SlideShare a Scribd company logo
Presentation Tips ,[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 1 Information Technology, the Internet, and You Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 1-
Competencies   (Page 1 of 2)   ,[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Competencies   (Page 2 of 2) ,[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction ,[object Object],[object Object],[object Object],[object Object],Page 3 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 1-
Five Parts of an Information System ,[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Software ,[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
System Software ,[object Object],[object Object],[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Application Software ,[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Hardware - Types of Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Microcomputer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Desktop Computers ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Media Center System Units  ,[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Return
Notebook or Laptop Computers ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Tablet PC ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Handheld ,[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Return
Microcomputer Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],[object Object],[object Object],Netbooks 1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Return
System Unit ,[object Object],[object Object],[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Input/Output Devices ,[object Object],[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Secondary Storage ,[object Object],[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Communications ,[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Document Files ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Worksheet Files ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Database Files ,[object Object],1- Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Presentation Files ,[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Connectivity, the Wireless Revolution, and the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Careers in IT ,[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
A Look to the Future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Open-Ended Questions   (Page 1 of 2)   ,[object Object],[object Object],[object Object],1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],Open-Ended Questions   (Page 2 of 2)   1- Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

More Related Content

What's hot

Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
Mukalele Rogers
 
Chap1a
Chap1aChap1a
Chap1a
Fadilah Ku
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
KMJ Science Computer
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
SHRIBALAJIINFOTECH
 
Information Technology
Information TechnologyInformation Technology
Information Technology
shehzadbilal
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
Mazhar Masood
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
Tanveer Malik
 
Chapter 01 - Introduction to Computers
Chapter 01 - Introduction to ComputersChapter 01 - Introduction to Computers
Chapter 01 - Introduction to Computers
Achmad Solichin
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
Anna Stirling
 
T1 [intro to computer]
T1 [intro to computer]T1 [intro to computer]
T1 [intro to computer]
ICAM
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Apps
xtin101
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
mcastro284
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERS
ArMags
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
Mkhululi Silinga
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
Sreedevi Santhosh
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
LeslynBonachita1
 
Chapter 01
Chapter 01Chapter 01
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
Carolyn Brockman
 

What's hot (20)

Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Chap1a
Chap1aChap1a
Chap1a
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Chapter 01 - Introduction to Computers
Chapter 01 - Introduction to ComputersChapter 01 - Introduction to Computers
Chapter 01 - Introduction to Computers
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
T1 [intro to computer]
T1 [intro to computer]T1 [intro to computer]
T1 [intro to computer]
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Apps
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERS
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 

Similar to O leary2011 comp_ppt_ch01

O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01
Vay Su
 
SKOLA
SKOLASKOLA
Management Information System
Management Information SystemManagement Information System
Management Information System
Ch Irfan
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
Fundamentos de Software
Fundamentos de SoftwareFundamentos de Software
Fundamentos de Software
Nicolas Garcia
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
4044uday
 
TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01
Aien Lee
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
Acad
 
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptxINFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
tweekumonevolution
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
Opjsuniversity1
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
Ra'Fat Al-Msie'deen
 
Chapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers cscChapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers csc
Tyrah Ira
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
Kumar
 
Computing Essential
Computing Essential Computing Essential
Computing Essential
VirusSami
 
MBA 5401, Management Information Systems 1 Course Lea.docx
 MBA 5401, Management Information Systems 1 Course Lea.docx MBA 5401, Management Information Systems 1 Course Lea.docx
MBA 5401, Management Information Systems 1 Course Lea.docx
aryan532920
 
C LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdfC LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdf
Priyanka542143
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
Mihreteab F
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
Manas Saha
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
Jeremy Flores
 

Similar to O leary2011 comp_ppt_ch01 (20)

O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01
 
SKOLA
SKOLASKOLA
SKOLA
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Fundamentos de Software
Fundamentos de SoftwareFundamentos de Software
Fundamentos de Software
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
 
TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
 
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptxINFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
INFORMATION-COMMUNICATION-AND-TECHNOLOGY.pptx
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Chapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers cscChapter 1 -introduction_to_computers csc
Chapter 1 -introduction_to_computers csc
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Computing Essential
Computing Essential Computing Essential
Computing Essential
 
MBA 5401, Management Information Systems 1 Course Lea.docx
 MBA 5401, Management Information Systems 1 Course Lea.docx MBA 5401, Management Information Systems 1 Course Lea.docx
MBA 5401, Management Information Systems 1 Course Lea.docx
 
C LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdfC LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdf
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

