Document Details

GlamorousBananaTree

Uploaded by GlamorousBananaTree

Dr. Norberto L. Mondero, Jr

Tags

computer science computing history computer fundamentals introduction to computing

Summary

This document is an introduction to computing. It covers the fundamental concepts, its history, and important topics including different generations of computers and components. This document is suitable for a university-level computer science course.

Full Transcript

ITEINC - Introduction to Computing BY: DR. NORBERTO L. MONDERO, JR ASSOCIATE PROFESSOR II At the end of the course, the learners are expected to:  CO1. Explain fundamental principles, concepts, and evolution of computing systems as they relate to different fields.  CO...

ITEINC - Introduction to Computing BY: DR. NORBERTO L. MONDERO, JR ASSOCIATE PROFESSOR II At the end of the course, the learners are expected to:  CO1. Explain fundamental principles, concepts, and evolution of computing systems as they relate to different fields.  CO2. Demonstrate an understanding of the different applications of computers in society and the use of office application software as a common productivity tool.  CO3. Design responsive web pages using HTML and basic CSS concepts. Learning Topic 1: History of Computers  The term computer originally meant a person capable of performing basic numerical calculations with the help of the mechanical computing device. The evolution of the computer started way back in the 1930s. History of the computer dates back to the invention of the mechanical adding machine in 1642. Current Definition  A computer is an electronic device that accepts data from the user, processes it, produces results, displays them to the users, and stores the results for future usage.  Data is a collection of unorganized facts & figures and does not provide any further information regarding patterns, context, etc. Hence data means "unstructured facts and figures".  Information is structured data i.e. organized meaningful and processed data. To process the data and convert it into information, a computer is used. During Ancient Times:  Early Man relied on counting on his fingers and toes (which by the way, is the basis for our base 10 numbering system). He also used sticks and stones as markers. Later notched sticks and knotted cords were used for counting. Finally came symbols written on hides, parchment, and later paper. Man invents the concept of number, then invents devices to help keep up with the numbers of his possessions.  The abacus, also called a counting frame, is a calculating tool used primarily in parts of Asia for performing the arithmetic process. Abacist is the user of an abacus who slides the beads by hand. The ancient Romans developed an Abacus, the first "machine" for calculating. While it predates the Chinese abacus. Industrial Age – 1600:  John Napier, a Scottish nobleman, and politician devoted much of his leisure time to the study of mathematics. He was especially interested in devising ways to aid computations. His greatest contribution was the invention of logarithms. He inscribed logarithmic measurements on a set of 10 wooden rods and thus was able to do multiplication and division by matching up numbers on the rods. These became known as Napier’s Bones. Napiers Bone and Logarithms (1614) 1621 – The Slide Rule  Napier invented logarithms, Edmund Gunter invented the logarithmic scales (lines etched on metal or wood), but it was William Oughtred, in England who invented the slide rule (a mechanical device for approximating multiplication and division, raising to powers, and other simple). Using the concept of Napier’s bones, he inscribed logarithms on strips of wood and invented the calculating "machine" which was used up until the mid-1970s when the first hand-held calculators and microcomputers appeared 1642 - Blaise Pascal(1623-1662)  Pascal, a French mathematical genius, at the age of 19 invented the machine, which he called the Pascaline that could do addition and subtraction, and automatically carrying and borrowing from column to column from 1645 to help his father, who was also a mathematician. Pascal’s machine consisted of a series of gears with 10 teeth each, representing the numbers 0 to 9.  As each gear made one turn it would trip the next gear up to make 1/10 of a revolution. This principle remained the foundation of all mechanical adding machines for centuries after his death. The Pascal programming language was named in his honor. The Pascaline 1673 - Gottfried Wilhelm von Leibniz (1646-1716)  Gottfried Wihelm von Leibniz invented integral calculous independently of sir Isaac Newton, who is usually given sole creditHe invented a calculating machine that could add and subtract, like Pascal’s machine, but it could also multiply and divide.  It did this by repeated additions or subtractions, the way mechanical adding machines of the mid to late 20th century did. Leibniz also invented something essential to modern computers — binary arithmetic. Leibniz’s Wheel or the Step Reckoner 1745 - Joseph Marie Jacquard (1752-1834)  It took French inventor Joseph Marie Jacquard to bring together Bouchon’s idea of a continuous punched roll, and Falcon’s ideas of durable punched cards to produce a really workable programmable loom.  