Introduction to Computing Finals Reviewer Modules 1-8 PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides a brief overview of computer concepts and their applications. It covers topics including career opportunities in the computer industry, details of computer components, and describes operating systems and network topologies. The content is suitable for an undergraduate-level introduction to computing course or similar.
Full Transcript
Module 1 Career Opportunities in the Computer Industry Key Areas: 1. IT Departments: Maintain computer operations, evaluate hardware/software needs. 2. Computer Equipment Field: Manufacture and distribute computers and related hardware. 3. Computer...
Module 1 Career Opportunities in the Computer Industry Key Areas: 1. IT Departments: Maintain computer operations, evaluate hardware/software needs. 2. Computer Equipment Field: Manufacture and distribute computers and related hardware. 3. Computer Software Field: Develop, manufacture, and support software. 4. Computer Service and Repair Field: Provide preventive maintenance, installation, and repair. 5. Computer Sales: Determine buyer needs and match with appropriate hardware/software. 6. Computer Educators and Corporate Trainers: Teach software use, system design, programming, and more. 7. IT Consultants: Offer specialized expertise in computer services. Functions of Jobs in IT Departments Six Main Areas: 1. Management: Plan, research, develop, evaluate, and integrate technology. 2. System Development and Programming: Analyze, design, develop, implement, and improve systems. 3. Technical Services: Evaluate technologies, administer data resources, and support systems. 4. Operations: Administer networks and manage centralized computer equipment. 5. Training: Teach employees to use IT components and resolve specific issues. 6. Security: Develop and enforce policies to protect data and systems. Differences in College Computer-Related Courses Three Broad Disciplines: 1. Computer Information Systems (CIS/IT): Focus on technical knowledge and application of skills. 2. Computer Science (CS): Emphasize theoretical programming and operating systems. 3. Computer Engineering (CE): Teach design and development of computer components and peripherals. Staying Current with Technology Four Primary Methods: 1. Professional Organizations and Personal Networks: Organizations like ACM and AITP advance IT knowledge and networking. 2. Professional Growth and Continuing Education: Workshops, seminars, trade shows (e.g., CES). 3. Computer Publications and Websites: Stay updated through tech news, analysis, and reviews. 4. Certification: Validate technical knowledge and demonstrate expertise. Benefits of Certification For Employers: Assures quality standards and keeps workforce updated. For Employees: Enhances career opportunities, improves professional standing, and increases salaries. For Vendors: Promotes industry self-regulation and raises expertise levels. Preparing for Certification Training Options: 1. Self-Study Programs: Flexible, paced learning. 2. Online Training Classes: Interactive and self-paced courses. 3. Instructor-Led Training Classes: Includes seminars and boot camps. 4. Web Resources: Certification sponsor websites with FAQs, guides, sample tests, and forums. General Areas of IT Certification Certification Categories: 1. Application Software: Examples: MCAS, MCAP, Adobe Certified Expert (ACE). 2. Operating Systems: Examples: MCITP, RHCE, SCSA. 3. Programmer/Developer: Examples: CSDP, SCJP, MCPD. 4. Hardware: Examples: A+, Dell Certified Systems Expert. 5. Networking: Examples: CCNA, CCNP, Network+. 6. Digital Forensics: Examples: CCE, CIFI. 7. Security: Examples: CISSP, SCNA. 8. Internet: Examples: CIW, CWP. 9. Database Systems: Examples: OCP, IBM Certified Solutions Expert. Module 2 Importance of Computer Literacy Computer Literacy: Knowledge of computers and their uses. It evolves with technology and is vital for success in today’s world. Keywords: Digital literacy, success, technology changes. Definition of a Computer and Data vs. Information Computer: Electronic device that processes, stores, and outputs data. Data: Unprocessed items (text, numbers, etc.). Information: Processed data that is meaningful and useful. Five Components of a Computer 1. Input Devices: Enter data/instructions (e.g., keyboard, mouse). 2. Output Devices: Convey information (e.g., monitors, printers). 3. System Unit: Houses electronic components for processing. 4. Storage Devices: Record/retrieve data (e.g., hard drives). 