0% found this document useful (0 votes)
3 views

INTRODUCTION TO COMPUTER

The document provides an overview of computers, detailing their definition, history, and evolution through various generations, from manual mechanical devices to modern artificial intelligence systems. It categorizes computers based on their size and function, including supercomputers, mainframes, personal computers, and mobile devices, while also discussing hardware components and input/output devices. The text emphasizes the significant technological advancements that have shaped computing over time.

Uploaded by

jizellevicedooo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

INTRODUCTION TO COMPUTER

The document provides an overview of computers, detailing their definition, history, and evolution through various generations, from manual mechanical devices to modern artificial intelligence systems. It categorizes computers based on their size and function, including supercomputers, mainframes, personal computers, and mobile devices, while also discussing hardware components and input/output devices. The text emphasizes the significant technological advancements that have shaped computing over time.

Uploaded by

jizellevicedooo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

INTRODUCTION TO COMPUTERS "bones" corresponding to the

multiplier on the left side and the


●​ A computer is an electronic bones corresponding to the digits of
machine which can take instructions, the multiplicand next to it to the right,
and perform computations based on and product can be read off simply
those instructions. It can be by adding pairs of numbers (with
programmed and performs appropriate carries as needed) in the
high-speed mathematical or logical row determined by the multiplier.
operations or that assembles, stores This process was published by
and retrieves data and processes Napier in 1617 in a book titled
data: Rabdologia, so the process is also
●​ Data Processing is a process that called rabdology.
involves transformation of data into ●​ Oughtred's-Slide Rule - A device
information through classifying, consisting of two logarithmically
sorting, merging, recording, scaled rules mounted to slide along
retrieving, transmitting, or reporting. each-other so that multiplication,
Data processing can be manual or division, and other more complex
computer based. computations are reduced to the
mechanical equivalent of addition or
HISTORY OF COMPUTING subtraction. The first slide rule was a
"Who invented the computer?" is not a joint effort of two Englishmen
question with a simple answer. The real Edmund Gunter and William
answer is that many inventors contributed to Oughtred. This was based on
the history of computers and that a Napier's logarithms and has become
computer is a complex piece of machinery the first analog computer (of the
made up of many parts, each of which can modern ages).
be Considered a separate invention. ●​ Pascaline - invented by the famous
French mathematician, Blaise
Historical records show that man has Pascal in 1642. Although imited to
invented three age group of devices to addition and subtraction, the toothed
assist him in calculating and processing counting wheel is still used in adding
data. These devices are classified as: machines. Several wheels with teeth
1) manual-mechanical device numbered from 0 to 9 are arranged
2) electromechanical in a row representing ones, tens,
3) electronic hundreds, thousands, and so on.
●​ Leibniz's Calculator - was invented
●​ Manual Mechanical - is a tool or a by Baron Gottfried Wilhelm Von
device with a simple mechanism Leibniz in 1874. It utilizes the same
powered by the hand. Devices of techniques for addition and
this type required some sort of subtraction as the Pascaline but
physical effort from the user when could also perform muttiplication;
used. The earliest data processing division and square roots
devices were all manual mechanical ●​ Babbage's Analytical Engine - was
devices due to the absence of invented by Charles Babbage in
electricity and adequate industrial 1822. He is known as the "Father of
technology. Some examples of these Modem Computers" as a result of
devices were the: his contributions to the basic design
●​ Abacus - A counting device for of the computer.
making calculations consisting of a ●​ Electromechanical - An
frame mounted with rods along electromechanical device is usually
which beads or balls are moved. It is powered by an electric motor and
the first manual mechanical data uses switches and relays.
processing device which was Household electrical appliances,
developed in China in 3000 B.C. desk calculations and punched -
●​ Napier's Bones - Napier's bones, card data processing equipment all
also called Napier's rods, are fall under this category. Some
numbered rods. which can be used examples of these devices were the:
to perform multiplication of any ​ Hollerith's Punched Card
number by a number 2-9. By placing Machine - It was invented by
Herman Hollerith in 1880. He ●​ Electronic Discrete Variable
used punched cards, read Automatic Comouter (EDVAC) -
electronically to keep was invented by John Von Neumann
and.transfer data. The cards in 1945. This was designed as a
were transported between stored-program computer.
brass rods, and when there
were holes in the cards, the GENERATIONS OF COMPUTERS
rods made contact and an The history of computer development is
electric current could flow. often referred to in reference to the different
This was a machine to generations of computing devices. Each
tabulate census data in 1890 generation of computer is characterized by
more efficiently than the a major technological development that
manual method. fundamentally changed the way computers
​ Jacquard's Loom - used operate, resulting in increasingly smaller,
punched cards to create cheaper, and more powerful and more
patterns on fabric woven on efficient and reliable devices.
a loom. It was the forerunner