O leary2011 comp_ppt_ch01

  • 1.
  • 2. Chapter 1 Information Technology, the Internet, and You Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 1-
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. To be competent with IT, a comprehension of the five parts an information system are critical (refer to the ensuing slides)
  2. Define an information system Some students may think of a system as pertaining to just the hardware Remind them that a microcomputer is part of an information system To be a competent end user (Key Term), one must understand the essentials of IT Note that IT stands for information technology (Key Term)
  3. People are the most important part of an information system Our lives are touched everyday by computers- many time the contact is direct and obvious, such as creating documents using a word processing program or when connecting to the internet. Other times, it isn’t as obvious and is much more indirect as shown in a couple of the pictures Have students give examples of how they use computer applications throughout the day Some examples are: Instant messaging Web-based applications Personal Web site Virus protection TV tuners and video clips Digital photography Music Home networking Spyware Job opportunities Refer to Figure 1-3 on pg. 7 in text. It provides a partial list of applications that students can use to “Make IT work for You”
  4. Software is another name for programs Programs are instructions that tell the computer how to process data into the form you want Emphasize differences between application and systems software System software Operating system (Key Term) Utilities Device drivers (Key Term) Application software General-purpose (Key Term) Special purpose
  5. System Not a single program A collection of programs Two best known Operating systems are: Windows XP Mac OS X Utilities Service programs (key term) Performs tasks related to managing computer resources Device drivers Application
  6. “ End-user” software – these are the types of programs you have to know to be considered computer competent An example of a basic application is a browser to navigate, explore and find information (Key Term) on the Internet Two major categories General purpose - basic programs; “off-the-shelf” Specialized application – narrow focus on specific disciplines and occupations Screen capture to be replaced.
  7. There are four types of computers Supercomputers (key term) – the most powerful; special high-capacity computers used in very large corporations Mainframe computers (key term) – are capable of great processing speed and data storage; occupy specially wired, air-conditioned rooms; insurance companies use to process information about millions of policyholders Minicomputers (key term) - known as midrange computers (key term), are refrigerator sized machines used in medium sized companies or departments in large companies Microcomputers (key term) – least powerful but most widely used and fastest-growing type of computers Desktop (key term) Laptop or notebook (key term) Tablet PC (key term) Handheld computers (Key Term) Palm computers (Key Term) Personal digital assistants (PDA) (Key Term) Photos to be replaced.
  8. Microcomputers Desktop Laptop or notebook Tablet PC Handheld computers Palm computers Personal digital assistants (PDA) Photos to be replaced.
  9. Small but not a laptop Have students begin discussing the type(s) of a desktop computer (key term) they are using or familiar with
  10. Notebook computers are also known as laptops Have students begin discussing the type(s) of notebook or laptop computer(s) they are using or familiar with
  11. Accepts handwriting Ask students if they are familiar with tablet PCs
  12. Personal digital assistants (PDA) are the most widely used handheld computer Ask students if they are familiar with palm computers or PDAs
  13. System Unit is the container that houses most of the electronic components that make up a computer system. Input/Output – Input devices (key term) translate data and programs from a form humans understand to a form computers can process; Secondary Storage – Unlike memory (key term), secondary storage holds data and programs even after the electrical power has been turned off—examples of secondary storage include USB drives, hard drives and optical drives and floppy drives eliminated Communication – one computer communicating with another computer or other computer systems using communication devices (key term) such as a modem
  14. Systems unit-container houses most of the electronic components that make up a computer system The microprocessor controls and manipulates data to produce information Memory holds data and program instructions for processing the data. It also holds the processed information before it is output Memory is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted
  15. Floppy disks are used to store and transport data from one computer to another. Floppy disks are named as such due to the fact that data is stored on a very thin flexible, or floppy, plastic disk ELIMINATE (floppy reference) Hard disks are typically used to store programs and very large data files. Hard disk have a much larger capacity and are able to access information much faster than floppy disks Optical disks use laser technology and have the greatest capacity. Examples of optical disks include: compact discs (CDs) (Key Term) digital versatile discs (DVDs) (Key Term) high definition (hi def) (Key Term) discs
  16. Check notes with book Used to describe facts about something Contained in files for documents, worksheets, and databases Document files (key term) - usually created by word processors Worksheet files (key term) - electronic spreadsheets Database files (key term) - electronic database management programs Presentation files (key term) - electronic slide shows
  17. Word processors are used to prepare written documents Create text-based documents One of the most flexible and widely used software tools Features to make entering, editing, and formatting documents easy
  18. Files created by spreadsheet programs Uses functions and formulas to analyze numeric data Manipulates numeric data Features include workbooks, worksheets, cells, ranges, text and numeric entries, formulas, functions, charts, recalculation, and what-if analysis
  19. A database management system (DBMS) or database manager is a program that sets up, or structures, a database Files created by database management programs Organizes data for efficient retrieval Is the electronic equivalent of a file cabinet It also provides tools to enter, edit, and retrieve data from the database
  20. Used to create a variety of visual objects to create attractive, visually interesting presentations Features include slides, AutoContent wizard, color schemes, slide layouts, special effects, master slides, and design templates Presentation files may contain audience handouts, speaker notes, and electronic slides
  21. Connectivity is the capability of your microcomputer to share information with other computers Wireless /mobile communication devices are more popular than ever A network is central to the concept of connectivity Ask students questions about the Internet. Here are some facts: No one owns the Internet There is no Internet, Inc. The Internet is a network of networks The Word Wide Web (key term) (WWW) provides multimedia interface to resources on the Internet
  22. Internet & Web - browse the Web, communicate with others, locate Information, etc… Powerful Software - create professional looking documents, analyze massive amounts of data, create dynamic multimedia pages, and more. Powerful Hardware – more powerful & robust, new technologies such as wireless networks & their impact to connect, equipment can be dynamic vs. essential features of devices remain static Security & Privacy – negative impacts, potential mental & physical health risk, negative effects on the environment, etc… Organizations – organizational information systems and their use Changing Times – fast paced era and rapid change
  23. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements
  24. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements