Computer Science
Computer Science
Information Products
• Set of shared IS resources that form the
foundation of each CBIS. • Management reports, and business documents
using text and graphics displays, audio responses
What is a Procedure?
and paper forms
Set of steps that need to be followed to achieve specific
Major Capabilities of CBIS
end result, e.g. enter customer order, pay supplier
invoice, or request current inventory report. • Perform high-speed, high-volume, numerical
computations
• Good procedures describe how to achieve
• Provide fast, accurate, and inexpensive
desired end result, who does what and when,
what to do in the event something goes wrong. communication w/n and between organizations
• Automate both semiautomatic business
Basic Resources/Components of Computer-based processes and manual tasks
Information Systems (CBIS) • Store huge amounts of information in easy-to-
access, yet small space
People
• Allow quick and inexpensive access to vast
• End user (any one else who uses IS) amounts of information, worldwide
• IS specialists (system analyst, programmer, • Facilitate interpretation of vast amounts of data
computer operators) • Enable communication and collaboration
anywhere, anytime
Hardware
• Increase effectiveness and efficiency of people
• Machines (computers, video monitors, magnetic working in groups in one place or in several
disk drive, printers, output scanners) locations, anywhere
• Storage Media (floppy disk, magnetic tape, • Facilitate work in hazardous environments
optical disks, paper forms, plastic card)
Peer Discussions #1 (5-10 minutes)
Software
• In what way the aforementioned CBIS major
• Programs (operating system, spreadsheet capabilities
programs, word processing programs, payroll • support the following 5 general business
program) objectives:
• Procedures (data entry procedures, error o Improving productivity
correction procedures, paycheck distribution o Reducing costs
procedures) o Improving decision making
o Enhancing customer relationships
o Developing new strategic applications (and software) investments for their areas of
business
What is System Failure?
o Marketing, sales, and human resources
• An information system: often help IS specialists assess
o that does not perform as expected opportunities to apply computer
o is not operational at a specified time hardware (and software) and evaluate
o that cannot be used the way it was various options and features
intended o Finance and accounting must keep an
• Usually accompanied by multiple, parallel eye or guard against overspending, yet
manual procedures be willing to invest in computer
hardware (and software) when and
Causes of IS Success or Failures (late, parallel process) where business conditions warrant it
• Recognize that systems are developed in the first Three (3) Major Interrelated Factors in Deciding about
place because of: Hardware
o powerful external environment
o powerful internal forces • Capability
• Organizations with similar environments and o Computational power and
institutional features, one succeeds and other appropriateness for the task
fails in the same IS innovation. • Speed
o Why? • Cost
o Different patterns of implementation
Major Categories of Computers According to Size
Asynchronous:
• Supercomputers
• The Digital Revolution • Mainframes
• Digital Convergence • Mini-/Midrange computers
• Digital Economy • Microcomputers
o Desktop PC (includes PC Workstations)
LECTURE 3 o Portable PC (Notebook/Laptop,
Computer Hardware Netbook, Tablet)
o Information Appliance (PDA/Palmtop,
Physical equipment used for input, processing, output, Smartphone)
and storage activities of computer system
Types of Computer
Why Learn About Hardware (and Software)?
Supercomputer
Organizations invest in computer and software
• World’s fastest computer at time it is built
• Improve work productivity • Can perform tasks that would not be practical for
• Increase revenue (by reduce costs) other computers
• Provide better customer service, speed up time o Breaking codes
to market o Modelling worldwide weather systems
• Facilitate collaboration among employees
Mainframe computer
Role of Managers
• Large and expensive computer capable of
• Regardless of their career field and educational simultaneously processing data for hundreds or
background - expected to help define business thousands of users
needs that hardware (and software) must meet • Generally used by businesses, universities, or
• Must be able to ask relevant questions and governments to provide centralized storage,
evaluate options when considering hardware processing, and management of large amount of
data where reliability, data security, and substantive Intel Xeon processor
centralized control are necessary Core i7 or two
A graphics card graphics Almost always
Personal computer is usually an aftermarket
included, and option,
• Designed to meet computing needs of individual
will power and workstations
for home, school, or small business use
play high end can usually
• Typically provides access to wide variety of games support SLI
software architecture for
o Word processing more than one
o Photo editing card
o Budgeting and financial management Usually includes storage PCI-e SSD
o Email a hefty 1TB hard storage is
o Internet access drive or 256- making its way
512GB SSD. into base
Personal computer Consider RAID if systems. Super-
• Desktop computers you have lots of fast, and super
data useful for
o System unit can be housed in vertical
content creation
case (tower) or horizontal case work, including
o Some manufacturers create all-in-one VR.
