0% found this document useful (0 votes)
19 views32 pages

Fms103 Handout

The document outlines an introductory computing course covering topics such as the definition and importance of computing, its history, core disciplines, and the significance of information processing in various sectors. It also delves into computer hardware and software components, operating systems, and the role of the kernel in managing system resources. Additionally, it emphasizes the importance of data security and privacy, alongside discussions and activities to engage students in understanding these concepts.

Uploaded by

dmnvenom133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views32 pages

Fms103 Handout

The document outlines an introductory computing course covering topics such as the definition and importance of computing, its history, core disciplines, and the significance of information processing in various sectors. It also delves into computer hardware and software components, operating systems, and the role of the kernel in managing system resources. Additionally, it emphasizes the importance of data security and privacy, alongside discussions and activities to engage students in understanding these concepts.

Uploaded by

dmnvenom133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

COURSE TITLE: INTRODUCTION TO COMPUTING

COURSE CODE: FMS 10

Week 1: Introduction to Computing

What is Computing?

Computing refers to the process of using computers to perform various tasks, including calculations, data processing, programming, and
communication. It encompasses multiple disciplines, such as Computer Science, Software Engineering, Information Systems,
Cybersecurity, and Artificial Intelligence.

Brief History of Computing

Ancient Computing Devices: Abacus, Napier’s bones.

Mechanical Computing: Charles Babbage’s Analytical Engine (1837).

First Programmable Computer: ENIAC (1945).

Personal Computing Era: IBM PC (1981), Apple Macintosh (1984).

Modern Computing: Cloud computing, Artificial Intelligence (AI), Internet of Things (IoT).

Why is Computing Important?

Drives innovation in business, healthcare, education, and security.

Enhances efficiency through automation.

Facilitates communication and information access globally.

1. Core Disciplines:

Computer Science: The study of algorithms, programming languages, and data structures.

Software Engineering: The development of software applications and systems.

Information Systems: How organizations use computers to collect, store, and manage information.

Cybersecurity: The practice of protecting computer systems and networks from digital attacks.

Artificial Intelligence (AI): The field focused on creating intelligent systems capable of learning, reasoning, and problem-solving.
2. Brief History of Computing

Ancient Computing Devices:

Abacus: An ancient tool used for basic arithmetic calculations.

Napier’s Bones (1617): A set of rods invented by John Napier to aid in multiplication and division.

Mechanical Computing:

Charles Babbage’s Analytical Engine (1837): Considered the first conceptual design for a mechanical computer. It laid the groundwork
for modern computing with features like a central processing unit (CPU) and memory.

First Programmable Computer:

ENIAC (1945): The Electronic Numerical Integrator and Computer was the first general-purpose programmable computer, capable of
performing complex calculations for military applications during World War II.

Personal Computing Era:

IBM PC (1981): Introduced personal computers to the mass market, changing how people interacted with technology in homes and
offices.

Apple Macintosh (1984): Pioneered the graphical user interface (GUI) and made computers more user-friendly with the introduction of
the mouse and icons.

Modern Computing:

Cloud Computing: The ability to store and process data over the internet, allowing for scalable, on-demand computing resources.

Artificial Intelligence (AI): The development of systems that can perform tasks traditionally requiring human intelligence, such as
language processing, decision-making, and pattern recognition.

Internet of Things (IoT): A network of interconnected devices that communicate and share data, ranging from household appliances to
industrial machines.

Why is Computing Important?

Drives Innovation: Computing is the backbone of innovation in various sectors, such as:

Business: E-commerce, data analysis, and enterprise software.

Healthcare: Medical record management, diagnostic tools, and telemedicine.


Education: E-learning platforms, virtual classrooms, and educational software.

Security: Cryptography, data protection, and threat detection.

Enhances Efficiency: Automation through software and algorithms increases productivity and reduces human error. From
manufacturing to customer service, computing streamlines workflows and optimizes operations.

Facilitates Global Communication and Information Access: The internet, mobile technologies, and social media platforms have made it
possible to communicate instantly across the globe and access vast amounts of information at the click of a button.

Discussion and Activities

Class Discussion: Ask students to discuss how computing has impacted their daily lives. How do they use technology for work, learning,
or communication?

Activity: Have students research and present on one milestone in computing history, explaining its significance and how it shaped modern
technology.

Week 2: Hardware and Software

1. Computer Hardware (Physical Components)

a. Input Devices: Keyboard, mouse, scanner, microphone.

b. Output Devices: Monitor, printer, speaker.

c. Storage Devices: HDD, SSD, USB drives, cloud storage.

d. Processing Unit: CPU (Central Processing Unit) – Brain of the computer.

e. Memory: RAM (temporary storage), ROM (permanent storage).

