Document Details

ResourcefulErudition3654

Uploaded by ResourcefulErudition3654

FEU Manila

Tags

computing industry IT certification computer careers Introduction to the Profession

Summary

This document provides an introduction to the computing industry, outlining different knowledge areas within computing and the available career opportunities. It also touches upon the importance of certifications and emerging technologies in this field, with a focus on the career trajectory and requirements for computer professionals.

Full Transcript

MODULE 1 INTRODUCTION TO THE PROFESSION SUBTOPIC 1 INTRODUCTION TO THE COMPUTING INDUSTRY Understand the different knowledge areas in computing Describe career opportunities available in various segment of the computer industry. Ranges from theory through programming to cut...

MODULE 1 INTRODUCTION TO THE PROFESSION SUBTOPIC 1 INTRODUCTION TO THE COMPUTING INDUSTRY Understand the different knowledge areas in computing Describe career opportunities available in various segment of the computer industry. Ranges from theory through programming to cutting-edge development of computing solutions. Offers a foundation that permits graduates to adapt to new technologies and new ideas. Most computer science programs require some mathematical background. The work of computer scientists falls into three categories: a. designing and building software b. developing effective ways to solve computing problems, such as storing information in databases, sending data over networks or providing new approaches to security problems c. devising new and better ways of using computers and addressing particular challenges in areas such as robotics, computer vision, or digital forensics concerned with the information that computer systems can provide to aid a company, non-profit or governmental organization in defining and achieving its goals. also concerned with the processes that an enterprise can implement and improve using information technology IS professionals must: a. understand both technical and organizational factors b. be able to help an organization determine how information and technology enabled business processes can provide a foundation for superior organizational performance Information technology (IT) is a label that has two meanings. In common usage, the term “information technology” is often used to refer to all of computing. As a name of an undergraduate degree program, it refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organizations. IT professionals possess the right combination of knowledge and practical, hands-on expertise to take care of both an organization’s information technology infrastructure and the people who use it. They assume responsibility for selecting hardware and software products appropriate for an organization. They integrate those products with organizational needs and infrastructure, and install, customize and maintain those applications, thereby providing a secure and effective environment that supports the activities of the organization’s computer users. IT discipline require special skills such as: Understanding how networked systems are composed and structured, and what their strengths and weaknesses are. Important software systems concerns such as reliability, security, usability, and effectiveness and efficiency for their intended purpose What is the expected demand for computer professionals? Currently 10.5 million computer workers increase of 2 to 3% annually The number of students majoring in computer- related fields is declining What are the primary areas where job opportunities are found? General Computer Computer Computer business and equipment software service and government field field repair field organizations Computer IT consulting Computer education field sales and training field What is an information technology (IT) department? Department in business or government agency that employs people in computer- related jobs Responsible for keeping all computer operations and networks operating smoothly What jobs are available in an IT department? Chief Information E-commerce Project leader / Officer / VP of IT administrator manager Management Chief Security Officer Network administrator Application Software engineer Technical writer System programmer development Computer scientist Systems analyst Technical lead and programming Database analyst Systems programmer Web page author Computer forensics Quality assurance Desktop publisher specialist specialist Technical Computer technician Graphic designer / Security administrator services illustrator Database Network security Web administrator / administrator specialist Webmaster Data Operations Computer operator communications analyst Training Corporate trainer Help desk specialist What is the computer equipment field? Manufacturers and distributors of computers and computer-related hardware. Careers involve design, manufacture, and production of computer equipment Project What is the Companies leader analyzes Programmer computer that develop, manufacture, requirements, designs solutions, writes and tests computer software and support and oversees software programs software development field? process Computer Software scientist engineer researches, invents, and designs develops and develops solutions to software complex software problems What is the computer service and repair field? Provides preventative maintenance, component installation, and repair services Computer technician—installs, maintains, and repairs hardware What are career opportunities in computer sales? Computer sales people need general understanding of computers and specific knowledge of the product they are selling What are career opportunities in education and training? Schools, colleges, universities, and private companies need educators and trainers. Corporate trainers teach employees how to use software, design and develop systems, and program What is an IT consultant? Individual who draws upon expertise in specialized area of computers Hardware and Computer System Communications software selection design configuration Network Web design and installation development What are the three broad disciplines in higher education that produce the majority of entry-level employees in the computer industry? What is computer information systems (CIS)? Programs that emphasize technical knowledge and skills Sometimes called management information systems (MIS) or management information technology What is computer science (CS)? Programs that stress theoretical side of programming and operating systems Also called software engineering. What is computer engineering (CE)? Teaches students how to design and develop the electrical components found in computers and peripheral devices. Required courses include application and systems programming, data and file structures, networks, and operating systems. How do companies advertise computer- related job openings? Some Web sites specialized in helping people find jobs. Some allow job seekers to submit resumes online What are some organizations for computer professionals? Association for Computing Machinery (ACM)—science- oriented Association of Information Technology Professionals (AITP)—programmers, systems analysts, and information processing managers What is a user group? Collection of people with common computer equipment or software interests What is professional growth and continuing education? Eventssuch as workshops, seminars, conferences, conventions, and trade shows ▪ CES—trade show that brings together hundreds of vendors and more than 130,000 attendees Training in form of books, video-based training, computer-based training (CBT), Web-based training (WBT), and instructor-led training How can you stay informed about the computer industry? Computer industry publications News, blogs, and technical Web sites Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 1 INTRODUCTION TO THE PROFESSION SUBTOPIC 2 CERTIFICATION AND TECHNOLOGY TRENDS Understand the different jobs available in an IT department. Identify the benefits of computing-related certification for employers, Identify the different areas in IT certification. Understand and be aware of different Emerging Technologies What is certification? Process of verifying technical knowledge in a particular area. Proficiency is acknowledged with certificate. Enhances employee’s career, provides better standing as industry professional, and higher salaries and bonuses Vendors provide access to technical information, advanced training, and discounts on publications and tools How does certification benefit