This document discusses computers and their components. It begins by defining what a computer is and explaining that they operate using binary digits. It then describes different types of computers based on size and power, including personal computers, workstations, minicomputers, and supercomputers. The document also covers the various components that make up a computer system, including hardware, software, and peopleware. It provides details on input and output devices, various operating systems, and number systems like binary code.
The document provides an overview of computer evolution and hardware components. It can be summarized as follows:
1) Computer hardware evolved rapidly from early vacuum tube computers to transistor-based systems to today's microprocessor-powered devices. Moore's Law predicted that processing power would double every 18 months.
2) The microprocessor revolutionized computing, allowing the development of personal computers that were as powerful as room-sized mainframes.
3) Modern computer systems consist of an input devices, a central processing unit (CPU), memory, storage devices, and output devices connected via buses. The CPU processes data and memory temporarily stores programs and data.
4) Common storage devices include magnetic disks, optical disks, solid
The document provides an overview of the evolution of computers from the earliest information processing machines to modern personal computers and networks. It discusses:
1) How early computers took input and produced output but relied on software to direct hardware operations.
2) How computer hardware evolved rapidly through generations using different technologies like vacuum tubes, transistors, integrated circuits and microprocessors making computers smaller, faster and cheaper.
3) How the microprocessor revolutionized computing by enabling the development of microcomputers and personal computers.
4) How networks emerged allowing multiple users to access mainframe computers and later connect personal computers, leading to the Internet revolution.
This document provides an overview of chapter 1 from the 15th edition of the textbook "Understanding Computers: Today and Tomorrow". It introduces computers by explaining their basic components and operations. It discusses the evolution of computers from the earliest mechanical devices to modern systems. It also describes the different types of computers, from embedded systems to supercomputers. Finally, it introduces computer networks and the Internet, explaining how computers connect and how users access the World Wide Web.
Introduction to information technology lecture 1adpafit
The document provides an overview of computers and information technology. It discusses how IT uses computing and communication to spread information. It then defines computers and their basic components of hardware and software. The document outlines the different generations of computers and some early calculating devices. It also describes input/output devices, common computer components, and uses of computers in various fields.
The document traces the evolution of management information systems (MIS) from early computers used for science and calculations to today's networked systems. It outlines key developments like the first electronic digital computer in 1939, the ENIAC in 1944, IBM's punch card system in 1952 that helped integrate computers into business and industry. The MIS field emerged in the 1970s to bridge the gap between computer programmers and business needs. MIS has since expanded to include newer technologies that retrieve and analyze large amounts of data across networked systems.
A computer is an electronic device that can store, process, and retrieve data. It allows users to type documents, send emails, play games, and browse the web. There are several types of computers including PCs, workstations, mini computers, mainframes, and super computers. The document also defines and provides examples of computer components, parts, and peripherals like motherboards, RAM, ROM, hard drives, graphics cards, web browsers, search engines, ports, cables, operating systems, and control panels. It explains concepts such as IP addresses, websites, blogs, antivirus software, video conferencing, online shopping, and modems.
The evolution of management information systemCheryl Asia
The document discusses the evolution of management information systems (MIS) from the early use of punch cards through five eras of centralized and decentralized systems to today's cloud-based systems. It traces the progression from manual looms using punch cards in the early 1800s to the emergence of mainframe computers in the 1960s enabling the first centralized MIS. By the 1980s, systems became more decentralized as departments obtained their own computers, followed by widespread internet adoption in the 1990s integrating information across companies. The current era is defined by ubiquitous access to cloud-based systems on multiple platforms, blurring the lines between information producers and consumers.
This document is a syllabus for a course on computer applications in economics. It introduces the key components of a computer system as hardware, software, and people. It defines hardware as the physical equipment, software as the set of instructions, and people as the most important component that uses computers. The syllabus then outlines topics that will be covered including memory units, input/output devices, auxiliary storage, programming languages, operating systems, and classifications of digital computers from microcomputers to supercomputers.
The document provides an overview of computer evolution and hardware components. It can be summarized as follows:
1) Computer hardware evolved rapidly from early vacuum tube computers to transistor-based systems to today's microprocessor-powered devices. Moore's Law predicted that processing power would double every 18 months.
2) The microprocessor revolutionized computing, allowing the development of personal computers that were as powerful as room-sized mainframes.
3) Modern computer systems consist of an input devices, a central processing unit (CPU), memory, storage devices, and output devices connected via buses. The CPU processes data and memory temporarily stores programs and data.
4) Common storage devices include magnetic disks, optical disks, solid
The document provides an overview of the evolution of computers from the earliest information processing machines to modern personal computers and networks. It discusses:
1) How early computers took input and produced output but relied on software to direct hardware operations.
2) How computer hardware evolved rapidly through generations using different technologies like vacuum tubes, transistors, integrated circuits and microprocessors making computers smaller, faster and cheaper.
3) How the microprocessor revolutionized computing by enabling the development of microcomputers and personal computers.
4) How networks emerged allowing multiple users to access mainframe computers and later connect personal computers, leading to the Internet revolution.
This document provides an overview of chapter 1 from the 15th edition of the textbook "Understanding Computers: Today and Tomorrow". It introduces computers by explaining their basic components and operations. It discusses the evolution of computers from the earliest mechanical devices to modern systems. It also describes the different types of computers, from embedded systems to supercomputers. Finally, it introduces computer networks and the Internet, explaining how computers connect and how users access the World Wide Web.
Introduction to information technology lecture 1adpafit
The document provides an overview of computers and information technology. It discusses how IT uses computing and communication to spread information. It then defines computers and their basic components of hardware and software. The document outlines the different generations of computers and some early calculating devices. It also describes input/output devices, common computer components, and uses of computers in various fields.
The document traces the evolution of management information systems (MIS) from early computers used for science and calculations to today's networked systems. It outlines key developments like the first electronic digital computer in 1939, the ENIAC in 1944, IBM's punch card system in 1952 that helped integrate computers into business and industry. The MIS field emerged in the 1970s to bridge the gap between computer programmers and business needs. MIS has since expanded to include newer technologies that retrieve and analyze large amounts of data across networked systems.
A computer is an electronic device that can store, process, and retrieve data. It allows users to type documents, send emails, play games, and browse the web. There are several types of computers including PCs, workstations, mini computers, mainframes, and super computers. The document also defines and provides examples of computer components, parts, and peripherals like motherboards, RAM, ROM, hard drives, graphics cards, web browsers, search engines, ports, cables, operating systems, and control panels. It explains concepts such as IP addresses, websites, blogs, antivirus software, video conferencing, online shopping, and modems.
The evolution of management information systemCheryl Asia
The document discusses the evolution of management information systems (MIS) from the early use of punch cards through five eras of centralized and decentralized systems to today's cloud-based systems. It traces the progression from manual looms using punch cards in the early 1800s to the emergence of mainframe computers in the 1960s enabling the first centralized MIS. By the 1980s, systems became more decentralized as departments obtained their own computers, followed by widespread internet adoption in the 1990s integrating information across companies. The current era is defined by ubiquitous access to cloud-based systems on multiple platforms, blurring the lines between information producers and consumers.
