SlideShare a Scribd company logo
1 of 37
Assignment #1-Intro to
Computing
Ballarta, Kurt Angelo
Explain why it is essential to learn about computers today and
discuss several ways computers integrated into our business
and personal lives.
To better handle one
- In 2019, about 47 % of the world uses a computer and in U.S. nearly 90% of
households owns a computer. It’s widespread use is showing us how integral it is to
our daily lives. And with the computer’s significance to us, we must reciprocate
with strong knowledge about computers; to know the hardwares and softwares
with their do’s and don’ts, understanding computer market to get the most
efficiency with your budget and to avoid viruses and malware.
With advance knowledge about computer, you can lengthen it’s life expentancy,
maximize it’s efficiency and save some money for hardware/software repairs that
you can do.
Better assistance to task and shorten time consumption
-There are multiple applications also called productive tools
fitted to different task for example ms word for typing documents,
ms excel for data gathering, statistics and tallying and multiple
adobe photoshop apps for photo editing.
Multiple apps are used by businesses and jobs for greater work
efficiency, it is necessary for people to learn how to use these
apps to greater increase their chances for a higher wage and
comfort in the job market
The Technology Age
Even a menial job this days required basic computer literacy. Multiple productivity
tools is frequently used in office jobs, Experts now also relies on computers for
decision making and authentication, and of course the wifi− because of the pandemic
wifi has been our only connection to the continue our jobs and became the medium of
learning modality.
Define a computer and describe its
primary operations.
A computer is an electrical device that can be programmed to take input, process that
data, display the results, and store the data or results as needed. Since computers can be
programmed, they may be made to do any task that is specified in the instructions, or
"program," that are given to them. The tasks that a computer can perform are
determined by the programs utilized with it.
The four operations are input, processing, output, and
storage.
Input—entering data into the computer.
Processing—performing operations on the data.
Output—presenting the results.
Storage—saving data, programs, or output for future use.
The four operations
The user puts his
face in front of
camera for facial
recognition
The computer
processes the
face if it’s the
same from your
given data.
The computer
Will output
whether if your
face is
recognized or
not
Your data from
the transaction is
saved for future
references
List some important milestones in
computer evolution.
Precomputers and Early Computers (before approximately 1946)
Experts have come to the conclusion that ancient civilizations were capable of counting and computing
based on archeological discoveries including notched bones, knotted twine, and hieroglyphics. The
abacus was primarily employed as a tool for simple arithmetic computations and is often regarded as the
oldest known calculator. The slide rule, the mechanical calculator, and Dr. Herman Hollerith's Punch Card
Tabulating Machine and Sorter are some more early examples of computing equipment. The first
electromechanical machine that could read punch cards—special cards with holes punched into them to
represent data—was the latter device. The U.S. census of 1890 was processed using Hollerith's machine.
Instead of the decade it typically took to process the data manually, it was able to do the assignment in
only two and a half years. Consequently, it is thought that this is the first instance in which an information
processing system has successfully replaced a system that relies on paper and pens. In the end,
International Business Machines was Hollerith's corporation (IBM).
Hollerith Machine
First-Generation Computers (approximately 1946–1957)
• The original computers were huge, often occupying whole
rooms. Thousands of vacuum tubes, glass tubes that
resemble giant light bulbs, were used to power them. These
vacuum tubes required frequent replacement, used a lot of
electricity, and produced a lot of heat. Because they needed
to be physically rewired with cables in order to be
reprogrammed, first-generation computers could only solve
one problem at a time. This process typically took several
days (sometimes even weeks) to complete and another few
days to verify before the computer could be used. Input was
often accomplished using paper punch cards and paper tape,
while output was typically printed on paper.
• The world's first large-scale, general-purpose computer,
ENIAC, is seen in, and UNIVAC is one of the most notable
instances of a first-generation computer. ENIAC was created
during World War II to calculate artillery firing tables for the
U.S. Army, even though it was not finished until 1946. ENIAC
could perform the same calculations in less than two minutes
as opposed to the 40 hours needed by a person to manually
calculate the ideal parameters for a single weapon under a
single set of conditions.
• UNIVAC, released in 1951, was initially built for the U.S.
Census Bureau and was used to analyze votes in the 1952 U.S.
pres-idential election. Interestingly, its correct prediction of
an Eisenhower victory only 45 minutes after the polls closed
was not publicly aired because the results were not trusted.
However, UNIVAC became the first computer to be mass
produced for general commercial use.
FIRST-
GENERATION
COMPUTERS
John von Neumann with the IAS
Computer
Von Neumann persuaded IAS to
expand from doing theoretical
studies to building a real computer,
with meteorology calculations as a
key test of its scientific value. The
cylinders at the bottom are the
Williams-Kilburn memory tubes
Second-Generation Computers (approximately
1958–1963)
• The second generation of computers began when transistors—tiny devices made
of semiconductor materials that act like switches to open and close electronic
circuits—started replacing vacuum tubes. Transistors made second-generation
computers smaller, cheaper, more powerful, more energy efficient, and more
reliable than first-generation computers. Programs and data were typically input
on punched cards and magnetic tape, output on punched cards and paper
prints, and stored on magnetic tape (see Figure 1-7). Hard drives and
programming languages (such as FORTRAN and COBOL) were developed and
implemented in this generation.
SECOND-GENERATION COMPUTERSSecond-generation computers, such asthe IBM 1401
mainframe shown here,used transistors instead of vacuumtubes so they were
smaller, faster,and more reliable than 1st-generation computers.
Third-Generation Computers (approximately 1964–1970)
• The replacement of the transistor
with integrated circuits (ICs) marked
the beginning of the third
generation of computers.
Integrated circuits incorporate many
transistors and electronic circuits on
a single tiny silicon chip, allowing
third-generation computers to be
even smaller and more reliable than
computers in the earlier computer
generations. Instead of punch cards
and paper printouts, keyboards and
monitors were introduced for input
and output; hard drives were
typically used for storage.