of the Keypunch machine. it ●​ First Generation - 1940-1956:
was invented by Joseph Vacuum Tubes The first computers,
Marie Jacquard in 1804. used vacuum tubes for circuitry and
​ Mark I - was a 51 x 8 x 2 feet magnetic drums for memory, and
machine. It could perform the were often enormous, taking up
four basic arithmetic entire rooms. They were very
operations and could locate expensive to operate and in addition
information stored in tabular to using a great deal of electricity,
form. it was invented by generated a lot of heat, which was
Howard Aiken in 1943 but often the cause of matfunctions.
was put into use in 1944 up First generation computers relied on
to 1959 at Harvard. It was machine language, the lowest-level
fully automatic and could programming language understood by
complete long computations computers, to perform operations, and they
without human intervention. could only solve one problem at a time.
Its official name was input was based on punched cards and
Automatic Sequence paper tape, and output was displayed on
Controlled Calculator. printouts.
●​ Electronic Devices - are devices The UNIVAC and ENIAC computers are
which use electrical switches and examples of first-generation computing
circuitry. devices. The UNIVAC was the first
​ Atanasoff-Berry Computer commercial computer delivered to a
- invented by John Atanasoff business client, the U.S. Census Bureau in
in 1942 and was the first 1951.
digital computer that used
binary logic circuitry and had ●​ Second Generation - 1956-1963:
regenerative memory. Transistors. Transistors replaced
vacuum tubes and ushered in the
​ Electronic Numerical
second generation of computers..
Integrator and Calculator
The transistor was far superior to the
(ENIAC) - was invented by
vacuum tube. allowing computers to
Presper Eckert and
become smaller, faster, 'cheaper,
John-Mauchly- in 1943 to
more energy-efficient and more
1946- It was the first
reliable than their first-generation
large-scale general purpose
predecessors. Though. the transistor
digital electronic computer. It
still - generated a great deal of heat
consisted of over 18,000
that subjected the computer to
vacuum tubes and required
damage, it was a vast improvement
the manual setting of
over the vacuum tube.
switches to . achieve desired
Second-generation computers stil
results. It could perform 300
relied on punched cards for input
multiplication problems per.
and printouts for output.
second.
Second-generation computers moved from As these small computers became more
cryptic binary machine language to powerful, they could be linked together to
symbolic, or assembly, languages, which form networks, which eventually led to the
allowed programmers to specity instructions development of the Internet.
in words. High-levei programming Fourth generation computers also saw the
languages were also being . developed at development of GUls, the mouse and
this time, such as early versions of COBOL handheld devices.
and FORTRAN. These were also the first
computers that stored their instructions in ●​ Fifth Generation - Present and
their memory, which moved from a magnetic Beyond: Artificial Intelligence -
drum to magnetic core technology. Fifth generation computing devices,
based on artificial intelligence, are
The first computers of this generation were still in development, though there
developed for the atomic energy industry. are some applications, such as voice
recognition, that are being used
●​ Third Generation - 1964-1971: today. The use of parallel processing
Integrated Circuits - The and superconductors is helping to
development of the integrated circuit make artificial intelligence a reality.
was the hallmark of the third Quantum computation and
generation of computers. Transistors molecular and hanotechnology will
were miniaturized and placed on radically change the face of
silicon chips, called semiconductors, computers in. years to come. The
which drastically increased the goal of fifth-generation-computing is
speed and efficiency of computers. to develop devices that respond to
natural language input and are
Instead of punched cards and printouts, capable of learning and
users interacted with third generation self-organization.
computers through keyboards and monitors
and interfaced with an operating system, CLASSIFICATIONS OF COMPUTERS
which allowed the device to run many • Computers are available in different
different applications at one time with a shapes, sizes and weights, due to these
central program that monitored the memory. different shapes and sizes they periom
Computers for the first time became different sorts of jobs from one another.
accessible to a mass audience because • They can also be classified in different
they were smaller and cheaper than their ways. All the computers are designed by the
predecessors. qualified computer architectures that design
these machines as their requirements.
●​ Fourth Generation - 1971-Present: • A computer that is used in a home differs
Microprocessors - The in size and shape from the computer being
microprocessor brought the fourth used in a hospital. Computers act as a
generation of computers, as server in large buildings, while the computer
thousands of integrated circuits were also differs in size and shape performing its
buit onto a single silicon chip. What job as a weather forecaster.
in the first generation filled an entire
room could now fit in the palm of the The Super Computer
hand. The Intel 4004 chip developed The biggest in size, the most expensive in
in 1971, located all the components price than any other is classified and known
of the computer - from the central as super computer. It can process trillions of
processing unit and memory to instructions in seconds. This computer is
input/output controls - on a single not used as a PC in a home neither by a
chip. student in a college.
In 1981 IBM introduced its first computer for • Governments specially use this type of
the home user, and in 1984 Apple computer for their different calculations and
