Untitled Quiz
19 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the three broad disciplines in higher education that produce the majority of entry-level employees in the computer industry?

  • Business, Government, and Finance
  • Information Systems, Software Engineering, and Data Science
  • Computer Education, Programming, and Network Administration
  • Computer Information Systems, Computer Science, and Computer Engineering (correct)
  • What is computer information systems (CIS)?

  • Programs that emphasize technical knowledge and skills (correct)
  • Programs that focus on the design and development of hardware components
  • Programs that emphasize the creation of visual aids for presentations
  • Programs that promote business and management practices for technology use
  • What is computer science (CS)?

  • Programs that equip students with the skills to manage large computer networks
  • Programs that stress theoretical side of programming and operating systems (correct)
  • Programs that explore advanced ethical and legal issues related to computing
  • Programs that focus on the practical application of computer technology in business settings
  • What is computer engineering (CE)?

    <p>Programs that focus on the hardware and software components of computer systems</p> Signup and view all the answers

    A web application is a web site that allows you to access and interact with software from any computer or device that is connected to the internet.

    <p>True</p> Signup and view all the answers

    What is the difference between a 'lossy' and a 'lossless' file compression method?

    <p>A lossy compression method permanently removes some data to reduce file size, while a lossless compression method preserves all data and can therefore fully restore the original file.</p> Signup and view all the answers

    What are some ways to protect your personal information online?

    <p>All of the above</p> Signup and view all the answers

    What is ergonomics, and why is it important in the workplace?

    <p>Ergonomics is the study of how people interact with their work environment. It aims to improve efficiency, comfort, and safety by designing workspaces, tools, and equipment that are well-suited to human capabilities.</p> Signup and view all the answers

    A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.

    <p>True</p> Signup and view all the answers

    What are the different types of network topologies?

    <p>Bus, Ring, Star, Mesh, and Hybrid</p> Signup and view all the answers

    The internet originated as ARPANET in September 1969 with the goal of allowing scientists at different locations to share information and work together.

    <p>True</p> Signup and view all the answers

    What is the difference between a URL and a Web address?

    <p>A URL (Uniform Resource Locator) is a complete web address that specifies the protocol, domain name, path, and file name of a web page. A Web address is a shorter version of a URL, typically consisting of only the domain name and file extension.</p> Signup and view all the answers

    What are some examples of Internet services, besides e-mail?

    <p>All of the above</p> Signup and view all the answers

    A cookie is a small file on your computer that contains data about you.

    <p>True</p> Signup and view all the answers

    What is the purpose of a firewall in computer security?

    <p>A firewall acts as a barrier between your computer and the outside world, blocking unauthorized access and protecting your system from malicious attacks.</p> Signup and view all the answers

    What is the difference between 'hardware theft' and 'hardware vandalism'?

    <p>Hardware theft involves stealing computer equipment, while hardware vandalism involves defacing or destroying computer equipment.</p> Signup and view all the answers

    A 'back door' is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource.

    <p>True</p> Signup and view all the answers

    Computer vision syndrome (CVS) is a condition that can cause eye strain, headaches, and blurred vision.

    <p>True</p> Signup and view all the answers

    What is the main purpose of 'green computing'?

    <p>Green computing focuses on reducing the environmental impact of computer technology by minimizing energy consumption, promoting recycling, and using sustainable materials.</p> Signup and view all the answers

    Study Notes

    Module 1: Introduction to the Profession

    • Module 1 introduces the computing profession
    • FEU Alabang, FEU Diliman, and FEU Tech are involved in this module
    • The module is technology-driven by innovation
    • Subtopic 1: Introduction to the Computing Industry
    • Objectives of this subtopic include Understanding different knowledge areas in computing Describing career opportunities available in various computer industry segments

    Subtopic 1 (cont.): What is Computer Science?

    • Computer science encompasses theory, programming, and cutting-edge computing solutions
    • It provides a foundation for adapting to new technologies and ideas
    • Computer science programs usually require a mathematical background
    • Computer scientists' work falls into three categories Designing and building software Developing effective computing solutions (e.g., database management, network transmission, security) Devising innovative ways of using computers (e.g., robotics, computer vision, digital forensics)

    Subtopic 1 (cont.): What is Information Systems?

    • Information Systems (IS) focuses on the information computer systems provide to organizations for goal attainment -IS professionals understand both technical and organizational factors
    • IS aids organizations in defining and achieving goals by enabling better business processes.

