This chapter introduces computers and their role in modern society. It discusses how computers have become integrated into business and personal lives. The chapter defines what a computer is and describes its basic operations of input, processing, output, storage, and communication. It provides an overview of the history and evolution of computers and identifies the six basic types: embedded systems, mobile devices, personal computers, servers, mainframes, and supercomputers. The chapter also discusses computer hardware, software, and how networks and the internet function at a high level.
This chapter covers:
- What computers are, how they work, and how they are used
- Computer terminology
- An overview of the history of computers
- The basic types of computers in use today
- An overview of networks and the Internet
- Societal impacts of computers
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
This chapter covers:
- What computers are, how they work, and how they are used
- Computer terminology
- An overview of the history of computers
- The basic types of computers in use today
- An overview of networks and the Internet
- Societal impacts of computers
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
overview:-
This chapter covers:
What computers are, how they work, and how they are used
Computer terminology
An overview of the history of computers
The basic types of computers in use today
How to access resources on the Internet
Societal impacts of computers
Why learn about computers?
Pervasive computing
Also known as ubiquitous computing
Computers have become an integral part of our lives
Basic computer literacy
Understanding what a computer is and how it works
Objectives
- Explain what e-commerce is and describe some of the advantages and disadvantages involved with implementing e-commerce.
- Identify a variety of e-commerce business models and discuss their differences.
- Discuss the types of Web sites that can be used to implement e-commerce.
- List several strategies for implementing e-commerce using the Web, including some of the decisions that need to be made, the options available for accepting payments, and the process of designing and developing an effective Web site.
- Outline some sales and marketing strategies that can be used in conjunction with an e-commerce Web site.
- Discuss some security issues related to e-commerce sites.
This chapter covers:
- Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns
- Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes
- Possible risks for personal privacy violations due to databases, marketing activities, electronic surveillance, and monitoring, and precautions that can be taken to safeguard one’s privacy
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
overview:-
This chapter covers:
What computers are, how they work, and how they are used
Computer terminology
An overview of the history of computers
The basic types of computers in use today
How to access resources on the Internet
Societal impacts of computers
Why learn about computers?
Pervasive computing
Also known as ubiquitous computing
Computers have become an integral part of our lives
Basic computer literacy
Understanding what a computer is and how it works
Objectives
- Explain what e-commerce is and describe some of the advantages and disadvantages involved with implementing e-commerce.
- Identify a variety of e-commerce business models and discuss their differences.
- Discuss the types of Web sites that can be used to implement e-commerce.
- List several strategies for implementing e-commerce using the Web, including some of the decisions that need to be made, the options available for accepting payments, and the process of designing and developing an effective Web site.
- Outline some sales and marketing strategies that can be used in conjunction with an e-commerce Web site.
- Discuss some security issues related to e-commerce sites.
This chapter covers:
- Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns
- Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes
- Possible risks for personal privacy violations due to databases, marketing activities, electronic surveillance, and monitoring, and precautions that can be taken to safeguard one’s privacy
Objectives
- Describe what application software is, the different types of ownership rights, and the difference between installed and Web-based software.
- Detail some concepts and commands that many software programs have in common.
- Discuss word processing and explain what kinds of documents are created using this type of program.
- Explain the purpose of spreadsheet software and the kinds of documents created using this type of program.
- Identify some of the vocabulary used with database software and discuss the benefits of using this type of program.
- Describe what presentation graphics and electronic slide shows are and when they might be used.
- List some types of graphics and multimedia software consumers frequently use.
- Name other types of application software programs and discuss what functions they perform.
Advance communication through red tacton human area networking technology Pawan Sharma
WELCOME TO OUR PRESENTATION Its our great pleasure to presenting a paper at the NATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION IN ENGINEERING EDUCATION (NCHCIEE -2013) Organized by : Jahwaharlal institute of technology, borawa , dist khargone M.P Presented by : Mr. Pawan sharma Proff . Lokesh mehta Mr. Lokendre singh rathore (From SPITM, Mandleshwar dist khargone . M.p )
Advance Communication through Red Tacton -Human Area Networking Technology: Presented by : Mr. Pawan Sharma Proff . Lokesh mehta Mr. Lokendra Singh Rathore Advance Communication through Red Tacton -Human Area Networking Technology Dept. of Electronics & Communication
Bluetooth, infrared etc. were the most commonly used techniques for data transmission.
