Summary

This presentation outlines computer concepts, including the presenting team, module description, learning outcomes, and main contents; geared towards health informatics students in a higher education setting. 

Full Transcript

Information and computer skills Code: HND1151 Credits: 10 PRESENTING TEAM Department of Health Informatics School of Public Health College of Medicine and health sciences 1. NTIBAZAMUSHOBORA JMV 2. NGENZI JOSEPH 3. NIYITEGEKA Char...

Information and computer skills Code: HND1151 Credits: 10 PRESENTING TEAM Department of Health Informatics School of Public Health College of Medicine and health sciences 1. NTIBAZAMUSHOBORA JMV 2. NGENZI JOSEPH 3. NIYITEGEKA Charité 4. NIYOYITA Jean Paul Description This module will equip the learners with the knowledge on fundamentals of computer application It will also help them to apply those principal fundamentals in their practice. Through this module, students will have an overview of Information Technology (IT) solutions in health organizational context. The module enables the health care professional to use computer equipment and tools (programs) needed in today’s health care industry 3 Main contents Basic computer concepts Commonly used software Word processing Spreadsheet Presentation Health information access Open education resources E learning platform Electronic medical records 4 5 LEARNING OUTCOMES A. Knowledge and Understanding Having successfully completed this module, students should be able to demonstrate knowledge and understanding of: A1. Technologies for Data collection, data processing (calculation, data analysis), and data presentation with use of appropriate tools A2. Computer networks A3. IT solution from major vendors of hardware, software, and telecommunications A4. Information workflow and data management in healthcare settings A5. Information storage and retrieval A6. Common information technology tools used in healthcare A7. Existing IT applications in healthcare planning, management and services delivery A8. Current e-health software’s used in healthcare service delivery A9. Relevance of ICT in health promotion and patient care A10. Identify common ICT software errors during data management process 6 LEARNING OUTCOMES (cont’d) B. Cognitive/ Intellectual Skills/ Application of Knowledge B1. Elaborate technical requirements for health Information Technology B2. Apply hardware and software as components of health information systems B3. Use basic Internet technology concepts and World Wide Web health applications B4. Apply skills on information storage and retrieval B5. Perform data collection, data analysis and presentation using a computer software B6. Interact with the current e-health system used in healthcare delivery B7. Organize technical specification for Information Technology B8. Utilise Information technology in health promotion B9. Discuss Health information system (health data flow, information processing, information retrieval) B10. Describe different types of computer keyboards, mouse and other special devices and their relevance to health care service delivery 7 LEARNING OUTCOMES (cont’d) C. Communication/ICT/Numeracy/Analytic Techniques/Practical Skills C1. Interact with online learning management system C3. Upload and download objects, files, and files on e- learning platform C4. Communicate and interact with lecturers or colleagues using e-learning platform C5. Store health data and generate information C6. Use Word Processing software for referencing, and scientific reports C7. Use Spreadsheet Applications for statistics and graphs C8. Use Database Applications for data managements 8 LEARNING OUTCOMES (cont’d) D. General transferable skills D1. Establish professional independence in the use of eLearning D2. Establish professional independence in the management of e-health arena D3. Use eLearning systems D4. Work effectively and independently D5. Work with other people from different fields D6. Recognize impact of IT in organizations and society D7. Suggest and contribute innovative e-health solutions D8. Initiate e-health projects UR E Learning platform http://www.elearning.ur.ac.rw/ 9 UR E Learning platform Course materials Evaluation Tests Assignments Attendance 10 UR E Learning platform Product: Moodle Link: http://www.elearning.ur.ac.rw/ Student user guide 11 Main contents Basic computer concepts Commonly used software Word processing Spreadsheet Presentation Health information access Open education resources eLearning platform Electronic medical records 12 Understanding Essential Computer Concepts Objectives Investigate types of computers Examine computer systems Examine input devices Examine output devices Investigate data processing Understand memory 14 Objectives Understand storage media Explore data communications Learn about networks Learn about security threats Understand system software Understand application software 15 Defining Computers A computer is an electronic device that: accepts input processes data stores data produces output 16 Investigating Types of Computers The categories of