0% found this document useful (0 votes)
55 views

Foundation Computing

Uploaded by

Azha Thaskeer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Foundation Computing

Uploaded by

Azha Thaskeer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Learner Name Mohamed Firouzdeen Fathima Nuzla

Learner Registration 220905002


No.
Study Centre Name Metropolitan College
Qualification Title OTHM Level 3 Foundation Diploma for Higher Education Studies
Unit Reference No. D/617/3716
Unit Title Foundation Computing
Word Count 3160
Submission Date 31/12/2022

Declaration of authenticity:
1. In submitting this assignment I acknowledge that I understand the definition of, and penalties for,
cheating, collusion and plagiarism as set out in the OTHM policy.
2. I declare that the attached submission is my own original work. No significant part of it has been submitted
for any other assignment and I have acknowledged in my notes and bibliography all written and electronic
sources used.
3. I acknowledge that my assignment will be subject to electronic scrutiny for academic honesty.
4. I understand that failure to meet these guidelines may instigate the centre’s malpractice procedures and
risk failure of the unit and / or qualification.
5.

F.Nuzla
_________________ _________________
Learner signature Tutor signature
Date: 31/12/2022 Date:
Foundation In Computing

1
Introduction
“Computer” An electronic device used to store data and manipulate information. It has the ability
to process and retrieve data. And some of the majors you may already know Fill out documents,
surf the web, play games, send emails, and more.

Most computers rely on a binary system of 0's and 1's. Calculate algorithms, display information,
and process data fast. Multitask in extraordinary races and create innovative worlds.

2
Contents

FUNCTIONS OF A COMPUTER SYSTEM ............................................................................................... 4


WHAT IS HARDWARE? ............................................................................................................................ 6
...................................................................................................................................................................... 7
WHAT IS A SOFTWARE? .......................................................................................................................... 8
THE ETHICAL ISSUES RELATED TO COMPUTING .......................................................................... 10
LAWS AND REGULATIONS THAT GOVERN COMPUTING ............................................................. 11
SITUATIONS WHERE LAWS HAVE BEEN USED TO HANDLE PEOPLE USING COMPUTERS IN
ILLEGAL AND UNETHICAL ACTIVITIES ........................................................................................... 12
REFERENCES ........................................................................................................................................... 13

3
FUNCTIONS OF A COMPUTER SYSTEM

A computer is a fast and accurate machine which accepts data and process the data by performing various
operations. It has the ability to store and process the data with a set of instructions given to it. This set of
instructions are known as computer programs. Therefore, a computer has four basic functions:
INPUT: The set of instructions or data given to the computer for processing. Any devices which are used
to input data to the computer are known as input devices. They are responsible for fetching data from the
outside world and are manage to process the data for further execution. Some of the input devices are:
keyboard, mouse, microphone, etc.
PROCESSING: This is the main function of a computer system where the raw data is fed into the system
via input devices. Then the data is processed into meaningful data which the computer can able to read
and understand. The data is processed through The Central Processing Unit (CPU) is which is the brain of
the computer. With the development in technology the CPU works along with the GPU (Graphical
Processing Unit) which enhances the functionality and the capabilities of the computer in many ways.
(Rana, 2022) The CPU consists of three main components:
♦ The Control Unit (CU) controls all the operations of the entire computer system and
monitors all the data sent through the input devices by the user. It also directs other units
to execute the instructions.
♦ The Arithmetic and Logical Unit (ALU) carryout the instructions by performing all the
arithmetic and logical operations. It is also a gateway between the primary memory and
the secondary memory.
♦ The Memory Unit stores the received data in the system temporarily and later transfer it
to the ALU unit.
OUTPUT: The raw data fed to the computer system is processed and sent to the output unit. This unit
sends the processed data with the help of the output devices in human understandable form. Some of the
output devices are: monitor, speaker, printer, etc.
STORAGE: The storing of the data and instructions is the main function of the computer. Such data
could be stored temporarily and permanently as well as internally and externally from the system. They
can be divided as volatile (that is the information is lost when the system is turned off) and non-volatile
(that is the information will not be lost even when the system is turned off). The types of main memory
are:
♦ RAM (Random Access Memory) this memory Is volatile.
♦ ROM (Read Only Memory) this memory is involatile.
♦ Cache is a special type of memory which makes the data and programs to the CPU at fast
rate thus increasing the efficiency.
♦ Registers are not an actual component of the main memory. It allows the information to
pass between the various unit of the computer system efficiently.