2. Computer Software (Programs that Run on Hardware)

a. System Software:

Operating Systems (Windows, macOS, Linux, Android, iOS)

Utility Programs (antivirus, file management tools)


b. Application Software:

Word Processors (Microsoft Word, Google Docs)

Spreadsheets (Excel, Google Sheets)

Presentation Software (PowerPoint, Prezi)

Graphics Software (Photoshop, Canva)

This week will focus on the foundational components of a computer system, breaking down both hardware and software. Students will
learn about the essential physical components of a computer (hardware) and the programs that run on them (software), which are
crucial for understanding how a computer works.

---

1. Computer Hardware (Physical Components)

a. Input Devices: Devices that allow users to interact with the computer by inputting data.

Keyboard: A device used for typing characters and commands.

Mouse: A pointing device used for navigating and selecting items on the screen.

Scanner: A device that converts physical documents or images into digital format.

Microphone: A device used for capturing audio input.

b. Output Devices: Devices that display or produce results from the computer's processing.

Monitor: A screen that displays visual output from the computer.

Printer: A device used to produce a hard copy of digital documents or images.

Speaker: A device that outputs sound from the computer.

c. Storage Devices: Devices used to store data and files.

HDD (Hard Disk Drive): A traditional mechanical storage device used for long-term data storage.

SSD (Solid State Drive): A faster, more durable alternative to HDDs, using flash memory.

USB Drives: Portable storage devices used for transferring files between computers.

Cloud Storage: A method of storing data online, allowing users to access it from anywhere with an internet connection (e.g., Google Drive,
Dropbox).
d. Processing Unit (CPU): The Central Processing Unit (CPU) is the brain of the computer. It processes instructions, performs
calculations, and manages data flow.

The CPU consists of cores (multiple processing units) that execute instructions from software applications and operating systems.

The speed and efficiency of the CPU play a significant role in the overall performance of the computer.

e. Memory: Temporary or permanent storage for data.

RAM (Random Access Memory): Temporary storage used by the computer for quick access to active data. More RAM allows the
computer to run more applications simultaneously without slowing down.

ROM (Read-Only Memory): Permanent storage used for firmware (essential programs that are required to start the computer). It is
non-volatile, meaning the data is not lost when the computer is powered off.

2. Computer Software (Programs that Run on Hardware)

a. System Software: These are the essential programs that manage the hardware and software resources of the computer.

Operating Systems (OS): The software that allows the user to interact with the computer and manages hardware and software resources.

Windows: A widely-used OS with a user-friendly interface, developed by Microsoft.

macOS: The OS used in Apple computers, known for its clean interface and seamless integration with Apple products.

Linux: An open-source OS that is customizable and commonly used for servers and development.

Android: A mobile operating system developed by Google, widely used in smartphones and tablets.

iOS: Apple's mobile operating system used in iPhones, iPads, and other Apple devices.

Utility Programs: Software designed to help manage and maintain the computer.

Antivirus Software: Programs that detect and remove malicious software (e.g., Norton, McAfee).

File Management Tools: Programs for organizing, storing, and managing files (e.g., Windows File Explorer, Finder in macOS).

1. What is Information Processing?

Information processing refers to the cycle of collecting, storing, processing, and distributing information. It involves transforming raw
data into meaningful information that can be used to make decisions, drive innovation, and improve efficiency. This cycle plays a crucial
role in various industries, from business to healthcare.

Key Stages in Information Processing:

Collection: Gathering raw data from various sources (e.g., surveys, sensors, user input).

Storage: Storing data in a structured format, usually in databases or cloud systems.

Processing: Using software or algorithms to analyze and convert raw data into meaningful insights or actions.

Distribution: Delivering processed information to the appropriate stakeholders or systems for decision-making or action.

---

2. Importance of Information Processing in Society

Information processing has a profound impact across various sectors, improving efficiency, decision-making, and accessibility.

a. Business:

Data Management: Businesses rely on information processing to collect and manage data effectively, ensuring it’s available for analysis,
reporting, and decision-making.

Customer Relationship Management (CRM): CRM systems allow businesses to process and analyze customer data to enhance
relationships, improve service, and drive sales. CRM tools help businesses track customer preferences, past interactions, and feedback to
offer personalized experiences.

b. Education:

E-learning Platforms: The rise of online education and digital classrooms depends heavily on information processing. E-learning
platforms track student progress, deliver course materials, and analyze performance to enhance learning experiences.

Virtual Classrooms: In a virtual classroom, information processing is key to facilitating real-time communication, sharing educational
resources, and assessing student participation and performance.

c. Healthcare:

Electronic Medical Records (EMRs): Healthcare providers use EMRs to store, process, and access patient health data. This system
improves diagnosis accuracy, speeds up treatments, and helps manage patient care more effectively.

