The document provides an overview of computers, detailing their definition, history, and evolution through various generations, from manual mechanical devices to modern artificial intelligence systems. It categorizes computers based on their size and function, including supercomputers, mainframes, personal computers, and mobile devices, while also discussing hardware components and input/output devices. The text emphasizes the significant technological advancements that have shaped computing over time.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
3 views
INTRODUCTION TO COMPUTER
The document provides an overview of computers, detailing their definition, history, and evolution through various generations, from manual mechanical devices to modern artificial intelligence systems. It categorizes computers based on their size and function, including supercomputers, mainframes, personal computers, and mobile devices, while also discussing hardware components and input/output devices. The text emphasizes the significant technological advancements that have shaped computing over time.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12
INTRODUCTION TO COMPUTERS "bones" corresponding to the
multiplier on the left side and the
● A computer is an electronic bones corresponding to the digits of machine which can take instructions, the multiplicand next to it to the right, and perform computations based on and product can be read off simply those instructions. It can be by adding pairs of numbers (with programmed and performs appropriate carries as needed) in the high-speed mathematical or logical row determined by the multiplier. operations or that assembles, stores This process was published by and retrieves data and processes Napier in 1617 in a book titled data: Rabdologia, so the process is also ● Data Processing is a process that called rabdology. involves transformation of data into ● Oughtred's-Slide Rule - A device information through classifying, consisting of two logarithmically sorting, merging, recording, scaled rules mounted to slide along retrieving, transmitting, or reporting. each-other so that multiplication, Data processing can be manual or division, and other more complex computer based. computations are reduced to the mechanical equivalent of addition or HISTORY OF COMPUTING subtraction. The first slide rule was a "Who invented the computer?" is not a joint effort of two Englishmen question with a simple answer. The real Edmund Gunter and William answer is that many inventors contributed to Oughtred. This was based on the history of computers and that a Napier's logarithms and has become computer is a complex piece of machinery the first analog computer (of the made up of many parts, each of which can modern ages). be Considered a separate invention. ● Pascaline - invented by the famous French mathematician, Blaise Historical records show that man has Pascal in 1642. Although imited to invented three age group of devices to addition and subtraction, the toothed assist him in calculating and processing counting wheel is still used in adding data. These devices are classified as: machines. Several wheels with teeth 1) manual-mechanical device numbered from 0 to 9 are arranged 2) electromechanical in a row representing ones, tens, 3) electronic hundreds, thousands, and so on. ● Leibniz's Calculator - was invented ● Manual Mechanical - is a tool or a by Baron Gottfried Wilhelm Von device with a simple mechanism Leibniz in 1874. It utilizes the same powered by the hand. Devices of techniques for addition and this type required some sort of subtraction as the Pascaline but physical effort from the user when could also perform muttiplication; used. The earliest data processing division and square roots devices were all manual mechanical ● Babbage's Analytical Engine - was devices due to the absence of invented by Charles Babbage in electricity and adequate industrial 1822. He is known as the "Father of technology. Some examples of these Modem Computers" as a result of devices were the: his contributions to the basic design ● Abacus - A counting device for of the computer. making calculations consisting of a ● Electromechanical - An frame mounted with rods along electromechanical device is usually which beads or balls are moved. It is powered by an electric motor and the first manual mechanical data uses switches and relays. processing device which was Household electrical appliances, developed in China in 3000 B.C. desk calculations and punched - ● Napier's Bones - Napier's bones, card data processing equipment all also called Napier's rods, are fall under this category. Some numbered rods. which can be used examples of these devices were the: to perform multiplication of any Hollerith's Punched Card number by a number 2-9. By placing Machine - It was invented by Herman Hollerith in 1880. He ● Electronic Discrete Variable used punched cards, read Automatic Comouter (EDVAC) - electronically to keep was invented by John Von Neumann and.transfer data. The cards in 1945. This was designed as a were transported between stored-program computer. brass rods, and when there were holes in the cards, the GENERATIONS OF COMPUTERS rods made contact and an The history of computer development is electric current could flow. often referred to in reference to the different