0% found this document useful (0 votes)
185 views21 pages

Itc 1ST Term Reviewer

The document provides information about computer science, information systems, information technology, and IT departments. It discusses the study of computer science, jobs in computer science, information systems, information technology professionals, roles in an IT department, computer-related fields and disciplines, and computer information systems programs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
185 views21 pages

Itc 1ST Term Reviewer

The document provides information about computer science, information systems, information technology, and IT departments. It discusses the study of computer science, jobs in computer science, information systems, information technology professionals, roles in an IT department, computer-related fields and disciplines, and computer information systems programs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Introduction to • They are responsible for selecting

hardware and software products


Computing Finals
appropriate for an organization.
Reviewer • Integrate products according to
organizational needs and
M1: What is Computer Science? infrastructure, and install, customize,
• Study of computers and and maintain those applications to
computational systems. provide a secure and effective
• Ranges from theory through environment that support the
programming to cutting edge activities of the organization’s
development of computing solutions. computer users.
• Permits graduates to adapt to new
technologies and ideas. The IT discipline require skills such as:
• Most CS programs require some • Understanding of network systems,
mathematical background. such as their composition, structure,
weaknesses, and strengths.
CS jobs fall into three categories: • Important software system concerns
a. Designing and building software. such as reliability, security, usability,
b. Developing effective ways to solve effectiveness, and efficiency for their
computing problems. intended purpose.
c. Devising new and better ways of using
computers. The Computer Industry

What is Information Systems? Expected demand for computer


• Concerned with the information that professionals:
computer systems can provide to • Currently 10.5 million computer
help companies in achieving its workers.
goals. • Increase of 2-3% annually.
• Concerned with processes that an • Students majoring in computer-
enterprise can implement and related fields are declining.
improve using IT.
Job opportunities in the industry include:
IS professionals must: 1. General business and government
a. Understand both technical and organizations.
organizational factors. 2. Computer equipment field
b. Help an organization determine how • Manufacturers and distributors of
IT enabled processes can provide a computer-related hardware.
foundation for organizational • Involve design, manufacture, and
performance. production of computer
equipment.
What is Information Technology? 3. Computer software field
• IT is a label that has two meanings. • Companies that develop,
• Common usage: IT – used to refer to manufacture, and support
all of computing. software.
• Undergrad degree program: IT – 4. Computer service and repair field
refers to the preparation of students • Provides preventative
to meet the tech needs of maintenance, component
organizations. installation, and repair services.
5. Computer sales
Traits IT professionals must possess include • People working in this field need
the ff. general understanding of
computers and specific
• Possess the right combination of knowledge of the product they
knowledge and practical, hands-on are selling.
expertise to take care of both the 6. Computer education and training
organization’s IT infrastructure and field
the people who use it. • Educates in schools, colleges,
universities, and private
companies.
7. IT consulting field. 7. Database Administrator.
• Individuals who draw upon 8. Network Security Specialist.
expertise in specialized area of 9. Web Administrator/Webmaster.
computers. Operations:
a. Computer selection 1. Computer Operator.
b. System design 2. Data Communications Analyst.
c. Communications Training:
d. Hardware and software 1. Corporate Trainer
configuration • Teach employees how to use
e. Network design and software, design and develop
installation systems, and program.
f. Web development 2. Help Desk Specialist.

