mid comp 2.pdf
Document Details
Uploaded by LikeMood
King Saud bin Abdulaziz University for Health Sciences
Tags
Related
- Introduction to Information Systems and Technology PDF
- ITEC 1010: Information and Organizations (F2024) Hardware and Software PDF
- Fundamentals Of Computer Science Lecture - 1 PDF
- Chapter 1: Information Technology, the Internet, and You PDF
- Information Technology PDF
- Information Systems Infrastructure PDF
Full Transcript
Basic Fundamental of Computer and Computer Science As Discipline COMP 201 Computer Science & Health Informatics Learning Objectives: Describe the layers of a computer system. Tell a brief of computer history Distinguish between different computer types Define...
Basic Fundamental of Computer and Computer Science As Discipline COMP 201 Computer Science & Health Informatics Learning Objectives: Describe the layers of a computer system. Tell a brief of computer history Distinguish between different computer types Define computing as a discipline. List the Subfields of Computer Science. Demonstrate standards of professional behavior, including rules of ethics and professional conduct. Part I: Computer Basics Computing Systems A computer is an electronic device, operating under the control of instructions stored in its own memory A computing system is a dynamic entity, used to solve problems and interact with its environment. A computing system is composed of hardware, software, and the data that they manage. Computer hardware is the collection of physical elements that make up the machine and its related pieces: boxes, circuit boards, chips, wires, disk drives, keyboards, monitors, printers, and so on. Computer software is the collection of programs that provide the instructions that a computer carries out. And at the very heart of a computer system is the information that it manages. Without data, the hardware and software are essentially useless. Computing Systems Data/ Input Processing Accepts Processing Produces data (Processor + information (input) Storage) (output) Output 5 Layers of a Computing System Communications A computing system is Software made up of many layers. Hardware Each layer plays a specific Information role in the overall design of the system. Layers of a Computing System 1- The innermost layer, information, reflects the way we represent information on a computer. Information on a computer is managed using binary digits, 1 and 0. Types of information are managed: numbers, text, images, audio, and video. Layers of a Computing System 2- The hardware layer consists of the physical hardware of a computer system. Computer hardware includes devices such as gates and circuits - the computer’s central processing unit (CPU), memory and input and output devices. Most modern computers implement the Von Neumann Architecture Von Neumann Architecture PRESENTATION TITLE 9 Hardware/ CPU CPU (Central Processing Unit ) It is the brain of the computer. It is a combination of the arithmetic/logic unit and the control unit, which interprets and executes instructions. Arithmetic/logic unit (ALU) it performs arithmetic operations (addition, subtraction, multiplication, and division) and logical operations (comparison of two values). Control unit it controls the actions of the other components so as to execute instructions in sequence Hardware/ CPU Main CPU manufacturers are Intel and AMD Performance Metrics of CPU are: Clock speed/ Clock rate is the number of instructions one CPU can process in any given second, measured in gigahertz. E.g. a CPU with a clock speed of 2 gigahertz (GHz) can carry two billion (2,000,000,000) instructions per second. Multi-core Technology is the number of cores (CPUs) the computer will have to parallelize processing of instructions or computing tasks. E.g. single-core processor, dual-core or quad-core processor…etc. Dual-core: Running two processor units working side-by-side means that the CPU can simultaneously manage twice the instructions every second, drastically improving performance. Hardware/ Memory Memory works in tandem with the CPU to determine how fast Memory types and difference with regards to your computer performs tasks. speed, size and cost The two main types of memory you might encounter when buying a computer are: Main memory (RAM) External Storage Working memory, when you double-click on an app, or open a storage for later use document, RAM store that data of these app while the computer is working on it Volatile (data disappears when the power is turned Non- volatile (data is permeant off or computer is reset) until you erased them) Size determine the number of opened apps, documents Size determines the amount of and browser tabs at the same time installed apps or stored data Size in gigabytes (8, 16,…) Size in hundreds of gigabytes or terabytes Hardware/ (I/O) devices Input device is any hardware device through which data and programs from the outside are entered into the computer E.g. Keyboard, Mouse, Microphone, Camera, Scanning devices Output device: is any hardware device through which results stored in the computer memory are made available to the outside. E.g. Monitor, Speakers, Printers Layers of a Computing System 3- The Software layer : the instructions used to accomplish computations and manage data. Software can take many forms, be performed at many levels, and be implemented in many languages: System Software Development software Applications software Software Layer A- System Software : programs that directly control the execution of hardware components. Operating System Every computer has an operating system (OS) to help manage the computer’s resources. Operating systems, such as Windows, Mac OS, or Linux, help us interact with the computer system and manage the way hardware devices, programs, and data interact. The operating system of a computer is the core of its system software. The three main responsibilities of an operating system are: 1- Manage computer resources such as memory and input/output devices 2- Provide an interface through which a user can interact with the computer. 3- Allow application software to access system resource Software Layer B- Development Software: software that are used as tools in the development of other programs (e.g. Microsoft.NET, Java SDK). C- Applications software: all other software, which perform a wide variety of tasks (e.g., web browsers, word processors, games). Layers of a Computing System 4- The Communication Layer Computers are connected to networks so that they can share information and resources. Part II: History of Computers Hardware History Generation of computers: 1. First Generation (1951-1959): Computers in this first generation were built using vacuum tubes to store information. Vacuum tube is a switch ON:1 Vacuum tube generated a great deal of heat and Off:0 was not very reliable. The machine that used them required heavy-duty air conditioning and frequent maintenance and very large, specially built rooms. Hardware History Generation of computers: 2. Second Generation (1959-1965): A transistor replaced the vacuum tube in computers. A transistor was smaller, more reliable, faster, more durable and cheaper. Also, the magnetic disk, a new auxiliary storage device, was developed during this computer hardware generation. Hardware History Vacuum tube vs Transistor (1st generation vs 2nd generation) Vacuum tube Transistor Hardware History Generation of computers: 3. Third Generation (1965-1971): In 2nd generation, transistors and other components for the computer were assembled by hand on printed circuit boards. Example of a Printed circuit boards However, the third generation was characterized by integrated circuits (ICs), which are solid pieces of silicon that contained hundreds of transistors, other components and their connections. ICs were much smaller, cheaper, faster, and more reliable. Integrated circuits Hardware History Generation of computers: 3. Third Generation (1965-1971): Integrated circuit Printed circuit board Hardware History Generation of computers: 4. Fourth Generation (1971 - Present): This generation is characterized by Large-scale Integration technique, where several thousand transistors or ICs are embedded on a single silicon chip. This chip is called Microprocessor, which moved the giant room-sized computer to a whole microcomputer on a chip. Therefore, by the late 1970s, the phrase personal computer (PC) had Microprocessor entered the vocabulary. The Summery of Hardware History Vacuum tube Transistor Integrated circuit Microprocessor 1st generation 2nd generation 3rd generation 4th generation computer computer computer computer Computers Types Types of computers include: Desktop and Servers and mobile terminals computers Embedded computers (digital cameras, e-book readers, portable media players, Game devices, etc…) Desktops and Mobile Computers Personal Computer (PC) is a computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time. If a PC is designed to be in a stationary location, where all of its components fit on or under a desk or table it will be called a desktop computer. Mobile Computers A mobile computer is a portable personal computer, designed to be easily carried. An example, a laptop, also called a notebook computer, is a thin, lightweight mobile computer with a screen in its lid and a keyboard in its base. Servers Server is a computer dedicated to provide one or more services to other computers or devices on a network. Services provided by servers include Hosting website or Applications Storing content (data, movies or pictures..) Controlling access to hardware, software and other resources (files, folder …) on a network. Server Examples of Servers A mainframe is a large, expensive, powerful server that can handle requests from hundreds or thousands of connected users simultaneously. Examples of Servers A Supercomputer is the fastest, most powerful computer Fastest supercomputers are capable of processing more than one quadrillion instructions in a single second Terminals A terminal is a computer, usually with limited processing power, that enables users to send Terminal data to and/or receive information from a server, or other computers in a network. They may include: a monitor and/or touch screen, keyboard, and memory. A thin client is a terminal that looks like a desktop but has limited capabilities and components as they do not contain a hard disk. Special-Purpose Terminals (SPT) SPT are terminals that perform specific tasks and contain features uniquely designed for use in particular industry. Three widely used special-purpose terminals: Most retail stores An is a self-service is a freestanding use a POS terminal banking terminal terminal that to record purchases, that connects to a usually has a touch process credit or host computer screen for user debit cards, and through a network interaction update inventory Automated Self-service Point-of-Sale teller machine kiosk Embedded Computers An embedded computer is a special-purpose computer that functions as a component in a larger product. An embedded system with connectivity to a local network or internet will be classified as IoT (Internet Of Thing) device Embedded computers are found on: Consumer electronics : digital phones, digital televisions, answering machine Home automation devices: thermostats, sprinkling systems, security systems, lights Game Devices: Game Console, Handheld Game device, Game Controllers. Automobiles: antilock brakes, airbag controller, navigation systems and GPS receivers Process controllers and robotics: remote monitoring systems, power monitors, medical devices Computer devices and office machines: keyboards, printers, fax and copy machine Part III: Computing as a Discipline* *a field to study Computer Science Computer science is the study of computation that involves all aspects of problem solving, including: The design and analysis of algorithms The formalization of algorithms as programs The development of computational devices for executing programs The theoretical study of the power and limitations of computing. Subfields of Computer Science Subfield Definition The study of designing and analyzing Algorithms and algorithms, and effectively using data Data Structures structures in software systems to solve problems. Computer Architecture The study of the design and development of computing technology (including the integration of effective hardware systems, and the development of new manufacturing methods). The study, design and development of software Computer Networks and hardware systems, for managing the components for computers network. Software Engineering The study, the development and application of methodologies for designing, implementing, testing, and maintaining software systems. Artificial Intelligence The study and the development of software and Robotics or hardware systems that solves complex problems through seemingly “intelligent” behavior. Subfields of Computer Science The study and the application of computing Bioinformatics methodologies to biological research such as the characterization of human genome. Is the study, the design and the implementation Programming of languages that allow programmers to Languages express algorithms so that they are executable on computers. The organization and efficient management of Database and large collections of data, including the Information development of methods for searching and Retrieval recognizing patterns in data. Computer The protection of computer systems from the security, also known theft or damage to their hardware, software or as cyber security or IT security information And many more like human computer interaction, machine learning, graphics…........ The Ethics of Computing A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed. Sample of IT Code of Conduct: Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing. Avoid harm Be honest and trustworthy. Be fair and take action not to discriminate. Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. Respect privacy. Honor confidentiality. Computer Networks Click to edit Master subtitle style Computer Science and Health Informatics 2022-2023 Learning Objectives By the end of the lecture, students will be able to: Define computer networks List various types of networks and their characteristics. List Network Hardware, Communication Devices, and Transmission Media Compare and contrast network hostnames and IP addresses Explain the domain name system List some network performance metrics Explain the role of a firewall in computer networks List the advantage and the applications of computer network PRESENTATION TITLE 2 Importance of Computer Network for Health Science Students Involve in strategies related to health information management systems such as tele-health systems to improve the overall healthcare systems. Understand fundamental of Internet of Things capabilities which play critical part in health data collection. PRESENTATION TITLE 3 Computer Network A computer network is a collection of computers (such as PC, servers, IOT etc..) and communication hardware that are connected to one another via transmission media. The goal is To allow these devices to communicate with each other. To share data & resources between them. Computing devices can connect to each other by either wired or wireless transmission media. Each computing devices on a network is referred to as node or host. 4 Communication Devices A communications device: is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device. These devices are needed to allow computing devices to communicate with each other. Examples of Communications devices are: Network Interface Card (NIC). Switch. Router. Modem. Network Interface Card (NIC): is a hardware component that allow computing devices to connect to the network. Network cards are available in a variety of styles Wired NIC: is a network card for a desktop computer that has a port to which a cable connects. Wireless NIC: is a network card that enables desktop or mobile Wireless NIC computing to connect to the network wirelessly. 5 Communication Devices Network Interface Card (NIC): is a hardware component that allow computing devices to connect to the network. Network cards are available in a variety of styles Wired NIC: is a network card for a desktop computer that has a port to which a cable connects. Wireless NIC: is a network card that enables desktop or mobile computing to connect to the Wireless NIC network wirelessly. 6 Communication Devices Switch is hardware component that connects devices on a computer network. Multiple data cables are plugged into a switch to enable communication between different networked devices. one cable for each device. It provides a central point for cables in a LAN network, and its center of a star network. Switches manage the flow of data across a network by transmitting a received data only to the one or more ports that connect to destination devices for which the data is intended. 7 Communication Devices Router: is hardware component that creates larger networks by joining two or more LANs or WLANS together. The router is responsible for the routing of traffic between networks to determining the best path to the destination and forwarding traffic to the next router along that path. It connect internal networks to the Internet through a modem. Each network is segmented by IP address to facilitate the routing data across different network. It needs to configured before installation unlike switch. 8 Communication Devices Modem: is a hardware component which converts the digital signals generated by a computer into analog signals to enable their travelling via phone lines therefore connecting to the internet. The modem at the receiving node converts the signal back into a format that the computing device can understand. 