This was a machine to generations of computing devices. Each tabulate census data in 1890 generation of computer is characterized by more efficiently than the a major technological development that manual method. fundamentally changed the way computers Jacquard's Loom - used operate, resulting in increasingly smaller, punched cards to create cheaper, and more powerful and more patterns on fabric woven on efficient and reliable devices. a loom. It was the forerunner of the Keypunch machine. it ● First Generation - 1940-1956: was invented by Joseph Vacuum Tubes The first computers, Marie Jacquard in 1804. used vacuum tubes for circuitry and Mark I - was a 51 x 8 x 2 feet magnetic drums for memory, and machine. It could perform the were often enormous, taking up four basic arithmetic entire rooms. They were very operations and could locate expensive to operate and in addition information stored in tabular to using a great deal of electricity, form. it was invented by generated a lot of heat, which was Howard Aiken in 1943 but often the cause of matfunctions. was put into use in 1944 up First generation computers relied on to 1959 at Harvard. It was machine language, the lowest-level fully automatic and could programming language understood by complete long computations computers, to perform operations, and they without human intervention. could only solve one problem at a time. Its official name was input was based on punched cards and Automatic Sequence paper tape, and output was displayed on Controlled Calculator. printouts. ● Electronic Devices - are devices The UNIVAC and ENIAC computers are which use electrical switches and examples of first-generation computing circuitry. devices. The UNIVAC was the first Atanasoff-Berry Computer commercial computer delivered to a - invented by John Atanasoff business client, the U.S. Census Bureau in in 1942 and was the first 1951. digital computer that used binary logic circuitry and had ● Second Generation - 1956-1963: regenerative memory. Transistors. Transistors replaced vacuum tubes and ushered in the Electronic Numerical second generation of computers.. Integrator and Calculator The transistor was far superior to the (ENIAC) - was invented by vacuum tube. allowing computers to Presper Eckert and become smaller, faster, 'cheaper, John-Mauchly- in 1943 to more energy-efficient and more 1946- It was the first reliable than their first-generation large-scale general purpose predecessors. Though. the transistor digital electronic computer. It still - generated a great deal of heat consisted of over 18,000 that subjected the computer to vacuum tubes and required damage, it was a vast improvement the manual setting of over the vacuum tube. switches to . achieve desired Second-generation computers stil results. It could perform 300 relied on punched cards for input multiplication problems per. and printouts for output. second. Second-generation computers moved from As these small computers became more cryptic binary machine language to powerful, they could be linked together to symbolic, or assembly, languages, which form networks, which eventually led to the allowed programmers to specity instructions development of the Internet. in words. High-levei programming Fourth generation computers also saw the languages were also being . developed at development of GUls, the mouse and this time, such as early versions of COBOL handheld devices. and FORTRAN. These were also the first computers that stored their instructions in ● Fifth Generation - Present and their memory, which moved from a magnetic Beyond: Artificial Intelligence - drum to magnetic core technology. Fifth generation computing devices, based on artificial intelligence, are The first computers of this generation were still in development, though there developed for the atomic energy industry. are some applications, such as voice recognition, that are being used ● Third Generation - 1964-1971: today. The use of parallel processing Integrated Circuits - The and superconductors is helping to development of the integrated circuit make artificial intelligence a reality. was the hallmark of the third Quantum computation and generation of computers. Transistors molecular and hanotechnology will were miniaturized and placed on radically change the face of silicon chips, called semiconductors, computers in. years to come. The which drastically increased the goal of fifth-generation-computing is speed and efficiency of computers. to develop devices that respond to natural language input and are Instead of punched cards and printouts, capable of learning and users interacted with third generation self-organization. computers through keyboards and monitors and interfaced with an operating system, CLASSIFICATIONS OF COMPUTERS which allowed the device to run many • Computers are available in different different applications at one time with a shapes, sizes and weights, due to these central program that monitored the memory. different shapes and sizes they periom Computers for the first time became different sorts of jobs from one another. accessible to a mass audience because • They can also be classified in different they were smaller and cheaper than their ways. All the computers are designed by the predecessors. qualified computer architectures that design these machines as