2. INTRODUCTION
COMPUTERS
• Basic Concepts
• Literacy
• Algorithms
COMPUTING SYSTEMS
• Hardware
• Architecture
• Configurations
OPERATING SYSTEMS
• Architecture
• Flow of Control
NETWORKS
• Architecture
• Topologies
• OSI Model
INTERNET & THE WORLD WIDE WEB
• Architecture
• Flow of Control
• Contributing Technologies
BUSINESS PRODUCTIVITY
• Impact of Software Development
• Computing Technologies
SECURITY CONCERNS
• Online
• Offline
TABLE OF CONTENTS
3. In the Information Age, computers are not only a
necessity, but have become our way of life.
Knowing how computers work can create a better
understanding of their use and their potential
capabilities.
This is the field of Computer Science.
4. COMPUTERS
Basic Concepts
• Hardware
• Software
• Binary
• I/O – Input/Output
• Peripheral devices
• Data units of measurement:
• Bit (b) – value is 0 or 1
• Byte (B) – 8 bits
• Kilobyte (KB) – thousand
bytes
• Megabyte (MB) - million
bytes
5. Literacy
• Word processing
• Using a browser
• Search engines
• Security
• Internet connectivity
• Backing up data
• Recognize good from bad results
• Use Boolean operators: quotes, “and”, “or”,
“not”
15. INTERNET & THE WORLD WIDE WEB
Architecture
Local ISP
Broadband
Connection
User Client 1
High-speed
Connections
Backbones
User Client 2
Local ISP
IXP
IXP
Web servers
Mainframes
Broadband
Connection
19. SECURITY CONCERNS
Internet
Three of the many types of Internet security concerns:
• Malware
• Virus
• Trojan horse
• Worm
• Phishing
• Spyware
These can lead to stolen money, your
information sold to attackers, and
identity theft.
20. Computer Use
The three main computer usage safety tips:
1. Internet security and virus protection program
2. Desktop firewall
3. Keep operating system updated
TIP: Set your operating system to update
automatically.
21. The topics covered are Computer science. It is a
vast and growing field of study. Technology is in
constant motion. We need to keep up.
Computer
WWW
Hardware
Software
Networks
Internet
Operating system
OSI Model
Network Topologies
Malware
Firewall
22. REFERENCES
Batra, P. (2010). Types of information system [Online image]. Retrieved from http://lecture-notes-forstudents.
blogspot.com/2010/04/types-of-information-system.html
Clker. (n.d.). Mainframe server clip art [Online image]. Retrieved from http://www.clker.com/clipart-mainframe-
server.html
Coenan, F. (2005). Overview of computer systems [Online image and article]. Retrieved from
https://cgi.csc.liv.ac.uk/~frans/OldLectures/COMP101/week1/intro.html
Computer History. (n.d.). ARPANET Geographic Map [Online image]. Retrieved from
http://archive.computerhistory.org/resources/still-image/Arpanet/
Computer History Museum. (n.d.). Internet History. Retrieved from
http://www.computerhistory.org/internet_history/
Education Portal. (n.d.). What is computer hardware? [Online image]. Retrieved from http://education-portal.
com/academy/lesson/what-is-computer-components-definitions-examples.html
Eer, S. (2013). Topologies [Video]. Retrieved from https://www.youtube.com/watch?v=DsPGYvbK8VU
Fotheringham, N. (2014). Productivity in the cloud [Online image]. Retrieved from
http://www.trackvia.com/blog/productivity/increase-productivity-switching-cloud
Freepik. (n.d.). Circuit board icon [Online image]. Retrieved from http://www.flaticon.com/free-icon/
circuit-board-with-white-detailed-outlines_22452
23. REFERENCES
GoPixPic. (n.d.). Building icon [Online image]. Retrieved from http://www.gopixpic.com/256/building-icon-png/
http:||homeinteriorsdesigns*info|wp-content|uploads|building-icon-png*png/
Icons-Land. (n.d.). Portable computer icon [Online image]. Retrieved from
http://www.iconarchive.com/show/vista-hardware-devices-icons-by-icons-land/Portable-Computer-icon.