9 Computer Networks Types Computer networks are classified based on various factors. They include: 1. Geographical span. Networks are classified according to their geographic coverage and size. In this category, a network can be as small as distance between mobile phone and Bluetooth headphone and as large as the internet itself, covering the whole geographical world. 2. Computer Network Architecture refers to how computers are organized in a system and how tasks are allocated between these computers. Two of the most widely used types are peer-to-peer and client/server. 3. Topology Refers to the physical arrangement of computing devices and communication hardware's in the network. The most common type of network in this category includes Bus, Ring, Star, Mesh networks. PRESENTATION TITLE 10 Geographical span A personal Area Network (PAN) is a computer network that interconnects computing devices within an individual user. It is considered as the smallest computer network because the connectivity range of PAN is usually very small (usually up to 10 meters). PAN network connections can either be wired or wireless. Example of devices used in PAN: may include wireless computer keyboard and mouse ,Bluetooth enabled headphones, wireless printers, and infra-red enabled devices such TV remotes. Example of PAN: The network between your cellphone and the wearable smart watch. Also, the network between TV and the remote control. 11 Geographical span A Local Area Network (LAN) is a network that connects computing devices in a limited geographical area such as a home, school computer laboratory, office building. A Wireless LAN (WLAN) is a LAN that uses no physical wire to form a network. 12 Geographical span A Metropolitan Area Network (MAN) is a computer network that connects LANs or WLANS in a metropolitan area such as a city, towns, or large area with multiple buildings. A Wide Area Network (WAN) is a network that connects two or more LANs over a potentially large geographic area such as multiple cities, country, or the world. (ex: Internet) 13 Computer Network architecture Client/server network: There can be one or more nodes acted as servers and other acted as clients. In this type of network, Server takes and processes request on behalf of clients and control access to network resources such as printer. They don’t have the same privilege to access the resources. Example of Client/server network : A web server is a computer dedicated to responding to requests (from the browser of a client) for web pages. 14 Computer Network architecture Peer-to-peer (P2P) network: A computer network in which all nodes have the same privileges to access the resources with no central control to control the access. Each node in this network is called peer and these peers are connected to one another. Depending on the request, a peer may act as a client or a server. Peer-to-peer network is mostly used for file sharing. 15 Computer Network architecture Advantages and Disadvantages Network Name Advantages Disadvantages Client/ Server One client crashing does not affect Server failure will probably disrupt all the other clients. clients on the network Improved levels of security as files are centralized in the server. Peer-to-peer eliminates the need for a single A P2P network is more difficult to server to hold all resources. administer and prone to security problems. 16 Topology Bus Topology: all nodes are connected to a single communication line or cable. The data is travel in only one direction and as soon as it reaches the extreme end the data will be terminated from the line To avoid signal reflection. The nodes on the bus check any message sent on the bus but ignore any that are not addressed to them. Bus topology may have problem while multiple hosts sending data at the same time. 17 Topology Star Topology: All nodes in star topology are connected to a central device called hub or switch. each connected node requires a single cable to be connected to the hub or switch and every communication between nodes takes place through only the hub/switch. Most networks use a switch instead of hub as switches are more advanced and provide better performance than hubs. Also, switch is more secure than hub as switch sends the message to the intended destination node only while hub broadcasts the message to all nodes in the network. 18 Topology Ring Topology: each node connects to exactly two other computers, creating a circular network structure. When one node tries to communicate or send message to a node which is not adjacent to it, the data travels through all intermediate nodes. To connect one more node in the existing structure, the administrator may need only one more extra cable. Failure of any node or cable results in failure of the whole network. Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring. when nodes are added to or removed from the network, the Network is disrupted, which make it impractical network design in environments where the network changes often. 19 Topology Mesh Topology: each node is connected to every other nodes. This topology rarely found in LANs, mainly because of complexity of the cabling and often used in WANs with communication device called router. The purpose of the mesh design is to provide a high level of redundancy. If one network cable fails, the message always has an alternative path to get to its destination. 20 Topology Advantages and Disadvantages Topology Advantages Disadvantages Bus cheap and easy to install. failure of the shared communication line a failure of a device does not affect the can make all other devices stop other devices. functioning. Difficult to reconfigure. Star easily to be expanded as adding one More expensive than bus. more node requires only a one As in Bus topology, hub/switch acts separate cable to be connected to the as single point of failure. If hub/switch hub or switch. fails, connectivity of all hosts to all other Adding a new node will not disrupt hosts fails. the network unlike ring topology. Cheap. Very easy to install and reconfigure. 21 Topology Advantages and Disadvantages Topology Advantages Disadvantages Ring Efficient if we want to send a message to Reconfiguration is difficult as it would stop all the nodes in the network. the network. Easy to install. Very expensive. the fault tolerance was very low. Mesh The advantage you gain is high fault The mesh topology is the most complex in tolerance and there will always be a term of physical design. path from source to destination, for this Expensive to install and maintain. And the reason it often used in WANs with cabling costs can be high. communication device called router. troubleshooting a failed cable is complicated and difficult. 22 Network Transmission Media Transmission media: is the pathway that carries data in the form of signal from sending device to receiving device. There are two types of Transmission media: 1. Physical Transmission Media (wired) Example : Coaxial cable , Twisted Pair cable and Fiber Optics Cable. 2. Wireless Transmission Media Example : Infra-red, Satellite and Radio Waves. 23 Physical Transmission Media (wired) Coaxial cable Twisted-Pair Cable Fiber Optics – Similar to cable TV wire – Data is transmitted Most common LAN – One wire runs through with light pulses cable cable – Glass or plastic – Data is transmitted with Four pairs of copper strand(fiber) instead electrical pulses cable twisted of copper cable – Very secure Speeds up to 100 – Speeds up to – Speeds up to 10 Mbps Mbps 100 Gbps 24 Wireless Transmission Media infrared (IR) is a wireless transmission medium that sends signals using infrared light waves. It is suitable for short-range communication. Device often must be within 5 meters to communicate. IR technology cannot passthrough walls. A communications satellite is a space station that receives microwave signals from an earth-based station, amplifies (strengthens) the signals, and broadcasts the signals back over a wide area to any number of earth- based stations. Applications such as air navigation, television and radio broadcasts, and weather forecasting use communications satellites. We use it to send data to remote locations but it is not that fast as it need to go to space before bouncing back to earth. PRESENTATION TITLE 25 Wireless Transmission Media Radio Waves is a wireless transmission medium that distributes radio signals through the air. Bluetooth and Wi-Fi communications technologies use radio waves signals. - Bluetooth is a short-range radio waves where the data rate transfers is 1Mbps within 10 meters. Wi-Fi is a widely used type of medium-range radio waves that a typical Wi-Fi signal can carry about 100 meters. The data rate transfers is 11-54 Mbps. PRESENTATION TITLE 26 Network Address IP address is a number that uniquely Dots separate the sections identifies each computing devices connected to a network or the internet. IP addresses are written in dotted decimal 10.1.1.1 format. IPv4 is organized in four sections which separated by dots. Each section contains a number between 0 and Each section 255. contains a number An IPv6 (extended version of IPs) is widely used between 0 and 255 due to the proliferation of computing devices and its advanced protocols. IPv6 addresses is organized in 8 sections. 