AI-assisted Diagnosis: AI systems process large datasets from medical imaging, patient history, and genetic information to assist doctors
in diagnosing diseases, identifying treatment options, and predicting patient outcomes.

d. Government:

Biometric Verification: Governments use biometric information (e.g., fingerprints, facial recognition) to process identity data for purposes
like immigration, national ID systems, and voter registration.
Digital Tax Systems: Information processing enables governments to manage taxation, track income, and process returns more efficiently.
Digital systems reduce human error and increase transparency in tax collection.

3. Data Security and Privacy

As more personal and sensitive information is processed, the importance of protecting this data becomes paramount.

a. Importance of Protecting Personal Data:

Privacy Concerns: As people share more information online, from personal details to financial data, the risk of data breaches, identity
theft, and misuse grows. Safeguarding personal data is essential to maintaining privacy and trust.

Legal and Ethical Considerations: Governments and organizations must adhere to regulations such as the General Data Protection
Regulation (GDPR) in Europe, which mandates strict rules on data collection, processing, and storage.

b. Cybersecurity Measures:

To protect sensitive data and maintain privacy, several cybersecurity measures can be employed:

Strong Passwords: Using complex, unique passwords for different accounts reduces the risk of unauthorized access.

Encryption: This process converts data into an unreadable format unless the user has the appropriate decryption key. Encryption
ensures that even if data is intercepted, it cannot be read or used maliciously.

Anti-malware Software: Programs designed to detect, prevent, and remove malicious software (viruses, ransomware, spyware) that can
damage or steal data.

Two-Factor Authentication (2FA): This security measure adds an extra layer of protection by requiring users to verify their identity
through two forms, typically something they know (password) and something they have (smartphone or authentication app).

Discussion and Activities

Class Discussion: How does information processing impact daily life? Encourage students to think about how they interact with
information in their daily tasks, whether it's through work, education, or personal activities.

Activity: Have students analyze real-world examples of information processing in business (e.g., CRM tools) or healthcare (e.g., EMRs).
How do these technologies improve efficiency and decision-making?

Lab Activity: Students can practice setting up basic security measures, like creating strong passwords and using a password manager.
You could also demonstrate how to use encryption tools to secure sensitive files.
Week 4: Operating Systems and Kernel Functionality

What is an Operating System (OS)?

Software that manages hardware and software resources.

Functions of an OS:

Process Management: Runs multiple programs simultaneously.

Memory Management: Allocates memory to applications.

File System Management: Organizes data storage.

User Interface Management: Enables interaction with the computer (GUI, CLI).

Role of the Kernel

Core part of the OS that controls system resources.

Manages CPU, memory, and device communication.

This week, we'll explore Operating Systems (OS), the essential software that manages a computer's hardware and software resources.
We'll dive into the functions of an OS and discuss the crucial role of the Kernel, which is the heart of the system.

---

1. What is an Operating System (OS)?

An Operating System (OS) is system software that acts as an intermediary between computer hardware and the software applications
running on the computer. It manages and coordinates the hardware components (e.g., CPU, memory, storage devices) and software
resources, ensuring that the system operates efficiently and securely.

Key Roles of the Operating System

Resource Management: Allocates hardware resources such as CPU time, memory space, and storage to running applications.

Task Scheduling: Ensures that multiple applications or processes run efficiently, sometimes simultaneously, without interfering with one
another.

User Interaction: Provides users with an interface to interact with the system, whether through graphical user interfaces (GUI) or
command-line interfaces (CLI).
2. Functions of an Operating System

An OS performs several crucial functions that are essential for the computer's proper operation:

a. Process Management

Definition: Process management ensures that the system can run multiple programs simultaneously (multitasking). It involves scheduling
processes and managing their execution.

Key Tasks:

Process Scheduling: The OS decides which process gets to use the CPU at any given time, depending on priority and fairness.

Multitasking: The OS divides CPU time among several tasks, giving the illusion of simultaneous execution, even on single-core systems.

Process Control: The OS manages the lifecycle of processes, from creation to execution and termination.

b.Memory Management

Definition: Memory management controls the allocation and deallocation of memory for programs and processes.

Key Tasks:

Allocating Memory: The OS decides how much memory to assign to each running process. This is crucial for ensuring that programs
don’t interfere with each other’s memory space.

Virtual Memory: The OS uses hard disk space as virtual memory to extend the available RAM, enabling programs to run that require
more memory than what is physically available.

Memory Protection: Ensures that one process cannot access the memory allocated to another process, preventing errors or malicious
actions.

c.File System Management

Definition: The OS organizes and controls access to the computer’s storage resources (e.g., hard drives, SSDs, USB drives).