Weaving operations were controlled by punched cards tied together to form a long loop. And, you could add as many cards as you wanted. Each time a thread was woven in, the roll was clicked forward by one card.  The results revolutionized the weaving industry and made a lot of money for Jacquard. This idea of punched data storage was later adapted for computer data input and output of the electro-mechanical and electronic computing industry. 1822 – Charles Babbage (1791-1871)  Charles Babbage is a British mathematician and inventor. Charles Babbage is recognized today as the “Father of Computers” because of his impressive designs for the Difference Engine and Analytical Engine foreshadowed the invention of the modern electronic digital computer.  Charles Babbage is known as the Father of the modern computer (even though none of his computers worked or were even constructed in their entirety). He first designed plans to build, what he called the Automatic Difference Engine. It was designed to help in the construction of mathematical tables for navigation. Unfortunately, the engineering limitations of his time made it impossible for the computer to be built. His next project was much more ambitious.  While a professor of mathematics at Cambridge University, a position he never actually occupied, he proposed the construction of a machine he called the Analytic Engine. It was to have a punched card input, a memory unit (called the store), an arithmetic unit (called the mill), automatic printout, sequential program control, and 20-place decimal accuracy.  He had worked out a plan for a computer 100 years ahead of its time. Unfortunately, it was never completed. It had to wait for manufacturing technology to catch up to his ideas. Ada Lovelace  Lady Augusta Ada or Ada Lovelace is the daughter of the famous romantic poet, Lord Byron, she was a brilliant mathematician who helped Babbage in his work. Above all, she documented his work, which Babbage never could bother to do.  During a nine-month period in 1842-1843, Ada Lovelace translated Italian mathematician Luigi Menabrea's memoir on Charles Babbage's Analytic Engine.  With her translation, she appended a set of notes which specified in complete detail a method for calculating Bernoulli numbers with the Engine. Historians now recognize this as the world's first computer program and honor her as the first programmer. GENERATION OF COMPUTERS: First Generation (1930-1956) The first generation of computers had the following features and components:  Hardware - The hardware used in the first generation of computers was: Vacuum Tubes and Punch Cards. Following are the features of first-generation computers −  It supported machine language.  It had slow performance  It occupied a large size due to the use of vacuum tubes.  It had a poor storage capacity.  It consumed a lot of electricity and generated a lot of heat. The memory was of 4000 bits. The input was only provided through hard-wired programs in the computer, mostly through punched cards and paper tapes. The examples of first- generation computers are − ENIAC UNIVACTBM 701 (ENIAC Electronic Numerical Integrator And Computer) Second Generation (1956-1963) Several advancements in the first-gen computers led to the development of second-generation computers. Following are various changes in features and components of second-generation computers:  Hardware - The hardware used in the second generation of computers were −  Transistors  Magnetic Tapes Features: It had features like –  Batch operating system  Faster and smaller in size  Reliable and energy-efficient than the previous generation  Less costly than the previous generation Memory  The capacity of the memory was 32,000 bits. Data Input  The input was provided through punched cards. The examples of second- generation computers are − Honeywell 400 CDC 1604 IBM 7030 (IBM 7030) Third Generation (1964-1971) Following are the various components and features of the third generation computers:  Hardware The hardware used in the third generation of computers were −  Integrated Circuits made from semi-conductor materials  Large capacity disks and magnetic tapes Features: The features of the third generation computers are −  Supports time-sharing OS  Faster, smaller, more reliable and cheaper than the previous generations  Easy to access Memory  The capacity of the memory was 128,000 bits. Data Input  The input was provided The examples of third generation computers are − IBM 360/370 Fourth Generation (1972-2010) Fourth generation computers have the following components and features − Hardware - The Hardware used in the fourth generation of computers were −  ICs with Very Large Scale Integration (VLSI) technology  Semiconductor memory  Magnetic tapes and Floppy  HDD, CD-ROM, Features: It supports features like −  Multiprocessing & distributed OS  Object-oriented high level programs supported  Small & easy to use; hand-held computers