customers, employers, and industry? Customers receive better service from employees with certification(s) Employers benefit from more productive and knowledgeable workers Certification is a form of industry self-regulation Institute for Certification of Computer Professionals (ICCP) defines standards designed to raise competence level for computer industry What are factors to consider in choosing a certification? What options are available to prepare for certification? Self-study Online training classes Instructor-led training Web resources What are examinations like? Taken using computers Some are multiple choice, others are skill based With computerized adaptive testing, the tests analyze a person’s responses while taking the test What are application software certifications? Focus on knowledge of Sometimes called application software end-user certifications Microsoft Microsoft Adobe Office Certified Certified Desktop Support Specialist Expert Technician (MOS) (MCDST) sponsored by sponsored by sponsored by Adobe Microsoft Microsoft Systems IBM Certified Macromedia Professional Certified for Lotus Professional Software sponsored by sponsored by Macromedia IBM What are operating system certifications? Focus on particular skills—user, Differing levels of operator, system administrator, and system engineer certification Microsoft Certified Red Hat Certified Linux Certified Systems Professional Engineer Administrator (CNP) (RHCE) (MCSA) sponsored sponsored sponsored by by Novell by Red Hat Red Hat Microsoft Certified Sun Certified IBM Technician System Certified (RHCT) Administrator Specialist sponsored sponsored by sponsored by Red Hat Sun by IBM What are programming certifications? Recognition of programming Broadens knowledge and skill training base Certified IBM Certified Microsoft Software Solution Certified Development Developer Professional Professional sponsored Developer (CSDP) by IBM (MCPD) sponsored by sponsored IEEE by Microsoft Computer Society Sun Certified Sun Certified Sun Certified Enterprise Developer Programmer Architect sponsored sponsored sponsored by Sun by Sun by Sun What are hardware certifications? Recognition of general knowledge of hardware and controlling Can be narrowly or software needed to set up, broadly focused maintain, and repair a computer A+ IBM NACSE sponsored by eServer Network Technician Computing Certified (NNT) Technology Specialist sponsored by Industry sponsored by National Association IBM Association of (CompTIA) Communication Systems Engineers (NACSE) What are networking certifications? Awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting a network Certified Novell Certified Novell Cisco Certified Administrator Engineer (CNE) Network (CNA) sponsored by Professional sponsored by Novell (CCNP) Novell sponsored by Cisco Network+ Sun Certified sponsored by Network Computing Administrator Technology Industry sponsored by Association Sun (CompTIA) What are computer forensics certifications? Discovery, collection, and Certificate holders are analysis of evidence found on considered highly credible computers and networks during computer crimes cases Certified Electronic Certified Forensic Certified Computer Evidence Collection Computer Examiner Specialist (CEECS) Examiner (CCE) sponsored by (CFCE) sponsored by International sponsored by International Association of International Society of Computer Association of Forensic Investigative Computer Computer Specialists (IACIS) Investigative Examiners (ISFCE) Specialists (IACIS) What are security certifications? Measure a candidate’s ability to identify and control security risks to computer resources Certified Systems Security Information Certified Security Practitioner Professional (SSCP) (CISSP) sponsored by sponsored by (ISC)2 (ISC)2 Security Certified Security Certified Network Network Architect Professional (SCNA) (SCNP) sponsored by The sponsored by The Security Certified Security Certified Program Program What are Internet certifications? Require technical expertise in Include Web management, Web networking hardware and programming, and Web configuration development certifications Certified Cisco Certified Internet Certified Web Professional Webmaster Internetwork (CWP) (CIW) Expert sponsored by sponsored by (CCIE) International Prosoft sponsored by Webmasters Training Cisco Association What are database system certifications? Awarded for knowledge Test the various tasks of a specific database a database management management system staff must perform IBM IBM Microsoft Certified Certified Certified IT Solutions Solutions Professional Expert–DB2 Expert–Informix (MCITP) sponsored sponsored by sponsored by IBM IBM by Microsoft Oracle Sybase Certified Certified Professional Professional (OCP) sponsored sponsored by Sybase by Oracle Artificial Intelligence (AI) Artificial Intelligence continues to be a trend to watch because its effects on how we live, work and play are only in the early stages. AI refers to computers systems built to mimic human intelligence and perform tasks such as recognition of images, speech or patterns and decision making. AI can do these tasks faster and more accurately than humans. Machine Learning Machine Learning is a subset of AI. Computers are programmed to learn to do something they are not programmed to do. They learn by discovering patterns and insights from data. Neural networks, natural language processing (NLP), and deep learning are some subsets of Machine Learning. Robotic Process Automation or RPA RPA is the use of software to automate business processes such as interpreting applications, processing transactions, dealing with data, and even replying to emails. RPA automates repetitive tasks that people used to do. These are not just the menial tasks of a low-paid worker: up to 45 percent of the activities we do can be automated, including the work of financial managers, doctors and CEOs. Blockchain Most people think of blockchain technology in relation to cryptocurrencies such as Bitcoin. Blockchain offers security that is useful in many other ways. In the simplest of terms, blockchain can be described as data you can only add to, not take away from or change. Blockchains are consensus-driven so no one entity can take control of the data. Edge Computing Cloud computing has become mainstream, with major players AWS (Amazon Web Services), Microsoft Azure and Google Cloud dominating the market. Cloud computing is no longer the emerging technology. Edge is. Edge computing is designed to help solve some problems of cloud computing as a way to bypass the latency caused by cloud computing and getting data to a data center for processing. Virtual Reality (VR) and Augmented Reality (AR) Virtual Reality (VR) immerses the user in an environment. Augment Reality (AR) enhances their environment. Although VR has primarily been used for gaming thus far, it has also been used for training. Both have enormous potential in training, entertainment, education, marketing, and even rehabilitation after an injury. Cyber Security Cyber security might not seem like emerging technology but it is evolving just as other technologies are. Hackers will continue to find ways to get through even the toughest security measures. New technology is being adapted to enhance security. As long as we have hackers, we will have cyber security as an emerging technology because it will constantly evolve to defend against those hackers. Internet of Things Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. IoT enables devices, home appliances, cars and much more to be connected to and exchange data over the Internet. The number of IoT devices reached 8.4 billion in 2017 and is expected to reach 30 billion devices after 3 years. Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 2 INTRODUCTION TO COMPUTER SUBTOPIC 1 COMPUTER BASICS Discuss the Evolution of Computer System (Timeline) Define different computer terminologies. Describe the elements of computer system. Explain why computer literacy is vital to the success in today’s world. Explain the value of data and information. Computers are everywhere A computer is an electronic device, operating under the control of instructions stored in its own memory Produces Collects data Processing information (input) (output) Information Processing Cycle Mobile Personal computers and Game consoles computers mobile devices Servers Mainframes Supercomputers Embedded computers A personal computer can perform all of its input, processing, output, and storage activities by itself Two popular architectures are the PC and the Apple Desktop computer Mobile Mobile Computer Personal Device Computing computer you device small can carry from enough to hold place to place in your hand Examples include Examples include smart phones and PDAs, e- notebook computers, book readers, handheld laptop computers, computers, portable netbooks, ultra-thins, media players, and and Tablet PCs digital cameras Notebook computer Tablet PC Smart phones and PDAs E-book reader Handheld computer Portable media player Digital camera A game console is a mobile computing device designed for single-player or multiplayer video games A server controls access to the hardware, software, and other resources on a network Provides a centralized storage area for programs, data, and information A mainframe is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously A supercomputer is the fastest, most powerful computer Fastest supercomputers are capable of processing more than one quadrillion instructions in a single second An embedded computer is a special-purpose computer that functions as a component in a larger product Process Computer Consumer Home Automation Automobiles Controllers and Devices and Electronics Devices Robotics Office Machines Mobile and Thermostats Antilock Remote Keyboards digital telephones Sprinkling brakes monitoring Printers Digital systems Engine systems Faxes televisions Security control Power Copiers Cameras modules monitors Video recorders monitoring DVD players systems Airbag Machine and recorders Appliances controller controllers Answering Lights Cruise Medical machines control devices The Abacus, beads on rods to count and calculate still widely used in Asia! Napier's bones is a manually- operated calculating device created by John Napier for the calculation of products and quotients of numbers. Slide Rule (1630) based on Napier’s rules for logarithms used until 1970s Jacquard Loom (1804) Joseph Marie Jacquard The Jacquard machine is a device fitted to a power loom that simplifies the process of manufacturing textiles with such complex patterns as brocade, damask and matelassé. The Analytical Engine was a proposed mechanical general- purpose computer designed by English mathematician and computer pioneer Charles Babbage. It was first described in 1837 as the successor to Babbage's Difference Engine, a design for a simpler mechanical computer. What was the biggest advancements that led to modern computers? Electricity Transistor Microchip Data storage First Generation (1940-1956) of Electronic Computers used Vacuum Tubes Vacuum tubes are glass tubes with circuits inside. Vacuum tubes have no air inside of them, which protects the circuitry. The UNIVAC (Universal Automatic Computer) is an electrical computer containing thousands of vacuum tubes that utilizes punch cards and switches for inputting data and punch cards for outputting and storing data. Released in 1951 and 1952 when first developed by J. Presper Eckert and John Mauchly. Grace Hopper helped develop a compiler that was a precursor to the widely used COBOL language assigned to program the Mark I computer. she oversaw programming for the UNIVAC computer The first computer “bug” Grace Hopper found a moth stuck in a relay responsible for a malfunction in the Mark II computer Called it “debugging” a computer Second Generation (1956-1963) of computers used transistors instead of vacuum tubes. Transistors were widely used in computers from 1956 to 1963. Transistors were smaller than vacuum tubes and allowed computers to be smaller in size, faster in speed, and cheaper to build. Developed by John Bardeen, Walter Brattain, and William Shockley at the Bell Laboratories on December 23, 1947. made up of semi- conductors. Used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. The third generation (1964- 1971) of computers introduced the use of IC (integrated circuits) in computers. Using IC's in computers helped reduce the size of computers even more compared to second- generation computers, as well as make them faster. The fourth generation (1972-2010) of computers took advantage of the invention of the microprocessor, more commonly known as a CPU. Microprocessors, along with integrated circuits, helped make it possible for computers to fit easily on a desk and for the introduction of the laptop. IBM 5100 Altair 8800 The fifth generation (2010-present) of computers is beginning to use AI (artificial intelligence), an exciting technology that has many potential applications around the world. Leaps have been made in AI technology and computers, but there is still much room for improvement. Advantages of Disadvantages of Using Computers Using Computers Speed Health Risks Reliability Violation of Privacy Consistency Public Safety Storage Impact on Labor Force Communications Impact on Environment Green computing involves reducing the electricity consumed and environmental waste generated when using a computer Strategies include: Recycling Regulating manufacturing processes Extending the life of computers Immediately donating or properly disposing of replaced computers Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 2 INTRODUCTION TO COMPUTER SUBTOPIC 2 USES AND APPLICATIONS OF COMPUTER Differentiate how home users, small office/home office users, mobile users, power users, and enterprise users Discuss how society uses computers in education, finance, government, health care, science, publishing, travel, and manufacturing Hardware Software Data People Procedures A computer contains many electric, electronic, and mechanical components known as hardware Input Device Allows you to enter data and instructions into a computer Hardware component that conveys information to one or Output Device more people Case that contains the electronic components of the computer System Unit that are used to process data Records (writes) and/or retrieves (reads) items to and from Storage Device storage media Communications Enables a computer to send and receive data, instructions, and Device information to and from one or more computers or mobile devices Software, also called a program, tells the computer what tasks to perform and how to perform them System Software Operating system Utility program Application Software Installing is the process of setting up software to work with the computer, printer, and other hardware A programmer develops software or writes the instructions that direct the computer to process data into information Computer transform data into information. Data is the raw material. Information is processes data. Data is the input to be processed; information is the output. Users of data are also considered as element of an Information System. Procedures are the steps that you must follow to accomplish a specific computer-related task. Part of a user’s computer literacy is knowing common procedures. In general, data is any set of characters that is gathered and translated for some purpose. It can be any character, including text and numbers, pictures, sound, or video. Within a computer's storage, data is a collection of numbers represented as bytes that are in turn composed of bits (binary digits) that can have the value one or zero. Data is processed by the CPU. Information is a term used to describe text that is informative to the individual reading it or the computer processing it. Data Raw, unprocessed Meaningless Information Processed data Meaningful and can be used in many significant ways Home User Small Mobile User Office/Home Connect to other Personal financial management Office User computers on a network or the Web access Look up information Internet Communications Send and receive e- Transfer information mail messages Entertainment Play video games Make telephone calls Listen to music Watch movies Power User Enterprise User Work with Communicate multimedia among employees Use industry- Process high specific software volumes of transactions Blog Education Finance Government Health Care Science Publishing Travel Manufacturing Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 3 HARDWARE COMPONENTS OF PERSONAL COMPUTER SUBTOPIC 1 THE SYSTEM UNIT To differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify chips, adapter cards, and other components of a motherboard To explain the control unit and arithmetic logic unit components of a processor, and the four steps in a machine cycle To differentiate between a port and a connector, and explain the differences The system unit (NOT CPU ☺) is a case that contains electronic components of the computer used to process data. The inside of the system unit on a desktop personal computer includes: Drive bay(s) Power supply Sound card Video card Processor Memory The motherboard is the main circuit board of the system unit A computer chip contains integrated circuits The processor, also called the central processing unit (CPU), interprets and carries out the basic instructions that operate a computer Contain a control unit and an arithmetic logic unit (ALU) Multi-core Dual-core Quad-core processor processor processor The control unit and the arithmetic logic unit: The control unit is the component of the processor that directs and coordinates most of the operations in the computer The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations For every instruction, a processor repeats a set of four basic operations, which comprise a machine cycle. The pace of the system clock is called the clock speed, and is measured in gigahertz (GHz) The system clock controls the timing of all computer operations Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 3 HARDWARE COMPONENTS OF PERSONAL COMPUTER SUBTOPIC 2 MEMORY AND STORAGE To describe different storage devices and types. Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data Stores three basic categories of items: Data being The operating Application processed and the system and other programs resulting system software information Each location in memory has an address Memory size is measured in kilobytes (KB or K), megabytes (MB), gigabytes (GB), or terabytes (TB) The system unit contains two types of memory: Volatile memory Nonvolatile memory Loses its contents when Does not lose contents power is turned off when power is removed Examples include ROM, Example includes RAM flash memory, and CMOS Three basic types of RAM chips exist: Dynamic RAM Static RAM (SRAM) (DRAM) Magnetoresistive RAM (MRAM) Dynamic RAM is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit. The capacitor can be either charged or discharged Static RAM has three different states. It can be in: standby (the circuit is idle), reading (the data has been requested) and writing (updating the contents). Magnetoresistive RAM data in MRAM is not stored as electric charge or current flows, but by magnetic storage elements. Dynamic RAM SDRAM (Synchronous Dynamic RAM) DDR SDRAM (Double Data Rate Synchronous Dynamic RAM) memory transfer data on both the rising and falling edges of the clock signal 400 MT/s DDR2 SDRAM 8.5 GT/s; “dual channel mode”; memory installed in pairs DDR3 SDRAM Operates at lower voltages; consuming less power 12.8 GT/s; dual and triple channel modes RAM chips usually reside on a memory module and are inserted into memory slots. The amount of RAM necessary in a computer often depends on the types of software you plan to use Memory cache speeds the processes of the computer because it stores frequently used instructions and data Read-only memory (ROM) refers to memory chips storing permanent data and instructions Firmware Flash memory can be erased electronically and rewritten CMOS technology provides high speeds and consumes little power A hard disk drive (often shortened as "hard disk“, "hard drive", or "HDD"), is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Strictly speaking, "drive" refers to a device distinct from its medium. DVD, also known as "Digital Versatile Disc" or "Digital Video Disc," is an optical disc storage media format. Its main uses are video and data storage. DVDs are of the same dimensions as compact discs (CDs) but store more than six times as much data. Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium to supersede the standard DVD format. Its main uses are for storing PlayStation 3 games, high- definition video and data storage with up to 50GB per disc. The disc has the same physical dimensions as standard DVDs and CDs. A USB flash drive consists of a NAND-type flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and most USB flash drives weigh less than an ounce (30 g) A memory card or flash memory card is a solid-state electronic flash memory data storage device capable of storing digital contents. These are mainly used with digital cameras, handheld and Mobile computers, mobile phones, music players, digital cinematography cameras, video game consoles, and other electronics. They offer high re-record-ability, power-free storage, small form factor, and rugged environmental specifications. There are also non-solid-state memory cards that do not use flash memory, and there are different types of flash memory. Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 3 HARDWARE COMPONENTS OF PERSONAL COMPUTER SUBTOPIC 3 INPUT AND OUTPUT To define and describe input and output unit. The keyboard is used to type data into the computer. Pointing devices move some object on the screen and can do some action. Other pointing devices such as Joysticks or game controllers. The scanner allows you to scan documents, pictures or graphics and view them on the computer. It converts image into dots that the computer can understand. Digital cameras are used to take electronic pictures of an object. Microphones are used to put sound into a computer. Today, commands can also be given to computer using your voice. Monitors shows the processed information on screen. It displays soft copy of the information.. When the device is turned off the information goes away. Printers produces a hard copy of the information. The information is printed on paper and can be used when the device is off. Speakers are used to output sound. Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 4 NUMBER SYSTEMS SUBTOPIC 1 NUMBER SYSTEM CONVERSION To define different number system and its applications To convert different number bases The study of number system will help us gain better understanding of how computers perform computation. Binary number is the true language of computer since it is operated into two state. The radix, or base, of a number system is the total number of unique symbols available in that system. The largest valued symbol always has a magnitude of one less than the radix. Decimal notation is the writing of numbers in the base-ten numeral system, which uses various symbols (called digits) for ten distinct values (0, 1, 2, 3, 4, 5, 6, 7, 8 and 9) to represent numbers. These digits are often used with a decimal separator which indicates the start of a fractional part, and with one of the sign symbols + (plus) or − (minus) to indicate sign. The decimal system is a positional numeral system; it has positions for units, tens, hundreds, etc. The position of each digit conveys the multiplier (a power of ten) to be used with that digit—each position has a value ten times that of the position to its right. The binary system works in exactly the same way, except that its place value is based on the number two. In the binary system, we have the one's place, the two's place, the four's place, the eight's place, the sixteen's place, and so on. Each place in the number represents two times (2X's) the place to its right. Binary number system has a base, or radix, of 2. Binary numbers are composed of two symbols: 0 and 1. Decimal Binary 0 0000 8 + 2 = 10 1 0001 2 0010 8 4 2 1 3 0011 4 0100 1010 5 0101 6 0110 Considering the digits that 7 0111 has a value of 1 and adding 8 1000 it number marker on the top 9 1001 10 1010 of each digits The octal number system has a base, or radix, of 8. Octal numbers are composed of eight symbols: 0, 1, 2, 3, 4, 5, 6, and 7. The hexadecimal number system has a base, or radix, of 16. Hexadecimal numbers are composed of sixteen symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Symbols A to F correspond to decimal numbers 10 to 15. Binary to Decimal , Octal, Hexadecimal Decimal to Binary, Octal, Hexadecimal Octal to Decimal, Binary, Hexadecimal Hexadecimal to Binary, Octal, Decimal Remember that Binary numbers are based on the radix of 2 while Decimal numbers are based on the radix of 10. Remember also that binary will only be represented in 1s and 0s. Steps in converting Binary to Decimal: Place a number marker on the top of the given digits, starting from 0 up the last given digits—starting from the right to determine the exponent to use. Consider all the 1s in the given digits and multiply it with the base number of the given digits (which is base 2) and raised it with power of the number corresponded in the number marker you placed on the top of the given digits. Place the number 1010102 = ?10 marker on the top of the given digits, starting from the right, starting from 0 5 4 3 2 1 0 up to the last given digit = 101010 on the left. = 1*25 + 1*23 + 1*21 = 32 + 8 + 2 = 4210 Since one octal digit is equivalent to three binary digits, just group three binary digits, starting from the least significant bit (right side). Append 0 to the most significant bit (left side), if the grouping does not have enough to form three binary digits. In short, you must complete the grouping of three digits. If you will be having a fraction (decimal point), append 0 to the least most significant bit (right side) of the given digits to complete the grouping of three bits. Steps in converting Binary to Octal: Group the given digits in three starting from the right side. If the grouping is not complete, place 0 to complete the grouping. Once you have grouped it into three digits, you starting converting the binary digits into decimal values following the concepts of binary digits (4, 2, 1) starting from the right. 