What is an IT department? Three broad disciplines in computer (and


• Department in business or their differences):
government that employs people in
computer-related jobs. Computer CS/Software Computer
• Responsible for keeping all computer Information Engineering Engineering
operations and networks operating Systems
smoothly. Practical and Theory Design
application Oriented. Oriented.
Jobs available in an IT department: oriented.
Business and Math and Math and
Management: Management Science Science
1. Chief Information Officer/VP of IT. Oriented. Oriented. Oriented.
2. E-commerce Administrator. Understand Understand Understand
3. Project leader/Manager how to design the the
• Analyzes requirements, designs and fundamental fundamental
solutions, oversees development implement nature of nature of
processes. information hardware and hardware and
4. Chief Security Officer. systems. software. electronics.
5. Network Administrator.
Certificate Degrees Degrees
System Development and Programming: degrees include B.S., include B.S.,
1. Application Programmer – Software. include A.A., M.S., Ph.D. M.S., Ph.D.
A.A.S., A.S.,
• Writes and tests computer
B.A., B.S.,
programs.
M.S., Ph.D.
2. Computer Scientist – Software.
• Researches, invents, and develops
Computer Information Systems (CIS)
solutions to complex software
problems.
3. Software Engineer – Software. • Programs that emphasize
technical knowledge and skills.
• Designs and develops software.
4. Systems Analyst. • Also known as management
5. Technical Writer. information systems (MIS) or
6. Technical Lead. management information
7. Database Analyst. technology.
8. Systems Programmer.
9. Web Page Author. Computer courses covered in CIS include
Technical Services: but are not limited to:
1. Computer Forensics Specialist. • Introduction to Computers
2. Desktop Publisher. • Object-oriented Programming
3. Quality Assurance Specialist. • Networks
4. Computer Technician – Service and • Computer Operating Systems
Repair. • Systems Analysis and Design
• Installs, maintains, and repairs • Database Management Systems
hardware. • Web Development
5. Graphic Designer/Illustrator. • Two semesters of two or more of the
6. Security Administrator. following programming languages:
C++, Java, Visual Basic .NET 2003, 7. Information Systems Security
COBOL Association (ISSA)
Other courses: 8. Institute of Electrical and
• Algebra Electronics Engineers (IEEE)
• Accounting and other business 9. National Association of
courses Programmers (NAP)
• Statistics
User group/s
Computer Science (CS) Definition: Collection of people with
common computer equipment and software
• Programs that stress the theoretical interests.
side of programming and operating
systems. Examples:
• Also called software engineering. 1. Apple User Groups
2. Association of Personal Computer
Computer courses covered in CS include User Groups (APCUG)
but are not limited to: 3. C/C++ User Group (CUG)
• Introduction to Computers 4. Independent Oracle Users Group
• Object-oriented Programming (IOUG)
• Data Communications 5. Java Users Groups (JUG)
• Systems Analysis and Design 6. Linux Users Groups WorldWide
• Software Engineering (LUGWW)
• Data and File Structures 7. .NET User Groups
8. UNIX User Groups
• Computer Operating Systems
• Artificial Intelligence
What is professional growth and continuing
• Two semesters of at least one of the
education?
following programming languages:
- Events such as workshops, seminars,
C++, Java, Assembly language.
conferences, conventions, and trade
Math Courses:
shows.
• Calculus – 2 semesters
- Training in form of books, video-
• Physics – 2 semesters
based training, computer-based
training (CBT), web-based training
What is Computer Engineering (CE)?
(WBT), and instructor-led training.
• Teaches students how to design and
develop the electrical components in Staying informed in the computer industry.
computers and peripherals.
• Industry publications.
• Required courses include application
• News, blogs, and technical websites.
and systems programming, data and
file structures, networks, and
Certifications and trends:
operating systems.
Certification – Process of verifying technical
Organizations for computer professionals:
knowledge in a specific area.
1. Association for Computing
Benefits of certifications:
Machinery (ACM) – Science
1. Enhances an employee’s career.
Oriented.
2. Provides better standing as an
2. Association for Information Systems
industry professional.
(AIS)
3. Higher salaries and bonuses.
3. Association for Women in
4. Vendors provide access to technical
Computing (AWC)
information, advanced trainings, and
4. Association of Information
discounts on publications and tools.
Technology Professional (AITP)
(Formerly known as DPMA) –
How do certifications benefit customers,
Programmers, System Analysts, and
employers, and the industry?
Information Processing Managers.
Customers: Receive better service from
5. IEEE Computer Society
employees w/ certification/s.
6. Independent Computer Consultants
Employers: More productive and
Association (ICCA)
knowledgeable workers.
Industry: Certifications = Self-regulated (MCSA – Microsoft)
standard. 2. Certified Linux Professional
ICCP: Defines standards to raise competence (CNP – Novell)
levels for the computer industry. 3. Red Hat Certified Engineer
(RHCE – Red Hat)
Factors to consider when selecting which 4. Red Hat Certified Technician
certifications to take: (RHCT – Red Hat)
• Expenses and time involved to obtain 5. Sun Certified System
certificate. Administrator
• Employment projections. (Sun)
• Check job listings to see which 6. IBM Certified Specialist
certifications are in demand. (IBM)
• Read evaluations of certifications.
• Talk to industry peers. What are programming certifications?
• Think about certifications that Ø Recognition of programming
complement each other and will help training.
meet your goals. Ø Broadens knowledge and skill based.
1. Certified Software Development
Options available to prepare for Professional
certification: (CSDP – IEEE Computer
1. Self-study Society)
2. Online training classes 2. IBM Certified Solution
3. Web resources Developer
4. Instructor-led training (IBM)
3. Microsoft Certified Professional
What are examinations like? Developer
• Taken using computers. (MCPD – Microsoft)
• Some multiple choices, some are skill 4. Sun Certified Enterprise
based. Architect
• Computerized adaptive testing: The (Sun)
test analyzes a person’s response while 5. Sun Certified Developer
taking the test. (Sun)
6. Sun Certified Programmer
What are application software certifications? (Sun)
Ø Focus on knowledge of application
software. What are hardware certifications?
Ø Sometimes called end-user Ø Recognition of general knowledge of
certification. hardware and controlling software
Ø Some examples are: needed to do set-up, maintenance,
1. Microsoft Office Specialist and repairs on a computer.
(MOS - Microsoft) Ø Can be specific or broadly focused.
2. Microsoft Certified Desktop Ø Some examples are:
Support Technician 1. A+
(MCDST - Microsoft) (COMPTIA – Computing
3. Adobe Certified Expert Technology Industry Association)
(Adobe) 2. IBM eServer Certified Specialist
4. IBM Certified Professional for (IBM)
Lotus Software 3. NACSE Network Technician
(IBM) (NNT – National Association of
5. Macromedia Certified Communication Systems