This document is a syllabus for a course on computer applications in economics. It introduces the key components of a computer system as hardware, software, and people. It defines hardware as the physical equipment, software as the set of instructions, and people as the most important component that uses computers. The syllabus then outlines topics that will be covered including memory units, input/output devices, auxiliary storage, programming languages, operating systems, and classifications of digital computers from microcomputers to supercomputers.
Ecoonomics 2nd sem computer application project.docxGorav Gopal Singh
Gorav Gopal Singh submitted a research report on computer applications in economic analysis to fulfill requirements for an MA in Economics. The report includes three chapters that discuss the history of computers and their evolution through five generations, hardware and software components, using MS Office for data analysis, researching FDI in India's retail sector, and conducting a survey and writing a report. Singh thanks several people who provided guidance and support during the project.
History of Management Information SystemEmil Mesina
Management Information Systems (MIS) have evolved through 5 eras: (1) Mainframe computing in the 1960s; (2) Personal computers in the 1970s and 1980s; (3) Client/server networks and the creation of the World Wide Web in the 1980s and 1990s; (4) Enterprise computing systems of the 1990s; and (5) Cloud computing today. The Department of Education in the Philippines has transitioned from paper-based data collection, to early computerized systems in the 1970s-1980s, to a fully computerized management information system today.
Computer application appreciation unit iAndreaTugwell
This document provides an overview of computers including their history, components, functions, advantages, disadvantages and impact on society. It discusses the three generations of computers from the first generation in 1937 using vacuum tubes to today's third generation using integrated circuits. The functions of computers including input, output, storage, and processing are described. Advantages include speed, accuracy and cost effectiveness while disadvantages include viruses, online crimes and reduced job opportunities. The widespread adoption of computers has changed how we shop, communicate and access information.
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Management information system (MIS) is a computer-based system that provides managers with tools to organize, evaluate, and efficiently run their departments. It provides information needed to effectively manage organizations. As businesses and transactions grew more complex, managers needed a single system with all information to make decisions. MIS involves people, technology, and information working together toward organizational objectives. There have been five eras of MIS evolution corresponding to computing technology advances from mainframes to personal computers to client/server networks to enterprise computing and now cloud computing.
This document provides an overview of the history and evolution of computer hardware from early mechanical calculators to modern electronic computers. It describes the major types of computer systems including microcomputers, midrange systems, mainframes, and supercomputers. It also outlines various input, output, and storage technologies such as keyboards, mice, displays, memory chips, magnetic disks, tapes, and optical disks. The document is intended to help readers understand computer hardware components and select appropriate systems and peripherals for different business needs.
This document provides a history of computers from the earliest mechanical devices through modern electronic systems. It begins with a classification of computers by technology, capacity, operating principle, and other factors. The evolution of computers is then discussed in five stages: the mechanical era from 1623-1945 involving early calculators and analytical engines; the first electronic computers from 1937-1953 using vacuum tubes; the second generation from 1954-1962 utilizing transistors; the third generation from 1963-1972 featuring integrated circuits; and modern supercomputers. Key individuals and their inventions are highlighted throughout the development of computer technology.
This document provides a multiple choice quiz on information systems topics. It contains 50 questions related to computer hardware, computer software, and management information systems concepts. The questions are written by Hassan Samoon for an MBA class and include the answers. The document serves as a study guide for students to test their knowledge of key terms and ideas in information systems.
The document discusses key points from a lecture and chapter on computers and information systems. It covers the basic components and functions of a computer including hardware, software, input/output devices, storage, and how computers process information. The document also discusses different types of computer systems, applications, and how computers have impacted society.
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...Ram Sharma
MIS Lecture - Tribhuvan University
Lecturer : Ram Sharma Bhattarai
BBA 3th Semester | TU University, Palpa
Reference : Management Information Systems: Managing the Digital Firm
Book by Jane Laudon and Kenneth C. Laudon
The document discusses a module on the evolution and types of computers. It covers five activities: 1) explaining the evolution of computer generations from vacuum tubes to integrated circuits; 2) matching processor types to generations; 3) introducing computer types like supercomputers, mainframes, and microcomputers; 4) labeling a diagram of computer types; and 5) researching computer types. The module aims to explain the evolution of computer generations and types of processors used.
This document defines information systems and their components. It discusses how information systems have developed over time from the introduction of punch cards to today's cloud computing systems. It identifies the key components of information systems as people, hardware, software, data, input, processing, output, storage and feedback. It also describes different types of information systems like transaction processing systems, decision support systems, executive information systems and management information systems. Finally, it outlines the five eras in the evolution of management information systems from mainframes to personal computers to today's cloud computing models.
This document defines information systems and their components. It discusses how information systems have developed over time from the introduction of punch cards to today's cloud computing systems. It identifies the key components of information systems as people, hardware, software, data, input, processing, output, storage and feedback. It also describes different types of information systems like transaction processing systems, decision support systems, executive information systems and management information systems. Finally, it outlines the five eras in the evolution of management information systems from mainframes to personal computers to today's cloud computing models.
Input devices allow users to control computers and provide data. Examples include keyboards, mice, cameras, and joysticks. Output devices communicate the results of processing to users in a human-readable form, such as printers, projectors, and headphones.
This chapter discusses the history of data from ancient times to modern databases. It explains how humankind has been interested in data for at least 12,000 years, initially using simple methods like pebbles to track flocks. Technological developments helped process and store data more efficiently over time, from calculating devices to punched cards to magnetic storage media. Today, data has become a crucial corporate resource, and database management systems are used to store and access massive volumes of data to gain competitive advantages.
This chapter discusses intellectual property rights, ethics, health issues related to computer use, access to technology, and environmental impacts. It covers various types of intellectual property including copyrights, trademarks, patents, and digital rights management. Ethics topics include proper use of copyrighted material, information resources, and addressing issues like digital manipulation. Health sections explore physical risks from improper ergonomics as well as emotional stressors. Access barriers like the digital divide within and between countries are also examined.
The document instructs to open the BUSES.CSV file, calculate the number of minutes late for each bus journey that was late, and calculate the total number of passenger minutes late by multiplying the number of passengers by the minutes late for that journey. The spreadsheet is then to be saved.
This document discusses ethics and laws related to computers and software. It covers several topics:
1. Ethics for computer users and professionals regarding software privacy, unauthorized access, and following license agreements.
2. Indian law (IT Act 2000) that recognizes electronic transactions and records, and digital signatures. It also discusses security procedures.
3. Copyright law as it relates to software, defining that copying software without authorization is stealing intellectual property, and that purchasing software provides the right to use it under the license terms.
An overview of strategies to support literacy development, accessibility issues and web2 tools relevant to pupils with special educational needs and disabilities in mainstream schools.
The document discusses how cinema spectators associate sounds and images that do not originate from the same source. It argues that spectators accept the "audio-visual deal" by which they forget sounds and images have separate sources and perceive them as part of a single fictional entity. This is achieved through perceptual mechanisms and information, like synchronizing sounds with images, dynamic properties, and expectations formed by experiences with cinema. Understanding fiction and that sounds/images have different technological sources allows comprehending ironic combinations in films.