    Subtopic 1 (cont.): What is Information Technology?

    • Information technology (IT) is used as a label for all computing
    • As an undergraduate degree course, it prepares students to meet the computer technology needs of various organizations (e.g., business, government, healthcare)
    • IT professionals handle both information technology infrastructure and users
    • They select, integrate, and manage hardware and software for the organization.

    Subtopic 1 (cont.): The Computer Industry

    • Computer industry professionals are in high demand currently, at roughly 10.5 million workers
    • The growth rate for workers in the field is estimated at 2–3% annually.
    • The number of students majoring in computer-related fields is declining

    Subtopic 1 (cont.): Careers in the Computer Industry

    • Various job opportunities within the computing industry are available across several sectors
    • Businesses, government, computer equipment, computer software, computer education/training, and computer repair fields
    • IT consulting field

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • An information technology (IT) department is a department in a business or government agency employing computer-related personnel
    • Responsibilities include smooth operation of computer and network operations

    Subtopic 1 (cont.): Working in an IT Department

    • Various jobs are available in an IT department including Management, Development & Programming, Technical Services, and Operations

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • The computer equipment field involves manufacturers and distributors of computers and computer-related hardware
    • Related career paths involve design, manufacture, production of computer equipment.

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • The computer software field contains companies that develop, manufacture, and support software
    • Related career paths include projects, programmimg, software engineers, computer scientists

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • Computer service and repair is a field focused on providing preventative maintenance, component installation, and repair to hardware

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • Careers in computer sales require general computer knowledge, and specific knowledge about the products.

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • Computer education and training involves educators and trainers in school, colleges, and private institutions
    • Trainers train employees to use software, design system and program

    Subtopic 1 (cont.): Careers in the Computer Industry (cont)

    • IT consultants are professionals with expertise in a computer area
    • IT consultants provide specialized support in computer selection, system design, communications, hardware and software configuration, and web development

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry

    • Three main disciplines producing entry-level employees in the computer industry are Computer Information Systems, Computer Science/Software Engineering, and Computer Engineering
    • Descriptions of the respective certifications and educational requirements for each discipline are provided in module one.

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)

    • Computer information systems (CIS) programs emphasize technical knowledge and skills
    • Sometimes called management information systems (MIS) or management information technology
    • Key computer coursework includes introduction to computers, object-oriented programming, networks, computer operating systems, systems analysis and design, software engineering, data and file structures, computer operating systems, and artificial intelligence

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)

    • Computer science (CS) programs stress the theoretical aspects of programming and operating systems
    • These programs are also known as software engineering and include courses on introduction to computers, object-oriented programming, data communications, systems analysis, design, software engineering, and computer and file structures

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)

    • Computer engineering (CE) programs teach the design and development of electric components in computers and their peripherals and components
    • Topics covered in these programs include application and systems programming, data and file structures, networks, and operating systems

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont)

    • Companies advertise computer-related job openings on specialized Web sites that allow job seekers to submit their resumes online.

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): Professional Organizations

    • The Association for Computing Machinery (ACM) and the Association of Information Technology Professionals (AITP) are among several organizations for computer professionals.

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): User Groups

    • User groups are collections of people with shared computer equipment or software interests. Examples include Apple User Groups, Association of Personal Computer User Groups (APCUG), and Linux Users Groups WorldWide (LUGWW).

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont):: Professional Development

    • Continuing education and professional development in computer fields includes conferences, workshops, seminars, and trade shows (e.g. CES)
    • Training can include books, video-based and web-based training, and instructor-led training.

    Subtopic 1 (cont.): Preparing for a Career in the Computer Industry (cont): Keeping Up-to-Date

    • Staying current in the computer industry involves reading computer industry publications, technical blogs, and web sites
    • These provide daily or weekly updates, news, information.

    References

    • A list of cited references is included, providing the source for the information in this module. (The list is not a complete reference list, but an abbreviated version of the references).

    Module 2: Introduction to Computer

    • Module 2 introduces basic computer concepts and applications
    • Subtopic 1: Computer Basics
    • Discusses evolution of computer systems, definitions of computer terminologies, elements of computer systems, computer literacy, and data and information value.

    Module 2: Introduction to Computer (cont.) Elements of Computer System

    • A computer system encompasses hardware, software, data, procedures, and people to operate the system.