html
IS&T. (n.d.). Top ten safe computing tips. Retrieved from https://ist.mit.edu/security/tips
James, J. (2012). 10 things you have to know to be computer literate [Web log]. Retrieved from
http://www.techrepublic.com/blog/10-things/10-things-you-have-to-know-to-be-computer-literate/
Lee, D. (2014). Fat cow name servers [Online image]. Retrieved from
http://www.webhostingreviewjam.com/details/fatcow-name-servers/
MacBreaker. (2014). Can I install OS X on my PC? Read this first [Online image]. Retrieved from
http://www.macbreaker.com/2012/01/is-your-computer-hackintosh-compatible.html
Ramanayaki, D. (2013). OSI model explained [Video]. Retrieved from
https://www.youtube.com/watch?v=O_rsqVtaloI
Search Pictures Icon. (n.d.). Office building icon [Online image]. Retrieved from http://searchpp.com/office-building-
icon/
Som.csudh.edu. (n.d.). ARPANET Maps [Online image]. Retrieved from
http://som.csudh.edu/fac/lpress/history/arpamaps/
24. REFERENCES
TechTerms. (2013). Algorithm definition. Retrieved from http://www.techterms.com/definition/algorithm
Tyson, J. (2000). How computer memory works [Online image]. Retrieved from
http://computer.howstuffworks.com/computer-memory.html
Wells, C.J. (n.d.). OS management functions [Online image and article]. Retrieved from
http://www.technologyuk.net/computing/operating_systems/os_management_functions.shtml
Williams, B. & Sawyer, S. (2012). Using information technology, 10th ed. McGraw-Hill.
Editor's Notes
A computer system has its hardware, architecture, and configurations.
The operating system is an integral part of the computing system with its architecture and flow of control.
The Internet now compliments the use of computers. A connection to the Internet requires a network which has its architecture and specific topology. The OSI model defines network communication functionality.
The Internet and the World Wide Web has its own architecture and flow of control. There are a few technologies that have contributed to its success.
The success of the Internet, along with software development and certain computing technologies, has increased business productivity substantially.
Security should be present in both online and offline computer use.
(Williams & Sawyer, 2012)
Image: (Freepik, n.d.)
A computer is an programmable electronic hardware device capable of storing data and performing logical operations through instructions given by programs.
Hardware is the physical components that make up the computer.
Software is the application programs that contain instructions for the computer to perform.
Binary is the language the computer understands. This code has two states, either a 0 for off or a 1 for on.
Input/Output or I/O is the transfer of data to or from the computer
Peripheral devices are objects of input and output, such as a keyboard for input and a printer for output.
Some data units of measurement are:
Bit (either has a 0 or a 1 as its value)
Byte (which is 8 bits) – represents a single character, such as a letter, number, or symbol
Kilobyte (1000 bytes) are a measurement of smaller files
Megabyte (a million bytes) are larger file sizes, such as for music or images
There are also Gigabyte (a billion bytes) and Terabyte (a trillion bytes) – and they are used mainly for storage capacity sizes.
(Williams & Sawyer, 2012)
Computer literacy is very important these days. These are a few of the main subjects to learn.
Word processing:
Whether you need to write an email, post to a forum, or type a paper, you need to know how to use a word processor Always use spell check.
Using a browser:
The browser is your gateway to the Internet. By learning how to type URLs and using history and bookmarks you can navigate the web more easily.
Search engines:
Know how to tell the good results from bad results by using just the preview underneath the result
Knowing how to use a search engine is critical for research. Boolean operators are good for saving time and finding the relevant content. If you have noticed, some engines will bring back variations of words and phrases. Quotes are used for an exact match of the phrase quoted. Using and, or, and not will specify your search.
Security:
You must always have virus and malware protection. Learning how to scan for viruses and malware or set up the tool to scan automatically and have real-time monitoring of activity is critical for the health of the computer.
Internet connectivity:
We all hate it when the Internet goes out, so learning how to troubleshoot connectivity is very useful.
Backing up data:
Losing our favorite photos and all of our music is a nightmare. Know how to back up the entire system with an external device, such as an external hard drive or DVDs.
(James, 2012)
Algorithms are used for performing calculations and sorting tasks by the central processing unit from input, such a clicking the mouse, to produce output to a device, such as the monitor or secondary storage (TechTerms, 2013).
(Williams & Sawyer, 2012)
The CPU processes the tasks it receives from a program and writes it back.
The graphics card, also known as a video card, takes binary data from the CPU and translates it to the image, video, or desktop on the monitor.