Fourth-Generation Computers (approximately 1971–
present)
• A technological breakthrough in the early
1970s made it possible to place an increas-ing
number of transistors on a single chip. This
led to the invention of the micropro-cessor in
1971, which ushered in the fourth generation
of computers. In essence, a microprocessor
contains the core processing capabilities of
an entire computer on one single chip. The
original IBM PC and Apple Macintosh
computers, and most of today’s traditional
computers, fall into this category. Fourth-
generation computers typically use a
keyboard and mouse for input, a monitor and
printer for output, and hard drives, flash
memory media, and optical discs for storage.
This gen-eration also witnessed the
development of computer networks, wireless
technologies, and the Internet.
Fifth-Generation Computers (now and the future)
• Fifth-generation computers are most
commonly defined as those that are based
on artifi-cial intelligence, allowing them to
think, reason, and learn Some aspects of
fifth-generation computers—such as voice
and touch input and speech recognition—
are being used today. In the future, fifth-
generation computers are expected to be
constructed differently than they are
today, such as in the form of optical
computersthat process data using light
instead of electrons, tiny computers that
utilize nanotechnol-ogy, or as entire
general-purpose computers built into
desks, home appliances, and other
everyday devices.
Identify the major parts of a personal computer, including input,
processing, output, storage, and communications hardware.
Hardware are the external and internal devices and equipment that enable you to perform
major functions such as input, output, storage, communication, processing, and more.
Input Processing Output Communication Storage
Keyboard CPU Printer Modem Hard Drive
(SSD or HDD)
Mouse GPU Monitor Network
Adapter
USB
Microphone Headphones/h
eadsets
Router Flash memory
card
Scanner Data projector CD
Stylus Pen Speakers
Camera
Touchpad/screen
Fingerprint
Scanner
Word definitions
Input Devices
An input device is any piece of equipment
that is used to input data into the computer.
The input devices shown in Figure 1-9 are
a keyboard, mouse, and microphone.
Other common input devices include
scanners, digital cameras, digital pens and
styluses, touch pads and touch screens,
fingerprint readers, and gaming control-
lers.
Processing Devices
The main processing device for a
computer is the central process-ing unit
(CPU). The CPU is located inside the
system unit and performs the calculations
and comparisons needed for processing; it
also controls the computer’s operations.
For these reasons, the CPU is often
considered the “brain” of the computer.
Also involved in processing are various
types of memory that are located inside the
system unit and used to store data and
instructions while the CPU is working
with them, as well as additional processors
such as the graphics processing unit
(GPU).
Output Devices
An output device accepts processed data
from the computer and presents the
results to the user, most of the time on
the display screen (monitor), on paper
(via a printer), or through a speaker.
Other common output devices include
headphones and headsets(used to deliver
audio output to a single user) and data
projectors (used to project computer
images onto a projection screen).
Storage Devices
Storage devices (such as DVD drives and
flash memory card readers) are used to
store data on or access data from storage
media (such as DVD discs and flash
memory cards). Some storage hardware
(such as a hard drive or a USB flash
drive) includes both a storage device and
storage medium in a single piece of
hardware. Storage devices are used to
save data, program settings, or output for
future use; they can be installed inside the
computer, attached to the computer as an
external device, or accessed remotely
through a network or wireless connection.
Communications Devices
Communications devices allow users to communicate electronically with others and to
access remote information via the Internet or a home, school, or company computer
network. Communications hardware includes modems (used to connect a computer to
the Internet), network adapters (used to connect a computer to a computer network),
and routers (used to create a small network so a variety of devices can share an Internet
connection and data). A variety of modems and network adapters are available because
there are different types of Internet and network connections—a modem used to
connect to the Internet via a wireless connection and that also contains a built-in
wireless router is shown in Figure 1-9. Communications hardware and computer
networks are discussed in more detail in Chapter 7; connecting to the Internet is covered
in Chapter 8.
Define software and explain how it is
being use to instruct the computer what
to do
Software
The term software refers to the programs or instructions used to tell the computer hard-ware what to do.
Software is traditionally purchased on a CD or DVD or is downloaded from the Internet; in either case, the
software typically needs to be installed on a computer before it can be used. Software can also be run
directly from the Internet (via Web pages) without being installed on your computer; this is referred to as
cloud software, Web-based software, Software as a Service (SaaS), and cloud computing
Computers use two basic types of software: system software and application software.The differences
between these types of software are discussed next.
System Software
The programs that allow a computer to operate are collectively referred to as system soft-ware. The
main system software is the operating system, which starts up the computer and controls its
operation. Common operating system tasks include setting up new hardware, allowing users to run
other software, and allowing users to manage the documents stored on their computers. Without an
operating system, a computer cannot function. Common desktop operating systems designed for
personal computers are Windows, Mac OS, and Linux; these and other operating systems (such as
Android, iOS, and other mobile operating systems used with mobile phones and other mobile
devices).To use a computer, first turn on the power to the computer by pressing the power button,
and then the computer will begin to boot. During the boot process, part of the computer’s operating
system is loaded into memory, the computer does a quick diagnostic of itself, and then it launches
any programs—such as security software—designated to run each time the computer starts up. You
may need to supply a password to log on to your computer or a computer network to finish the boot
process. Once a computer has booted, it is ready to be used and waits for input from the user. Most
software today uses a variety of graphical objects (such as icons, buttons, and tiles) that are selected
with the mouse (or with a finger or stylus for a computer that supports touch or pen input) to tell the
computer what to do. For instance, the Windows desktop(the basic workspace for computers
running the Windows operating system; that is, the place where documents, folders, programs, and
other objects are displayed when they are being used), along with some common graphical objects