The document discusses the histories and philosophies of open source software, free software, and proprietary software. It describes how the free software movement began in the 1950s with early computer programmers freely sharing software. This grew into movements led by the Free Software Foundation and Open Source Initiative, which have the shared goal of making source code openly available but different approaches and values. Major open source operating systems like Linux and Android have now largely replaced proprietary systems like Windows due to their collaborative and adaptable development models.
Ecoonomics 2nd sem computer application project.docxGorav Gopal Singh
Gorav Gopal Singh submitted a research report on computer applications in economic analysis to fulfill requirements for an MA in Economics. The report includes three chapters that discuss the history of computers and their evolution through five generations, hardware and software components, using MS Office for data analysis, researching FDI in India's retail sector, and conducting a survey and writing a report. Singh thanks several people who provided guidance and support during the project.
History of Management Information SystemEmil Mesina
Management Information Systems (MIS) have evolved through 5 eras: (1) Mainframe computing in the 1960s; (2) Personal computers in the 1970s and 1980s; (3) Client/server networks and the creation of the World Wide Web in the 1980s and 1990s; (4) Enterprise computing systems of the 1990s; and (5) Cloud computing today. The Department of Education in the Philippines has transitioned from paper-based data collection, to early computerized systems in the 1970s-1980s, to a fully computerized management information system today.
Computer application appreciation unit iAndreaTugwell
This document provides an overview of computers including their history, components, functions, advantages, disadvantages and impact on society. It discusses the three generations of computers from the first generation in 1937 using vacuum tubes to today's third generation using integrated circuits. The functions of computers including input, output, storage, and processing are described. Advantages include speed, accuracy and cost effectiveness while disadvantages include viruses, online crimes and reduced job opportunities. The widespread adoption of computers has changed how we shop, communicate and access information.
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Management information system (MIS) is a computer-based system that provides managers with tools to organize, evaluate, and efficiently run their departments. It provides information needed to effectively manage organizations. As businesses and transactions grew more complex, managers needed a single system with all information to make decisions. MIS involves people, technology, and information working together toward organizational objectives. There have been five eras of MIS evolution corresponding to computing technology advances from mainframes to personal computers to client/server networks to enterprise computing and now cloud computing.
This document provides an overview of the history and evolution of computer hardware from early mechanical calculators to modern electronic computers. It describes the major types of computer systems including microcomputers, midrange systems, mainframes, and supercomputers. It also outlines various input, output, and storage technologies such as keyboards, mice, displays, memory chips, magnetic disks, tapes, and optical disks. The document is intended to help readers understand computer hardware components and select appropriate systems and peripherals for different business needs.
This document provides a history of computers from the earliest mechanical devices through modern electronic systems. It begins with a classification of computers by technology, capacity, operating principle, and other factors. The evolution of computers is then discussed in five stages: the mechanical era from 1623-1945 involving early calculators and analytical engines; the first electronic computers from 1937-1953 using vacuum tubes; the second generation from 1954-1962 utilizing transistors; the third generation from 1963-1972 featuring integrated circuits; and modern supercomputers. Key individuals and their inventions are highlighted throughout the development of computer technology.
This document provides a multiple choice quiz on information systems topics. It contains 50 questions related to computer hardware, computer software, and management information systems concepts. The questions are written by Hassan Samoon for an MBA class and include the answers. The document serves as a study guide for students to test their knowledge of key terms and ideas in information systems.
The document discusses key points from a lecture and chapter on computers and information systems. It covers the basic components and functions of a computer including hardware, software, input/output devices, storage, and how computers process information. The document also discusses different types of computer systems, applications, and how computers have impacted society.
MIS Lecture Tribhuvan University Lecture | Managing the Digital Firm Book b...Ram Sharma
MIS Lecture - Tribhuvan University
Lecturer : Ram Sharma Bhattarai
BBA 3th Semester | TU University, Palpa
Reference : Management Information Systems: Managing the Digital Firm
Book by Jane Laudon and Kenneth C. Laudon
The document discusses a module on the evolution and types of computers. It covers five activities: 1) explaining the evolution of computer generations from vacuum tubes to integrated circuits; 2) matching processor types to generations; 3) introducing computer types like supercomputers, mainframes, and microcomputers; 4) labeling a diagram of computer types; and 5) researching computer types. The module aims to explain the evolution of computer generations and types of processors used.
This document defines information systems and their components. It discusses how information systems have developed over time from the introduction of punch cards to today's cloud computing systems. It identifies the key components of information systems as people, hardware, software, data, input, processing, output, storage and feedback. It also describes different types of information systems like transaction processing systems, decision support systems, executive information systems and management information systems. Finally, it outlines the five eras in the evolution of management information systems from mainframes to personal computers to today's cloud computing models.
This document defines information systems and their components. It discusses how information systems have developed over time from the introduction of punch cards to today's cloud computing systems. It identifies the key components of information systems as people, hardware, software, data, input, processing, output, storage and feedback. It also describes different types of information systems like transaction processing systems, decision support systems, executive information systems and management information systems. Finally, it outlines the five eras in the evolution of management information systems from mainframes to personal computers to today's cloud computing models.
Input devices allow users to control computers and provide data. Examples include keyboards, mice, cameras, and joysticks. Output devices communicate the results of processing to users in a human-readable form, such as printers, projectors, and headphones.
This chapter discusses the history of data from ancient times to modern databases. It explains how humankind has been interested in data for at least 12,000 years, initially using simple methods like pebbles to track flocks. Technological developments helped process and store data more efficiently over time, from calculating devices to punched cards to magnetic storage media. Today, data has become a crucial corporate resource, and database management systems are used to store and access massive volumes of data to gain competitive advantages.
This chapter discusses intellectual property rights, ethics, health issues related to computer use, access to technology, and environmental impacts. It covers various types of intellectual property including copyrights, trademarks, patents, and digital rights management. Ethics topics include proper use of copyrighted material, information resources, and addressing issues like digital manipulation. Health sections explore physical risks from improper ergonomics as well as emotional stressors. Access barriers like the digital divide within and between countries are also examined.
The document instructs to open the BUSES.CSV file, calculate the number of minutes late for each bus journey that was late, and calculate the total number of passenger minutes late by multiplying the number of passengers by the minutes late for that journey. The spreadsheet is then to be saved.
This document discusses ethics and laws related to computers and software. It covers several topics:
1. Ethics for computer users and professionals regarding software privacy, unauthorized access, and following license agreements.
2. Indian law (IT Act 2000) that recognizes electronic transactions and records, and digital signatures. It also discusses security procedures.
3. Copyright law as it relates to software, defining that copying software without authorization is stealing intellectual property, and that purchasing software provides the right to use it under the license terms.
An overview of strategies to support literacy development, accessibility issues and web2 tools relevant to pupils with special educational needs and disabilities in mainstream schools.