5. Communications Devices: Enable data exchange (e.g., modems). Advantages and Disadvantages of Computers Advantages: Speed, reliability, consistency, data storage, communication. Disadvantages: Health risks, privacy concerns, public safety issues, labor impact, environmental effects. Networks and Their Benefits Network: Collection of connected devices for sharing resources. Benefits: Saves time, reduces costs, and enables resource sharing. Keyword: Internet (largest network). Internet vs. World Wide Web Internet: Global network connecting organizations and individuals. Web: Online library of information accessible through the Internet. Uses: Communication, research, shopping, banking, entertainment, and more. System Software vs. Application Software System Software: Manages operations (e.g., operating systems, utilities). Application Software: Helps users perform tasks (e.g., browsers, spreadsheets). Keywords: Operating system, productivity, personal tasks. Types of Computers 1. Personal Computers (Desktops): Standalone devices for individual use. 2. Mobile Computers and Devices: Portable (e.g., laptops, smartphones). 3. Game Consoles: For gaming (e.g., PlayStation, Xbox). 4. Servers: Manage network resources. 5. Mainframes: Handle massive data and simultaneous users. 6. Supercomputers: Fastest, used for complex calculations. 7. Embedded Computers: Specialized systems in larger products. Elements of an Information System Components: Hardware, software, data, people, and procedures. Role: Process and convert data into useful information. Types of Computer Users 1. Home Users: Use for personal finance, web browsing, and entertainment. 2. SOHO Users: Small businesses/self-employed; basic business tools. 3. Mobile Users: Work remotely (e.g., students, travelers). 4. Power Users: Handle specialized software (e.g., engineers). 5. Enterprise Users: Work with high-volume transactions in large organizations. Society’s Use of Computers Education: E-learning and virtual classes. Finance: Online banking/investing. Government: Public services and daily operations. Health Care: Patient records, robotic assistance, precision surgeries. Science: Data analysis, modeling, and global collaboration. Publishing: Online content and page design. Travel: Navigation systems. Manufacturing: CAM (Computer-Aided Manufacturing). Module 3 Reviewer: Hardware Components of a Personal Computer Essential for Final Exams – Focused, Organized, and Easy to Memorize! I. System Unit Overview Definition: The case that contains the electronic components used to process data. ○ Key Components inside the system unit: Drive bay(s) Power supply Sound card Video card Processor Memory II. Motherboard Definition: The main circuit board of the system unit. Contains computer chips with integrated circuits. III. Processor (CPU) Definition: Interprets and executes instructions. ○ Components: Control Unit: Directs and coordinates computer operations. Arithmetic Logic Unit (ALU): Performs arithmetic, comparison, and logical operations. Types of Processors: ○ Single-core, Dual-core, Quad-core, Multi-core. Machine Cycle (4 Steps): ○ Fetch ○ Decode ○ Execute ○ Store Clock Speed: Measures CPU speed in GHz (gigahertz). ○ The System Clock controls the timing of all operations. IV. Memory Purpose: Stores instructions, data, and results. 1. Three categories: Operating system and system software Application programs Data being processed Types of Memory: 1. Volatile Memory (loses contents when power is off): RAM (Random Access Memory): Temporary storage. Types of RAM: DRAM: Stores data in capacitors. SRAM: Faster but more expensive. MRAM: Uses magnetic storage. Variants of DRAM: DDR SDRAM, DDR2, DDR3 (dual/triple channel modes). 2. Non-Volatile Memory (retains data without power): ROM (Read-Only Memory): Permanent storage. Flash Memory: Rewritable storage. CMOS: Low power consumption. Memory Size Units: KB, MB, GB, TB. Memory Cache: Speeds up processes by storing frequently used instructions. V. Storage Devices 1. Hard Disk Drive (HDD): ○ Non-volatile, stores data on rotating magnetic platters. 2. Optical Discs: ○ DVD: Stores more data than CDs, used for videos and storage. ○ Blu-ray Disc (BD): High-definition video storage, up to 50 GB. 3. USB Flash Drive: Portable, rewritable storage using flash memory. 4. Memory Cards: Solid-state storage for cameras, phones, etc. VI. Input and Output Devices Input Devices: ○ Keyboard: Used to input text. ○ Pointing Devices: Mouse, joystick, game controllers. ○ Scanner: Converts images into data. ○ Digital Camera: Captures electronic images. ○ Microphone: Inputs sound, including voice commands. Output Devices: ○ Monitor: Displays soft copy (temporary on-screen information). ○ Printer: Produces hard copy (permanent output on paper). ○ Speakers: Outputs sound. VII. Key Concepts for Ports and Connectors Port: Interface for connecting external devices (e.g., USB, HDMI). Connector: Physical plug that fits into a port. VIII. Study Tips 1. Understand Terms: Familiarize yourself with definitions (e.g., CPU, RAM, ROM). 2. Visualize Components: Refer to diagrams of a system unit and motherboard. 3. Focus on Types and Functions: Know the differences between volatile and non-volatile memory, input/output devices, and storage types. 