unit Usually starts at RAM Many
• Portable computers 4GB and inches workstations
o Notebook/laptop computers up. For mid- start with high
o Netbooks range loadouts, as
o Tablet computers performance, much as 16-
o Handheld computers you can operate 32GB of RAM
with
Workstations somewhere
between 4-8GB
• Usually powerful desktop computers designed
of RAM
for specialized tasks that require lot of processing These come in design You’re pretty
speed different shapes much looking at
o Medical imaging and sizes, a tower or a box.
o Full-motion video graphics including sleek- No one buys a
o Computer-aided design (CAD) all-in-ones and workstation to
• Most are designed for creating and displaying 3D fashion-first impress the
and animated graphics laptops eyes.
Web surfing, usage Creative
Desktop PC vs Workstation gaming, professionals,
Budget friendly, price You pay for spreadsheets, high-end
although a power. mid-range graphic design
higher end Configurations illustration, work, VR and
processor and can jump into animation and gaming content
graphics option the thousands. design, financial creation,
approaches a compiling, resource hungry
low-end general usage power
workstation. crunching usage
From a processor Starting with an
consumer Intel Core i7, but
appropriate should include
Intel Core i3 up at least an Intel
to a more
Notebook Computer vs. Netbook Byte
• PARAM 10000 which was developed in India by • Kilobyte (KB): approximately 1000 bytes
C-DAC, Pune • Megabyte (MB): approximately 1M bytes
• IBM Deep Blue which was specially designed for (1,048,576 bytes, or 1,024 x 1,024).
playing chess • Gigabyte (GB): actually 1,073,741,824 bytes
• Tianhe-Z was developed in China (1,024 x 1,024 x 1,024 bytes)
• Terabyte: 1 trillion bytes
Mainframe Computer
• Petabyte: Approximately 1015 bytes
• IBM Z890 • Exabyte: Approximately 1018 bytes
• Hitachi’s Z800
Units of Computer Memory Measurements
Mini Computer
• 1 Bit = Binary Digit
• VAX • 8 Bits = 1 Byte
• Texas Instrument TI-990 • 1024 Bytes = 1 KB (Kilo Byte)
• 1024 KB = 1 MB (Mega Byte)
Micro Computer
• 1024 MB = 1 GB (Giga Byte)
• Desktop Computers (PC) • 1024 GB = 1 TB (Terra Byte)
• Laptop • 1024 TB = 1 PB (Peta Byte)
• PDA | Paimtop • 1024 PB = 1 EB (Exa Byte)
• Tablet PC • 1024 EB = 1 ZB (Zetta Byte)
• 1024 ZB = 1 YB (Yotta Byte)
Computer Storage Fundamentals
• 1024 YB = 1 (Bronto Byte)
Bit • 1024 Brotobyte = 1 (Geop Byte)
• Short for binary digit (0s and 1s) Geop Byte is the highest memory
• Only data that CPU can process
Data Storage
Types of Storage
• Internal to CPU
• Temporarily stores data and program
instructions during processing
• E.g. RAM, Cache
Storage
Self-healing Computers
Wireless Sensor Networks for Water Quality Monitoring • What the hardware enables?
• How it is advancing?
• How rapidly it is advancing?
Asynchronous
YES!
Worksheet Tab
Cell
• Column letter Row number combination such as Formula Example – Single Argument
A1, B2...
• Refers/returns content (in cell address)
Function
#DIV/0
#REF!
1. Parentheses
2. Exponents
3. Multiplication
Absolute Referencing in Formula • What navigation keys you have found helpful in
working w/ worksheets with these experiences?
• When keying-in an active cell, which input type
you often committed errors?
• When working w/ formula, which mathematical
operators you have used often in these
experiences? If you did change the order of its
calculation in some instances, how did you do it?
• Have you tried Relative, Absolute, and Mixed
Referencing in inputting a formula from these
experiences? What realizations did you make?