used in Windows and many other software programs.
Application Software
Application software (see Figure 1-11) consists of programs designed to allow
people to perform specific tasks using a computer, such as creating letters,
preparing budgets, managing inventory and customer databases, playing games,
watching videos, listening to music, scheduling appointments, editing digital
photographs, designing homes, viewing Web pages, burning DVDs, and
exchanging e-mail. Application software is launched via the operating system,
such as by using the Windows Start screen for Windows 8 computers (or the
Windows Start menu for older versions of Windows) and is discussed in greater
detail in Chapter 6.There are also application programs that help users write their
own programs in a form the computer can understand using a programming
language like BASIC, Visual Basic, COBOL, C++, Java, or Python. Some
languages are traditional programming languages for developing applications;
others are designed for use with Web pages or multimedia programming. Markup
and scripting languages (such as HTML, XHTML, and JavaScript) used to create
Web pages.
An operating system software
What benefits does the technology
provide?
Benefits of a Computer-Oriented Society
The benefits of having such a computer-oriented society are numerous, as touched on throughout this
chapter. The capability to virtually design, build, and test new buildings, cars, and airplanes before the
actual construction begins helps professionals create safer end products. Technological advances in
medicine allow for earlier diagnosis and more effective treatment of diseases than ever before. The
benefit of beginning medical students performing virtual surgery using a computer instead of
performing actual surgery on a patient is obvious. The ability to shop, pay bills, research products,
participate in online courses, and look up vast amounts of information 24 hours a day, 7 days a week,
365 days a year via the Internet is a huge convenience. In addition, a computer-oriented society
generates new opportunities. For example, technologies—such as speech recognition software and
Braille input and output devices—enable physically- or visually-challenged individuals to perform
necessary job tasks and to communicate with others more easily. In general, technology has also made
a huge number of tasks in our lives go much faster. Instead of experiencing a long delay for a credit
check, an applicant can get approved for a purchase, loan, or credit card almost immediately.
Documents and photo-graphs can be e-mailed or faxed in mere moments, instead of taking at least a
day to be mailed physically. We can watch many of our favorite TVs shows online and access up-to-
the-minute news at our convenience. And we can download information, programs, music files,
movies, and more on demand when we want or need them, instead of having to order them and then
wait for delivery or physically go to a store to purchase the desired items.
Risks
Although there are a great number of benefits from having a computer-oriented society
and a networked economy, there are risks as well. A variety of problems have emerged
from our extensive computer use, ranging from stress and health concerns, to the
proliferation of spam(unsolicited e-mails) and malware (harmful programs that can be
installed on our computers without our knowledge), to security and privacy issues, to
legal and ethical dilemmas. Many of the security and privacy concerns stem from the
fact that so much of our personal business takes place online—or at least ends up as
data in a computer database somewhere—and the potential for misuse of this data is
enormous. Another concern is the repercussions of collecting such vast amounts of
information electronically. Some people worry about creating a “Big Brother” situation,
in which the government or another organization is watching everything that we do.
Although the accumulation and distribution of information is a necessary factor of our
networked economy, it is one area of great concern to many individuals. And some
Internet behavior, such as downloading music or movies from an unauthorized source
or viewing pornography on an office computer, can get you arrested or fired.
Security Issues
One of the most common online security risks today is your computer becoming infected with a malware program, such
as a computer virus—a malicious software program designed to change the way a computer operates. Malware often
causes damage to the infected computer, such as erasing data or bogging down the computer so it does not function well.
It can also be used to try to locate sensitive data on your computer (such as Web site passwords or credit card numbers)
and send that data to the malware creator or to take control of your computer to use as part of a botnet (a network of
computers used without their owners’ knowledge) for criminal activities. Malware is typically installed by downloading a
program that secretly contains malware or by clicking a link on a Web page or in an e-mail message that then installs
malware. In addition to computers, malware and other security threats are increasingly being directed toward smartphones
and other mobile devices. To help protect your computer or mobile device, never open an e-mail attachment from
someone you do not know or that has an executable file extension (the last three letters in the filename preceded by a
period), such as .exe, .com, or .vbs, without checking with the sender first to make sure the attachment is legitimate. You
should also be careful about what files you download from the Internet. In addition, it is crucial to install security software
on your computer and mobile devices and to set up the program to monitor your devices on a continual basis (see Figure
1-29). If a virus or other type of malware attempts to install itself on your computer or mobile device (such as through an
e-mail message attachment or a Web link), the security program will block it. If malware does find its way onto your
computer or mobile device, the security program will detect it during a regular scan, notify you, and attempt to remove it.
Another ongoing security problem is identity theft—in which someone else uses your identity, typically to purchase goods
or services. Identity theft can stem from personal information discovered from offline means—like discarded papers or
stolen mail—or from information found online, stolen from an online database, or obtained via a malware pro-gram.
Phishing—in which identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain
Social Security numbers or other information needed for identity theft—is also a major security issue today.
Privacy Issues
Some individuals view the potential risk to personal privacy as one of the most important
issues regarding our networked society. As more and more data about our everyday
activities is collected and stored on devices accessible via the Internet, our privacy is at risk
because the potential for privacy violations increases. Today, data is collected about
practically any-thing we buy online or offline, although offline purchases may not be
associated with our identity unless we use a credit card or a membership or loyalty card. At