have evolved  No external cooling required & affordable  This generation saw the development of networks and the internet  It saw the development of new trends in GUIs and mouse Memory  The capacity of the memory was 100 million bits. Data Input  The input was provided through improved hand held devices, keyboard and mouse Examples The examples of fourth generation computers are − Apple II VAX 9000 (Apple II) Fifth Generation (2010-Present)  These are modern and advanced computers. Significant changes in the components and operations have made fifth generation computers handy and more reliable than the previous generations. Hardware The Hardware used in the fifth generation of computers are −  Integrated Circuits with VLSI and Nanotechnology  Large capacity hard disk with RAID support  Powerful servers, Internet, Cluster computing Features It supports features like −  Powerful, cheap, reliable, and easy to use.  Portable and faster due to use of parallel processors and Super Large Scale Integrated Circuits.  Rapid software development is possible. Memory  The capacity of the memory is unlimited. Data Input  The input is provided through CDROM, Optical Disk, and other touch and voice sensitive input devices. The examples of fifth-generation computers are −  IBM (International Business Machine)  Pentium  other advance processors Learning Topic 2: Computer Fundamentals  Computer - is an electronic device, operating under the control of instruction stored in its memory, that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use.  Data – collection of raw facts and figures. It may consist of numbers, characters, symbols, or pictures.  Information – processed data. It is more meaningful than data. Advantages of Using Disadvantages of Using Computers: Computers:  Speed  Health Risks  Reliability  Violation of Privacy  Consistency  Public Safety  Storage  Impact on Labor Force  Communications  Impact on the Environment Components of a Computer: Hardware - Computer hardware is the collection of physical parts of a computer system A computer contains many electric, electronic, and mechanical components known as hardware. Hardware can be categorized as:  Input Devices (Allows you to enter data and instructions into a computer, examples are Mouse and Keyboard)  Output Devices (Hardware component that conveys/displays information to the users, examples are Monitor and Speaker)  System Unit (Case that contains the electronic components of the computer that are used to process data) (CPU/Processor)  Storage Devices (Records (writes) and/or retrieves (reads) items to and from storage media, examples are DVD Drives and Hard Disk Drives)  Communication Devices (Enables a computer to send and receive data, instructions, and information to and from one or more computers or mobile devices, examples are Modem and Router) Example of Input Devices Example of Output Devices Software –is a collection of data or computer instructions that tell the computer how to work. The software can be categorized as:  Application Software -Used for personal productivity or to perform specific tasks, examples are Microsoft Word and Adobe Photoshop  System Software - helps the computer perform essential operating tasks and enable application software to run, examples are Operating System, Device drivers, and Utility Programs)  Operating System - Set of programs that control computer hardware and acts as an interface with application programs. Examples are Windows, Linux, Mac, Android, iOS, Activities performed by the OS:  Perform common computer hardware functions  Provide a user interface and input/output management  Provide a degree of hardware independence  Manage system memory  Manage processing tasks  Provide networking capability  Control access to system resources  Manage files Categories of Computers:  Desktop/Personal Computers  Mobile Computers (Laptops)  Mobile Devices (Tablets, Smartphones, Portable Media Player, Digital Camera)  Game Consoles  Servers(A server controls access to the hardware, software, and other resources on a network.)  Mainframe (Mainframes are a type of computer that generally are known for their large size, amount of storage, processing power, and high level of reliability. They are primarily used by large organizations for mission-critical applications requiring high volumes of data processing.  Supercomputer (A supercomputer is the fastest, most powerful computer.Fastest supercomputers are capable of processing more than one quadrillion instructions in a single second.) Learning Topic 3: The System Unit System Unit  is the box-like case that contains the electronic components of a computer used to process data  Other names for the system unit include the computer chassis, cabinet, box, tower, enclosure, housing, or simply case Components of the System Unit:  Drives  Power Supply  Sound Card  Video Card  Processor  Memory The Motherboard  The motherboard is also known as the system board or main board and is the main circuit board of the microcomputer  It is a big connecting platform fixed to the bottom of the system unit and has a variety of chips and other smaller boards attached to it. The motherboard is sometimes referred to as the spine of the computer because all devices used on the computer need to be connected in one way or another to the motherboard. Power Supply Unit  The power supply unit converts alternating current (AC) from the main supply to the different direct current (DC) voltages required by the various components of the computer. It is responsible for all the power coming into the computer and maintains the right voltage. Processor  The processor, also called the central processing unit (CPU), is the main processing device in the computer system that carries out the instructions of a computer program.  