their requirements. ● Fourth Generation - 1971-Present: • A computer that is used in a home differs Microprocessors - The in size and shape from the computer being microprocessor brought the fourth used in a hospital. Computers act as a generation of computers, as server in large buildings, while the computer thousands of integrated circuits were also differs in size and shape performing its buit onto a single silicon chip. What job as a weather forecaster. in the first generation filled an entire room could now fit in the palm of the The Super Computer hand. The Intel 4004 chip developed The biggest in size, the most expensive in in 1971, located all the components price than any other is classified and known of the computer - from the central as super computer. It can process trillions of processing unit and memory to instructions in seconds. This computer is input/output controls - on a single not used as a PC in a home neither by a chip. student in a college. In 1981 IBM introduced its first computer for • Governments specially use this type of the home user, and in 1984 Apple computer for their different calculations and introduced the Macintosh. Microprocessors heavy jobs. Different industries also use this also moved out of the realm of desktop huge computer for designing their products. computers and into many areas of life as • In most of the Hollywood's movies it is more and more everyday products began to used for animation purposes. This kind of use microprocessors. computer is also helpfül for forecasting weather reports worldwide. search for something in the internet, file a document or create a presentation for work but not anymore, technology has evolved to Mainframes be more accessible even when you are on • Another giant in computers after the super the go. Mobility has been a key standard set computer is the Mainframe, which can also by the emerging wireless computing devices process millions of instruction per second in recent years. and these devices and and capable of accessing billions of data. gadgets have progressed from the biggest • This computer is commonly used in big down to the smallest, from the thickest to hospitals, air line reservations companies, the thinnest, and from the heaviest to the and many other huge companies prefer lighter ones mainframe because of its capability of retrieving data oh a huge basis. One of these more popular wireless and • This is normally to expensive and out of handheld devices are the tablet PCs which reach from a salary-based person who dominated the market in 2011. Tablets of wants a computer for his home. different brands, kinds and sizes were launched following the first series of the Minicomputer iPad sold in the market early in 2011. Tablet • This computer is next in the line but offers PCs are known as wireless, portable less than mainframe in work and personal computers with a touchscreen performance: These are the computers, interface. The tablet form factor is typically which are mostly preferred by the small type smaller than a notebook computer but larger of business personals, colleges, etc. than a smartphone. This form of device was initially developed to replace the bulky and Personal computers heavy laptops and immobile desktop • Almost all the computer users are familiar computers. Tablets offered mobility and with the personal computers. faster connectivity in a single touch of a They normally know what the personal finger. computer is and what are its functions. • This is the computer mostly preferred by Mobile Phones the home users. These computers are On the other hand, mobile phones which lesser in cost than the computers given have considerably larger screens that also above and also, small in size; they are also functions as a personal computer gained called PCs in short for Personal computers. popularity in the fecent years. A number of • This computer is small in size and you can mobile phone brands developed their own easily arrange it to fit in your single bedroom smartphones that are said to be at par or a with its all accommodation. better choice over a tablet PC. Smartphones have functions and features Laptops/Notebooks/Netbooks similar to a tablet PC, onty integrated in a • Having a small size and low weight the mobile phone. notebook/netbook is easy to carry . to anywhere. A student can take it with him/her THE COMPUTER SYSTEM to his/her school in his/her The computer is a system which consists of bag with his/her book. the hardware, software and the peopleware. • This is easy to carry aroünd and preferred Without each one the computer cannot by students and business people to meet function at all. The term. "computer their assignments and other necessary hardware" refers to all the parts of the tasks. computer that you can touch. • The approach of this computer is also the "Computer software" generally refers to same as the Personal computer. those computer reiated things that you can't It can store the same amount of data and touch. having a memory of the same size as that of a personal computer. One can say that it is HARDWARE COMPONENTS the replacement of personal desktop The hardware components are further computer. categorized as input and output devices. An input device is any peripheral (piece of The Tablet PCs computer hardware equipment) used to At some point, most