Key Tasks:

File Storage: The OS uses a file system (e.g., NTFS, FAT32, ext4) to organize and store files in directories and subdirectories.

File Access: Provides mechanisms for reading, writing, and modifying files.

File Permissions: The OS enforces rules about who can access or modify particular files, ensuring security and privacy.
d.User Interface Management

Definition: The user interface (UI) is the means by which the user interacts with the computer. This could be a Graphical User Interface
(GUI) or a Command-Line Interface (CLI).

Key Tasks:

Graphical User Interface (GUI): Most modern OSes provide a GUI that allows users to interact with the system through visual elements
like windows, icons, and buttons (e.g., Windows, macOS).

Command-Line Interface (CLI): Some systems or tasks rely on a CLI, where users interact with the OS by typing commands (e.g., Linux,
older versions of Windows).

Role of the Kernel

The Kernel is the core part of an operating system. It acts as a bridge between the user and the hardware, managing the communication
and execution of processes.

System Resource Management: The Kernel is responsible for managing CPU time, memory, and other system resources efficiently,
ensuring that multiple processes can run simultaneously without interfering with one another.

CPU Management: The Kernel handles the scheduling of processes to ensure efficient CPU usage, deciding which process gets to use the
CPU and for how long.

Memory Management: The Kernel allocates and deallocates memory to processes, ensuring that each process has the required memory
and preventing conflicts between them.

Device Management: The Kernel handles communication between the operating system and hardware devices (e.g., keyboard, mouse,
printer). It uses device drivers to interface with different hardware components.

Inter-Process Communication (IPC): The Kernel provides mechanisms for processes to communicate with each other (e.g., message
passing, shared memory).

Types of Kernels:

Monolithic Kernel: In this type, the entire OS, including the device drivers, file system, and memory management, runs in a single large
block of code. Examples: Linux, Unix.

Microkernel: A smaller kernel that only provides basic services, like communication between hardware and software, and other services
(e.g., file systems, device drivers) are handled by separate processes. Example: Minix.

Hybrid Kernel: Combines features of both monolithic and microkernels, aiming to provide the flexibility of microkernels with the
performance of monolithic kernels. Example: Windows NT, macOS.

Key Takeaways:

Operating systems are essential for managing a computer’s hardware and software resources and provide user interfaces for interaction.

The Kernel is the core component of the OS, responsible for controlling the system’s resources, including the CPU, memory, and device
communication.

OS functions like process management, memory management, and file system management ensure efficient operation and security of the
system.

Discussion and Activities:

Class Discussion: What are the advantages and disadvantages of monolithic vs. microkernels? Which do you think is better suited for
modern computing environments, and why?

Activity: Have students explore the Task Manager (Windows) or System Monitor (Linux) to understand how process management
works on their operating systems. Ask them to observe CPU usage, memory allocation, and running processes.

Week 5: Introduction to Programming

What is Programming?

Writing instructions (code) to make a computer perform tasks.

Programming Languages:

Low-Level Languages: Machine language, Assembly.

High-Level Languages: Python, Java, C++, JavaScript.

Writing a Simple Program (Example in Python)

print("Hello, World!")
Debugging and Correctness

Identifying and fixing errors in programs.

Testing to ensure the program functions correctly.

---

Week 5: Introduction to Programming

This week, we'll introduce Programming as a core component of computing, covering its essential concepts, programming languages, and
how to write a simple program. We'll also explore the importance of debugging and ensuring program correctness.

1. What is Programming?

Programming is the process of writing a set of instructions (known as code) that a computer can execute to perform specific tasks. These
instructions tell the computer how to manipulate data, interact with hardware, or perform computations.

Key Concepts:

Code: The written instructions in a programming language.

Program: A collection of code that performs a specific task or a series of tasks.

Programming Logic: The logical sequence of instructions that guide the computer to produce the desired output.

2. Programming Languages

Programming languages serve as the medium through which we communicate instructions to computers. These languages can be
classified into two main categories: low-level and high-level languages.

a. Low-Level Languages

-Machine Language is directly understood by the computer’s hardware.

Example: 10101100 (Binary code for a specific operation in the CPU)

-Assembly Language: A human-readable representation of machine language that uses mnemonics instead of binary code. It still directly
corresponds to the hardware and requires a translator (assembler) to convert it into machine code.

Example: MOV AX, 5 (Assembly instruction to move the value 5 into the AX register)
High-Level Languages

High-level languages are closer to human languages, making them easier to write, read, and maintain. These languages are abstracted
from the hardware, meaning programmers don’t need to manage low-level details like memory allocation directly.

Examples of high-level programming languages:

Python: Known for its readability and simplicity, Python is widely used in web development, data science, and automation.

Java: A versatile, object-oriented language used for web applications, enterprise software, and Android apps.

C++: A powerful, performance-oriented language used in systems programming, game development, and applications requiring high-
speed processing.

JavaScript: The primary language for building interactive websites and web applications. It runs in web browsers and is essential for
front-end development.

Writing a Simple Program (Example in Python)

Now that we understand programming languages, let’s look at how to write a basic program.

Here’s a simple program in Python that prints "Hello, World!" to the screen.

print("Hello, World!")

Explanation:

print() is a built-in function in Python that outputs text to the console.

"Hello, World!" is the string of text that we want to display.

Steps to run the program:

1. Open a Python environment (e.g., IDLE, Jupyter notebook, or an online Python compiler).

2. Type the code above.

3. Execute the program.

4. The output will be:

Hello, World!

Debugging is for identifying and fixing errors in programs and, testing ensures correctness

Discussion and Activities:

Class Discussion: What are the advantages of using high-level programming languages over low-level languages for most applications?
Activity: Have students write their own simple Python programs (e.g., a program that asks for the user’s name and greets them).

Week 6: Practical Software Applications

1. Word Processing (Microsoft Word, Google Docs)

Creating and formatting documents.

Using templates and collaboration tools.

2. Spreadsheets (Excel, Google Sheets)

Data entry and organization.

Basic formulas: SUM, AVERAGE, IF statements.

3. Presentation Software (PowerPoint, Prezi)

Designing slideshows.

Adding animations and transitions.

Week 6: Practical Software Applications

In this week, we will cover the practical applications of widely used software programs in daily business and academic activities, focusing
on Word Processing, Spreadsheets, and Presentation Software. We'll explore the key features of each application, demonstrate how to
use them effectively, and provide practical exercises for hands-on experience.

1. Word Processing (Microsoft Word, Google Docs)

Word Processing Software allows users to create, edit, and format documents such as reports, essays, and letters. Popular word
processing tools include Microsoft Word and Google Docs.

Creating and Formatting Documents

Microsoft Word and Google Docs allow users to create text documents from scratch or using pre-built templates

Basic formatting options include:

Font styles: Bold, Italic, Underline.

Font size: Adjusting text size for headings, subheadings, and body text.

Alignment: Left, right, center, or justified alignment.

Lists: Bulleted and numbered lists for clear organization of information.


Headers/Footers: Add consistent titles or page numbers across pages.

Example:

To format a heading, select the text and choose a larger font size, then apply bold or use the Heading 1 style.

Using Templates and Collaboration Tools

Templates:

Both Word and Google Docs offer templates that help users quickly create professional-looking documents (e.g., resumes, reports, and
newsletters).

Example: In Word, go to File -> New and choose a template, such as a letter template.

Collaboration Tools:

Google Docs: Allows real-time collaboration where multiple people can edit a document simultaneously. You can track changes, leave
comments, and suggest edits.

Microsoft Word (with Office 365 or OneDrive): Offers real-time collaboration through cloud storage.

Activity:

Create a simple document in Word or Google Docs. Format the title, add a few bullet points, and experiment with inserting a table.

---

2. Spreadsheets (Excel, Google Sheets)

Spreadsheets are used to organize and analyze data. Excel and Google Sheets are the most popular spreadsheet applications for both
personal and professional use.

Data Entry and Organization

Entering Data: Type data into individual cells organized in rows and columns.

Example: A simple budget spreadsheet might have columns for "Expense," "Amount," and "Date."

Sorting and Filtering: Organize data alphabetically or numerically and use filters to view specific information.

Example: Click the Data tab and use the Sort or Filter options to organize data in ascending or descending order.

Basic Formulas:

Spreadsheets allow for performing calculations and analysis using formulas.

SUM: Adds up the values in a range of cells.

Formula; SUM (A1:A5)


AVERAGE: Calculates the average of values in a range.

Formula: =AVERAGE(B1:B5)

IF: Performs conditional logic.

Formula: =IF(C2>50, "Pass", "Fail") (If the value in C2 is greater than 50, the result will be "Pass"; otherwise, "Fail.")

Activity

Create a basic budget spreadsheet in Google Sheets or Excel, entering data on monthly expenses. Then use SUM to calculate total
expenses and AVERAGE to find the average spending.

---

Presentation Software (PowerPoint, Prezi)

Presentation software is used to create visual presentations, typically in the form of slideshows. The most common tools are Microsoft
PowerPoint and Prezi.

Designing Slideshows

Microsoft PowerPoint: Allows users to create slides with text, images, videos, and charts.

Design Tab: Choose a theme or create your own custom design.

Inserting Objects: Use the Insert tab to add text boxes, images, tables, and charts to slides.

Prezi: An alternative to traditional slideshows, Prezi uses a zoomable canvas to create more dynamic and interactive presentations.

Zoomable Canvas: You can arrange content in a non-linear way, providing a more engaging flow to the presentation.

Adding Animations and Transitions

Animations: Used to add effects to individual elements on a slide, such as text, shapes, and images.

Example: Apply a fade-in effect to a text box or animate a chart to appear in sequence.

Transitions: Used to animate the movement from one slide to another.

Example: Apply the Fade transition between slides for a smooth effect.

Activity

Create a short presentation in PowerPoint or Prezi. Add at least three slides with a title, bullet points, and images. Apply animations
and a transition to make it more engaging.
Key Takeaways

Word Processing software allows you to create and format text documents, with collaboration tools enhancing group work.

Class Activities:

Word Processing: Create a professional-looking document using templates and format it according to given guidelines.

Spreadsheet: Enter data for a sample budget or project plan and perform basic calculations using formulas.

Presentation: Prepare a short slide deck on a topic of your choice, using animations and transitions to present information clearly.

Week 7: Internet and Online Resources

1. What is the Internet?

A global network connecting millions of computers.

2. Web Browsers and Search Engines

Browsers: Chrome, Firefox, Edge, Safari.

Search engines: Google, Bing, Yahoo.

Effective search techniques: Using keywords, Boolean operators.

3. Safe Browsing Practices

Avoiding phishing and malware.

Using HTTPS websites for security.

4. Cloud Computing and Online Storage

Cloud services: Google Drive, Dropbox, OneDrive.

Benefits of cloud computing: Accessibility, scalability, security.

This week focuses on understanding the Internet and its role in connecting people and resources globally. We’ll also explore key tools for
browsing the web, safe browsing practices, and how cloud computing and online storage work.
1. What is the Internet?

The Internet is a global network of interconnected computers and devices that communicate with each other using a set of protocols, most
commonly TCP/IP (Transmission Control Protocol/Internet Protocol). The Internet allows users to access information, communicate,
and engage in various online activities such as social media, shopping, and learning.

Characteristics of the internet;

Global Reach: Connects billions of devices worldwide.

Communication: Facilitates real-time communication through email, chat, social media, etc.

Information Sharing: Hosts an extensive range of websites and databases, enabling easy access to information on almost every topic
imaginable.

Web Browsers and Search Engines

Web Browsers:

A web browser is software that allows users to access, view, and navigate the Internet. Common web browsers include:

Google Chrome: Fast, widely used, and highly customizable.

Mozilla Firefox: Open-source, focused on privacy and security.

Microsoft Edge: Integrated with Windows and designed for high performance.

Safari: Default browser for Apple devices, optimized for macOS and iOS.

Activity: Install and explore the features of at least one browser of your choice. Try accessing websites and adjusting settings like privacy
options and bookmarks.

Search Engines:

A search engine helps users find information on the web. The most common search engines include:

Google: The most popular search engine globally, known for its accurate and fast results.

Bing: Microsoft's search engine with a visually appealing interface and integration with other Microsoft products.

Yahoo: One of the earliest search engines, still popular in some regions.
Effective Search Techniques:

Keywords: Use specific words or phrases to narrow down search results.

Example: Searching for “best laptops for students 2025” will give you more relevant results than just “laptops”.

Boolean Operators:

AND: Combines results with all included keywords. For example, “laptops AND students” will show results containing both words.

OR: Retrieves results that include at least one of the keywords. For example, “laptops OR tablets” shows results with either term.

NOT: Excludes results with specific terms. For example, “laptops NOT Apple” will exclude results related to Apple laptops.

Activity: Practice using Boolean operators to search for specific information (e.g., “Cloud storage AND security NOT Dropbox”).

Browsing Practices

To browse the Internet, it's important to stay safe and protect yourself from malicious attacks. Below are some key practices for safe
browsing:

Avoid Phishing and Malware:

Phishing: Fraudulent attempts to collect personal information by pretending to be a trustworthy entity. Phishing usually comes in the
form of emails, fake websites, or phone calls asking for personal data like passwords or credit card information.

Tip: Always verify the sender of an email, and avoid clicking on suspicious links or attachments.

Malware: Software designed to harm your computer, such as viruses, trojans, and ransomware.

Tip: Use up-to-date antivirus software, avoid downloading files from untrusted sources, and be cautious of pop-ups and ads.

Use HTTPS Websites for Security:

HTTPS (HyperText Transfer Protocol Secure) ensures that the data transferred between your browser and a website is encrypted,
making it more secure.

Tip: Always check that the website URL begins with "https://" before entering personal or payment information.

Activity: Visit several websites and check if they are secure by looking for the lock icon next to the URL or by verifying if the URL starts
with "https://". Make sure to avoid sites that don’t offer this level of security when browsing or making transactions.