The document discusses how cinema spectators associate sounds and images that do not originate from the same source. It argues that spectators accept the "audio-visual deal" by which they forget sounds and images have separate sources and perceive them as part of a single fictional entity. This is achieved through perceptual mechanisms and information, like synchronizing sounds with images, dynamic properties, and expectations formed by experiences with cinema. Understanding fiction and that sounds/images have different technological sources allows comprehending ironic combinations in films.
The document discusses the histories and philosophies of open source software, free software, and proprietary software. It describes how the free software movement began in the 1950s with early computer programmers freely sharing software. This grew into movements led by the Free Software Foundation and Open Source Initiative, which have the shared goal of making source code openly available but different approaches and values. Major open source operating systems like Linux and Android have now largely replaced proprietary systems like Windows due to their collaborative and adaptable development models.
This document discusses how computers create sounds and images. It explains that images are made up of pixels that display combinations of red, green, and blue. Binary numbers are translated into pixel color combinations to form an image. More bits per pixel allows for more colors. Sound is converted from analog to digital for computers to understand, and sound cards help with this conversion process. The quality of sound recordings depends on how much information is recorded about each point in the sound track.
System analysis and design involves developing a complete information system including hardware, software, people, procedures, and data. System analysis is the process of understanding the current system by collecting data, analyzing processes, and identifying problems and improvements. System design develops the new system based on requirements and analysis, proceeding from general design to detailed design. Tools like flowcharts, data flow diagrams, and structured English are used to describe the system design.
This document discusses proprietary software and different types of software licenses. It defines proprietary software as software whose rights are owned by an individual or business. It then explains five types of software licenses: shrink-wrap licenses included in software packages, single-user licenses that limit use to one person, multiple-user licenses that allow use by multiple people on a network, concurrent-use licenses that allow a certain number of copies to be used simultaneously, and site licenses that allow unlimited copying of software for use at a single site.
A&D - Introduction to Analysis & Design of Information Systemvinay arora
This document provides an overview of analysis and design of information systems. It discusses key concepts like the definition of a system and information system. It also summarizes different approaches to system development like the system development life cycle method, structured analysis development method, and systems prototype method. The document outlines the steps in system analysis and design such as determining system requirements, feasibility analysis, prototyping, evaluation and references key textbooks on the topic.
1. The lecture discusses ethics and netiquette when using information and communication technologies.
2. It outlines basic principles for social conduct online such as respecting others' privacy, intellectual property, and time.
3. The lecture also discusses avoiding harmful, unethical, or illegal behaviors like spreading misinformation or abusing positions of power or trust.
This document discusses local area networks (LANs) and the use of fiber optic cables in LAN architecture. It describes different LAN topologies including bus, ring, star and their implementations. It compares fiber optic cables favorably to copper cables, noting fiber's higher bandwidth, reliability and longer transmission distances. The document also discusses specific ring-based standards like FDDI that use fiber optic cables to interconnect lower-speed LANs or mainframe computers at speeds up to 100 Mbps. Overall, the document promotes the use of fiber optic cables in LANs for their benefits over copper in supporting growing bandwidth demands.
This document outlines the stage 1 analysis process, which includes conducting a feasibility study, determining the nature and scope of the problem, gathering data through documents, interviews, questionnaires, and observation, and analyzing the data to define system requirements. The analysis aims to understand how the current system works and establish a basis for documentation using tools like data flow diagrams and decision tables. Finally, a report is provided to management summarizing the findings and recommending next steps.
This document discusses the history and functions of private branch exchanges (PBXs). It begins with an introduction to PBXs, which allow switching of telephone calls within an organization. It then covers the five generations of PBX technology from analog to digital and fiber optic networks. The core functions of a PBX are to provide switched communications within a building and act as an interface to public telephone networks. PBXs can transmit both voice and data and support networking between multiple PBX systems. The advantages of PBXs include flexibility and access to data networks, while disadvantages include limited bandwidth and potential issues if the PBX fails.
Free and Open Source Software, Licenses, Technologies, Scientific Publication...Frederik Questier
This document discusses a workshop presentation on free and open source software licenses. The presentation covers several topics related to software licenses including: the history and balance of copyright law; issues with digital rights management and trusted computing; examples of restrictive software policies; and the benefits of free and open source software such as legal protections, cost savings, and opportunities for collaboration and innovation. The presentation encourages participants to think critically about software restrictions and dogmas, and to consider more open alternatives.
This document discusses various methods for collecting data during the system analysis stage of a project: interviews, questionnaires, observation, record searching, and document analysis. It provides details on planning and conducting interviews, designing questionnaires, performing structured observation, using record searching to obtain quantitative information, and analyzing documents to understand how information is organized in a system. The goal of collecting data is to understand the current system, identify problems and user needs, and gather facts to help develop solutions.
Information systems analysis and design is a method used by companies to create and maintain information systems that perform basic business functions. It involves developing or acquiring application software and training employees to use it, with the goal of improving organizational systems. Key components of information systems include application software designed to support specific functions, as well as other system components collectively called computer-based information systems. Methodologies, techniques, and tools help analysts develop information systems through a sequence of structured steps.
This document discusses different types of computer hardware. It describes personal computers, laptops, mobile phones, tablets, and wearable devices. It explains how these systems have evolved over time as technology has advanced, with smartphones and mobile devices now dominating the market. The document also discusses integrated computing and how technology is being built into everyday products like homes, vehicles and appliances.
The document discusses the fundamentals of computing, including:
- Computers are electronic machines that accept data as input, process it, and provide information output. They have both hardware and software components.
- Computer hardware refers to physical components while software refers to instruction programs. Data becomes information after processing.
- Computers have evolved through generations from vacuum tubes to integrated circuits and now microprocessors. They can be classified by size, function, and data type as analog, digital, hybrid, or according to application.
This document provides information about Digitech Hardware Academy, including its address and contact details. It then outlines the table of contents for topics on basic computer programming, Microsoft Office programs, what is the internet, and MS-DOS. The document also includes sections about the definition of a computer, classifications of computers by size and generation, components of the computer system, and applications of computers.
There are three main components of a computer system:
i) Input/Output Unit which allows the user to interact with the computer through input and output devices.
ii) Central Processing Unit (CPU) which controls and coordinates the operations of the computer by processing input data.
iii) Memory Unit which stores data, instructions, and output during processing.
The document provides details on these three components, describing the input, processing, and output functions of the computer system. It also discusses different types of computers based on size (microcomputers, minicomputers, mainframe computers, and supercomputers) and components of computer hardware.
There are three main components of a computer system:
i) Input/Output Unit which allows the user to interact with the computer through input and output devices.
ii) Central Processing Unit (CPU) which controls and coordinates the operations of the computer by processing input data.
iii) Memory Unit which stores data, instructions, and output during processing.
The document provides details on these three components, describing the input, processing, and output functions of the computer system. It also discusses different types of computers based on size (microcomputers, minicomputers, mainframe computers, and supercomputers) and components of computer hardware.
