SlideShare a Scribd company logo
1 of 14
WELCOME to the world of computers
and data processing!
Chap 1: Introduction to Computers 2
Although this maybe the beginning of
your formal introduction to computers, you
probably use them – perhaps without realizing
it.
Maybe you have already heard the
phrase:
Chap 1: Introduction to Computers 3
Introduction
This does not refer to the incredible
shrinking of the planet.
“The world is getting smaller!”
Chap 1: Introduction to Computers 4
Introduction
Computers and Information are at the
forefront of these changes, and computers
themselves are getting smaller and more
portable all the time.
This reflects about how technology, from
transportation to communications satellites, is
shrinking time and distance around the globe,
for businesses and for people.
Information Technology (IT)
Chap 1: Introduction to Computers 5
- the collective name given to the machines,
which releases information (e.g. radio, TV,
telephone, video recorder & player,
calculator, cash register and computer).
- a term that encompasses all forms of
technology used to create, store, exchange,
and use information in its various forms.
Chap 1: Introduction to Computers 6
What is a Computer?
- It is a programmable machine.
- It is a machine that manipulates
information or data.
- It is used to type documents, send email,
and surf the Internet.
- It is used to handle spreadsheets,
accounting, games and more.
 The automatic teller machine
Chap 1: Introduction to Computers 7
 The supermarket check out scanner
 The library on-line book-search system
 The cheerful but mechanical sounding
telephone voice.
Examples of Computers:
Chap 1: Introduction to Computers 8
Hardware
- the equipment involved in the function of a
computer and consists of the components
that can be physically handled.
Software
- also called programs.
- refers to the planned step-by-step
instructions that tell the computer hardware
how to perform a task.
Chap 1: Introduction to Computers 9
Data
- It consists of raw facts and figures.
- It can be a list of names arranged at
random.
Information
- A processed data.
- It can be a list of names arranged in
alphabetical order.
Computer Literacy
Chap 1: Introduction to Computers 10
Three Aspects of Computer Literacy:
- It is having an understanding of what a
computer is and how to use it as a
resource.
1. Awareness
2. Knowledge
3. Interaction
Chap 1: Introduction to Computers 11
Knowledge - the acquired knowledge about
computers.
Interaction - The ability to interact with a
computer and to make the computer work
for you.
Awareness - the awareness of the importance
of computers as a positive force in the
information society.
 Black Hat - is an individual who attempts to gain
unauthorized entry into a system or network to
exploit them for malicious reasons.
 White hat hackers, on the other hand, are deemed to
be the good guys, working with organizations to
strengthen the security of a system. A white hat has
permission to engage the targets and to compromise
them within the prescribed rules of engagement.
 Grey hats exploit networks and computer systems in
the way that black hats do, but do so without any
malicious intent, disclosing all loopholes and
vulnerabilities to law enforcement agencies or
intelligence agencies.
Chap 1: Introduction to Computers 12
Computer Competency
Chap 1: Introduction to Computers 13
Cyberphobia
- It is having some skill with a computer so
that you can use it to meet your information
needs and improve your productivity.
- The irrational fear of, and aversion to
computers.
Chap 1: Introduction to Computers 14

More Related Content

Similar to Chapter 1 - Introduction to Computer.ppt

Basic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_softwareBasic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_software
Santosh Kulkarni
 

Similar to Chapter 1 - Introduction to Computer.ppt (18)

Part-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdfPart-A An Overview of Cyber Law.pdf
Part-A An Overview of Cyber Law.pdf
 
Basic it
Basic itBasic it
Basic it
 
latest gadgets
latest gadgetslatest gadgets
latest gadgets
 
Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 
Computers
ComputersComputers
Computers
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptx
 
2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computers Essay
Computers EssayComputers Essay
Computers Essay
 
HendersonTheInternetandTheWorldWideWeb.pdf
HendersonTheInternetandTheWorldWideWeb.pdfHendersonTheInternetandTheWorldWideWeb.pdf
HendersonTheInternetandTheWorldWideWeb.pdf
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_softwareBasic concepts in_computer_hardware_and_software
Basic concepts in_computer_hardware_and_software
 
Booklet computer 1p t1
Booklet computer 1p t1Booklet computer 1p t1
Booklet computer 1p t1
 
Computer Science PowerPoint Presentation
Computer Science PowerPoint PresentationComputer Science PowerPoint Presentation
Computer Science PowerPoint Presentation
 

More from DondonGoles (6)

MS EXCEL.ppt
MS EXCEL.pptMS EXCEL.ppt
MS EXCEL.ppt
 
Data Processing.ppt
Data Processing.pptData Processing.ppt
Data Processing.ppt
 
MS EXCEL.ppt
MS EXCEL.pptMS EXCEL.ppt
MS EXCEL.ppt
 
MS Publisher.ppt
MS Publisher.pptMS Publisher.ppt
MS Publisher.ppt
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
Intro to Operating System.ppt
Intro to Operating System.pptIntro to Operating System.ppt
Intro to Operating System.ppt
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Chapter 1 - Introduction to Computer.ppt

  • 1.
  • 2. WELCOME to the world of computers and data processing! Chap 1: Introduction to Computers 2 Although this maybe the beginning of your formal introduction to computers, you probably use them – perhaps without realizing it.
  • 3. Maybe you have already heard the phrase: Chap 1: Introduction to Computers 3 Introduction This does not refer to the incredible shrinking of the planet. “The world is getting smaller!”
  • 4. Chap 1: Introduction to Computers 4 Introduction Computers and Information are at the forefront of these changes, and computers themselves are getting smaller and more portable all the time. This reflects about how technology, from transportation to communications satellites, is shrinking time and distance around the globe, for businesses and for people.
  • 5. Information Technology (IT) Chap 1: Introduction to Computers 5 - the collective name given to the machines, which releases information (e.g. radio, TV, telephone, video recorder & player, calculator, cash register and computer). - a term that encompasses all forms of technology used to create, store, exchange, and use information in its various forms.
  • 6. Chap 1: Introduction to Computers 6 What is a Computer? - It is a programmable machine. - It is a machine that manipulates information or data. - It is used to type documents, send email, and surf the Internet. - It is used to handle spreadsheets, accounting, games and more.
  • 7.  The automatic teller machine Chap 1: Introduction to Computers 7  The supermarket check out scanner  The library on-line book-search system  The cheerful but mechanical sounding telephone voice. Examples of Computers:
  • 8. Chap 1: Introduction to Computers 8 Hardware - the equipment involved in the function of a computer and consists of the components that can be physically handled. Software - also called programs. - refers to the planned step-by-step instructions that tell the computer hardware how to perform a task.
  • 9. Chap 1: Introduction to Computers 9 Data - It consists of raw facts and figures. - It can be a list of names arranged at random. Information - A processed data. - It can be a list of names arranged in alphabetical order.
  • 10. Computer Literacy Chap 1: Introduction to Computers 10 Three Aspects of Computer Literacy: - It is having an understanding of what a computer is and how to use it as a resource. 1. Awareness 2. Knowledge 3. Interaction
  • 11. Chap 1: Introduction to Computers 11 Knowledge - the acquired knowledge about computers. Interaction - The ability to interact with a computer and to make the computer work for you. Awareness - the awareness of the importance of computers as a positive force in the information society.
  • 12.  Black Hat - is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons.  White hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement.  Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. Chap 1: Introduction to Computers 12
  • 13. Computer Competency Chap 1: Introduction to Computers 13 Cyberphobia - It is having some skill with a computer so that you can use it to meet your information needs and improve your productivity. - The irrational fear of, and aversion to computers.
  • 14. Chap 1: Introduction to Computers 14