This chapter introduces computers and their role in society. It discusses how computers have become integrated into our personal and professional lives for tasks like communication, education, entertainment and business. The chapter then describes what a computer is and its basic components - input, processing, output, storage and communication. It provides an overview of the evolution of computers from the earliest mechanical devices to modern electronic computers. It also defines the different types of computers and discusses computer networks and the Internet. Finally, it examines the societal impacts of the growing prominence of computers.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
Objectives
- Understand the difference between system software and application software.
- Explain the different functions of an operating system and discuss some ways that operating systems can enhance processing efficiency.
- List several ways in which operating systems differ from one another.
- Name today’s most widely used operating systems for personal computers and servers.
-State several devices other than personal computers and servers that require an operating system and list one possible operating system for each type of device.
- Discuss the role of utility programs and outline several tasks these programs perform.
- Describe what the operating systems of the future might be like.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...yaminohime
This chapter covers:
The evolution of the Internet
The Internet community
Different options for connecting to the Internet
Internet searching
Common Internet applications available via the Internet
Societal issues that apply to Internet use
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
This chapter covers:
- Common networking and communications applications
- Networking concepts and terminology
- Technical issues related to networks, including general characteristics of data transmission, and types of transmission media in use today
- Explanation of the various communications protocols and networking standards
- Various types of hardware used with a computer network
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
Objectives
- Understand the difference between system software and application software.
- Explain the different functions of an operating system and discuss some ways that operating systems can enhance processing efficiency.
- List several ways in which operating systems differ from one another.
- Name today’s most widely used operating systems for personal computers and servers.
-State several devices other than personal computers and servers that require an operating system and list one possible operating system for each type of device.
- Discuss the role of utility programs and outline several tasks these programs perform.
- Describe what the operating systems of the future might be like.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...yaminohime
This chapter covers:
The evolution of the Internet
The Internet community
Different options for connecting to the Internet
Internet searching
Common Internet applications available via the Internet
Societal issues that apply to Internet use
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
This chapter covers:
- Common networking and communications applications
- Networking concepts and terminology
- Technical issues related to networks, including general characteristics of data transmission, and types of transmission media in use today
- Explanation of the various communications protocols and networking standards
- Various types of hardware used with a computer network
overview:-
This chapter covers:
What computers are, how they work, and how they are used
Computer terminology
An overview of the history of computers
The basic types of computers in use today
How to access resources on the Internet
Societal impacts of computers
Why learn about computers?
Pervasive computing
Also known as ubiquitous computing
Computers have become an integral part of our lives
Basic computer literacy
Understanding what a computer is and how it works
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
This chapter covers:
- How information systems are used and who uses them
- Common types of information systems
- Computer professionals who develop systems and their primary responsibilities
- The system development life cycle (SDLC)
- The major approaches to system development
overview:-
This chapter covers:
What computers are, how they work, and how they are used
Computer terminology
An overview of the history of computers
The basic types of computers in use today
How to access resources on the Internet
Societal impacts of computers
Why learn about computers?
Pervasive computing
Also known as ubiquitous computing
Computers have become an integral part of our lives
Basic computer literacy
Understanding what a computer is and how it works
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
This chapter covers:
- How information systems are used and who uses them
- Common types of information systems
- Computer professionals who develop systems and their primary responsibilities
- The system development life cycle (SDLC)
- The major approaches to system development
This Slides covers:
Introduction to world of Computers, Basic Structure of Computer System, Computers in Home (Reference, Education & Communications, Entertainment an Digital Media Delivery, Smart Appliances, Home Computers), Computers in Education, Computers in workplace (productivity and decision making, customer services, communications), Computers on the move (Portable and Hand held computers, Self-Service kiosks, GPS Applications), Generation of Computer, Types of Computer (Size and Technology wise), Support Systems - Hardware and Software, Computer Peripherals, Memory Management.