Professional Engineers or NACSE)
(Macromedia)
What are networking certifications?
What are operation system certifications? Ø Awarded to professionals who
Ø Focus on particular skills. demonstrate proficiency in managing
Ø Differing levels of certification. and troubleshooting a network.
Ø Some examples are: Ø Some examples are:
1. Microsoft Certified Systems 1. Certified Novell Administrator
Administrator (CNA – Novell)
2. Certified Novell Engineer Ø Include the following: web
(CNE – Novell) management, web programming, and
3. Cisco Certified Network web developing certifications.
Professional Ø Some examples are:
(CCNP – Cisco) 1. Certified Internet Webmaster
4. Network+ (CIW – Prosoft Training)
(Computing Technology Industry 2. Cisco Certified Internetwork
Association or CompTIA) Expert
5. Sun Certified Network (CCIE – Cisco)
Administrator 3. Certified Web Professional
(Sun) (CWP – International
Webmasters Association)
What are computer forensics certifications?
Ø Discovery, collection, and analysis of What are database system certifications?
evidence found on computers and Ø Awarded for knowledge of a specific
network. database management system.
Ø Certificate holders are highly credible Ø Test various tasks a database
in cases involving computer crimes. management staff must perform.
Ø Some examples are: Ø Some examples are:
1. Certified Electronic Evidence 1. IBM Certified Solutions Expert –
Collection Specialist DB2
(CEECS – International (IBM)
Association of Computer 2. IBM Certified Solutions Expert –
Investigative Specialists or IACIS) Informix
2. Certified Forensic Computer (IBM)
Examiner 3. Microsoft Certified IT
(CFCE – International Professional
Association of Computer (MCITP – Microsoft)
Investigative Specialists or IACIS) 4. Oracle Certified Professional
3. Certified Computer Examiner (OCP – Oracle)
(CCE – International Society of 5. Sybase Certified Professional
Forensic Computer Examiners or (Sybase)
ISFCE)
Latest trends and technologies.
What are security certifications? a. Artificial Intelligence
Ø Measures a candidate’s ability to • Artificial intelligence continues to be
identify and control security risks to a trend to watch because of its effects
computer resources. on our general lifestyle and the fact
Ø Some examples are: that it’s only in the initial stages.
1. Certified Information Security • AI refers to computer systems
Professional designed to mimic human
(CISSP – ISC2) intelligence.
2. Systems Security Certified • AI can do these tasks faster and
Practitioner sometimes more accurately than
(SSCP – ISC2) humans.
3. Security Certified Network
Professionals b. Machine Learning
(SCNP – The Security Certified • A subset of AI
Program) • Programmed to learn to do things
4. Security Certified Network they are not programmed to do.
Architect • Learn by discovering patterns and
(SCNA – The Security Certified insights from data.
Program) • Neural networks, natural language
processing, and deep learning are
What are Internet Certifications? some subsets of Machine Learning
Ø Require technical expertise in
networking hardware and c. Robotic Process Automation (RPA)
configuration. • Use of software to automate business
processes such as interpreting
applications, processing transactions, • IoT enables devices, home appliances,
dealing with data, and even replying cars, and much more to be connected
to emails. and exchange data over the internet.
• Automates repetitive tasks. • Number of devices reached 8.4
• Can also automates tasks that even billion in 2017 and expected to reach
financial managers, doctors, and 30 billion devices in 2020.
CEOs do.
IT vs. CS
d. Blockchain • IT careers mainly involve installing,
• Offers security that is useful in many organizing, maintaining computer
other ways. systems, designing, operating
• Can be explained as data you can add networks, and databases.
to but not take away from or change. • CS is focused entirely on efficiently
• Consensus-driven so no one entity programming computers using
can take control of the data. mathematical algorithms.
• Both may lead to similar jobs, but
e. Edge Computing differences between the two are quite
• Has always been mainstream with pronounced.
major entities such as Amazon Web • IT = Using software.
Services, Microsoft Azure, and • CS = Mathematics and Software
Google Cloud. design.
• Edge computing has replaced cloud • CS = Programmers, software
computing. engineers, or IT professional.
• Designed to help solve some • IT = Information security, network
problems of cloud computing such as architecture, database administration,
bypassing the latency caused by cloud systems administration, and
computing and getting data to a data computer support.
center for processing.
M2: What is a Computer?
f. Virtual Reality and Augmented - An electronic device, operating using
Reality (VR and AR) instructions stored in its own
• VR immerses the user in an memory.
environment.
• AR enhances the existing Information Processing Cycle:
environment.
• VR has primarily been used for
gaming but has found a niche in Data Collection
other fields. (Input)
• Both have potential in training,
entertainment, education, marketing,
and physical therapy.
Processing
g. Cyber Security
• May not seem like emerging
technology but is evolving just like
other technologies. Produces information.
• New technology is being adapted to (Output)
enhance security.
• The existence of hackers will
continue fueling the need for cyber
security. Categories of Computer:
1. Personal computer
h. Internet of Things - Can perform all its input, processing,
• Many things are now built with WiFi output, and storage activities by itself.
connectivity, meaning that they could 2. Mobile computers/Devices
be connected to the internet and to a. Mobile computer – Personal
each other. computer you can carry from
place to place. (Eg. Notebook
computers, Laptops, Netbooks,
Tablet PCs.) 2. Slide Rule (1630)
b. Mobile device – Computing - Based on Napier’s rules for
device small enough to hold in logarithms.
your hand. (Eg. Smartphones, e- - Used until 1970.
book readers, handheld
computers, portable media
players, digital cameras.)
3. Game consoles
- A mobile computing device designed
for single player or multiplayer video
games.
4. Servers
- Controls access to hardware,
software, and other resources on a
network.
3. Jacquard Loom (1804)
- Provides a centralized storage area for
- Inventor: Joseph Marie Jacquard
information.
- A device fitted to a power loom that
5. Mainframes
simplifies textile manufacturing.
- Large, expensive, powerful computer
that can handle hundreds or
thousands of connected users at a
time.
6. Supercomputers
- Fastest and most powerful computer.
- The fastest supercomputers are
capable of processing more than one
quadrillion instructions in a single
second.
7. Embedded computers
- Special-purpose computer that
functions as a component in a larger
product. (E.g. Mobile and digital
phones, Digital TVs, Cameras, Video 4. Analytical Machine
recorders, DVD players, Answering - Designer: Charles Babbage
machines, Thermostats, Sprinkling - A proposed mechanical general-
systems, CCTVs, Keyboards, Printers, purpose computer.
etc.) - In 1837, this machine was described
as the successor to Babbage’s
Evolution of Computers: Difference Engine.

