SlideShare a Scribd company logo
1 of 8
CS 1010, Computer Essentials 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Explain the relationship between digital basics and computer
hardware.
1.1 Discuss the significance of digitization and its impact on the
digital revolution in reference to
data representation, processing, and security.
1.2 Describe the difference between system software, an
operating system, application software,
and a computer program.
1.3 Describe personal computer basics, microprocessors and
memory, storage devices, input and
output devices, and hardware security.
Reading Assignment
Chapter 1:
Computer and Digital Basics
Chapter 2:
Computer Hardware
Unit Lesson
Today we live in a highly digitized society, which affects our
economy, privacy, freedom and democracy, and
intellectual property. The digital revolution consists of four
phases, which are identified as data processing,
personal computing, network computing, and cloud computing.
Technology has changed as the revolution
has progressed. As users, we expect information to be available
24/7, and most of the time it is just a click
away. Parsons and Ajo (2014) stated that “the digital revolution
is an ongoing process of social, political, and
economic change brought about by digital technology, such as
computers and the Internet” (p. 4). It has been
said that the digital revolution actually started during World
War II. The Internet was developed as a military
project that society relies heavily on today. Without the
Internet, where would we be today? Commercial
concerns, academic entities, and research facilities rely heavily
on the Internet.
e-Commerce is a product of the digital revolution; some of the
popular websites associated with e-commerce
are Amazon and eBay. What a great way to shop by using e-
commerce in the comfort of one’s own home.
You do not have to go out and fight the Christmas crowds on
Black Friday; you can shop Black Monday
instead online.
Computerized medical health records are another product of the
digital revolution. Many doctors use
electronic records and patients can get accounts to view their
own information. Social media is another facet
of the digital revolution (e.g., Facebook, Twitter, LinkedIn, and
Myspace). Cell phones are a product of this
revolution, also. Cell phones were originally huge devices,
unlike how they look today. Today cell phones
have the capability of little computers.
The data processing phase of the digital revolution consisted of
big corporate and government computers,
custom applications, Citizens Band Radio (CB) radios,
Advanced Research Projects Agency Network
(ARPANET), and arcade games.
Phase two of the revolution consisted of personal computers,
including small standalone computers powered
by local software. Other characteristics of personal computing
include desktop computers, standalone
applications, dial-up Internet access, America Online (AOL)
and CompuServe, and two-dimensional (2-D)
action games.
UNIT I STUDY GUIDE
Computer Basics
CS 1010, Computer Essentials 2
UNIT x STUDY GUIDE
Title
Phase three consisted of network computing, which is nothing
more than a group of computers networked
together sharing data and resources. Additional characteristics
of network computing included laptop
computers, monolithic software suites, cable and satellite
Internet access, the Web and virtual worlds, and
three-dimensional (3-D) multiplayer. Phase three is when the
Internet became available for public use.
Phase four is what is known as cloud computing. This last phase
includes smartphones and tablets, handheld
applications and cloud-based applications, fourth generation
(4G) and Wi-Fi (local area wireless technology)
Internet access, social media, and touchscreen microgames.
Digital devices consist of computer basics, computer types and
uses, and lastly, microcontrollers. Digital data
is represented by numbers, texts, images and sound, quantifying
bits and bytes, and circuits and chips. Digital
processing is made possible by programs and instruction sets
and processor logic (Parsons & Ajo, 2014).
Password security plays a major role in our digital society.
Authentication protocols should be utilized for a
safe computing environment and secure passwords are a key. If
a hacker cannot guess a password, there
are other means such as phishing and using keylogger software
that can be used.
Passwords should be unique and not identifiable with a user. A
common rule of thumb when creating
passwords is not to use anything that is familiar to yourself like
birthdates, addresses, phone numbers, and
things of that nature. Using the combination of letter, numbers,
and special characters is good rule of thumb
for the creation of passwords. The length of the password is
another consideration. The longer the password,
the more secure it is. Password theft is a serious problem and
leads to identity theft. Consider the report of
Russian hackers stealing 1.2 billion passwords in August 2014.
At the time it was reported, Hold Security
stated that this was considered the largest incident of password
theft in digital history (Money.CNN, 2014).
Personal computers and desktop computers consist of many
parts. Some of the components may include a
printer, system unit, mouse, keyboard, sound system, display
system, network and Internet access, and
storage.
There are many options to consider before purchasing a
computer of any type. Some of the considerations
include cost, type of computer, memory, processing speed, and
the list goes on. Two resources that may be
valuable, before purchasing a computer, are PCWorld and
MacWorld magazines, just to name a few. Finally,
it is important to protect your computer once you have bought
it. Anti-theft devices can be used to lock your
computer whether it is a laptop or desktop device. Protecting
your computer from power surges is another
consideration, since power surges can render a device useless. A
power strip or an uninterruptible power
source (UPS) should be used to protect your device from power
surges.
Many people have heard of, or experienced the “blue screen of
death” on their computer when their digital
display shows a blue screen with white writing indicating that
the operating system cannot recover from an
error. The blue screen of death renders a computer system non-
functional. Troubleshooting and diagnostic
tools can help to find what the problem is to. Repair
professionals should be used as your last resort. This
course should give you the skills you need to do some trouble-
shooting yourself.
You should perform regular maintenance on your computer,
which includes: scanning your computer for
viruses at least weekly, keeping your spyware definitions
updated, and running utilities that ensure peak
performance for your hard drive.
References
O’Toole, J., & Pagliera, J. (2014, Aug.). Russian criminals steal
1.2 billion passwords. Money.CNN. Retrieved
from
http://www.money.cnn.com/2014/08/05/technology/security/russ
ian-hackers-theft/
Parsons, J., & Oja, D. (2014). New perspectives on computer
concepts 2014, comprehensive (17th ed.).
Boston, MA: Cengage.
http://www.money.cnn.com/2014/08/05/technology/security/russ
ian-hackers-theft/
CS 1010, Computer Essentials 3
UNIT x STUDY GUIDE
Title
Suggested Reading
Review Orientation pages (0-2 through 0-43) in your textbook.
This orientation is useful for understanding the
basic functions of your computer.
Learning Activities (Non-Graded)
Microsoft offers several featured tutorials for the Office suite
including 2007/2010/2013 Excel, Outlook,
PowerPoint, Access, and Word.
Complete at least one tutorial for any of the Microsoft Office
products located at http://office.microsoft.com/en-
us/training/. Microsoft Word, PowerPoint, and Excel are used
extensively in this course and in many
professions. Completing the tutorials for these products may be
beneficial.
Non-graded Learning Activities are provided to aid students in
their course of study. You do not have to
submit them. If you have questions, contact your instructor for
further guidance and information.
http://office.microsoft.com/en-us/training/
http://office.microsoft.com/en-us/training/