Computer Defined, Features of a Modern Digital Computer, Application areas of Computers, Evolution of Computers, Building Blocks, Representation of Data, Number Systems, Computer Software, Computer Networks, Internet and WWW, Email
This chapter covers:
- Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns
- Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes
- Possible risks for personal privacy violations due to databases, marketing activities, electronic surveillance, and monitoring, and precautions that can be taken to safeguard one’s privacy
This chapter covers:
- The most common approaches to program design and development
- The phases of the program development life cycle (PDLC)
- Tools that can be used to design and develop a program
- Good program design techniques and types of program errors
- Common programming languages
Objectives
- Explain what e-commerce is and describe some of the advantages and disadvantages involved with implementing e-commerce.
- Identify a variety of e-commerce business models and discuss their differences.
- Discuss the types of Web sites that can be used to implement e-commerce.
- List several strategies for implementing e-commerce using the Web, including some of the decisions that need to be made, the options available for accepting payments, and the process of designing and developing an effective Web site.
- Outline some sales and marketing strategies that can be used in conjunction with an e-commerce Web site.
- Discuss some security issues related to e-commerce sites.
This chapter covers:
- What Web-based multimedia is and how it is used today
- The advantages and disadvantages of using multimedia
- A look at basic multimedia elements
- Steps and principles in designing a multimedia site
- How a multimedia Web site is developed and the software used during this process
- A look at the future of Web-based multimedia
Objectives
- Describe what application software is, the different types of ownership rights, and the difference between installed and Web-based software.
- Detail some concepts and commands that many software programs have in common.
- Discuss word processing and explain what kinds of documents are created using this type of program.
- Explain the purpose of spreadsheet software and the kinds of documents created using this type of program.
- Identify some of the vocabulary used with database software and discuss the benefits of using this type of program.
- Describe what presentation graphics and electronic slide shows are and when they might be used.
- List some types of graphics and multimedia software consumers frequently use.
- Name other types of application software programs and discuss what functions they perform.
Ito yung isa sa mga binasa naman nung nasa highschool. Originally Japanese siya, trinanslate sa Tagalog. Kwento siya ng dalawang bulag na naisipang mamasyal at may isang epal na sinira ang pagkakaibigan nila.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Understanding Computers: Today and Tomorrow, 13th Edition
2
Learning Objectives
1. Explain why it is essential to learn about computers
today and discuss several ways computers are
integrated into our business and personal lives.
2. Define a computer and describe its primary
operations.
3. List some important milestones in computer
evolution.
4. Identify the major parts of a personal computer,
including input, processing, output, storage, and
communications hardware.
5. Define software and understand how it is used to
instruct the computer what to do.
3. Understanding Computers: Today and Tomorrow, 13th Edition
Learning Objectives
6. List the six basic types of computers, giving at least
one example of each type of computer and stating
what that computer might be used for.
7. Explain what a network, the Internet, and the World
Wide Web are, as well as how computers, people,
and Web pages are identified on the Internet.
8. Describe how to access a Web page and navigate
through a Web site.
9. Discuss the societal impact of computers, including
some benefits and risks related to their prominence in
our society.
4. Understanding Computers: Today and Tomorrow, 13th Edition
4
Overview
• This chapter covers:
– What computers are, how they work, and how
they are used
– Computer terminology
– An overview of the history of computers
– The basic types of computers in use today
– An overview of networks and the Internet
– Societal impacts of computers
5. Understanding Computers: Today and Tomorrow, 13th Edition
5
Computers in Your Life
• Why learn about computers?