people end up in front provide data and control signals to an of their desktop or laptop computers to information processing system (such as a computer). Input and output devices make • Touchpad a pressure sensitive pad that is up the hardware interface between a smaller, more accurate, thinner computer as a scanner or 6DOF controller. and is less expensive to build than a Many input devices can be classified trackball according to: • Trackpad a small, touch- sensitive pad, • the modality of input (e.g. mechanical usually a couple of inches square which motion, audio, visual, etc.) acts as an alternative to a mouse on some • whether the input is discrete (e.g. notegook/palmtop computers. It works by keypresses) _or continuous Te.g. a mouse's sensing fingertip pressure position, though digitized into a discrete • Joystick a manual control consisting of a quantity, is fast enough to be considered vertical handie that can move freely in two continwous) directions; used as an input device to • the number of degrees of freedom computers or to devices controlled by involved (e.g. two-dimensional traditional computers: mice, or three-dimensional navigators Touch Screen a type of display screen that designed for CAD applications) has a touch-sensitive transparent panel Pointing, devices, which are input devices covering the screen. Instead of using a used to specity a position in space, can pointing device, you can use your finger to further be classified according to: point directly to objects on the screen. This • Whether the input is direct or indirect. With is used nowadays in tablet pcs. television direct input, the input space coincides with sets and even cell phones. the display space, i.e. pointing is done in the • Light Pen utilizes a light-sensitive detector space where visual feedback or the cursor to select objects on a display appears. Touchscreens and light pens screen involve direct input. Examples involving • Stylus a pointing device shaped like a pen. indirect input include the mouse and You use this with a digitzing trackball. tablet or touch screen. Whether the positional information is absolute ie.g. on a touch screen; or relative Imaging and Video input devices Video (e.g. with a mouse that can be lifted and input devices are used to digitize images repositioned) or video from the outside worle into the computer. The information can be stored in A keyboard is a human interface device a multitude of formats depending on the which is represented as a layout of buttons. user's requirement. Each button. or key. can be used to either input a linguistic character to a computer, or • webcam to call upon a particular function of the • Image scanner computer. Traditional keyboards use • Fingerprint scanner spring-based buttons, though newer • Barcode reader variations employ virtual keys, or even • Digitizing Tablet projected keyboards. • 3D scanner • Laser rangefinder A pointing device is any human interface • Optical Character Recognition device that allows a user to input ; spatial Optical Mark Reader data to a computer, In the case of mice and • Voice-Recognition System touch screens, this is usually achieved by detecting movement across a physical Audio input devices surface. Analog devices, such as 3D mice, Audio devices are used to either capture or joysticks, or pointing sticks, function by create sound. In some cases, an audio reporting their angle of deflection. output device can be used as an input Movements of the pointing device are device, in order to capture produced sound. echoed on the screen by movements of the • Microphone cursor, creating a simple, intuitive way to • MIDI keyboard or other digital musical navigate a computer's GUI. Other pointing instrument devices are: Output Devices • Trackball operates with a rotating metal An output device displays information on a ball inset in a small boxlike device and does screen, creates printed copies or not require a desktop generates sound A monitor, printer and speakers are examples of output devices. Speakers Monitors and Displays • Used to output sound. • Shows the processed information on a screen Parts of the system Unit • A monitor uses a picture tube like a Motherboard - is the main circuit board of a television with the image displayed on the microprocessor. It is also known as the main front of the tube, which is called the screen board or system board. • Displays are flat and use plasma, LCD, LED, active-matrix, or some other Central Processing Unit (CPU) - is the technology central electronic chip that determines the • Monitors used to be called Cathode Ray processing power of the computer ts speed Tupes (CRTs) because of the picture tube is measured in hertz (one cycle per which was a large vacuum tube. second). it has three basic parts: • A monitor or display produces a soft copy. • The Arithmetic Logic Unit (ALU) -does all When the device is turned off the the arithmetical and logical operations of the information disappears. computer Monitors are rapidly being replaced by fat • The Control Unit - directs the flow of pane or LCD monitors. information into the CPU and or/ memory or storage and controls the instructions the Printers - produce a hard copy (also-called CPU wili do next. as printout). The information is printed on • Registers - used to store data and paper and can