INTROTOCOMP_REVIEWER.docx

Full Transcript

**INTRO TO COMPUTING REVIEWER\ ** **COMPUTING** - is the procedure of calculating determining something by mathematical or logical methods. **COMPUTATION** - act or process of computing **INDUSTRIES IN FIELD OF COMPUTING** **Artificial Intelligence (AI)** - AI industry includes medical diagnosis...

**INTRO TO COMPUTING REVIEWER\ ** **COMPUTING** - is the procedure of calculating determining something by mathematical or logical methods. **COMPUTATION** - act or process of computing **INDUSTRIES IN FIELD OF COMPUTING** **Artificial Intelligence (AI)** - AI industry includes medical diagnosis, robot control, electronic trading platforms and remote sensing. **Computer Security Industry** - to protect us from cyber crimes such as hacking, phishing, terrorism etc. **Government and Social Services** - digital services has done wonders for citizens and helped the government immensely in optimizing its budget. **Health Care** - health care system, as health care begins to learn its own data. **Agriculture/Agritech** -- Agriculture Technology **Financial Service Industry** - evolves rapidly at a rapid pace due to a big demand in mobile banking and other disruptive technologies like block chain. **Machine Learning** -- father of artificial intelligence helps in improving the maintenance processes and enable to make real time, intelligent decisions based on data. **Enterprise Software -** a term for soft wares that is used in large organizations (whether for business or government). **Education -** needs to keep in pace with the speed of innovation. Applications such as MS Word, Google and such help students to learn. **Traditional Industries** - Programmers are more likely to be tasked to build software that could help the company to keep up with technology. **PROFESSION IN THE FIELD OF COMPUTING** **-Software Engineer** - designs applications or systems. **-Web Developer** - entails designing and writing code to create a website's layout and formatting. **-Hardware Engineer** -- Hardware engineers develop various inner parts of computer like processor, memory and motherboard. **-Computer Programmer** - writes codes to create software based on design made by a software engineer **-Database Administrator** - main tasks are managing databases for a company or organization. **-System Analyst** - responsible for organizing computer information systems. They analyze systems and recommends any tweaks to improve the system. **-Network Architect** - valuable for maintaining the connection through developing IP network hardware. **-Health Information Tech Specialist** - duties are managing database of patient history and keeping such information secure. **-Video Game Developer** - duties includes pre and post-game development as well as designing and developing the software for a game. **DICIPLINES IN THE FIELD OF COMPUTING** **Computer Science** - focuses on computer architecture and how to program computers to make them work effectively. **Information Systems** - focus on applying computers to business problems. **Information Technology** - focus on the computer equipment and software used by businesses and organizations. **Computer Engineering** - focuses on the design of computer hardware and peripheral devices, often the chip level. **Software Engineering** - discipline approach to develop software that is reliable, efficient, affordable, user friendly and scalable. **ANATOMY OF COMPUTER** **COMPUTER** - a combination of hardware and software DIGITAL COMPUTER - programmable machine which reads the binary data passed as instructions. **Components of a Computer** 1**. Input Unit**- devices take input and convert it into binary language that computer understands 2\. **Central Processing Unit** (CPU) - called the brain of computer because it is the control center of computer 3\. **Arithmetic and Logic Unit** (ALU) - performs mathematical calculation and takes logical decisions. 4\. **Control Unit** -coordinates and controls the data flow in and out of CPU and also controls all operations of ALU. 5\. **Memory Registers** - is a temporary unit of memory in the CPU, used to store the data Register can be on 16, 32 64 bit. 6\. **Output Unit** - converts the binary data coming from the CPU to human understandable form (Ex.Monitor,speaker,etc) 7\. **Memory** - attached to the CPU and is used for storage of data and instructions are called internal memory, each of which can store data or instructions. **RAM** (Random Access Memory) -- volatile **ROM** (Read Only Memory) -- non-volatile memory/stores data Connection of Various Functional Components **COMPUTER PERIPHERALS -** device that is connected to a computer but is not part of the core computer architecture **Types of Peripheral Device** **1. INPUT DEVICES** - Converts incoming data and instructions into a pattern of electric signals in binary code. (Ex. keyboard, mouse, scanner, mic, etc.) **2. OUTPUT DEVICES -** Reverse of the input process and generally translating the digitized signals into a form of intelligible to the user (Ex. monitors, headphones, printers etc.) **3. STORAGE DEVICES** - store data in the system which is required for performing any operation in the system. (Ex. e hard disk, magnetic