11010102 = ?8 3rd group 2nd group 1st group Add 0 to the left, to = 001 101 010 complete the grouping 4 2 1 4 2 1 4 2 1 = 001 101 010 Simply add all the number = 1 5 28 markers considering the binary digits that = 1528 has 1 on it. Since one hexadecimal digit is equivalent to four binary digits, just group four binary digits, starting from the least significant bit (right side). Append 0 to the most significant bit (left side), if the grouping does not have enough to form four binary digits. In short, you must complete the grouping of four digits. If you will be having a fraction (decimal point), append 0 to the least most significant bit (right side) of the given digits to complete the grouping of three bits. Steps in converting Binary to Hexadecimal: Group the given digits in four starting from the right side. If the grouping is not complete, place 0 to complete the grouping. Once you have grouped it into three digits, you starting converting the binary digits into decimal values following the concepts of binary digits (8, 4, 2, 1) starting from the right. 11010102 = ?16 2nd group 1st group Simply add all the = 0110 1010 number markers considering the Add 0 to the left, to binary digits that 8 4 21 8 4 2 1 has 1 on it. complete the grouping = 0110 1010 = 6 A16 = 6A16 Converting a decimal number to a binary number is done by successively dividing the decimal number by 2 on the left side of the radix. If you will have a fractional part of the given decimal, successively multiplying the decimal number by 2 on the right side of the radix. Steps in converting Decimal to Binary: Divide the given decimal number with the base number you are converting it to, which is 2. Whatever the answer you will get in the division will be divided again with the base (2) until you cannot divide the answer anymore with 2. The remainder that you will get will be the one you consider as your converted answer. Remainder of the division, will 610 = ?2 only have two values since it is in base 2, meaning you can only have 1 or 0 as a remainder. = 1102 remainder = 6/2 0 In reading the = 3/2 1 answer, you should read it = 1/2 1 upward. = 0/2 Converting a decimal number to an octal number is done by successively dividing the decimal number by 8 on the left side of the radix. If you will have a fractional part of the given decimal, successively multiplying the decimal number by 8 on the right side of the radix. Steps in converting Decimal to Octal: Divide the given decimal number with the base number you are converting it to, which is 8. Whatever the answer you will get in the division will be divided again with the base (8) until you cannot divide the answer anymore with 8. The remainder that you will get will be the one you consider as your converted answer. 6610 = ?8 Remainder of the division, will only have 0-7 values since it is in = 1028 base 8 remainder = 66/8 2 In reading the answer, you = 8/8 0 should read it = 1/8 1 upward. = 0/8 Converting a decimal number to a hexadecimal number is done by successively dividing the decimal number by 16 on the left side of the radix If you will have a fractional part of the given decimal, successively multiplying the decimal number by 16 on the right side of the radix. Steps in converting Decimal to Hexadecimal: Divide the given decimal number with the base number you are converting it to, which is 16. Whatever the answer you will get in the division will be divided again with the base (16) until you cannot divide the answer anymore with 16. The remainder that you will get will be the one you consider as your converted answer. Remainder of the division, will only 28610 = ?16 have 0-9, A-F values since it is in base 16 = 11E16 In reading the remainder answer, you should read it upward. = 286/16 14 = 17/16 1 The value 14 should be = 1/16 1 converted to = 0/16 hexadecimal format Remember that Octal numbers are based on the radix of 8 while Decimal numbers are based on the radix of 10. Remember also that Octal will only be represented with value 0-7. Steps in converting Octal to Decimal: Place a number marker on the top of the given digits, starting from 0 up the last given digits—starting from the right to determine the exponent to use. Considering all the given digits, multiply it with the base number of the given digits (which is base 8) and raised it with power of the number corresponded in the number marker you placed on the top of the given digits. Place the number 7618 = ?10 marker on the top of the given digits, starting from 2 1 0 the right, starting from 0 up to the last given digit = 761 on the left. = 7*82 + 6*81 + 1*80 = 448+ 48 + 1 = 49710 Since one octal digit is equivalent to three binary digits, just convert the individual octal digit into three binary digits. Steps in converting Octal to Binary: Convert each of the given octal number by simply using the concept of (4, 2, 1). Place a binary 1 to correspond the given octal number. 7618 = ?2 Simply add all the number markers 4 21 considering the binary = 7 111 digits that has 1 on it, to get the octal number 4 21 given. = 6 110 4 2 1 = 1 001 = 111 110 0012 When converting an octal digit to a hexadecimal digit, you must first convert the octal number to binary number and group it by four and convert the grouped digits to hexadecimal by using the concept of (8, 4, 2, 1). If the digits is not enough to form a grouping of four then append 0 on the left side of the digits. If the given octal have fraction, then append 0 on the right side of the given digits. Steps in converting Octal to Hexadecimal: Convert the octal digits in binary by considering each given digits and represent it in binary using the concept (4, 2, 1). Once it is in binary, that’s the time you convert the binary into hexadecimal, by grouping it into four. 7618 = ?16 7 6 1 = 111 110 001 1 F 1 = 0001 1111 0001 = 1F116 Since one hexadecimal digit is equivalent to four binary digits, just convert the individual hexadecimal digit into four binary digit 7AE316 = ?2 = 7 0111 A 1010 E 1110 3 0011 = 0111 1010 1110 00112 When converting a hexadecimal digit to an octal digit, you must first convert the hexadecimal number to binary number and group it by three and convert the grouped digits to octal by using the concept of (4, 2, 1). If the digits is not enough to form a grouping of three then append 0 on the left side of the digits. If the given hexadecimal have fraction, then append 0 on the right side of the given digits. Steps in converting Hexadecimal to Octal: Convert the hexadecimal digits in binary by considering each given digits Once converted to binary group the binary into three and using the concept (4, 2, 1). 7AE316 = ?8 = 7 0111 A 1010 E 1110 3 0011 7 5 3 4 3 = 0 111 101 011 100 0112 = 753438 Each hexadecimal position is weighted with a power of 16. Digits on the left side of the radix point has a positive exponent while on the right side of the radix point has a negative exponent. Converting a hexadecimal number to a decimal number is done by successively multiplying the decimal number by 16 on the left side of the radix If you will have a fractional part of the given decimal, successively multiplying the decimal number by 16 on the right side of the radix. Steps in converting Hexadecimal to Decimal: Place a number marker on the top of the given number for determining the exponent to be used. Get the individual digit and multiply it by the base number (16) and raised it with the exponent corresponds to the number marker you place on each digit, then to the addition operation. 286A16 = ?10 3 2 1 0 = 286A = 2*163 + 8*162 + 6*161 + A*160 = 1034610 Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 4 NUMBER SYSTEMS SUBTOPIC 2 ADDITION AND SUBTRACTION IN NUMBER SYSTEMS To compute for the sum and difference of binary, octal, and hexadecimal numbers Rules: Examples: 1 111 1 0+0=0 11011 11 1 1 0+1=1 11011 10101 1+0=1 + 1001 + 1001 1 + 1 = 0 carry 1 100100 111001 Rules: Example: Example: 0-0=0 2 1 002 02 2 0 - 1 = 1 (borrow 2) 11011 10001 1-0=1 + 1101 + 1101 1-1=0 1110 100 The are other ways of subtracting Binary Number: 1's complement Done by inverting the binary digits (e.g. 1 becomes 0, 0 becomes 1) in the subtrahend. 