1. Abacus
- Beads on rods to count and calculate.

Biggest advancements that led to modern


computers:
1. Electricity
2. Transistor
3. Microchip
4. Data Storage
Computers per generation: 3rd generation (1964 - 1971)
- Integrated Circuits
1st generation (1940 - 1956) - ICs helped reduce the size of
- Used Vacuum Tubes. computers even more compared to
- Vacuum tubes are glass tubes w/ the 2nd generation, as well as made
circuit inside. them faster.
- These vacuum tubes have no air
inside of them, which protects the 4th generation (1972 - 2010)
circuitry. - Microprocessor (also known as a
CPU.)
UNIVAC (Universal Automatic Computer) - CPUs, along with ICs helped make it
- Inventors: J. Presper Eckert and possible for computers to easily fit on
John Mauchly a desk and for the introduction of the
- Electrical computer containing laptop.
thousands of vacuum tubes that - IBM 5100 & Altair 8800
utilize punch cards and switches for
inputting data. 5th generation (2010 - present)
- Punch cards for output and data - Beginning of AI usage.
storage.
- Released in 1951 and 1952. Advantages and Disadvantages of
Computers:

Advantage Disadvantage
Speed Health Risks
Reliability Violation of Privacy
Consistency Public Safety
Storage Impact on Labor
Force
Communications Environmental
Impact

Green Computing
- Involves reducing the electricity
Grace Hopper
consumption and environmental
- Programmed UNIVAC.
waste generated when using
- Recipient of Computer Science’s first
computers.
“Man of the Year Award.”
- Recycling, Regulating manufacturing
- Found a moth stuck in a relay
processes, Extending the life of
responsible for a bug, she called it
computers, Donating or proper
“debugging” a computer.
disposal of replaced computers.
2nd generation (1956 - 1963)
Elements of a Computer System:
- Used transistors instead of vacuum
1. Hardware
tubes.
- The electric, electronic, and
- Transistors were widely used in
mechanical components of a
computers in 1956 until 1963.
computer.
- Transistors were smaller than vacuum
a. Input device – Allows you to
tubes and allowed computers to be
enter data and instructions into a
smaller, faster, and cheaper to build.
computer.
b. Output device – Hardware
Transistors (December 23, 1947)
component that conveys
- Inventors: John Bardeen, Walter
information to one or more
Brattain, and William Shockley.
people.
- Made up of semi-conductors.
c. System unit – Case that contains
- Used to control the amount of
the electronic components of the
voltage or used for
computer that are used to process
amplification/modulation or
data.
switching of an electronic signal.
d. Storage device – Records and c. Play video games
retrieves items to and from d. Listen to music
storage media. e. Watch movies
e. Communications device –
Enables a computer to send and 4. Power User
receive data, instructions, and a. Work with multimedia
information to and from one or b. Use industry specific software
more computers or mobile
devices. 5. Enterprise user
2. Software a. Communicate among employees
- Also called a program, tells the b. Process high volumes of
computer what tasks to perform and transactions
how to perform them. c. Blog
a. System software
- Operating system & Utility Application of the computer in different
program. industries:
- Application software. 1. Education
- Installing is the process of setting up 2. Finance
software to work with hardware. 3. Government
3. Data 4. Health Care
- Computer transform data into 5. Science
information. 6. Publishing
- Data = raw material. (Input) 7. Travel
- Information = processed data. 8. Manufacturing
(Output)
- Any set of characters that is gathered M3: Hardware components of personal
and translated for some purpose. computer
- Can be any character, including text,
numbers, pictures, sound, or video. 1. The system unit – The system unit, is
- In a computer, data is a collection of a case that contains electronic
numbers represented as bytes. components of the computer.
- Data is processed by the CPU. a. The inside of the system unit on a
a. Information – a term used to desktop personal compute
describe text that’s readable to includes: Drive bay/s, PSU,
humans. Sound card, Video card,
4. People Processor, Memory.
- Also called users or end users.
5. Procedures I. Motherboard – The main circuit
- Steps that people follow to board of the system unit.
accomplish specific computer-related
tasks. II. Processor – also called the CPU
or central processing unit,
Examples of Computer Usage: interprets and carries out basic
instructions to operate a
1. Home User computer. (Comes in options
a. Personal financial management with Multi, Dual, or Quad cores.)
b. Web access A. Control unit – The
c. Communications component of the processor
d. Entertainment that directs and coordinates
most operations in the
2. Small Office/Home Office User computer.
a. Look up information B. Arithmetic logic unit (ALU)
b. Send and receive email messages – Performs arithmetic,
c. Make telephone calls comparison, and other
operations.
3. Mobile user For every instruction, a processor
a. Connect to other computers on a repeats a set of four basic
network or the internet operations, which comprise a
b. Transfer information
machine cycle. (Decode > Execute - RAM chips usually reside on a
> Store > Fetch.) memory module and are inserted into
The pace of the system clock is memory slots.
called the clock speed, and is - Memory cache – speeds the processes
measured in gigahertz (GHz). The of the computer as it stores frequently
system clock controls the timing used instructions.
of all computer operations.
B. Read-only memory (ROM) – Refers
III. Memory and storage to memory chips storing permanent
1. Memory consists of electronic data & instructions. (Mostly
components that store instructions firmware.)
waiting to be executed by the
processor. C. Flash memory – Can be erased
- Stores three basic categories of items: electronically and rewritten.
1. OS and other system software a. CMOS technology – Provides
2. Application programs high speeds and consumes little
3. Data being processed and the power.
resulting information.
- Each location in memory has an 2. Storage Devices
address. A. Hard disk drive (HDD) is a
- Measured in KB, MB, GB, TB. nonvolatile storage device which
- The system unit contains two types of stores digitally encoded data on
memory: rapidly rotating platters with
a. Volatile memory – Loses its magnetic surfaces.
contents when power is turned B. DVD (also known as digital
off. (Example: RAM.) versatile disk) is an optical disc
b. Nonvolatile memory – Does not storage media format; its main
lose contents when power is uses are video and data storage.
removed. (Examples: ROM, flash C. USB flash drive consists of a
memory, CMOS.) NAND-type flash memory data
A. RAM (Random access memory) storage device integrated with a
- Three basic types of RAM chips: USB interface.
1. Dynamic RAM (DRAM) – Types D. Memory card/flash memory card
of RAM that stores each bit of is a solid-state electronic flash
data in a separate capacitor within memory data storage device
an integrated circuit. capable of storing digital content.
a. SDRAM – Single data rate (These are mainly used with
RAM. digital cameras, handheld
b. DDR SDRAM – Double data computers, etc.)
rate synchronous dynamic
RAM. 3. Input Devices
c. DDR2 SDRAM – Memory A. Keyboard – Used to type data
installed in pairs. into the computer.
d. DDR3 SDRAM – Operates at B. Pointing devices – Move some
lower voltages. objects on the screen and can do
2. Static RAM (SRAM) – Has three action. (Pointing devices also
different states: include joysticks, trackpads, and
a. Standby – the circuit is idle. game controllers.)
b. Reading – the data has been C. Scanner – Allows you to scan
requested. documents, pictures, or graphics.
c. Writing – updating the D. Digital Camera – used to take
contents. electronic pictures.
3. Magnetoresistive (MRAM) – E. Microphones – used to put
Data in MRAM is not stored as sound into a computer.
electric charge or current flows,
but by magnetic storage elements. 4. Output devices
A. Monitors – Shows the processed
information on screen. Produces
a soft copy of the information.
B. Printers – Produces a hard copy Octal decimals
of information. -Same as regular octal but left to right ang
C. Speakers – Used to output sound. computation. (Remember to write w/
decimals.)
M4: Number system
Hexadecimals
Binary – The true language of computers. -Same w/ hexa but left to right din
Radix – Also called base, the total number of computation, put missing zeroes on either
unique symbols available in that system. left or right (yung gitnang per 4 yung unahin
- The largest valued symbol always has niyong ibracket.)
a magnitude of one less than the
radix. Binary decimals
-Magiging negative/decimals yung index niya
Number systems: that's after the decimal point.
1. Decimal numbers – Writing of
numbers in the base–ten numeral Eg:
system. 10.10 = 2.5
2. Binary Numbers – Works the same
way as decimal except its place value -Haha di gets ni hana to bahala na.
is based on the number two.
- 1111 = 15, always 1, 2, 4, 8, 16, etc -Pag may 1 after the decimal point you have
etc. to add the decimals too.
- Each place in the number represents
double the place to its right. (Reading Directional computation:
digits right to left.)
- Has a radix of 2. Only 1 and 0. Normal binary/hexas/octas:
3. Octal Numbers – Has a base or radix
of 8. (0, 1, 2, 3, 4, 5, 6, 7). Right to left lagi ang sulat.
4. Hexadecimal Numbers – Base-16,
has a radix of 16. (0-9, A-F.) Binary/octa/hexadecimal:
- Symbols A-F correspond to decimal
numbers 10 through 15. Left to right ang sulat.