be used when the device is instructions inside the processor. off. Memory - consists of silicon chips, usually • Dot-matrix printers use metal pins to strike uses either VLS or VLSI technology to an inked ribbon to make dots on a piece of create the chips. There are two forms of paper memory: • ink jet printers (non-impact printer) - use • Read Only Memory (ROM) - stores drops of magnetic ink to produce dots on a information which is used by the CPU. page to produce text or images • It can also hold programs that are directly • Laser printers (non-impact printer) - a laser accessed by the CPU. or LEDS make dots on a light sensitive • The instructions cannot be erased nor drum. A toner (very tiny particles of plastic) altered. sticks to the drum where the dots are made. • These instructions are built into the. The paper is pressed against the drum and electronic circuits of the chips and the toner is placed on the paper. The paper -are called firmware. is then heated and the toner melts into the • The instructions in the ROM are paper. nonvolatile. They stay there even when the Plotter a device that draws pictures on computer is turned off. paper based on commands from a • Access to information is either random or computer. Plotters differ from printers in that sequential access: they draw lines using a pen. As a result they • Random-access means that any piece of can produce continuous lines information in the ROM can be accessed at any given time without accessing other Input/Output Devices information first. These are pieces of hardware that is used for both providing information and receiving • The other kind of access is sequential information. access. • Disk Drive reads and writes information on • Random Access Memory (RAM) it • The instructions here are constantly • Hard Disk Drive a rigid magnetic disk changing, depending on the needs of the mounted permanently in a drive unit CPU: • Optical Disk a direct - access disk which • Instructions are volatile. When the has recorded informationon it with a laser computer is turned off, the beam that burns pits into its surface. information in the RAM disappears. • Modem modulates the computer output to • Hence, the information in the RAM needs an acceptable signal for transmission and to be saved to a secondary storage device then demodulates the signal back for before the computer is turned off: computer input 0 Access to information is random access. • Computer data storage, often called It can be used to archive and protect large storage or memory, refers to computer amount of data. components, devices, and recording media that retain digital data used for computing Communication Devices for some interval of time. Computer data For communication to take place between storage provides one of the core functions two people from widely different countries or of the medern computer, that of information cultures, an electronic or human traslator is retention. required to act as -an interface between • Other forms of fast but temporary storage them. Similarly for a computer to today more commonly refers to mass communicate with another completely storage - optical discs, forms of magnetic different system, this will also require an storage like hard disks, and other types interface of some kind. slower than RAM, but of a more permanent An interface is usually provided by a card nature. which contains ports for input and output Historically, memory and storage were devices, plus processing and memory respectively called primary storage and microchips. in effect it translates one form of secondary storage. communication from an external input • The computer stores information as a device into that which can be understood by string of zeros (0) and ones (1) the computer and then, if necessary, into • The standard string length is eight O's or another that can be sent to any special 1's in a row called a byte output device, or another computer. An • A byte equals one character (a letter, interface card may be inserted in one of the number or symbol) slots provided inside the computer or it may • There are 256.standard characters used be external with its own power supply and by almost all computers plugged into the computer's serial Megabytes, Gigabytes, TerabyteS.. What communication port. Are They? These terms are usually used in the world of Here are some common examples:, computing to describe disk space,. or data MODEM (MODulator-DEModulator) - storage spaee, and system memory. needed for Internet, email, fax ánd video. • 1 Kilobyte (KB) = 1024 bytes conferencing communications using 1 megabyte (MB) = 1000 KB telephone cables, it converts-outgoing 1 gigabyte (GB) = 1000 MB digital signals from the eomputer into • 1 terabyte = 1000 GB analogue audio tones which can travel along the telephone wires, and the reverse Hard Drive is the primary device that a for incoming signals. computer uses to store information. Sound Card - for music or speech from it stores programs, data files. saves and programs, CD-ROMs, and microphone. organizes files. It is usually located inside It usualty includes a MiDI interface for input the computer case, although there are now from musical instruments. USE drives which are connected externally. MIDI (Musical Instrument Digital The hard drive magnetically stores data on interface) - needed to