computers are: Personal computers Desktop Notebook (Laptop) Tablet PC Hand-helds PDAs MP3 players Cell phones (smart phone, for example) Mainframes Supercomputers 17 Investigating Types of Computers Personal computers are used for general computing tasks. Hand-held computers fit in the palm of your hand and run on batteries. Mainframes are used by companies to provide centralized storage, processing, and management for large amounts of data. Supercomputers are the largest and fastest of computers, and can process an enormous volume of data. 18 Types of Computers Notebook computer also referred to as a laptop computer small lightweight portable 19 Types of Computers (Cont’) PDAs Personal Digital Assistants generally used to maintain an electronic appointment book, address book, calculator, and notepad 20 Types of Computers (Cont’) Supercomputers are the largest and fastest of computers, and can process an enormous volume of data. 21 Examining Computer Systems A computer system is made up of: Hardware—the physical components Software—the programs or lists of instructions 23 Computer Systems (Cont’) Architecture or configuration is the design of the computer. As in, what does the computer consist of? Specifications are the technical details about each component. As in, how big is the monitor? 24 Computer Systems (Cont’) Data The words, numbers, figures, sounds, and graphics that describe people, events, things, and ideas Processing Classification, arrangement, Modification of data 25 Computer Systems (Cont’) The data you type into the computer is called input. The result of the computer processing your input is called output. Peripheral devices accomplish the input, output, and storage functions. 26 Computer Systems (Cont’) Motherboard where processing tasks occur located inside the computer the main electronic component of the computer contains the CPU 27 Data Communications (computer to device) Components needed to connect a printer to a computer 28 29 Computer Systems (Cont’) Microprocessor a silicon chip designed to manipulate data its speed is determined by: Clock speed Word size Processor type 30 Examining Input Devices Some input devices are: Keyboard Mouse Trackball Touch pad Pointing stick Wireless mouse Scanner Microphones 31 Using Assistive Devices People who cannot use their arms or hands instead can use foot, head, or eye movements to control the pointer. People with poor vision can use keyboards with large keys for input, screen enlargers to enlarge the type and images on the monitor, or screen readers to read the content of the screen aloud. 32 33 34 35 36 37 38 Examining Output Devices Monitors and printers are common output devices. CRT monitors and flat panel monitors are two types of monitors. 39 Examining Output Devices Factors that influence a monitor’s quality are: Screen Size Resolution Dot Pitch 40 Examining Output Devices Types of printers Laser Dot Matrix Inkjet Inkjet printer 41 Investigating Data Processing A computer file is a named collection of stored data (electronic). Each file is made of signals Computers interpret every signal as “on” or “off.” 1 (“on”) and 0 (“off”) are referred to as bits. Eight bits is a byte. Each byte represents a unique character. 43 Data Processing (Cont’) Kilobyte (KB) = one thousand bytes Megabyte (MB) = one million bytes Gigabyte (GB) = one billion bytes Terabyte (TB) = one trillion bytes 44 Data Processing (Cont’) Each ASCII number represents an English character Computers that run the Windows operating system use the set of Extended ASCII definitions defined by the American National Standards Institute ANSI standard sample ASCII code (ANSI). 45 Understanding Memory Computer memory is a set of storage locations on the motherboard. There are five types of memory: Random access memory (RAM) Cache memory Virtual memory Read-only memory Complementary metal oxide semiconductor memory (CMOS) 46 47 48 Understanding Memory (Cont’) RAM Temporary memory that is constantly changing while the computer is on. Also called volatile memory and temporary memory. Cache memory Special high-speed memory chip on the motherboard or CPU Stores frequently and recently accessed data and commands. 49 Understanding Memory (Cont’) Virtual memory is extra memory that simulates RAM if more is needed. Read-only memory (ROM) is the permanent storage location for a set of instructions the computer uses. CMOS memory is semi-permanent information about where essential software is stored. 