issue is not that data is collected—with virtually all organizations using computers for
recordkeeping, that is unavoidable—but rather how the collected data is used and how
secure it is. Data collected by businesses may be used only by that company or, depending
on the businesses’ privacy policy, may be shared with others. Data shared with others often
results in spam, which is considered by many to be a violation of personal privacy.
Minimizing risks
Being vigilant to links and spam messages, downloading only at trusted
websites and frequently checking your cookies and account data on your
google account will minimize the risk shown above.
Using your primary e-mail address when shopping online or signing up for a
sweepstake or other online activity will undoubtedly result in spam being sent to
that e-mail address. Use a throw-away e-mail address (a free e-mail address
from Gmail or another free e-mail provider that you can change easily) for these
activities instead to help protect your privacy and cut back on the amount of
spam delivered to your regular e-mail account.
What if you quit because of the risks?
Life without computers would be so pathetic. It would be like hell. There would
be no fun. Everything would be so different. We’d not be able to mail each other
or chat with anyone. It would be so difficult to spend a life without computers.
We would not be aware of technology or what things are being discovered. We
could get information by newspaper, television, radio or some other medium but
on computers we can get it in detail.
The advantage of no computers would be, at least no one could misuse science
and technology, as terrorists have been doing for many years. Nor could we
find information from the net, related to our projects or some other important
work. I couldn’t imagine life without computers because I always use a
computer like cellphone even a TV for my daily routine. Life would be really
difficult without computers.
Who should determine if the
benefits of a new technology
outweigh the potential risks?
Consumers? The government?
It is us, consumers, who should decide if the new technology
outweigh the potential risk. Because we are the one who will be
facing these risk more and we are the ones who create a huge demand
from the computer market. Also I think the government spies on us
so they are the one who creates the risk for our privacy
Question #7- Answer
There is no easy answer when it comes to the appropriate use of mobile phones.
On one hand, we have the convenience of being able to stay connected with loved
ones no matter where we are. On the other hand, we have seen the misuse of
these devices in a variety of ways, most notably in the form of cheating on exams.
As technology advances, it becomes more difficult to regulate the use of these
devices. Personally, I think there should be more stringent consequences for those
who misuse mobile phones in a way that disrupts the class or prevents others from
having a private conversation. At the same time, I do not believe that banning the
use of mobile phones is the answer. There are other ways to ensure that these
devices are used in a responsible way. For instance, fitness centers could prohibit
the use of cameras in the fitness center, and classrooms could institute a rule that
students must stop texting and use the phone for class discussions. There is no
perfect solution, but we need to find a way to balance convenience with safety and
to ensure that everyone has an equal opportunity to use these devices.
Question #8- Answer
Netflix HBO Go
Cost 149 php-549 php 99 php-199 php
Programming Python Through AWS(NET, Java
and Python)
Channels Multiple shows and
movies
Multiple tv shows and
movies including
exclusive entertainments
Compatibility Mobile,desktop/laptop,
smart tv
Mobile,desktop/laptop,
smart tv
Live TV?
Video in demand? Squid Game House of the Dragon
I experienced watching Netflix on my smartphone last year and it
was fun, there’s multiple tv shows and movies to pick from and
the movies are easy to download and has a high resolution. But
after a few weeks, you will run out of good movies and tv shows
to choose from and the rest are just boring gameshows and liberal
propaganda documentaries, so I would rate it at 3/5.
Although there are more streaming services like HBO, Amazon,
Peacock TV, Paramount plus and many more, all of them required
paid transaction and the only free streaming services are pirated
contents using ads as the means of their salary.
With the rise of population using the streaming services. I do
think that cable TV will go down and Smart TV will be on demand
Summary
My Personal Computer
For hardcore gaming
Type Name Price
CPU I9-13900k $589
GPU RTX 4090 $1,600
Motherboard ASUS ROG Z790 $185
PSU CORSAIR RM1000X
80+ 1000w GOLD
MODULAR PSU
$268
RAM G.Skill Trident Z5
RGB DDR5-6000
$90 x2
DRIVE WD BLACK SN850
1TB NVME SSD X 2
$229 x 2
Monitor SAMSUNG 32"
Odyssey Neo G8
$1,299
QUESTION
#9- Answer
Question #10- Answer
Should social media activity cost you a job? When you apply for a new job, there's a
good chance that the company will take a look at your social media activity, such as
your Facebook page, blog activity, and even Craigslist listings. In fact, many
companies now require job applicants to pass a social media background check
before offering them a job. Companies are trying to protect themselves by looking
for such things as racist remarks and illegal activities, as well as get a feel for
whether or not an individual would be a good fit for the company. But should
individuals have to risk losing a job if they post a photo of themselves in a racy
Halloween costume or make an offhand comment that an employer may
misinterpret? What If a company denies you a job based on inaccurate information?
In some cases, a job applicant may have to risk losing a job if they post a
questionable photo of themselves on social media. For example, if you're applying
for a job as a model, and someone posts a photo of you in a racy Halloween
costume, the company may deny you the job based on that information. However, in
other cases, a company may be able to use third-party information to make a
decision
Are social media activities a good indicator of a person's character? Many people
believe that social media activities are a good indicator of a person's character. After
all, the sites are meant to be places where people can casually interact with others. In
some cases, employers have even asked job applicants to abstain from social media
activities in order to protect themselves. However, some people believe that social
media activities should not be used to judge a person's character. After all, people
can easily post things that they would never say in person. What do you think? Do
social media activities have a negative impact on a person's job prospects? Many
people believe that social media activities can have a negative impact on a person's
job prospects. After all, companies are looking for candidates who will be a good fit
for the company and who will not cause any trouble. However, some people believe
that social media activities should not be used to judge a person's character. After all,
people can easily post things that they would never say in person. What do you think?
The end