4
5
WHAT IS HARDWARE?

Hardware refers to the physical and tangible parts of the computer which stores and run the written
instructions provided by the software. Therefore, a hardware is impossible to run without a software. The
purpose of hardware is to receive the data and instructions from the user, execute the command given and
to present the output.
A hardware can be classified as internal or external where internal hardware components are essential for
the proper functioning of the computer, whereas the external hardware known as peripherals are attached
to the computer for more functionality. (Awati and Rosencrance, 2021)

 Internal Components are necessary to process and store the programs and instructions given by
the Operating System. Some of them are:
CPU: the core of the computer where all the operations are executed. The CPU is made of computer
chips that consist of billions of tiny transistors. Other hardware components such as keyboard, monitor,
printer and speakers are connected to the CPU.
MOTHERBOARD: the backbone which holds the CPU. It functions as the central hub that run all the
hardware components together.
RAM: This temporary memory that stores information which could be accessed immediately. This is
volatile memory where the stored information is lost when the computer is turned off. The two types of
RAM are static and dynamic RAM.
HARDDRIVE: these are the physical storage devices which stores the operating system, applications,
and data files such as documents, photos and music used by the computer. They are also called Hard Disk
Drive (HDD).
GPU: Graphic Processing Unit functions as an extension to the CPU. They are designed to increase
graphics displaying that can process many bits of data at once which makes them useful for video editing,
machine learning and in gaming applications.
NIC: Network Interface Card is a chip or circuit board which allows the computer to connect to any
network. This is also called as local area network adapter which connects to an Ethernet network.

 External Hardware components are known as peripheral devices. These are connected externally
to the computer to control both the input and output operations.
Some of the input Hardware are:
KEYBOARD: this is similar to a typewriter which consists of letters, numbers, symbols and function
keys enabling the user to input letter, numbers or characters.
MOUSE: this is a hand held wired or wireless pointing device which moves with a curser around the
screen helping to interact with objects on the screen.
MICROPHONE: this translates audio waves into electric signals where they are converted into digital
signals which could be processed by the computer.
CAMERA: this captures videos and images and streams them to the computer or to a network device.

6
Some of the output hardware components are:
MONITOR: this is similar to a tv screen which displays information, documents and images generated
by the computer.
PRINTER: they convert the electronic data from the computer into paper form.
SPEAKER: they generate the sound output from the computer. Headphones, earbuds and earphones are
types of speakers where tis audible to a single user.
Some of other external hardware storage devices are USB FLASH DRIVE, MEMORY CARD,
FLOPPY DISKS, MAGNETIC TAPES, COMPACT DISKS (CD), DVD AND BLUE RAY DISKS.

7
WHAT IS A SOFTWARE?

Software is a set of program and instructions that instruct the computer how to perform a specific task.
This could be categorized into two types:

 SYSTEM SOFTWARE: It is a collection of programs designed to control, operate and enhance