---
Cloud Computing and Online Storage

Cloud Services:

Cloud computing allows users to store data and run applications over the Internet, rather than on local devices. Cloud storage provides
users with virtual storage space that is accessible from anywhere with an Internet connection.

Popular Cloud Storage Providers:

Google Drive: Offers 15 GB of free storage and integrates with Google's suite of applications like Docs, Sheets, and Slides.

Dropbox: Known for its simplicity and ease of file sharing. Offers 2 GB of free storage with additional space available through referrals
or paid plan

Benefits of cloud Computing

Scalability: Easily scale your storage or computing resources as your needs grow.

Security: Cloud services often include encryption, backup, and data redundancy to

ensure the safety of your data.

vity:

Create a free account with one of the cloud services (Google Drive, Dropbox, or

Drive), upload a document or photo, and practice accessing it from another device or

ser

Takeaways:

Internet connects millions of computers and enables communication, information

sharing, and online activities.

Web Browsers like Chrome, Firefox, and Safari help you access the Internet, while

search engines like Google, Bing, and Yahoo help you find relevant information.

Safe Browsing practices include avoiding phishing and malware, using HTTPS for

security, and using privacy-enhancing tools.


Cloud Computing and Online Storage offer convenient and secure ways to store

and access data from any device.

Class Activities:

Web Browsing: Practice using search engines and Boolean operators to find specific

information online.

Safe Browsing: Check the security of websites you visit and learn how to identify

suspicious websites.

Cloud Computing: Set up an account with a cloud service and explore uploading and

accessing files from different devices.

Week 8: Information Processing and Its Role in Society

Introduction to information processing concepts.

Stages of data processing: input, processing, output, and storage.

Importance of data security, encryption, and privacy.

Automation, artificial intelligence, and decision-making applications.

Case studies of information processing in different sectors.

This week explores the concepts of information processing and its application in various

sectors. We will focus on understanding the stages of data processing, the importance of data

security, and the impact of automation and artificial intelligence in decision-making.

1. Introduction to Information Processing Concepts

Information processing refers to the manipulation and organization of data into meaningful

information. The process involves converting raw data into structured, usable information for
decision-making, analysis, and operational purposes. The core activities in information

processing are:

Praia Conection: Gathering raw data from various sources.

Data Organization: Structuring data to make it easier to process and analyze.

Data Interpretation: Analyzing data and extracting insights.

Data Presentation: Presenting the processed information to the relevant stakeholders.

ages

of Data Processing: Input, Processing, Output, and Storage

data processing cycle consists of four main stages:

ut:

Definition: The stage where raw data is collected from various sources such as

sensors, user input, or databases.

Examples: Typing text into a word processor, scanning a barcode at a store,

collecting survey responses.

cessing:

Definition: The stage where data is transformed, analyzed, or manipulated to produce

useful information.

Examples: Calculating sums or averages, sorting data into categories, filtering out

irrelevant information.

tput:

Definition: The final stage where the processed data is presented in a form that is

understandable and useful to users.

Examples: Displaying results on a screen, printing reports, sending notifications.

rage:

Definition: The stage where data is saved for future use or reference.
Examples: Storing documents in a cloud storage system, saving images to a hard

drive, backing up databases.

Importance of Data Security, Encryption, and Privacy

cre data is processed, stored, and shared, the importance of data security becomes

cal, Below are key aspects of data protection:

Security:

Protecting data from unauthorized access, alteration, or destruction.

Tools: Firewalls, intrusion detection systems, and secure networks.

ryption:

Definition: The process of converting data into a code to prevent unauthorized access.

and personal identifiers) is secure during transmission over the internet or wus

stored.

Example: Using HTTPS for secure browsing or encrypting files stored on a

computer.

cy:

Definition: Ensuring that personal information is only used for its intended purpose

and is not shared or exposed without the individual's consent.

Importance: Protects individuals' rights and prevents misuse of personal data

Tools: Privacy policies, secure login systems, and consent management tools,

vity: Research an instance where data security was compromised, such as a data breach,

discuss the impact it had on privacy and security.

Automation, Artificial Intelligence, and Decision-Making Applications

tomation refers to using technology to perform tasks that would typically require human
vention. Artificial Intelligence (AI) plays a significant role in automating decision-

ing processes.

tomation:

. Definition: The use of technology to complete repetitive tasks without human

involvement.

Examples: Automated customer service chatbots, robotic process automation (RPA)

in businesses, self-checkout machines in stores.

Impact: Increases efficiency, reduces errors, and cuts operational costs.

rtificial Intelligence:

Definition: The simulation of human intelligence in machines that can perform tasks

such as learning, reasoning, and problem-solving.

Applications in Decision-Making:

Predictive Analytics: AI can analyze historical data and predict future trends

(e.g., forecasting sales, identifying customer needs).