It is responsible for performing the basic arithmetic, logical, and input/output operations of the computer.  The CPU is usually attached to a heat sink and a cooling fan. The heat sink absorbs heat from the CPU and the fan blows the heat away. Components of the Processor:  The control unit is the component of the processor that directs and coordinates most of the operations in the computer  The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations  The processor contains registers, that temporarily hold data and instructions Access time is the amount of time it takes the processor to read from memory. Measured in nanoseconds > A Bit is a unit of measure that represents the 0 or the 1, electronically by the presence or absence of an electrical charge. > Eight bits grouped as a unit are called a Byte. A byte represents a single character in the computer Memory  Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data Memory can be  Volatile – loses its contents when the power is turned off. An example includes RAM (Random Access Memory)  Non Volatile – does not lose its contents when power is turned off. An example includes ROM (Read Only Memory)  Memory size is measured in kilobytes (KB or K), megabytes (MB), gigabytes (GB), or terabytes (TB) Drives  A drive is a location (medium) that is capable of storing and reading information that is not easily removed, like a disk or disc. All drives store files and programs that are used by your computer. Expansion Slots and Adapter Cards  An expansion slot is a socket on the motherboard that can hold an adapter card  An adapter card enhances functions of a component of the system unit and/or provides connections to peripherals. Examples are Sound card and video card Ports and Connectors  A port is a point at which a peripheral attaches to or communicates with a system unit (sometimes referred to as a jack)  A connector joins a cable to a port Learning Topic 4: The Web and Internet Internet  is a globally connected network system  is a worldwide collection of networks  is a network of global exchanges – including private, public,  business, academic, and government networks – connected by guided, wireless and fiber-optic technologies  The World Wide Web, or Web, consists of a worldwide collection of electronic documents (Web pages) and accessible via the Internet  A Website is a collection of related web pages, including multimedia content  A Home page is the first page that a Web site displays  A Web Browser is a software application for accessing the information on the World Wide Web. Examples of Web Browsers are the following:  URL (Uniform Resource Locator) is used to specify addresses on the World Wide Web. A URL is the fundamental network identification for any resources connected to the Internet A Web server is a computer that delivers requested Web pages to your computer. Surfing - browsing through the information on the Internet for anything that interests you/ navigating in the web  Downloading - the process of transferring data or a program from the Internet into the memory of a computer system  Uploading- transfer data/program from a computer or phone to the Internet  Search Engine is a software system that is designed to search for information on the World Wide Web. Examples of Search Engines are:  Multimedia refers to any application that combines text with Graphics, Animation, Audio or Video  A graphic or image is a digital representation of nontext information. Image File Formats:  JPG – web and print photos  GIF – Animation and transparency in limited colors  PNG – Transparency with million of colors  Audio includes music, speech, or any other sound  Streaming is a method of transmitting or receiving data over a computer network as a steady, continuous flow, allowing playback to proceed while subsequent data is being received  A plug-in is a program that extends the capability of a Web browser  E-mail is the transmission of messages and files via a computer network  An e-mail program allows you to create, send, receive, forward, store, print, and delete Learning Topic 5: Computer Safety, Security and Ethics Computer Security Risk  anything on your computer that may damage or steal your data or allow someone else to access your computer, without your knowledge or consent  is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability Malwares  Malware, or malicious software, is any program or file