors
- Businesses, government, computer equipment, computer software, computer education/training, and computer repair fields
- IT consulting field
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- An information technology (IT) department is a department in a business or government agency employing computer-related personnel
- Responsibilities include smooth operation of computer and network operations
Subtopic 1 (cont.): Working in an IT Department
- Various jobs are available in an IT department including Management, Development & Programming, Technical Services, and Operations
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- The computer equipment field involves manufacturers and distributors of computers and computer-related hardware
- Related career paths involve design, manufacture, production of computer equipment.
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- The computer software field contains companies that develop, manufacture, and support software
- Related career paths include projects, programmimg, software engineers, computer scientists
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- Computer service and repair is a field focused on providing preventative maintenance, component installation, and repair to hardware
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- Careers in computer sales require general computer knowledge, and specific knowledge about the products.
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- Computer education and training involves educators and trainers in school, colleges, and private institutions
- Trainers train employees to use software, design system and program
Subtopic 1 (cont.): Careers in the Computer Industry (cont)
- IT consultants are professionals with expertise in a computer area
- IT consultants provide specialized support in computer selection, system design, communications, hardware and software configuration, and web development
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry
- Three main disciplines producing entry-level employees in the computer industry are Computer Information Systems, Computer Science/Software Engineering, and Computer Engineering
- Descriptions of the respective certifications and educational requirements for each discipline are provided in module one.
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)
- Computer information systems (CIS) programs emphasize technical knowledge and skills
- Sometimes called management information systems (MIS) or management information technology
- Key computer coursework includes introduction to computers, object-oriented programming, networks, computer operating systems, systems analysis and design, software engineering, data and file structures, computer operating systems, and artificial intelligence
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)
- Computer science (CS) programs stress the theoretical aspects of programming and operating systems
- These programs are also known as software engineering and include courses on introduction to computers, object-oriented programming, data communications, systems analysis, design, software engineering, and computer and file structures
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)
- Computer engineering (CE) programs teach the design and development of electric components in computers and their peripherals and components
- Topics covered in these programs include application and systems programming, data and file structures, networks, and operating systems
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)
- Companies advertise computer-related job openings on specialized Web sites that allow job seekers to submit their resumes online.
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): Professional Organizations
- The Association for Computing Machinery (ACM) and the Association of Information Technology Professionals (AITP) are among several organizations for computer professionals.
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): User Groups
- User groups are collections of people with shared computer equipment or software interests. Examples include Apple User Groups, Association of Personal Computer User Groups (APCUG), and Linux Users Groups WorldWide (LUGWW).
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont):: Professional Development
- Continuing education and professional development in computer fields includes conferences, workshops, seminars, and trade shows (e.g. CES)
- Training can include books, video-based and web-based training, and instructor-led training.
Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): Keeping Up-to-Date
- Staying current in the computer industry involves reading computer industry publications, technical blogs, and web sites
- These provide daily or weekly updates, news, information.
References
- A list of cited references is included, providing the source for the information in this module. (The list is not a complete reference list, but an abbreviated version of the references).
Module 2: Introduction to Computer
- Module 2 introduces basic computer concepts and applications
- Subtopic 1: Computer Basics
- Discusses evolution of computer systems, definitions of computer terminologies, elements of computer systems, computer literacy, and data and information value.
Module 2: Introduction to Computer (cont.) Elements of Computer System
- A computer system encompasses hardware, software, data, procedures, and people to operate the system.
Module 2: Introduction to Computer (cont.) Categories of Computer
- Computer categories include personal computers, mobile computers and mobile devices, game consoles, servers, mainframes, supercomputers and embedded computers
Module 2: Introduction to Computer (cont.) Personal Computer
- Personal computers can perform input, processing, output, and storage functions independently
Module 2: Introduction to Computer (cont.) Mobile Computers and Mobile Devices
- Mobile computers and mobile devices include notebook computers, laptop computers, netbooks, ultra-thin devices, tablets, smart phones, PDAs, e-book readers, handheld computers, portable media players, and digital cameras.