Number systems conversion: (Not from Binary to Decimal:


module)
- Find the zeroes and ones and label
Binary: them with 0, 1, 2, 3, 4, 5, etc etc. to
-1, 2, 4, 8, 16, 32, 64, 128, etc etc. find out the exponent.
-Yung may 1 yung iaadd mo then obsolete na - From there, you take the ones and
yung value nung 0, so kung 1010, magiging the exponent and use 1*2exponent here +
(from right to left) 0+2+0+8 = 10 yung 1*2exponent and repeat the process until
translation. you have all the 1 in the binary. Add
all of them.
Octal:
-Less than 7 dapat lagi lalabas sa numbers na Example:
nandun sa groups kasi 1, 2, 4 lang naman
yung groups lagi. 543210
-If the total number of digits are not divisible = 101010
by 3, you add zeroes to the very left side. = 1*25 + 1*23 + 1*21
-Grouped by 3. = 32 + 8 + 2
= 42 base 2.
Hexadecimals:
-Grouped by 4. Octal to Decimal:
-Same thing as octal except 4 dapat.
-After 9, A-F na yung number value. X*8² + X*81 + X*80 per digit then add
everything.
Octal to binary: An operating system includes different
various options of shutting down.
- Find the binary equivalent per digit in left
to right order. 1 Sleep mode – Saves any open documents
and programs to RAM and turns off
Eg: 7 = 111, 6 = 110, 001 = 1 unneeded functions. Puts the
computer into a low power state.
761 = 111 110 001. 2 Hibernate – Saves any open documents to
a hard disk before removing power
Octal to hexa: from the computer.

- Convert everything to binary. User interface


- Regroup everything to hexa (by fours) from • Controls how data and instructions are
left to right. entered and how it’s displayed on
- Solve. screen.
• GUI: Menus & Visual images.
Hexa to binary:
-Same as octal to binary but get the digits by Memory management – Optimizes the use
4. of RAM. Virtual memory is a portion of a
-After getting the equivalent of each number storage medium functioning as additional
in binary, combine the binary. RAM.

Hexa to octal: Task scheduling – The OS determines the


-Do the hexa process all over, then regroup order of task execution.
all digits by groups of three then solve.
Driver – Small program that tells the
Hexa to decimal: operating system how it should communicate
with a specific device.
X*16³ + X*162 + X*161 + X*160 per digit then
get the sum. Plug and play – Auto-configuration of
devices as you install them.
M5: Software
Operating System Performance monitor – a program that
• An operating system or OS is a set of assesses and reports information about
programs containing instructions that various computer resources.
work together to coordinate activities
among hardware components. Such Operating systems often provide users with
examples of these activities are the capability of:
namely: 1 File managing.
1. Start and shut down a computer. 2 File searching.
2. Provide UI. 3 Image viewing.
3. Program management. 4 Computer security.
4. Memory management. 5 Installing and uninstalling programs.
5. Task coordination. 6 Disk clean up.
6. Device configuration. 7 Defragmenting disks.
7. Establish an internet connection. 8 Problem diagnosis.
8. Performance monitoring. 9 File/disk back-ups.
9. Providing utility. 10 Setting up screensavers.
10. Automatic updates.
11. Network control. Automatic Updates – Automatically
12. Security administration. provides updates to the program, commonly
seen in the operating system.
Operating System Functions:
Network administrator – Uses the server OS
Boot drive – the drive from where your to:
computer starts. - Add and remove users, computers,
1 Recovery disk – Contains a few files that and other devices.
will start the system. - Install software and administer
network security.
- Some OS are designed to work w/ a 3. Image viewer – Allows users to
server on a network. display, copy, and print contents of a
- A server OS organizes and graphics file.
coordinates how multiple users access 4. Uninstaller – Removes a program
and share resources on a network. and any related files from your system
files.
Each desktop user has an account that 5. Disk cleanup – Searches and removes
consists of the ff: unnecessary files.
6. Disk Defragmenter – Reorganizes
Username or User ID – Identifies a specific files and unused space on a
user. computer’s HDD so that the OS can
Password – Private combination of access data faster.
characters associated with the username. 7. Backup utility – Allows users to
create a duplicate file in an isolated
Stand-alone OS storage in case data gets wiped.
- Complete OS that works on their 8. Restore utility – Works with the
respective device. (Eg. Linux, MacOS, backup utility to restore files located
Windows.) within backup.
9. Personal firewall – Detects and
(Skipped Windows and MacOS) protects a PC from unauthorized
intrusions.
1. UNIX – Multitasking OS developed 10. Screen saver – Causes the screen to
in the 1970s. display a moving image or blank
2. Linux – Open source OS similar to screen when idle for a specified time.
UNIX.
Virus – Describes a potentially damaging
Server OS: computer program.
1. Windows Server a. Worm – Copies itself repeatedly in
2. UNIX memory or over a network.
3. Solaris b. Trojan horse – Harmful program
4. Linux that disguises itself to look like a
5. NetWare legitimate program.

Embedded OS: Antivirus program – Protects a computer


- Resides on a ROM chip in a mobile against viruses.
device.
- Examples are: Spyware – Program placed on a computer
a. Windows Embedded CE w/o the user’s knowledge that secretly
b. Windows 10 mobile collects potentially sensitive information
c. Palm OS from the user.
d. iPhone OS
e. Blackberry Spyware remover – Detects and deletes
f. Google android spyware and other similar programs.
g. Embedded Linux
h. Symbian OS Adware – Displays an online ad in a banner
or pop-up window.
Utility programs:
- Type of system software that allows Adware remover – Program that detects and
the user to perform maintenance on deletes adware.
their system.
Filters – Programs the block certain items
1. File manager – Displays list of files, from being displayed.
Organizes files in folders, Copying, a. Web filtering
Renaming, Deleting, Moving, b. Anti-spam
Creating shortcuts, and sorts c. Phishing
files/folders. d. Pop-up
2. Search utility – Attempts to locate
file on your computer based on
requirements you specify.
11. File compression utility – Shrinks size of file/s.
- Frees up room on storage.
- Two types of compression: Lossy & Lossless.
- Compressed files also called zipped files.
12. Media player – Allows you to view media on your computer.
13. Disc burning software – Writes text, graphics, audio, or video files on a CD/DVD.
14. Personal computer maintenance utility – Identifies and fixes OS problems.

- Consists of programs designed to make users more productive or help with personal tasks.

Why/how?
- Makes business activities more efficient.
- Assisting graphics and multimedia projects.
- Support home, personal, and educational tasks.
- Facilitate communication.
-
Figure A: Bahala na kayong basahin yan, di ko kokopyahin gagi.

Application software are available in a variety of forms:


a. Packaged software
b. Custom software
c. Web application
d. Open source software
e. Shareware
f. Freeware
g. Public – domain software

System software – serves as the interface 4. Presentation software – Allows users


between the user, application software, and to create visual aids for presentations.
computer hardware. 5. Note taking software - Application
that enables users to enter text,
Business software (interconnected to figure handwritten comments, drawings, or
A) sketches.
1. Word processing software – Allows 6. Software suite – Collection of
users to create and manipulate programs available as a unit.
documents. 7. Personal information manager –
2. Spreadsheet software – Allows users Application that includes an
to organize data in rows/columns and appointment calendar, address book,
perform calculations. and notepad.
3. Database – Collection of data
organized in a manner that allows
access, retrieval, and use of that data.
8. Project management software – Learning tools for application software:
Allows a user to plan, schedule, track, 1. Online help – Electronic equivalent
and analyze resource usage for a of a user manual. You can ask
project. questions and access help topics in
9. Accounting software – Helps specifics.
companies record and report 2. Web-based help – Provides updates
financial transactions. and resources to respond to technical
10. Document management software – issues.
Provides a platform for sharing, 3. Web-based training – a type of
distributing, and searching through computer based training that uses the
documents by converting them into a internet and application available on
format that can be viewed. the web.
4. Distance learning – Delivery of
Graphics and Multimedia Software: education at one location while the
Figure B: Once again, I ain’t writing all that learning takes place somewhere else.
down.
M6: IS and Database

Information systems – Refer to a collection


of multiple pieces of equipment involved in
the dissemination of information.

May also refer to the study of complementary


networks of hardware & software that
organizations use to collect, process, and
distribute data.

