SlideShare a Scribd company logo
1 of 24
Computer Science 
Final Project 
WENDY LILE 
OCTOBER 26, 2014 
ITCC121 
PROFESSOR AGALABA
INTRODUCTION 
COMPUTERS 
• Basic Concepts 
• Literacy 
• Algorithms 
COMPUTING SYSTEMS 
• Hardware 
• Architecture 
• Configurations 
OPERATING SYSTEMS 
• Architecture 
• Flow of Control 
NETWORKS 
• Architecture 
• Topologies 
• OSI Model 
INTERNET & THE WORLD WIDE WEB 
• Architecture 
• Flow of Control 
• Contributing Technologies 
BUSINESS PRODUCTIVITY 
• Impact of Software Development 
• Computing Technologies 
SECURITY CONCERNS 
• Online 
• Offline 
TABLE OF CONTENTS
In the Information Age, computers are not only a 
necessity, but have become our way of life. 
Knowing how computers work can create a better 
understanding of their use and their potential 
capabilities. 
This is the field of Computer Science.
COMPUTERS 
Basic Concepts 
• Hardware 
• Software 
• Binary 
• I/O – Input/Output 
• Peripheral devices 
• Data units of measurement: 
• Bit (b) – value is 0 or 1 
• Byte (B) – 8 bits 
• Kilobyte (KB) – thousand 
bytes 
• Megabyte (MB) - million 
bytes
Literacy 
• Word processing 
• Using a browser 
• Search engines 
• Security 
• Internet connectivity 
• Backing up data 
• Recognize good from bad results 
• Use Boolean operators: quotes, “and”, “or”, 
“not”
Algorithms 
Input Program Instructions 
CPU 
Algorithms 
Sort 
Tasks 
Calculate Output
COMPUTING SYSTEMS 
Hardware 
• Central Processing Unit (CPU) 
• Graphics card 
• Hard drive 
• Memory 
Types of memory. Image from HowStuffWorks.com
Hardware 
• Motherboard 
• Optical disk drive 
• Cooling system 
• Case 
• Power supply 
Motherboard. Image from MacBreaker.com
Architecture & Configurations 
#1 – Monitor 
#2 – Motherboard 
#3 – Central processing unit (CPU) 
#4 – Memory 
#5 – Expansion slots 
#6 – Power supply 
#7 – Optical disk drive (ODD) 
#8 – Hard drive 
#9 – Keyboard 
#10 – Mouse 
Computer architecture. Image from Education-Portal.com
Flow of Control 
Computer data flow. Image from University of Liverpool: 
Overview of computer systems 
Solid arrows: Input data
OPERATING SYSTEMS 
Functionality 
Process 
Management 
Memory 
Management 
File & Disk 
Management 
I/O 
Management
Architecture 
3 basic types of operating 
system architectures: 
• Monolithic 
• Layered 
• Microkernel 
Microkernel architecture. Image from TechnologyUK.net
NETWORKS 
Topologies 
Network Topologies
OSI Model 
OSI Model Explained
INTERNET & THE WORLD WIDE WEB 
Architecture 
Local ISP 
Broadband 
Connection 
User Client 1 
High-speed 
Connections 
Backbones 
User Client 2 
Local ISP 
IXP 
IXP 
Web servers 
Mainframes 
Broadband 
Connection
Contributing Technologies 
The very few first connections of the Internet in 1978. Image courtesy of som.csudh.edu
BUSINESS PRODUCTIVITY 
Impact of Software Development 
Types of Information Systems
Computing Technologies 
Productivity in the cloud by Trackvia
SECURITY CONCERNS 
Internet 
Three of the many types of Internet security concerns: 
• Malware 
• Virus 
• Trojan horse 
• Worm 
• Phishing 
• Spyware 
These can lead to stolen money, your 
information sold to attackers, and 
identity theft.
Computer Use 
The three main computer usage safety tips: 
1. Internet security and virus protection program 
2. Desktop firewall 
3. Keep operating system updated 
TIP: Set your operating system to update 
automatically.
The topics covered are Computer science. It is a 