– Pervasive computing
• Also known as ubiquitous computing
• Computers have become an integral part of our
lives
– Basic computer literacy
• Knowing about and understanding computers
and their uses is an essential skill today for
everyone
6. Understanding Computers: Today and Tomorrow, 13th Edition
6
Computers in Your Life
• Before 1980
– Computers were large, expensive
– Very few people had access to them
– Computers were mostly used for high-volume processing
tasks
• Microcomputers in the early 80s
– Inexpensive personal computers
– Computer use increased dramatically
• Today
– More than 80% of US households include a computer, and
most use computers at work
– Electronic devices are converging into single units with
multiple capabilities
7. Understanding Computers: Today and Tomorrow, 13th Edition
7
Computers in the Home
• Computers used for a variety of tasks:
– Looking up information and news
– Exchanging e-mail
– Shopping and paying bills
– Watching TV and videos
– Downloading music and movies
– Organizing digital photographs
– Playing games
– Telecommuting
8. Understanding Computers: Today and Tomorrow, 13th Edition
8
Computers in the Home
• Convergence
– The computer has become the central part of
home entertainment
– Dual-mode mobile phones
• Wireless networking
– Computers can be used in nearly any location
• Smart appliances
– Traditional appliances with built-in computer or
communication technology
• Smart homes
– Household tasks are monitored and controlled by
a main computer in the house
10. Understanding Computers: Today and Tomorrow, 13th Edition
10
Computers in Education
• Many students today have access to computers
either in a classroom or a computer lab
• Colleges and universities are even more integrated
– Wireless hotspots allow usage of personal laptops
to connect to the college network
– Some colleges require a computer for enrollment
• Distance learning
– Students participate from locations other than the
traditional classroom setting using computers and
Internet access
12. Understanding Computers: Today and Tomorrow, 13th Edition
12
Computers on the Job
• Computers have become a universal on-the-job tool
for decision-making, productivity, and communication
– Used by all types of employees
– Used for access control and other security
measures
– Use by service professionals is growing
– Used extensively by the military
– Employees in all lines of work need to continually
refresh their computer skills
14. Understanding Computers: Today and Tomorrow, 13th Edition
14
Computers on the Go
• Computers are encountered in nearly every aspect of
daily life
– Consumer kiosks
– ATM transactions
– POS systems at retail stores
– Self-checkout systems
– Portable computers or mobile devices
– M-commerce systems
– GPS systems
16. Understanding Computers: Today and Tomorrow, 13th Edition
16
What Is a Computer and What Does It Do?
• Computer: A programmable, electronic device that
accepts data, performs operations on that data, and
stores the data or results as needed
– Computers follow instructions, called programs, which
determine the tasks the computer will perform
• Basic operations
– Input: Entering data into the computer
– Processing: Performing operations on the data
– Output: Presenting the results
– Storage: Saving data, programs, or output for future
use
– Communications: Sending or receiving data
18. Understanding Computers: Today and Tomorrow, 13th Edition
18
Data vs. Information
• Data
– Raw, unorganized facts
– Can be in the form of text, graphics, audio, or
video
• Information
– Data that has been processed into a meaningful
form
• Information processing
– Converting data into information
19. Understanding Computers: Today and Tomorrow, 13th Edition
19
Computers Then and Now
• The computer as we know it is a fairly recent
invention
• The history of computers is often referred to in terms
of generations
• Each new generation is characterized by a major
technological development
• Precomputers and early computers (before 1946)
– Abacus, slide rule, mechanical calculator
– Punch Card Tabulating Machine and Sorter
19
20. Understanding Computers: Today and Tomorrow, 13th Edition
20
Computers Then and Now
• First-generation computers (1946-1957)
– Enormous and powered by vacuum tubes
– Used a great deal of electricity, and generated a
lot of heat
– ENIAC and UNIVAC
• Second-generation computers (1958-1963)
– Used transistors
– Computers were smaller, more powerful, cheaper,
more energy-efficient, and more reliable
– Punch cards and magnetic tape were used to
input and store data
21. Understanding Computers: Today and Tomorrow, 13th Edition
21
Computers Then and Now
• Third-generation computers (1964-1970)
– Used integrated circuits (ICs)
– Keyboards and monitors introduced
• Fourth-generation computers (1971-present)
– Use microprocessors
– IBM PC, Apple Macintosh
– Use keyboards, mice, monitors, and printers
– Use magnetic disks, flash memory, and optical
disks for storage
– Computer networks, wireless technologies,
Internet introduced
22. Understanding Computers: Today and Tomorrow, 13th Edition
22
Computers Then and Now
• Fifth-generation (now and the future)
– Infancy stage
– No precise classification
– May be based on artificial intelligence (AI)
– Likely use voice and touch input
– May be based on optical computers and utilize
nanotechnology
24. Understanding Computers: Today and Tomorrow, 13th Edition
24
Hardware
• Hardware: The physical parts of a computer
– Internal hardware
• Located inside the main box (system unit) of
the computer
– External hardware
• Located outside the system unit
• Connect to the computer via a wired or wireless
connection
– There is hardware associated with all five
computer operations
26. Understanding Computers: Today and Tomorrow, 13th Edition
26
Hardware
• Input devices
– Used to input data into the computer
– Keyboards, mice, scanners, cameras,
microphones, joysticks, touch pads, touch
screens, fingerprint readers, etc.