    Module 2: Introduction to Computer (cont.) Categories of Computer

    • Computer categories include personal computers, mobile computers and mobile devices, game consoles, servers, mainframes, supercomputers and embedded computers

    Module 2: Introduction to Computer (cont.) Personal Computer

    • Personal computers can perform input, processing, output, and storage functions independently

    Module 2: Introduction to Computer (cont.) Mobile Computers and Mobile Devices

    • Mobile computers and mobile devices include notebook computers, laptop computers, netbooks, ultra-thin devices, tablets, smart phones, PDAs, e-book readers, handheld computers, portable media players, and digital cameras.

    Module 2: Introduction to Computer (cont.) Game Console

    • Game consoles are mobile computing devices designed for video games (single or multiplayer)

    Module 2: Introduction to Computer (cont.) Server

    • Servers control access to hardware, software, and other network resources
    • They provide centralized storage for programs, data, and information.

    Module 2: Introduction to Computer (cont.) Mainframe

    • Mainframes are large, expensive, powerful computers capable of handling hundreds or thousands of users at once

    Module 2: Introduction to Computer (cont.) Supercomputer

    • Supercomputers are the fastest most powerful computers and are capable of processing trillions of instructions per second

    Module 2: Introduction to Computer (cont.) Embedded Computer

    • Embedded computers are special-purpose computers that function as components within larger products, including consumer electronics, home automation devices, automobiles, process controllers and robots, and computer devices and office machines

    Module 2: Introduction to Computer (cont.) Evolution of Computer

    • This section traces the history of computing devices starting from the Abacus, Napier's Bones, the Slide rule to Jacquard Loom and the Analytical Engine and the advancements in the computer that include the use of electricity, transistors, and microchips to the evolution of computers, including the appearance of the IBM 5100 and Altair 8800 computers up to the fifth generation (2010-present) that uses AI (Artificial Intelligence)

    Module 2: Introduction to Computer (cont.) Advantages and Disadvantages of Computers

    • Computers offer speed, reliability, consistency, and storage. Disadvantages include health risks, violations of consumer privacy and public safety, impact on the labor force, and environmental impact

    Module 2: Introduction to Computer (cont.) Green Computing

    • Techniques for reducing electricity and environmental waste in computer use are presented, including recycling, regulating manufacturing processes, and extending the life of computers to reduce waste and environmental impact

    References

    • A list of cited references is included, which was summarized from the slides and pages shown in the original text provided.

    Module 2: Introduction to Computer (cont.) Uses and Applications of Computer

    • The Module discusses how home users, small office/home office users, mobile users, power users, and enterprise users utilize computers and the various applications computers serve

    Module 2: Introduction to Computer (cont.) Elements of an Information System

    • Basic elements of an information system include hardware, software, data, procedures, and people

    Module 2: Introduction to Computer (cont.) How the Elements of an Information System Interact

    • Explains how the different elements of an information system interact in an enterprise environment

    Module 2: Introduction to Computer (cont.) Hardware Elements

    • Components of computer hardware relevant to input, output, system unit, storage, and communication devices.

    Module 2: Introduction to Computer (cont.) Software Elements

    • System software controls the computer's operations (includes operating system and utility programs)
    • application software is used for specific tasks, including business, home, personal, educational

    Module 2: Introduction to Computer (cont.) Data

    • Data is the raw material, unprocessed, and meaningless and is transformed into information

    Module 2: Introduction to Computer (cont.) People

    • People are an important element in an information system because they are responsible to operate software, input data, maintain, and ultimately determine the success or failure of a computerized information systems.

    Modules 2: Introduction to Computer (cont.) Procedures

    • Procedures are the steps necessary to accomplish tasks involving a computer. Computer literacy involves understanding common procedures.

    Module 2: Introduction to Computer (cont.) What are Data and Information?

    • Data is unprocessed information; Information is processed data

    Module 3: Hardware Components of Personal Computer (cont.) Introduction

    • Module presents hardware components of personal computers(PC)

    Module 3: Hardware Components of Personal Computer (cont.) The System Unit

    • The system unit, which is not the CPU, is a case containing electronic components used to process data
    • The system unit includes many components including: drive bays, power supply, sound card, video card, processor, and memory

    Module 3: Hardware Components of Personal Computer (cont.) Motherboard

    • A motherboard is the main circuit board containing integrated circuits

    Module 3: Hardware Components of Personal Computer (cont.) The Processor

    • The processor, or CPU, interprets and executes computer instructions; the CPU is made of a control unit and an arithmetic logic unit; and these units have different types and categories.