Asynchronous
LEARNING MATERIALS
WEEK 2
1. common goal
• Data as Foundation: Data serves as the base layer • A set of interrelated components that collect,
of understanding; without organization, it and disseminate data and information and
remains meaningless. It’s crucial to recognize provide feedback to meet an objective
that raw data must be processed to gain value. • Technology, People, Process
• Transforming Data into Information: Organizing Elements of Information System (IS)
and contextualizing data turns it into actionable
1. Hardware
information, making it vital for informed
2. Software
decision-making in businesses.
Key Insights
Confusion
• Complexity of Data: Organizations have always
-People may not distinguish between IS and IT, as they
struggled with data management, but big data
assume all information systems are computer-based
amplifies these issues, requiring a different
systems
approach to exploitation rather than mere
Distinguish between IT and IS management.
Information Technology (IT) Information Systems (IS) • Technological Limitations: The belief that
technology can single-handedly resolve big data
Focuses on the selection, Business oriented and challenges is misleading. Companies need to
integration and deployment focus on the business reassess their strategies beyond just purchasing
of computing technology domain tools.
is a way of computing that divides work into individual, COMPUTER BASED IS (CBIS)
indivisible operations, called transactions. A transaction https://informationsystemis.wordpress.com/computer-
processing system (TPS) is a software system, or based-is-cbis/?authuser=0
software/hardware combination that supports
transaction processing. In transaction processing systems COMPUTER BASED INFORMATION SYSTEM.
they record day-to-day transactions such as customer
– A CBIS is an organised integration of hardware and
orders and inventories. It also helps the supervisors by
software technologies and human elements designed to
generating databases needed for other information
produce timely, integrated, accurate and useful
systems.
information for decision making purposes.
However, summarizing the detailed data of the
For any given application the following features must be
transaction processing system, drawing on the detailed
present:-
data of the transaction processing system, presenting
information in a very highly summarized form, and Easy to use interactive (two way) interfaces
combining the internal data from TPS and MIS with
▪ Touch screen
external data are part of the Management Information
Systems, Decision Support System, and Executive ▪ GUI
Support Systems.
▪ Menu Driven Interface
DIGITAL CONVERGENCE
▪ Colour Screen
Digital Convergence refers to the convergence of digital
▪ Buttons
tools such as computers, phones, watches and many
other being combined and ready to use in one single ▪ Labels
device.
▪ Voice Activated
Ex.: Smart phone – contains hundreds of functions from
other devices ▪ Tones, on phones
▪ Hardware– these are the devices like the ▪ Global, not dependent on location
monitor, processor, printer and keyboard, all of
▪ Attachments
which work together to accept, process, show
data and information. ▪ Group Working ie Ofice Suite. Each application
works easily within the same suite due to the
▪ Software– are the programs that allow the
engine that’s employed.
hardware to process the data.
▪ Software – editing changes, combined
▪ Databases– are the gathering of associated files
with other technologies – e-mail, WAP,
or tables containing related data.
digital TV
▪ Networks– are a connecting system that allows
THE DIGITAL REVOLUTION| TRANSFORMATION AND
diverse computers to distribute resources.
DISRUPTION
▪ Procedures– are the commands for combining
Summary
the components above to process information
and produce the preferred output. Catherine Hammon discusses the evolution of industrial
revolutions, focusing on the digital revolution's
The first four components (hardware, software, database
transformation and disruption across various sectors.
and network) make up what is knows as the information
technology platform. Information technology workers Highlights
could then use these components to
create information systems that watch over safety ▪ Industrial revolutions transformed societies from
measures, risk and the management of data. These agrarian to industrial.
▪ The second revolution introduced electrification
actions are known as information technology services.
and mass production techniques.
Advantages of Utilizing Modern Technology for Given ▪ The internet revolutionized connectivity, leading
Applications to the rise of big data.
▪ The digital revolution is marked by rapid
Need to consider 5 points
technological changes and disruptions.
▪ Internet ▪ Technologies like Uber illustrate how disruption
can redefine industries.
▪ Up to date and accessible from different
▪ The entertainment sector saw new opportunities
sources
with recorded media and streaming.
▪ Interactivity – Easy to interact with the ▪ Future advancements hold unpredictable
internet potential for new businesses and lifestyles.