introduced the Macintosh. Microprocessors heavy jobs. Different industries also use this
also moved out of the realm of desktop huge computer for designing their products.
computers and into many areas of life as • In most of the Hollywood's movies it is
more and more everyday products began to used for animation purposes. This kind of
use microprocessors. computer is also helpfül for forecasting
weather reports worldwide.
search for something in the internet, file a
document or create a presentation for work
but not anymore, technology has evolved to
Mainframes be more accessible even when you are on
• Another giant in computers after the super the go. Mobility has been a key standard set
computer is the Mainframe, which can also by the emerging wireless computing devices
process millions of instruction per second in recent years. and these devices and
and capable of accessing billions of data. gadgets have progressed from the biggest
• This computer is commonly used in big down to the smallest, from the thickest to
hospitals, air line reservations companies, the thinnest, and from the heaviest to the
and many other huge companies prefer lighter ones
mainframe because of its capability of
retrieving data oh a huge basis. One of these more popular wireless and
• This is normally to expensive and out of handheld devices are the tablet PCs which
reach from a salary-based person who dominated the market in 2011. Tablets of
wants a computer for his home. different brands, kinds and sizes were
launched following the first series of the
Minicomputer iPad sold in the market early in 2011. Tablet
• This computer is next in the line but offers PCs are known as wireless, portable
less than mainframe in work and personal computers with a touchscreen
performance: These are the computers, interface. The tablet form factor is typically
which are mostly preferred by the small type smaller than a notebook computer but larger
of business personals, colleges, etc. than a smartphone. This form of device was
initially developed to replace the bulky and
Personal computers heavy laptops and immobile desktop
• Almost all the computer users are familiar computers. Tablets offered mobility and
with the personal computers. faster connectivity in a single touch of a
They normally know what the personal finger.
computer is and what are its functions.
• This is the computer mostly preferred by Mobile Phones
the home users. These computers are On the other hand, mobile phones which
lesser in cost than the computers given have considerably larger screens that also
above and also, small in size; they are also functions as a personal computer gained
called PCs in short for Personal computers. popularity in the fecent years. A number of
• This computer is small in size and you can mobile phone brands developed their own
easily arrange it to fit in your single bedroom smartphones that are said to be at par or a
with its all accommodation. better choice over a tablet PC.
Smartphones have functions and features
Laptops/Notebooks/Netbooks similar to a tablet PC, onty integrated in a
• Having a small size and low weight the mobile phone.
notebook/netbook is easy to carry . to
anywhere. A student can take it with him/her THE COMPUTER SYSTEM
to his/her school in his/her The computer is a system which consists of
bag with his/her book. the hardware, software and the peopleware.
• This is easy to carry aroünd and preferred Without each one the computer cannot
by students and business people to meet function at all. The term. "computer
their assignments and other necessary hardware" refers to all the parts of the
tasks. computer that you can touch.
• The approach of this computer is also the "Computer software" generally refers to
same as the Personal computer. those computer reiated things that you can't
It can store the same amount of data and touch.
having a memory of the same size as that of
a personal computer. One can say that it is HARDWARE COMPONENTS
the replacement of personal desktop The hardware components are further
computer. categorized as input and output devices.
An input device is any peripheral (piece of
The Tablet PCs computer hardware equipment) used to
At some point, most people end up in front provide data and control signals to an
of their desktop or laptop computers to information processing system (such as a
computer). Input and output devices make • Touchpad a pressure sensitive pad that is
up the hardware interface between a smaller, more accurate, thinner
computer as a scanner or 6DOF controller. and is less expensive to build than a
Many input devices can be classified trackball
according to: • Trackpad a small, touch- sensitive pad,
• the modality of input (e.g. mechanical usually a couple of inches square which
motion, audio, visual, etc.) acts as an alternative to a mouse on some
• whether the input is discrete (e.g. notegook/palmtop computers. It works by
keypresses) _or continuous Te.g. a mouse's sensing fingertip pressure
position, though digitized into a discrete • Joystick a manual control consisting of a
quantity, is fast enough to be considered vertical handie that can move freely in two
continwous) directions; used as an input device to
• the number of degrees of freedom computers or to devices controlled by
involved (e.g. two-dimensional traditional computers:
mice, or three-dimensional navigators Touch Screen a type of display screen that
designed for CAD applications) has a touch-sensitive transparent panel
Pointing, devices, which are input devices covering the screen. Instead of using a
used to specity a position in space, can pointing device, you can use your finger to
further be classified according to: point directly to objects on the screen. This
• Whether the input is direct or indirect. With is used nowadays in tablet pcs. television
direct input, the input space coincides with sets and even cell phones.
the display space, i.e. pointing is done in the • Light Pen utilizes a light-sensitive detector