the processing capabilities of a computer. This software coordinates the activities and the
functions of the hardware and software. These are provided by the computer manufacturers itself.
The different types of system software include:
OPERATING SYSTEM: this software manages all the computer hardware, software resources which is
an interface with the user and computer. This performs many tasks such as memory management,
program loading and execution, booting, management of disk space, data security, controls the printing
functions, controlling the devices attached to the computer, providing interface to the user such as: GUI
(Graphic User Interface) which uses menus, icons and windows to give commands and CIL (Command
Line Interface) which uses text commands to communicate with the computer. (Functions of operating
system, 2019)
Some popular operating systems are: Apple macOS, Microsoft Windows, Google’s Android OS,
Linux OS, and Apple iOS. (“5 most popular operating systems,” 2021)
TRANSLATORS: this software conversely translates (High Level Language) HLL codes such
as JAVA, C++, python to machine level codes or object level codes. They perform other tasks
such as allocating data storage, receiving diagnostic report, obtaining source codes, identifying
system error, etc.
Types of Translators are:
♦ Interpreter (converts HHL into machine language line by line) used by C, C++
♦ Compiler (converts HHL into machine language batch wise) used by Python, PHP, Perl
♦ Assembler (converts assembly language into machine language) used by assembly
language.
UTILITY: this software tool is used in program developing, analyzing, optimizing, configuring
and maintaining a computer and its resources. They include categories such as: disk cleanup,
antivirus, management tools, optimizers, compression tools, etc.
Examples are: Norton Antivirus, WinRAR, Windows File Explorer, etc.
DEVICE DRIVERS: these are special software which are used to control specific hardware of
the computer such as display, hard disk, sound card, graphic card, mouse and printers.
Examples: Motherboard Driver, Sound card Driver, BIOS Driver, etc.
ACCESSIBILITY: A person with a disability, such as one that affects their vision, hearing,
motor skills, or cognition, may use an assistive device to access software that is meant to be
accessible.

8
Examples: Reminder system, audio books, memory aids, etc.
FIRMWARE: these software stores permanent instructions in ROM but those instructions could
be still updated using a firmware updater. The main function is to check for errors and make sure
that all the hardware devices are working properly.
Examples are: Computer peripherals, BIOS, Embedded system, etc.
 APPLICATION SOFTWARE: It is a software program designed to perform a specific
task on the computer. They are developed in High Level Language.
Examples of Applications Software along with its functions:
WORD PROCESSING: these are used to create, manage, format and print documents. Ex: MS
Word, Google Docs, Coral Word Perfect, etc.
DATABASE: these are database management software used for creating and managing database
files and records. Ex: MS Access, dBase, File maker, etc.
SPREADSHEET: these are used in business and accounting tool to create, organize and store
data in table form. Ex: MS Excel, Google sheets, iWork numbers, etc.
GRAPHICS: these are used to make logos, edit images and in editing visual data. Ex: MS Paint,
Coral Draw, Blender, etc.
MULTIMEDIA: these are used in playing, creating, editing videos and images and other
graphic related tasks. Ex: VLC, Adobe Photoshop, Windows media player, etc.
BROWSERS: these are used in browsing the internet. Google Chrome, Mozilla Firefox, safari,
etc.

9
THE ETHICAL ISSUES RELATED TO COMPUTING

Because of the constant changes in social environment, the changes in the area of technology makes it
harder to specify a set of ethics, although its important in maintaining the ethical discipline to have
positive influences over the society. Some of these ethics are:
PRIVACY: the internet is a collection of personal information from ones’ contact details to a company’s
website. The clear amount of information is more than enough to either learn about something or
someone or to misuse it to invade their privacy.
COPYRIGHT, PATENT AND PIRACY: some medias in the internet can be of free access while some
others which are copyrighted are not available to public. These are bought by patent rights by the creators.
Illegally downloading and distributing them is called piracy which is widespread. Plagiarism is also
another example of copying others work as their own.
A software license is a legal contract that sets rules for the distribution and usage of software. In most
cases, software licenses grant end users the freedom to make one or more copies of the software without
violating copyrights.
COMPUTER CRIME: some of these are scam websites that are created to steal the money of the users
and computer misusers called hackers who can crash the system and spread virus to steal bank accounts
and Credit card details.
CHILD SAFETY: the chances of a child being exposed to sexual content and nudity is very high in
internet. Parents should take precautions by monitoring their activity in and outside and filter out
unnecessary content by using child friendly search engines.

10
LAWS AND REGULATIONS THAT GOVERN COMPUTING

Computers help us learn, communicate and entertain ourselves unlimitedly. it is also a key to many illegal
activities taking place. So the government of UK has set some laws and regulations to protect the users
and deter such activities.
There are 3 main laws to be considered:
COMPUTER MISUSE ACT OF 1990 (CMA): this law was introduced in order to protect the computer
system from unauthorized access such as illegal software copying and destroying and basic hacking.
DATA PROTECTION ACT 1998: this law was introduced in order to govern the security of personal
data in UK where an organization or individual should register under the Information Commissioner.
COPYRIGHT, DESIGN AND PATENT ACT OF 1988: this law was introduced to give authority to
the publisher of any material to take control of the way it is used. The owner has the right to gain
compensation or to prevent such activity by judiciary.