    Module 3: Hardware Components of Personal Computer (cont.) The Processor (cont.)

    • The pace of the system clock is measured in gigahertz (GHz) and is the system's processing speed

    • A machine cycle includes four steps-Fetch, Decode, Execute and Store, describing the cycle of processing in the computer

    Module 3: Hardware Components of Personal Computer (cont.) Memory and Storage

    • This segment discusses the different types and characteristics of memory, memory size, and volatile and non-volatile memory (RAM, ROM, and CMOS)

    Module 3: Hardware Components of Personal Computer (cont.) Different Storage Devices

    • Storage devices include hard disk drives (HDDs or hard drives), DVD, and Blu-ray Discs, USB flash drives, and memory flash cards

    Module 3: Hardware Components of Personal Computer (cont.) Input and Output Devices

    • Input devices are used to enter data and instructions into a computer, e.g. keyboard, mouse, joysticks, scanners, digital cameras, microphones.
    • Output devices display information, e.g. monitor, printers, speakers.

    References

    • A list of cited references is included, summarizing references from the original text

    Module 4: Number Systems

    • Module 4 presents the different numbering systems including Decimal, Binary, Octal, and Hexadecimal

    Module 4: Number Systems (cont.) Number System Conversions

    • Methods of converting between number systems such as Binary to Decimal, Decimal to Binary, Octal to Decimal, and Hexadecimal to Decimal, as well as Binary to Octal, and Binary to Hexadecimal are presented

    Module 4: Number System (cont.) Addition and Subtraction of Number Systems

    • Addition and subtraction of Binary numbers, Octal numbers, and Hexadecimal numbers are presented

    References

    • A list of references summarizing material from the original text is included.

    Module 5: Software

    • This module covers different types of software-System software and Application software, including several utility programs and software

    Module 5: Software (cont.): System Software

    • System software describes operating system and utility programs

    Module 5: Software (cont.): Operating Systems

    • An operating system (OS) is a set of programs. including boot drives, device drivers; various functions and types of Operating Systems; examples include Windows 7, Mac OS, UNIX, and Linux

    Module 5: Software (cont.) Utility Programs

    • A utility program enhances system operations
    • Utility programs include file managers, search utilities, image viewers, disk cleanup and defragmentation programs, backup utility. recovery utilities, personal firewalls, screen savers, antivirus programs, spyware removers, adware removers, filters, compression utilities, media players, and disc-burning programs

    Module 5: Software (cont.) Application Software

    • Application software contains categories of business programs, graphics, personal/educational software, and web application software

    Module 6: Information Systems and Database

    • Describes the components of an information system and provides various definitions of an information system (IS), explaining the following elements- hardware, software, data, procedures, and people.

    Module 6 (cont.): Introduction to Information Systems and Database

    • This module further describes database concepts and their importance, explaining how various databases function, as well as the different types of relationships that exist within relational databases

    Module 6 (cont.): Basic Database Terminologies

    • Components of a database include tables, record, field, data values, queries, forms, and reports.

    Module 6 (cont.): Relationships in Database

    • Discusses One-to-One, One-to-Many, and Many-to-Many relationships in a database

    Module 6 (cont.): Primary Keys and Foreign Keys

    • Explains primary keys and foreign keys within a relational database, providing examples.

    Module 6 (cont.): Purpose and Importance of Database Systems

    • Discusses the problems database systems address in contrast to using a file system to store data

    Module 7: Network and Internet

    • Covers computer networks
    • Different network topologies include bus topology, ring topology, star topology, mesh topology, and hybrid topology (which is a combination).

    Module 7: Network and Internet (cont.) Introduction to Computer Networks and Internet

    • Details of computer networks and the Internet, different types of networks (LAN, PAN, MAN, WAN, HAN, Internet)

    Module 7: Network and Internet (cont.) Network Topologies

    • Description of various network topologies - bus, ring, star, mesh, and hybrid

    Module 7: Network and Internet (cont.) The Internet

    • Information about the types of Internet use cases and origins of the Internet (ARPANET)
    • A discussion of various providers, including ISPs (internet service providers) is provided

    Module 7: Network and Internet (cont.) The Web

    • Discusses the World Wide Web and web browsers

    Module 7: Network and Internet (cont.): The World Wide Web

    • Discusses tabs in Web browsers, search engines, and subject directories

    Module 7 (cont.): The World Wide Web(cont.)