More Related Content

Similar to Intro to Computing Presentation Project .

Introduction to computer (bus 123) lecture i ib
Introduction to computer (bus 123) lecture i ibIntroduction to computer (bus 123) lecture i ib
Introduction to computer (bus 123) lecture i ibSamuel Olutuase
 
Information technology
Information technologyInformation technology
Information technologyAmjad Afridi
 
HISTORY OF COMPUTER
HISTORY OF COMPUTERHISTORY OF COMPUTER
HISTORY OF COMPUTERAmjad Afridi
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxssuser3b0320
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04Shaheen Khan
 
Information technology final chap 2
Information technology final chap 2Information technology final chap 2
Information technology final chap 2Manshi Makati
 
ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...Faizan Tanoli
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04Shaheen Khan
 
History and types of a computer.pptx
History and types of a computer.pptxHistory and types of a computer.pptx
History and types of a computer.pptxMdAbuShayem1
 
Computer Applications and its use in Dentistry.pptx
Computer Applications and its use in Dentistry.pptxComputer Applications and its use in Dentistry.pptx
Computer Applications and its use in Dentistry.pptxriturandad
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xiSyed Zaid Irshad
 
Information technology
Information technologyInformation technology
Information technologyMicrobiology
 
Information technology
Information technologyInformation technology
Information technologyMicrobiology
 
Tm 1st mod
Tm 1st modTm 1st mod
Tm 1st modRVIM
 

Similar to Intro to Computing Presentation Project . (20)

Introduction to computer (bus 123) lecture i ib
Introduction to computer (bus 123) lecture i ibIntroduction to computer (bus 123) lecture i ib
Introduction to computer (bus 123) lecture i ib
 
Information technology
Information technologyInformation technology
Information technology
 
HISTORY OF COMPUTER
HISTORY OF COMPUTERHISTORY OF COMPUTER
HISTORY OF COMPUTER
 
UNIT 1 FOC.pptx
UNIT 1 FOC.pptxUNIT 1 FOC.pptx
UNIT 1 FOC.pptx
 
presentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptxpresentationoncomputergeneration-170324202733-1.pptx
presentationoncomputergeneration-170324202733-1.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 
Information technology final chap 2
Information technology final chap 2Information technology final chap 2
Information technology final chap 2
 
ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...
 
Day 1
Day   1Day   1
Day 1
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Historyofcomputers
HistoryofcomputersHistoryofcomputers
Historyofcomputers
 
History and types of a computer.pptx
History and types of a computer.pptxHistory and types of a computer.pptx
History and types of a computer.pptx
 
W 1 Introduction
W 1  IntroductionW 1  Introduction
W 1 Introduction
 
Computer Applications and its use in Dentistry.pptx
Computer Applications and its use in Dentistry.pptxComputer Applications and its use in Dentistry.pptx
Computer Applications and its use in Dentistry.pptx
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
 
Information technology
Information technologyInformation technology
Information technology
 
Information technology
Information technologyInformation technology
Information technology
 
Tm 1st mod
Tm 1st modTm 1st mod
Tm 1st mod
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Intro to Computing Presentation Project .