2's complement Done by finding the 1’s complement of a binary number in the subtrahend then add 1. Generally used because it will only have one representation of a value 0 compare to 1’s complement. 1's complement 2's complement 111001012 111001012 000110102 000110102 + 12 000110112 Steps: Using 1's complement 1. Find the 1’s complement of the subtrahend. 1 1 11 The final carry 2. Change the subtraction 11011012 11011012 will be added to operation to addition. get the correct - 110012 + 11001102 difference of 3. Solve for the sum of the 1 1 the two binary binary numbers. The subtraction 10100112 numbers. 4. Add the final carry to the operator becomes addition + 12 computed sum to get the correct difference. 10101002 You must make sure that the number of digits in the subtrahend and minuend are the same. Steps: Using 2's complement 1. Find the 2’s complement of the The final carry subtrahend. is discarded. 1 1 11 11 2. Change the subtraction 11011012 11011012 operation to addition. - 110012 + 11001112 3. Solve for the sum of the binary numbers. The subtraction 10101002 4. Discard the final (excess) carry. operator becomes addition **The computed sum of the original minuend and the 2’s You must make sure complement of the subtrahend that the number of digits in the minuend is the difference. and subtrahend are the same. Adding octal numbers are just like adding decimal numbers. But when the sum is greater than 7, you must make sure that you convert it to octal number first. Note that Octal numbers are 0, 1, 2, 3, 4, 5, 6, 7, 10, 11…. Examples: 111 4 + 6 = 10, since 10 is greater 543 744 than 7, we have to + 14 + 56 convert it to its octal equivalent 557 1022 10 ÷ 8 = 1 remainder 2, the remainder will be written as part of the sum and the quotient will be carried over Subtraction of Octal numbers also follow how subtraction of Decimal numbers is, but instead of borrowing 10, you must borrow 8 from the next higher significant digit. Borrowed 8 from 5 Borrowed 8 from 2, 8+3=11 48 5 8 1 11 50258 60238 - 1128 - 41158 47138 17068 Addition and subtraction of Hexadecimal Numbers are just like how we did with Octal Numbers, the same rules in carrying and borrowing is applied, but note that the base of Hexadecimal Numbers is 16. Hexadecimal numbers are: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D , E, F, 10, 11, 12…. 1 Note that A = 10, 7 9 B 2 16 2 + 10 = 12, + 3 1 9 A In Hexadecimal, 12 is C 16 A B 4 C 16 B = 11, 11 + 9 = 20, 20 is greater than 15 so we need to convert it to Hexadecimal 20 ÷ 16 = 1 remainder 4, 4 becomes part of the sum and 1 is carried. Borrow 16 from 8 Borrow 16 from 1, 16 16 + 3 = 19 7 0 19 8 1 3 F16 Note that F = 15, - 4 B 216 15 - 2 = 13, in Hexadecimal, 13 is D 7 C 8 D16 Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 5 SOFTWARE SUBTOPIC 1 SYSTEM SOFTWARE To define system software and identify the two types of system software To identify different types of operating system To explain the functions and importance of an operating system Explain the purpose of several utility programs System software consists of the programs that control or maintain the operations of the computer and its devices Operating Utility systems Programs An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Start and shut Provide a user Manage Manage down a interface programs memory computer Establish an Coordinate Configure Monitor Internet tasks devices performance connection Provide Automatically Control a Administer utilities update network security The process of starting or restarting a computer is called booting Cold boot Warm boot Turning on Using the a computer operating that has system to been restart a powered off computer completely A boot drive is the drive from which your computer starts You can boot from a boot disk A recovery disk contains a few system files that will start the computer An operating system includes various shut down options Sleep mode saves any open documents and programs to Hibernate saves any open RAM, turns off all unneeded documents and programs to functions, and then places a hard disk before removing the computer in a low- power from the computer power state A user interface controls how you enter data and instructions and how information is displayed on the screen With a graphical user interface (GUI), you interact with menus and visual images With a command-line interface, a user uses the keyboard to enter data and instructions How an operating system handles programs directly affects your productivity Single tasking Single user and Foreground and and multiuser background multitasking Preemptive Multiprocessing multitasking Memory management optimizes the use of RAM. Virtual memory is a portion of a storage medium functioning as additional RAM The operating system determines the order in which tasks are processed (task scheduling) Operating systems typically provide a means to establish Internet connections A performance monitor is a program that assesses and reports information about various computer resources and devices. Operating systems often provide users with the capability of: Searching for Viewing Securing a Managing files files images computer Uninstalling Cleaning up Defragmenting Diagnosing programs disks disks problems Backing up Setting up files and disks screen savers Automatic update automatically provides updates to the program, especially the operating system. A network administrator uses the server operating system to: Add and remove users, computers, and other devices Install software and administer network security Some operating systems are designed to work with a server on a network A server operating system organizes and coordinates how multiple users access and share resources on a network Each user has a user account A user name, or user ID, identifies a specific user A password is a private combination of characters associated with the user name A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device Windows Mac OS X 7 UNIX Linux Windows 10 is Microsoft’s fastest, most efficient operating system to date and is available in multiple editions (12), here are the most common: Windows 10 Windows 10 Pro Home Windows 10 Windows 10 Education Enterprise Windows 10 provides programs such as: Windows Groove Defender Music Microsoft Movies Store and TV Additional Windows 10 features are: The return of the familiar Start Menu A new web browser, Microsoft Edge Cortana, your personal virtual assistant Multiple desktop and Task View Action Center, accessible notifications and settings Tablet mode The Macintosh operating system has set the standard for operating system ease of use Latest version is Mac OS Mojave UNIX is a multitasking operating system developed in the early 1970s Linux is an open-source, popular, multitasking UNIX- type operating system Windows UNIX Linux Server 2019 Solaris NetWare An embedded operating system resides on a ROM chip on a mobile device or consumer electronic device Windows Windows 10 Palm OS iPhone OS Embedded CE Mobile Google Embedded BlackBerry Symbian OS Android Linux A utility program is a type of system software that allows a user to perform maintenance-type tasks A file manager is a utility that performs functions related to file management Displaying a list of files Organizing files in folders Copying, renaming, deleting, moving, and sorting files and folders Creating shortcuts A search utility is a program that attempts to locate a file on your computer based on criteria you specify An image viewer allows users to display, copy, and print the contents of a graphics file An uninstaller removes a program, as well as any associated entries in the system files A disk cleanup utility searches for and removes unnecessary files Downloaded program files Temporary Internet files Deleted files Unused program files A disk defragmenter reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster A backup utility allows users to copy files to another storage medium A restore utility reverses the process and returns backed up files to their original form A personal firewall detects and protects a personal computer from unauthorized intrusions A screen saver causes a display device’s screen to show a moving image or blank screen if no activity occurs for a specified time A virus describes a