CBIS = Computer-based Information


Systems

Elements of an IS:
1. Hardware – Refer to the computers
themselves.
2. Software – Tells hardware how to
function.
3. Data – Information part of an IS, can
Web page authoring software – Helps users be any type of information.
of any skill levels create web pages that 4. Procedures – Rules, descriptions, and
include interactive content. instructions for how things are done.
5. People – Design and operate the
Software for home, personal, and software, inputs data, etc.
educational use: 6. Communication – Allow one
1. Personal finance software computer to communicate w/
2. Legal software another.
3. Tax preparation software
4. Personal DTP software Types of IS (most common):
5. Personal paint software - Transaction processing systems
6. Personal photo editing software - Management IS
7. Image gallery - Decision support systems
8. Video and audio editing software - Executive IS
9. Landscaping software
10. Travel and mapping software Database – An organized collection of
11. Reference software information that can be easily retrieved.
12. Educational software
13. Entertainment software Set of data related for a specific purpose or
topic.
Web application – A website that allows
users to access and interact with software
from any device that is connected to the
internet.
Types of relationships:
Basic database terminologies: a. One-to-one – Exist when a
primary record from the primary
1. Table – List of related information in table has only one related record
columns and rows in the related table.
b. One-to-many – Exist when a
Row = Record primary record from the primary
Column = Field/Category table is related to many records in
One item of data = Data value the related table. (Eg. One
customer can have many accounts
2. Query – Database object that can be and order many products.)
used to extract or show information c. Many-to-many – I can’t explain
in datasheet view. this shit basta example nalang, “A
*Record source – Tables or queries student takes many classes; and
from which a query gets its data. each class has many students.”

3. Forms – Database object used to Importance of Database Systems:


enter, edit, or display data from a - Database applications were built on
table or query. top of file systems.
*A visually attractive form makes
working w/ the database more Database systems offer solutions to the
efficient and can help prevent following problems below.
incorrect data from being entered.
Drawbacks of using file systems to store
4. Report – Used to summarize data:
information from a table/query.
1. Data redundancy and inconsistency
5. Macros – Used to create an action or – Multiple file formats and
set of actions used to automate a task. duplication of information in
different files.
You can create a macro to perform a 2. Difficulty in accessing data – Need to
specific series of actions. write a new program to carry out each
new task.
6. Primary keys – A field or set of fields 3. Data Isolation – Multiple files and
in your table that act as the unique formats.
identifier for every row. 4. Integrity problems – Hard to add
new constraints or change existing
In relational databases you divide ones.
information in separate tables and 5. Atomicity of updates - Failures may
use table relationships and primary leave database in an inconsistent state
keys to bring the information if only partial updates are carried out.
together.
Example: Transfer of funds from one
Each table must have a primary key account to another should either be
before it can be related to another completed or not happen at all.
table.
6. Concurrent access by multiple users
7. Relationships – Situation that exists – Uncontrolled concurrent accesses
between two relational database can lead to inconsistencies (Eg. Two
tables. people reading a balance and
updating it at the same time.)
Allow relational databases to split and 7. Security problems
store data in different tables while
linking data items. M7: Network and Internet

What is a computer network?


- A group of computer systems that are
linked together through
communication channels.
Network types: 2. DSL
1. Local Area Network 3. Fiber to the premises (FTTP)
2. Personal Area Network 4. Fixed wireless
3. Home Area Network 5. Cellular Radio Network
4. Campus Network 6. Wi-Fi
5. Metropolitan Area Network 7. Satellite internet service
6. Enterprise Private Network
7. Internetworks Access provider – a business that provides
8. Backbone Networks individuals and organizations access to the
9. Global Area Networks internet for free or for a fee.
10. The Internet
ISP vs OSP vs WISP
Network Topologies:
ISP (Internet service provider)
What is a network topology? - Regional ISPs provide internet access
- The arrangement of a network to a specific geographical area.
comprised of nodes and connecting - National ISPs provide internet access
lines via sender and receiver. in cities and towns nationwide.

Types of topologies: OSP (Online service provider)


- Bus – Every computer and network - Many members only feature.
device is connected to a single cable. - Examples are: AOL and MSN.
(Line)
- Ring – Ring that connects all devices. WISP (Wireless internet service provider)
(Circle) - Provides wireless internet access to
- Star – Devices are connected to a computers and mobile devices.
single hub. (Cross) - May require a wireless modem.
- Mesh – Connected to another device
via a particular channel. IP address – a number that uniquely
- Hybrid – Collection of two or more identifies devices connected to the internet.
topologies. (Combination.)
- Internet – Worldwide collection of Domain name – text version of an IP
networks. address.

Evolution of the internet: DNS server – Translates domain name to its


- Originated as ARPANET (Advanced associated IP.
research project agency network) in
Sept 1969. World Wide Web
- Its goals was to allow scientists at - Consists of a worldwide collection of
different physical locations to share webpages.
information and work together. - A website is a collection of related
webpages and associated items.
1969: ARPANET becomes functional - A web server is a computer that
1984: ARPANET has more than 1k delivers requested webpages to your
individual computers lined as hosts. computer.
1986: NSF connects NSFNet to ARPANET - Web 1.0 – read only.
and becomes known as the internet. - Web 2.0 – Dynamic and interactive
1995: NSFNet terminates its network and site.
resumes status as research network.
1996: Internet2 is founded. Web browser – Allows users to access
Today: More than 550 million hosts webpages and web 2.0 programs.
connected. 1. Internet Explorer
2. Firefox
World Wide Web Consortium (W3C) 3. Opera
oversees research and sets guidelines and 4. Safari
standards. 5. Google Chrome

Internet service types: Home page – First page a website displays.


1. Cable internet service
Downloading – The process of receiving Information presented on the web must be
information. evaluated for accuracy.

URL or Web address – Every webpage has No one oversees the contents of webpages.
this unique address.
Multimedia refers to:
Tabbed browsing – Allows users to open and - Any application that combines text
view multiple webpages in a single browser with any of the ff:
window. a. Graphic – Digital representation
of nontext information.
Search tools: b. Animation – The appearance of
a. Search engine – Finds information motion created by displaying a
related to a specified topic. series of still images in a
b. Subject directory – Classifies sequence.
webpages in an organized set of c. Audio – Music, speech, any other
categories. sound.
*Streaming – the process of
Search operators: transferring data in a continuous
and even flow.
Space or + d. Video – Images displayed in
- Display hits that include specific motion.
words. e. Virtual Reality – Appears as a
three dimensional space.
Or
- Display hits that include only one Plug-in – a program that extends the
word from a list. capability of a web browser.