More Related Content

Similar to CS 1010, Computer Essentials 1 Course Learning Outcom.docx

Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalHarold Sowards
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04Shaheen Khan
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communicationKAYJOANNELIWANAGAN
 
AMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxAMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxADDY50
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxoreo10
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Audrey Britton
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...ijaia
 
O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01Vay Su
 

Similar to CS 1010, Computer Essentials 1 Course Learning Outcom.docx (16)

Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournal
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
IoT
IoTIoT
IoT
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
AMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxAMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docx
 
Essay About Computers
Essay About ComputersEssay About Computers
Essay About Computers
 
E-commerce
E-commerceE-commerce
E-commerce
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
E Marketing Ch1 Convergence
E Marketing Ch1 ConvergenceE Marketing Ch1 Convergence
E Marketing Ch1 Convergence
 
O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxaryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxaryan532920
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxaryan532920
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxaryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxaryan532920
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxaryan532920
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxaryan532920
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxaryan532920
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxaryan532920
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

CS 1010, Computer Essentials 1 Course Learning Outcom.docx

  • 1. CS 1010, Computer Essentials 1 Course Learning Outcomes for Unit I Upon completion of this unit, students should be able to: 1. Explain the relationship between digital basics and computer hardware. 1.1 Discuss the significance of digitization and its impact on the digital revolution in reference to data representation, processing, and security. 1.2 Describe the difference between system software, an operating system, application software, and a computer program. 1.3 Describe personal computer basics, microprocessors and memory, storage devices, input and output devices, and hardware security. Reading Assignment Chapter 1: Computer and Digital Basics Chapter 2:
  • 2. Computer Hardware Unit Lesson Today we live in a highly digitized society, which affects our economy, privacy, freedom and democracy, and intellectual property. The digital revolution consists of four phases, which are identified as data processing, personal computing, network computing, and cloud computing. Technology has changed as the revolution has progressed. As users, we expect information to be available 24/7, and most of the time it is just a click away. Parsons and Ajo (2014) stated that “the digital revolution is an ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet” (p. 4). It has been said that the digital revolution actually started during World War II. The Internet was developed as a military project that society relies heavily on today. Without the Internet, where would we be today? Commercial concerns, academic entities, and research facilities rely heavily on the Internet. e-Commerce is a product of the digital revolution; some of the popular websites associated with e-commerce are Amazon and eBay. What a great way to shop by using e- commerce in the comfort of one’s own home. You do not have to go out and fight the Christmas crowds on Black Friday; you can shop Black Monday instead online. Computerized medical health records are another product of the digital revolution. Many doctors use electronic records and patients can get accounts to view their
  • 3. own information. Social media is another facet of the digital revolution (e.g., Facebook, Twitter, LinkedIn, and Myspace). Cell phones are a product of this revolution, also. Cell phones were originally huge devices, unlike how they look today. Today cell phones have the capability of little computers. The data processing phase of the digital revolution consisted of big corporate and government computers, custom applications, Citizens Band Radio (CB) radios, Advanced Research Projects Agency Network (ARPANET), and arcade games. Phase two of the revolution consisted of personal computers, including small standalone computers powered by local software. Other characteristics of personal computing include desktop computers, standalone applications, dial-up Internet access, America Online (AOL) and CompuServe, and two-dimensional (2-D) action games. UNIT I STUDY GUIDE Computer Basics CS 1010, Computer Essentials 2 UNIT x STUDY GUIDE Title