50 Understanding Storage Media Magnetic storage devices Store data as magnetized particles on mylar, which is then coated on both sides with a magnetic oxide coating 51 Storage Media (Cont’) Common magnetic storage devices hard disks—several magnetic oxide covered metal platters usually sealed in a case inside the computer tape—inexpensive, slow, archival storage for large companies who need to back up large quantities of data. floppy disks—flat circles of magnetic oxide-coated mylar enclosed in a hard plastic case; almost obsolete 52 Storage Media (Cont’) Optical storage devices polycarbonate discs coated with a reflective metal on which data is recorded using laser technology as a trail of tiny pits or dark spots in the surface of the disc the data that these pits or spots represent can then be “read” with a beam of laser light 53 Storage Media (Cont’) Types of optical storage devices CD—can store 700 MB of data DVD—can store between 4.7 and 15.9 GB of data Blu-ray discs and HD-DVD can store between 15 and 50 GB of data 54 Storage Media (Cont’) Flash memory—similar to ROM except that it can be written to more than once. Flash memory cards small, portable cards encased in hard plastic to which data can be written and rewritten used in digital cameras, handheld computers, video game controllers, and other devices 55 Storage Media (Cont’) USB flash storage device (USB drive, flash drive) popular type of flash memory available in a wide range of sizes from 32 MB to 16 GB plug directly into the USB port of a personal computer are about the size of a pack of gum and often have a ring that you can attach to your key chain. 56 Erasing and Rewriting on CDs and DVDs CD-ROMs are for “read-only” access. CD-R drives allow you to record data on a CD-R disk. CD-RW drives allow you to write data on a CD-RW disk and access and modify data. DVD-R and DVD+R are recordable. 57 Exploring Data Communications Data communications is the transmission of text, numeric, voice, or video data from one computer to Another or another device. The four essential components of data communications are: Sender Channel Protocols Receiver 58 Data Communications (Cont’) A sender is the computer that originates the message. The message is sent over a channel, such as a telephone. The receiver is the computer at the message’s destination. Protocols are the rules that establish the transfer of data between sender and receiver. 59 Data Communications (Cont’) Device driver (or simply driver) handles the transmission protocol between a computer and its peripheral devices a computer program that can establish communication because it contains information about the characteristics of your computer and of the device Data bus (within the same computer) the data path between the microprocessor, RAM, and the peripherals along which communication travels 60 Data bus (example) 61 Data Communications (computer to device) Components needed to connect a printer to a computer 62 Data Communications (Cont’) PCs have several types of ports: Parallel Serial SCSI USB MIDI Ethernet 63 Data Communications (Cont’) Parallel port—transmits data eight bits at a time Serial port—transmits data one bit at a time SCSI (small computer system interface, pronounced /’skʌzi/ “scuzzy”) port— provides an interface for one or more peripheral devices at the same port USB (Universal Serial Bus) port—a high- speed serial port which allows multiple connections at the same port 64 Data Communications (Cont’) Sound card port—usually includes jacks for speakers and a microphone, which are designed to work with a MIDI (Musical Instrument Digital Interface, pronounced “middy”) card Ethernet port—used to connect to another computer, a LAN, a modem, or sometimes directly to the Internet; allows data to be transmitted at high speeds. 65 Data Communications (Cont’) Power connection Keyboard port Mouse port Audio connection Monitor port FireWire port USB ports Network port Speaker and microphone Phone line connections connection Computer ports and connections 66 Exercise Look at the back side of your computer and identify different ports. 67 Computer Network Network connects one computer to other computers and peripheral devices Network interface card (NIC) creates a communications channel between the computer and the network a cable connects the NIC port to the network Network software establishes the communications protocols that will be observed on the network controls the traffic flow of data traveling through the network 68 Networks (Cont’) Workstation Server Printer Workstation Your local workstation Network configuration 69 Networks – Components and structure Server acts as the central storage location for programs provides mass storage for most of the data used on the network Client—computers on a network dependent on a server Client/server network—a network with server that acts as the central storage location Peer-to-peer network a network without a server all of the computers are equal 70 Networks (Cont’) Standalone computer—a personal computer that is not connected to a network Workstation—a personal computer that is connected to a network Node—any device connected to the network 71 Networks (Cont’) LAN (local area network) computers and peripherals located close to each other WAN (wide area network) more than one LAN connected together the Internet is the largest example of a WAN WLAN (wireless local area network) computers and peripherals that use high- frequency radio waves instead of wires to communicate and connect in a network Wi-Fi (wireless fidelity) describes WLANs connected using a standard radio frequency established by the Institute of Electrical and Electronics Engineers (IEEE) 72 