Module 2: Introduction to Computer (cont.) Game Console
- Game consoles are mobile computing devices designed for video games (single or multiplayer)
Module 2: Introduction to Computer (cont.) Server
- Servers control access to hardware, software, and other network resources
- They provide centralized storage for programs, data, and information.
Module 2: Introduction to Computer (cont.) Mainframe
- Mainframes are large, expensive, powerful computers capable of handling hundreds or thousands of users at once
Module 2: Introduction to Computer (cont.) Supercomputer
- Supercomputers are the fastest most powerful computers and are capable of processing trillions of instructions per second
Module 2: Introduction to Computer (cont.) Embedded Computer
- Embedded computers are special-purpose computers that function as components within larger products, including consumer electronics, home automation devices, automobiles, process controllers and robots, and computer devices and office machines
Module 2: Introduction to Computer (cont.) Evolution of Computer
- This section traces the history of computing devices starting from the Abacus, Napier's Bones, the Slide rule to Jacquard Loom and the Analytical Engine and the advancements in the computer that include the use of electricity, transistors, and microchips to the evolution of computers, including the appearance of the IBM 5100 and Altair 8800 computers up to the fifth generation (2010-present) that uses AI (Artificial Intelligence)
Module 2: Introduction to Computer (cont.) Advantages and Disadvantages of Computers
- Computers offer speed, reliability, consistency, and storage. Disadvantages include health risks, violations of consumer privacy and public safety, impact on the labor force, and environmental impact
Module 2: Introduction to Computer (cont.) Green Computing
- Techniques for reducing electricity and environmental waste in computer use are presented, including recycling, regulating manufacturing processes, and extending the life of computers to reduce waste and environmental impact
References
- A list of cited references is included, which was summarized from the slides and pages shown in the original text provided.
Module 2: Introduction to Computer (cont.) Uses and Applications of Computer
- The Module discusses how home users, small office/home office users, mobile users, power users, and enterprise users utilize computers and the various applications computers serve
Module 2: Introduction to Computer (cont.) Elements of an Information System
- Basic elements of an information system include hardware, software, data, procedures, and people
Module 2: Introduction to Computer (cont.) How the Elements of an Information System Interact
- Explains how the different elements of an information system interact in an enterprise environment
Module 2: Introduction to Computer (cont.) Hardware Elements
- Components of computer hardware relevant to input, output, system unit, storage, and communication devices.
Module 2: Introduction to Computer (cont.) Software Elements
- System software controls the computer's operations (includes operating system and utility programs)
- application software is used for specific tasks, including business, home, personal, educational
Module 2: Introduction to Computer (cont.) Data
- Data is the raw material, unprocessed, and meaningless and is transformed into information
Module 2: Introduction to Computer (cont.) People
- People are an important element in an information system because they are responsible to operate software, input data, maintain, and ultimately determine the success or failure of a computerized information systems.
Modules 2: Introduction to Computer (cont.) Procedures
- Procedures are the steps necessary to accomplish tasks involving a computer. Computer literacy involves understanding common procedures.
Module 2: Introduction to Computer (cont.) What are Data and Information?
- Data is unprocessed information; Information is processed data
Module 3: Hardware Components of Personal Computer (cont.) Introduction
- Module presents hardware components of personal computers(PC)
Module 3: Hardware Components of Personal Computer (cont.) The System Unit
- The system unit, which is not the CPU, is a case containing electronic components used to process data
- The system unit includes many components including: drive bays, power supply, sound card, video card, processor, and memory
Module 3: Hardware Components of Personal Computer (cont.) Motherboard
- A motherboard is the main circuit board containing integrated circuits
Module 3: Hardware Components of Personal Computer (cont.) The Processor
- The processor, or CPU, interprets and executes computer instructions; the CPU is made of a control unit and an arithmetic logic unit; and these units have different types and categories.
Module 3: Hardware Components of Personal Computer (cont.) The Processor (cont.)
