Ntro OM: Duction Puting
Ntro OM: Duction Puting
CC101
COMPUTING
Name:
|OVERVIEW
This module provides an overview of the computing areas of the knowledge that discusses the
fundamental principles, concepts, and evolution of computing systems including different fields. It
explicates the recent developments in the different computing knowledge areas such as key
components of computer systems, organization and architecture, malware, computer security,
networking, the Internet, and its protocols, and give analysis to solutions employed by organizations
to address different computing issues.
|LEARNING OUTCOMES
• Identify the basic and complex, components, parts, peripherals, and processes of a computer
system.
• Enumerate and explain fundamental principles, concepts, and evolution of computing systems
as they relate to different fields.
• Illustrate the recent developments in the different computing knowledge areas such as
communication, networking, and the internet.
• Examine solutions employed to address different computing issues, particularly in using the
internet and technology today and beyond.
|LEARNING EXPECTATIONS
In this module, I expect you to: explain fundamental principles, concepts, and evolution of
computing systems as they relate to different fields, to expound on the recent developments in the
different computing knowledge areas, to analyze solutions employed by organizations to address
different computing issues.
|LEARNING RESOURCES
1. Electronic Devices (Laptop, Desktop, Netbook, tablet or smartphone)
2. Browser (Chrome, Edge, Firefox, Opera)
3. Flash Drive (8GB minimum capacity with a name tag).
4. Internet Connection & Online resources
| INTRODUCTION TO COMPUTERS
Have a nice day, class! Today, we will be discussing “Introduction to Computers.” I know that
you are already familiar with this device but did you know that as early as the 19th century, this was
one of the most important devices that emerged. It greatly influenced and changed our way of living
day by day, prevalently known today as a (what?) . Now, computers
are used for complex designs, entertainment, communication, research, data mining, architecture,
engineering, education, medical discoveries, technological innovations, industry infrastructure and
production, various managements, and many others, named it all.
Image Source: Input/ Output/ Process diagram - Oliver Williams Y12 ICT
To elucidate this, data are the raw facts without clear meaning to the user yet. And that
(what?)_______________________ are set of instructions that command a computer what to
perform. Whereas (what?) is the meaningful output or result after the
data have been processed.
Based on the illustration above, the image below is a concrete example to understand the way
we perform tasks from our daily chores implementing the Input-Process-Output (IPO) cycle.
Now, can you give real-life situations or daily-life chores in your home that exemplify the IPO
cycle? (Use the table provided.)
As to begin with our deeper discussion, we all know the fact that early men used their fingers
and toes, stones, and sticks as the bases for counting, which is a base (what?) _____ numbering
system. But as evolution took place, symbols and number concepts were invented, then followed
by devices that could manipulate these numbers until transcended into an unimaginable extent.
I presented an infographic to briefly take us into time morph back to where and when it began.
Now, I give you this part… kindly fill in the table below to synopsize the five generations.
|Computer Generation
On the other hand, a computer system is the combination of peripheral devices and installed
software to perform desired functions. The "computer" and "computer system" can be interchanged
especially when the latter is sold and installed as a package. This term may also pertain to a hardware
configuration and software designed for specific tasks, such as an information management system,
automated control & monitoring systems, or an accounting system. Or it may refer to multiple
computers interlinked with each other to share software, data, and peripherals or resources.
|NAME: DATE:
Now, what do you call the computer network consists of two or more computers
intended to share resources? Client-Server Network.
Nice!
|NAME: DATE:
|E: DATE:
Nice ideas!
Agree. A computer programmed to play chess can beat even the greatest human chess masters
because of the game’s logical rules and processes. It can set plan more possible moves ahead than
a human can anticipate. Likewise, these devices can perform tedious tasks effectively and
proficiently sans sleep. They can analyze, calculate, and process data round the clock. They seem
to have no limitations, but still, lack of understanding even a simple situation, e.g. computer cannot
renew its license alone even your bank account details are already stored in there. Also, computers
are susceptible to bugs, malware and viruses, power interruptions, circuit failures, and the like.
Whereas experts agree, humans are still superior in many aspects even considering the highly
advanced __________________________ (AI) perspective. Unlike computers, we have instincts,
common sense, emotional concepts, and life learning experiences in this world. Humans recognize
and possess traits like aspiration, beliefs, creativity, imagination, etc. We can write and appreciate
the poem, compose and play _____________, sing a _____________, do artworks, inspire other
According to Maital, “The human brain has 86 billion neurons (nerve cells), all interconnected.
Computer neural networks have far, far fewer ‘cells’ or nodes. But soon they will reach this
complexity and sophistication.” Experts generally agree that future computers will possess some
traits that today human uniquely has or far better. But according to Mallick, “The important thing
to keep in mind is that it is not man versus machine. It is not a competition. It is a collaboration.”
Computer Software
We keep on talking about the physical component of the computer system. There is another
important component which is the software, a program that enables a computer to work, as accord
to the physical or tangible parts of the system called hardware. The computer will not function
without ____________________, like human without a soul. Computer software, also called
programs are the instructions or set of instructions that command computers what to perform and
how to perform it. These programming codes are loaded into the storage such as cache or memory,
__________________________ (RAM), or a hard drive upon booting and executed by its “brain”
called microprocessor or ______________. The codes were written into machine-level codes or
computer language, which the operating system translates into human language through its interface
called ____________________________ (GUI).
The two main software categories are system software and application software.