But these short-range wireless communication systems have some problems of packet collisions and it can be reduce by RED-TECTON.
The ultimate human area network solution to all these constraints of conventional technologies is “intra body” communication, in which the human body serves as the transmission medium.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
Objectives
- Understand the difference between system software and application software.
- Explain the different functions of an operating system and discuss some ways that operating systems can enhance processing efficiency.
- List several ways in which operating systems differ from one another.
- Name today’s most widely used operating systems for personal computers and servers.
-State several devices other than personal computers and servers that require an operating system and list one possible operating system for each type of device.
- Discuss the role of utility programs and outline several tasks these programs perform.
- Describe what the operating systems of the future might be like.
This Slides covers:
Introduction to world of Computers, Basic Structure of Computer System, Computers in Home (Reference, Education & Communications, Entertainment an Digital Media Delivery, Smart Appliances, Home Computers), Computers in Education, Computers in workplace (productivity and decision making, customer services, communications), Computers on the move (Portable and Hand held computers, Self-Service kiosks, GPS Applications), Generation of Computer, Types of Computer (Size and Technology wise), Support Systems - Hardware and Software, Computer Peripherals, Memory Management.
Computer Defined, Features of a Modern Digital Computer, Application areas of Computers, Evolution of Computers, Building Blocks, Representation of Data, Number Systems, Computer Software, Computer Networks, Internet and WWW, Email
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Learning Objectives
1. Explain why it is essential to learn about computers today
and discuss several ways computers are integrated into our
business and personal lives.
2. Define a computer and describe its primary operations.
3. List some important milestones in computer evolution.
4. Identify the major parts of a personal computer, including
input, processing, output, storage, and communications
hardware.
5. Define software and understand how it is used to instruct the
computer what to do.
Understanding Computers: Today and Tomorrow, 14th Edition
2
2
3. Learning Objectives
6. List the six basic types of computers, giving at least one
example of each type of computer and stating what that
computer might be used for.
7. Explain what a network, the Internet, and the World Wide
Web are, as well as how computers, people, and Web pages
are identified on the Internet.
8. Describe how to access a Web page and navigate through a
Web site.
9. Discuss the societal impact of computers, including some
benefits and risks related to their prominence in our society.
Understanding Computers: Today and Tomorrow, 14th Edition
3
4. Overview
• This chapter covers:
– What computers are, how they work, and how they are
used
– Computer terminology
– An overview of the history of computers
– The basic types of computers in use today
– An overview of networks and the Internet
– Societal impacts of computers
Understanding Computers: Today and Tomorrow, 14th Edition
4
4
5. Computers in Your Life
• Why learn about computers?
– Pervasive computing
• Also known as ubiquitous computing
• Computers have become an integral part of our lives
– Basic computer literacy
• Knowing about and understanding computers and their
uses is an essential skill today for everyone
Understanding Computers: Today and Tomorrow, 14th Edition
5
6. Computers in Your Life
• Before 1980
– Computers were large, expensive
– Very few people had access to them
– Computers were mostly used for high-volume
processing tasks
• Microcomputers in the early 80s
– Inexpensive personal computers
– Computer use increased dramatically
Understanding Computers: Today and Tomorrow, 14th Edition
6
7. Computers in Your Life
• Today
– More than 80% of US households include a computer, and
most use computers at work
– Electronic devices are converging into single units with
multiple capabilities
• Computer is no longer an isolated productivity tool
• Check e-mail on living room television
• View internet content on mobile phone or other mobile
device
– Computer literacy
• Knowing about and understanding computers and their
uses is an essential skill for everyone
Understanding Computers: Today and Tomorrow, 14th Edition
7
8. Computers in the Home
• Computers used for a variety of tasks:
– Looking up information and news
– Exchanging e-mail
– Shopping and paying bills
– Watching TV and videos
– Downloading music and movies
– Organizing digital photographs
– Playing games
– Making vacation plans
Understanding Computers: Today and Tomorrow, 14th Edition
8
9. Computers in the Home
• Wireless networking
– Computers can be used in nearly any location
• Smart appliances
– Traditional appliances with built-in computer or
communication technology
• Smart homes