Networks (Cont’) PAN (personal area network)—a )— network that allows two or more devices located close to each other to communicate or to connect a device to the Internet infrared technology—uses infrared light waves to beam data from one device to another Bluetooth—uses short range radio waves to connect a device wirelessly to another device or to the Internet WiMAX (Worldwide Interoperability for Microwave Access) allows computers to connect over many miles to a LAN a WiMAX tower sends signals to a WiMAX receiver built or plugged into a computer 73 Networks (Cont’) Analog signal Digital Digital signal signal Modem Modem Sending site Receiving site Using modems to send and receive data 74 Computer Security Threats Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer 75 Security Threats (Cont’) Malware describes any program that is intended to cause harm or convey information to others without the owner’s permission Viruses harmful programs that instruct your computer to perform destructive activities, such as erasing a disk drive 76 Security Threats (Cont’) Spyware programs contained with other programs that track a computer user’s Internet usage and send this data back to the company or person that created it usually installed without the computer user’s permission or knowledge Anti-spyware software detects spyware and deletes them Adware software installed with another program usually with the user’s permission generates advertising revenue for the program’s creator by displaying targeted ads to the program’s user 77 Security Threats (Cont’) Firewall prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user’s permission can be either hardware or software software firewalls track all incoming and outgoing traffic router a device that controls traffic between network components usually has a built-in firewall. 78 Security Threats (Cont’) Spoofed site a Web site set up to look like another Web site, but which does not belong to the organization portrayed in the site the URL (address on the Web) looks similar to a URL from the legitimate site usually set up to try to convince customers of the real site to enter personal information Phishing the practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail the link leads to a spoofed site Pharming when a criminal breaks into a DNS server (a computer responsible for directing Internet traffic) and redirect any attempts to access a particular Web site to the criminal’s spoofed site 79 Protecting computer system Antivirus software Firewall Authentication Authorization Data encryption … Antivirus software (virus protection software) searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands 80 Protection against user’s act  Policy, access control (authentication and authorization) Not all users should have the full access to program Users are grouped into categories Administrators: Have full access to the application Install/uninstall program Give access rights to the end users End users: Have limited access Can use a program but can not change it Access on some files is restricted to them 81 Access control Identifying the valid users of a system and controlling their access to system resources Two primary parts to access control: Authentication: deals with the problem of determining whether a user (or other entity) should be allowed access to a particular system or resource. Authorization: concerned with restrictions on the actions of authenticated users. 82 Authentication vs. Authorization Whereas authentication is a binary decision - access is granted or it is not-authorization deals with more fine-grained restrictions and limitations on access to various system resources. Authentication: Who goes there? Authorization: Are you allowed to do that? Note: Many other authors use the term access control as a synonym for authorization 83 Protecting Information with Passwords Logging in signing in with a user name and password Strong password at least eight characters consists of upper- and lowercase letters and numbers does not include common personal information 84 Choosing Passwords Certainly some passwords are better than others A good password should be hard to guess and easy to remember John, 25101985 KwizeraAbdul jfIej(43j-EmmL+y 09864376537263 R0nalD0 FSa7Yago The first three password are easy to guess especially if your name is John, or Kwizera Abdul, or your birthday is 25/10/1985 85 Choosing Passwords The final password, FSa7Yago, might appear to reside in the “difficult to guess, but too difficult to remember” category. However, there is a trick to help the user remember this—it’s based on a passphrase. That is, FSa7Yago is derived from “four score and seven years ago.” Consequently, this password should be relatively easy for the user to remember, and yet relatively difficult for thief to guess. 