Firstly, the system software also called the _______________________ (OS) actually runs the
computer. This software is intended to manage and control all the operations of hardware and other
software installed in it. All computers have an operating system to run the application software
properly.
|E: DATE:
Can you enumerate at least 5 common Operating Systems we are using today?
Good job!
Covered under Copyright Law of the Philippines P a g e 9 | 49
All Rights Reserved @ OLSHCO
Secondly, application software, or _______, is software designed to performs specific tasks for
end-users. When you are interacting directly with certain software, that is application software, e.g.
Microsoft Office, Excel, PowerPoint, Word, Photo Editor, Anti-virus, including web browsers.
|E: DATE:
Can you enumerate at least 5 common Application Software we are using today?
Give and very brief description.
Very good!
From our previous discussions, even now, did realize something going on right here, right now?
|E: DATE:
Great!
One of the great significances of utilizing a computer is communication. Did you not realize
that there should a communication happening between these devices in the IPO diagram? That there
is a communication between the past and the future in computer evolution, there are communications
between the computer systems and its peripherals including all the software running in it? We call
this process - computer communication, which describes as a process in which computers or devices
transfer data, instructions, and information. Thereby which people create, exchange, and perceive
information via networked communication classifications is also considered a
_____________________, including the nonnetworked computers that facilitate encoding,
transmitting, and decoding data or information. Some communications involve cables and wires,
When data transmission (multimedia or files) takes place only between computers through a
communication medium such as wires or cables is known as a Computer Network, when between
mobile devices that is called a ________________ Network, and when between computers and
mobile devices that are known as a Device Network.
Thus, a network consists of two or more _____________________ that are connected or linked
to share resources (such as printers and optical drives), access and exchange files, or allow electronic
communications via the local connection (LAN) or wireless local connection (WLAN). The
computers may be connected via hardwired such as cables, telephone lines, or through wireless such
as Bluetooth, wi-fi, NFC, infrared light beams, radio waves, or satellites. As I have said, the Internet
is the most prevalent resource shared today because the __________________ itself is considered a
huge computer network.
The Internet
Let us proceed… how many of you do not know what the Internet is? Very basic, right? But
if you have never used the Internet before, you may be amazed and think, “How did this happen?
How did these immense amounts of information fit on the Internet and seem boundless?” Here,
we'll just introduce and define what is the Internet because we will have a separate and more
intensive discussion about how it is being used, how it works, how to connect, etc.
According to Rouse (TechTarget), the Internet sometimes called simply " the ___________,"
is a worldwide system of computer networks – a network of networks in which users at any one
computer can, if they have permission, get information from any other computer (and sometimes
talk directly to users at other computers). It was conceived by the Advanced Research Projects
Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original
aim was to create a network that would allow users of a research computer at one university to "talk
to" research computers at other universities. A side benefit of ARPANet's design was that, because
messages could be routed or rerouted in more than one direction, the network could continue to
function even if parts of it were destroyed in the event of a military attack or other disasters.
Our Internet today is now for public consumption, accommodating and self-sustaining facility
accessible to all of us all over the world. Thus, it is right and just to use these advantages for our
prolific and utmost self-progress and significance.
|E: DATE:
Good answer!
Alongside the fast evolution of the Internet transpired how fast technology expands. Now, we
are in the advent of wearable computers, or shall I say, we are already into it because it is already
in the process of innovation. ____________________ defines as a hand-free system with a data
processor supported by a user's body rather than an external surface. These devices may have some
components (bionic lenses or smart contact lenses, camera, head-worn display, touch panel, screen,
smartwatch, wrist-mounted keyboard, and the like) that work together to bring technology to
enhance or aid situational and environmental interactions.
According to FutureForAll.org, as shown in the picture above, “The front panel from my very
first computer, 1982, Data General Nova 1200, was the cat's pajamas because it allowed me to enter
two characters (16 bits) at a time, instead of eight bits (a byte). I was pleased as punchcards to enter
my ten-letter name in under a minute in binary code. Today, I talk into my 64-bit smartphone, and
as quick as my kids, it talks back.”
I used a desktop computer 25 years ago using DOS (stored in a floppy disk or diskette) boot it
up and met Super Mario for the first time. That was far, far “done to death”. Imagine another 25
years from now, is it not mind-blowing?
As to concretize the big idea, anyone who tackles the future of computers weighs his/her
research based on _____________________, named after Gordon E. Moore, the Intel co-founder.
The Moore's Law is being described in this Intel infographic:
What would the world be like, if computers the size of molecules become a reality? These are
the types of computers that could be everywhere but never seen. Nano-sized bio-computers that
could target specific areas inside your body. Giant networks of computers, in your clothing, your
house, your car. Entrenched in almost every aspect of our lives and yet you may never give them a
single thought (ffa, n.d.).
What would be like living with such computers after 25 to 30 years from now? We may not
see them all, but we can rediscover some of them now. Help me to do the task. I give you the name,
give me the description, function, or purpose.
|REFERENCES
• Coleman, n.d., “A Brief History of Computers”, retrieved Aug. 30, 2020 from
http://www.cs.uah.edu/~rcoleman/Common/History/History.html
• Inc. Editorial, n.d., “Computers and Computer Systems”, retrieved Aug. 30, 2020 from
https://www.inc.com/encyclopedia/computers-and-computer-systems.html
• Whitney, 2017, “Are Computers Already Smarter Than Humans?”, retrieved Aug. 30, 2020
from https://time.com/4960778/computers-smarter-than-humans/
• Computer Hope, 2020, “Software”, retrieved Aug. 30, 2020 from
https://www.computerhope.com/jargon/s/software.htm
• Posadas, nd., “TEACHING COMPUTER NETWORKING”, retrieved Aug. 30, 2020 from
https://sites.google.com/site/pnutpck11/home
• Abousen, n.d., “Networking and Communication”, retrieved Aug. 30, 2020 from
http://www.contrib.andrew.cmu.edu/~dabousen/Default%20-%20Copy%20(2).html
• GFC, n.d., “Internet Basics - What is the Internet?”, retrieved Aug. 30, 2020 from
https://edu.gcfglobal.org/en/internetbasics/what-is-the-internet/1/
• fcit, n.d., “Internet Basics”, retrieved Aug. 30, 2020 from
https://fcit.usf.edu/internet/chap1/chap1.htm
• FutureForAll.org, n.d., “Future Computers: What Will Computers Look Like in 30 Years?”,
retrieved Aug. 30, 2020 from https://www.futureforall.org/computers/computers.htm
|E: DATE:
To make sure that you are not confused, kindly give me another analogy to
differentiate the Internet from the Web.
Nice one!
It all began as early as 1844 when Samuel Morse sent the first tele___________ message from
Washington D.C. to Baltimore, Maryland, containing the words, “What hath _________ wrought?”.
This was considered as the first origin of long-distance communication and thus the beginnings of
the internet.
However, the significant revolution of the Internet started as a way for government researchers
to share information in the (year) _________s because computers that were large and immobile.
Covered under Copyright Law of the Philippines P a g e 18 | 49
All Rights Reserved @ OLSHCO
The information stored in any one computer had to either travel to the site of the computer or have
magnetic computer tapes sent through the traditional postal system.
Moreover, Cold War stoked the catalyst in the Internet formation development. The launch of
the Soviet Union’s ______________ satellite urged the U.S. Defense Department to consider several
means information dissemination was still possible even after a nuclear attack, leading
________________________________________________(ARPANET) formation, the network
that ultimately evolved into what we now know as the Internet. ARPANET was successful but
members were limited to certain academic and research organizations who had contracts to the
Department of Defense. Thus, other networks were established for information sharing.
On January ____, __________ is considered the official birthday of the Internet. Due to non-
standardized way of various computer networks to communicate in the Defense Data Network, a
new communications protocol was established called ____________________________________
(TCP/IP) allowing different kinds of computers on different networks to linked up to each other and
all networks were connected via universal language.
Now kindly fill in our timeline to give a complete synopsis of our timeline.
1883
October 4, 1957
1965
A UCLA team developed host-level internet protocols that became the basis of
1968
ARPANET, then waited an entire year to use them for anything worthwhile.
October 29,
1969, 10:30 pm
Bob Thomas developed the first worm, dubbed “The Creeper Virus,” displayed
1971
on the network’s computers: “I’m the creeper. Catch me if you can.”
Ray Tomilson of BBN invented the first email program. He established the
1972 protocol of using @ for email addresses that were still used today and also the
word “Internet” was also used for the first time.
1974
Queen Elizabeth became the first state leader to send an email, proving it’s not
March 26, 1976
just her skills behind the wheel that make her revolutionary.
The Internet Protocol Suite, shortened as “Internet”, was introduced, which
1982
marked the beginning of the backbone of the modern internet that we used today.
The first public e-mail was sent from the United States to Germany and simply
August 3, 1984
read “Willkommen CSNET,” or “welcome to the internet.”
November 3,
The Morris Worm shut down over 10% of the Internet.
1988
November 1989
Alan Entage invented Archie, the first attempt to index the growing internet and
1990
a precursor to search engines. He was nicknamed “The CodeFather”.
Al Gore helped pass a bill, known as the High-Performance Computing and
1991 Communications Act, that allocated $600 million to create a national
information super-highway.
The World Wide Web’s creator, Tim Berner-Lee, established the first public
August 6, 1991
website the day before the web debuted to the public.
August 7, 1991
The very first image uploaded to the web was of a band that performed science-
July 18, 1992
themed ditties called the “Les Horribles Cernettes”.
The first AOL instant message was sent from Ted Leonsis to his wife. It read
January 6, 1993
“Don’t be scared. It’s me. Love you and miss you.”
November 10,
1993
Napster was ordered to shut down access to music from artists who had not
March 6, 2001
given consent for their music to be shared.
April 28, 2003 Apple launched the iTunes store, selling over 1 million songs in its first week.
February 4, 2004
User Jawed posted the first video to YouTube, titled “me at zoo,” with elephants
April 23, 2005
swinging their trunks in the background of his short clip.
2005
Internet Basics
In understanding Internet basics, this will lead us into its top layer – its services, the Web, since
we already know that the Internet is a worldwide telecommunications system that provides
connectivity for millions of other, smaller networks; there allowing computer users to communicate
with each other across distance and computer platforms. It acts as a pipeline to transport electronic
messages from one network to another network called the “hop” of a data packet. Whereas the
server, a fast and powerful (“super”) computer, is the heart of most networks manages the
communication of information between the peripheral devices, also known as “nodes,” connected
to a network, such as computers, ________________, mobile devices or other servers.
One vital service is the ______________________ (ISP) that allows the user access to the
Internet through their server. Anyone capable can connect to the Internet through telephone lines,
cable modems, fiber optics, cellphones, and other mobile devices. Here in our country, our ISPs
known as _____________________ Telcos are regulated and governed by the implementing body
______________________________(NTC) and _________________________________ (DICT).
|E: DATE:
Good answer!
An internet browser, a.k.a. _______ browser or simply a browser, is a software program that
allows you view and access web pages or explore content of the web on your computer through its
____________________________________(URI)s, or Uniform Resource Names (URNs), or
____________________________________(URL)s. It provides you the user interface or gateway
to the internet. In 1990, the first web browser was released by Sir Tim Berners-Lee and named
WorldWideWeb and later changed its name to Nexus, which gave a basic way to view web pages.
However, since it was only presented with text-based, bland, and hardly used without technical
know-how, it had limited users back then. Until in 1992, Mosaic was introduced.
|E: DATE:
Often, we interchange a web browser from a search engine. Can you help us give
their difference?
Very good!
|E: DATE:
As we go on learning about the Internet, it is right also to include to know how does the Internet
works and how we are going to access it. It is quite complicated to explain but let us look at some
of the most important things we should know instead. Now going back to our definition earlier, we
must realize that the Internet is a global network of physical cables that include copper telephone
wires, TV cables, and fiber optic cables and not only that, wireless connections as we know it like
Wi-Fi and 3G/4G/5G depend on these physical cables called “backbone” to access the Internet.
First and foremost, you've to choose your ISP, most providers have an assigned technician to
visit your house to do the initial setup and connection. If not, you will refer to the instruction manual
to do the setup and Internet connection yourself, including the modem.
Covered under Copyright Law of the Philippines P a g e 24 | 49
All Rights Reserved @ OLSHCO
When your ISP gives its user access to the ISP’s network, the users are connected to the internet
via telephone lines, wireless connection, or through other standard networking methods. The
information is transferred between computers using protocols – a set of rules for the transmission of
data between devices.
Help here. I will enumerate the different protocols then give me their description, function, or
purpose respectively:
|PROTOCOLS DATE:
After everything has been set up, you can now open your web browser and begin to surf the
Internet. You can call your ISP's technical support number or schedule a technical visit via their
available app if problems with your Internet connection arises.
To know more, watch the comprehensive presentation on how the Internet works with this
link: http://www.just.edu.jo/~cis99/internet/ls01/ls01.mp4
OTHER INTERNET SERVICES
From our previous discussion, you learned that the ISP is needed to access the internet. When
we are connected to the internet, there are other services that we can enjoy. These internet services
available are responsible for transmitting a specific type of information. These are the following:
• Communication services
• Information-retrieval services
• Web services
• World Wide Web
• Video conferencing
Communication Services. These are various Communication Services available that offer
exchange of information with individuals or groups:
1. Electronic Mail – known as _______________, it sends electronic message over the internet.
2. Instant Messaging, also known as _____________ – offers real-time chat between
individuals and group of people; e.g. Yahoo messenger, MSN messenger, WhatsApp, FB
Messenger, iMessage, etc.
3. ___________________________ (IRC) – allows the people from all over the world to
communicate in real time.
Information Retrieval Services. These services offer easy access to information present on
the internet as I introduce and describe them below:
Web Services. These services allow the exchange of information between applications on the
web. When using these services, applications can easily interact with each other, which renders
using the concept of Utility Computing such as:
1. Grid computing – a computer network in which each computer’s resources are shared
such as processing power, memory, and data storage are all community resources mainly
for specific tasks, e.g. World Community Grid and SKA (Square Kilometre Array)
2. Cloud computing – a method of storing and accessing data or software over the Internet
without worrying about using up storage space, unlike a local hard drive. “The Cloud” is
tech jargon for a virtual, seamless connection.
3. Great Internet Mersenne Prime Search (GIMPS, January 1996) – discovers new world-
record-size Mersenne primes that GIMPS harnesses the power of thousands of small
computers like yours to search for these “needles in a haystack”.
World Wide Web. In some viewpoints, the World Wide Web is considered as the leading
Information Retrieval Service but functions more than that, it is a part of the Internet that provides
access to images and sound in addition to text. It is also a complete system of interlinked
documents that use HTTP, residing on the internet and accessible to users via a web browser.
We’ve provided services like cloud storage, file-sharing, and file-syncing services to help us to
study, work, and many others more likely easier than before.
1. Cloud-based file sharing. Let us you easily store and share multimedia files (files,
documents, photos, and videos). But we need to specify those common file-sharing
services based on their icon or logo and describe them briefly.
| FILE-SHARING SERVICE
2. Streaming. It a service that allows the user to view live events, series, movies, and
sporting events over the internet. This includes streaming to your smartphone, smart
television, or computer. E.g. Twitch, a streaming platform dedicated to gamers; Netflix, a
platform dedicated to series and movies; Showmax, a platform was released in South
Africa just before Netflix that streams some movies not available on Netflix, including
Afrikaans movies and series.
3. Government Internet Services. These are internet services that allow users to skip
queues by using government websites, from the comfort of their homes, to conduct
business, pay bills, and obtain information. E.g. Paying TV Subscription, Electoral
Information, Submitting Tax Returns thru ____________________________ (commonly
known as e-filing), Smart ID, and Passport Applications, Online Tertiary Applications, an
online Central Applications Clearing House (CACH) for students who have not succeeded
in finding a place at a tertiary institution and they will be assisted to find a place at a
tertiary institution.
