ge elec 3.pdf
Document Details
Uploaded by AdventuresomeDialogue1417
Full Transcript
GE Elect 3 – Living in the IT Era INTRODUCTION: Information and Communication Technology A technology required for information processing the use of electronics such as computers, communication devices and application software to convert, store, protect, process, transmit and retrieve...
GE Elect 3 – Living in the IT Era INTRODUCTION: Information and Communication Technology A technology required for information processing the use of electronics such as computers, communication devices and application software to convert, store, protect, process, transmit and retrieve information from anywhere, anytime. Information Information refers to the knowledge obtained in reading, investigation, study, or research. The tools to transmit information are the telephone, television, and radio. We need information to make decisions and to predict the future. Information is knowledge and helps us to fulfill our daily tasks. Communication Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Previously, people communicated through sign or symbols, performing drama or poetry. With the advent of technology, these “older” forms of communication are less utilized as compared to the use of the internet, email or video conferencing. Technology Technology is the use of scientific knowledge, experience, and resources to create processes and products that fulfill human needs. Aiding communication Spreading information USAGE OF ICT IN EVERYDAY LIFE 1. EDUCATION Teachers use computers to research for teaching materials, participate in online forum and conference. Students use computers as reference tools for looking information on the internet. Researchers use computers to collect and process data. School administrators use computers for administrative purposes to ensure that entire operations run smoothly. 2. BANKING Bank administrators can control the entire banking system and banking activities. To provide electronic banking services for customers. Businessmen can save their time by using online services offered by banks. 3. INDUSTRY To help workers operate machines. To help researchers analyze and collect research data for future references. To help administrators to oversee and control entire operations in the factory. To facilitate production planning and control system. 4. E-COMMERCE To make buying and selling activities faster and more efficient through internet. To connect online customers with suppliers to purchase products. To help employees to communicate with their customers for any inquiries and to get the latest updates inventory to be informed to the customers. PART OF A COMPUTER SYSTEM I. Hardware: A. Central Processing Unit (Case) – the primary control center of the computer, and it facilitates communication ang collaboration between different hardware and software computer components. a. Motherboard – acts the central electrical circuit by connecting different parts, distributing power and information across the computer system. b. Central Processing Unit – the microprocessor chip c. Random Access Memory (RAM) – the memory space that houses temporary data, processes, information, and commands. When you launch a program or use an application, it uses the RAM to stay active and work optimally. d. Storage Drives - storage devices that save the file, information, and programs. Ie. Hard-disk drive (HDD) or solid-state drive (SSD). e. Power Supply f. Cooling Fan B. Peripherals - sometimes called an auxiliary device, is any connected device (internal or external) that provides a computer with additional functionality. a. Input devices – sends data to the computer 1. Mouse - allows you to use point-and-click technology to interact with a computer. 2. Keyboard - most common input device. The user enters letters, numbers, and other symbols to give the computer information and instruction. Using a keyboard to enter a lot of information is called typing. 3. Web cam - video cameras that connect to a computer. They can be external or built-in. Webcams are most often used to enable people to see each other when communicating over the internet, for recording video blogs or making other videos. 4. Microphones - audio input devices. The microphone feeds a sound signal to the computer, where it can be recorded or streamed across the internet. b. Output Devices – receives data from the computer. 1. Monitor – The most common output device, enable users to interact with a computer more easily. It essentially displays a signal sent by the computer in a visual format. 2. Speakers – audio output devices. They typically come in pairs to provide stereo sound Computer speakers usually have built-in amplifiers and therefore require a power supply, either from the mains, batteries or via a USB port. 3. Projector - optical output devices that enable a roomful of people to see visuals generated by a single computer. As their name suggests, projectors "project" still or moving images onto a screen, blank wall, or other surface. 4. Printer - They are used to generate hard copies of electronic data stored on a computer, most often text or images, onto paper. c. Input/Output Devices – Storage devices 1. USB Flash Drive - Also called a thumb drive, pen drive, USB stick, jump drive, flash drive, memory stick, or USB memory, the USB flash drive is a data storage device that consists of flash memory with an integrated USB interface. Small and light, USB storage drives are usually removable and rewritable. 2. External Hard Drives - External hard drives are input/output storage devices that usually connect to a computer via USB. They hold relatively large amounts of data and plug and play drive functionality enables them to be easily used with a variety of different computers. II. Software: A. System Software – act as an interface between the hardware and other applications and enable you to use the computer easily. a. Operating system – the foundational software that runs the entire computer, its programs, and applications. Examples: Windows XP, 7, 10, 11; Mac OSX; Linux (which is free and open-sourced) b. Language processor – the software that converts all user instructions into a language that the computer can understand. c. Device drivers – device-specific software that enables different devices, like a printer or mouse, to function. B. Application Software - usually third-party services and can be based on the computer system and stored in the memory or have a cloud-based operation. Without