Micro Computers
Types:
▪ Personal
▪ Workstation
▪ Laptops
▪ Mobiles
Computer Memory
▪ Embedded computers
is the storage area of the computer. It is any kind of
Personal/Desktop PCs
hardware which stores data and instructions for the
▪ Most common computers with monitor, computer.
keyboard, and mouse, typically kept on our desk
Types of Memory:
▪ Used for gaming, browsing, learning, business
▪ Primary or Internal Memory
Workstations
o accessed directly by CPU
▪ Are like desktop computers with more powerful ▪ Secondary or External Memory
CPU and higher memory and processing power o long-term storage of data
▪ More expensive
Secondary Memory
▪ Used for doing niche work like:
▪ Designing ▪ slower than the primary memory
▪ Animation ▪ data stored is permanent, so it is used for storage
▪ complex calculations and back
▪ it helps in transferring data from one computer
Laptops
to another
▪ Portable computers which integrate all
Types Of Storage Devices
components of a computer into a size of a
notebook (sometimes called as notebook ▪ floppy drive
computer). ▪ CD drives
▪ Tape drives
Mobile/Tablets
History of Storage Devices
▪ Can easily be carried anywhere
The earliest computer storage device was actually punch
Used for:
card made of paper
▪ Gaming
Storage Devices
▪ Video
▪ high-end cameras ▪ Magnetic Drive
▪ Optical Drive
Embedded Computers
▪ Flash Drive/Flash Memory Devices
Magnetic devices ▪ data can be written only once and then can be
read multiple times
▪ include hard disks and floppy disks
CD-RW or CD Rewritable
Hard Disks
▪ the data can be written multiple times
▪ typically installed inside the computer, though
▪ also known as a Erasable CD
portable hard disks are also available.
▪ inside the hard disk, there is a spindle which Types of DVDs
holds one or more rotating disks called platters.
DVD-R or DVD Recordable
▪ these disks are coated with magnetic material.
▪ have a magnetic head which is used to read or ▪ Data written only once and then can be read
write data on the disk. multiple times
Floppy Disk DVD RW or DVD Rewritable
▪ used to transfer data between computers ▪ data can be written multiple times
▪ the computers have floppy drives into which the
floppy is inserted Flash Storage
▪ comes in 2 sizes: they used to come in 5 1/4 inch ▪ USB flash drives
or 3 and a half inch size ▪ memory cards
▪ as their data capacity is less, pen drives have now ▪ SD cards
become more popular.
They are:
Optical Drive
▪ popular
it uses laser and light to store data ▪ cheaper
▪ efficient
includes:
▪ reliable
▪ CDs
o stands for Compact Disks USB
o Portable ▪ USB flash drive or pen drive is a portable memory
o can store up to 700 MB store device which is the size of a human thumb,
▪ DVDs and connect to computer wire or USB port.
o stand for Digital Versatile Disc ▪ store data up to 1TB
o storage capacity almost 10 times that of ▪ compact, fast, and convenient, so it is typically
CD used to store and transfer files
o 20 times faster than CD
▪ Blu-Ray Memory Card
o the name comes from Blue Laser which ▪ is used to store photos and videos in:
reads from and writes to the disc rather o cameras
than the red laser of DVD o smartphones
o store more data o gaming console
o 25 GB of data per layer ▪ they can store images up to 128 GB
o dual layer
o triple layer SD or Secure Digital Card
CD-ROM or CD Read-Only Memory Nowadays, storing data online and in cloud is becoming
popular as people need to access their data from more
▪ read data than one device however it is nothing but touring on a
CDR or CD recordable
network of remote servers which are either magnetic or • is a device that routes or forwards data from one
optical. network to another based on their IP address.
HUB, SWITCH, & ROUTER EXPLAINED - WHAT'S THE • Routers act as gateways, determining if data is for
DIFFERENCE? their network or another.
• a device that has multiple ports that accepts • Local vs. external communication: Hubs and
Ethernet connections from network devices. But switches facilitate communication within a local
unlike a hub, a switch is intelligent. area network (LAN), while routers enable
communication across different networks and
• Switches intelligently direct data packets to the internet.
specific devices based on MAC addresses.
• Network structure and
• Switches reduce traffic and enhance network efficiency: Understanding the distinct roles of
efficiency compared to hubs. hubs, switches, and routers is vital for designing
hubs and switches are used to exchange data within a efficient network architectures that optimize
local area network. Hubs and switches do not read IP data flow and security.
addresses.