4. Practice Machine Cycle Steps: Memorize the fetch-decode-execute-store sequence. 5. Review Examples: Compare HDD vs SSD, DVD vs Blu-ray, etc. IX. Reference Material Recommended textbooks and guides: ○ CompTIA A+ Complete Study Guide (3rd Edition) – Docter, Dulaney & Skandier. ○ How Computers Work: The Evolution of Technology – White. ○ Introduction to Computers and Information Technology – Pearson. Quick Recap System Unit ≠ CPU (CPU is a component of the system unit). Machine Cycle = Fetch, Decode, Execute, Store. RAM (volatile) vs ROM (non-volatile). Input Devices: Keyboard, Mouse, Microphone. Output Devices: Monitor, Printer, Speakers. Storage Devices: HDD, SSD, USB Flash Drives, DVDs, Blu-rays. Module 5 Reviewer: Software I. System Software System software consists of programs that control or maintain the operations of the computer and its devices. 1. Types of System Software ○ Operating Systems (OS): Coordinates computer hardware and software. ○ Utility Programs: Perform maintenance tasks to ensure efficient computer operation. II. Operating Systems An Operating System (OS) is a set of programs that work together to coordinate activities among computer hardware resources. Functions of an Operating System: Start/shut down a computer (booting). ○ Cold Boot: Turning on a powered-off computer. ○ Warm Boot: Restarting the computer without turning off power. Provide a user interface: ○ Graphical User Interface (GUI): Uses menus/visuals. ○ Command-line Interface: Uses typed commands. Manage programs (single-tasking, multitasking). Manage memory (RAM, virtual memory). Coordinate tasks (task scheduling). Configure and control devices. Establish Internet connections. Monitor performance. Administer security. III. Utility Programs Utility programs allow users to perform maintenance tasks. File Manager: Manage and organize files. Search Utility: Locate files based on specified criteria. Disk Cleanup Utility: Remove unnecessary files. Disk Defragmenter: Optimize hard disk performance. Backup Utility: Copy files to another storage device. Restore Utility: Return backed-up files to their original form. Antivirus Program: Protects computers from malicious software. Firewall: Blocks unauthorized access. IV. Categories of Operating Systems 1. Stand-alone OS: Designed for desktop/laptop use. Examples: ○ Windows 10 ○ macOS Mojave ○ Linux ○ UNIX 2. Server OS: Manages network operations. Examples: ○ Windows Server 2019 ○ Solaris 3. Embedded OS: Resides in devices like smartphones. Examples: ○ Android ○ iOS ○ Embedded Linux V. Application Software Application software helps users complete specific tasks. Categories of Application Software: 1. Business Software: ○ Word Processing (e.g., MS Word). ○ Spreadsheet (e.g., MS Excel). ○ Presentation (e.g., MS PowerPoint). 2. Graphics/Multimedia Software: ○ Photo editing (e.g., Adobe Photoshop). ○ Video editing (e.g., Adobe Premiere). 3. Home/Personal/Educational Software: ○ Personal finance (e.g., Quicken). ○ Educational tools (e.g., Rosetta Stone). 4. Communication Software: ○ Email (e.g., Gmail). ○ Web browsers (e.g., Chrome). Forms of Application Software: Packaged software Custom software Web applications Open-source software Shareware Freeware Public-domain software VI. Utility Program Highlights 1. File Compression Utilities: Reduce file size (e.g., WinRAR, WinZip). 2. Antivirus Software: Protects against viruses, worms, and Trojan horses. 3. Spyware/Adware Removal Tools: Detect and remove malicious software. VII. Common Operating Systems Windows 10 Features: ○ Start Menu ○ Microsoft Edge browser ○ Cortana (virtual assistant) ○ Action Center (notifications/settings) ○ Tablet Mode macOS Features: ○ Ease of use ○ Advanced multimedia tools Linux: ○ Open-source ○ Popular among developers VIII. Advanced Software Tools 1. Database Software: Organize and manage data. 2. Project Management Software: Plan and track project activities (e.g., MS Project). 3. CAD Software: Design for engineering/architecture. Key Terms Booting: Process of starting/restarting a computer. Virtual Memory: Extends RAM using storage. File Compression: Reduces file size. Malware: Malicious software like viruses, worms, and spyware. GUI: Graphical interface with icons and menus. Module 6 Information System: An information system refers to the hardware, software, computer system connections, information, information system users, and the building where it is located. The main purpose is to disseminate information within or outside the organization. Definitions: Information Systems (IS): Study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data. Information Systems: Combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings. The key processes: collect, create, and distribute data, which are the fundamentals of information system development. Common types of information systems: Transaction Processing System (TPS), Management Information