vast and growing field of study. Technology is in 
constant motion. We need to keep up. 
Computer 
WWW 
Hardware 
Software 
Networks 
Internet 
Operating system 
OSI Model 
Network Topologies 
Malware 
Firewall
REFERENCES 
Batra, P. (2010). Types of information system [Online image]. Retrieved from http://lecture-notes-forstudents. 
blogspot.com/2010/04/types-of-information-system.html 
Clker. (n.d.). Mainframe server clip art [Online image]. Retrieved from http://www.clker.com/clipart-mainframe- 
server.html 
Coenan, F. (2005). Overview of computer systems [Online image and article]. Retrieved from 
https://cgi.csc.liv.ac.uk/~frans/OldLectures/COMP101/week1/intro.html 
Computer History. (n.d.). ARPANET Geographic Map [Online image]. Retrieved from 
http://archive.computerhistory.org/resources/still-image/Arpanet/ 
Computer History Museum. (n.d.). Internet History. Retrieved from 
http://www.computerhistory.org/internet_history/ 
Education Portal. (n.d.). What is computer hardware? [Online image]. Retrieved from http://education-portal. 
com/academy/lesson/what-is-computer-components-definitions-examples.html 
Eer, S. (2013). Topologies [Video]. Retrieved from https://www.youtube.com/watch?v=DsPGYvbK8VU 
Fotheringham, N. (2014). Productivity in the cloud [Online image]. Retrieved from 
http://www.trackvia.com/blog/productivity/increase-productivity-switching-cloud 
Freepik. (n.d.). Circuit board icon [Online image]. Retrieved from http://www.flaticon.com/free-icon/ 
circuit-board-with-white-detailed-outlines_22452
REFERENCES 
GoPixPic. (n.d.). Building icon [Online image]. Retrieved from http://www.gopixpic.com/256/building-icon-png/ 
http:||homeinteriorsdesigns*info|wp-content|uploads|building-icon-png*png/ 
Icons-Land. (n.d.). Portable computer icon [Online image]. Retrieved from 
http://www.iconarchive.com/show/vista-hardware-devices-icons-by-icons-land/Portable-Computer-icon. 
html 
IS&T. (n.d.). Top ten safe computing tips. Retrieved from https://ist.mit.edu/security/tips 
James, J. (2012). 10 things you have to know to be computer literate [Web log]. Retrieved from 
http://www.techrepublic.com/blog/10-things/10-things-you-have-to-know-to-be-computer-literate/ 
Lee, D. (2014). Fat cow name servers [Online image]. Retrieved from 
http://www.webhostingreviewjam.com/details/fatcow-name-servers/ 
MacBreaker. (2014). Can I install OS X on my PC? Read this first [Online image]. Retrieved from 
http://www.macbreaker.com/2012/01/is-your-computer-hackintosh-compatible.html 
Ramanayaki, D. (2013). OSI model explained [Video]. Retrieved from 
https://www.youtube.com/watch?v=O_rsqVtaloI 
Search Pictures Icon. (n.d.). Office building icon [Online image]. Retrieved from http://searchpp.com/office-building- 
icon/ 
Som.csudh.edu. (n.d.). ARPANET Maps [Online image]. Retrieved from 
http://som.csudh.edu/fac/lpress/history/arpamaps/
REFERENCES 
TechTerms. (2013). Algorithm definition. Retrieved from http://www.techterms.com/definition/algorithm 
Tyson, J. (2000). How computer memory works [Online image]. Retrieved from 
http://computer.howstuffworks.com/computer-memory.html 
Wells, C.J. (n.d.). OS management functions [Online image and article]. Retrieved from 
http://www.technologyuk.net/computing/operating_systems/os_management_functions.shtml 
Williams, B. & Sawyer, S. (2012). Using information technology, 10th ed. McGraw-Hill.