Router
LEARN BASIC NETWORKING… Two types of Network: Wireless Network and Wired
Network
Essential Components of the Computer Network
Wired Network
End Device
Uses cables to connect devices such as laptop or desktop
is a device that sends or receives the data or service in
computers to the Internet or another network.
the network.
Advantages:
Example:
• Ethernet ports are found on almost all laptops,
• Desktop
PCs, and netbooks. If an ethernet port is not
• Laptop
available in the system, then ethernet cable can
• Printer be connected through a USB ethernet adapter.
• Mobile
• generally faster than wireless networks
Network Devices • are considered more secure than wireless
networks
Provide connectivity between the end devices
Disadvantages:
Modem
• Network cables are expensive
can be used as a dial up for the local area networks to
• Not supported on mobile phones and tablets
connect to an internet service provider
Wireless Network
Switch, Router, Wireless
Is a computer network that uses wireless data
• through them, devices connected to your connections between network nodes.
network can communicate with one another, and
with other networks like the Internet Advantages:
• Switch
• Generally easier to set up
o Allow devices on your network to
• If PC or laptop does not come with a wireless
communicate with each other as well as
connection then USB wireless adapter can be
with other networks
used
• Routers
• It can be used both on home and public networks
o Connect multiple networks together.
• No cables required
They also connect computers on those
• It can be used with mobile phones and tablets
networks to the Internet.
COMPUTER SKILLS COURSE: BITS, BYTES, KILOBYTES,
Access Point
MEGABYTES, GIGABYTES, TERABYTES
Allows devices to connect to the wireless network
Digital Storage
without cables.
uses the binary system where everything is saved as 1s
Repeater
and 0s (called bit).
Regenerates the signal over the same network before the
Bit
signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the • short for binary digit
same network. • the smallest unit of data in a computer
Hub • are used to store all kinds of information
from text documents, to the digital photos, that
Is basically a multi-port repeater. A hub connects multiple you take to the sounds that come out of your
wires coming from different branches. speakers.
Networking Types and Structures
• to store this information, we use a whole bunch MODEM VS ROUTER - WHAT'S THE DIFFERENCE?
of bits put together. The number of bits we
Modem
have determines how much data we can store.
• is what brings the internet into your home or
WHICH IS BETTER: WIRED OR WIRELESS?
business.
So which one should you choose? Well, the answer • establishes and maintains a dedicated
depends on a couple of factors. connection to your internet service provider to
give you access to the internet.
Convenience
• Now the reason why you have to have a modem
• With modern devices like smartphone and is because of the two different types of signals
tablets, wireless is your only choice. that are used on a computer and on the internet.
• A computer only reads digital signals, while
And with portable devices like your laptop, which signals out on the internet are analog. As analog
have the capability to go wired or wireless, you data comes in from the internet, the modem
may find that you prefer the freedom of roaming demodulates the incoming analog signals into a
around your house with your device rather than digital signal so that a computer can understand
be tethered down with a wire. it.
• also modulates outgoing digital signals from a
Physical Location
computer into an analog signal as it goes out on
• Since a wired device requires a physical Ethernet the internet.
cable connected to your Internet router, And this is where we get the word 'modem'.
your device will need to be physically located • The word modem means modulator
close to your router. A common example of this demodulator which is exactly what a modem
is a home office where the Internet router sits on does. It modulates outgoing data from a
the same desk as the desktop computer. computer and demodulates incoming data from
• On the other hand, if your desktop computer is the internet
100 feet away from your Internet router, you'll Router
have to rely on in-wall wiring... or a really long
Ethernet cable! • there are different types of routers:
o used in businesses and larger
Speed organizations
While wireless speeds are getting faster and faster every
o used in homes and small businesses
year, they still can't keep pace with a wired connection.
• is what routes or passes your internet connection
Wired connections are also more reliable because there
to all of your devices in your home or business. It
is a direct one-to-one connection between your device
directs it to all of your computers, tablets,
and your Internet router. With a wireless connection, you
phones and so on, so that those devices can
may have to deal with wireless traffic from your
access the internet.
neighbors who may be operating on the same frequency
• A typical small office/home office router will
and channel as you.
have a built-in switch with multiple ports so that
Advice: you can connect multiple devices using an
When it's feasible to wire your device to your Internet ethernet cable connection
router, do it. When it's not feasible, be confident with • it also functions as a wireless access point so that
your wireless connection and enjoy the freedom of wireless devices such as tablets and laptops can
surfing the Internet with no wires. have internet access.