System (MIS), Decision Support Systems (DSS), and Executive Information Systems (EIS). Elements of the Information System: Most medium and large-scale organizations use information systems in their IT infrastructure, commonly known as computer-based information systems (CBIS). CBIS consists of hardware, software, data, procedures, people, and communication. Data processing is crucial for transforming data into meaningful information. End-users: Often overlooked but are responsible for designing, operating the system, inputting data, configuring hardware, and being the recipients of information produced by the system. What is a Database? A database is a collection of data organized to allow access, retrieval, and use of the data. Data: Collection of unprocessed items (text, numbers, images, audio, video). Examples of databases include a telephone book, mailing list, and address list. Tables in a database store related data, with rows called records and columns called fields. Queries are used to retrieve data from the database, potentially involving multiple tables. Forms: A user interface for easy interaction with the database to enter, edit, or display data. Reports: Summarize and display information retrieved from the database, designed for printing. Macros: Automate repetitive tasks in the database, often integrated with forms and reports. Primary and Foreign Keys: Primary Key: A field intended to be the unique identifier for each record in a table. Foreign Key: A primary key from another table, linking two tables. Example: In the Customers table, Customer ID is the primary key, and in the Accounts table, it becomes the foreign key. Relationships in Databases: One-to-One: A primary record in the primary table has only one related record in the related table. One-to-Many: A primary record in the primary table is related to many records in the related table. Example: One customer can have many accounts. Many-to-Many: A primary record in the primary table is related to many records in the related table, and vice versa. Example: A student can take many classes, and each class has many students. Purpose and Importance of Databases: File System Drawbacks: 1. Data redundancy and inconsistency: Duplicated data in multiple files leads to wasted resources and errors. 2. Difficulty in accessing data: Changing file types requires new programs. 3. Data isolation: Difficult to access and share data stored in separate files across departments. 4. Integrity problems: Editing one file requires updates in all related files to ensure consistency. 5. Atomicity of updates: Failure to update one file can compromise the entire system’s integrity. 6. Concurrent access: Multiple users accessing the same file may lead to data inconsistency. 7. Security: File processing lacks the security of modern database systems. Solution: The database system solves these issues by providing an efficient way to manage data, ensure consistency, and improve accessibility. Module 7 Computer Communications & Technologies Communication Technologies: Include blogs, e-mail, chat rooms, FTP, instant messaging, video conferencing, VoIP, wikis, etc. Wireless Communication: Includes text, picture, and video messaging, wireless instant messaging via smartphones, and wireless Internet access points (e.g., hotspots, cybercafés). GPS: Uses satellites to determine location. Groupware: Software enabling collaboration over a network. Voice Mail: Allows leaving voice messages. Web Services: Standardized software for remote communication between applications. Types of Networks LAN (Local Area Network): Connects devices in small areas (e.g., buildings). PAN (Personal Area Network): Small networks around a person or device. WLAN (Wireless LAN): A LAN without physical cables (e.g., Wi-Fi). CAN (Campus Area Network): Network spread across several nearby buildings. MAN (Metropolitan Area Network): Spans a town or city. WAN (Wide Area Network): Connects devices over long distances (e.g., the Internet). SAN (Storage Area Network): High-speed network for shared storage. SAN (System Area Network): High-speed server-to-server or processor-to-processor network. POLAN (Passive Optical LAN): Ethernet alternative using optical fibers. EPN (Enterprise Private Network): Secure, private network for a business. VPN (Virtual Private Network): Extends a private network over the Internet. Client/Server vs. Peer-to-Peer Networks Client/Server: Servers control resources, and clients request them. Peer-to-Peer (P2P): Equal responsibility between connected devices (commonly under 10 devices). Network Topologies Star Network: All devices connect to a central device. Bus Network: All devices connect to a central cable. Ring Network: Devices connect in a circular manner. Network Communication Standards Ethernet: No central control; data is transmitted as needed. Wi-Fi: Wireless communication based on 802.11 standards. Bluetooth: Short-range data transmission. WiMAX: Wireless communication over a wide area. World Wide Web (WWW) A collection of electronic documents (web pages) with multimedia and links. Web Page: Contains text, graphics, and videos; identified by a URL (e.g., https://www.example.com). Web Browser: Software for accessing the Web (e.g., Chrome, Safari). Web Tools and Search Search Engines: Find information on the Web. Subject Directories: Classify information by categories. Types of Web Sites Portal: Central site offering multiple services (e.g., search engine, e-mail). Business/Marketing: Promotes or sells products/services. Blogs: Informal posts with personal opinions. Wikis: Collaborative websites (e.g., Wikipedia). Social Networks: Sites for sharing personal interests (e.g., Facebook). Educational: Focus on learning and teaching. Advocacy: Describes causes or opinions. Web Apps: Software available via the Web browser. Netiquette Netiquette: Set of acceptable online behaviors, covering e-mail, instant messaging, and web communication. Module 8 Computer Security Risk: Any event that could cause damage or loss to hardware, software, data, or processing capability. This can be intentional (cybercrime) or accidental. Cybercriminal Categories: Includes hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. Malware Types: Virus: Damages files and software without user knowledge. Worm: Replicates itself, consuming system resources. Trojan Horse: Disguises itself as legitimate software, triggering under certain conditions. Rootkit: Allows remote control of a computer. Protection Measures: Antivirus Software: Scans for and removes viruses, often using techniques like virus signatures and inoculation to protect files. Firewalls: Protect networks from unauthorized access, either in hardware or software form. Denial of Service (DoS): Attacks disrupt network access, while Distributed DoS (DDoS) involves multiple compromised systems. Backdoors: Methods that allow attackers to bypass security measures. Authentication and Security: Username & Password: Basic security for accessing systems. Possessed Object: A physical item like an ID card used to access a system. Biometric Devices: Devices that authenticate users based on physical traits (e.g., fingerprints, face recognition). Additional Risks and Protections: Software Theft: Includes illegal copying or erasure of software. Encryption: Converts readable data into unreadable form to prevent unauthorized access. Digital Certificates: Verify the legitimacy of users or websites in e-commerce. System Failure: Prolonged malfunction of a computer can cause data loss and other issues. Wireless Security: Wireless Access Points (WAPs): Should be properly secured to prevent unauthorized access and war driving (detecting and connecting to unsecured wireless networks). Wi-Fi Protected Access (WPA) WPA: A security standard for authenticating network users and providing encryption. WPA2: The latest WPA version, more secure and conforms to government standards. Computer Ethics Computer Ethics: Moral guidelines for computer and information system usage. Key Areas: Unauthorized use, software piracy, intellectual property rights, privacy, etc. IT Code of Conduct A set of ethical guidelines for using computers, including avoiding harm, theft, and unauthorized access, and considering social impacts. Information Privacy The right to control and restrict the use of personal information. Privacy concerns arise with online data collection, monitoring, and employers’ surveillance. Measures for Privacy Protection Tips for safeguarding personal data, including limiting personal info, using cash, and managing online cookies. Cookies Small text files stored on your device, used for tracking preferences, login details, shopping carts, and targeted ads. Spyware, Adware, and Spam Spyware: Secretly collects personal data. Adware: Displays unwanted ads. Spam: Unsolicited bulk emails. Phishing A scam to collect sensitive information using fake e-mails or websites. Content Filtering Restricting access to specific content on the web, often used by businesses and schools to block inappropriate material. Digital Forensics The process of collecting and analyzing computer evidence, used by law enforcement, insurance, and security fields. Health Concerns in Using Computers RSI (Repetitive Strain Injury): Injuries from repetitive motions, including tendonitis and carpal tunnel syndrome. CVS (Computer Vision Syndrome): Eye strain and discomfort from prolonged computer use. Addiction: Overuse of computers leading to social isolation. Ergonomics The study of designing comfortable and safe workspaces to improve efficiency and health, including proper chair, keyboard, and desk setup. Green Computing Reducing electricity usage and environmental waste in computing. Recommendations include using ENERGY STAR devices, turning off unused equipment, and recycling.