86 I came from Rusizi to Buganza studying university at Rwamagana in 2021 FRusizi2Buganza@R 87 Password protection Encryption In order to store and transfer password securely through a network The system contain a function that is extremely difficult –the designers hope impossible-to invert (decrypt), but is simple to compute (encrypt) i.e. given a value x, it is easy to compute the function value f(x). Given a function value f(x), however, it is impossible to compute x. 88 System Software System software helps the computer carry out it s basic operating tasks. The four types of system software are: Operating systems Utilities Device drivers Programming languages 89 System Software (Cont’) Operating system controls the input and output (I/O) allocates system resources manages files on storage devices guards against equipment failure Operating environment provides a graphical user interface (GUI) that acts as a liaison between the user and the computer 90 System Software (Cont’) Utilities a category of system software that augment the operating system by taking over some of its responsibility for allocating hardware resources Device drivers handle the transmission protocol between a computer and its peripherals when you add a device to an existing computer, part of its installation includes adding its device driver to the computer’s configuration Programming languages used by a programmer to write computer instructions the instructions are translated into electrical signals that the computer can manipulate and process. 91 System Software (Cont’) Icons (you might see additional icons on your Gadgets screen) (small programs; you might see additional or different gadgets on your screen) Start button Taskbar Quick Launch toolbar Windows Vista starting screen 92 Understanding Application Software Application software enables you to perform specific computer tasks E.g. edit documents, carry out some calculations, edit pictures,…. During our course, we will learn how to use computer for document edition, presentation and for calculations. 93 Application Software (Cont’) Document production software includes word processing software, desktop publishing software, e-mail editors, and Web authoring software has a variety of features that assist you in writing and formatting documents, including changing the font (the style of type) and spell checking to help you avoid typographical and spelling errors Spreadsheet software a numerical analysis tool used to create a worksheet composed of a grid of columns and rows you type data into the cells, and enter mathematical formulas into other cells that reference the data 94 Application Software (Cont’) A wiggly red line indicates a possible spelling error Spell checking a document 95 Application Software (Cont’) Graph Cell B5 contains result of calculation performed by spreadsheet software Typical worksheet with numerical data and a graph 96 Application Software (Cont’) Database management software lets you collect and manage data Database a collection of information stored on one or more computers organized in a uniform format of records and fields record—a collection of data items in a database field—one piece of information in the record An example of a database is the online catalog of books at a library; the catalog contains one record for each book in the library, and each record contains fields that identify the title, the author, and the subjects under which the book can be classified. 97 Application Software (Cont’) Graphics software allows you to create illustrations, diagrams, graphs, and charts Presentation software allows you to project a presentation before a group, print it out for quick reference, or transmit it to remote computers Clip art simple drawings that are included as collections with many software packages 98 Application Software (Cont’) Photo editing software allows you to manipulate digital photos you can make the images brighter, add special effects to the photo, add additional images to a photo, or crop the photo to include only relevant parts of the image Multimedia authoring software allows you to record digital sound files, video files, and animations Web site creation and management software allows you to create and manage Web sites 99 Application Software (Cont’) Information management software keeps track of schedules, appointments, contacts, and “to-do” lists 100 Understanding Object Linking and Embedding (OLE) Object linking and embedding (OLE) refers to the ability to use data from another file, called the source Embedding occurs when you copy and paste the source data in the new file Linking allows you to create a connection between the source data and the copy in the new file the link updates the copy every time a change is made to the source data Integration the seamless nature of OLE among some applications 101 UR E Learning platform http://www.elearning.ur.ac.rw/ 102 UR E Learning platform Course materials Evaluation Tests Assignments Attendance 103 UR E Learning platform Product: Moodle Link: http://www.elearning.ur.ac.rw/ Student user guide 104 How to find the ICS module on eLearning platform? 1. Course categories 2. CMHS 3. School of public health 4. Undergraduate 5. Department of health informatics 6. Year 1 7. Trimester 1 8. Information and computer skills 105

Use Quizgecko on...
Browser
Browser