– Household tasks are monitored and controlled by a main
computer in the house
Understanding Computers: Today and Tomorrow, 14th Edition
9
10. Computers in the Home
Understanding Computers: Today and Tomorrow, 14th Edition
10
11. Computers in Education
• Youth today can be called the computing generation
• Most students today have access to computers at school
– Some schools integrate e-books into the curriculum
• Colleges and universities are even more integrated
– Wireless hotspots allow usage of personal laptops to
connect to the college network
– Some colleges require a computer for enrollment
• Distance learning
– Students participate from locations other than the
traditional classroom setting using computers and Internet
access
Understanding Computers: Today and Tomorrow, 14th Edition
11
13. Computers on the Job
• Computers have become a universal on-the-job tool for
decision-making, productivity, and communication
– Used by all types of employees
– Used for access control and other security measures
– Use by service professionals is growing
– Used extensively by the military
– Employees in all lines of work need to continually refresh
their computer skills
Understanding Computers: Today and Tomorrow, 14th Edition
13
14. Computers on the Job
Understanding Computers: Today and Tomorrow, 14th Edition
14
15. Computers on the Go
• Computers are encountered in nearly every aspect of daily life
– Consumer kiosks
– ATM transactions
– POS systems at retail stores
– Self-checkout systems
– Consumer authentication systems
– Portable computers or mobile devices
– GPS systems
Understanding Computers: Today and Tomorrow, 14th Edition
15
16. What Is a Computer and What Does
It Do?
• Computer
– A programmable, electronic device that accepts
data, performs operations on that data, and stores the
data or results as needed
– Computers follow instructions, called programs, which
determine the tasks the computer will perform
• Basic operations
– Input: Entering data into the computer
– Processing: Performing operations on the data
– Output: Presenting the results
– Storage: Saving data, programs, or output for future use
– Communications: Sending or receiving data
Understanding Computers: Today and Tomorrow, 14th Edition
16
17. What Is a Computer and What Does
It Do?
Understanding Computers: Today and Tomorrow, 14th Edition
17
18. Data vs. Information
• Data
– Raw, unorganized facts
– Can be in the form of text, graphics, audio, or video
• Information
– Data that has been processed into a meaningful form
• Information processing
– Converting data into information
Understanding Computers: Today and Tomorrow, 14th Edition
18
19. Computers Then and Now
• The computer as we know it is a fairly recent invention
• The history of computers is often referred to in terms of
generations
• Each new generation is characterized by a major technological
development
• Precomputers and early computers (before 1946)
– Abacus, slide rule, mechanical calculator
– Punch Card Tabulating Machine and Sorter
Understanding Computers: Today and Tomorrow, 14th Edition
19
20. Computers Then and Now
Understanding Computers: Today and Tomorrow, 14th Edition
20
21. Computers Then and Now
• First-generation computers (1946-1957)
– Enormous and powered by vacuum tubes
– Used a great deal of electricity and generated a lot of heat
– ENIAC and UNIVAC
• Second-generation computers (1958-1963)
– Used transistors
– Computers were smaller, more powerful, cheaper, more
energy-efficient, and more reliable
– Punch cards and magnetic tape were used to input and
store data
Understanding Computers: Today and Tomorrow, 14th Edition
21
22. Computers Then and Now
Understanding Computers: Today and Tomorrow, 14th Edition
22
23. Computers Then and Now
• Third-generation computers (1964-1970)
– Used integrated circuits (ICs)
– Keyboards and monitors introduced
• Fourth-generation computers (1971-present)
– Use microprocessors
– IBM PC, Apple Macintosh
– Use keyboards, mice, monitors, and printers
– Use magnetic disks, flash memory, and optical disks for
storage
– Computer networks, wireless technologies, Internet
introduced
Understanding Computers: Today and Tomorrow, 14th Edition
23
24. Computers Then and Now
Understanding Computers: Today and Tomorrow, 14th Edition
24
25. Computers Then and Now
• Fifth-generation (now and the future)
– Infancy stage
– No precise classification
– May be based on artificial intelligence (AI)
– Will likely use voice and touch input
– May be based on optical computers and utilize
nanotechnology
Understanding Computers: Today and Tomorrow, 14th Edition
25
26. Hardware
• Hardware: The physical parts of a computer
– Internal hardware
• Located inside the main box (system unit) of the
computer
– External hardware
• Located outside the system unit
• Connect to the computer via a wired or wireless
connection
– Hardware devices are associated with all five computer
operations
Understanding Computers: Today and Tomorrow, 14th Edition
26
27. Hardware
• Input devices
– Used to input data into the computer
– Keyboards, mice, scanners, cameras, microphones, joystick
s, touch pads, touch screens, fingerprint readers, etc.
