Você está na página 1de 93

Computer Concepts

C1A1Y
Mrs. Rosemarie M. Coronejo
IAS - IT Department
Far Eastern University

1
Data Processing

data processing information

storage

2
Data Processing
Data - raw fact, e.g. name, age, sex, score

Information - process data, e.g. number of students,


average age,
number of male students, highest score in a quiz

Data Processing
The manipulation of raw data into a more useful form
called information.
The modern name of paperwork and involves
collection, processing and distributing of facts and
figures to achieve a desired result. 3
Data Processing Cycle

1. Input - initial data is entered.


2. Processing - input data is changed and is
usually combined with other information.
3. Store - input data and results are stored for
future use
4. Output - Results are collected

4
Basic Data Processing
Activities

Recording
Storing
retrieving
selecting/classifying
sorting
computing

5
Types of Data Processing

1. Manual Data Processing. The processing of


data manually or through mechanical devices.

2. Electronic Data Processing. The processing


of data through the use of computers.

6
Methods of Data Processing

1. Batch Processing
2. On-Line Processing
3. Real-Time Processing
4. Distributed Processing

7
Methods of Data Processing

1. Batch Processing. Data are collected by


groups to permit convenient, efficient and
serial processing.
2. On-Line Processing. Uses device directly
connected to the CPU either for data entry or
inquiry purposes.

8
Methods of Data Processing

3. Real-Time Processing. Has a capability of fast


response to obtain data from an activity or aphysical
process, perform computations and return a response
fast enough to affect the outcome of the activity or
process.
4. Distributed Processing. Generally consists of
remote terinals linked to a large central computer
systems to help the user conduct inquiries about
accounts, process jobs or other data processing
operations.
9
What is a Computer?

is an electronic device designed to manipulate


data so that useful information can be
generated.

is an electronic device designed to accept


data, process data based on stored instructions,
store data so that useful information can be
generated.

10
Characteristics of a Computer

1. It is a machine.
2. It is electronic.
3. It is automatic.
4. It can manipulate data.
5. It has a memory.
6. It has logic functions.

11
Capabilities of a Computer

1. Speed
2. Repetitiveness
3. Accuracy
4. Logical operations
5. Store and recall information
6. Self-checking
7. Self-operating
12
Limitations of a Computer

1. The computer cannot generate information on its


own.
2. A computer cannot correct wrong instructions.
3. A computer cannot come out with an original
decision.
4. A computer cannot derive meanings from objects
5. Dependence on prepared instructions

13
Classification of Computers
o According to purpose
General Purpose
Specific Purpose
o According to data handled
Analog
Digital
Hybrid
o According to capacity
Super computers
Mainframe
Midrange
Mini-computers
Microcomputers 14
Classification of Computers

General Purpose.
Handles variety of different problems and to meet
different needs (e.g. varied business applications such as
payroll, accounts receivable, inventory control, budgeting
and sales analysis)

Specific Purpose.
Handles specific problem or to perform a specific task.
(e.g. those used for collecting highway tolls, airline
reservations, satellite tracking, air traffic control and
industrial process control).

15
Classification of Computers
Analog computers
Computers commonly used for scientific and engineering
problems, particularly in chemical industries, electric
power plants, and petroleum refineries.
Digital computers
Digital computers are computers that specialize in
counting or discrete values such as business systems.
Hybrid computers
Machines that incorporate in a single computer both the
analog and digital features. These computers are used
in working out special types of problems in science and
various areas of engineering, such as space vehicle
simulations and training of astronauts.
16
Classification of Computers
Super Computers
These are the biggest and fastest machines today where
numerical computations are carried out at speeds of
up to 50 million operations per second.
Mainframes
These computers are the ultimate in sophistication,
flexibility and speed.
These are very expensive machines and their main
concern is to prove their cost effectiveness.
These computers are valuable to the larger firms
which can provide both skilled programmers and
continuous applications, involving thousands of
employees and hundreds of thousands of customer
accounts on a daily basis. 17
Classification of Computers
Midrange computers
These computers provide greater operating speed, larger
memory capacity, and high-speed input-output devices
than the mini-computers and microcomputers.
It have a unique feature called virtual memory by which
the main memory capacity is made to appear larger
than the actual size.
Mini-Computers
These are increasingly powerful and do almost anything
that large computers do, only more slowly and at much
lower cost.
This makes it ideal for small companies where capacity
and speed of operations is not highly critical.
18
Classification of Computers
Microcomputers
Sometimes called a SINGLE-CHIP PROCESSOR or a
SYSTEM-ON-A-CHIP, the microcomputers is a digital
computer system that uses a microprocessor (the CPU
on a chip), a programmable ROM and a RAM. Basically
designed for hobbyist.