27 Domain Name System Hostname is the unique name of a computing device connected to a network that might reflect the purpose of computing device in the network. A domain name is the text version of an IP address that is accessible through the internet and consists of words separated by dots. A DNS servers are computing device that translates the domain name or host name into its associated IP address. Domain Name www.google.com.sa DNS server hostname Registered Top Level Domain Domain IP address PRESENTATION TITLE 172.217.18.227 28 Domain Name System Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes. PRESENTATION TITLE 29 Domain Name System Top-level domain (TLD) is the last section of a domain name, specifying the type of organization or its country of origin PRESENTATION TITLE 30 Network Performance Latency (network Delay): is the amount of time a message takes to travel from one device to another across a network, affected by the number of devices on the network. Measured in millisecond (ms). Bandwidth is a measure of the maximum amount of data that the medium (physical or Wireless) can transfer over a given period of time. Ping is used to verify whether or not a network data packet is capable of being distributed to an address without errors. The ping utility is commonly used to check for network errors. PRESENTATION TITLE 31 The Role of a Firewall in Computer Networks Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access. Filters the network traffic that comes in, checking the validity of the messages as much as possible and perhaps denying some messages altogether. Enforces an organization’s access control policy, which is a set of rules established by an organization that specify which types of network communication are permitted and denied. PRESENTATION TITLE 32 Computer Network Advantages Connectivity and Communication Email and instant messaging rely on communication that occurs across an underlying computer network. Data Sharing Using a network to share all type of files such as image, movies,…. etc.. Hardware Sharing Using a network to share printers. Internet Access Internet Access Sharing Data Security and Management Example: Client server network Entertainment PRESENTATION TITLE 33 Computer Network Applications E-mail World Wide Web (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Instant Messengers Internet Radio PRESENTATION TITLE 34 Cloud Computing Click to edit Master subtitle style Computer Science and Health Informatics 2021-2022 Outline Define the concept of Cloud Computing Compare and contrast on-premise IT Infrastructure with Cloud Computing Differentiate between Cloud service models and Cloud deployment models List the advantages and disadvantages of adopting Cloud Computing PRESENTATION TITLE 2 What is Cloud Computing? “The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.” Cloud computing is another approach to have an organization IT infrastructure. Cloud computing 3 On-Premise Vs Cloud Computing from an organization perspective Parameter On-premise Cloud Computing Upfront cost Higher upfront cost for buying lower upfront cost & Pay for what required IT infrastructure devices you use (leased bases). such as servers, network,.. IT infrastructure location In house, Huge space for servers Usually in third party locations, so needed no servers space needed Implementation time longer implementation time Rapid implementation time Flexibility & scalability It lack flexibility & less scalability on Higher flexibility, Scale up (pay the long run more), Scale down (pay less) Control, maintenance & Organization full control and Mostly cloud provider (third party) updates, for maintenance for hardware/software control & maintenance underlying IT infrastructure Affordability Big organizations All size organizations Cloud computing PAGE 4 Cloud Computing Types Cloud computing 5 Cloud Computing Deployment Models Deployment models defines who might have access to the cloud and the uptime & security it can provide. Public Cloud This cloud infrastructure is shared with the general subscribers to the cloud. The company using this model may face potential safety problems due to the public nature of this cloud. The Public Cloud is suitable for small and medium-sized businesses working with less sensitive data. Cloud computing 6 Cloud Computing Deployment Models Deployment models defines who might have access to the cloud and the uptime & security it can provide. Private Cloud The cloud infrastructure is operated solely within a single organization and managed by the organization or a third party regardless whether it is located on premise or off premise. Private clouds are great for organizations that have high security demands, high management demands and uptime requirements. Cloud computing 7 Cloud Computing Deployment Models Deployment models defines who might have access to the cloud and the uptime & security it can provide. Hybrid Cloud The cloud infrastructure is a combination of two or more clouds (private or public). An example of this is when one organization can use public cloud to interact with customers, while keeping their data secured through a private cloud. Cloud computing 8 Cloud Computing Deployment Models Deployment models defines who might have access to the cloud and the uptime & security it can provide. Community Cloud Is a cloud infrastructure that is mutually shared between organizations that belong to a particular community. The community members generally share similar privacy, performance and security concerns. This model is good for multiple organizations which work together and need centralized cloud computing ability for managing, building and executing their projects. Cloud computing 9 Cloud Computing Service Models Cloud computing service models specify the type of computing system resources provided to organizations over the internet and the level of control the users have on the cloud infrastructure. Cloud Services Models Cloud computing 10 Software as a Service (SaaS) SaaS is basically a term that refers to software in the cloud. SaaS represents the capability provided to the consumer to use the cloud provider’s applications running on a cloud infrastructure. User control on SaaS The consumer on SaaS only uses the software but they do not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities. Cloud computing 11 SaaS characteristics Availability via web browser. SaaS never requires the installation of any software on your local computer. You access the software through a web browser (e.g. web-based email like Gmail is a form of SaaS provided by Google) On-demand availability Once you have access, you should be able to go back into the software any time, from anywhere, from any computer device. Payment terms based on usage You should simply pay for the parts of the service you use as you use them. When you no longer need those services, you simply stop paying. Zero money spent on buying IT assets. You only rent the service. Minimal IT demands: SaaS systems don’t require a high technical knowledge for their configuration that is why it is suitable for any end users. Cloud computing 12 Platform as a Service (PaaS) PaaS is a cloud computing service model in which a third-party delivers hardware and software tools - usually those needed for application development - for users over the Internet. PaaS frees users from having to install on-premise hardware and software to develop or run their new applications Users control on PaaS Users have slightly more control on the cloud which enable them to create, run and deploy their applications. However, they do not manage or control the underlying cloud infrastructure including network, servers, operating systems or storage. Users are Website or software developers Cloud computing 13 Infrastructure as a Service (IaaS) IaaS is a cloud service model where a cloud provider supplies the basic compute, storage and networking infrastructure along with the hypervisor (software that create the virtual machines (VMs) ) over the internet to consumers renting these services. Users control on IaaS The consumer does not manage or control the underlying cloud infrastructure, but consumers have a lot of control in compared to the other services. Consumers have control over virtual machines creation, operating systems installment on those machines, storage capacities, deployed applications and management associated with those tasks. Users are IT administrators and skillful IT users Cloud computing 