• you really don't need a router if you only want
one of your devices to access the internet. You
can just plug that device's network cable directly
into the modem, and then you'll be able to
access the internet. However, like most homes
and businesses, you're going to have multiple will directly attach to a switch or router so that
devices that need access to the internet, and the data can be accessed over a network, then
that's where you would need a router. once it's on the network, it can be accessed from
other devices such as desktops, laptops, and
Different Types Of Modems
servers.
Two of the most common types are cable and DSL • it can be accessed as a shared drive
modems. • typically used in homes and they are also used in
small to medium-sized businesses.
Cable Modems
Disadvantages:
are connected to your home using a coaxial cable. Cable
is typically provided by the same company that provides • it has a single point of failure.
you with cable television. • Example: Let's say if a component fails such as if
the power supply fails on the NAS, then all of the
DSL Modems
other devices will not be able to access its data.
are connected using a typical phone line.
SAN or Storage Area Network
Modem/Router Combination
• is a special high-speed network that stores and
a modem with a built-in wireless router in one physical provides access to large amounts of data
device. • a dedicated network that's used for data storage
and this network consists of multiple disk
arrays, switches, and servers.
Most routers will have a built in switch inside of them. So • a SAN is fault tolerant
there's no need to have a switch if you already have a • the data is also shared among several disk arrays,
router that has a switch built into it. The only time may so if a switch or disk array or if a server goes
need to add a switch to this network is if you needed down, the data can still be accessed.
more wired connections for your devices. You can just • recognized as a local attached hard drive rather
connect a switch to your router and then add more than a shared network drive like in a NAS.
connections to the switch. • highly scalable because adding more storage
space can easily be done without an interruption
So just to clear things up even more, over here we have
on the network
the internet with all of its routers. Then as the internet is
• in a SAN, all the devices are interconnected.
routed into this private network, it first reaches the
Meaning that all of the devices are connected to
modem, then it goes from the modem to its router with
each other and they are interconnected using
its integrated switch and then it's passed to all of its
fiber channel which is a standard for SANs.
computers.
Fiber channel
NAS VS SAN - NETWORK ATTACHED STORAGE VS
STORAGE AREA NETWORK • is fiber optics and it has speeds between 2
NAS or Network Attached Storage gigabits per second all the way up to 128
gigabytes per second.
• If you wanted to store data in a centralized • is extremely fast and it's also very expensive
location, where it can be accessed from all of • most SANs today use fiber channel but also as an
your devices on your network alternative, some SANs use iSCSI instead, which
• is a storage device that is used for storing data, is a cheaper alternative to fiber channel, but it's
and it doesn't do anything else besides storing also not as fast as fiber channel
data.
Now one of the main reasons for using a SAN is because
• typically, is a box that will have multiple hard
SANs are not affected by network traffic such as
drives in a RAID configuration for redundancy
bottlenecks that can happen in a local area network. This
and it'll also have a network interface card that
is because SANs aren't really a part of a local area
network. SANs are partitioned off. It's basically a network Consumerization of IT
all by itself
• Technology emerging from consumer use
SANs come at a very high cost which is why they are spreads into businesses.
mainly used by large companies and large organizations • Includes personal devices and consumer
software services.
WEEK 5
Quantum Computing
MOORE'S LAW
• Boosts processing power using quantum physics.
Computers' Core Components
• Allows multiple simultaneous operations, solving
• Built from integrated circuits (chips) containing problems faster.
numerous transistors and tiny conducting lines
Virtualization
for electric current.
• Allows access to computer resources without
Transistors' Function
physical or geographic limitations.
• Manipulated to allow or block electric current, • Reduces hardware and power costs by making
enabling binary encoding and calculations. one physical resource appear as multiple logical
resources.
Moore's Law
Cloud Computing
• Observation by Gordon Moore in 1965 that the
number of transistors on integrated circuits • Use of remote servers via the Internet to store,
doubles every 2 years, predicting rapid manage, and process data.
development in computing power. • Offers infrastructure, platform, and software
services (public or private).
Moore's Law's Accuracy
Green Computing
• The prediction held from 1965 to 2013, later
slowing to doubling every 3 years, leading to a • Focuses on eco-friendly practices for designing,
30-million-fold increase in transistor density by manufacturing, and using computing hardware.