  • 2. Explain why it is essential to learn about computers today and discuss several ways computers integrated into our business and personal lives. To better handle one - In 2019, about 47 % of the world uses a computer and in U.S. nearly 90% of households owns a computer. It’s widespread use is showing us how integral it is to our daily lives. And with the computer’s significance to us, we must reciprocate with strong knowledge about computers; to know the hardwares and softwares with their do’s and don’ts, understanding computer market to get the most efficiency with your budget and to avoid viruses and malware. With advance knowledge about computer, you can lengthen it’s life expentancy, maximize it’s efficiency and save some money for hardware/software repairs that you can do.
  • 3. Better assistance to task and shorten time consumption -There are multiple applications also called productive tools fitted to different task for example ms word for typing documents, ms excel for data gathering, statistics and tallying and multiple adobe photoshop apps for photo editing. Multiple apps are used by businesses and jobs for greater work efficiency, it is necessary for people to learn how to use these apps to greater increase their chances for a higher wage and comfort in the job market The Technology Age Even a menial job this days required basic computer literacy. Multiple productivity tools is frequently used in office jobs, Experts now also relies on computers for decision making and authentication, and of course the wifi− because of the pandemic wifi has been our only connection to the continue our jobs and became the medium of learning modality.
  • 4. Define a computer and describe its primary operations. A computer is an electrical device that can be programmed to take input, process that data, display the results, and store the data or results as needed. Since computers can be programmed, they may be made to do any task that is specified in the instructions, or "program," that are given to them. The tasks that a computer can perform are determined by the programs utilized with it. The four operations are input, processing, output, and storage. Input—entering data into the computer. Processing—performing operations on the data. Output—presenting the results. Storage—saving data, programs, or output for future use.
  • 5. The four operations The user puts his face in front of camera for facial recognition The computer processes the face if it’s the same from your given data. The computer Will output whether if your face is recognized or not Your data from the transaction is saved for future references
  • 6. List some important milestones in computer evolution. Precomputers and Early Computers (before approximately 1946) Experts have come to the conclusion that ancient civilizations were capable of counting and computing based on archeological discoveries including notched bones, knotted twine, and hieroglyphics. The abacus was primarily employed as a tool for simple arithmetic computations and is often regarded as the oldest known calculator. The slide rule, the mechanical calculator, and Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter are some more early examples of computing equipment. The first electromechanical machine that could read punch cards—special cards with holes punched into them to represent data—was the latter device. The U.S. census of 1890 was processed using Hollerith's machine. Instead of the decade it typically took to process the data manually, it was able to do the assignment in only two and a half years. Consequently, it is thought that this is the first instance in which an information processing system has successfully replaced a system that relies on paper and pens. In the end, International Business Machines was Hollerith's corporation (IBM).
  • 8. First-Generation Computers (approximately 1946–1957) • The original computers were huge, often occupying whole rooms. Thousands of vacuum tubes, glass tubes that resemble giant light bulbs, were used to power them. These vacuum tubes required frequent replacement, used a lot of electricity, and produced a lot of heat. Because they needed to be physically rewired with cables in order to be reprogrammed, first-generation computers could only solve one problem at a time. This process typically took several days (sometimes even weeks) to complete and another few days to verify before the computer could be used. Input was often accomplished using paper punch cards and paper tape, while output was typically printed on paper. • The world's first large-scale, general-purpose computer, ENIAC, is seen in, and UNIVAC is one of the most notable instances of a first-generation computer. ENIAC was created during World War II to calculate artillery firing tables for the U.S. Army, even though it was not finished until 1946. ENIAC could perform the same calculations in less than two minutes as opposed to the 40 hours needed by a person to manually calculate the ideal parameters for a single weapon under a single set of conditions. • UNIVAC, released in 1951, was initially built for the U.S. Census Bureau and was used to analyze votes in the 1952 U.S. pres-idential election. Interestingly, its correct prediction of an Eisenhower victory only 45 minutes after the polls closed was not publicly aired because the results were not trusted. However, UNIVAC became the first computer to be mass produced for general commercial use.
  • 9. FIRST- GENERATION COMPUTERS John von Neumann with the IAS Computer Von Neumann persuaded IAS to expand from doing theoretical studies to building a real computer, with meteorology calculations as a key test of its scientific value. The cylinders at the bottom are the Williams-Kilburn memory tubes
  • 10. Second-Generation Computers (approximately 1958–1963) • The second generation of computers began when transistors—tiny devices made of semiconductor materials that act like switches to open and close electronic circuits—started replacing vacuum tubes. Transistors made second-generation computers smaller, cheaper, more powerful, more energy efficient, and more reliable than first-generation computers. Programs and data were typically input on punched cards and magnetic tape, output on punched cards and paper prints, and stored on magnetic tape (see Figure 1-7). Hard drives and programming languages (such as FORTRAN and COBOL) were developed and implemented in this generation.
  • 11. SECOND-GENERATION COMPUTERSSecond-generation computers, such asthe IBM 1401 mainframe shown here,used transistors instead of vacuumtubes so they were smaller, faster,and more reliable than 1st-generation computers.
  • 12. Third-Generation Computers (approximately 1964–1970) • The replacement of the transistor with integrated circuits (ICs) marked the beginning of the third generation of computers. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing third-generation computers to be even smaller and more reliable than computers in the earlier computer generations. Instead of punch cards and paper printouts, keyboards and monitors were introduced for input and output; hard drives were typically used for storage.
  • 13. Fourth-Generation Computers (approximately 1971– present) • A technological breakthrough in the early 1970s made it possible to place an increas-ing number of transistors on a single chip. This led to the invention of the micropro-cessor in 1971, which ushered in the fourth generation of computers. In essence, a microprocessor contains the core processing capabilities of an entire computer on one single chip. The original IBM PC and Apple Macintosh computers, and most of today’s traditional computers, fall into this category. Fourth- generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. This gen-eration also witnessed the development of computer networks, wireless technologies, and the Internet.
  • 14. Fifth-Generation Computers (now and the future) • Fifth-generation computers are most commonly defined as those that are based on artifi-cial intelligence, allowing them to think, reason, and learn Some aspects of fifth-generation computers—such as voice and touch input and speech recognition— are being used today. In the future, fifth- generation computers are expected to be constructed differently than they are today, such as in the form of optical computersthat process data using light instead of electrons, tiny computers that utilize nanotechnol-ogy, or as entire general-purpose computers built into desks, home appliances, and other everyday devices.
  • 15. Identify the major parts of a personal computer, including input, processing, output, storage, and communications hardware. Hardware are the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more. Input Processing Output Communication Storage Keyboard CPU Printer Modem Hard Drive (SSD or HDD) Mouse GPU Monitor Network Adapter USB Microphone Headphones/h eadsets Router Flash memory card Scanner Data projector CD Stylus Pen Speakers Camera Touchpad/screen Fingerprint Scanner
  • 16. Word definitions Input Devices An input device is any piece of equipment that is used to input data into the computer. The input devices shown in Figure 1-9 are a keyboard, mouse, and microphone. Other common input devices include scanners, digital cameras, digital pens and styluses, touch pads and touch screens, fingerprint readers, and gaming control- lers. Processing Devices The main processing device for a computer is the central process-ing unit (CPU). The CPU is located inside the system unit and performs the calculations and comparisons needed for processing; it also controls the computer’s operations. For these reasons, the CPU is often considered the “brain” of the computer. Also involved in processing are various types of memory that are located inside the system unit and used to store data and instructions while the CPU is working with them, as well as additional processors such as the graphics processing unit (GPU).