    • Describes Web publishing and how content is used to create web pages and their associated files; includes descriptions of various types of Web sites

    Module 7 (cont.) Other Internet Services

    • Different Internet services, including e-mail, instant messaging (IM), and chat rooms, Voice over IP (VoIP) newsgroups, and message boards are detailed; and File Transfer Protocol (FTP) is described

    Module 8: Computer Security, Ethics and Privacy

    • This module combines computer security, ethics, and privacy

    Module 8: Computer Security (cont.) Computer Security and Safety

    • Module covers computer security risks and the various types of cybercriminals

    Module 8: Computer Security (cont.) Computer Viruses, Worms, and Trojan Horses

    • This module presents details of computer viruses, worms, and Trojan horses, explaining their characteristics describing examples of transmission. and prevention mechanisms, including setting macro security, installing antivirus programs; and using firewall programs

    Module 8: Computer Security (cont.) Unauthorized Access and Use

    • Details the means of preventing unauthorized computer access and use, and protecting computer systems

    Module 8: Computer Security (cont.) What is a User Name and Password?

    -Describes a unique combination of characters identifying a user, and the concept of passwords as private combinations of characters associated with the users that allow access to computer resources

    Module 8: Computer Security (cont.) How can you make your password more secure?

    • Presents the calculation of the increased security of passwords depending on the numbers of characters used

    Module 8: Computer Security (cont.) What is a possessed object?

    • Defines possessed objects as items that are necessary for computer or facility access. The use of the personal identification number (PIN) is an example.

    Module 8: Computer Security (cont.) What is a Biometric Device?

    • Biometric devices authenticate users' identity using personal characteristics, including fingerprints, hand geometry, voice, signature, and iris

    Module 8: Computer Security (cont.) Hardware Theft and Vandalism

    • Information about hardware theft and hardware vandalism: hardware theft is the act of stealing computer equipment and hardware vandalism defacing or destroying computer equipment.

    Module 8: Computer Security (cont.): Software Theft

    • Defines software theft-the act of stealing, illegally copying, or erasing software
    • It also includes discussions on license agreements. Product activation, and the use of software alliances to deter software piracy

    Module 8: Computer Security (cont.) Information Theft

    • Defines encryption as the procedure for converting readable data into unreadable ciphertext, and then the steps necessary for decrypting the information

    Module 8: Computer Security (cont.) Internet Security Risks

    • Module explains the secure transmission of data via Web browsers. Discussions are included that describe certificate authorities (CAs). including their roles in guaranteeing the use of secure sites via digital certificates. It also explains the use of Secure Sockets Layer (SSL) as a method of securing data on the Internet and how a secure Web address begins with HTTPS.

    Module 8: Computer Security (cont.) System Failure

    • Discusses system failures, including the actions that lead to a failure of a computer system, including how surge protectors and maintenance utilities can help safeguard the system

    Module 8: Computer Security (cont.) Backing Up-The Ultimate Safeguard

    • Describes the importance of backups and different types of backups, including full backup of all files in a computer, selective backups of selected files, and three-generation backups

    Module 8: Computer Security (cont.) Wireless Security

    • Describes various activities to improve wireless security, including securing a WAP (wireless access point) and enabling Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)

    Module 8: Computer Security, Ethics and Privacy (cont.) Health Concerns

    • Presents various health concerns related to computers, including issues and precautions for the following health issues - computer vision syndrome, repetitive strain injury (RSI), computer addiction,, ergonmics and green computing

    Module 8: Computer Security, Ethics and Privacy (cont.) Ethics and Society

    • Provides definitions and a code of conduct that govern the use of computer technologies

    Module 8: Computer Security, Ethics and Privacy (cont.) Information Privacy

    • Describes information privacy, including electronic profiles and cookies for user preferences. A description of phishing, content filtering, and computer forensics is provided here

    References

    • A list of cited references is included, summarizing original text materials.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Introduction to Computing PDF

    More Like This

    Untitled Quiz
    6 questions

    Untitled Quiz

    AdoredHealing avatar
    AdoredHealing
    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Use Quizgecko on...
    Browser
    Browser