2015. • Encourages energy-efficient practices like using
Energy Star devices and power-saving modes.
Impact on Chip Speed
COMPUTER HARDWARE FOR BUSINESS
• Doubling transistors increases chip speed,
influenced by clock speed, heat emission, and Choosing computer hardware for your business
size.
With so many options available, choosing computer
CURRENT TRENDS IN COMPUTER HARDWARE hardware for your business can be difficult. You will have
PLATFORM to keep in mind:
Your staff may also require training if you purchase new You should dispose of old hardware in an
equipment that you expect them to use. You can carry environmentally friendly way. In some cases, the
out an IT training and learning needs analysis to manufacturer can arrange a free collection from you.
determine what type of training, if any, your staff might Retailers or suppliers may charge you to dispose of the
need. equipment.
When choosing hardware, make sure that any new or Hardware cannot work by itself. It needs step-by-
replacement components are compatible with your step instructions. Software is a set of instructions or
existing computer equipment. Consider the overall costs, programs that tells the hardware what to do and how to
including if it might be cheaper to install a new system do.
rather than upgrade the existing components.
A program that runs on the computer is called a software.
Security
Examples of Software:
Hardware theft or loss is a potential business risk.
• MS Office antivirus
Whether by accident or malicious intent, loss of a laptop,
• Windows Media Player
a mobile device or storage devices (such as hard drives)
can put your business' data security at risk. You should • computer games
take steps to manage IT risk in your business to protect Two Types of Software
both hardware and data against a potential breach.
1. System Software
Long-term IT strategy Examples: Windows 10, Ubuntu, Linux, Mac OSX
Your IT strategy should take into account any future 2. Application Software
changes in your market, your employees and your Examples: Windows Media Player, PowerPoint,
products or services. If possible, integrate hardware notepad, paint
refresh and software rollout strategies in your business. System Software
When choosing new hardware for your business, it's • Set of programs controlling the operation of a
good practice to keep a list of purchase dates and costs computer.
of hardware for accountancy, tax, warranty and insurance
purposes. • Operating System (OS): Manages hardware and
software, examples include Windows, Ubuntu,
Hardware life expectancy Linux, and macOS.
Operation Support System (OSS) • Graphics Software - Used for creating and editing
drawings, e.g., Paint, Photoshop, Corel, Paint.
• Hardware and software used by service providers
to manage network infrastructure. • Desktop Publishing Software - Combines text and
images in a presentable format, e.g., CorelDraw,
• Functions:
PageMaker.
1. network management
2. service delivery • Multimedia Software - Enables creation and
3. service fulfillment, including the network editing of images, audio, and video, e.g., Adobe
inventory, activation and provisioning Flash, Adobe Premiere, Nuendo
4. service assurance
WHAT IS UTILITY SOFTWARE?
5. customer care
Utility Program
Utility Software
• Is system software
• Helps analyze, configure, optimize, or maintain a
• Designed to help analyze, configure, optimize or
computer.
maintain a computer
• Examples: antivirus software, backup software, • Usually focuses on how the computer
disk tools. defragmentation, scanning tools. infrastructure operates
• Creates copies of data and restores it in case of • Anti-virus – computer software used to prevent,
failure or accidental deletion. detect and remove malicious software. It
provides protection from other computer
Types:
threats, browser hijackers, keyloggers and
• full backup - a copy of all selected data computer viruses.
o Ex: Norton, AVG, McAfee Avira
• differential backup - a copy of the data that has
• Archivers – a program that combines a number
changed being added since the last full backup of files together into one archive file for easier
• incremental backup - a copy of the data that has transportation or storage
changed since the last backup, whether that was o Ex.: Winrar, 7-zip
full backup or incremental. • Disk cleaner – used to find and delete potentially
unnecessary or unwanted files from the
Antivirus Software computer. By deleting files, it can free up disk
• Detects and removes computer viruses. space, eliminate clutter and protect privacy.
• File manager (file browser) – is a program that
Disk Fragmentation provides a user interface to manage files and
folders. The most common operations
• Organizes scattered file contents on a hard disk
performed include creating, opening, renaming,
to improve efficiency.
moving or copying, deleting and searching for
Application Software files.
• Backup software, cryptographic, debuggers, etc.
• Designed for specific tasks or user needs, acting
as a tool for easy operations. HOW DO OPERATING SYSTEMS WORK?
Operating System