A computer is a programmable machine that receives input, processes data, stores information, and outputs results. It consists of hardware and software. The hardware includes processing units, memory, and input/output devices. Software provides instructions that tell the computer what to do. Computers were initially developed for calculations but now process various media like text, images, and video. Key characteristics of computers include speed, accuracy, storage capacity, reliability, versatility, and ability to share resources. Computers are widely used in science, education, medicine, engineering, entertainment, communication, business, publishing, banking, and industries. While powerful, computers are limited by needing programming and inputs from humans to function. Generations of computers saw transitions from
A computer is a device that automatically processes data according to a set of instructions to provide information. It consists of both physical hardware and intangible software. Computers can be classified based on their representation of numbers (digital, analog, hybrid), degree of specialization (general purpose, special purpose), and type of application (scientific, business). There are several types of computers including mainframes, minicomputers, microcomputers (personal computers), and supercomputers. Computers provide benefits such as increased accuracy, ability to process larger volumes of data faster, and freeing up the workforce to perform more skilled tasks by automating routine data processing work.
The document discusses several topics related to computers and information technology:
1) It summarizes the goals of the Fifth Generation Computer Systems project in Japan to create a new "fifth generation" computer using parallel processing.
2) It explains what an Arithmetic Logic Unit (ALU) is and its important role in the central processing unit (CPU) of performing arithmetic and logical operations.
3) It distinguishes between application software and system software, with application software designed for specific tasks and system software involved in integrating computer capabilities.
Chapter one-Introduction to Computer.pptxgadisaAdamu
This document provides an outline for a course on computer applications in management. It covers topics like the definition of a computer, how computers work, comparisons between computers and humans, the importance and uses of computers. It discusses the advantages and disadvantages of computers, different computer generations and classifications. It also defines key terms like data, information and knowledge. Overall, the document provides a high-level overview of introductory computer concepts for a management course.
PC (Personal Computer)
A PC can be defined as a small, relatively inexpensive computer designed for an individual
user. PCs are based on the microprocessor technology that enables manufacturers to put an
entire CPU on one chip. Businesses use personal
computers for word processing, accounting,
desktop publishing, and for running spreadsheet
and database management applications. At home,
the most popular use for personal computers is
playing games and surfing the Internet.
Workstation:
Workstation is a computer used for engineering applications (CAD/CAM), desktop publishing,
software development, and other such types of applications which require a moderate amount
of computing power and relatively high quality graphics capabilities.
Minicomputer
It is a midsize multi-processing system capable of supporting up to 250 users simultaneously.
Mainframe
Mainframe is very large in size and is an expensive computer capable of supporting hundreds
or even thousands of users simultaneously. Mainframe executes many programs concurrently
and supports many simultaneous execution of programs.
Supercomputer
Supercomputers are one of the fastest computers currently available. Supercomputers are
very expensive and are employed for specialized applications that require immense amount
of mathematical calculations (number crunching).
This document provides an introduction to information technology concepts. It discusses basic computer components like hardware, software, and networks. It defines key terms related to IT like data, information, programs, and computer types. The document also summarizes the basic functions of computers in processing input data and producing output information. It examines the components that make up a computer system and common peripheral devices.
INFORMATION TECHNOLOGY,
INTERNET AND YOU
Topics to be covered:
Information Systems
People
Software
Hardware
Data
Connectivity and the Mobile Internet
Information System
An information system has several parts:
People
Procedure
Software
Hardware
Data
Internet
(continued…)
People: It is easy to overlook people as one of the parts of an
information system. Yet this is what personal computers are all about—
making people, end users like you, more productive.
(continued…)
Procedures: The rules or guidelines
for people to follow when using
software, hardware, and data are
procedures. These procedures are
typically documented in manuals
written by computer specialists.
Software and hardware
manufacturers provide manuals with
their products. These manuals are
provided in either printed or electronic
form.
(continued…)
Software: A program consists of the step-by-step instructions that tell
the computer how to do its work. Software is another name for a
program or programs. The purpose of software is to convert data
(unprocessed facts) into information (processed facts).
(continued…)
Hardware: The equipment that processes the data to create information
is called hardware. It includes smartphones, tablets, keyboards, mice,
displays, system units, and other devices. Hardware is controlled by
software.
(continued…)
Data: The raw, unprocessed facts, including text, numbers, images,
and sounds, are called data. Processed data yields information.
(continued…)
Internet: Almost all information systems provide a way to connect to
other people and computers, typically using the Internet. This
connectivity greatly expands the capability and usefulness of
information systems.
Stop: Let us check our progress
People
People are surely the most important part of any information system.
Our lives are touched every day by computers and information systems.
Many times the contact is direct and obvious, such as when we create
documents using a word processing program or when we connect to the
Internet.
Other times, the contact is not as obvious.
Software
There are two major kinds of software: system software and
application software.
The user interacts primarily with application software. System software
enables the application software to interact with the computer hardware.
System software is “background” software that helps the computer
manage its own internal resources.
(continued…)
System software is not a single program. Rather, it is a collection of
programs, including the following:
Operating Systems
Utilities
(continued…)
Operating systems are programs that coordinate computer resources,
provide an interface between users and the computer, and run
applications. Smartphones, tablets, and many other mobile devices use
embedded operating systems, also known as real-time operating
systems (RTOS).
Information Technology for Managers - BasicsIsha Joshi
This document provides an introduction to computers including definitions of key terms like data, information, hardware, and software. It discusses the history and generations of computers from Charles Babbage to the modern era. It describes the characteristics, advantages, disadvantages, types (microcomputer, mainframe, etc.), architecture, and functions of computers. The document concludes with multiple choice questions.
This document provides an introduction to computer science, covering various topics about computers. It discusses that hardware refers to the physical components of a computer that can be seen and touched, including input, processing, output, and storage devices. It also explains that software includes programs that control computer operations as well as specific applications. The document classifies computers based on their mode of operation, size, and generation. It provides details about analog, digital, and hybrid computers as well as supercomputers, mainframes, minicomputers, and microcomputers. The five generations of computers are outlined based on the technology used, from vacuum tubes to integrated circuits.
This document provides an introduction to computer science, covering key topics such as hardware, software, and the evolution of computers through different generations. It discusses how hardware and software work together, and defines different types of software including system software, application software, and utility software. The document also covers computer classifications based on mode of operation, size, and generation. The five generations of computers - from first to fifth - are outlined, describing the underlying technologies that defined each generation from vacuum tubes to today's artificial intelligence applications.
This document provides an introduction to computer science, covering key topics such as hardware, software, and the evolution of computers through different generations. It discusses how hardware and software work together, and defines different types of software including system software, application software, and utility software. The document also covers computer classifications based on mode of operation, size, and generation. The five generations of computers - from first to fifth - are outlined, describing the underlying technologies that defined each generation from vacuum tubes to today's artificial intelligence applications.
Computers can be categorized into five generations based on the underlying technology used. The first generation used vacuum tubes, the second used transistors, the third used integrated circuits, the fourth used microprocessors, and the fifth generation and beyond involves artificial intelligence. Each generation brought improvements in size, speed, reliability and capabilities. Computers have evolved from room-sized machines capable of solving one problem at a time, to devices that can fit in the palm of the hand and have vastly more processing power.