More Related Content

What's hot

Basics of computer applications
Basics of computer applicationsBasics of computer applications
Basics of computer applicationsPrakash Lambha
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamentalAnkit Sand
 
Operating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputOperating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputPeter Tröger
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specificationKrishnasai Gudavalli
 
Cloud computing in Food Sector
Cloud computing in Food SectorCloud computing in Food Sector
Cloud computing in Food SectorAnuj Jha
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentationashanrajpar
 
Online job portal
Online job portal Online job portal
Online job portal Aj Maurya
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and managementHwanju Kim
 
Computer architecture
Computer architectureComputer architecture
Computer architectureRishabha Garg
 
Generation of computer
Generation of computerGeneration of computer
Generation of computerShami Al Rahad
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentationHarry Singh
 
Different Types of Computer
Different Types of ComputerDifferent Types of Computer
Different Types of Computerlogicgate
 
Application of MapReduce in Cloud Computing
Application of MapReduce in Cloud ComputingApplication of MapReduce in Cloud Computing
Application of MapReduce in Cloud ComputingMohammad Mustaqeem
 
Hospital management system(database)
Hospital management system(database)Hospital management system(database)
Hospital management system(database)Iftikhar Ahmad
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 
Complaint management system
Complaint management systemComplaint management system
Complaint management systemnamanbiltiwala
 
Computer architecture
Computer architectureComputer architecture
Computer architectureZuhaib Zaroon
 

What's hot (20)

Basics of computer applications
Basics of computer applicationsBasics of computer applications
Basics of computer applications
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
Operating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputOperating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / Output
 
computer Architecture
computer Architecturecomputer Architecture
computer Architecture
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Cloud computing in Food Sector
Cloud computing in Food SectorCloud computing in Food Sector
Cloud computing in Food Sector
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Online second hand book store project report
Online second hand book store project reportOnline second hand book store project report
Online second hand book store project report
 
Online job portal
Online job portal Online job portal
Online job portal
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and management
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
 
Different Types of Computer
Different Types of ComputerDifferent Types of Computer
Different Types of Computer
 
Application of MapReduce in Cloud Computing
Application of MapReduce in Cloud ComputingApplication of MapReduce in Cloud Computing
Application of MapReduce in Cloud Computing
 
Hospital management system(database)
Hospital management system(database)Hospital management system(database)
Hospital management system(database)
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Use case of hospital managment system
Use case of hospital managment systemUse case of hospital managment system
Use case of hospital managment system
 
Complaint management system
Complaint management systemComplaint management system
Complaint management system
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 

Viewers also liked

Management case study
Management case studyManagement case study
Management case studyWendy Lile
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1Wendy Lile
 
Presentation project(1)
Presentation project(1)Presentation project(1)
Presentation project(1)cegonsoft1999
 
Bringing the Social Media Revolution to Health Care
Bringing the Social Media Revolution to Health CareBringing the Social Media Revolution to Health Care
Bringing the Social Media Revolution to Health CareMayo Clinic
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2lallen92
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizingguest2edb405
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshopjoelk
 
Alaska
AlaskaAlaska
Alaskanandav
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30nandav
 
Final proposal -_masters_in_education__technology__submitted_may_26
Final proposal -_masters_in_education__technology__submitted_may_26Final proposal -_masters_in_education__technology__submitted_may_26
Final proposal -_masters_in_education__technology__submitted_may_26haramaya university
 
Final Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideFinal Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideSuhailan Safei
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop BasicsAllieW
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeWendy Lile
 
HTML & CSS: Chapter 04
HTML & CSS: Chapter 04HTML & CSS: Chapter 04
HTML & CSS: Chapter 04Steve Guinan
 
Final year computer science project |
Final year computer science project | Final year computer science project |
Final year computer science project | cegon12
 
Create a Website in Less than 2 Hours
Create a Website in Less than 2 HoursCreate a Website in Less than 2 Hours
Create a Website in Less than 2 HoursJanet Garcia
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemZainabNoorGul
 

Viewers also liked (20)

Management case study
Management case studyManagement case study
Management case study
 