-
The pace of the system clock is measured in gigahertz (GHz) and is the system's processing speed
-
A machine cycle includes four steps-Fetch, Decode, Execute and Store, describing the cycle of processing in the computer
Module 3: Hardware Components of Personal Computer (cont.) Memory and Storage
- This segment discusses the different types and characteristics of memory, memory size, and volatile and non-volatile memory (RAM, ROM, and CMOS)
Module 3: Hardware Components of Personal Computer (cont.) Different Storage Devices
- Storage devices include hard disk drives (HDDs or hard drives), DVD, and Blu-ray Discs, USB flash drives, and memory flash cards
Module 3: Hardware Components of Personal Computer (cont.) Input and Output Devices
- Input devices are used to enter data and instructions into a computer, e.g. keyboard, mouse, joysticks, scanners, digital cameras, microphones.
- Output devices display information, e.g. monitor, printers, speakers.
References
- A list of cited references is included, summarizing references from the original text
Module 4: Number Systems
- Module 4 presents the different numbering systems including Decimal, Binary, Octal, and Hexadecimal
Module 4: Number Systems (cont.) Number System Conversions
- Methods of converting between number systems such as Binary to Decimal, Decimal to Binary, Octal to Decimal, and Hexadecimal to Decimal, as well as Binary to Octal, and Binary to Hexadecimal are presented
Module 4: Number System (cont.) Addition and Subtraction of Number Systems
- Addition and subtraction of Binary numbers, Octal numbers, and Hexadecimal numbers are presented
References
- A list of references summarizing material from the original text is included.
Module 5: Software
- This module covers different types of software-System software and Application software, including several utility programs and software
Module 5: Software (cont.): System Software
- System software describes operating system and utility programs
Module 5: Software (cont.): Operating Systems
- An operating system (OS) is a set of programs. including boot drives, device drivers; various functions and types of Operating Systems; examples include Windows 7, Mac OS, UNIX, and Linux
Module 5: Software (cont.) Utility Programs
- A utility program enhances system operations
- Utility programs include file managers, search utilities, image viewers, disk cleanup and defragmentation programs, backup utility. recovery utilities, personal firewalls, screen savers, antivirus programs, spyware removers, adware removers, filters, compression utilities, media players, and disc-burning programs
Module 5: Software (cont.) Application Software
- Application software contains categories of business programs, graphics, personal/educational software, and web application software
Module 6: Information Systems and Database
- Describes the components of an information system and provides various definitions of an information system (IS), explaining the following elements- hardware, software, data, procedures, and people.
Module 6 (cont.): Introduction to Information Systems and Database
- This module further describes database concepts and their importance, explaining how various databases function, as well as the different types of relationships that exist within relational databases
Module 6 (cont.): Basic Database Terminologies
- Components of a database include tables, record, field, data values, queries, forms, and reports.
Module 6 (cont.): Relationships in Database
- Discusses One-to-One, One-to-Many, and Many-to-Many relationships in a database
Module 6 (cont.): Primary Keys and Foreign Keys
- Explains primary keys and foreign keys within a relational database, providing examples.
Module 6 (cont.): Purpose and Importance of Database Systems
- Discusses the problems database systems address in contrast to using a file system to store data
Module 7: Network and Internet
- Covers computer networks
- Different network topologies include bus topology, ring topology, star topology, mesh topology, and hybrid topology (which is a combination).
Module 7: Network and Internet (cont.) Introduction to Computer Networks and Internet
- Details of computer networks and the Internet, different types of networks (LAN, PAN, MAN, WAN, HAN, Internet)
Module 7: Network and Internet (cont.) Network Topologies
- Description of various network topologies - bus, ring, star, mesh, and hybrid
Module 7: Network and Internet (cont.) The Internet
- Information about the types of Internet use cases and origins of the Internet (ARPANET)
- A discussion of various providers, including ISPs (internet service providers) is provided
Module 7: Network and Internet (cont.) The Web
- Discusses the World Wide Web and web browsers
Module 7: Network and Internet (cont.): The World Wide Web
- Discusses tabs in Web browsers, search engines, and subject directories
Module 7 (cont.): The World Wide Web(cont.)