This document provides an overview of an advanced computer architecture course. It discusses the history and evolution of computers from the abacus to modern systems. It classifies computers into mainframe, minicomputers, microcomputers, and supercomputers. The document outlines the basic components and functions of a computer system, including input, storage, processing, and output. It describes the central processing unit and various memory types like RAM, ROM, and permanent storage. The reading materials and course objectives are also mentioned.
The mouse is a device that controls a pointer on the screen.
2. What is the function of the CPU?
A) To control all operations and components of the computer.
B) To display information on the monitor.
C) To store programs and data.
D) To allow input and output of data.
3. Name two types of storage devices in a computer.
4. What is the full meaning of CPU?
5. Differentiate between RAM and ROM.
Computer Applications In Business, would help you in revising the different concepts discussed in the book. It would help you in assessing the knowledge you get after reading this book. The quiz contains certain questions which you might come across during your examination. It would enable you to judge the concepts you learned from the book by adopting a logical approach. This quiz includes different types of questions, such as multiple choice questions, true-false, and fill in the blanks.
Similar to Information and Communications Technology (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
2. •What is a computer
•Types of computers
•Components of a computer system
05/31/13 06:19 Information and Communications Technology 2
3. What is A Computer
A computer is a general purpose device
which can be programmed to carry out a
finite set of arithmetic or logical
operations. Since a sequence of
operations can be readily changed, the
computer can solve more than one kind
of problem.
05/31/13 06:19 Information and Communications Technology 3
4. What is A Computer
They use digital circuits and are
designed to operate on two states,
namely bits 0 and 1. They are
analogous to states ON and OFF. Data
on these computers is represented as a
series of 0s and 1s.
05/31/13 06:19 Information and Communications Technology 4
5. Types of Computers
Computers can be generally classified by
size and power as follows, though there is
considerable overlap:
1.Personal computer: A small, single-user
computer based on a microprocessor.
Examples are: Laptop, iPad, iPhone,
Desktop
05/31/13 06:19 Information and Communications Technology 5
6. Types of Computers
2. Workstation: A powerful, single-user
computer. A workstation is like a
personal computer, but it has a more
powerful microprocessor and, in
general, a higher-quality monitor.
05/31/13 06:19 Information and Communications Technology 6
7. Types of Computers
3. Minicomputer: A multi-user computer
capable of supporting up to hundreds of
users simultaneously.
4. Mainframe: A powerful multi-user
computer capable of supporting many
hundreds or thousands of users
simultaneously.
05/31/13 06:19 Information and Communications Technology 7
8. Types of Computers
5. Supercomputer: An extremely fast
computer that can perform hundreds of
millions of instructions per second.
05/31/13 06:19 Information and Communications Technology 8
9. Types of PCs
Desktops: A desktop is intended to be
used on a single location. The spare
parts of a desktop computer are readily
available at relatively lower costs. Power
consumption is not as critical as that in
laptops. Desktops are widely popular for
daily use in the workplace and
households.
05/31/13 06:19 Information and Communications Technology 9
10. Types of PCs
Laptops: Similar in operation to
desktops, laptop computers are
miniaturized and optimized for mobile
use. Laptops run on a single battery or
an external adapter that charges the
computer batteries.
05/31/13 06:19 Information and Communications Technology 10
11. Types of PCs
Laptops are enabled with a built-in
keyboard, touch pad acting as a mouse
and a liquid crystal display. Their
portability and capacity to operate on
battery power have proven to be of great
help to mobile users.
05/31/13 06:19 Information and Communications Technology 11
12. Types of PCs
Netbooks: They fall in the category of
laptops, but are inexpensive and
relatively smaller in size. They had a
smaller feature set and lesser capacities
in comparison to regular laptops, at the
time they came into the market.
05/31/13 06:19 Information and Communications Technology 12
13. Types of PCs
Personal Digital Assistants (PDAs): It is
a handheld computer and popularly
known as a palmtop. It has a touch
screen and a memory card for storage
of data. PDAs can also be used as
portable audio players, web browsers
and smartphones.
05/31/13 06:19 Information and Communications Technology 13
14. Types of PCs
Most of them can access the Internet by
means of Bluetooth or Wi-Fi
communication.
05/31/13 06:19 Information and Communications Technology 14
15. Types of PCs
Wearable Computers: A record-setting
step in the evolution of computers was
the creation of wearable computers.
These computers can be worn on the
body and are often used in the study of
behavior modeling and human health.
05/31/13 06:19 Information and Communications Technology 15
16. Types of PCs
Wearable computers do not have to be
turned on and off and remain in
operation without user intervention.
05/31/13 06:19 Information and Communications Technology 16
17. Types of PCs
Tablet Computers: Tablets are mobile
computers that are very handy to use.
They use the touch screen technology.
Tablets come with an onscreen
keyboard or use a stylus or a digital pen.
Apple's iPad redefined the class of
tablet computers.
05/31/13 06:19 Information and Communications Technology 17
18. Types of PCs
Tower computers: The term refers to a
computer in which the power supply,
motherboard, and mass storage devices
are stacked on top of each other in a
cabinet. This is in contrast to desktop
models, in which these components are
housed in a more compact box.
05/31/13 06:19 Information and Communications Technology 18
19. Types of PCs
The main advantage of tower models is
that there are fewer space constraints,
which makes installation of additional
storage devices easier.
05/31/13 06:19 Information and Communications Technology 19
21. Hardware
Personal computer hardware are the
component devices that are the building
blocks of personal computers. These
are typically installed into a computer
case, or attached to it by a cable or
through a port. In the latter case, they
are also referred to as peripherals.
05/31/13 06:19 Information and Communications Technology 21
22. Hardware
05/31/13 06:19 Information and Communications Technology 22
1. Monitor
2. Motherboard
3. CPU
4. RAM
5. Expansion
Cards
6. Power Supply
7. Optical Disk Drive
8. Hard Disk Drive
9. Keyboard
10. Mouse
23. Input vs. Output
Input is the term denoting either an
entrance or changes which are inserted
into a system and which activate/modify
a process. Example, a trackpad sensing
a finger.
Output is the term denoting either an
exit or changes which exit a system and
which activate/modify a process.
Example, a screen displaying a photo
05/31/13 06:19 Information and Communications Technology 23
24. Software
Computer software, or just software, is a
collection of computer programs and
related data that provides the
instructions for telling a computer what
to do and how to do it. Software refers
to one or more computer programs and
data held in the storage of the computer.
05/31/13 06:19 Information and Communications Technology 24
25. Software
In other words, software is a set
of programs, procedures, algorithms and
its documentation concerned with the
operation of a data processing system.
05/31/13 06:19 Information and Communications Technology 25
26. Software
When software is stored in hardware
that cannot easily be modified (such as
BIOS ROM in an IBM PC compatible), it
is sometimes called "firmware" to
indicate that it falls into an uncertain
area somewhere between hardware and
software.