Green Computing
Green  ComputingGreen  Computing
Green Computing
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1
 
Presentation project(1)
Presentation project(1)Presentation project(1)
Presentation project(1)
 
Bringing the Social Media Revolution to Health Care
Bringing the Social Media Revolution to Health CareBringing the Social Media Revolution to Health Care
Bringing the Social Media Revolution to Health Care
 
20070115 FP7 Info
20070115 FP7 Info20070115 FP7 Info
20070115 FP7 Info
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizing
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshop
 
Alaska
AlaskaAlaska
Alaska
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30
 
Final proposal -_masters_in_education__technology__submitted_may_26
Final proposal -_masters_in_education__technology__submitted_may_26Final proposal -_masters_in_education__technology__submitted_may_26
Final proposal -_masters_in_education__technology__submitted_may_26
 
Final Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideFinal Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample Slide
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop Basics
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
HTML & CSS: Chapter 04
HTML & CSS: Chapter 04HTML & CSS: Chapter 04
HTML & CSS: Chapter 04
 
Ictproposal
IctproposalIctproposal
Ictproposal
 
Final year computer science project |
Final year computer science project | Final year computer science project |
Final year computer science project |
 
Create a Website in Less than 2 Hours
Create a Website in Less than 2 HoursCreate a Website in Less than 2 Hours
Create a Website in Less than 2 Hours
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation System
 

Similar to Computer Science

fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptxHome
 
K.Bhagavan gupta.pdf according to the labu
K.Bhagavan gupta.pdf according to the labuK.Bhagavan gupta.pdf according to the labu
K.Bhagavan gupta.pdf according to the labuShanmukhVegi
 
Computer architecture overview
Computer architecture overviewComputer architecture overview
Computer architecture overviewMuhammad Ishaq
 
1 Mobile devices and OS.pdf
1 Mobile devices and OS.pdf1 Mobile devices and OS.pdf
1 Mobile devices and OS.pdfBhawnaSingh77012
 
Supercharged graph visualization for cyber security
Supercharged graph visualization for cyber securitySupercharged graph visualization for cyber security
Supercharged graph visualization for cyber securityCambridge Intelligence
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Engr. Md. Jamal Uddin Rayhan
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...PranavPatil822557
 
praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).akashganathay
 
Embedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purposeEmbedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purposeShanmukhVegi
 
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance Tools
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance ToolsITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance Tools
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance ToolsITCamp
 
Engineering Large Scale Cyber-Physical Systems
Engineering Large Scale Cyber-Physical SystemsEngineering Large Scale Cyber-Physical Systems
Engineering Large Scale Cyber-Physical SystemsBob Marcus
 
Presentation on Computer Basics and architecture.pdf
Presentation on Computer Basics and architecture.pdfPresentation on Computer Basics and architecture.pdf
Presentation on Computer Basics and architecture.pdfnavikvel
 

Similar to Computer Science (20)

fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
K.Bhagavan gupta.pdf according to the labu
K.Bhagavan gupta.pdf according to the labuK.Bhagavan gupta.pdf according to the labu
K.Bhagavan gupta.pdf according to the labu
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
 
Computer architecture overview
Computer architecture overviewComputer architecture overview
Computer architecture overview
 
1 Mobile devices and OS.pdf
1 Mobile devices and OS.pdf1 Mobile devices and OS.pdf
1 Mobile devices and OS.pdf
 
Supercharged graph visualization for cyber security
Supercharged graph visualization for cyber securitySupercharged graph visualization for cyber security
Supercharged graph visualization for cyber security
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Midori ppt
Midori pptMidori ppt
Midori ppt
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Faults inside System Software
Faults inside System SoftwareFaults inside System Software
Faults inside System Software
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
G04734450
G04734450G04734450
G04734450
 
praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
 
Embedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purposeEmbedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purpose
 