connect musica stacks of rotating disks called platters. instruments to a computer so that the music Floppy drive - stores and retrieves played can be stored as a file, displayed on information on a floppy disk screen, edited, printed or played back. CD/DVD ROM drive - a device that reads Network Card - enables the computer to information stored on a disc communicate with other computers linked USB (Universal Serial Bus) flash drive - together by cable through the interface. also known as Pen Drive is the next Used for shared storage of programs and revolution in secondary portable storage work files, and for sharing printers. device. Initially emerged with couple of MB Peripheral devices - any piece of hardware storage capacity, it quickly gained attraction attached to a computer. A few due to its solid state rugged construction, • examples of peripheral devices are being very handy and can now scanners, printers, and digital cameras. accommodate large capacity of files and its Computer software capability of being used on any computer equipped with USB port. Computer software or just software is a Zip drive — a removable disk that holds a general term used to describe a collection of large amount of information. computer programs, procedures and documentation that perform some tasks on Programs in the public domain can be used a computer system. This provides without restriction as components of other instructions that tell the computer how to programs. When reusing such code, it is operate. Software also includes video good to understand its history so that you games and the logic systems of modern can be sure it really is in the public domain consumer devices such as automobiles, Shareware is software that is distributed televisions, toasters, etc. free on a trial basis with the understanding that the user may need or want to pay for it Types of Software later. Some software developers offer a System software shareware version of their program with a System software helps run the computer built-in expiration date (after 30 days, the hardware and computer system. It includes: user can no longer get access to the • device drivers programi. Other shareware (sometimes • operating systems servers utilities called liteware) is offered with certain • windowing systems, capabilitiés disabled as an enticement to The purpose of systems software is to buy the complete version of the program. unburden the applications programmer from Programming that is offered at no cost is the details of the particular computer called freeware. However, it is copyrighted complex being used, including such so that you can't incorporate its accessory devices as commuhications, programming into anything you may be printers, readers, displays, keyboards, etc. developing. Free to use and make copies And also to partition, the computer's of. Cannot be changed or used in another resources such as memory and processor program without the copyright holder's time in a safe and stable manner. permission.
Programming software usualty provides before it can be used, but includes all the tools to assist a programmer in writing program's features, with no restrictions or computer programs, and software using time limits. Commercial software programs different programming languages in a more typically come in a physicai box. which is convenient way. The tools include: what you see dispiayed in retail stores. • compilers While it's true that the software boxes are • debuggers not as big as they used to be, they still • interpreters contain the software CD or DVD and usually • linkers a "getting started" manuat along with a • text editors registration key used for registering the •An Integrated development environment product. Most commercial seitware (IDE) is a single application that attempts to programs ask that the user to register the manage all these functions. program so the company-can keep track of its authorized users. Some commercial Application software soitware programs, such as newer versions Application software allows end users to of Microsoft and Adobe programs, require accomplish one or more specific (not the user to register the programs in order to directly computer development related) continue using them after 30 days. While tasks. Typical applications include: most commercial software programs are • industrial automation sold in the physical box, many software • business software computer games titles are now available as downloads. • telecommunications, (ie the internet and These downloads are typically made everything that flows on it) available from the company's website. The • databases user pays for the program directly on the • educational software website and instead of receiving the • medical software software in the mail, the user downloads it to his computer. Another popular way of Ways of acquiring software: purchasing commercial software online is public domain software are programs that simply paying for a registration key, which are uncopyrighted because their authors unlocks the features of a shareware intended to share them with everyone else program. This upgrades the shareware are in the public domain. program to the commercial version, which removes any feature limitations frem the leak, or launch an attack that will harm a shareware version. company's network.