14 Advantages of Cloud Computing SLAs are contract between the customer and the cloud provider that states all the required details a customer needs to know and be aware of about the services provided by the cloud provider Cloud computing 15 Disadvantages of Cloud Computing Cloud computing 16 Questions Q1. Which of the following cloud computing service models is the one providing the lowest control to their consumer? A. SaaS B. PaaS C. NaaS D.IaaS Q2. Which of the following is a correct difference between cloud computing and on premise? A. Cloud computing is less flexible than on premise B. Cloud computing can be implemented faster than on premise C. Cloud computing would need higher upfront cost in compared to on premise D. cloud computing requires buying computer system resources while on premise dose not. Cloud computing 17 PRESENTATION TITLE 18 The Internet and the Web Click to edit Master subtitle style Computer Science and Health Informatics 2022-2023 Learning Objectives The difference between Internet and Web History of the Internet How the Internet Works? History of the Web How the Web Works? The difference between caching and cookies The difference between intranet and extranet The Internet and the Web 2 Difference between Internet & Web The Internet is a vast international network of computers. It is made up of hardware (computers & connections). The World Wide Web is a collection of software that spans the Internet and enables the interlinking of documents and other resources (documents, images, sound clips). The Internet and the Web 3 History of the Internet History of the Internet ARPANet (precursor to Internet) In 1969 it connected computers at four universities: UCLA, UCSB, SRI, and Utah so that researchers at different locations could communicate, share data, and run software remotely. It used dedicated cables, buried underground (data transfer rate was 56K bits/sec) By 1984, the ARPANet included more than 1,000 locations. National Science Foundation (NSF) funded the construction of high-speed transmission lines that would form the backbone of the expanding network In mid 90s the Internet was privatized. The network’s The term “Internet” was introduced to hardware are controlled by the telecommunications because of the similarities between this companies or Internet service provider (ISP) (e.g., AT&T, network and the interstate highway Verizon, Qwest, Sprint) system in US. The Internet and the Web 4 Internet Internetworking (Internet) is a vast collection of smaller networks that have all agreed to communicate using the same protocols and to pass along messages so that they can reach their final destination. It is the ultimate goal of WANs, spanning the entire globe. Internet is serving many purposes and is involved in many aspects of life. Some of them are: Data Communication and Computer Network Web sites E-mail Instant Messaging Blogging Social Media Marketing Networking Resource Sharing Audio and Video Streaming 5 How the Internet Works? The design of the ARPANet was influenced by 2 key ideas: 1. Distributed network 2. Packet-switching Recall: As the ARPANet was funded by the US Department of Defense for communications and needed to be resistant to attack or mechanical failure The Internet and the Web 6 How the Internet Works How the Internet Works? In a packet-switching network: messages are first broken into small pieces known as packets these packets are sent independently to their final destination The Internet and the Web 7 Advantages of Packet Switchingntages of Packet Switching 1. Sending information in smaller units increases efficient use of redundant connections large messages can't monopolize the connection analogy: supermarket check-out and express lanes 2. Transmitting packets independently allows the network to react to failures or network congestion routers (special-purpose computers that direct the flow of messages) can recognize failures or congestion and reroute the packet around trouble areas 3. Breaking the message into packets can improve reliability since the packets are transmitted independently, it is likely that at least part of the message will arrive (even if some failures occur within the network), then software at the destination can recognize which packets are missing and request retransmission. The Internet and the Web 8 Protocols and Addressesrotocols and Addresses The Internet allows different types of computers from around the world to communicate This is possible because the computing community agreed upon common protocols (sets of rules that describe how communication takes place) The two central protocols that control Internet communication are: 1. Transmission Control Protocol (TCP) 2. Internet Protocol (IP) The Internet and the Web 9 IInternet Protocols: TCP/IP rnet Protocols: TCP/IP Transmission Control Protocol (TCP) controls the way messages are broken down into packets and then reassembled when they reach their final destination. Internet Protocol (IP) concerned with labeling the packets with the IP addresses of the source and destination devices and deals with the routing of packets through interconnected networks to the final destination The Internet and the Web 10 History of the Web of the Web The World Wide Web (WWW) is a multimedia environment in which documents can be linked over the Internet Proposed by Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 Berners-Lee's design of the Web integrated two key ideas 1.Hypertext (document or text which contains links to other texts ) Web pages can contain images and links to other pages Hypertext example 2.The distributed nature of the Internet Web pages can be stored on machines all across the Internet, known as Web servers Logical connections between web pages are independent of their physical locations The web two key ideas The Internet and the Web 11 How the Web Works? The Web also relies on protocols to ensure that pages are accessible to any computer HyperText Markup Language (HTML) it is a language used to develop webpages. It defines the structure, and the visual of web pages. HTML5 is the current draft standard, supported by all modern browsers HyperText Transfer Protocol (HTTP) is a communication protocol that is used to establish a connection with the web server to send back the web pages or other files to the user web browser to view it. the prefix http:// in a URL specifies that the HTTP protocol is to be used in communicating with the web server The Internet and the Web 12 Viewing Viewing a web page a web page A web page a text document that contains additional formatting information written in HTML A website a collection of related web pages, usually designed and controlled by the same person or company A web browser a software tool that retrieves, interprets and displays web pages ( e.g., Firefox, Safari, Microsoft edge, Chrome….) A web server a computer that store webpages and it is set up to respond to requests for web pages The Internet and the Web 13 Web technologies Caching is the process done by the browser to store a copy of web pages or images along with a time stamp on a computer hard desk, to avoid redundant download and shorten webpages load time. The next time the web page/image is requested, it will first check the cache. If a copy is found, it sends a conditional request to the server essentially: "send this page/image only if it has been changed since the timestamp" if the server copy has not changed, the server sends back a brief message, and the browser simply uses the cached copy Workflow of opening a web page with caching Cookie is a small text file that a website stores on a computer’s hard disk that the website can retrieve later. It capture key information about a computer previous interactions with a website. Cookies are used to tell the server that users have returned to the website, determine the number of unique visitors to the website, personalized the interaction to the users and to maintain shopping cart from visit to visit. The Internet and the Web 14 Internet vs Intranets & Extranets Internet is a public network The world Intranet A private network, operated by an organization where only The Internet their employees can create content, access resources, communicate and collaborate. It is insulated from the global internet (does not allow access to anyone outside the organization network). Extranet Extranet Intranet A Private network that provides controlled access to authorized users from outside the organization to internal computers or resources (intranet) of the organization. The authorized users might be customers, vendors or Customers, Company only partners to allow them to communicate with the partners or organization in a closed and secure virtual space. suppliers The Internet and the Web 15 IntranetIntranet exampleexample https://www.ksau-hs.edu.sa/English/pages/e-services.aspx The Internet and the Web 16 Questions A company would like to create a secure network, so only their employee can access some resources through it. Which type of network should you recommend for them? A. Internet B. Intranet C. Extranet D. ARPAnet Which of the following is a function of HTTP ? A. Store a copy of a webpage in your hard desk to avoid redundant download of webpages B. Label the packets by the addresses of both sender and receiver C. Establish a connection with a web server to send back a webpage to browser to view it D. Determine the number of unique visitor to a website The Internet and the Web 17 The Internet and the Web 18 ALGORITHMS AND PROGRAMMING LANGUAGES 2021-2022 Computer Science and Health Informatics Learning Objectives Define the concept of programming. Explain the link between programming and algorithms. Differentiate between machine language, assembly language, and high-level language. Differentiate between the two standard approaches in program translation: interpretation and compilation. PRESENTATION TITLE 2 Algorithms and Programming Programming is all about designing and coding algorithms for solving problems. The intended executor is the computer or a program executing on that computer. Instructions are written in programming languages which are more constrained and exact than human languages. 