  • 4. Phase three consisted of network computing, which is nothing more than a group of computers networked together sharing data and resources. Additional characteristics of network computing included laptop computers, monolithic software suites, cable and satellite Internet access, the Web and virtual worlds, and three-dimensional (3-D) multiplayer. Phase three is when the Internet became available for public use. Phase four is what is known as cloud computing. This last phase includes smartphones and tablets, handheld applications and cloud-based applications, fourth generation (4G) and Wi-Fi (local area wireless technology) Internet access, social media, and touchscreen microgames. Digital devices consist of computer basics, computer types and uses, and lastly, microcontrollers. Digital data is represented by numbers, texts, images and sound, quantifying bits and bytes, and circuits and chips. Digital processing is made possible by programs and instruction sets and processor logic (Parsons & Ajo, 2014). Password security plays a major role in our digital society. Authentication protocols should be utilized for a safe computing environment and secure passwords are a key. If a hacker cannot guess a password, there are other means such as phishing and using keylogger software that can be used. Passwords should be unique and not identifiable with a user. A common rule of thumb when creating passwords is not to use anything that is familiar to yourself like birthdates, addresses, phone numbers, and things of that nature. Using the combination of letter, numbers, and special characters is good rule of thumb
  • 5. for the creation of passwords. The length of the password is another consideration. The longer the password, the more secure it is. Password theft is a serious problem and leads to identity theft. Consider the report of Russian hackers stealing 1.2 billion passwords in August 2014. At the time it was reported, Hold Security stated that this was considered the largest incident of password theft in digital history (Money.CNN, 2014). Personal computers and desktop computers consist of many parts. Some of the components may include a printer, system unit, mouse, keyboard, sound system, display system, network and Internet access, and storage. There are many options to consider before purchasing a computer of any type. Some of the considerations include cost, type of computer, memory, processing speed, and the list goes on. Two resources that may be valuable, before purchasing a computer, are PCWorld and MacWorld magazines, just to name a few. Finally, it is important to protect your computer once you have bought it. Anti-theft devices can be used to lock your computer whether it is a laptop or desktop device. Protecting your computer from power surges is another consideration, since power surges can render a device useless. A power strip or an uninterruptible power source (UPS) should be used to protect your device from power surges. Many people have heard of, or experienced the “blue screen of death” on their computer when their digital display shows a blue screen with white writing indicating that the operating system cannot recover from an error. The blue screen of death renders a computer system non- functional. Troubleshooting and diagnostic
  • 6. tools can help to find what the problem is to. Repair professionals should be used as your last resort. This course should give you the skills you need to do some trouble- shooting yourself. You should perform regular maintenance on your computer, which includes: scanning your computer for viruses at least weekly, keeping your spyware definitions updated, and running utilities that ensure peak performance for your hard drive. References O’Toole, J., & Pagliera, J. (2014, Aug.). Russian criminals steal 1.2 billion passwords. Money.CNN. Retrieved from http://www.money.cnn.com/2014/08/05/technology/security/russ ian-hackers-theft/ Parsons, J., & Oja, D. (2014). New perspectives on computer concepts 2014, comprehensive (17th ed.). Boston, MA: Cengage. http://www.money.cnn.com/2014/08/05/technology/security/russ ian-hackers-theft/
  • 7. CS 1010, Computer Essentials 3 UNIT x STUDY GUIDE Title Suggested Reading Review Orientation pages (0-2 through 0-43) in your textbook. This orientation is useful for understanding the basic functions of your computer. Learning Activities (Non-Graded) Microsoft offers several featured tutorials for the Office suite including 2007/2010/2013 Excel, Outlook, PowerPoint, Access, and Word. Complete at least one tutorial for any of the Microsoft Office products located at http://office.microsoft.com/en- us/training/. Microsoft Word, PowerPoint, and Excel are used extensively in this course and in many professions. Completing the tutorials for these products may be beneficial. Non-graded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information.