potentially damaging computer program that affects a computer negatively A worm copies A Trojan horse An antivirus itself hides within or program repeatedly in looks like a protects a memory or legitimate computer over a network program against viruses Spyware is a program placed on Adware displays an online a computer without the user’s advertisement in a banner or knowledge that secretly collects pop-up window information about the user A spyware remover detects An adware remover is a and deletes spyware and program that detects and other similar programs deletes adware Filters are programs that remove or block certain items from being displayed Web filtering Anti-spam software programs Phishing Pop-up filters blockers A file compression utility shrinks the size of a file(s) Compressing files frees up room on the storage media Two types of compression Lossy Lossless Compressed files sometimes are called zipped files Can be uncompressed (unzipped) A media player allows you to view images and animation, listen to audio, and watch video files on your computer Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable optical disc A personal computer maintenance utility identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 5 SOFTWARE SUBTOPIC 2 APPLICATION SOFTWARE To identify the four categories of application software and differentiate among the seven forms through which software is available Application software consists of programs designed to make users more productive and/or assist with personal tasks To make business activities more efficient To assist with graphics and multimedia projects To support home, personal, and educational tasks To facilitate communications Available in a variety of forms: Packaged Custom Web software software application Open source Shareware Freeware software Public-domain software System software serves as the interface between the user, the application software, and the computer’s hardware. Business software is application software that assists people while performing business activities Word Spreadsheet Database Presentation Processing Personal Business Business Note taking information software for software manager phones suites Enterprise Project Document Accounting computing management management software Word processing software allows users to create and manipulate documents Clip art is a collection of electronic drawings, photos, and other images Additional word processing features include Auto Auto Grammar Collaboration Columns Correct Format Checker Reading Ink Input Macros Mail Merge Research Layout Search and Smart Tags Tables Templates Thesaurus Replace Tracking Voice Web Page Changes Recognition Development Developing a document Edit a Enter text and document Change appearance numbers Font Make changes to Insert images existing content Font size Perform other tasks Inserting, deleting, cutting, copying, and Create a pasting Format a document document Spreadsheet software allows users to organize data in rows and columns and perform calculations A function is a predefined formula that performs common calculations FV NPV PMT PV RATE DATE NOW TIME ABS INT LN LOG ROUND SQRT SUM AVERAGE COUNT MAX MIN STDEV IF Charting depicts data in a spreadsheet in graphical form A database is a collection of data organized in a manner that allows access, retrieval, and use of that data Database software allows users to create, access, and manage a database Presentation software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group Note taking software is application software that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page A software suite is a collection of individual programs available together as a unit A personal information manager (PIM) is application software that includes Appointment Address Notepad calendar book Scaled down versions of software are available to work with smart phones and other mobile devices Project management software allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project Accounting software helps companies record and report their financial transactions Document management software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user Enterprises typically require special computing solutions for various functional units Human Accounting Engineering Marketing resources Customer Information Sales Distribution service technology Computer-aided design (CAD) software Desktop publishing software Paint/Image editing software Professional photo editing software Video and audio editing software Multimedia authoring software Web page authoring software helps users of all skill levels create Web pages that include multimedia and interactive content Personal finance software Legal software Tax preparation software Personal DTP software Personal paint/image editing software Personal photo editing software Clip art/image gallery Video and audio editing software Home design/landscaping software Travel and mapping software Reference software Educational software Entertainment software A Web application is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet Instant Web Browser E-Mail Chat Room Messaging Text, Picture, RSS Newsgroup/M Video Blogging Aggregator essage Board Messaging Video FTP Conferencing Online Help is the electronic equivalent of a user manual You can ask a question or access the Help topics in subject or alphabetical order Web-based Help provides updates and more comprehensive resources to respond to technical issues about software Web-based training is a type of CBT that uses Internet technology and consists of application software on the Web Distance learning (DL) is the delivery of education at one location while the learning takes place at other locations Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 6 INFORMATION SYSTEM AND DATABASE SUBTOPIC 1 INTRODUCTION TO INFORMATION SYSTEMS AND DATABASE Describe the role of each element in an information system Explain database concepts and its purposes Explain the importance of database systems An information system (IS) refers to a collection of multiple pieces of equipment involved in the dissemination of information. Hardware, software, computer system connections and information, information system users, and the system’s housing are all part of an IS. Other definitions of IS: Information systems (IS) is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data. Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings. There are several types of information systems, the following are the common types: Transaction processing systems Management information systems Decision support systems Executive information systems The six elements of a Computer Based Informations System (CBIS) are: Hardware Software Data Procedures People Communication Hardware: Hardware refers to the computers themselves, along with any and all peripherals, including servers, routers, monitors, printers and storage devices. A CBIS may use a single computer or thousands. Software: Software tells the hardware how to function. It gathers, organizes and manipulates data and carries out instructions. Everything you do using a computer is done by the software. Data: Just as hardware cannot function without software, software cannot function without data. This is the information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animations, it is all key to a CBIS. Procedures: Rules, descriptions and instructions for how things are done. Frequently covered in instruction or user manuals that describe how to use the hardware, software and data. People: People are the most often overlooked and most important part of a computer-based information system. It is people who design and operate the software, input the data, build the hardware and keep it running, write the procedures and it is ultimately people who determine the success or failure of a CBIS. Communication: Communication is left out of some lists of CBIS elements, because parts of it are covered under hardware. The components that allow one computer to communicate with another are hardware and are controlled by software. If communication between people is included in this element, though, it is an important element. Its an organized collection of information which can easily be retrieved. Such as: Telephone Book Mailing List Address List Set of data related for a specific purpose or topic. It includes tools needed to work with data, such as: Sorting Filtering Extracting Summarizing Table A list of related information in columns and rows Each Row in a table is considered a Record (your information in the phone book is a