05/31/13 06:19 Information and Communications Technology 26
27. Operating System vs.
Application Software
System software is computer
software designed to operate
the computer hardware to provide basic
functionality and to provide a platform
for running application software.
05/31/13 06:19 Information and Communications Technology 27
28. Operating System vs.
Application Software
System software includes device
drivers, operating
systems, servers, utilities, and window
systems.
05/31/13 06:19 Information and Communications Technology 28
29. Operating System vs.
Application Software
Application Software is a set of
programs that allows the computer to
perform a specific data processing job
for the user. It is a broad category, and
encompasses software of many kinds,
including the internet browser being
used to display a page.
05/31/13 06:19 Information and Communications Technology 29
30. List of Operating Systems
Operating Systems
Unix and BSD UNIX System V, IBM
AIX, HP-
UX, Solaris (SunOS), IRIX
, (too much to list all BSD
OSs)
GNU/Linux (too much to be listed)
Microsoft Windows
Windows 95, Windows
98, Windows
NT, Windows
2000, Windows
Me, Windows
XP, Windows
Vista, Windows 7,
Windows 8
DOS 86-DOS (QDOS), PC-
DOS, MS-DOS, DR-
DOS, FreeDOS
05/31/13 06:19 Information and Communications Technology 30
31. List of Operating Systems
OS
Mac OS Mac OS classic, Mac
OS X
Embedded and real-
time
(too much to be listed)
Experimental Amoeba, Oberon/Blue
bottle, Plan 9 from Bell
Labs
05/31/13 06:19 Information and Communications Technology 31
32. Picture of Windows 8
05/31/13 06:19 Information and Communications Technology 32
33. Picture of Mac OS X
05/31/13 06:19 Information and Communications Technology 33
34. Peopleware
Peopleware is a term used to refer to
one of the three core aspects of
computer technology, the other two
being hardware and software.
05/31/13 06:19 Information and Communications Technology 34
35. Peopleware
Peopleware can refer to anything that
has to do with the role of people in the
development or use of computer
software and hardware systems,
including such issues as developer
productivity, teamwork, group dynamics,
the psychology of programming, project
management, organizational factors
05/31/13 06:19 Information and Communications Technology 35
36. Peopleware
human interface design, and human-
machine-interaction. Example, a
programmer
05/31/13 06:19 Information and Communications Technology 36
38. Binary Code
A binary code is a way of representing
text or computer processor instructions
by the use of the binary number
system's two-binary digits 0 and 1. This
is accomplished by assigning a bit string
to each particular symbol or instruction.
05/31/13 06:19 Information and Communications Technology 38
39. Binary Code
For example, a binary string of eight
binary digits (bits) can represent any of
256 possible values and can therefore
correspond to a variety of different
symbols, letters or instructions.
05/31/13 06:19 Information and Communications Technology 39
40. Binary Code
Those methods may be fixed-width or
variable-width. In a fixed-width binary
code, each letter, digit, or other
character, is represented by a bit string
of the same length; that bit string,
interpreted as a binary number, is
usually displayed in code tables in octal,
decimal or hexadecimal notation.
05/31/13 06:19 Information and Communications Technology 40
41. • ASCII
• Binary-coded Decimal
05/31/13 06:19 Information and Communications Technology 41
42. ASCII Code
The American Standard Code
Information Interchange, or ASCII, uses
a 7 bit binary code to represent text
within a computer, communications
equipment, and other devices that use
text. Each letter or symbol is assigned to
a number from 0 to 127.
05/31/13 06:19 Information and Communications Technology 42
43. ASCII Code
For example, in the 8-bit ASCII code, a
lowercase "a" is represented by the bit
string 01100001.
05/31/13 06:19 Information and Communications Technology 43
44. Binary-coded Decimal
Binary-coded decimal, or BCD, is a
binary encoded representation of integer
values that uses a 4-bit nibble to encode
decimal digits.
05/31/13 06:19 Information and Communications Technology 44
45. Binary-coded Decimal
Four binary bits can encode up to 16
distinct values; but, in BCD-encoded
numbers, only the first ten values in
each nibble are legal, and encode the
decimal digits zero, through nine.
05/31/13 06:19 Information and Communications Technology 45
46. Binary-coded Decimal
The remaining six values are illegal, and
may cause either a machine exception
or unspecified behavior, depending on
the computer implementation of BCD
arithmetic.
05/31/13 06:19 Information and Communications Technology 46
47. Decimal Code
The decimal numeral system (also
called base ten or occasionally denary)
has ten as its base. It is the numerical
base most widely used by modern
civilizations.
05/31/13 06:19 Information and Communications Technology 47
48. Conversion of Binary to
Decimal
Positional notation method
1.For this example, let's convert the binary
number 110112 to decimal. List the powers
of two from right to left. Start at 20
,
evaluating it as "1". Increment the
exponent by one for each power.
05/31/13 06:19 Information and Communications Technology 48
49. Conversion of Binary to
Decimal
1. (cont.) Stop when the amount of
elements in the list is equal to the
amount of digits in the binary number.
The example number, 10011011, has
eight digits, so the list, to eight
elements, would look like this: 128, 64,
32, 16, 8, 4, 2, 1
2. Write first the binary number below the
list.
05/31/13 06:19 Information and Communications Technology 49
50. Conversion of Binary to
Decimal
3. Draw lines, starting from the right,
connecting each consecutive digit of
the binary number to the power of two
that is next in the list above it. Begin by
drawing a line from the first digit of the
binary number to the first power of two
in the list above it.
05/31/13 06:19 Information and Communications Technology 50
51. Conversion of Binary to
Decimal
3. (cont.)Then, draw a line from the
second digit of the binary number to the
second power of two in the list.
Continue connecting each digit with its
corresponding power of two.
05/31/13 06:19 Information and Communications Technology 51
52. Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 52
53. Conversion of Binary to
Decimal
4. Move through each digit of the binary
number. If the digit is a 1, write its
corresponding power of two below the
line, under the digit. If the digit is a 0,
write a 0 below the line, under the digit.
05/31/13 06:19 Information and Communications Technology 53
54. Conversion of Binary to
Decimal
5. Add the numbers written below the line.
The sum should be 155. This is the
decimal equivalent of the binary
number 10011011. Or, written with
base subscripts:15510
05/31/13 06:19 Information and Communications Technology 54
55. Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 55
56. Conversion of Binary to
Decimal
Doubling Method
1.This method does not use powers. As
such, it is simpler for converting large
numbers in your head because you only
need to keep track of a subtotal.
2.Start with the left-most digit of the given
binary number.
05/31/13 06:19 Information and Communications Technology 56
57. Conversion of Binary to
Decimal
2. (cont.) For each digit as you move to
the right, double your previous total and
add the current digit. For example, to
convert 10110012 to decimal, we take
the following steps:
3. 1011001 → 0 x 2 + 1 = 1
4. 1011001 → 1 x 2 + 0 = 2
5. 1011001 → 2 x 2 + 1 = 5
6. 1011001 → 5 x 2 + 1 = 11
05/31/13 06:19 Information and Communications Technology 57
58. Conversion of Binary to
Decimal
7. 1011001 → 11 x 2 + 0 = 22
8. 1011001 → 22 x 2 + 0 = 44
9. 1011001 → 44 x 2 + 1 = 8910
10. Like the positional notation method, this
method can be modified to convert from
any base to decimal. Doubling is used
because the given number is of base 2.