• Processing devices
– Perform calculations and control computer’s operation
– Central processing unit (CPU) and memory
• Output devices
– Present results to the user
– Monitors, printers, speakers, projectors, etc.
Understanding Computers: Today and Tomorrow, 14th Edition
27
28. Hardware
• Storage devices
– Used to store data on or access data from storage media
– Hard drives, CD/DVD discs and drives, USB flash drives, etc.
• Communications devices
– Allow users to communicate with others and to
electronically access remote information
– Modems, network adapters, etc.
Understanding Computers: Today and Tomorrow, 14th Edition
28
30. Software
• Software
– The programs or instructions used to tell the computer
hardware what to do
• System software
– Operating system starts up the computer and controls its
operation
– Without OS, computer cannot function
– Boots the computer and launches programs at the user’s
direction
– Most use a GUI to interact with the user via
windows, icons, menus, buttons, etc.
– Windows, Mac OS, Linux, etc.
Understanding Computers: Today and Tomorrow, 14th Edition
30
35. Computer Users and Professionals
• Computer users (end users)
– People who use a computer to obtain information
• Computer professionals include:
– Programmers
• Write programs computers use
– Systems analysts
• Design computer systems
– Computer operations personnel
• Manage day-to-day computer operations
– Security specialists
• Secure computers and networks against hackers
Understanding Computers: Today and Tomorrow, 14th Edition
35
36. Quick Quiz
1. Which of the following was not a first generation computer?
a. IBM PC
b. UNIVAC
c. ENIAC
2. True or False: A window displayed when the computer needs
more information from the user is called a dialog box.
3. Speakers are an example of a(n) _____________ device.
Answers:
1) a; 2) True; 3) output
Understanding Computers: Today and Tomorrow, 14th Edition
36
37. Computers To Fit Every Need
• Six basic categories of computers:
– Embedded computers
– Mobile devices
– Personal computers
– Midrange servers
– Mainframe computers
– Supercomputers
Understanding Computers: Today and Tomorrow, 14th Edition
37
38. Embedded Computers
• Embedded computer
– Embedded into a product and designed to perform specific
tasks or functions for that product
– Cannot be used as general-purpose computers
– Often embedded into:
• Household appliances
• Thermostats
• Sewing machines
• A/V equipment
• Answering machines
• Cars
Understanding Computers: Today and Tomorrow, 14th Edition
38
39. Mobile Devices
• Mobile device
– A very small device with some type of built-in computing
or Internet capability
– Often based on a mobile phone
– Typically have small screens and keyboards
– Examples:
• Smartphones
• Handheld gaming devices
• Portable digital media players
• Mobile tablets
Understanding Computers: Today and Tomorrow, 14th Edition
39
40. Personal Computers
• Personal computer
– Small computer designed to be used by one person at a time
– Also called a microcomputer
– Available in different sizes and shapes
• Desktop computers
– Fit on or next to a desk
– Can use tower case, desktop case, or all-in-one
– Can be PCcompatible or
Macintosh
– Not designed to be
portable
Understanding Computers: Today and Tomorrow, 14th Edition
40
41. Portable Computers
• Portable Computers
– Designed to be carried around easily
– Fully functional computers
– Notebook (laptop) computers
• Typically use a clamshell design
– Tablet Computers
• Usually use a digital pen/stylus or touch screen
• Can be slate or convertible tablets
Understanding Computers: Today and Tomorrow, 14th Edition
41
42. Portable Computers
– Netbooks
• Smaller, lighter, and less expensive than conventional
notebooks
• Longer battery life
• Good for students and business travelers
Understanding Computers: Today and Tomorrow, 14th Edition