notebook computers
low-end functional computers (cheap PCs)
fully-powered PCs
workstations

19
Computer Description

A mainframe is a big, powerful, expensive computer that can support many


users at the same time. Large businesses and organizations use mainframes.
Capacity: Enormous - the capacity of several hundred or even thousands of
PCs
Speed: Very fast - much, much faster than a PC
Cost: Very, very expensive - can usually only be afforded by large organizations
Users: Only used by large businesses and organizations

20
Computer Description

A PC is a personal computer, originally designed by IBM way back in


1981. Many different companies make PCs, but all of them are IBM-
compatible. What this means, according to Bill Gates, is that they will all
run Microsoft Windows.
Capacity: Average hard disk size is 20 GB to 80 GB
Speed: Fast. Average speed is from 1 GHz to 3 GHz
Cost: Fairly inexpensive - under $1,000 - and getting cheaper every day!
Users: Just about everyone uses a PC! Homes, offices, schools

21
Computer Description

Developed by Apple, a Macintosh is a computer, but it is NOT a PC.


Macs have a
different operating system and use their own software and
hardware.
Capacity: Average hard disk size is 20 GB to 80 GB
Speed: Fast. Average speed is from 500 MHz to 2 GHz
Cost: Fairly inexpensive, but usually more than an equivalent PC
Users: Just about everyone, especially in the education and design
fields

22
Computer Description

A network is a group of computers that are connected so that they can share
equipment and information. Most people on a network use workstations, which are
simply PCs that are connected to the network. A server is a central computer where
users on the network can save their files and information.
Capacity: (Workstation) Same as a PC, only needs an inexpensive network card
(Server) Greater than a PC, often more than 100 GE
Speed: (Workstation) Same as a PC (Server) Generally faster than a PC, may use
multiple CPUs
Cost: (Workstation) Same as a PC (Server) More expensive than a PC but not as
costly as a mainframe
Users: (Workstation) People in a networked office or organization (Server) Generally a
network administrator or engineer

23
Computer Description

A laptop, or notebook, is a lighter and more portable version of


a PC or Mac that can run on batteries.
Capacity: Average hard disk size is 10 GB to 40 GB
Speed: Fast, but slightly less than a PC. Average speed is from
700 MHz to 2 GHz
Cost: Fairly inexpensive, but more than an equivalent PC
Users: People on the move, especially business people and
students

24
Computer Description

A PDA (Personal Data Assistant) is a handheld computer that is


generally used to
keep track of appointments and addresses.
Capacity: Much smaller than a PC - 8 MB to 64 MB of storage
space
Speed: Much slower than a PC - 8 MHz to 266 MHz
Cost: Expensive when compared to the capacities of a PC
Users: Business people and others who need to be organized

25
Parts of a Computer
Component Description

Case or System Unit The main computer box, technically known as the system unit, is the most important
part of a computer. It contains the guts and brains of the computer. The system unit
contains a lot of holes or ports where you plug in the rest of the computer system.

Monitor The monitor resembles a television set, and is where the computer displays
information.

Keyboard The keyboard is the thing you type on to tell your computer what to do.

Mouse Like the keyboard, the mouse is another input device that you use to communicate
with your computer.

Speakers Most computers can make sounds, just like a stereo system. In fact, you can even
listen to audio CDs on most computers or watch DVDs.

Printer A printer is where a computer writes down information or output, onto paper, or a
hardcopy.
The Front of a Computer Case
The Front of a Computer Case
Item Description
System Unit or Computer A plastic or metal case with slots, buttons, and lights in the front and
Case holes in the back. This is the most important part of a computer
because it contains the Central Processing Unit (CPU). The system unit
directs the computer, performs calculations, and stores information.

Floppy Drive Reads and writes to 3 - inch floppy disks. A floppy disk can store
about 1.5 MB of information about as much as a novel.

Hard Drive The computers main, long-term storing device. Unlike floppy disks and
CD-ROMs, you typically cannot remove a hard disk.
The Front of a Computer Case
CD ROM or DVD Drive CD-ROMs and DVDs for your computer can store lots of information and look exactly like
CDs for your stereo and DVDs for your home DVD player.

The only read difference between a CD-ROM and a DVD is how much information they
can store. A CD-ROM and a DVD can store at least 700 MB of information, while a DVD
can store much more up to 4.7 GB or 9.4 GB on a dual-layer DVD.

Zip Drive A special type of disk drive that can read and write to Zip disks. A Zip disk is a lot like a
floppy disk, although they are faster and can store more information from 100 to 250
MB.

Tape Backup A device that you can use to store backups, or copies, of the information on a computers
hard drive.
The Front of a Computer Case
Keyboard The keyboard is the thing you type on to tell your computer what to do.
I
N
P Mouse Like the keyboard, the mouse is another input device that you use to
communicate with your computer.
U
T
Scanner Scanners work like photocopiers, except the image is translated into a digital
image in your computer rather than copied onto paper.

O Monitor The monitor resembles a television set, and is where the computer displays
U information.
T
P Speakers If visible, your computer speakers are similar to those on a stereo system (or at
least a cheap stereo system). They allow your computer to play sounds.
U
T

Printer A printer is where a computer writes down information or output, onto paper, or
a hardcopy.
Whats Inside a Computer Case?
Whats Inside a Computer Case?
Motherboard
Central Processing
Unit (CPU)
Random Access
Memory (RAM)
ROM-BIOS
Expansion Slot
Expansion Card
PCMCIA Cards
Whats Inside a Computer Case?
Item Description

Motherboard The main piece of circuitry in a computer. Everything connects to or is wired to the
motherboard.

Central Processing The computers brain or heart, the CPU is a computers main chip. The CPU is
Unit (CPU) really nothing more than an incredibly fast and powerful calculator.

Random Access A computers temporary storage place, where it gets its work done. For example,
Memory (RAM) when you use a word processor to type a letter, the letter is stored in the
computers memory.

ROM-BIOS A computers ROM-BIOS (stands for Read Only Memory Basic Input/Output
System) is a special chip with instructions for the computer to communicate with
other hardware parts.
Whats Inside a Computer Case?
Expansion Slot An expansion slot lets you add more features and capabilities to a
computer by plugging in expansion cards.

Expansion Card A card that allows you to expand your computers capabilities, such as
modem card, a network card, a video card, or a sound card.

PCMCIA Cards Notebook computers are too small to use expansion cards, so they use
special credit-card sized PCMCIA cards instead. You plug in a PCMCIA
card, or PC Card, into a notebook computer to give it more features and
capabilities. Nobodys getting tested o this, but PCMCIA stands for
Present Computer Memory Card International Association.
The Back of a Computer (Ports)
The Back of a Computer (Ports)
Port Icon Description
The keyboard and mouse jacks look identical on most PCs, so
look for colors and icons to help you with plugging in these
devices.

Serial (or COM) ports are a very versatile type of port. Some of
the things you can plug into a serial port include: a mouse,
modem, scanner, or digital camera. Most computers have two
serial ports: COM1 and COM2.

You plug your printer into the parallel, or printer, port. Many
newer printers may use a USB port.
The Back of a Computer (Ports)
Port Icon Description
Designed to replace older Serial and Parallel ports, the USB
(Universal Serial Bus) can connect computers with a number of
devices, such as printers, keyboards, mice, scanners, digital
cameras, PDAs, and more. Better yet, the USB port supports
plug-and-play, so you can simply plug in a USB device and start
using it. USB 1 ports can transfer information at a speed up to
12 Mbps (Megabytes per Second). Newer USB 2 ports can
transfer information at a speed up to 480 Mbps. Most
computers come with two USB ports.
The Back of a Computer (Ports)
Port Icon Description
You plug your monitor into the video port.

Plug in your speakers or headphone into the


Line Out jack.

The Line In jack allows you to listen to your


computer using a stereo system.

You plug a microphone into this jack to


record sounds on your computer.
The Back of a Computer (Ports)
Port Icon Description
If you have a joystick, musical (MIDI Musical
Instrument Digital Interface) keyboard, or other
gaming device, this is where you plug it in.

The phone or modem jack is where you plug your


computer into a phone line.

You can connect your computer to a network by


plugging in an Ethernet cable in this port.

An SCSI port is one of the fastest ways to connect


a hard drive, CD-ROM drive, or other device to a
computer.
The Back of a Computer (Ports)

Port Icon Description


Firewire A FireWire (IEEE 1394 or i.LINK) port lets you connect such devices as hard disks and
digital camcorders to a computer. It can transfer information at a speed of up to 400 Mbps.
How a computer works

Process/Storage Output
Input
The computer The computer
You communicate processes data, makes communicates its
with the computer via calculations, directs the results to you via an
an input device such work of the hardware, output device such as
as a mouse, a and stores your files. a monitor, a printer, or
keyboard, or a speakers.
joystick.
Computer System Components

1. Hardware
2. Software
3. Peopleware
4. Data / information
5. Procedures

42
Hardware
Refers to the physical component of the
computer system.

It includes:
1. Input devices e.g. keyboard & mouse
2. Output devices e.g. monitor & speaker
3. Data storage and Media devices e.g. floppy
disks & hard disks
4. Processing devices these are internal or
electronic devices which process the data and
produce an output. (CPU)
43
Input Devices

Keyboard
Mouse
Digital camera
Webcam

44
The Keyboard

45
The Mouse

46
The Mouse

The optical mouse, operates by using an


infrared sensor. You can identify an optical
mouse by the telltale red glow emanating
from its underside.
The wireless mouse (and keyboard). A
wireless mouse and keyboard run on
batteries and communicate with the
computer the same way a remote control
communicates with a television.
47
Digital camera and Webcam

48
Other Input Devices

49
50
Output Devices

Monitor
Printer
Speakers

51
Monitor

52
Printers

53
Types of Printers

54
Speakers

55
Storage Devices

Primary Storage Device


The computers main memory.

Secondary Storage Devices


The physical devices (also called auxiliary devices)
are physically separated but connected directly to
the CPU through a communication line so that
programs or data can be accessed with almost no
intervention from human operator

56
Two types of computer memory
inside the computer:

1. RAM (Random Access Memory) a


place where the programs and
software we load gets stored.
2. ROM (Read Only Memory) it is
where the CPU fetches or reads
instructions.

57
Examples of Secondary
Memory

Magnetic Disk
Magnetic Tapes
Floppy Disk
Hard Disk
CD-ROM

58
Hard Disk

59
Floppy Disks

60
CD-ROM and DVD Drives

61
Types of CD

62
Types of DVD

63
Magnetic Tapes

64
Other Storage Devices

65
Central Processing Unit (CPU)
This is the brain of the computer.
All operations performed by the
computer system are controlled by
this physical device.
This is sometimes referred to as the
processor or central processor.
This is the most important element
of a computer system.

66
The Central Processing Unit

67
Typical component of the CPU:

1. Control unit it acts as a supervisor


that controls and supervises the
operation in the CPU.
2. Arithmetic logic unit (ALU) it
performs the mathematical and logical
operations of the computer system.
3. Memory unit it is the storage device
of the computer.

68
Measurements used in
Computer:
1. Bit (binary) either ON (1) or OFF (0)
2. Nibble group of 4 bits.
3. Byte group of 8 bits.
4. Kilobyte (KB) 1024 or 210 bytes
5. Megabyte (MB) a million bytes or
1,048,576 bytes

69
Measurements continued

6. Gigabyte (GB) a billion bytes or


1,073,744,824 bytes
7. Terabyte (TB) a trillion bytes or
1,009,511,627,776 bytes

BPS (bytes per second) is used to measure


modem speeds.

70
Clock Speed it is how fast a computer
processes

1. Hertz (Hz) a single clock cycle per second.


2. Kilohertz (kHz) 1000 cycles per second.
3. Megahertz (MHz) 1 million cycles per
second.

71
Software instructions that tell the computer
what to do.

Classification of Software:
1. System software programs which control
and assist in the computer operation. (e.g.
operating system, compilers, utility programs,
etc.)

2. Application software programs which


provide a solution to a specific operation or
application. (e.g. business software, desktop
publishing, Office productivity, etc.)
72
Peopleware
Represent the
personnel involve
in system
analysis,
programming,
computer
operation, system
maintenance, the
enduser, and the
like.
Computer Proffesionals

Computer Librarians
catalog the processed disks and tapes and keep them secure.
Computer programmers
design, write, test and implement the programs that process data
on the computer system; they also maintain and update programs.
Systems analysts
Knowledgeable in programming who plan and design not just
individual programs but entire computer systems.
Network manager
implements and maintains the organizations network.
Database Administrator
Systems Engineer
Chief Information Officer (CIO)
74
End users
The user of Information System.

Ordinary users
people who uses computer on day to day
basis.

75
Data
Facts which are processed to produce information.
Data are processed using these four processing
functions: Input, process, output, storage

Information
Data that have been processed and presented in a
form suitable for the user or human to interpret or
understand.
Procedures
Step-by-step instructions to be followed by a
computer to produce an output. E.g. users manual,
system documentation, policies, disclaimer, etc.
76
Computers and Society
1. Applications of IT
2. Computer Crimes
3. Software Piracy
4. Hacking
5. Virus
6. Philippine Laws on Computer and Technology
7. Ethics and Copyright

77
Applications of Computers in Society
Health and medicine
Transportation
Law enforcement
Money and banking
Industrial Factories
Communications
Agriculture
Education
Home
78
Applications of IT

Computers speed up the check out


process at supermarkets
enable 24 hour banking
provide up-to-the-minute weather
information
entertain us with video games and films
application using elevators, automobiles
and vending machines. 79
Applications of IT

Retailers query to determine which


products are selling and which are not.
The use of word processing system to
create memos and to check spelling,
grammar and style
Banker and geologist use computer for
their convenience.

80
Computer Crimes: Categories
1. Crimes that create havoc inside the computer
2. Crimes that involve the manipulation of
computer systems and their data
3. Crimes involve telecommunication
4. Crimes that involve the abuse of personal
information
5. Crimes that involve negligence
6. Crimes that support criminal enterprises
7. Crimes that involve the theft of hardware or
software 81
Computer Crimes: Examples
Credit Card Fraud
Data Communications Fraud
Unauthorized access to computer files
Unlawful copying of copyrighted software
Defrauding the System
Negligence and Incompetence
The Hacker Problem

82
Software Piracy
The unauthorized copying of software or any intellectual
property

Intellectual Property
creations of the human intellect and their protection,
usually by copyright which includes:
literary, artistic, and scientific works
performances of performing artists, phonograms, and
broadcasts
inventions in all fields of human endeavor
scientific discoveries.