application software, a computer system would have very little utility. Some popular examples include word processing software, spreadsheet software, presentation software, database management software, editing software and other multimedia software. Example: Microsoft Office 10, WPS Office C. Utility Software - optional but important software components of a computer that help improve its performance, security, or utility. These software solutions help manage the computer's memory, files, and other applications. They also help customize the interface and desktop, alongside making the computer system safer to use and helping with the recovery process in case of a system failure. HISTORY OF COMPUTER Earliest Computers originally calculations were computed by humans, whose job title was computers. These human computers were typically engaged in the calculation of a mathematical expression. The calculations of this period were specialized and expensive, requiring years of training in mathematics. The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. The word "computer" was borrowed from Latin computō, computāre, which means "to compute, sum up". A. Tally Sticks A tally stick was an ancient memory aid device to record and document numbers, quantities, or even messages. B. Sexagesimal System The first place-value system (1900 B.C.) Used by the Babylonians to measure time (60 minutes, 60 seconds), and dividing circle (360 degrees) C. Abacus An abacus is a mechanical device used to aid an individual in performing mathematical calculations. The abacus was invented in Babylonia in 2400 B.C. The abacus in the form we are most familiar with was first used in China in around 500 B.C. It used to perform basic arithmetic operations. D. Aristotle and the Tree of Porphyry (383 BC – 322 BC) Used a tree figure (like a family tree) to represent the relationships between (and subdivisions of) things such as species. E. Napier’s Bones Allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around and placing them in specially constructed boards. Invented by John Napier in 1614. F. Slide Rule Invented by William Oughtred in 1622. Is based on Napier's ideas about logarithms. Used primarily for – multiplication – division – roots – logarithms – Trigonometry. Not normally used for addition or subtraction. G. Calculating Clock Invented by Wilhelm Schickard in 1625 a calculating machine that used wheels to carry out addition and subtraction of numbers up to 6 digits. H. Pascaline The first actual calculating machine. Invented by Blaise Pascal in 1642. It was its limitation to addition and subtraction. It is too expensive. I. Stepped Reckoner Invented by Gottfried Wilhelm Leibniz in 1672. The machine that can add, subtract, multiply and divide automatically. J. Jacquard Loom The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. It is an automatic loom controlled by punched cards. K. Arithmometer A mechanical calculator invented by Thomas de Colmar in 1820, The first reliable, useful and commercially successful calculating machine. The machine could perform the four basic mathematic functions. The first mass-produced calculating machine. L. Difference Engine and Analytical Engine It an automatic, mechanical calculator designed to tabulate polynomial functions. Invented by Charles Babbage in 1822 and 1834. This made him to be recognized as the “Father of Computer” It is the first mechanical computer. M. First Computer Programmer In 1840, Lady Augusta Ada Byron (Countess of Lovelace) suggests to Babbage that he use the binary system. She writes programs for the Analytical Engine. N. Scheutzian Calculation Engine Invented by Per Georg Scheutz in 1843. Based on Charles Babbage's difference engine. The first printing calculator. O. Tabulating Machine Invented by Herman Hollerith in 1890. To assist in summarizing information and accounting. P. Harvard Mark 1 Also known as IBM Automatic Sequence Controlled Calculator (ASCC). Invented by Howard H. Aiken in 1943 The first electro-mechanical computer. Q. Z1 The first programmable computer. Created by Konrad Zuse in Germany from 1936 to 1938. To program the Z1 required that the user insert punch tape into a punch tape reader and all output was also generated through punch tape. R. Atanasoff-Berry Computer (ABC) It was the first electronic digital computing device. Invented by Professor John Atanasoff and graduate student Clifford Berry at Iowa State University between 1939 and 1942. S. ENIAC ENIAC stands for Electronic Numerical Integrator and Computer. It was the first electronic general-purpose computer. Completed in 1946. Developed by John Presper Eckert and John Mauchly. T. UNIVAC 1 The UNIVAC I (UNIVersal Automatic Computer 1) was the first commercial computer. Designed by John Presper Eckert and John Mauchly. U. EDVAC EDVAC stands for Electronic Discrete Variable Automatic Computer. The First Stored Program Computer. Designed by Von Neumann in 1952. It has a memory to hold both a stored program as well as data. V. The First Portable Computer Osborne 1 – the first portable computer. Released in 1981 by the Osborne Computer Corporation. W. The First Computer Company The first computer company was the Electronic Controls Company. Founded in 1949 by John Presper Eckert and John Mauchly. TECHNOLOGY TRENDS Touch Screen A computer monitor that functions both as a display screen and an input device. Basically, the monitor of a touch screen device is made to be sensitive to pressure so that it will follow a command at a user’s touch. Gestural Interfaces Gestural Interface Technology allows a user to give commands to the computer without touching it to control devices using hand and other body parts. 3D (Three-Dimensional) Technology 3D Technology refers to visual technology that showcases a real-life 3D appearance. This can be viewed on a computer, in print, on TV, or in movies. providing some illusion of depth perception through which viewers enjoy different types of experiences. Motion Capture in Film Making Motion capture refers to the process of recording movement and translating that movement into a digital model. It is used in a variety of applications such as video and tv, sports, computer gaming, military, and even medical applications. Mobile Devices Mobile devices are pocket-sized or handheld computers and the most popular of these are the smartphone and tablet. THE INTERNET AND THE WORLD WIDE WEB (WWW) THE INTERNET The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection. The Internet consists of technologies developed by different individuals and organizations. Robert W. Taylor, who led the development of the ARPANET (an early prototype of the Internet) Vinton Cerf and Robert Kahn, who developed the Transmission Control Protocol/Internet Protocol (TCP/IP) technologies. They are considered the founder of the Internet. Internet Service Provider (ISP) is a company that provides access to the internet for users via telephone lines or wireless communications. Internet Address (IP Address) is a set of four numbers between 0 to 255 that are separated by periods i.e. 216.239.39.99 (IP address of Google) Every computer that connects to the internet has an IP Address Domain Name is the text version of the IP Address i.e. www.google.com (domain name of Google) Top-level domains are the highest level of domain names of the Internet. i.e. gov, edu, com, mil, org, net, and int WORLD WIDE WEB (WWW) Byname the Web, the leading information retrieval service of the Internet. The Web gives users access to a vast array of documents that are connected to each other by means of hypertext or hypermedia links—i.e., hyperlinks, electronic connections that link related pieces of information in order to allow a user easy access to them. Hypertext allows the user to select a word or phrase from text and thereby access other documents that contain additional information pertaining to that word or phrase. Hypermedia documents feature links to images, sounds, animations, and movies. The Web operates within the Internet’s basic client-server format; servers are computer programs that store and transmit documents to other computers on the network when asked to, while clients are programs that request documents from a server as the user asks for them. Web Page is an electronic document in the web. Web Site is a collection of related web pages and associated items stored on a web server. Home Page is the first page the users see when they enter the web site. Web Server refers to the computers that store the HyperText Mark-up Language (HTML) files used on the internet. Web Browser is a software that allows users to view the retrieved documents in the web. Uniform Resource Locator (URL) refers to the global address of documents and other resources on the WWW. i.e. https://search.yahoo.com/search?fr=mcafee&type=E210US91215G0&p=yahoo NETIQUETTE AND COMPUTER ETHICS 10 Rules for Practicing Netiquette: 1. Practice using empathy. Empathy involves practicing patience and understanding when interacting with others. 2. Use a friendly tone. Using a kind tone is important for conveying respect online. Tone refers to how your messages sound to your recipients, including your word choice and syntax. 3. Use respectful language. It's important to use respectful language when communicating with others online because people may evaluate how you treat them based on how you speak to them. 4. Send messages if appropriate. It's important to send an appropriate amount or number of messages or emails to people online. 5. Check for grammar mistakes. Checking for grammar or spelling mistakes is important for being professional online. 6. Respect other people's privacy. by asking permission before sharing their information or posting anything about them or with them in it including photos or video. 7. Ensure messages are clear. Being clear in your communication can help people properly interpret your messages online. 8. Create posts that are appropriate. Creating appropriate online posts is important for netiquette because your posts can contribute to your online image. 9. Respond to emails on time. Checking emails regularly and responding to them in a timely manner is important because people often use email to communicate ideas and share information with others quickly. 10. Read content thoroughly. to ensure that you understand the content of a message before you reply. This can also help you write messages that fully address the recipient's comments or questions. CYBERCRIMES AND INTERNET THREATHS Cybercrime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Types of Cybercrimes: 1. Identity theft and invasion of privacy When criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. Second, they might use individual credit card names and numbers to create new identities for other criminals. 2. Cyberbullying Mental abuse of victims using threats and harassment. 3. Cyber libel Also known as online defamation, this can involve attacking individuals or organizations' reputations. This can be done through disinformation (deliberate distribution of inaccurate information) or misinformation (mistaken distribution of inaccurate information). 4. Internet fraud Receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets. 5. ATM fraud Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. The information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account. 6. Wire fraud NEVER wire money to a stranger. Once you wire cash (especially overseas), it’s virtually impossible to reverse the transaction or trace the money. 7. File Sharing and Piracy the illegal act of distributing and or the reproduction of digital files that is traded over the internet. These files include digital books, movies, PC games, hacked software, music and others. 8. Counterfeiting and Forgery crimes of deceit where the criminal act involves tricking another person into receiving property that appears from trustworthy source but is actually an imitation. 9. Child Pornography unlawfully exploits children for sexual stimulation. images of children under age 18 engaged in sexual behavior. 10. Hacking the act of compromising digital devices and networks through unauthorized access to an account or computer system 11. Computer viruses the deliberate release of damaging computer viruses 12. Denial of Service Attacks (DoS Attack) perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to a network. 13. Spam, Steganography, and E-mail Hacking Spam is a crime against all users of the Internet since it wastes both the storage and network capacities of ISPs. 14. Sabotage Another type of hacking involves the hijacking of a government or corporation web site. Using the Internet to attack the infrastructure of a nation, by rerouting airline traffic, contaminating the water supply, or disabling nuclear plant safeguards. 15. Phishing act of sending e-mail that purports to be from a reputable source, such as the recipient’s bank or credit card provider, and that seeks to acquire personal or financial information.