42
43. Thin Client and Internet Appliances
• Thin client or network computer (NC)
– Device designed to access a network for processing and
data storage
– Lower cost, increased security and easier maintenance
– Limited or no local storage
– Not able to function as a computer if network is down
• Internet appliance
– Specialized network computer designed for Internet access
and/or e-mail exchange
– Some designed to be used in the home
Understanding Computers: Today and Tomorrow, 14th Edition
43
44. Thin Client and Internet Appliances
– Can be built into another product such as a
refrigerator or telephone console
– Can be a stand-alone device
– Can include Internet-enabled gaming consoles
Understanding Computers: Today and Tomorrow, 14th Edition
44
45. Midrange Servers
• Midrange server
– A medium-sized computer used to host programs and data
for a small network
– Sometimes referred to as a microcomputer
– Users connect via a network with a
computer, thin client, or dumb terminal
– May consist of a collection
of individual circuit boards
called blades
– Virtualization
• Creating virtual rather than
actual environments (often
used to share a server
for increased efficiency)
Understanding Computers: Today and Tomorrow, 14th Edition
45
46. Mainframe Computers
• Mainframe computer
– Powerful computer used by many large organizations to
manage large amounts of centralized data
– Standard choice for hospitals, universities, large
businesses, banks, government offices
– Located in climate-controlled data centers and connected
to the rest of the company computers via a network
– Larger, more expensive, and more powerful than midrange
servers
– Usually operate 24 hours a day
– Also called high-end servers or enterprise-class servers
Understanding Computers: Today and Tomorrow, 14th Edition
46
48. Supercomputers
• Supercomputer
– Fastest, most expensive, most powerful type of computer
– Generally run one program at a time, as fast as possible
– Commonly built by connecting hundreds of smaller
computers, supercomputing cluster
– Used for space exploration, missile
guidance, satellites, weather forecast, oil
exploration, scientific research, complex Web
sites, decision support systems, 3D applications, etc.
Understanding Computers: Today and Tomorrow, 14th Edition
48
50. Quick Quiz
1. A tablet PC is an example of a(n) _____________.
a. Desktop computer
b. Portable PC
c. Internet appliance
2. True or False: The terms mainframe computer and
supercomputer are interchangeable; both refer to the
largest, most powerful computers.
3. A smartphone is an example of a(n) _____________.
Answers:
1) b; 2) False; 3) mobile device
Understanding Computers: Today and Tomorrow, 14th Edition
50
51. Computer Networks and the Internet
• Computer network
– A collection of hardware and other devices that are
connected together
– Users can share hardware, software, and data
– Users can communicate with each other
• Network servers
– Manage resources on a network
Understanding Computers: Today and Tomorrow, 14th Edition
51
52. Computer Networks and the
Internet
• Computer networks exist in many sizes and types
– Home networks
– School and small business networks
– Large corporate
– Public wireless networks
– The Internet
Understanding Computers: Today and Tomorrow, 14th Edition
52
53. Computer Networks and the
Internet
Understanding Computers: Today and Tomorrow, 14th Edition
53
54. What are the Internet and the
World Wide Web?
• Internet
– The largest and most well-known computer network in the
world
– Individuals connect to the Internet using an Internet
service provider (ISP)
• World Wide Web
– One resource (a vast collection of Web pages) available
through the Internet
– Web sites contain Web pages stored on Web servers
– Web pages viewed using a Web browser (Internet
Explorer, Chrome, Safari, Firefox, Opera, etc.)