- Describes Web publishing and how content is used to create web pages and their associated files; includes descriptions of various types of Web sites
Module 7 (cont.) Other Internet Services
- Different Internet services, including e-mail, instant messaging (IM), and chat rooms, Voice over IP (VoIP) newsgroups, and message boards are detailed; and File Transfer Protocol (FTP) is described
Module 8: Computer Security, Ethics and Privacy
- This module combines computer security, ethics, and privacy
Module 8: Computer Security (cont.) Computer Security and Safety
- Module covers computer security risks and the various types of cybercriminals
Module 8: Computer Security (cont.) Computer Viruses, Worms, and Trojan Horses
- This module presents details of computer viruses, worms, and Trojan horses, explaining their characteristics describing examples of transmission. and prevention mechanisms, including setting macro security, installing antivirus programs; and using firewall programs
Module 8: Computer Security (cont.) Unauthorized Access and Use
- Details the means of preventing unauthorized computer access and use, and protecting computer systems
Module 8: Computer Security (cont.) What is a User Name and Password?
-Describes a unique combination of characters identifying a user, and the concept of passwords as private combinations of characters associated with the users that allow access to computer resources
Module 8: Computer Security (cont.) How can you make your password more secure?
- Presents the calculation of the increased security of passwords depending on the numbers of characters used
Module 8: Computer Security (cont.) What is a possessed object?
- Defines possessed objects as items that are necessary for computer or facility access. The use of the personal identification number (PIN) is an example.
Module 8: Computer Security (cont.) What is a Biometric Device?
- Biometric devices authenticate users' identity using personal characteristics, including fingerprints, hand geometry, voice, signature, and iris
Module 8: Computer Security (cont.) Hardware Theft and Vandalism
- Information about hardware theft and hardware vandalism: hardware theft is the act of stealing computer equipment and hardware vandalism defacing or destroying computer equipment.
Module 8: Computer Security (cont.): Software Theft
- Defines software theft-the act of stealing, illegally copying, or erasing software
- It also includes discussions on license agreements. Product activation, and the use of software alliances to deter software piracy
Module 8: Computer Security (cont.) Information Theft
- Defines encryption as the procedure for converting readable data into unreadable ciphertext, and then the steps necessary for decrypting the information
Module 8: Computer Security (cont.) Internet Security Risks
- Module explains the secure transmission of data via Web browsers. Discussions are included that describe certificate authorities (CAs). including their roles in guaranteeing the use of secure sites via digital certificates. It also explains the use of Secure Sockets Layer (SSL) as a method of securing data on the Internet and how a secure Web address begins with HTTPS.
Module 8: Computer Security (cont.) System Failure
- Discusses system failures, including the actions that lead to a failure of a computer system, including how surge protectors and maintenance utilities can help safeguard the system
Module 8: Computer Security (cont.) Backing Up-The Ultimate Safeguard
- Describes the importance of backups and different types of backups, including full backup of all files in a computer, selective backups of selected files, and three-generation backups
Module 8: Computer Security (cont.) Wireless Security
- Describes various activities to improve wireless security, including securing a WAP (wireless access point) and enabling Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)
Module 8: Computer Security, Ethics and Privacy (cont.) Health Concerns
- Presents various health concerns related to computers, including issues and precautions for the following health issues - computer vision syndrome, repetitive strain injury (RSI), computer addiction,, ergonmics and green computing
Module 8: Computer Security, Ethics and Privacy (cont.) Ethics and Society
- Provides definitions and a code of conduct that govern the use of computer technologies
Module 8: Computer Security, Ethics and Privacy (cont.) Information Privacy
- Describes information privacy, including electronic profiles and cookies for user preferences. A description of phishing, content filtering, and computer forensics is provided here
References
- A list of cited references is included, summarizing original text materials.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.