SlideShare a Scribd company logo
1 of 10
Chapter 3
Computer Science
and the
Foundation of
Knowledge Model
Objectives
• Describe the essential components of computer
systems including hardware and software.
• Recognize the rapid evolution of computer systems and
the benefit of keeping up to date with current trends
and developments.
• Analyze how computer systems function as tools for
managing information and generating knowledge.
• Define the concept of human–technology interfaces.
• Articulate how computers can support collaboration,
networking, and information exchange.
Introduction
• The discipline of computer science is introduced
through a focus on computers and the hardware
and software that make up these evolving
systems.
• Computer science offers extremely valuable tools
that, if used skillfully, can facilitate the acquisition
and manipulation of data and information by
nurses, who can then synthesize these into an
evolving knowledge and wisdom base.
The Computer as a Tool for Managing
Information and Generating Knowledge
• Computer technology has ushered in what has been called
the “information age,” an age when data, information, and
knowledge are both accessible and able to be manipulated
by more people than ever before in history.
• Essentially, a computer is an electronic information-
processing machine that serves as a tool to manipulate
data and information.
• The easiest way to begin to understand computers is to
realize they are input–output systems.
• These unique machines accept data inputted via a variety
of devices, process data through logical and arithmetic
rendering, store the data in memory components, and
output data and information to the user.
Acquisition of Data and Information
(input components)
• Input devices include the keyboard; mouse; joysticks
(usually used for playing computer games); game
controllers or pads; web cameras (webcams); stylus (often
used with tablets or personal digital assistants); image
scanners for copying a digital image of a document or
picture; or other plug and play input devices, such as a
digital camera, digital video recorder (camcorder), MP3
player, electronic musical instrument, or physiologic
monitor.
• These devices are the origin or medium used to input text,
visual, audio, or multimedia data into the computer system
for viewing, listening, manipulating, creating, or editing.
The two primary input devices on a computer are the
keyboard and mouse.
Processing of Data and Information
(throughput/processing components)
• Specific software is used, depending on the application
and data involved.
• One key hardware component, the computer monitor,
is a unique example of a visible throughput component
because it is the part of the computer focused on the
most when users are working on a computer. Inputted
data can be visualized and accessed by manipulating
the mouse and keyboard input devices, but it is the
monitor that receives the user’s attention.
• The monitor is critical for the efficient rendering during
this part of the cycle, because it facilitates user access
and control of the data and information.
What is the Relationship of
Computer Science to Knowledge?
• Scholars and researchers are just beginning to
understand the effect that computer systems,
architecture, applications, and processes have
on the potential for knowledge acquisition
and development.
• Users are able to contribute to the
development of knowledge and through the
use of productivity, creativity, and
communication software.
What is the Relationship of
Computer Science to Knowledge? (continued)
• Using the World Wide Web interface, users
are also able to disseminate knowledge on a
grand scale with other users.
• The deluge of information available via
computers must be mastered and organized
by the user for knowledge to emerge.
• Discernment and the ability to critique and
filter this information must also be present to
facilitate the further development of wisdom.
Summary
• The field of computer science is one of the fastest
growing disciplines.
• Astonishing innovations in computer hardware,
software, and architecture have occurred over
the past few decades and there are no indications
that this trend will stop anytime soon.
• Computers have developed in speed, accuracy,
and efficiency, yet also cost less and have reduced
physical size. These trends are predicted to
continue.
Summary (continued)
• The productivity, creative, and communicative
software tools can enable nurses to work with
computers to further foster knowledge acquisition and
development.
• Wide access to vast stores of information and
knowledge shared by others also facilitates the
emergence of wisdom in users, which can be applied to
nursing in meaningful and creative ways. It is
imperative that nurses become discerning yet skilled
users of computer technology to apply the principles of
nursing informatics to practice, and to contribute to
the profession’s ever growing body of knowledge.

More Related Content

What's hot

E. practice application
E. practice applicationE. practice application
E. practice applicationloveobi25
 
D. informatics theory
D. informatics theoryD. informatics theory
D. informatics theoryloveobi25
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing InformaticsJadabear06
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentationLeeann Sills
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introductionIan Jasper Mangampo
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture Peak Review/FSUU
 
G. international perspectives
G. international perspectivesG. international perspectives
G. international perspectivesloveobi25
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`Kate Balgos
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworksJoseph Lagod
 
Community health nursing examination part i answer key
Community health nursing examination part i answer keyCommunity health nursing examination part i answer key
Community health nursing examination part i answer keyryanmejia
 

What's hot (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
E. practice application
E. practice applicationE. practice application
E. practice application
 
D. informatics theory
D. informatics theoryD. informatics theory
D. informatics theory
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing Informatics
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentation
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introduction
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture
 
Informatics & Technology in Nursing
Informatics & Technology in NursingInformatics & Technology in Nursing
Informatics & Technology in Nursing
 
Patricia benner.apa format
Patricia benner.apa formatPatricia benner.apa format
Patricia benner.apa format
 
G. international perspectives
G. international perspectivesG. international perspectives
G. international perspectives
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Community health nursing examination part i answer key
Community health nursing examination part i answer keyCommunity health nursing examination part i answer key
Community health nursing examination part i answer key
 