3 Programming 4 Machine Language (0,1) The first programming languages were known as machine languages. A machine language consists of instructions that correspond directly to the hardware operations of a particular machine: i.e., Instructions deal directly with the computer’s physical components including main memory, registers, memory cells in CPU. Very low level of abstraction. Machine language instructions are written in binary (0,1) Programming in machine language is tedious and error prone Code is nearly impossible to understand and debug 5 Machine Languages Excerpt from a machine language program: 6 Assembly Language In the early 1950’s, Assembly languages evolved from machine languages. An assembly language substitutes words for binary codes. Much easier to remember and use words, but still a low level of abstraction (instructions correspond to hardware operations). 7 High-Level Languages In the late 1950's, high-level languages were introduced. High-level languages allow the programmer to write code closer to the way humans think (as opposed to mimicking hardware operations). A much more natural way to solve problems. Plus, programs are machine independent. 8 High-Level Languages Two high level languages that perform the same task (in JavaScript and C++): 9 Levels of Programming Languages This illustrates how code is translated from human readable texts to a machine understandable code. 10 Program Translation Using a high-level language, the programmer can reason at a high-level of abstraction. But programs must still be translated into machine language that the computer hardware can understand/execute. There are two standard approaches to program translation: Interpretation Compilation 11 Program Translation Real-world analogy: translating a speech from one language to another An Interpreter can be used provide a real-time translation. The interpreter hears a phrase, translates, and immediately speaks the translation. ADVANTAGE: the translation is immediate. DISADVANTAGE: if you want to hear the speech again, must interpret all over again. 12 Program Translation A Translator (or compiler) translates the entire speech offline. The translator: Takes a copy of the speech, returns when the entire speech is translated. ADVANTAGE: Once translated, it can be read over and over very quickly. DISADVANTAGE: Must wait for the entire speech to be translated. 13 Speech Translation Interpreter: Translator (compiler): 14 Interpreters For program translation, the interpretation approach relies on a program known as an interpreter to translate and execute high-level statements: The interpreter reads one high-level statement at a time, immediately translating and executing the statement before processing the next one. JavaScript is an interpreted language. 15 Compilers The compilation approach relies on a program known as a compiler to translate the entire high-level language program into its equivalent machine-language instructions: The resulting machine-language program can be executed directly on the computer. Most languages used for the development of commercial software employ the compilation technique (C, C++). 16 Compilation vs. Interpretation Compliers Interpreters Scans the entire program and Translates program one statement at a translates it as a whole into machine time. code. It takes large amount of time to analyze It takes less amount of time to analyze the source code, but the overall the source code, but the overall execution time is comparatively faster. execution time is slower. Generates intermediate object code which No intermediate object code is further requires linking, hence requires generated, hence are memory more memory. efficient. It generates the error message only after Continues translating the program until the scanning the whole program. Hence first error is met, in which case it stops. debugging is comparatively hard. Hence debugging is easy. Programming language like C, C++ use Programming language like Python, Ruby, compilers. Java use interpreters. 17 Compilation vs. Interpretation 18 COMPUTER SECURITY 2021-2022 Computer Science and Health Informatics Objectives Explain the three cornerstones of information security. Describe the three types of authentication credentials. Define the categories of malware. List the types of security attacks. Define cryptography. PRESENTATION TITLE 2 Information Security information security, the set of techniques and policies enforced by an organization or individual to ensure proper access to protected data. Information security makes certain that data cannot be read or modified by anyone without the proper authorization, and that the data will be available when needed to those who do. Information security is technically distinct from cyber security, which is the ability to protect or defend the use of cyberspace (resources accessible on the Internet) from attack. However, because most Information is stored electronically on devices that are accessible via the Internet, the two concepts overlap significantly, and the terms are sometimes used interchangeably. PRESENTATION TITLE 3 The three cornerstones of information security Information security can be described as the synthesis of confidentiality, integrity, and availability—the so-called CIA triad Any good solution to the information security problem must adequately address each of these issues. PRESENTATION TITLE 4 CIA Confidentiality is ensuring that key data remains protected from unauthorized access. For example, you don’t want just anyone to be able to learn how much money you have in your savings account. PRESENTATION TITLE 5 CIA Integrity is ensuring that data can be modified only by appropriate mechanisms. It defines the level of trust you can have in the information. You don’t want a hacker to be able to modify your bank balance, of course, but you also don’t want a teller (who has authorized access) to modify your balance in inappropriate ways and without your approval. PRESENTATION TITLE 6 CIA Availability is the degree to which authorized users can access appropriate information for legitimate purposes when needed. Even if data is protected, it isn’t useful if you can’t get to it. For example , a hacker could launch an attack that “floods” a network with useless transmissions, and thereby keep legitimate users from connecting to remote systems. PRESENTATION TITLE 7 Preventing Unauthorized Access One of the most obvious security issues from the user’s perspective is keeping other people from accessing your accounts and information. User authentication: The process of verifying the credentials of a particular user of a computer or software system Authentication credentials : Information users provide to identify themselves. There are three general types of authentication credentials 1. Something a user knows (user authentication), such as a username and password, a personal identification number (PIN), or a combination of these items.. PRESENTATION TITLE 8 Preventing Unauthorized Access 2.Something the user has, such as an identification card with a magnetic strip or a smart card that contains an embedded memory chip. This approach is more complex to administer, and often requires special hardware, but is generally considered more secure than the first. PRESENTATION TITLE 9 Preventing Unauthorized Access 3. Something based on the user biometrics, which are related to what a person is physiologically. Examples of biometrics include the analysis of fingerprints, retina pattern, or voice pattern. This approach is the most expensive to implement PRESENTATION TITLE 10 Other