Computer Security Ethics and Privacy An unethical employee is an employee
Today; many people rely on computers to that illegally accesses their company's do homework, work, and create or store network for numerous reasons. One could useful information. Therefore, it is important be the money they can get from selling top for the information on the computer to be secret information, or some may be bitter stored and kept properly. it is also extremely and want revenge. important for people on computers to protect their computer from data loss, A script kiddie is someone who is like a misuse, and abuse. For example, it is cracker because they may have the crucial for businesses to keep information intentions of doing harm, but they usually they have secure so that hackers cannot lack the technical skills. They are usually access the information. Home users also silly teenagers that use prewritten hacking need to take means to make sure that their and cracking programs. credit card numbers are secure when they are participating in online transactions. A corporate spy has extremely high computer and network skills and is hired to • A computer security risk is any action break into a specific computer or computer that could cause lost of information. network to steal or delete data and soitware, data, precessing incompatibilities. information: or cause damage to computer hardware, a Shady companies hire these type of people lot of these are planned to do damage. An in a practice known as corporate espionage. intentional breach in computer security is They do this to gain an advantage, over known as a computer crime which is slightly their competition an illegal practice. different from a cybercrime. A cybercrime is Business and home users must do their known as illegal acts based on the internet. best to protect or safeguard their computers - There are several distinct categories for from security risks. people that cause cybercrimes, and they The typical network attacks that puts are referred to as hacker, cracker, computers at risk includes viruses, worms, cyberterrorist, cyberbully, cyberextortionist, spoofing, Trojan horses, and denial of unethical employee, script kiddie and service attacks. Every unprotected corporate spy. computer is vulnerable to a computer virus which is a potentially harming computer The term hacker was actually known as a program that infects a computer negatively good word but now it has a very negative and altering the way the computer operates view. A hacker is defined as. someone who without the user's consent. Once the virus is accesses a computer or . computer network in the computer it can spread throughout unlawfully. They often claim that they do this infecting other files and Potentially to find leaks in the security. of a network. damaging the operating system itself. It's similar to a bacteria virus that infects The term cracker has never been humans because it gets into the body associated with something positive this through small openings and can spread to refers to someone who intentionally other parts of the body and can cause some accesses a computer or computer network damage. The similarity is, the best way to for evil reasons. They access with the intent avoid is preparation. of destroying, or stealing information. Both A computer worm is a program that crackers and hackers are very advanced repeatedly copies itself and is very similar to with network skills. a computer virus. However the difference is that a virus needs to attach itself to an A cyberterrorist is someone who uses a executable file and become a part of it. A computer network of the internet to destroy. computer worm doesn't need to do that. It computers for political reasons. A sends copies to itself and to other networks cyperextortionist is someone who uses and eats up a lot of bandwidth. A Trojan emails as an offensive force. They would Horse named after the famous Greek myth usually send a company a very threatening and is used to describe a program that email stating that they will release some secretly hides and actually looks like a confidential information, exploit a security legitimate program but is a fake. A certain action usually triggers the Trojan horse, änd Computer Ethics unlike viruses and worms they don't Ethics is a set of moral principles that replicate itself. Computer viruses, worms govern the behavior of a group or individual. and Trojan horses are all classified as Therefore, computer ethics is set of moral malicious-logic programs which are just principles that reguiate the use of programs that deliberately harm a computer. computers. Some common issues of You know when a computer is infected by a computer ethics include intellectual property virus, worm, or Trojan horse if one or more rights (such as copyrighted electronic of these acts happen: content), privacy concerns, and how computers affect society. The legai aspects • Screenshots of weird messages or of cemputing are complex and multilayered. pictures appear. Teachers can heip society by practicing • You have less available memory then you ethical computer use, avoiding software expected piracy, and providing direct instruction on • Music or sounds plays randomly. ethical computing practices. • Files get corrupted • Programs or files don't work property INTERNET • Unknown files or programs randomly The Internet, sometimes called simply "the appear Net," is a worldwide system of computer • System properties fluctuate networks - a network of networks in which users at any one computer can, if they have Computer viruses, worms, and Trojan permission, get information from any other horses deliver their payload or instructions computer (and sometimes talk. directly to through common ways. users at other computers). • when an individual runs an infected program so if you download a lot of things Why do users access the Internet? you should always scan the files before 1. Communications executing, especially executable files 2. information • when an individual runs an infected 3. Shopping program. 4. banking • when an individual boots a computer with 5. Online classes an infected drive 6. entertainment • when it connects an unprotected computer to a network. What is the Web? • when one opens an unsecured email Billions of documents, called Web pages, attachment. available to anyone connected to the Internet. Intellectual Property • Intellectual property refers to creations of > A Website is a collection-of related Web the mind: inventions, literary and artistic pages works, and symbols, names, images, and > A Web page contains text, graphics, designs used in commerce. sound, video, ana.links to other Web pages Intellectual property is divided into two > You can share information oy creating categories: Industrial property, which incides Web pages or posting photos on a photo inventions (patents), trademarks, industrial sharing community designs, and geographic indications of A Web browser is a software application source: and Copyright, which includes used to locate and display Web pages. literary and artistic works such as noveis, The two most popular browsers are poems and plays, films, musical works, Microsoft Internet Explorer and Firefox. artistic works such as drawings, paintings, Both of these are a graphical browser, photographs and sculptures, and which means that they can display graphics architectural designs. Rights related to as well as text. in addition, most modern copyright include those of performing artists browsers can present multimedia in their performances, producers of information.. including sound and video, phonograms in their recordings, and those though they require plug-ins for some of broadcasters in their radio and television formats. programs. Search engine - A program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Although search USENET-newsgroups and a few surviving engine is really a general class of programs, Gopher sites. the term is often used to specifically describe systems like Google, Alta Vista Email - Short for electronic mail, the and Excite that enable users to search for transmission of messages over documents on the World Wide Web and communications networks. The messages USENET newsgroups. can be notes entered from the keyboard or electronic files stored on disk. Directories - like yahoo, uses human editors to place the site into a hierarchy or What is a network? outline of topics so that users can find it by A social networking service is an online selecting the appropriate category. service, platform, or site that focuses on . URL (Uniform Resource Locator) - is the facilitating the building of social networks or global address of documents and other social relations among people who, for resources on the World Wide Web. example, share interests, activities, backgrounds, or real-life connections. A The first part of the address is called a social - network service consists of a protocol identifier and it indicates what representation of each user (citing a profile). protocol to use and the second part is called his her social links, and a variety of a resource name and it specifies the IP additional services. Most social network address or the domain name where the services are web-based and provide means resource is located. The protocol identifier for users to interact over the Internet, such and the resource name are separated by a as e-mail and instant messaging. Online colon and two forward slashes. community services are sometimes considered as a social network service, Cloud Computing though in a broader sense, social network Cloud computing is the use of computing service usually means an resources (hardware and software) that are individual-centered service whereas online delivered as a service over a network community services are group-centered. (typically the Internet). The name comes Social networking sites allow users to share from the use of a ideas, activities, events, and interests within cloud-shaped-symbol-as-an abstraction for their individual networks. the complex infrastructure it contains in Advantages of Using Computers: system diagrams. Cloud computing • Speed entrusts-remote services with a user's data, • Reliability software and computation. • Consistency • Storage and Google Apps is a cloud-based productivity • Communication suite. that helps-you and your team connect and get work done from anywhere on any Disadvantages: device. It's simple to setup, use and • Violation of Privacy manage, allowing you to work smarter and • Impact on the Labor Force focus on what really matters. • Health Risks • Impact on the Environment Cloud computing is the use of computing resources (hardware and software) that are What are some examples of computer delivered as a service over a network applications in society? (typically the Internet). The name comes • Education from the use of a cloud-shaped symbol as • Finance an abstraction for the complex infrastructure • Government it contains in system diagrams. Cloud • Healthcare computing entrusts remote services with a • Science user's data, software and computation. • Publishing • Travel World Wide Web (www) - refers to all the • Industry publicty accessible web sites in the world, in Computer Applications in Education addition to other information sources that Management - Computers are used in a web browsers can access. These other variety of ways in the educational field. sources include FTP sites, Computers can be used in school management such as budget, inventory, student records, communications, library circulation, and library public access catalog.
Learning and Instruction - Computer
applications can be used in education for learning and for instruction. Instruction and learning can be divided into two major areas, teacher-centered instruction and student-centered learning. • Teacher-centered instruction examined the computer as the object of instruction as well as a tool of instruction and the management of instruction. It is subdivided into the categories of computer literacy, CAI, CMi, and design of teaching materials. • Student-centered learning views the computer as a toot-for the student to- use to create, access, retrieve, manipulate, and transmit intormation in order to solve a problem. Understanding the concept of the computer as an information tool relies on accepting the fact that the computer is a productivity too for the student and the teacher alike.
Educational Research - Computers are
used widely in educational research. Educational research includes functions relating to information gathering and processing. The teacher/researcher may examine student performance data in new and revealing ways. Bibliographic citations of studies performed by educators around the worid can be acquired and perused from the desktop computer.