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance Tools
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance ToolsITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance Tools
ITCamp 2013 - Martin Kulov - Demystifying Visual Studio 2012 Performance Tools
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Engineering Large Scale Cyber-Physical Systems
Engineering Large Scale Cyber-Physical SystemsEngineering Large Scale Cyber-Physical Systems
Engineering Large Scale Cyber-Physical Systems
 
Presentation on Computer Basics and architecture.pdf
Presentation on Computer Basics and architecture.pdfPresentation on Computer Basics and architecture.pdf
Presentation on Computer Basics and architecture.pdf
 

More from Wendy Lile

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas airWendy Lile
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Wendy Lile
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final PptxWendy Lile
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program finalWendy Lile
 
Interactive features
Interactive featuresInteractive features
Interactive featuresWendy Lile
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereviewWendy Lile
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinalWendy Lile
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selectionWendy Lile
 
Population size
Population sizePopulation size
Population sizeWendy Lile
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationWendy Lile
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource planWendy Lile
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challangesWendy Lile
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trendsWendy Lile
 
Oral presentation
Oral presentationOral presentation
Oral presentationWendy Lile
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventoryWendy Lile
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paperWendy Lile
 
Current ethical issues
Current ethical issuesCurrent ethical issues
Current ethical issuesWendy Lile
 

More from Wendy Lile (20)

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final Pptx
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program final
 
Interactive features
Interactive featuresInteractive features
Interactive features
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereview
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinal
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selection
 
Population size
Population sizePopulation size
Population size
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservation
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource plan
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challanges
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trends
 
Oral presentation
Oral presentationOral presentation
Oral presentation
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventory
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paper
 
Current ethical issues
Current ethical issuesCurrent ethical issues
Current ethical issues
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Computer Science