authentication techniques CAPTCHA software is designed to present a problem easy enough for all humans to solve but difficult for an automated program to complete Most modern CAPTCHA techniques involve presenting the user with an image of a word, phrase, or string of characters and then asking the user to type them in. The image of the word is theoretically easy to decipher by a human but distorted in various ways to make it difficult for a program to “read” the word PRESENTATION TITLE 11 Malicious Code Malicious code (malware) is any program that attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions. Such code is transferred to a computer across a network or from removable media such as USB memory sticks. Malicious code may cause serious damage, such as the destruction of data, or it may merely create a nuisance, such as popping up unwanted messages. PRESENTATION TITLE 12 Categories of malware There are many categories of malicious code 1.Virus : is a program that embeds a copy of itself in another program. This “infected” file is referred to as the virus host. When the host is executed, the virus code runs as well. a virus tends to cause problems on a particular computer by corrupting or deleting files 2. worm is self-replicating, like a virus, but does not require a host program to infect. The worm runs as a stand-alone program. A worm tends to cause problems on the networks it uses to send copies of itself to other systems, often by consuming bandwidth.. PRESENTATION TITLE 13 categories of malware. 3. Trojan horse is a program that appears to be helpful in some way, but actually causes some kind of problem when executed. Even while the program is running, it may appear to the user as a reliable resource, which makes it difficult to track down. Like a worm, a Trojan horse is a stand-alone program. Like a virus, it tends to cause problems on the computer on which it is executing. 4. logic bomb, which is malicious code that executes when a specific system- oriented event occurs. It is often set to execute on a certain date and time, such as Friday the 13th, but it could be triggered by many kinds of events. PRESENTATION TITLE 14 security attacks 1. Password guessing An attempt to gain access to a computer system by methodically trying to determine a user’s password 2. Phishing is a technique that uses a web page that looks like an official part of some trusted environment, but is actually a page designed to collect key information such as usernames and passwords. 3. Spoofing An attack on a computer system in which a malicious user masquerades as an authorized user PRESENTATION TITLE 15 security attacks 4. Back door A program feature that gives special and unauthorized access to a software system to anyone who knows it exists 5. Denial of service An attack on a network resource that prevents authorized users from accessing the system 6. A man in-the-middle is an attack occurs when someone has access to the communication path at some point in the network and “listens,” usually with the help of a program, to the traffic as it goes by. The goal is to intercept key information, such as a password being transmitted as part of an email message. PRESENTATION TITLE 16 Cryptography. Cryptography The field of study related to encoded information Encryption is the process of converting plain text into a form that is unreadable, called ciphertext. Decryption reverses this process, translating ciphertext into plaintext. A cipher is an algorithm used to perform a particular type of encryption and decryption. PRESENTATION TITLE 17 PRESENTATION TITLE 18 INTERNET OF THINGS (IOT) COMP 201 2nd Term : 2022/23 Learning Objectives: Define the concept of Internet of Things (IoT) Explain the link between IoT and Cloud Computing Explain how IoT can be utilized in the health sector List the advantages and disadvantages of adopting IoT IoT 2 IOT CONCEPT 3 IoT Concept The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. With more than 10 billion connected IoT devices today, experts are expecting this number to grow 22 billion by 2025. IoT 4 Basic IoT Fundamentals Data: IoT technologies provide myriad ways to collect data about the physical world. Data is the fuel of IoT and is why it is so important. Device: The actual, physical components or ”things” in the internet of things that collect this data. Analytics: The process of making collected data useful by turning raw data into actionable insights. Connectivity: Makes sharing data and insights possible, increasing the value of that data. This is the internet in internet of things. IoT 5 What technologies have made IoT possible? Low-cost, Low-power sensor Affordable and reliable sensors are making IoT technology possible for more manufacturers. technology A host of network protocols for the internet has made it easy to connect sensors to the cloud and to other Connectivity “things” for efficient data transfer. The increase in the availability of cloud platforms enables both businesses and consumers to access the Cloud Computing platforms infrastructure they need to scale up without actually having to manage it all. With advances in machine learning and analytics, along with access to varied and vast amounts of data stored in Machine Learning and the cloud, businesses can gather insights faster and more easily. The emergence of these allied technologies analytics continues to push the boundaries of IoT and the data produced by IoT also feeds these technologies. Conversational artificial Advances in neural networks have brought natural-language processing (NLP) to IoT devices (such as digital intelligence (AI) personal assistants Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for home use. IoT 6 IOT, BIG DATA, AND CLOUD COMPUTING 7 IoT, Big Data and Cloud Computing The relationship between IoT, Big Data and Cloud Computing creates ample opportunity for business to harness exponential growth. IoT is the source of data, Big Data is an analytic platform of data, and Cloud Computing is the location for storage, scale and speed of access. The IoT and Cloud Computing complement one another, often being branded together when discussing technical services and working together to provide an overall better IoT service. Cloud Computing in IoT works as part of a collaboration and is used to store IoT data. IoT 8 IOT IN THE HEALTH SECTOR 9 IoT in the health sector Before IoT, patients’ interactions with doctors were limited to visits, and tele and text communications. There was no way doctors or hospitals could monitor patients’ health continuously and make recommendations accordingly. IoT enabled devices have made remote monitoring in the healthcare sector possible, unleashing the potential to keep patients safe and healthy, and empowering physicians to deliver best care. It has also increased patient engagement and satisfaction as interactions with doctors have become easier and more efficient. IoT 10 IoT in the health sector remote monitoring of patient’s health helps in reducing the length of hospital stay and prevents re- admissions. IoT also has a major impact on reducing healthcare costs significantly and improving treatment outcomes. IoT has applications in healthcare that benefit patients, families, physicians, hospitals and insurance companies. IoT 11 IoT application in the health sector Devices in the form of wearables like fitness bands and other wirelessly connected devices like blood pressure and IoT for Patients heart rate monitoring cuffs, glucometer etc. give patients access to personalized attention. These devices can be tuned to remind calorie count, exercise check, appointments, blood pressure variations and much more. By using wearables and other home monitoring equipment embedded with IoT, physicians can keep track of IoT for Physicians patients’ health more effectively. They can track patients’ adherence to treatment plans or any need for immediate medical attention. IoT devices tagged with sensors are used for tracking real time location of medical equipment like wheelchairs, defibrillators, nebulizers, oxygen pumps and other monitoring equipment. IoT for Hospitals IoT devices also help in asset management like pharmacy inventory control, and environmental monitoring, for instance, checking refrigerator temperature, and humidity and temperature control. IoT for Health Insurance companies can leverage data captured through health monitoring devices for their underwriting and Insurance Companies claims operations. This data will enable them to detect fraud claims and identify prospects for underwriting. IoT 12 IOT PROS AND CONS 13 Advantages of IoT in healthcare Cost Reduction: IoT enables patient monitoring in real time, thus significantly cutting down unnecessary visits to doctors, hospital stays and re-admissions Improved Treatment: It enables physicians to make evidence-based informed decisions and brings absolute transparency