Video Conferencing. Also known as ____________________________ is a method of
communicating by two-way audio and video transmission with help of telecommunication
technologies. Modes of Video Conferencing can be:
2. Multi-point connects more than two locations through Multi-point Control Unit
(MCU).
• DC, 2018, “The History of the Internet in a Nutshell”, retrieved Aug. 30, 2020 from
https://www.dugcampbell.com/wp-content/uploads/2018/11/brief-history-of-the-
internet.jpg
• Craig, 2019, “The History of the Internet in a Nutshell”, retrieved Aug. 30, 2020 from
https://www.webfx.com/blog/web-design/the-history-of-the-internet-in-a-nutshell/
• GCF, n.d., “Internet Basics - What is the Internet?”, retrieved Aug. 30, 2020 from
https://edu.gcfglobal.org/en/internetbasics/what-is-the-internet/1/
• GRAUSCHOPF, 2020, “Internet Browsers: A Simple Guide to How They Work”, retrieved Aug.
30, 2020 from https://www.thebalanceeveryday.com/what-is-internet-browser-892819
• gcfglobal, n,d, “Getting started with the Internet”, retrieved August 30, 2020 from
https://edu.gcfglobal.org/en/computerbasics/getting-started-with-the-internet/1/
• just.edu.jo, n,d, “How do I connect to the Internet?”, retrieved August 30, 2020 from
http://www.just.edu.jo/~cis99/internet/ls03/ls03.html
Previously, we already knew the basics, the know-how, and the services of the Internet. This
platform or shall I say the medium is accessible and universal in almost across the globe, across both
private and public services, in all businesses, professions, fields, and so on and forth. When new
look into the bright side, it opens the horizon of opportunities and expand possibilities for more
people to shape, to rediscover their own lives. However, there is always a dark side, that’s why
laws, regulations, policies, and security protocols are necessary to ensure that everything is at the
(b)right side.
Come to think of it, our library is available but why do we need to search on the internet? It is
more prevalent, easier, and convenient with the use of search engines, perhaps, because today,
especially this time of the pandemic, the internet is imperative in our daily lives as an educator or as
being a student. As I have said, the appropriate use of the internet makes our lives easier, faster, and
simpler than ever before. It helps us excerpt facts and figures, information, and knowledge for our
consumption, and development or it depends on our goals, needs, and requirements.
Here are the most important categories why we need to search on the internet:
1. Internet for Education. This great platform is very useful for students to learn throughout
their lifetime, especially this time of the pandemic. Research resources, tutorials, DIYs,
LMS implementation, online education programs, and of course classes are mostly
conducted online today. Teachers deliver learning online to teach students around the
world.
2. Internet Speeds Up Tasks. Our daily routine tasks or multitasks are being sped up ensuing
throughput, including for money transfers, paying bills online, shopping, ordering food
online, etc.
3. Shopping Made Easy. Through the internet, shopping becomes global. You can order
products online from different countries, if not available in your country.
5. Business Promotion and Innovation. Selling products online is now a trend through
various e-Commerce solutions. The result is new services and businesses creating job
opportunities and reducing unemployment.
7. Digital Transactions. The internet facilitates online banking, mobile banking, and e-
wallets services and transactions. Using digital transactions stored in a database, the
government can easily track income tax details or income reports in the ITR.
8. Money Management. Now, there are many web-based applications, and other tools that
help us in our daily transactions, money transfers, budget allocations, and management, etc.
9. Travel & Tour. The internet is highly effective as it serves as a guide. People browse the
internet and look for promising accommodation before visiting a place. They can even book
their vacation using the internet.
10. Entertainment & News. Our favorite movies, music, arts, etc are available online. News
can be available in real-time.
The influence of the internet on our lifestyles is so great. It has opened “the wonderland” of
information and services. Considering its scope and importance, can you imagine a world without
the internet?
|E: DATE:
Can you give another important reason, except those given above, why do you
search on the internet?
Nice one!
After knowing the common reasons why, we do search on the internet, I will try to provide
recommended search engines and some techniques to be more effective in using engines in the
search topic. This will cover a guide to information on formulating effective searches, the
limitations of only relying on Web sources, and how to evaluate them.
The answer would be B. using the proper keywords and phrases are more effective in searching
for something on the internet because that’s how search engines work proficiently.
In most cases, we do not need and want to type in a long sentence or sentence fragments, just
take your search topic and translate it into the most important keywords that describe your topic,
this is the most effective search technique. In some cases, in which you use a sentence as your
search phrase when you are gathering background information, you will be having trouble finding
the “nearest” information, due to more likely authors will use such similar wordings in their articles,
books, journals, and writings.
Thus, according to McLennan Community College, the other tips concerning keywords:
• Avoid putting too much into one search - pick the best keywords that you expect the
author to be using in their discussion and adjust along the way.
• Common words to describe an issue versus professional and technical terminology can
often affect the scholarly nature of your search results. For instance, "public education
reform" versus "improving our schools."
1. PHRASES. To search for two or more words in exact order, place quotation marks around
the phrase. The computer will only return documents containing that specific phrase rather
than documents containing each word found individually anywhere in the document, e.g.
"obsessive-compulsive disorder.”
Unfavorably, I can tell you whether your essay, reaction papers, or reflection are just
products of copy-paste or plagiarism. So, I encourage everyone to kindly acknowledge
the original author of your work .
| Try this…
Try plagia*, what you’ve got? List down below.