– A wide variety of information is available through the Web
Understanding Computers: Today and Tomorrow, 14th Edition
54
55. What are the Internet and the
World Wide Web
Understanding Computers: Today and Tomorrow, 14th Edition
55
56. Accessing a Network or the
Internet
• Need a modem or network adapter to connect
• Some networks require a username and password
• Internet connections can be:
– Direct (always-on) connections
– Dial-up connections
• Internet addresses are used to access resources on the
Internet
– IP (Internet Protocol) address
• Numeric address that identifies computers
(207.46.197.32)
Understanding Computers: Today and Tomorrow, 14th Edition
56
57. Accessing a Network or the
Internet
– IP addresses and domain names
• Text-based address that identifies computers
(microsoft.com)
– Uniform resource locators (URLs)
• Identify Web pages
(http://twitter.com/jobs/index.html)
– E-mail addresses
• Identifies people for e-mail exchange
(jsmith@cengage.com)
Understanding Computers: Today and Tomorrow, 14th Edition
57
58. IP Addresses and Domain
Names
• IP addresses are numeric and unique
• Domain names
– Correspond to IP addresses
– Top-level domains (TLDs)
identifies type of organization
or its location
– Custom TLDs may soon be
allowed
Understanding Computers: Today and Tomorrow, 14th Edition
58
59. Uniform Resource Locators
(URLs)
• Uniform Resource Locators (URLs)
– Uniquely identifies a Web page
• Protocol or standard being used
• Identification of the Web server
• Names of folders in which the Web page file is stored
• Web page’s filename
Understanding Computers: Today and Tomorrow, 14th Edition
59
60. Uniform Resource Locators
(URLs)
• Protocols:
– Hypertext Transfer Protocol (http://) is typically used to
display Web pages (https:// is used for secure Web pages)
– File Transfer Protocol (ftp://) is often used for file exchange
Understanding Computers: Today and Tomorrow, 14th Edition
60
61. E-mail Addresses
• E-mail addresses consist of:
– Username
• A person’s identifying name for a particular domain
– The @ symbol
– Domain name for the computer that will be handling the
person’s e-mail (mail server)
• Pronouncing Internet addresses
Understanding Computers: Today and Tomorrow, 14th Edition
61
62. Surfing the Web
• Web browser
– Used to display Web pages
• Browser starting page or home page
– The first page displayed when the browser is opened
• To navigate to a Web page, you can:
– Type a URL in the Address bar
– Click a hyperlink –graphics or text linked to other Web
pages
– Select a Favorite/Bookmark or page from the History list
Understanding Computers: Today and Tomorrow, 14th Edition
62
64. Searching the Web
• Search site:
• Web page that helps you find Web
pages containing the information
you are seeking
– Typically search using keywords
• Reference Sites
– Look up addresses,
telephone numbers, ZIP codes,
maps, etc.
Understanding Computers: Today and Tomorrow, 14th Edition
64
65. E-Mail
• Electronic mail (e-mail)
– Electronic messages exchanged between computers on a
network
– One of the most widely used Internet applications
– Can be conventional e-mail program, Web-based, or
mobile-based
Conventional
Web-based
Microsoft Outlook
Gmail
Microsoft Mail
Windows Live Mail
Understanding Computers: Today and Tomorrow, 14th Edition
65
66. E-Mail
– Can contain photos, attached files, etc.
– Mobile e-mail may require a fee
– Other types of mobile communications
• Short Message Service (SMS)
• Multimedia Message Service (MMS)
Understanding Computers: Today and Tomorrow, 14th Edition
66
68. Computers and Society
• The vast improvements in technology over the past decade
have had a distinct impact on daily life, both at home and at
work
• Many benefits of a computer-oriented society
– Ability to design products before construction leads to
safer products
– Earlier medical diagnoses and more effective treatment
– Devices that allow physically and/or visually challenged
individuals to perform job tasks
– Documents e-mailed or faxed in moments
– Download information, music, programs, movies, and
more on demand
Understanding Computers: Today and Tomorrow, 14th Edition
68
69. Computers and Society
• Computer-oriented society also has risks
– Stress and health concerns
– Spam
– Computer viruses and malware
– Identity theft and phishing
– Privacy issues
• How data is collected
• How secure is the collected data
Understanding Computers: Today and Tomorrow, 14th Edition
69
70. Computers and Society
• Differences in online communications
– Less formal than traditional
– Netiquette
• Be polite and considerate of others
• Refrain from offensive remarks
– Abbreviations (acronyms) and emoticons
• Acronyms such as BTW (by the way)
• Illustrations of faces--
Understanding Computers: Today and Tomorrow, 14th Edition
70
72. Computers and Society
• The Anonymity Factor
– Gives many individuals a sense of freedom
– Can also be abused
• Information Integrity
– Use common sense when evaluating online content
– Check your source--not all information on the Internet
is accurate
Understanding Computers: Today and Tomorrow, 14th Edition
72
73. Quick Quiz
1. Index.html is an example of a(n) _____________.
a. URL
b. IP address
c. Web page filename
2. True or False: All information published to Web pages is
accurate.
3. In the e-mail address jsmith@abc.com, abc.com is the
_____________.
Answers:
1) c; 2) False; 3) domain name
Understanding Computers: Today and Tomorrow, 14th Edition
73
74. Summary
•
•
•
•
•
Computers in Your Life
What is a Computer and What Does It Do?
Computers to Fit Every Need
Computer Networks and the Internet
Computers and Society
Understanding Computers: Today and Tomorrow, 14th Edition
74