Faster Disease Diagnosis: Continuous patient monitoring and real time data helps in diagnosing diseases at an early stage or even before the disease develops based on symptoms Proactive Treatment: Continuous health monitoring opens the doors for providing proactive medical treatment Drugs and Equipment Management: Management of drugs and medical equipment is a major challenge in a healthcare industry. Through connected devices, these are managed and utilized efficiently with reduced costs Error Reduction: Data generated through IoT devices not only help in effective decision making but also ensure smooth healthcare operations with reduced errors, waste and system costs. IoT 14 Disadvantages of IoT in healthcare Doctors at University of Minnesota Health and Fairview Health announced they’re treating a small group of cancer patients with digital medicine. It is a new chemotherapy pill that includes a sensor to let patients and doctors monitor dosage to make sure they’re taking their medicine when they’re supposed to. Sounds great, but one of the biggest concerns about IoT is: Security: Ingesting connected devices, if not properly secured, could have people unknowingly broadcasting their health status everywhere they go. Privacy: Any connected healthcare devices would be subject to HIPAA standard, naturally, but when it comes to ingestibles there are lots of questions about who owns the device. Is it the manufacturer, doctor, healthcare system, insurance company, or the person whose body it’s in? Unintended Use: Concerns about the unintended use of ingestibles are more about potential abuse of power. IoT 15 16 BIG DATA COMP 201 2nd Term : 2022/23 Learning Objectives: Define the concept of Big Data Describe Big Data analytics Explain how Big Data can be utilized in the health sector Big Data 2 BIG DATA CONCEPT 3 Big Data Concept The definition of big data is data that contains greater variety, arriving in increasing volumes and with more velocity. This is also known as the three Vs. The amount of data matters. With big data, you’ll have to process high volumes of low- density, unstructured data. This can be data of unknown value, such as Twitter data feeds, Volume clickstreams on a web page or a mobile app, or sensor-enabled equipment. For some organizations, this might be tens of terabytes of data. For others, it may be hundreds of petabytes. Velocity is the fast rate at which data is received and (perhaps) acted on. Normally, the highest velocity of data streams directly into memory versus being written to disk. Some Velocity internet-enabled smart products operate in real time or near real time and will require real- time evaluation and action. Variety refers to the many types of data that are available. Traditional data types were structured and fit neatly in a relational database. With the rise of big data, data comes in new Variety unstructured data types. Unstructured and semistructured data types, such as text, audio, and video, require additional preprocessing to derive meaning and support metadata Big Data 4 Big Data Benefits Big data makes it possible for you to gain more complete answers because you have more information. More complete answers mean more confidence in the data—which means a completely different approach to tackling problems. Big Data 5 How Big Data Works? 1- Integrate: Big data brings together data from many disparate sources and applications. Traditional data integration mechanisms, such as extract, transform, and load (ETL) generally aren’t up to the task. It requires new strategies and technologies to analyze big data sets at terabyte, or even petabyte, scale. During integration, you need to bring in the data, process it, and make sure it’s formatted and available in a form that your business analysts can get started with. Big Data 6 How Big Data Works? 2- Manage: Big data requires storage. Storage solution can be in the cloud, on premises, or both. The cloud is gradually gaining popularity because it supports your current compute requirements and enables you to spin up resources as needed. Big Data 7 How Big Data Works? 3- Analyze: Get new clarity with a visual analysis of your varied data sets. Explore the data further to make new discoveries. Share your findings with others. Build data models with machine learning and artificial intelligence Big Data 8 Big Data Industry Application Here are some of the sectors where Big Data is actively used: Marketing - Big Data analytics helps to drive high ROI marketing campaigns, which result in improved sales Education - Used to develop new and improve existing courses based on market requirements Healthcare - With the help of a patient’s medical history, Big Data analytics is used to predict how likely they are to have health issues Media and entertainment - Used to understand the demand of shows, movies, songs, and more to deliver a personalized recommendation list to its users Banking - Customer income and spending patterns help to predict the likelihood of choosing various banking offers, like loans and credit cards Telecommunications - Used to forecast network capacity and improve customer experience Big Data 9 BIG DATA ANALYTICS 10 Big Data Analytics 1. Descriptive Analytics: This summarizes past data into a form that people can easily read. This helps in creating reports, like a company’s revenue, profit, sales, and so on. Also, it helps in the tabulation of social media metrics. 2. Diagnostic Analytics: This is done to understand what caused a problem in the first place. Techniques like drill-down, data mining, and data recovery are all examples. Organizations use diagnostic analytics because they provide an in-depth insight into a particular problem. Big Data 11 Big Data Analytics 3. Predictive Analytics: This type of analytics looks into the historical and present data to make predictions of the future. Predictive analytics uses data mining, AI, and machine learning to analyze current data and make predictions about the future. It works on predicting customer trends, market trends, and so on. 4. Prescriptive Analytics: This type of analytics prescribes the solution to a particular problem. Perspective analytics works with both descriptive and predictive analytics. Most of the time, it relies on AI and machine learning. Big Data 12 BIG DATA IN THE HEALTH SECTOR 13 Big Data in the Health Sector Big data in healthcare is a term used to describe massive volumes of information created by the adoption of digital technologies that collect patients' records and help in managing hospital performance. This data is normally coming in different formats and sizes, which presents a challenge to the user. However, the current focus is no longer on how “big” the data is, but on how smartly is managed. Healthcare analytics has the potential to reduce costs of treatment, predict outbreaks of epidemics, avoid preventable diseases, and improve the quality of life in general. Big Data 14 Big Data in the Health Sector With the help of the right technology, data can be extracted from the following sources of the big data in healthcare industry in a smart and fast way: Patients portals Research studies EHRs Wearable devices Search engines Generic databases Government agencies Payer records Staffing schedules Patient waiting room Big Data 15 How To Use Big Data In Healthcare? 1- Big Data In Healthcare Applied On A Hospital Dashboard: Providing the most important metrics concerning various aspects: the number of patients that were welcomed in your facility, how long they stayed and where, how much it cost to treat them, and the average waiting time in emergency rooms Big Data 16 How To Use Big Data In Healthcare? 2- Big Data Healthcare Application On Patients' Care: By offering a perfect storm or patience-centric information in one central location, medical institutions can create harmony between departments while streamlining care processes in a wealth of vital areas Big Data 17 Why We Need Big Data Analytics In Healthcare? Reducing costs Costs are much higher than they should be, and they have been rising for the past 20 years. Clearly, we are in need of some smart, data-driven thinking in this area. And current incentives are changing as well: many insurance companies are switching from fee-for- service plans to plans that prioritize patient outcomes. Reducing medical errors Physician decisions are becoming more and more evidence-based, meaning that they rely on large swathes of research and clinical data as opposed to solely their schooling and professional opinion. Optimizing organizational and personnel management While using data to ensure you are providing the best care to patients is fundamental, there are also other operational areas in which it can assist the health industry. Part of providing quality care is ensuring the facility works optimally, and this can also be achieved with the help of big data. Big Data 18 19