Nice!
Most search engines have advanced search features or tips for better searches, allowing you to
be more specific with your search and refine your search results. You can use the following search
limits and more (McLennan Community College, 2020):
If the search engine does not have a separate advanced search screen, use the search filters that
appear on the search results page (Google, Yahoo, DuckDuckGo, Google Scholar) or view the Help
section for search tips (allintitle; site; filetype).
For instance, Google (http://www.google.com) is currently one of the best Internet search
engines. It displays the search term in context and has excellent results ranking system. Google has
"Basic" and "Advanced" search modes. Here are some tips for doing "Basic" Internet searches using
Google:
• Phrase searching: Use quotation marks for words that should be found together in that
order. (e.g. "electoral reform")
• Multiple terms: Boolean "and" is stated as the automatic default, so entering two or
more words should retrieve pages containing all the terms you enter. (e.g. elections
reform) However, if not all terms are found, results will display without them. To force
retrieval of results for all keywords, enter each word with a plus sign (+) directly before
it. (e.g. +elections +reform)
• Narrowing a search: Enter more search terms to specify more clearly what you want
to find. (e.g. elections reform Canada)
• Broadening a search: Use "OR" to search for alternative terms at the same time. (e.g.
"election reform" OR "electoral reform")
Advanced Searching: See the Google Advanced Search page for more ways to search
efficiently. Consider also using other search engines. Selected subject-specific search engines
may be listed in the Library Subject Guides (Mount Allison University Libraries and Archives,
2020).
Using Boolean operators is also big help is searching for your topic like what had been defined
in the “Multiple terms” above. You can use the link below to know how to use these advance
features:
Database Search Tips: Boolean operators
https://libguides.mit.edu/c.php?g=175963&p=1158594
According to McLennan Community College, doing separate searches for the different points
or subtopics will allow you to find information for each part of your paper. If you are discussing
both sides of a controversial issue, search each side in unique searches. For instance, in discussing
three proposals to improve the voucher system, you may want to search separately for each point
you want to discuss.
• Depending on the assignment, you may need to form your discussion on existing and
available information rather than presupposing the "answers." Otherwise, you could
miss an aspect you had not imagined.
• If you don't have preconceived subtopics or answers in mind and need an overview of
your initial topic.
Search Engines
According to Computer Hope, a search engine is a software accessed on the Internet that
searches a database of information according to the user's query. The engine provides a list of results
that best match what the user is trying to find. Today, there are many different search engines
available on the Internet, each with its abilities and features. The first search engine ever developed
is considered Archie, which was used to
search for FTP files, and the first text-
based search engine is considered
Veronica. Currently, the most popular
and well-known search engine is
Google. Other popular search engines
include AOL, Ask.com, Baidu, Bing,
DuckDuckGo, and Yahoo.
1. Crawlers are types of search engines that use a "spider" or a "crawler" to search the Internet.
The crawler digs through individual web pages, pulls out keywords, and then adds the pages
to the search engine's database. Google and Yahoo are examples of crawler search engines.
3. Hybrids – are a mix of crawlers and directories. Sometimes, you have a choice when you
search whether to search the Web or a directory. Other times, you may receive both human-
powered results and crawler results for the same search. In this case, the human results are
usually listed first.
4. Metasearch engines are ones that search several other search engines at once and combines
the results into one list. While you get more results with meta-search engines, the relevancy
and quality of the results may sometimes suffer. Dogpile and Clusty are examples of meta-
search engines.
There are also specialty search engines to serve specific purposes. These are some:
To be the first page in the lists of search results is not easy. I also wonder how to get the top
five spots in every search. That is the reason small business wants to be found online because to be
in the first in the lists is an advantage.
Covered under Copyright Law of the Philippines P a g e 36 | 49
All Rights Reserved @ OLSHCO
You can create a great website, a splendid one but if you are not using search engine
optimization (SEO) techniques, potential visitors will never be caught.
1. Google Trends - A go-to keyword tool. You can see how search queries change over time when
people search for your keyword and compare different words or phrases to see which is best.
2. BROWSEO - This tool shows you how a search engine sees your site. It strips your site down
to a base level, without any fancy fonts, headers, or images, and displays relevant SEO
information. By looking at your site this way, you can see what needs improvement. Just enter
your URL into the site, no additional downloads necessary.
3. Screaming Frog - Free for the first 500 URLs, this tool crawls your site looking for SEO
roadblocks and provides a report of problem areas. The tool looks for broken links, missing
metadata, oversized files and pictures, duplicate pages, and internal links, just to name a few.
Think of it as an SEO audit. Use the results to improve your site and SEO.
4. GTmetrix – how fast does your website load? Site speed does play a role in search engine
rankings, so you’ll want to double-check the speed of your site with GTmetrix.
5. Rank Checker - where does your website land in search engine results? Find out with Rank
Checker. This tool will show you where your site shows up and give you tips to improve it.
6. Responsive Design Test - how does your site look on a smartphone? Search engines give
preferential treatment to websites that look great on all devices, no matter their size or
orientation.
To ensure your website looks sharp on every device, use responsive website design. This design
adapts to every device, so you don’t need to create multiple sites.
Subject directories, unlike search engines, are human-driven rather than automated. They are
created and maintained by human editors, not electronic spiders or robots. Based on standard
selections criteria, volunteers, or staff (human editors) review and select content. Usually, websites
are described, tagged, or annotated and they can be searched and browsed.
Two subject directories are paired and developed their search engines, which is more powerful.
Both the search engine and the subject directory categories can be seen. Try to check the difference
between their “looks.” If you are reading online or from your softcopy, just press and hold your
Alt key and click each using your mouse pointer:
Not everything that is on the web is easily found with a search engine. There are also some
“secrets” about the Web. There's lots of meaningful information hidden in databases that can never
be indexed by search engines because this information is buried deep under many layers of web
pages, usually, these large amounts of information are stored in databases with subscription fees for
profit. They are contained in the "invisible web". A good searcher should be aware of this type of
information. In contrast with the "visible web" that you can find using general web search engines
or what you see in almost all subject directories. The "invisible web" is what you cannot find using
these types of tools.
In 2000, the first version of this webpage was written. Since then, search engines' crawlers and
indexing programs have overcome many of the technical barriers that made it impossible for them
to find "invisible" webpages.
Why isn't everything visible? There are still some hurdles search engine crawlers cannot leap.
For instance, the contents of searchable databases are protected by login and password. Most
likely, the invisible web is made up of the contents of thousands of specialized searchable
databases like books or library catalogs, article databases, research databases, etc.). When you
search in one of these, the results are generated "on the fly" in answer to your search. Because the
crawler programs cannot type or think, they cannot enter passwords on a login screen or keywords
in a search box. Thus, these databases must be searched separately.
This is one of the tricks in searching the Invisible Web from a regular Search Engine: put the
word "database" in your query e.g. Turing theory database. You will get a list of databases that
you can then search for string theory in. Generally, you will not get articles to read from your
original search. Try it to see the difference by yourself.
• McLennan Community College, 2020, “Searching the Internet”, retrieved September 6, 2020
from https://mclennan.libguides.com/searchingInternet
• Mount Allison University Libraries and Archives, 2020, “Using the Internet for Academic
Research”, retrieved September 6, 2020 from https://libraryguides.mta.ca/research_help
• Ellis, 2018, “Searching the Internet: Types of Search Engines”, retrieved September 6, 2020
from https://libguides.astate.edu/internet
• csulb, 2020, “Search Engines: Unique Search Engines”, retrieved September 6, 2020 from
https://csulb.libguides.com/searchengines
• Contributing Author, 2017, “6 free SEO tools to boost your search engine rankings”, retrieved
September 6, 2020 from https://www.verticalresponse.com/blog/6-free-seo-tools-to-boost-
your-search-engine-rankings/
• USC, n.d. “BARE BONES LESSON 3: SUBJECT DIRECTORIES”, retrieved September 6, 2020
from https://www.sc.edu/beaufort/library/pages/bones/lesson3.shtml
• McLennan Community College, 2020, “Searching the Internet”, retrieved September 6, 2020
from https://mclennan.libguides.com/searchingInternet/engines
• ASBURY University, 2019, “Finding Information on the Web: Invisible Web”, retrieved
September 6, 2020 from https://asbury.libguides.com/websearch
Computer Systems
A modern Computer System is as simple as may seem but complex as we scrutinize its
components. It is simple because, over the years, many of the components used to construct a system
have become integrated with other components into fewer and fewer actual parts. It is complex in
the sense that each part in a modern system performs many more functions than did the same types
of parts in older systems.
| Let us begin with the simple ones, the main parts. I will enumerate them then
describe them concisely:
| Let us continue with the internal peripherals necessary to assemble the System Unit
(Base Unit):
Note: As you input information into the computer, at the lowest level, all the computer understands
is binary language (0's and 1's). Binary and machine language will be presented later.
Processing. After a computer has received input data, the processor and certain program
process that data. A typical program may calculate, manipulate, or organize that data to create
information that is understandable, presentable, and meaningful to the user.
Output. After the data is processed into information, it is displayed as output to the user through
the monitor e.g. photo or movie.
Storage. Finally, the computer can store the created information for later use.
As we come to realize in a closer look, on that processing function, there are internal
components responsible for data processing within the ______________________________(CPU)
itself based on the diagram below.
After receiving data and commands from the user, through the Central Processing Unit (CPU)
– the “brain” (the processor), a computer system must process it according to the instructions
provided. In processing the data, aside from the application, the CPU further uses these three
elements:
1. Memory Unit. Once a user enters data using input devices, the computer system stores this
data in its memory unit. This data will now remain here until other components of the CPU
process it. The memory unit uses a set of pre-programmed instructions to further transmit
this data to other parts of the CPU.
2. Arithmetic and Logic Unit. This part of the CPU performs arithmetic operations. It does
basic mathematical calculations like addition, subtraction, division, multiplication, etc.
Further, it can even perform logical functions like the comparison of data.
Execution cycle (light blue color): In the execution cycle CPU also takes two steps:
3. Execute: When the command is executed, the CPU carried out the instructions in order by
converting them into macrocode.
4. Store: The CPU may be required to store the result of an instruction in memory
We use computers to process huge amounts of data because of instant output and throughput,
because of speed and accuracy, and because humans are prone to error. Computers process data so
fast (without compromising the accuracy) that their speed is measured in millions of instructions
per second (MIPS).
In the other context of the system software, a system component is a process, program, utility,
or another part of a computer's operating system that helps to manage different areas of the computer.
While like a computer program, a system component is not something an end-user directly interacts
with when using a computer.