space where visual feedback or the cursor to select objects on a display
appears. Touchscreens and light pens screen
involve direct input. Examples involving • Stylus a pointing device shaped like a pen.
indirect input include the mouse and You use this with a digitzing
trackball. tablet or touch screen.
Whether the positional information is
absolute ie.g. on a touch screen; or relative Imaging and Video input devices Video
(e.g. with a mouse that can be lifted and input devices are used to digitize images
repositioned) or video from the outside worle into the
computer. The information can be stored in
A keyboard is a human interface device a multitude of formats depending on the
which is represented as a layout of buttons. user's requirement.
Each button. or key. can be used to either
input a linguistic character to a computer, or • webcam
to call upon a particular function of the • Image scanner
computer. Traditional keyboards use • Fingerprint scanner
spring-based buttons, though newer • Barcode reader
variations employ virtual keys, or even • Digitizing Tablet
projected keyboards. • 3D scanner
• Laser rangefinder
A pointing device is any human interface • Optical Character Recognition
device that allows a user to input ; spatial Optical Mark Reader
data to a computer, In the case of mice and • Voice-Recognition System
touch screens, this is usually achieved by
detecting movement across a physical Audio input devices
surface. Analog devices, such as 3D mice, Audio devices are used to either capture or
joysticks, or pointing sticks, function by create sound. In some cases, an audio
reporting their angle of deflection. output device can be used as an input
Movements of the pointing device are device, in order to capture produced sound.
echoed on the screen by movements of the • Microphone
cursor, creating a simple, intuitive way to • MIDI keyboard or other digital musical
navigate a computer's GUI. Other pointing instrument
devices are: Output Devices
• Trackball operates with a rotating metal An output device displays information on a
ball inset in a small boxlike device and does screen, creates printed copies or
not require a desktop generates sound A monitor, printer and
speakers are examples of output devices.
Speakers
Monitors and Displays • Used to output sound.
• Shows the processed information on a
screen Parts of the system Unit
• A monitor uses a picture tube like a Motherboard - is the main circuit board of a
television with the image displayed on the microprocessor. It is also known as the main
front of the tube, which is called the screen board or system board.
• Displays are flat and use plasma, LCD,
LED, active-matrix, or some other Central Processing Unit (CPU) - is the
technology central electronic chip that determines the
• Monitors used to be called Cathode Ray processing power of the computer ts speed
Tupes (CRTs) because of the picture tube is measured in hertz (one cycle per
which was a large vacuum tube. second). it has three basic parts:
• A monitor or display produces a soft copy. • The Arithmetic Logic Unit (ALU) -does all
When the device is turned off the the arithmetical and logical operations of the
information disappears. computer
Monitors are rapidly being replaced by fat • The Control Unit - directs the flow of
pane or LCD monitors. information into the CPU and or/ memory or
storage and controls the instructions the
Printers - produce a hard copy (also-called CPU wili do next.
as printout). The information is printed on • Registers - used to store data and
paper and can be used when the device is instructions inside the processor.
off. Memory - consists of silicon chips, usually
• Dot-matrix printers use metal pins to strike uses either VLS or VLSI technology to
an inked ribbon to make dots on a piece of create the chips. There are two forms of
paper memory:
• ink jet printers (non-impact printer) - use • Read Only Memory (ROM) - stores
drops of magnetic ink to produce dots on a information which is used by the CPU.
page to produce text or images • It can also hold programs that are directly
• Laser printers (non-impact printer) - a laser accessed by the CPU.
or LEDS make dots on a light sensitive • The instructions cannot be erased nor
drum. A toner (very tiny particles of plastic) altered.
sticks to the drum where the dots are made. • These instructions are built into the.
The paper is pressed against the drum and electronic circuits of the chips and
the toner is placed on the paper. The paper -are called firmware.
is then heated and the toner melts into the • The instructions in the ROM are
paper. nonvolatile. They stay there even when the
Plotter a device that draws pictures on computer is turned off.
paper based on commands from a • Access to information is either random or
computer. Plotters differ from printers in that sequential access:
they draw lines using a pen. As a result they • Random-access means that any piece of
can produce continuous lines information in the ROM can be accessed at
any given time without accessing other
Input/Output Devices information first.
These are pieces of hardware that is used
for both providing information and receiving • The other kind of access is sequential
information. access.
• Disk Drive reads and writes information on • Random Access Memory (RAM)
it • The instructions here are constantly
• Hard Disk Drive a rigid magnetic disk changing, depending on the needs of the
mounted permanently in a drive unit CPU:
• Optical Disk a direct - access disk which • Instructions are volatile. When the
has recorded informationon it with a laser computer is turned off, the
beam that burns pits into its surface. information in the RAM disappears.
• Modem modulates the computer output to • Hence, the information in the RAM needs
an acceptable signal for transmission and to be saved to a secondary storage device
then demodulates the signal back for before the computer is turned off:
computer input 0 Access to information is random access.
• Computer data storage, often called It can be used to archive and protect large
storage or memory, refers to computer amount of data.
components, devices, and recording media
that retain digital data used for computing Communication Devices
for some interval of time. Computer data For communication to take place between
storage provides one of the core functions two people from widely different countries or
of the medern computer, that of information cultures, an electronic or human traslator is
retention. required to act as -an interface between
• Other forms of fast but temporary storage them. Similarly for a computer to
today more commonly refers to mass communicate with another completely
storage - optical discs, forms of magnetic different system, this will also require an
storage like hard disks, and other types interface of some kind.
slower than RAM, but of a more permanent An interface is usually provided by a card
nature. which contains ports for input and output
Historically, memory and storage were devices, plus processing and memory
respectively called primary storage and microchips. in effect it translates one form of
secondary storage. communication from an external input
• The computer stores information as a device into that which can be understood by
string of zeros (0) and ones (1) the computer and then, if necessary, into
• The standard string length is eight O's or another that can be sent to any special
1's in a row called a byte output device, or another computer. An
• A byte equals one character (a letter, interface card may be inserted in one of the
number or symbol) slots provided inside the computer or it may
• There are 256.standard characters used be external with its own power supply and
by almost all computers plugged into the computer's serial
Megabytes, Gigabytes, TerabyteS.. What communication port.
Are They?
These terms are usually used in the world of Here are some common examples:,
computing to describe disk space,. or data MODEM (MODulator-DEModulator) -
storage spaee, and system memory. needed for Internet, email, fax ánd video.
• 1 Kilobyte (KB) = 1024 bytes conferencing communications using
1 megabyte (MB) = 1000 KB telephone cables, it converts-outgoing
1 gigabyte (GB) = 1000 MB digital signals from the eomputer into
• 1 terabyte = 1000 GB analogue audio tones which can travel
along the telephone wires, and the reverse
Hard Drive is the primary device that a for incoming signals.
computer uses to store information. Sound Card - for music or speech from
it stores programs, data files. saves and programs, CD-ROMs, and microphone.
organizes files. It is usually located inside It usualty includes a MiDI interface for input
the computer case, although there are now from musical instruments.
USE drives which are connected externally. MIDI (Musical Instrument Digital
The hard drive magnetically stores data on interface) - needed to connect musica
stacks of rotating disks called platters. instruments to a computer so that the music
Floppy drive - stores and retrieves played can be stored as a file, displayed on
information on a floppy disk screen, edited, printed or played back.
CD/DVD ROM drive - a device that reads Network Card - enables the computer to
information stored on a disc communicate with other computers linked
USB (Universal Serial Bus) flash drive - together by cable through the interface.
also known as Pen Drive is the next Used for shared storage of programs and
revolution in secondary portable storage work files, and for sharing printers.
device. Initially emerged with couple of MB Peripheral devices - any piece of hardware
storage capacity, it quickly gained attraction attached to a computer. A few
due to its solid state rugged construction, • examples of peripheral devices are
being very handy and can now scanners, printers, and digital cameras.
accommodate large capacity of files and its Computer software
capability of being used on any computer
equipped with USB port. Computer software or just software is a
Zip drive — a removable disk that holds a general term used to describe a collection of
large amount of information. computer programs, procedures and
documentation that perform some tasks on Programs in the public domain can be used
a computer system. This provides without restriction as components of other
instructions that tell the computer how to programs. When reusing such code, it is
operate. Software also includes video good to understand its history so that you
games and the logic systems of modern can be sure it really is in the public domain
consumer devices such as automobiles, Shareware is software that is distributed
televisions, toasters, etc. free on a trial basis with the understanding
that the user may need or want to pay for it
Types of Software later. Some software developers offer a
System software shareware version of their program with a
System software helps run the computer built-in expiration date (after 30 days, the
hardware and computer system. It includes: user can no longer get access to the
• device drivers programi. Other shareware (sometimes
• operating systems servers utilities called liteware) is offered with certain
• windowing systems, capabilitiés disabled as an enticement to
The purpose of systems software is to buy the complete version of the program.
unburden the applications programmer from Programming that is offered at no cost is
the details of the particular computer called freeware. However, it is copyrighted
complex being used, including such so that you can't incorporate its
accessory devices as commuhications, programming into anything you may be
printers, readers, displays, keyboards, etc. developing. Free to use and make copies
And also to partition, the computer's of. Cannot be changed or used in another
resources such as memory and processor program without the copyright holder's
time in a safe and stable manner. permission.