  • 1. Computer Science Final Project WENDY LILE OCTOBER 26, 2014 ITCC121 PROFESSOR AGALABA
  • 2. INTRODUCTION COMPUTERS • Basic Concepts • Literacy • Algorithms COMPUTING SYSTEMS • Hardware • Architecture • Configurations OPERATING SYSTEMS • Architecture • Flow of Control NETWORKS • Architecture • Topologies • OSI Model INTERNET & THE WORLD WIDE WEB • Architecture • Flow of Control • Contributing Technologies BUSINESS PRODUCTIVITY • Impact of Software Development • Computing Technologies SECURITY CONCERNS • Online • Offline TABLE OF CONTENTS
  • 3. In the Information Age, computers are not only a necessity, but have become our way of life. Knowing how computers work can create a better understanding of their use and their potential capabilities. This is the field of Computer Science.
  • 4. COMPUTERS Basic Concepts • Hardware • Software • Binary • I/O – Input/Output • Peripheral devices • Data units of measurement: • Bit (b) – value is 0 or 1 • Byte (B) – 8 bits • Kilobyte (KB) – thousand bytes • Megabyte (MB) - million bytes
  • 5. Literacy • Word processing • Using a browser • Search engines • Security • Internet connectivity • Backing up data • Recognize good from bad results • Use Boolean operators: quotes, “and”, “or”, “not”
  • 6. Algorithms Input Program Instructions CPU Algorithms Sort Tasks Calculate Output
  • 7. COMPUTING SYSTEMS Hardware • Central Processing Unit (CPU) • Graphics card • Hard drive • Memory Types of memory. Image from HowStuffWorks.com
  • 8. Hardware • Motherboard • Optical disk drive • Cooling system • Case • Power supply Motherboard. Image from MacBreaker.com
  • 9. Architecture & Configurations #1 – Monitor #2 – Motherboard #3 – Central processing unit (CPU) #4 – Memory #5 – Expansion slots #6 – Power supply #7 – Optical disk drive (ODD) #8 – Hard drive #9 – Keyboard #10 – Mouse Computer architecture. Image from Education-Portal.com
  • 10. Flow of Control Computer data flow. Image from University of Liverpool: Overview of computer systems Solid arrows: Input data
  • 11. OPERATING SYSTEMS Functionality Process Management Memory Management File & Disk Management I/O Management
  • 12. Architecture 3 basic types of operating system architectures: • Monolithic • Layered • Microkernel Microkernel architecture. Image from TechnologyUK.net
  • 14. OSI Model OSI Model Explained
  • 15. INTERNET & THE WORLD WIDE WEB Architecture Local ISP Broadband Connection User Client 1 High-speed Connections Backbones User Client 2 Local ISP IXP IXP Web servers Mainframes Broadband Connection
  • 16. Contributing Technologies The very few first connections of the Internet in 1978. Image courtesy of som.csudh.edu
  • 17. BUSINESS PRODUCTIVITY Impact of Software Development Types of Information Systems
  • 18. Computing Technologies Productivity in the cloud by Trackvia
  • 19. SECURITY CONCERNS Internet Three of the many types of Internet security concerns: • Malware • Virus • Trojan horse • Worm • Phishing • Spyware These can lead to stolen money, your information sold to attackers, and identity theft.
  • 20. Computer Use The three main computer usage safety tips: 1. Internet security and virus protection program 2. Desktop firewall 3. Keep operating system updated TIP: Set your operating system to update automatically.
  • 21. The topics covered are Computer science. It is a vast and growing field of study. Technology is in constant motion. We need to keep up. Computer WWW Hardware Software Networks Internet Operating system OSI Model Network Topologies Malware Firewall
  • 22. REFERENCES Batra, P. (2010). Types of information system [Online image]. Retrieved from http://lecture-notes-forstudents. blogspot.com/2010/04/types-of-information-system.html Clker. (n.d.). Mainframe server clip art [Online image]. Retrieved from http://www.clker.com/clipart-mainframe- server.html Coenan, F. (2005). Overview of computer systems [Online image and article]. Retrieved from https://cgi.csc.liv.ac.uk/~frans/OldLectures/COMP101/week1/intro.html Computer History. (n.d.). ARPANET Geographic Map [Online image]. Retrieved from http://archive.computerhistory.org/resources/still-image/Arpanet/ Computer History Museum. (n.d.). Internet History. Retrieved from http://www.computerhistory.org/internet_history/ Education Portal. (n.d.). What is computer hardware? [Online image]. Retrieved from http://education-portal. com/academy/lesson/what-is-computer-components-definitions-examples.html Eer, S. (2013). Topologies [Video]. Retrieved from https://www.youtube.com/watch?v=DsPGYvbK8VU Fotheringham, N. (2014). Productivity in the cloud [Online image]. Retrieved from http://www.trackvia.com/blog/productivity/increase-productivity-switching-cloud Freepik. (n.d.). Circuit board icon [Online image]. Retrieved from http://www.flaticon.com/free-icon/ circuit-board-with-white-detailed-outlines_22452
  • 23. REFERENCES GoPixPic. (n.d.). Building icon [Online image]. Retrieved from http://www.gopixpic.com/256/building-icon-png/ http:||homeinteriorsdesigns*info|wp-content|uploads|building-icon-png*png/ Icons-Land. (n.d.). Portable computer icon [Online image]. Retrieved from http://www.iconarchive.com/show/vista-hardware-devices-icons-by-icons-land/Portable-Computer-icon. html IS&T. (n.d.). Top ten safe computing tips. Retrieved from https://ist.mit.edu/security/tips James, J. (2012). 10 things you have to know to be computer literate [Web log]. Retrieved from http://www.techrepublic.com/blog/10-things/10-things-you-have-to-know-to-be-computer-literate/ Lee, D. (2014). Fat cow name servers [Online image]. Retrieved from http://www.webhostingreviewjam.com/details/fatcow-name-servers/ MacBreaker. (2014). Can I install OS X on my PC? Read this first [Online image]. Retrieved from http://www.macbreaker.com/2012/01/is-your-computer-hackintosh-compatible.html Ramanayaki, D. (2013). OSI model explained [Video]. Retrieved from https://www.youtube.com/watch?v=O_rsqVtaloI Search Pictures Icon. (n.d.). Office building icon [Online image]. Retrieved from http://searchpp.com/office-building- icon/ Som.csudh.edu. (n.d.). ARPANET Maps [Online image]. Retrieved from http://som.csudh.edu/fac/lpress/history/arpamaps/
  • 24. REFERENCES TechTerms. (2013). Algorithm definition. Retrieved from http://www.techterms.com/definition/algorithm Tyson, J. (2000). How computer memory works [Online image]. Retrieved from http://computer.howstuffworks.com/computer-memory.html Wells, C.J. (n.d.). OS management functions [Online image and article]. Retrieved from http://www.technologyuk.net/computing/operating_systems/os_management_functions.shtml Williams, B. & Sawyer, S. (2012). Using information technology, 10th ed. McGraw-Hill.