() Web publishing – Development and


- Combine hits that include specific maintenance of webpages following these
words with those that include only steps:
one word from a list. 1. Plan
2. Analyze
Dash (-) 3. Create
- Exclude a word from the search 4. Deploy
results. 5. Maintain

“” Email – Transmission of messages and files


- Search for an exact phrase in a via a computer network.
certain order.
Mailing list – A group of email names and
Asterisk (*) addresses given a single name.
- Substitute characters in place of the - Subscribing and Unsubscribing.
asterisk.
Instant messaging – real time
Thirteen types of websites: communication service.
1. Portal
2. News Chat – real time typed conversation.
3. Informational Chatroom – a location on an internet server
4. Business/Marketing that permits users to chat with each other.
5. Blog
6. Wiki VoIP – Enables users to speak to other users
7. Social Network over the internet. (Also called Internet
8. Educational telephony.)
9. Entertainment
10. Advocacy Newsgroup – Online area in which users
11. Web application have written discussions about a particular
12. Content Aggregator subject. (Typically requires a newsreader.)
13. Personal
Message board – web based discussion group.
FTP (File transfer protocol) – Internet Personal firewall utility – Program that
standard that permits file upload and protects personal computer and its data from
download. intrusions and monitors the transmission to
*FTP server – computer that allows users to and from the computer.
upload or download files using FTP.
How can companies be protected against
Netiquette – Code of acceptable internet hackers?
behavior. 1. Intrusion detection software –
Identifies suspicious behavior.
2. Access control – Limits who accesses
and what actions can be taken.
3. Audit trail – Records access attempts.

Possessed object – Item you must carry to


gain access to computers or facilities.
Oftentimes, these are used alongside
personal identification numbers (PIN).

Biometric device – Authenticates a person’s


identity using personal characteristics.

Module 8: Computer Security, Safety, Hardware theft & vandalism:


Ethics, and Privacy. Hardware theft = Stealing computer
equipment.
Computer Security risk – Action that causes Hardware vandalism = act of defacing or
loss or damage to a computer system. destroying computer equipment.

Virus – Describes a potentially damaging Software theft – act of stealing or illegally


computer program. (Can spread and damage copying software.
files.)
a. Worm – Copies itself repeatedly in Software piracy – Illegal duplication of
memory or over a network. copyrighted software.
b. Trojan horse – Harmful program
that disguises itself to look like a License agreement – Right to use software.
legitimate program. (Does not
replicate on other computers.) What are some other safeguards against
c. Payload that is delivered when you software theft?
open a file, run infected program/s, a. Product activation – input product
or boot computer w/ an infected identification number and receive
disk. unique installation identification
number.
Virus signature – specific pattern of virus b. Business software alliance (BSA) –
code. (Also called virus definition.) Promotes better understanding of
software piracy problems.
Denial of service – Disrupts computer access
to an internet service. Encryption – safeguards against information
theft.
Back door – Program or set of instructions
in a program that allow users to bypass Process of converting readable data
security controls. (plaintext) into ciphertext.

Spoofing – Makes a network transmission To read the data, the recipient must decrypt
appear legitimate. Occurs when an intruder the data.
fools a network into believing its IP is from a
trusted source.

Firewall – Security system consisting of


hardware that prevents unauthorized
intrusions.
Internet security risks:

How do web browsers provide secure data


transmission?
- Many browsers use encryption.
- Secure site – is a website that uses
encryption to secure.
- Digital certificate – a notice that
guarantees that the website is
legitimate.

What is a certificate authority?


- Authorized people or company that
issue and verify digital certificates.

SSL (Secure Sockets Layer)


- Provide encryption of all data that
passes between client and internet
server.
Information privacy – Right of individuals
- The “s” in https indicate secure
and companies to deny or restrict collection
connections.
and use of information about them.
System failure – Prolonged malfunction of a
Employee monitoring – using computers to
computer.
observe employee computer use. (Legal.)
Caused by aging hardware, natural disasters,
Electronic profile – Data collected when you
or electrical power disturbances.
fill out forms on web.
Can cause loss of hardware, software, or data.
Merchants may sell your electronic profile
but often you can specify whether you want
Undervoltage – Drop in electrical supply.
your information to be distributed.
Noise – Unwanted electrical signal.
Overvoltage or power surge – Significant
Cookie – Small file on your computer that
increase in electrical power.
contains data about your user preference,
how regularly you visit a website, interests
Surge protector – Protects computer and
and browsing habits.
equipment from electrical disturbances.
Phishing – Scam in which a perpetrator
UPS (Uninterruptible power supply) – a
sends an official looking email that attempts
surge protector that provides power during
to obtain a user’s personal and financial
power loss.
information.
Backup – Duplicate of file, program or disk.
Privacy acts: Continued on next page.
a. Full backup – All files.
b. Selective backup – Select which files.
c. Three generation backup – preserves
three copies of important file.

Computer ethics – Moral guidelines that


govern use of computers and information
systems.

IT code of conduct – written guideline that


helps determine whether computer action is
ethical.
Content filtering – Process of restricting
access to certain material.

Health concerns of computer use:


1. CVS (Computer vision syndrome) – Eye
and vision problems.
2. RSI (Repetitive strain injury)

CTS (Carpal tunnel syndrome), the


inflammation of nerve that connects
forearm to palm.

Tendonitis – Inflammation of tendon


due to repetitive motion.

3. Computer addiction – When computer


consumes entire social life.

Ergonomics – Applied science devoted to


comfort, efficiency, and safety in workplace.

You might also like