11
SITUATIONS WHERE LAWS HAVE BEEN USED TO HANDLE
PEOPLE USING COMPUTERS IN ILLEGAL AND UNETHICAL
ACTIVITIES

♦ Robert Tappan Morris, a 23-year-old graduate from Cornell University released a malicious
computer program into the computer networks at prestigious universities and private and public
research centers including NASA. He was known as the first computer hacker and was punished
under the Computer Fraud and Abuse Act of 1986. He was sentenced to jail. (Major cases — FBI,
2016)
♦ In 1994, a Russian couple hacked into a major bank system of US and stole more than $10
million. They were paid to transfer funds for a person named Vladimir Lenin. FBI worked
together to gather evidence and later Levin was lured to London where he was arrested and later
banished to US. This was FBI’s first online bank robbery. (Major cases — FBI, 2016)
♦ Charles Brown, 39, was convicted of possessing stolen bank and credit card details. The
estimated loss from 83 accessed accounts was almost £500,000. The court sentenced him to three
years of imprisonment. (Charles,2014)

12
REFERENCES

Rana, K. (2022) Functions of computer, ArtOfTesting. Available at:


https://artoftesting.com/functions-of-computer (Accessed: September 16, 2022).

Awati, R. and Rosencrance, L. (2021) Computer hardware, SearchNetworking. TechTarget.


Available at: https://www.techtarget.com/searchnetworking/definition/hardware (Accessed:
September 16, 2022).

Gupta, P. (2019) Types of Computer Hardware, EDUCBA. Available at:


https://www.educba.com/types-of-computer-hardware/ (Accessed: September 16, 2022).

Functions of operating system (2019) theintactone. Available at:


https://theintactone.com/2019/07/01/ca-u2-topic-3-functions-of-operating-system/ (Accessed:
September 20, 2022).

“5 most popular operating systems” (2021) Western Governors University, 1 April. Available at:
https://www.wgu.edu/blog/5-most-popular-operating-systems1910.html (Accessed: September
20, 2022).

2 main types of software with examples (no date) TutorialsMate. Available at:
https://www.tutorialsmate.com/2021/09/types-of-software.html (Accessed: September 20, 2022).

(No date) Techwalla.com. Available at: https://www.techwalla.com/articles/ethical-issues-on-


computer-technology (Accessed: September 24, 2022).

Berzai, L. (2019) Ethical problems in computing, Default. Available at:


https://www.comptia.org/blog/ethical-problems-in-computing (Accessed: September 24, 2022).

Ethical issues in information technology (IT) (2020) GeeksforGeeks. Available at:


https://www.geeksforgeeks.org/ethical-issues-in-information-technology-it/ (Accessed:
September 24, 2022).
KS3 Computer Science Revision - BBC Bitesize. BBC News. Available at:
https://www.bbc.co.uk/bitesize/guides/z9nk87h/revision/1 [Accessed September 27, 2022].

13
Computer related legislation (no date) Uwe.ac.uk. Available at: https://www.uwe.ac.uk/study/it-
services/information-security-toolkit/information-security-policies/computer-related-legislation
(Accessed: September 27, 2022).

Major cases — FBI (2016) Fbi.gov. Available at: https://www.fbi.gov/investigate/cyber/major-


cases (Accessed: September 27, 2022).

Computer misuse act (no date) Gov.uk. Available at: https://www.cps.gov.uk/legal-


guidance/computer-misuse-act (Accessed: September 27, 2022).

Lutkevich, B. and Lebeaux, R. (2021) What is a software license? everything you need to know,
CIO. TechTarget. Available at: https://www.techtarget.com/searchcio/definition/software-
license (Accessed: December 6, 2022).

Types of at (2022) Guide to Assistive Technology. Available at: https://mn.gov/admin/at/getting-


started/understanding-at/types/ (Accessed: December 6, 2022).

14

You might also like