tape and flash memory. **SOFTWARE**- set of instructions fed in form of programs to govern the computer system and process the hardware components. **I. System Software** allows the user to interact with the hardware components can be divided into four major types: Operating System, Language Processor, The Device Drivers and the BIOS. **1. The Operating System** - Main program that governs and maintains the inter-cooperation of the components for a computer system. **2. The Language Processor -** components present in the computer system does not understand human language **3 types of languages** **-Machine-Level Language** - dependent language that only understands digital signals or binary 0's an 1's **-Assembly-Level Language** - dependent language that uses mnemonics to represent each low-level machine instruction **-High-Level Language** - humans used to program and code as it is easy to read and understand to the human world. **Components of High-Level Language** **a. Assembler** - converts assembly language into machine level **b. Compiler** -converts machine level language into assembly L **c. The BIOS** - controls the peripheral or the input-output devices attached to the system. **II. Application Software** 1**. The general purpose Application Software** - Types of application software that comes in built and ready to use. 2\. **The Specific Purpose Application Software -** Types of application software that is customizable and mostly used in real-time **III. Utility Software** - Most basic type of software which provides high utility to the user and system(Ex.AnrtiVirs) **MALWARES -** are program designed to computer systems, normally for the benefit of some third party, without the user's permission. Types of Malwares: 1.**VIRUSES** - Malicious executable code attached to another executable file It can be harmless or they can modify or delete data. 2\. **WORMS** -replicates themselves and attaches to different files. They make a network slow down and do not need a host program to run. 3\. **SPYWARE** - intended to steal private information from a computer system from a third party/collects private and personal information and sends it to the hacker. 4.**TROJAN HORSE** - carries out its malicious operations under the appearance of desired applications such as games. 5\. **LOGIC BOMB** - uses trigger to activate its malicious codes. It remains non-functioning/Once triggered, activates the malicious codes and overdrives hardware components. 6.**RANSOMWARE** - Blocks access to a computer system until a sum of money is paid to the hacker. 7\. **BACKDOORS** - bypasses the usual authentication to access A system. Purpose grant criminal future access to the system. 8**.ROOTKITS** - modifies the OS to make a backdoor/take advantage of software vulnerabilities to modify system files. Can hijack or subvert security software. 9\. **KEYLOGGERS** - keeps track of the keystroke and saves the user information to be used by cyber criminals/records everything the user types in order to obtain passwords and other sensitive information. **COMPUTER SECURITY** I. **Application Security** helps by adding security features within application to prevent from cyber threats. Some application security tools are firewalls, antivirus software, encryption and web application firewall. II**. Information Security** refers to the process and methodology to protect the confidentiality, integrity and availability of computer system from unauthorized access, use, modification and destruction. III\. **Network Security** which purpose is to prevent and protect against unauthorized intrusion in computer networks some methods used here are application security, firewalls, VPN, DLP, etc. IV**. Endpoint Security** or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. V. **Internet Security** to defined a process to create a set of rules and actions to protect computer systems that are connected to the internet.branch of computer/cyber security deals with internet-based threat such as: Hacking, Computer Viruses, Denial of Service Attacks (DoS Attacks) and Malware. **INTERNET SECURITY THREATS** HACKING - refers to certain activities that exploits a computer system or network to gain access to personal data information that are used for illegal purposes. **Computer Viruses** - software program that spreads from one computer system to another without user knowledge capability to corrupt or damage data. **Denial of Service Attacks (DoS attacks)** - An attack that has the capability to shut down a system making it inaccessible to the users. **Malware** - Term for malicious software that typically consists of a software program or a code. **10 Tips for Computing Security** Tip \#1: "You're a target to hackers" Tip \#2: "Keep software up-to-date " Tip \#3: "Avoid Phishing Scams "Tip \#4: "Practice good password management" Tip \#5: " Be careful what you click " Tip \#6: "Never leave devices unattended" Tip \#7: " Safeguard Protected Data "Tip \#8: " Use mobile devices safely " Tip \#9: " Install Antivirus/Anti-Malware Protection"Tip \#10: " Back up your data " Cybersecurity Cases and Solution -International Financial Services (Ransomware) -Security Incident Involving TSP -Target Data Breach (2013) **Computer