Process management. This component is tasked with managing the many processes that are
running on the operating system, particularly one or more processes associated with the running
Software Application processes, e.g. when you are browsing the internet using Chrome application.
File management. It manages anything to do with computer files, from creation, storing,
retrieval, modification, and deletion, including its properties. This component also handles tasks
related to the creation, modification, and deletion of folders, or directories, on a storage device.
Secondary Storage Management. This works with storage devices itself, like a
__________________________(HDD), ______________________________(USB) Flash Drive,
_______________________________(DVD) drive, or floppy disk drive. It manages the available
space, or free space, on the storage device and allocating space for new files to be stored there.
Access Management. It tasks with managing user access to data on a computer alongside with
file management through the OS. User accounts provide each user with specific access to software,
files, and functionality in an operating system including the ability to install a software program.
System Resource Management. This component is responsible for managing the allocation of
system resources, like memory and CPU time, in order for programs to function properly and to
determine how much memory and CPU time that program can use at any given time to maintain an
efficient performance of the computer.
System Resource Management. This component is responsible for managing the allocation of
system resources, like memory and CPU time, for programs to function properly and to determine
how much memory and CPU time that program can use at any given time to maintain an efficient
performance of the computer.
Data Representation
In Digital Technologies, from the word “digital,” which means representing data as numbers;
thus, number codes are used for the discrete representation of information. Data are characters
Covered under Copyright Law of the Philippines P a g e 45 | 49
All Rights Reserved @ OLSHCO
(alphabetic letters, numbers, and symbols), images, sounds, and the like that when represented by
number codes, can be stored, retrieved, manipulated, and communicated by digital systems, e.g.,
characters may be represented using ASCII code or in binary digits and for images may be
represented by a bitmap of numbers representing each 'dot' called pixel.
To more specific in the real concept, data refers to the symbols that represent people, events,
things, and ideas. Data can be a name, a number, the colors in a photograph, or the notes in a musical
composition. Whereas, data representation refers to the form in which data is stored, processed,
and transmitted. Devices such as smartphones, iPods, and computers store data in digital formats
that can be handled by electronic circuitry. Digitization is the process of converting information,
such as text, numbers, photos, or music, into digital data that can be manipulated by electronic
devices.
Why does a computer need to digitalize information? The computer does not understand human
language. Any data, viz., letters, symbols, pictures, audio, videos, etc., fed to the computer should
be converted to machine language first. Computers represent data in the following three forms:
1.3. The decimal number system, our known number system, represents values in
10 digits.
| Based on your previous readings, kindly fill in the blacks in the table below.
Text Code. Text code is a format used commonly to represent alphabets, punctuation marks,
and other symbols. The four most popular text code systems are EBCDIC, ASCII, Extended ASCII,
& Unicode.
EBCDIC - Extended Binary Coded Decimal Interchange Code is an 8-bit code that defines 256
symbols.
TABULAR COLUMN
ASCII - American Standard Code for Information Interchange is an 8-bit code that specifies
character values from 0 to 127.
ASCII TABULAR COLUMN
Unicode – is a Unicode Worldwide Character Standard uses 4 to 32 bits to represent letters, numbers,
and symbol.
UNICODE TABULAR COLUMN
Though this is not already part of our lesson, I just want to tickle your minds. There are also
conversions for data or numbering systems back and forth: binary, decimal, octal & hexadecimal,
which you can encounter in your other subjects as you go on with your studies in IT. You can watch
YouTube tutorial or if you are fond of textual presentations these are the links you can access to learn
about the conversion procedures:
https://www.wikihow.com/Convert-from-Decimal-to-Binary
You can also use this online converter is you want to counter check your answer when you are
practicing the manual computation of the conversion.
https://www.rapidtables.com/convert/number/decimal-to-binary.html?x=29
|REFERENCES
• www.daydreameducation.co.uk, n.d., “A Computer System”, retrieved September 8, 2020
from https://www.daydreameducation.co.uk/media/catalog/product/i/c/ict052-a-computer-
system_1.jpg
• Siyavula, n.d., “Hardware and Software”, retrieved September 8, 2020 from
https://intl.siyavula.com/read/it/grade-10-it/basic-concepts-of-computing/01-basic-
concepts-of-computing?id=sec1-2
• peda.net, n.d., “The Computer System”, retrieved September 10, 2020 from
https://peda.net/kenya/ass/subjects2/computer-studies/form-1/the-computer-system
• mathbits, 2020, “Four Equipment Functions”, retrieved September 10, 2020 from
https://mathbits.com/JavaBitsNotebook/Introduction/FourFunctions.html
• www.topp.com, n.d., “Components of a Computer System”, retrieved September 8, 2020 from
https://www.toppr.com/guides/accountancy/application-of-computers-in-
accounting/components-computer-system/
• Computer Hope, 2019, “How does a computer process data into information?”, retrieved
September 8, 2020 from https://www.computerhope.com/issues/ch001996.htm
• Computer Hope, 2019, “System component”, retrieved September 11, 2020 from
https://www.computerhope.com/jargon/s/system-component.htm
• Mueller, 2002, “PC Components, Features, and System Design”, retrieved September 10, 2020
from https://www.informit.com/articles/article.aspx?p=29470&seqNum=3
• tutorialspoint, 2020, “Representation of Data/Information”, retrieved September 8, 2020 from
https://www.tutorialspoint.com/computer_concepts/computer_concepts_representation_data
_information.htm