Viewers also liked

Chapter 14
Chapter 14Chapter 14
Chapter 14bodo-con
 
Chapter 12
Chapter 12Chapter 12
Chapter 12bodo-con
 
Chapter 11
Chapter 11Chapter 11
Chapter 11bodo-con
 
Chapter 16
Chapter 16Chapter 16
Chapter 16bodo-con
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best PracticesDavid Lange
 
Chapter 19
Chapter 19Chapter 19
Chapter 19bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 23
Chapter 23Chapter 23
Chapter 23bodo-con
 

Viewers also liked (10)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Similar to Chapter 3

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxArti Parab Academics
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
Computer & generations
Computer & generationsComputer & generations
Computer & generationsAnkitdhiman43
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptxBadeIbnuBade
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxMark Dave Morco
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxkisakitaemmanuel1
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesFaindra Jabbar
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 

Similar to Chapter 3 (20)

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptx
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related Terminilogies
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Computer & generations
Computer & generationsComputer & generations
Computer & generations
 
chapter1.pptx
chapter1.pptxchapter1.pptx
chapter1.pptx
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptx
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptx
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Eskwela ict basics
Eskwela ict basicsEskwela ict basics
Eskwela ict basics
 
intro to pc.pdf
intro to pc.pdfintro to pc.pdf
intro to pc.pdf
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Comp App Lect 1.ppt
Comp App Lect 1.pptComp App Lect 1.ppt
Comp App Lect 1.ppt
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 

More from bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

More from bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Chapter 3

  • 1. Chapter 3 Computer Science and the Foundation of Knowledge Model
  • 2. Objectives • Describe the essential components of computer systems including hardware and software. • Recognize the rapid evolution of computer systems and the benefit of keeping up to date with current trends and developments. • Analyze how computer systems function as tools for managing information and generating knowledge. • Define the concept of human–technology interfaces. • Articulate how computers can support collaboration, networking, and information exchange.
  • 3. Introduction • The discipline of computer science is introduced through a focus on computers and the hardware and software that make up these evolving systems. • Computer science offers extremely valuable tools that, if used skillfully, can facilitate the acquisition and manipulation of data and information by nurses, who can then synthesize these into an evolving knowledge and wisdom base.
  • 4. The Computer as a Tool for Managing Information and Generating Knowledge • Computer technology has ushered in what has been called the “information age,” an age when data, information, and knowledge are both accessible and able to be manipulated by more people than ever before in history. • Essentially, a computer is an electronic information- processing machine that serves as a tool to manipulate data and information. • The easiest way to begin to understand computers is to realize they are input–output systems. • These unique machines accept data inputted via a variety of devices, process data through logical and arithmetic rendering, store the data in memory components, and output data and information to the user.
  • 5. Acquisition of Data and Information (input components) • Input devices include the keyboard; mouse; joysticks (usually used for playing computer games); game controllers or pads; web cameras (webcams); stylus (often used with tablets or personal digital assistants); image scanners for copying a digital image of a document or picture; or other plug and play input devices, such as a digital camera, digital video recorder (camcorder), MP3 player, electronic musical instrument, or physiologic monitor. • These devices are the origin or medium used to input text, visual, audio, or multimedia data into the computer system for viewing, listening, manipulating, creating, or editing. The two primary input devices on a computer are the keyboard and mouse.
  • 6. Processing of Data and Information (throughput/processing components) • Specific software is used, depending on the application and data involved. • One key hardware component, the computer monitor, is a unique example of a visible throughput component because it is the part of the computer focused on the most when users are working on a computer. Inputted data can be visualized and accessed by manipulating the mouse and keyboard input devices, but it is the monitor that receives the user’s attention. • The monitor is critical for the efficient rendering during this part of the cycle, because it facilitates user access and control of the data and information.
  • 7. What is the Relationship of Computer Science to Knowledge? • Scholars and researchers are just beginning to understand the effect that computer systems, architecture, applications, and processes have on the potential for knowledge acquisition and development. • Users are able to contribute to the development of knowledge and through the use of productivity, creativity, and communication software.
  • 8. What is the Relationship of Computer Science to Knowledge? (continued) • Using the World Wide Web interface, users are also able to disseminate knowledge on a grand scale with other users. • The deluge of information available via computers must be mastered and organized by the user for knowledge to emerge. • Discernment and the ability to critique and filter this information must also be present to facilitate the further development of wisdom.
  • 9. Summary • The field of computer science is one of the fastest growing disciplines. • Astonishing innovations in computer hardware, software, and architecture have occurred over the past few decades and there are no indications that this trend will stop anytime soon. • Computers have developed in speed, accuracy, and efficiency, yet also cost less and have reduced physical size. These trends are predicted to continue.
  • 10. Summary (continued) • The productivity, creative, and communicative software tools can enable nurses to work with computers to further foster knowledge acquisition and development. • Wide access to vast stores of information and knowledge shared by others also facilitates the emergence of wisdom in users, which can be applied to nursing in meaningful and creative ways. It is imperative that nurses become discerning yet skilled users of computer technology to apply the principles of nursing informatics to practice, and to contribute to the profession’s ever growing body of knowledge.