Architecture** - describe as a specification on how hardware and software technologies interact to create a computer platform/system. - involves building a computer and all that goes into a computer system. **Three Categories of Computer Architecture** **-System Design**- includes all the hardware parts or called as the actual computer system. **-Instruction Set Architecture** - comprises of the e CPU's functions and capabilities, the CPU's programming language. the part is what we considered the software that makes computer run. **-Microarchitecture** - which is responsible for data processing and storage element or data paths/ includes storage devices like DVD storages etc. **Store Program Control Concept** is defined that data and instructions are both logically the same can be stored in a memory. three classifications which are **Von-Neumann model** **General Purpose System** **Parallel Processing** **Von- Neumann Model** - It is consists of Control Unit, ALU, Registers and Input/Outputs. - It uses a single processor and utilizes one memory for both instructions and data. **General Purpose System** - modified version of the Von-Neumann Architecture/also considered as the modern day architectural representation of Computer System. **Parallel Processing** - describes as class of techniques which enables the system to data-processing tasks to increase the computational speed of a computer system. **Flynn's Classification of Computers** - classification for the organization of a computer system based by the number of instructions and data items that are manipulated simultaneously. **Instruction Stream** - is the sequence of instructions read from the memory **Data Stream** - is the operation that is performed on the data in the processor I. SISD - "Single Instruction and Single Data Stream" It represents the organization of a single computer containing a control unit, a processor unit and a memory unit. II\. SIMD - "Single Instruction and Multiple Data Stream" It represents the organization that includes many processing units under the supervision of a common control unit. III\. MISD - "Multiple Instruction and Single Data Stream" This structure is only theoretical since no practical system has been constructed using this organization. IV\. MIMD - "Multiple Instruction and Multiple Data Stream" this organization, all processors in a parallel computer can execute different instructions and operate on various data at the same time. Differences of Architecture and Organization **COMPUTER ARCHITECTURE** -Computer Architecture is concerned with the way hardware components are connected together to form a computer system. -It acts as the interface between hardware and software -While designing a computer, architecture is considered first -Computer Architecture deals with high-level design issues.- Helps to understand functionalities of the system -Architecture involves logic (Instruction sets, Addressing modes, Data Types, Cache Optimization) -A programmer can view architecture in terms of instructions, addressing, modes and registers. **COMPUTER ORGANIZATION** \- Computer organization is concerned with the structure and behavior of a computer system as seen by the user. -It deals with the components of a connection in the system -An organization is done on the basis of architecture -Computer Organization deals with low level design issues. -Tell us how units in the computer are arranged and interconnected. \- Organization involves physical components (CPU, Registers, Memory etc.) \- Whereas Organization expressed the realization of the architecture. Different Computer Architectures ----------------------------------------- ------------------------------------------------------------------------------------------------------------------------------ Von Neumann Architecture Standard desktop or laptop computers, where program instructions and data share the same memory. Harvard Architecture Microcontrollers (e.g., Arduino), where instructions and data are stored in separate memories. CISC (Complex Instruction Set Computer) Intel x86 processors in personal computers, capable of executing complex instructions. RISC (Reduced Instruction Set Computer) ARM processors in smartphones, designed to execute simpler instructions faster. System on a Chip (SoC) Smartphones, tablets, and Raspberry Pi, where the processor, memory, storage, and I/O are integrated into a single chip. Parallel Architecture GPUs (Graphics Processing Units) in gaming and deep learning, where multiple processors work simultaneously. Quantum Architecture IBM Q System One, used in quantum computing for complex problem solving using qubits. Distributed Architecture Cloud computing platforms (e.g., AWS, Google Cloud) where multiple systems work together to handle large-scale computations. Clustered Architecture Supercomputers, like IBM Summit, using clusters of computers to solve advanced scientific problems. Neural Network Architecture Specialized hardware for AI (e.g., Google TPU), used in deep learning tasks. ----------------------------------------- ------------------------------------------------------------------------------------------------------------------------------

Use Quizgecko on...
Browser
Browser