• Processing devices
– Perform calculations and control computer’s
operation
– Central processing unit (CPU) and memory
• Output devices
– Present results to the user
– Monitors, printers, speakers, projectors, etc.
27. Understanding Computers: Today and Tomorrow, 13th Edition
27
Hardware
• Storage devices
– Used to store data on or access data from storage
media
– Hard drives, CD/DVD discs and drives, USB flash
drives, etc.
• Communications devices
– Allow users to communicate with others and to
electronically access remote information
– Modems, network adapters, etc.
29. Understanding Computers: Today and Tomorrow, 13th Edition
29
Software
• Software: The programs or instructions used to tell
the computer hardware what to do
– System software: Operating system starts up the
computer and controls its operation
• Without OS computer cannot function
• Boots the computer and launches programs at
the user’s direction
• Most use a GUI to interact with the user via
windows, icons, menus, buttons, etc.
• Windows, Mac OS, Linux, etc.
33. Understanding Computers: Today and Tomorrow, 13th Edition
33
Computer Users and Professionals
• Computer users (end users): People who use a
computer to obtain information
• Computer professionals include:
– Programmers
– Systems analysts
– Computer operations personnel
– Security specialists
34. Understanding Computers: Today and Tomorrow, 13th Edition
34
Quick Quiz
1. Which of the following was not a first generation
computer?
a. IBM PC
b. UNIVAC
c. ENIAC
2. True or False: A window displayed when the
computer needs more information from the user is
called a dialog box.
3. Speakers are an example of a(n) _____________
device.
Answers:
1) a; 2) True; 3) output
35. Understanding Computers: Today and Tomorrow, 13th Edition
35
Computers to Fit Every Need
• Six basic categories of computers:
– Embedded computers
– Mobile devices
– Personal computers
– Midrange servers
– Mainframe computers
– Supercomputers
36. Understanding Computers: Today and Tomorrow, 13th Edition
36
Embedded Computers
• Embedded computer: Embedded into a product and
designed to perform specific tasks or functions for
that product
• Cannot be used as general-purpose
computers
• Often embedded into:
– Household appliances
– Thermostats
– Sewing machines
– A/V equipment
– Cars
37. Understanding Computers: Today and Tomorrow, 13th Edition
37
Mobile Devices
• Mobile device: A very small device with
some type of built-in computing or
Internet capability
• Typically based on mobile phones
• Typically have small screens and
keyboards
• Examples:
– Smartphones
– Handheld gaming devices
– Portable digital media players
38. Understanding Computers: Today and Tomorrow, 13th Edition
38
Personal Computers (PCs)
• Personal computer: A small computer designed to be
used by one person at a time
– Also called a microcomputer
– Range in size from desktop computers to UMPC’s
• Desktop computers: Fit on or next to a desk
– Can use tower case, desktop case, or all-in-one
– Can be PC-
compatible or
Macintosh
– Not designed to be
portable
39. Understanding Computers: Today and Tomorrow, 13th Edition
39
Portable Computers
• Notebook (laptop) computers: Typically use clamshell
design
• Tablet computers: Can
be slate tablets or
convertible tablets
• Netbooks: Small
notebooks; rapidly
growing type of PC
• Ultra-mobile PCs (UMPCs):
Handheld computers
40. Understanding Computers: Today and Tomorrow, 13th Edition