  • 17. Output Devices An output device accepts processed data from the computer and presents the results to the user, most of the time on the display screen (monitor), on paper (via a printer), or through a speaker. Other common output devices include headphones and headsets(used to deliver audio output to a single user) and data projectors (used to project computer images onto a projection screen). Storage Devices Storage devices (such as DVD drives and flash memory card readers) are used to store data on or access data from storage media (such as DVD discs and flash memory cards). Some storage hardware (such as a hard drive or a USB flash drive) includes both a storage device and storage medium in a single piece of hardware. Storage devices are used to save data, program settings, or output for future use; they can be installed inside the computer, attached to the computer as an external device, or accessed remotely through a network or wireless connection.
  • 18. Communications Devices Communications devices allow users to communicate electronically with others and to access remote information via the Internet or a home, school, or company computer network. Communications hardware includes modems (used to connect a computer to the Internet), network adapters (used to connect a computer to a computer network), and routers (used to create a small network so a variety of devices can share an Internet connection and data). A variety of modems and network adapters are available because there are different types of Internet and network connections—a modem used to connect to the Internet via a wireless connection and that also contains a built-in wireless router is shown in Figure 1-9. Communications hardware and computer networks are discussed in more detail in Chapter 7; connecting to the Internet is covered in Chapter 8.
  • 19.
  • 20. Define software and explain how it is being use to instruct the computer what to do Software The term software refers to the programs or instructions used to tell the computer hard-ware what to do. Software is traditionally purchased on a CD or DVD or is downloaded from the Internet; in either case, the software typically needs to be installed on a computer before it can be used. Software can also be run directly from the Internet (via Web pages) without being installed on your computer; this is referred to as cloud software, Web-based software, Software as a Service (SaaS), and cloud computing Computers use two basic types of software: system software and application software.The differences between these types of software are discussed next.
  • 21. System Software The programs that allow a computer to operate are collectively referred to as system soft-ware. The main system software is the operating system, which starts up the computer and controls its operation. Common operating system tasks include setting up new hardware, allowing users to run other software, and allowing users to manage the documents stored on their computers. Without an operating system, a computer cannot function. Common desktop operating systems designed for personal computers are Windows, Mac OS, and Linux; these and other operating systems (such as Android, iOS, and other mobile operating systems used with mobile phones and other mobile devices).To use a computer, first turn on the power to the computer by pressing the power button, and then the computer will begin to boot. During the boot process, part of the computer’s operating system is loaded into memory, the computer does a quick diagnostic of itself, and then it launches any programs—such as security software—designated to run each time the computer starts up. You may need to supply a password to log on to your computer or a computer network to finish the boot process. Once a computer has booted, it is ready to be used and waits for input from the user. Most software today uses a variety of graphical objects (such as icons, buttons, and tiles) that are selected with the mouse (or with a finger or stylus for a computer that supports touch or pen input) to tell the computer what to do. For instance, the Windows desktop(the basic workspace for computers running the Windows operating system; that is, the place where documents, folders, programs, and other objects are displayed when they are being used), along with some common graphical objects used in Windows and many other software programs.
  • 22. Application Software Application software (see Figure 1-11) consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, managing inventory and customer databases, playing games, watching videos, listening to music, scheduling appointments, editing digital photographs, designing homes, viewing Web pages, burning DVDs, and exchanging e-mail. Application software is launched via the operating system, such as by using the Windows Start screen for Windows 8 computers (or the Windows Start menu for older versions of Windows) and is discussed in greater detail in Chapter 6.There are also application programs that help users write their own programs in a form the computer can understand using a programming language like BASIC, Visual Basic, COBOL, C++, Java, or Python. Some languages are traditional programming languages for developing applications; others are designed for use with Web pages or multimedia programming. Markup and scripting languages (such as HTML, XHTML, and JavaScript) used to create Web pages.
  • 24. What benefits does the technology provide? Benefits of a Computer-Oriented Society The benefits of having such a computer-oriented society are numerous, as touched on throughout this chapter. The capability to virtually design, build, and test new buildings, cars, and airplanes before the actual construction begins helps professionals create safer end products. Technological advances in medicine allow for earlier diagnosis and more effective treatment of diseases than ever before. The benefit of beginning medical students performing virtual surgery using a computer instead of performing actual surgery on a patient is obvious. The ability to shop, pay bills, research products, participate in online courses, and look up vast amounts of information 24 hours a day, 7 days a week, 365 days a year via the Internet is a huge convenience. In addition, a computer-oriented society generates new opportunities. For example, technologies—such as speech recognition software and Braille input and output devices—enable physically- or visually-challenged individuals to perform necessary job tasks and to communicate with others more easily. In general, technology has also made a huge number of tasks in our lives go much faster. Instead of experiencing a long delay for a credit check, an applicant can get approved for a purchase, loan, or credit card almost immediately. Documents and photo-graphs can be e-mailed or faxed in mere moments, instead of taking at least a day to be mailed physically. We can watch many of our favorite TVs shows online and access up-to- the-minute news at our convenience. And we can download information, programs, music files, movies, and more on demand when we want or need them, instead of having to order them and then wait for delivery or physically go to a store to purchase the desired items.
  • 25. Risks Although there are a great number of benefits from having a computer-oriented society and a networked economy, there are risks as well. A variety of problems have emerged from our extensive computer use, ranging from stress and health concerns, to the proliferation of spam(unsolicited e-mails) and malware (harmful programs that can be installed on our computers without our knowledge), to security and privacy issues, to legal and ethical dilemmas. Many of the security and privacy concerns stem from the fact that so much of our personal business takes place online—or at least ends up as data in a computer database somewhere—and the potential for misuse of this data is enormous. Another concern is the repercussions of collecting such vast amounts of information electronically. Some people worry about creating a “Big Brother” situation, in which the government or another organization is watching everything that we do. Although the accumulation and distribution of information is a necessary factor of our networked economy, it is one area of great concern to many individuals. And some Internet behavior, such as downloading music or movies from an unauthorized source or viewing pornography on an office computer, can get you arrested or fired.
  • 26. Security Issues One of the most common online security risks today is your computer becoming infected with a malware program, such as a computer virus—a malicious software program designed to change the way a computer operates. Malware often causes damage to the infected computer, such as erasing data or bogging down the computer so it does not function well. It can also be used to try to locate sensitive data on your computer (such as Web site passwords or credit card numbers) and send that data to the malware creator or to take control of your computer to use as part of a botnet (a network of computers used without their owners’ knowledge) for criminal activities. Malware is typically installed by downloading a program that secretly contains malware or by clicking a link on a Web page or in an e-mail message that then installs malware. In addition to computers, malware and other security threats are increasingly being directed toward smartphones and other mobile devices. To help protect your computer or mobile device, never open an e-mail attachment from someone you do not know or that has an executable file extension (the last three letters in the filename preceded by a period), such as .exe, .com, or .vbs, without checking with the sender first to make sure the attachment is legitimate. You should also be careful about what files you download from the Internet. In addition, it is crucial to install security software on your computer and mobile devices and to set up the program to monitor your devices on a continual basis (see Figure 1-29). If a virus or other type of malware attempts to install itself on your computer or mobile device (such as through an e-mail message attachment or a Web link), the security program will block it. If malware does find its way onto your computer or mobile device, the security program will detect it during a regular scan, notify you, and attempt to remove it. Another ongoing security problem is identity theft—in which someone else uses your identity, typically to purchase goods or services. Identity theft can stem from personal information discovered from offline means—like discarded papers or stolen mail—or from information found online, stolen from an online database, or obtained via a malware pro-gram. Phishing—in which identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain Social Security numbers or other information needed for identity theft—is also a major security issue today.
  • 27. Privacy Issues Some individuals view the potential risk to personal privacy as one of the most important issues regarding our networked society. As more and more data about our everyday activities is collected and stored on devices accessible via the Internet, our privacy is at risk because the potential for privacy violations increases. Today, data is collected about practically any-thing we buy online or offline, although offline purchases may not be associated with our identity unless we use a credit card or a membership or loyalty card. At issue is not that data is collected—with virtually all organizations using computers for recordkeeping, that is unavoidable—but rather how the collected data is used and how secure it is. Data collected by businesses may be used only by that company or, depending on the businesses’ privacy policy, may be shared with others. Data shared with others often results in spam, which is considered by many to be a violation of personal privacy.
  • 28. Minimizing risks Being vigilant to links and spam messages, downloading only at trusted websites and frequently checking your cookies and account data on your google account will minimize the risk shown above. Using your primary e-mail address when shopping online or signing up for a sweepstake or other online activity will undoubtedly result in spam being sent to that e-mail address. Use a throw-away e-mail address (a free e-mail address from Gmail or another free e-mail provider that you can change easily) for these activities instead to help protect your privacy and cut back on the amount of spam delivered to your regular e-mail account.
  • 29. What if you quit because of the risks? Life without computers would be so pathetic. It would be like hell. There would be no fun. Everything would be so different. We’d not be able to mail each other or chat with anyone. It would be so difficult to spend a life without computers. We would not be aware of technology or what things are being discovered. We could get information by newspaper, television, radio or some other medium but on computers we can get it in detail. The advantage of no computers would be, at least no one could misuse science and technology, as terrorists have been doing for many years. Nor could we find information from the net, related to our projects or some other important work. I couldn’t imagine life without computers because I always use a computer like cellphone even a TV for my daily routine. Life would be really difficult without computers.
  • 30. Who should determine if the benefits of a new technology outweigh the potential risks? Consumers? The government? It is us, consumers, who should decide if the new technology outweigh the potential risk. Because we are the one who will be facing these risk more and we are the ones who create a huge demand from the computer market. Also I think the government spies on us so they are the one who creates the risk for our privacy
  • 31. Question #7- Answer There is no easy answer when it comes to the appropriate use of mobile phones. On one hand, we have the convenience of being able to stay connected with loved ones no matter where we are. On the other hand, we have seen the misuse of these devices in a variety of ways, most notably in the form of cheating on exams. As technology advances, it becomes more difficult to regulate the use of these devices. Personally, I think there should be more stringent consequences for those who misuse mobile phones in a way that disrupts the class or prevents others from having a private conversation. At the same time, I do not believe that banning the use of mobile phones is the answer. There are other ways to ensure that these devices are used in a responsible way. For instance, fitness centers could prohibit the use of cameras in the fitness center, and classrooms could institute a rule that students must stop texting and use the phone for class discussions. There is no perfect solution, but we need to find a way to balance convenience with safety and to ensure that everyone has an equal opportunity to use these devices.
  • 32. Question #8- Answer Netflix HBO Go Cost 149 php-549 php 99 php-199 php Programming Python Through AWS(NET, Java and Python) Channels Multiple shows and movies Multiple tv shows and movies including exclusive entertainments Compatibility Mobile,desktop/laptop, smart tv Mobile,desktop/laptop, smart tv Live TV? Video in demand? Squid Game House of the Dragon
  • 33. I experienced watching Netflix on my smartphone last year and it was fun, there’s multiple tv shows and movies to pick from and the movies are easy to download and has a high resolution. But after a few weeks, you will run out of good movies and tv shows to choose from and the rest are just boring gameshows and liberal propaganda documentaries, so I would rate it at 3/5. Although there are more streaming services like HBO, Amazon, Peacock TV, Paramount plus and many more, all of them required paid transaction and the only free streaming services are pirated contents using ads as the means of their salary. With the rise of population using the streaming services. I do think that cable TV will go down and Smart TV will be on demand Summary
  • 34. My Personal Computer For hardcore gaming Type Name Price CPU I9-13900k $589 GPU RTX 4090 $1,600 Motherboard ASUS ROG Z790 $185 PSU CORSAIR RM1000X 80+ 1000w GOLD MODULAR PSU $268 RAM G.Skill Trident Z5 RGB DDR5-6000 $90 x2 DRIVE WD BLACK SN850 1TB NVME SSD X 2 $229 x 2 Monitor SAMSUNG 32" Odyssey Neo G8 $1,299 QUESTION #9- Answer
  • 35. Question #10- Answer Should social media activity cost you a job? When you apply for a new job, there's a good chance that the company will take a look at your social media activity, such as your Facebook page, blog activity, and even Craigslist listings. In fact, many companies now require job applicants to pass a social media background check before offering them a job. Companies are trying to protect themselves by looking for such things as racist remarks and illegal activities, as well as get a feel for whether or not an individual would be a good fit for the company. But should individuals have to risk losing a job if they post a photo of themselves in a racy Halloween costume or make an offhand comment that an employer may misinterpret? What If a company denies you a job based on inaccurate information? In some cases, a job applicant may have to risk losing a job if they post a questionable photo of themselves on social media. For example, if you're applying for a job as a model, and someone posts a photo of you in a racy Halloween costume, the company may deny you the job based on that information. However, in other cases, a company may be able to use third-party information to make a decision
  • 36. Are social media activities a good indicator of a person's character? Many people believe that social media activities are a good indicator of a person's character. After all, the sites are meant to be places where people can casually interact with others. In some cases, employers have even asked job applicants to abstain from social media activities in order to protect themselves. However, some people believe that social media activities should not be used to judge a person's character. After all, people can easily post things that they would never say in person. What do you think? Do social media activities have a negative impact on a person's job prospects? Many people believe that social media activities can have a negative impact on a person's job prospects. After all, companies are looking for candidates who will be a good fit for the company and who will not cause any trouble. However, some people believe that social media activities should not be used to judge a person's character. After all, people can easily post things that they would never say in person. What do you think?