Programming software Commercial software requires payment


Programming software usualty provides before it can be used, but includes all the
tools to assist a programmer in writing program's features, with no restrictions or
computer programs, and software using time limits. Commercial software programs
different programming languages in a more typically come in a physicai box. which is
convenient way. The tools include: what you see dispiayed in retail stores.
• compilers While it's true that the software boxes are
• debuggers not as big as they used to be, they still
• interpreters contain the software CD or DVD and usually
• linkers a "getting started" manuat along with a
• text editors registration key used for registering the
•An Integrated development environment product. Most commercial seitware
(IDE) is a single application that attempts to programs ask that the user to register the
manage all these functions. program so the company-can keep track of
its authorized users. Some commercial
Application software soitware programs, such as newer versions
Application software allows end users to of Microsoft and Adobe programs, require
accomplish one or more specific (not the user to register the programs in order to
directly computer development related) continue using them after 30 days. While
tasks. Typical applications include: most commercial software programs are
• industrial automation sold in the physical box, many software
• business software computer games titles are now available as downloads.
• telecommunications, (ie the internet and These downloads are typically made
everything that flows on it) available from the company's website. The
• databases user pays for the program directly on the
• educational software website and instead of receiving the
• medical software software in the mail, the user downloads it
to his computer. Another popular way of
Ways of acquiring software: purchasing commercial software online is
public domain software are programs that simply paying for a registration key, which
are uncopyrighted because their authors unlocks the features of a shareware
intended to share them with everyone else program. This upgrades the shareware
are in the public domain. program to the commercial version, which
removes any feature limitations frem the leak, or launch an attack that will harm a
shareware version. company's network.