record) Each Column in the table is a category or a Field (a column of phone numbers in the phone book would be considered field) One item of data, such as your phone number in the phone book is called a Data value Query A query is a database object that can be used to extract or show information in Datasheet view. You can use a query to show all customers who has ordered a certain product. A query can get its data from one or more tables, from existing queries, or from a combination of the two. The tables or queries from which a query gets its data are referred to as its record source. Forms A form is a database object that you can use to enter, edit, or display data from a table or a query. For example, certain users might need to see only several fields in a table with many fields. Providing those users with a form that contains just those fields makes it easier for them to use the database. A visually attractive form makes working with the database more pleasant and more efficient, and it can also help prevent incorrect data from being entered. Report A report is another database object which can be use to summarize information from a table or query. Reports can be very useful when you have already created queries from tables, and you want to analyze or summarize those queries so that they can be ready for printing. And you can be able to choose which fields you want in your report. Macros A macro can be used to create an action or set of actions that can be used to automate a task. You can create a macro to perform a specific series of actions. Macros can be contained in macro objects or they can be embedded into the forms and reports. Primary Keys A primary key is a field or set of fields in your table that acts as a unique identifier for every row. In a relational database you divide your information into separate tables. You then use table relationships and primary keys to bring the information together. Each table in a database must have a primary key before it can be related to another table. Relationships A relationship is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items. For example, a Customer ID field in the Customers table might also appear in the Accounts table. In the Customers table, it is the primary key. In the Accounts table it is called a foreign key. A foreign key, simply stated, is another table's primary key. Costumers Accounts Primary Key Costumer ID # (*) Costumer ID # Foreign Key Name Account # (*) Address Account Type City Data Opened Phone# Balance There are three types of relationships: One-to-One One-to-Many Many-to-Many One-to-One relationship exist when a primary record from the primary table has only one related record in the related table. You might use a one-to-one relationship to divide a table with many fields, to isolate part of a table for security reasons, or to store information that applies only to a subset of the main table One-to-Many relationship exist when a primary record from the primary table is related to many records in the related table. One customer can have many accounts One customer can order many products One person may have many phone numbers A person may have multiple e-mail addresses A music CD usually has many songs Many-to-Many relationship exist when a primary record from the primary table is related to many records in the related table AND a related record in the related table is also related to many records in the primary table. People can have many address; and addresses may have many people A single order can include more than one product. On the other hand, a single product can appear on many orders. A supplier can carry many products; and a single product may be available from many suppliers A student takes many classes; and each class has many students In the early days, database applications were built on top of file systems Drawbacks of using file systems to store data: ★ Data redundancy and inconsistency ✔ Multiple file formats, duplication of information in different files ★ Difficulty in accessing data ✔ Need to write a new program to carry out each new task ★ Data isolation — multiple files and formats ★ Integrity problems ✔ Integrity constraints (e.g. account balance > 0) become part of program code ✔ Hard to add new constraints or change existing ones ★ Atomicity of updates ✔ Failures may leave database in an inconsistent state with partial updates carried out ✔ E.g. transfer of funds from one account to another should either complete or not happen at all ★ Concurrent access by multiple users ✔ Concurrent accessed needed for performance ✔ Uncontrolled concurrent accesses can lead to inconsistencies – E.g. two people reading a balance and updating it at the same time ★ Security problems Database systems offer solutions to all the above problems Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 7 NETWORK AND INTERNET SUBTOPIC 1 COMPUTER NETWORKS AND INTERNET To discuss introduction to networking and its basic terms and concepts, including network equipment A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics. There several types of networks including: Local Area Networks (LAN) Personal Area Networks (PAN) Home Area Networks (HAN) Wide Area Networks (WAN) Campus Networks Metropolitan Area Networks (MAN) Enterprise Private Networks Internetworks Backbone Networks (BBN) Global Area Networks (GAN) The Internet The arrangement of a network which comprises of nodes and connecting lines via sender and receiver is referred as network topology. The various network topologies are: Bus Ring Star Mesh Hybrid Bus topology is a network type in which every computer and network device is connected to single cable. It transmits the data from one end to another in single direction. No bi-directional feature is in bus topology. Ring topology forms a ring connecting all devices with its exactly two neighboring devices. In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. The hub can be passive ​in nature i.e. not intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as active ​hubs. Active hubs have repeaters in them. In mesh topology, every device is connected to another device via particular channel. Hybrid topology is a collection of two or more topologies which are described above. This is a scalable topology which can be expanded easily. It is reliable one but at the same it is a costly topology. The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals The Internet originated as ARPANET (Advanced Research Project Agency Network) in September 1969 and had two main goals: Allow scientists at Function even if part different physical of the network were locations to share disabled or destroyed information and work by a disaster together 1986 NSF connects NSFnet to 1969 ARPANET ARPANET and becomes 1996 becomes known as the Internet2 is functional Internet founded 1984 1995 Today More ARPANET NSFNet than 550 has more terminates its million hosts than 1,000 network on connect to individual the Internet the Internet computers and resumes linked as status as hosts research network Each organization is responsible only for maintaining its own network The World Wide Web Consortium (W3C) oversees research and sets guidelines and standards Internet2 connects more than 200 universities and 115 companies via a high-speed private network Many home and small business users connect to the Internet via high-speed broadband Internet service Fiber to Cable Cellular Satellite the Fixed Internet DSL Radio Wi-Fi Internet Premises wireless service Network Service (FTTP) An access provider is a business that provides individuals and organizations access to the Internet free or for a fee ISP (Internet Online service Wireless Internet service provider) provider (OSP) service provider Regional ISPs Provides wireless provide Internet Has many members- Internet access to access to a specific only features computers and geographical area mobile devices National ISPs Popular OSPs include provide Internet AOL (America May require a access in cities and Online) and MSN wireless modem towns nationwide (Microsoft Network) An IP address is a number that uniquely identifies each computer or device connected to the Internet A domain name is the text version of an IP address Top-level domain (TLD) A DNS server translates the domain name into its associated IP address Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que. MODULE 7 NETWORK AND INTERNET SUBTOPIC 2 THE WEB To understand different Internet terminologies and protocols Discuss the uses of the Internet & World Wide Web. The World Wide Web, o

Use Quizgecko on...
Browser
Browser