40
Thin Clients and Internet Appliances
• Thin client or network computer (NC): Device
designed to access a network for processing and
data storage
– Lower cost, increased security and easier
maintenance
– Limited or no local storage
– Not able to function as a computer if network is
down
• Internet appliance: Specialized network computer
designed for Internet access and/or e-mail exchange
– Often set-top boxes
– Can include Internet-enabled gaming consoles
42. Understanding Computers: Today and Tomorrow, 13th Edition
42
Midrange Servers
• Midrange server: A medium-sized computer used
to host programs and data for a small network
– Users connect via a network with a
computer, thin client, or dumb terminal
– May consist of a collection
of individual circuit boards
called blades
– Virtualization: Creating
virtual environments (often
used to share a server for
increased efficiency)
43. Understanding Computers: Today and Tomorrow, 13th Edition
43
Mainframe Computers
• Mainframe computer: Powerful computer used by
several large organizations to manage large amounts
of centralized data
– Standard choice for large organizations, hospitals,
universities, large businesses, banks, government
offices
– Located in climate-controlled data centers and
connected to the rest of the company computers
via a network
– Larger, more expensive, and more powerful than
midrange servers
– Usually operate 24 hours a day
– Also called high-end servers or enterprise-class
servers
45. Understanding Computers: Today and Tomorrow, 13th Edition
45
Supercomputers
• Supercomputer: Fastest, most expensive, most
powerful type of computer
– Generally run one program at a time, as fast as
possible
– Commonly built by connecting hundreds of smaller
computers, supercomputing cluster
– Used for space exploration, missile guidance,
satellites, weather forecast, oil exploration,
scientific research, complex Web sites, decision
support systems, 3D applications, etc.
47. Understanding Computers: Today and Tomorrow, 13th Edition
47
Quick Quiz
1. A tablet PC is an example of a(n) _____________.
a. Desktop computer
b. Portable PC
c. Internet appliance
2. True or False: The terms mainframe computer and
supercomputer are interchangeable; both refer to
the largest, most powerful computers.
3. A smartphone is an example of a(n) _____________.
Answers:
1) b; 2) False; 3) mobile device
48. Understanding Computers: Today and Tomorrow, 13th Edition
48
Computer Networks and the Internet
• Computer network: A collection of hardware and
other devices that are connected together.
– Users can share hardware, software, and data
– Users can communicate with each other
• Network servers: Manage resources on a network
• Clients: Access resources through the network server
• Computer networks exist in many sizes and types
– Home networks
– School and small business networks
– Large corporate
– Public wireless networks
– The Internet
50. Understanding Computers: Today and Tomorrow, 13th Edition
50
What Are the Internet and the
World Wide Web?
• Internet: The largest and most well-known computer
network in the world
• Individuals connect to the Internet using an Internet
service provider (ISP)
• World Wide Web: One resource (a vast collection of
Web pages) available through the Internet
– Web sites contain Web pages stored on Web
servers
– Web pages viewed using a Web browser (Internet
Explorer, Chrome, Safari, Firefox, Opera, etc.)