Computer Security Ethics and Privacy An unethical employee is an employee


Today; many people rely on computers to that illegally accesses their company's
do homework, work, and create or store network for numerous reasons. One could
useful information. Therefore, it is important be the money they can get from selling top
for the information on the computer to be secret information, or some may be bitter
stored and kept properly. it is also extremely and want revenge.
important for people on computers to
protect their computer from data loss, A script kiddie is someone who is like a
misuse, and abuse. For example, it is cracker because they may have the
crucial for businesses to keep information intentions of doing harm, but they usually
they have secure so that hackers cannot lack the technical skills. They are usually
access the information. Home users also silly teenagers that use prewritten hacking
need to take means to make sure that their and cracking programs.
credit card numbers are secure when they
are participating in online transactions. A corporate spy has extremely high
computer and network skills and is hired to
• A computer security risk is any action break into a specific computer or computer
that could cause lost of information. network to steal or delete data and
soitware, data, precessing incompatibilities. information:
or cause damage to computer hardware, a Shady companies hire these type of people
lot of these are planned to do damage. An in a practice known as corporate espionage.
intentional breach in computer security is They do this to gain an advantage, over
known as a computer crime which is slightly their competition an illegal practice.
different from a cybercrime. A cybercrime is Business and home users must do their
known as illegal acts based on the internet. best to protect or safeguard their computers
- There are several distinct categories for from security risks.
people that cause cybercrimes, and they The typical network attacks that puts
are referred to as hacker, cracker, computers at risk includes viruses, worms,
cyberterrorist, cyberbully, cyberextortionist, spoofing, Trojan horses, and denial of
unethical employee, script kiddie and service attacks. Every unprotected
corporate spy. computer is vulnerable to a computer virus
which is a potentially harming computer
The term hacker was actually known as a program that infects a computer negatively
good word but now it has a very negative and altering the way the computer operates
view. A hacker is defined as. someone who without the user's consent. Once the virus is
accesses a computer or . computer network in the computer it can spread throughout
unlawfully. They often claim that they do this infecting other files and Potentially
to find leaks in the security. of a network. damaging the operating system itself. It's
similar to a bacteria virus that infects
The term cracker has never been humans because it gets into the body
associated with something positive this through small openings and can spread to
refers to someone who intentionally other parts of the body and can cause some
accesses a computer or computer network damage. The similarity is, the best way to
for evil reasons. They access with the intent avoid is preparation.
of destroying, or stealing information. Both A computer worm is a program that
crackers and hackers are very advanced repeatedly copies itself and is very similar to
with network skills. a computer virus. However the difference is
that a virus needs to attach itself to an
A cyberterrorist is someone who uses a executable file and become a part of it. A
computer network of the internet to destroy. computer worm doesn't need to do that. It
computers for political reasons. A sends copies to itself and to other networks
cyperextortionist is someone who uses and eats up a lot of bandwidth. A Trojan
emails as an offensive force. They would Horse named after the famous Greek myth
usually send a company a very threatening and is used to describe a program that
email stating that they will release some secretly hides and actually looks like a
confidential information, exploit a security legitimate program but is a fake. A certain
action usually triggers the Trojan horse, änd Computer Ethics
unlike viruses and worms they don't Ethics is a set of moral principles that
replicate itself. Computer viruses, worms govern the behavior of a group or individual.
and Trojan horses are all classified as Therefore, computer ethics is set of moral
malicious-logic programs which are just principles that reguiate the use of
programs that deliberately harm a computer. computers. Some common issues of
You know when a computer is infected by a computer ethics include intellectual property
virus, worm, or Trojan horse if one or more rights (such as copyrighted electronic
of these acts happen: content), privacy concerns, and how
computers affect society. The legai aspects
• Screenshots of weird messages or of cemputing are complex and multilayered.
pictures appear. Teachers can heip society by practicing
• You have less available memory then you ethical computer use, avoiding software
expected piracy, and providing direct instruction on
• Music or sounds plays randomly. ethical computing practices.
• Files get corrupted
• Programs or files don't work property INTERNET
• Unknown files or programs randomly The Internet, sometimes called simply "the
appear Net," is a worldwide system of computer
• System properties fluctuate networks - a network of networks in which
users at any one computer can, if they have
Computer viruses, worms, and Trojan permission, get information from any other
horses deliver their payload or instructions computer (and sometimes talk. directly to
through common ways. users at other computers).
• when an individual runs an infected
program so if you download a lot of things Why do users access the Internet?
you should always scan the files before 1. Communications
executing, especially executable files 2. information
• when an individual runs an infected 3. Shopping
program. 4. banking
• when an individual boots a computer with 5. Online classes
an infected drive 6. entertainment
• when it connects an unprotected computer
to a network. What is the Web?
• when one opens an unsecured email Billions of documents, called Web pages,
attachment. available to anyone connected to the
Internet.
Intellectual Property
• Intellectual property refers to creations of > A Website is a collection-of related Web