05/31/13 06:19 Information and Communications Technology 58
59. Conversion of Binary to
Decimal
10. (cont.)If the given number is of a
different base, replace the 2 in the
method with the base of the given
number. For example, if the given
number is in base 37, you would
replace the *2 with *37. The final result
will always be in decimal (base 10).
05/31/13 06:19 Information and Communications Technology 59
60. Conversion of Binary to
Decimal
05/31/13 06:19 Information and Communications Technology 60
61. Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 61
Comparison with descending powers of
two and subtraction
1.List the powers of two in a "base 2 table"
from right to left. Start at 20, evaluating it
as "1". Increment the exponent by one for
each power. The list, to ten elements,
would look like this: 512, 256, 128, 64, 32,
16, 8, 4, 2, 1
62. Conversion of Decimal to
Binary
2. For this example, let's convert the
decimal number 15610 to binary. What is
the greatest power of two that will fit
into 156? Since 128 fits, write a 1 for
the leftmost binary digit, and subtract
128 from your decimal number, 156.
You now have 28.
05/31/13 06:19 Information and Communications Technology 62
63. Conversion of Decimal to
Binary
3. Move to the next lower power of two.
Can 64 fit into 28? No, so write a 0 for
the next binary digit to the right.
4. Can 32 fit into 28? No, so write a 0.
5. Can 16 fit into 28? Yes, so write a 1,
and subtract 16 from 28. You now have
12.
05/31/13 06:19 Information and Communications Technology 63
64. Conversion of Decimal to
Binary
6. Can 8 fit into 12? Yes, so write a 1, and
subtract 8 from 12. You now have 4.
7. Can 4 (power of two) fit into 4 (working
decimal)? Yes, so write a 1, and
subtract 4 from 4. You have 0.
8. Can 2 fit into 0? No, so write a 0.
9. Can 1 fit into 0? No, so write a 0.
05/31/13 06:19 Information and Communications Technology 64
65. Conversion of Decimal to
Binary
10. Since there are no more powers of two
in the list, you are done. You should
have 10011100. This is the binary
equivalent of the decimal number 156.
Or, written with base subscripts: 15610 =
100111002
05/31/13 06:19 Information and Communications Technology 65
66. Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 66
67. Conversion of Decimal to
Binary
Short division by two with remainder
1.For this example, let's convert the
decimal number 15610 to binary. Write the
decimal number as the dividend inside an
upside-down "long division" symbol.
05/31/13 06:19 Information and Communications Technology 67
68. Conversion of Decimal to
Binary
1. (cont.)Write the base of the destination
system (in our case, "2" for binary) as
the divisor outside the curve of the
division symbol.
2. Write the integer answer (quotient)
under the long division symbol, and
write the remainder (0 or 1) to the right
of the dividend.
05/31/13 06:19 Information and Communications Technology 68
69. Conversion of Decimal to
Binary
3. Continue downwards, dividing each
new quotient by two and writing the
remainders to the right of each
dividend. Stop when the quotient is 0.
4. Starting with the bottom remainder,
read the sequence of remainders
upwards to the top. You should have
10011100.
05/31/13 06:19 Information and Communications Technology 69
70. Conversion of Decimal to
Binary
4. (cont.)This is the binary equivalent of
the decimal number 156. Or, written
with base subscripts: 15610 = 100111002.
This method can be modified to convert
from decimal to any base.
05/31/13 06:19 Information and Communications Technology 70
71. Conversion of Decimal to
Binary
4. (cont.) The divisor is 2 because the
desired destination is base 2. If the
desired destination is a different base,
replace the 2 in the method with the
desired base. For example, if the
desired destination is base 9, replace
the 2 with 9. The final result will then be
in the desired base.
05/31/13 06:19 Information and Communications Technology 71
72. Conversion of Decimal to
Binary
05/31/13 06:19 Information and Communications Technology 72
73. Hexadecimal Code (optional)
Hexadecimal (also base 16, or hex) is a
positional numeral system with a radix,
or base, of 16. It uses sixteen distinct
symbols, most often the symbols 0–9 to
represent values zero to nine, and A,B,
C,D,E,F (or alternatively a–f) to
represent values ten to fifteen.
05/31/13 06:19 Information and Communications Technology 73
74. Hexadecimal Code (optional)
For example, the hexadecimal number
2AF3 is equal, in decimal, to (2×163) +
(10×162) + (15×161) + (3×160), or
10995.
05/31/13 06:19 Information and Communications Technology 74
75. Hexadecimal Code (optional)
Each hexadecimal digit represents four
binary digits (bits), and the primary use
of hexadecimal notation is a human-
friendly representation of binary-coded
values in computing and digital
electronics.
05/31/13 06:19 Information and Communications Technology 75
76. Hexadecimal Code (optional)
One hexadecimal digit represents a
nibble, which is half of an octet (8 bits).
For example, byte values can range
from 0 to 255 (decimal), but may be
more conveniently represented as two
hexadecimal digits in the range 00 to
FF.
05/31/13 06:19 Information and Communications Technology 76
77. Hexadecimal Code (optional)
Hexadecimal is also commonly used to
represent computer memory addresses.
05/31/13 06:19 Information and Communications Technology 77
79. Flowchart
A flowchart is a type of diagram that
represents an algorithm or process,
showing the steps as boxes of various
kinds, and their order by connecting
these with arrows. This diagrammatic
representation can give a step-by-step
solution to a given problem.
05/31/13 06:19 Information and Communications Technology 79
80. Flowchart
Process operations are represented in
these boxes, and arrows connecting
them represent flow of control. Data
flows are not typically represented in a
flowchart, in contrast with data flow
diagrams; rather, they are implied by the
sequencing of operations.
05/31/13 06:19 Information and Communications Technology 80
81. Flowchart
Flowcharts are used in analyzing,
designing, documenting or managing a
process or program in various fields.
05/31/13 06:19 Information and Communications Technology 81
83. Algorithm
In mathematics and computer science,
an algorithm is a step-by-step procedure
for calculations. Algorithms are used
for calculation, data processing,
and automated reasoning.
05/31/13 06:19 Information and Communications Technology 83
84. Algorithm
More precisely, an algorithm is
an effective method expressed as
a finite list of well-defined instructions for
calculating a function.
05/31/13 06:19 Information and Communications Technology 84
85. Algorithm
Starting from an initial state and initial
input (perhaps empty), the instructions
describe a computation that,
when executed, will proceed through a
finite number of well-defined successive
states, eventually producing
“output” and terminating at a final ending
state.
05/31/13 06:19 Information and Communications Technology 85
86. Algorithm
The transition from one state to the next
is not necessarily deterministic; some
algorithms, known as randomized
algorithms, incorporate random input.
05/31/13 06:19 Information and Communications Technology 86