Editor's Notes

  1. A computer system has its hardware, architecture, and configurations. The operating system is an integral part of the computing system with its architecture and flow of control. The Internet now compliments the use of computers. A connection to the Internet requires a network which has its architecture and specific topology. The OSI model defines network communication functionality. The Internet and the World Wide Web has its own architecture and flow of control. There are a few technologies that have contributed to its success. The success of the Internet, along with software development and certain computing technologies, has increased business productivity substantially. Security should be present in both online and offline computer use. (Williams & Sawyer, 2012) Image: (Freepik, n.d.)
  2. A computer is an programmable electronic hardware device capable of storing data and performing logical operations through instructions given by programs. Hardware is the physical components that make up the computer. Software is the application programs that contain instructions for the computer to perform. Binary is the language the computer understands. This code has two states, either a 0 for off or a 1 for on. Input/Output or I/O is the transfer of data to or from the computer Peripheral devices are objects of input and output, such as a keyboard for input and a printer for output. Some data units of measurement are: Bit (either has a 0 or a 1 as its value) Byte (which is 8 bits) – represents a single character, such as a letter, number, or symbol Kilobyte (1000 bytes) are a measurement of smaller files Megabyte (a million bytes) are larger file sizes, such as for music or images There are also Gigabyte (a billion bytes) and Terabyte (a trillion bytes) – and they are used mainly for storage capacity sizes. (Williams & Sawyer, 2012)
  3. Computer literacy is very important these days. These are a few of the main subjects to learn. Word processing: Whether you need to write an email, post to a forum, or type a paper, you need to know how to use a word processor Always use spell check. Using a browser: The browser is your gateway to the Internet. By learning how to type URLs and using history and bookmarks you can navigate the web more easily. Search engines: Know how to tell the good results from bad results by using just the preview underneath the result Knowing how to use a search engine is critical for research. Boolean operators are good for saving time and finding the relevant content. If you have noticed, some engines will bring back variations of words and phrases. Quotes are used for an exact match of the phrase quoted. Using and, or, and not will specify your search. Security: You must always have virus and malware protection. Learning how to scan for viruses and malware or set up the tool to scan automatically and have real-time monitoring of activity is critical for the health of the computer. Internet connectivity: We all hate it when the Internet goes out, so learning how to troubleshoot connectivity is very useful. Backing up data: Losing our favorite photos and all of our music is a nightmare. Know how to back up the entire system with an external device, such as an external hard drive or DVDs. (James, 2012)
  4. Algorithms are used for performing calculations and sorting tasks by the central processing unit from input, such a clicking the mouse, to produce output to a device, such as the monitor or secondary storage (TechTerms, 2013). (Williams & Sawyer, 2012)
  5. The CPU processes the tasks it receives from a program and writes it back. The graphics card, also known as a video card, takes binary data from the CPU and translates it to the image, video, or desktop on the monitor. The internal hard drive stores our files, application programs, and the operating system. There are many different types of memory which are mostly temporary storage. (Williams & Sawyer, 2012) (Tyson, 2000)
  6. A plastic board with printed circuits on it that holds the primary components, such as the CPU and the memory. An optical disk drive (or ODD) may read or write data to optical disks like CDs, DVDs, or Blu-Ray disks. There must be a cooling mechanism to keep the components from overheating. The power supply brings power to all components. The computer case holds and encloses everything together. (Williams & Sawyer, 2012) (MacBreaker, 2014)
  7. The motherboard (number 2) holds the CPU (number 3) and the memory (number 4). Number 5 is expansion slots for a sound card and graphics card. The power supply is number 6. Number 7 is the optical disk drive and the hard drive is number 8. The peripheral devices, number 1, 9, and 10, are the monitor, keyboard, and mouse, respectively. To complete the configuration, the BIOS (basic input output system) and the operating system bring life to the machine. (Williams & Sawyer, 2012) (Education Portal, n.d.)
  8. A program in primary memory receives input data from external devices, takes the instructions, feeds them into algorithms where it sorts the tasks with the Control Unit (CU), then calculates the function with the Arithmetic and Logic Unit (ALU) to produce output to a device, such as the monitor (Coenen, 2005).
  9. The four basic functionalities of all operating systems are process management, memory management, file and disk management, and input/output management. At the core of an operating system, and providing its main functionalities, is the kernel. The kernel provides access to hardware (Wells, n.d.).
  10. The monolithic system is built to where each operating system component is inside the kernel. The components can communicate with other components and have full access to the system. This architecture is efficient, but prone to many errors and damage from malware. A layered architecture separates the components into levels based on their functionality. This gives the system better structure but has the same chance of errors and damage. A microkernel system restricts access to the lower levels of the system from most of the components. With the kernel having very few components inside, the chance of errors and malicious code infecting the system is lowered, but so is the performance (Wells, n.d.).
  11. (Eer, 2013)
  12. Here is the Open Systems Interconnection (or OSI) model explained in a quick video (Ramanayake, 2013)
  13. The user client is the individual computer. They connect to local internet service providers which in turn connect to internet exchange protocols (or IXPs). IXPs are simply the gathering of many Internet connections. The backbone is a large and very high-speed connection that usually runs to very large servers or mainframes, for example for a university (Williams & Sawyer, 2012). (Icons-Land, n.d.) (Search Pictures Icon, n.d.) (GoPixPic, n.d.) (Lee, 2014) (Clker, n.d.)
  14. First, there was the Advanced Research Projects Agency for the United States Department of Defense, known as ARPANET, in 1969. The text-only pages were used by defense contractors. As time progressed, more computers were added to the Internet until the world wide web was born in 1992 (Computer History Museum, n.d.). (som.csudh.edu, n.d.)
  15. It seems the software development with the largest impact on business productivity would be information systems. Starting at the bottom with transaction processing systems going up to the executive decision support system, this kind of custom made software increases productivity (Batra, 2010).
  16. The most productive and more recent software development for business is not actually stand-alone software. It is web applications for business in the cloud. Creating projects in the cloud allows for real-time collaboration of employees from any location. All they need is a web browser (Fotheringham, 2014).
  17. Three types of malware are viruses, Trojan horses, and worms. A virus is attached to an executable (.exe) file and spreads through your system as it is executed. A Trojan horse is an actual program that only seems legit, but once installed it will infect your system. Worms may be spread by email attachments and are able to move through your file system without human interaction. Unsolicited emails that appear to have come from a trusted source, such as your bank or credit card company, could be part of a phishing scam. The email directs the user to a fake website asking for their login information or credentials. Spyware is built to steal information by spying on a user, for example, with a Keylogger by collecting every keystroke. (Williams & Sawyer, 2012)
  18. The three main computer usage safety tips are Always use an Internet security program that has real-time monitoring and scheduled virus scanning. There are free security programs that are just as good as the paid programs, such as AVG, Avira, or Avast, Use the desktop firewall built in to the computer. Most computers also come with some kind of security program on top of the firewall, such as Windows Defender on Windows computers which scans for spyware and other threats. Keep your operating system updated at all times, especially with full updates and security patches. (IS&T, n.d.)