the mind: inventions, literary and artistic pages
works, and symbols, names, images, and > A Web page contains text, graphics,
designs used in commerce. sound, video, ana.links to other Web pages
Intellectual property is divided into two > You can share information oy creating
categories: Industrial property, which incides Web pages or posting photos on a photo
inventions (patents), trademarks, industrial sharing community
designs, and geographic indications of A Web browser is a software application
source: and Copyright, which includes used to locate and display Web pages.
literary and artistic works such as noveis, The two most popular browsers are
poems and plays, films, musical works, Microsoft Internet Explorer and Firefox.
artistic works such as drawings, paintings, Both of these are a graphical browser,
photographs and sculptures, and which means that they can display graphics
architectural designs. Rights related to as well as text. in addition, most modern
copyright include those of performing artists browsers can present multimedia
in their performances, producers of information.. including sound and video,
phonograms in their recordings, and those though they require plug-ins for some
of broadcasters in their radio and television formats.
programs. Search engine - A program that searches
documents for specified keywords and
returns a list of the documents where the
keywords were found. Although search USENET-newsgroups and a few surviving
engine is really a general class of programs, Gopher sites.
the term is often used to specifically
describe systems like Google, Alta Vista Email - Short for electronic mail, the
and Excite that enable users to search for transmission of messages over
documents on the World Wide Web and communications networks. The messages
USENET newsgroups. can be notes entered from the keyboard or
electronic files stored on disk.
Directories - like yahoo, uses human
editors to place the site into a hierarchy or What is a network?
outline of topics so that users can find it by A social networking service is an online
selecting the appropriate category. service, platform, or site that focuses on .
URL (Uniform Resource Locator) - is the facilitating the building of social networks or
global address of documents and other social relations among people who, for
resources on the World Wide Web. example, share interests, activities,
backgrounds, or real-life connections. A
The first part of the address is called a social - network service consists of a
protocol identifier and it indicates what representation of each user (citing a profile).
protocol to use and the second part is called his her social links, and a variety of
a resource name and it specifies the IP additional services. Most social network
address or the domain name where the services are web-based and provide means
resource is located. The protocol identifier for users to interact over the Internet, such
and the resource name are separated by a as e-mail and instant messaging. Online
colon and two forward slashes. community services are sometimes
considered as a social network service,
Cloud Computing though in a broader sense, social network
Cloud computing is the use of computing service usually means an
resources (hardware and software) that are individual-centered service whereas online
delivered as a service over a network community services are group-centered.
(typically the Internet). The name comes Social networking sites allow users to share
from the use of a ideas, activities, events, and interests within
cloud-shaped-symbol-as-an abstraction for their individual networks.
the complex infrastructure it contains in Advantages of Using Computers:
system diagrams. Cloud computing • Speed
entrusts-remote services with a user's data, • Reliability
software and computation. • Consistency
• Storage and
Google Apps is a cloud-based productivity • Communication
suite. that helps-you and your team connect
and get work done from anywhere on any Disadvantages:
device. It's simple to setup, use and • Violation of Privacy
manage, allowing you to work smarter and • Impact on the Labor Force
focus on what really matters. • Health Risks
• Impact on the Environment
Cloud computing is the use of computing
resources (hardware and software) that are What are some examples of computer
delivered as a service over a network applications in society?
(typically the Internet). The name comes • Education
from the use of a cloud-shaped symbol as • Finance
an abstraction for the complex infrastructure • Government
it contains in system diagrams. Cloud • Healthcare
computing entrusts remote services with a • Science
user's data, software and computation. • Publishing
• Travel
World Wide Web (www) - refers to all the • Industry
publicty accessible web sites in the world, in Computer Applications in Education
addition to other information sources that Management - Computers are used in a
web browsers can access. These other variety of ways in the educational field.
sources include FTP sites,
Computers can be used in school
management such as budget, inventory,
student records, communications, library
circulation, and library public access
catalog.

Learning and Instruction - Computer


applications can be used in education for
learning and for instruction. Instruction and
learning can be divided into two major
areas, teacher-centered instruction and
student-centered learning.
• Teacher-centered instruction examined
the computer as the object of instruction as
well as a tool of instruction and the
management of instruction. It is subdivided
into the categories of computer literacy, CAI,
CMi, and design of teaching materials.
• Student-centered learning views the
computer as a toot-for the student to- use to
create, access, retrieve, manipulate, and
transmit intormation in order to solve a
problem. Understanding the concept of the
computer as an information tool relies on
accepting the fact that the computer is a
productivity too for the student and the
teacher alike.

Educational Research - Computers are


used widely in educational research.
Educational research includes functions
relating to information gathering and
processing. The teacher/researcher may
examine student performance data in new
and revealing ways. Bibliographic citations
of studies performed by educators around
the worid can be acquired and perused from
the desktop computer.

You might also like