The internal hard drive stores our files, application programs, and the operating system.
There are many different types of memory which are mostly temporary storage.
(Williams & Sawyer, 2012)
(Tyson, 2000)
A plastic board with printed circuits on it that holds the primary components, such as the CPU and the memory.
An optical disk drive (or ODD) may read or write data to optical disks like CDs, DVDs, or Blu-Ray disks.
There must be a cooling mechanism to keep the components from overheating.
The power supply brings power to all components.
The computer case holds and encloses everything together.
(Williams & Sawyer, 2012)
(MacBreaker, 2014)
The motherboard (number 2) holds the CPU (number 3) and the memory (number 4).
Number 5 is expansion slots for a sound card and graphics card.
The power supply is number 6.
Number 7 is the optical disk drive and the hard drive is number 8.
The peripheral devices, number 1, 9, and 10, are the monitor, keyboard, and mouse, respectively.
To complete the configuration, the BIOS (basic input output system) and the operating system bring life to the machine.
(Williams & Sawyer, 2012)
(Education Portal, n.d.)
A program in primary memory receives input data from external devices, takes the instructions, feeds them into algorithms where it sorts the tasks with the Control Unit (CU), then calculates the function with the Arithmetic and Logic Unit (ALU) to produce output to a device, such as the monitor (Coenen, 2005).
The four basic functionalities of all operating systems are process management, memory management, file and disk management, and input/output management. At the core of an operating system, and providing its main functionalities, is the kernel. The kernel provides access to hardware (Wells, n.d.).
The monolithic system is built to where each operating system component is inside the kernel. The components can communicate with other components and have full access to the system. This architecture is efficient, but prone to many errors and damage from malware.
A layered architecture separates the components into levels based on their functionality. This gives the system better structure but has the same chance of errors and damage.
A microkernel system restricts access to the lower levels of the system from most of the components. With the kernel having very few components inside, the chance of errors and malicious code infecting the system is lowered, but so is the performance (Wells, n.d.).
(Eer, 2013)
Here is the Open Systems Interconnection (or OSI) model explained in a quick video (Ramanayake, 2013)
The user client is the individual computer. They connect to local internet service providers which in turn connect to internet exchange protocols (or IXPs). IXPs are simply the gathering of many Internet connections. The backbone is a large and very high-speed connection that usually runs to very large servers or mainframes, for example for a university (Williams & Sawyer, 2012).
(Icons-Land, n.d.)
(Search Pictures Icon, n.d.)
(GoPixPic, n.d.)
(Lee, 2014)
(Clker, n.d.)
First, there was the Advanced Research Projects Agency for the United States Department of Defense, known as ARPANET, in 1969. The text-only pages were used by defense contractors. As time progressed, more computers were added to the Internet until the world wide web was born in 1992 (Computer History Museum, n.d.).
(som.csudh.edu, n.d.)
It seems the software development with the largest impact on business productivity would be information systems. Starting at the bottom with transaction processing systems going up to the executive decision support system, this kind of custom made software increases productivity (Batra, 2010).
The most productive and more recent software development for business is not actually stand-alone software. It is web applications for business in the cloud. Creating projects in the cloud allows for real-time collaboration of employees from any location. All they need is a web browser (Fotheringham, 2014).
Three types of malware are viruses, Trojan horses, and worms.
A virus is attached to an executable (.exe) file and spreads through your system as it is executed.
A Trojan horse is an actual program that only seems legit, but once installed it will infect your system.
Worms may be spread by email attachments and are able to move through your file system without human interaction.
Unsolicited emails that appear to have come from a trusted source, such as your bank or credit card company, could be part of a phishing scam. The email directs the user to a fake website asking for their login information or credentials.
Spyware is built to steal information by spying on a user, for example, with a Keylogger by collecting every keystroke.
(Williams & Sawyer, 2012)
The three main computer usage safety tips are
Always use an Internet security program that has real-time monitoring and scheduled virus scanning. There are free security programs that are just as good as the paid programs, such as AVG, Avira, or Avast,
Use the desktop firewall built in to the computer. Most computers also come with some kind of security program on top of the firewall, such as Windows Defender on Windows computers which scans for spyware and other threats.
Keep your operating system updated at all times, especially with full updates and security patches.
(IS&T, n.d.)