83
Copyright
A form of protection provided by laws to the authors of original
works, or owners of intellectual property.

World Intellectual Property Organization (WIPO). This


organization was founded in 1967 as one of the specialized
agencies of the United Nations organizations, and it has since
remained responsible for the protection of intellectual property.
Republic Act No. 8293 - Intellectual Property Code of the
Philippines, Philippine copyright law for literary and artistic
works also protects patents and trademarks
There are also other laws that protect copyrights: the Optical
Media Act (which protects music, movies, computer programs,
and video games) is an example of such.
Copyright implementation is done with the coordination of the
Intellectual Property Office or IPO and the Copyright Division
of the National Library of the Philippines. 84
Hacking
To modify a program, often in an unauthorized manner, by
changing the code itself.
Bomb - causes a program to trigger damage under certain
conditions; it is usually set to go off at a later date.
Data diddling - refers to changing data before or as it enters the
system.
Denial of service (DoS) attack - occurs when hackers bombard a
site with more requests for service that it can possibly handle,
preventing legitimate users from accessing the site.
Piggybacking - an illicit user rides into the system on the back of
another user.
Salami technique - a technique that reflects the small slices of
money that may be squirreled away undetected from a large
financial system.
Scavenging - a simple search to company trash cans and
dumpsters for printouts containing no - for - distribution information.
85
Malicious Software (Malware)
Virus attaches itself to a program or file enabling it to spread from one
computer to another, leaving infections as it travels; can range in severity: some
may cause only mildly annoying effects while others can damage
your hardware, software or files; Almost all viruses are attached to an
executable file, which means the virus may exist on your computer but it
actually cannot infect your computer unless you run or open the malicious
program.
Worm similar to a virus by design and is considered to be a sub-class of a
virus. Worms spread from computer to computer, but unlike a virus, it has the
capability to travel without any human action; takes advantage of file or
information transport features on your system, which is what allows it to travel
unaided.
Trojan Horse appears to be useful software but will actually do damage once
installed or run on your computer. Once activates, results may vary; from
annoying (changing the desktop or adding silly icons) to serious (deleting or
destroying files); can also create backdoor to your computer, allowing malicious86
access to your confidential or personal information.
Malicious Software (Malware)
1949 - Although no viruses or worms were developed, theories of self-replicating
programs that spawn viruses or worms are developed.
1966 - John von Neumann wrote an article called the "Theory of Self-
Reproducing Automata" that was published. This was based his lectures he
had held 18 years earlier on this theory.
1974/1975- John Walker wrote the ANIMAL for the UNIVAC 1108. This became
known as on of the first non-malicious Trojans. It spread to other UNIVACs when
computer users discovered the game due to overlapping permissions. It was also
spread by sharing tapes.
A novel by John Brunner called the "Shockwave Rider" coined the term "worm"
by using it to describe a particular program that circulates itself through a
computer network.
1981- The "Elk Cloner" for the Apple II Systems was created by Richard
Skrenta. It infected the Apple DOS 3.3 and spread to other computers by floppy
disk transfer. The "Elk Virus" was responsible for being the first computer virus to
cause a massive outbreak ever in history.
87
Malicious Software (Malware)
1983- While completing his dissertation Frederick Cohen used the term virus in
order to explain when a particular computer program is able to infect additional
computer programs because it was capable of replicating itself.
1986 Brain, the first IBM Pc virus from Pakistan
1989 - A trojan called AIDS appears. It requested immediate payment in order
for it to be removed.
1990 - Some of the first antivirus software from Symantec called
Norton AntiVirus began to appear.
1992 There were over 1300 virus in existence
2000 - The ILOVEYOU worm, also known as Love Bug worm, is a computer
worm purportedly created by a Filipino computer science student. Written in
VBScript, it infected millions of Windows computers worldwide within a few hours
of its release. Using social engineering techniques, it is considered to be one of
the most damaging worms ever.

88
Philippine Laws on Computers and
Technology
Republic Act No. 8792 - "Electronic Commerce Act of 2000
Approved by Pres. Jpseph Estrada in June 14, 2000.
An Act Providing For The Recognition And Use Of Electronic
Commercial And Non -Commercial Transactions And
Documents, Penalties For Unlawful Use Thereof And For
Other Purposes
This Act aims to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and
exchanges and storage of information through the utilization
of electronic, optical and similar medium, mode,
instrumentality and technology to recognize the authenticity
and reliability of electronic documents related to such
activities and to promote the universal use of electronic
transaction in the government and general public. 89
Philippine Laws on Computers and
Technology
Republic Act No. 10175 - Cybercrime Prevention Act of
2012
Approved by Pres. Benigno Aquino on Sept. 12, 2012
Offenses of Cybercrime include:
Offenses against the confidentiality, integrity and
availability of computer data and systems
Computer-related Offenses like forgery, fraud, identity
theft.
Content-related offenses like cybersex, child
pornography, unsolicited commercial
communications, libel.
90
Philippine Laws on Computers and
Technology
Republic Act No. 10844 - Department Of Information
And Communications Technology Act Of 2015
Approved by Pres. Benigno Aquino on May 23, 2016
An Act Creating The Department Of Information And
Communications Technology, Defining Its Powers And
Functions Appropriating Funds Therefor, And For Other
Purposes

91
Ethics.
refers to the rules and standards governing the
conduct of an individual with others.

Computer ethics.
A code of ethics provides direction for computer
professionals and users so that they act responsibly in
their application of information technology.

92
Security
Software
Use of a strong passwords
Encryption and decryption
Updates antivirus
Use of firewall

Hardware
Closed circuit TV monitors
Alarm systems
Computer-controlled devices
Machine-room fires should be extinguished by a
special chemical that douses the fire but does not
destroy the files or equipment.
Continuous source of power (UPS)
93

Você também pode gostar