• A wide variety of information is available through the
Web
52. Understanding Computers: Today and Tomorrow, 13th Edition
52
Accessing a Network or the Internet
• Need a modem or network adapter
• Some networks require a username and password
• Internet connections can be:
– Direct (always-on) connections
– Dial-up connections
• Internet addresses are used to access resources on
the Internet
– IP address: Numeric address that identifies computers
(207.46.197.32)
– Domain name: Text-based address that identifies
computers (microsoft.com)
– Uniform resource locator (URL): Identifies Web pages
(http://twitter.com/jobs/index.html)
– E-mail address: Identifies people for e-mail exchange
(jsmith@cengage.com)
53. Understanding Computers: Today and Tomorrow, 13th Edition
53
IP Addresses and Domain Names
• IP addresses are numeric and
unique
• Domain names: Correspond to
IP addresses
– Top-level domains (TLDs)
identifies type of organization
or its location
– Custom TLDs may soon be
allowed
54. Understanding Computers: Today and Tomorrow, 13th Edition
54
Uniform Resource Locators (URLs)
• URL: Uniquely identifies a Web page
– Consists of:
• Protocol or standard being used
• Identification of the Web server
• Names of folders in which the Web page file is
stored
• Web page’s filename
• Protocols:
– Hypertext Transfer Protocol (http://) is typically
used to display Web pages (https:// is used for
secure Web pages)
– File Transfer Protocol (ftp://) is often used for file
exchange
56. Understanding Computers: Today and Tomorrow, 13th Edition
56
E-Mail Addresses
• E-mail addresses consist of:
– Username: A person’s identifying name for a
particular domain
– The @ symbol
– Domain name for the computer that will be
handling the person’s e-mail (mail server)
• Pronouncing Internet addresses
57. Understanding Computers: Today and Tomorrow, 13th Edition
57
Surfing the Web
• Web browser: Used to display Web pages
• Browser starting or home page: The first page
displayed when the browser is opened
• To navigate to a Web page, you can:
– Type a URL in the Address bar
– Click a hyperlink on a displayed Web page
– Select a Favorite/Bookmark or page from the
History list
59. Understanding Computers: Today and Tomorrow, 13th Edition
59
Searching the Web
• Search site: Web page that helps you find Web
pages containing the information you are seeking
– Typically search using keywords
• Reference sites:
Look up addresses,
telephone numbers,
ZIP codes, maps,
etc.
60. Understanding Computers: Today and Tomorrow, 13th Edition
60
Online Video
“Searching the Web on Your iPhone”
(click below to start video)
Reminder: The complete set of online videos and video podcasts are available at:
www.cengage.com/computerconcepts/np/uc13
Courtesy of Google Inc.
61. Understanding Computers: Today and Tomorrow, 13th Edition
61
E-Mail
• Electronic mail (e-mail):
electronic messages
exchanged between
computers on a
network
– Can be conventional
or Web-based
– Can contain photos,
attached files, etc.
62. Understanding Computers: Today and Tomorrow, 13th Edition
62
Computers and Society
• The vast improvements in technology over the past
decade have had a distinct impact on daily life, both
at home and at work
• Many benefits of a computer-oriented society:
– Ability to design products before construction
leads to safer products
– Earlier medical diagnoses
– Devices that allow challenged people to perform
job tasks
– Documents e-mailed or faxed in moments
– Download information, music, programs, movies,
and more on demand
63. Understanding Computers: Today and Tomorrow, 13th Edition
Computers and Society
• Computer-oriented society also has risks
– Computer viruses and malware
– Identity theft and phishing
– Privacy issues
• Differences in online communications
– Less formal than traditional
– Netiquette
– Emoticons
• The anonymity factor
• Information Integrity
– Check your source, not all information on the Internet is
accurate.
64. Understanding Computers: Today and Tomorrow, 13th Edition
64
Quick Quiz
1. Index.html is an example of a(n) _____________.
a. URL
b. IP address
c. Web page filename
2. True or False: All information published to Web
pages is accurate.
3. In the e-mail address jsmith@abc.com, abc.com is
the _____________.
Answers:
1) c; 2) False; 3) domain name
65. Understanding Computers: Today and Tomorrow, 13th Edition
65
Summary
• Computers in Your Life
• What Is a Computer and What Does It Do
• Computers to Fit Every Need
• Computer Networks and the Internet
• Computers and Society