that is harmful to a computer user. Types of Malwares > Viruses > Rootkit > Worms > Adware > Spyware > Phishing > Trojan > Spam Viruses  Viruses are malware that are attached to other files in your system and may be used to destroy your data. Affects a computer negatively by altering the way the computer works. Worms  Worms have the ability to copy itself repeatedly, spread themselves from computer to computer, all on their own. They know how to attach themselves to portable storage devices, like USB drives or removable hard drives, or to move through the network by automatically moving to connected machines, using up resources and possibly shutting down the computer or network Spyware  Spyware is malware that steals your data and may be used to spy on you by using your webcam or microphone without your knowledge. Once installed, it may steal your sensitive data by recording the login information you use or looking for sensitive files on your computer, then sending that data back to an attacker. Trojan  Trojan is a malicious program that hides within or looks like a legitimate program and steal important data on your computer  Rootkit is a program that hides in a computer and allows someone from a remote location to take full control  Adware  Adware. Is a form of threat where your computer will start popping out a lot of advertisement. Phishing  Phishing. A fake website that is designed to look almost like the actual website is a form of a phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Spam  Spam. Unwanted messages in your email inbox. Take up space on your mail server. Spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer.  Cybercrime Cybercrime  is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.  Examples of Cybercrimes:  Hacking - is an act committed by an intruder by accessing your computer system without your permission. Types of Hackers:  Black Hats - Hackers displaying destructive conduct are also called “Crackers”  White Hats - also known as ethical hackers, they’re the good guys of the hacker world. They help you remove viruses, perform pen tests, and generally help people understand where their vulnerabilities are and fix them.  Grey Hats - they spend most of their time just playing around with systems, without doing anything harmful.  DOS (Denial-of-Service) Attacks - an attack that floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals.  Cyber Bullying - Occurs when someone engages in offensive, menacing or harassing behavior through the use of technology.  Pornography - is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials. Cyber pornography is a criminal offense, classified as causing harm to persons  Cyber Extortion - Is the act of cyber- criminals demanding payment through the use of or threat of some form of malicious activity against a victim, such as data compromise or denial of service attack.  Identity Theft - Is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.  Online Scam/Fraud - These are dishonest schemes that seek to take advantage of unsuspecting people to gain a benefit such as money, or access to personal details. These are often contained in spam and phishing messages.  Software Piracy - Is the illegal copying, distribution, or use of the software. Take note:  The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data, and libel. An infected computer has one or more of the following symptoms:  The operating system runs much slower than usual  Available memory is less than expected  Files become corrupted  The screen displays an unusual message or image  Music or unusual sound plays randomly  Existing programs and files disappear  Programs or files do not work properly  Unknown programs or files mysteriously appear  System properties change  The operating system does not startup  Operating system shuts down unexpectedly How to make your Computers Secure:  1. Check Your Firewall  2. Back-Up Your Data  3. Stay Away From Rogue Websites  4. Avoid Deals That Are Too Good to Be True  5. Never Divulge Sensitive Information  6. Avoid Opening Unknown Emails  7. Install Anti Virus Software  Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software. Examples of Anti Virus Software are Norton, Avast, AVG and Mcafee. Computer Ethics - are the moral guidelines that govern the use of computers and information systems 10 Commandments of Computer Ethics:  Thou Shalt Not Use a Computer to harm other people  Thou Shalt Not interfere with other people’s computer work  Thou Shalt Not snoop around in other people’s computer files  Thou Shalt Not Use a Computer to steal  Thou Shalt Not Use a Computer to bear false witness  Thou Shalt Not copy or use proprietary software for which you have not paid  Thou Shalt Not use other people’s computer resources without authorization or proper compensation  Thou Shalt Not appropriate other people’s intellectual output  Thou Shalt think about the social consequences of the program you are writing or the system you are designing  Thou shalt always use a computer in ways that ensure consideration and respect for fellow humans

Use Quizgecko on...
Browser
Browser