Recommendation Systems: AI analyzes user preferences to recommend

products or content (e.g., Netflix's recommendation engine, Amazon product

suggestions).

Autonomous Systems: AI enables machines to make decisions in real-time,

such as self-driving cars navigating traffic or drones delivering packages.

Activity: Explore a business that uses AI in its decision-making process (such as Netflix,

Amazon, or Spotify) and discuss how the AI impacts customer experiences and operational

iciency.
Case Studies of Information Processing in Different Sectors

Case Study 1: Healthcare

Electronic Medical Records (EMR): Healthcare providers use EMR systems to store and manage patient data. This streamlines patient
care by giving doctors instant access to a patient's medical history, medications, and test results.

AI in Diagnosis: AI is increasingly used for diagnostic purposes. Machine learning models analyze medical imaging (X-rays, MRIs, etc.)
to detect conditions such as cancer or heart disease.

Case Study 2: Retail

Inventory Management: Retailers use data processing to monitor inventory levels in real-time, ensuring that popular products are always
in stock and that outdated items are cleared from shelves.

Customer Data Analysis: Retailers use customer data to understand buying patterns and improve personalized marketing efforts.

Case Study 3: Government

Digital Tax Systems: Governments use information processing to collect taxes efficiently and ensure compliance. Digital tax systems allow
for easier filing, payment, and tracking of taxes.

Biometric Verification: Governments use biometric data (fingerprints, facial recognition) to ensure secure access to services like
passports and national ID cards.

Case Study 4: Finance

Fraud Detection: Banks use AI and machine learning algorithms to detect fraudulent activity by analyzing transaction patterns and
flagging any unusual behavior in real-time.

Credit Scoring: Financial institutions process large amounts of data to determine an individual's creditworthiness, allowing them to make
lending decisions.

Activity: Choose a sector (healthcare, retail, government, finance) and find a real-world example of how information processing is used to
improve operations or services.

Key Takeaways:

Information Processing includes the collection, organization, processing, and presentation of data, which is essential for decision-making
in various sectors.
Data Security, Encryption, and Privacy are critical in protecting sensitive information and ensuring compliance with laws.

Automation and AI enhance decision-making by reducing manual effort and enabling systems to perform tasks that traditionally
required human intelligence.

Case Studies demonstrate the wide application of information processing, from healthcare to finance, improving both efficiency and
effectiveness.

Research and analyze a real-world example of how AI or automation has improved decision-making in a company or industry.

Discuss the impact of data breaches in different sectors and propose measures to mitigate these risks.

Week 9: Internet and Online Resources

Introduction to the internet and its core components.

Web browsers, search engines, and how they function.

Cybersecurity best practices for safe browsing and data protection.

Cloud computing and online storage solutions.

The role of the internet in communication, research, and business.

This week covers the internet’s structure, how web browsers and search engines work, and the importance of cybersecurity. We’ll also
explore cloud computing, online storage, and the internet’s influence on communication, research, and business.

Introduction to the Internet and Its Core Components

The internet is a global network that connects millions of computers and devices, enabling the exchange of information and
communication. It is made up of:

Web: A collection of interconnected documents and resources accessible through browsers.

Servers: Machines that store and deliver web content.

IP Addresses and DNS: Unique numerical identifiers for devices and a system to translate human-readable domain names to IP
addresses.
Protocols (HTTP, HTTPS, TCP/IP): Rules that govern data transmission and ensure secure, reliable communication.

Web Browsers, Search Engines, and How They Function

Web Browsers:

Definition: Software used to access and navigate the internet.

Examples: Google Chrome, Firefox, Safari, Microsoft Edge.

Functionality:

Rendering Engine: Translates web pages into readable formats.

Address Bar: Used to enter URLs (Uniform Resource Locators) to visit websites.

Tabs and Bookmarks: For navigating multiple pages simultaneously and saving favorite sites.

Search Engines:

Definition: Online tools used to search for information on the web.

Examples: Google, Bing, Yahoo.

Functionality:

Crawling: Search engines use bots to scan and index web pages.

Indexing: Data from crawled pages is stored in a massive database.

Ranking: Algorithms rank pages based on relevance and quality of content to provide the best search results.

Try using advanced search operators (e.g., quotes for exact phrases, site: for websites) to refine search results on Google.

Cybersecurity Best Practices for Safe Browsing and Data Protection

As more of our personal information is shared and stored online, it’s crucial to protect ourselves and our data.
Practices for Safe Browsing:

Use Strong Passwords: Create passwords that are difficult to guess and use a password manager for storage.

Enable Two-Factor Authentication (2FA): Add an extra layer of security by requiring a second form of verification.

Be Wary of Phishing: Avoid clicking on suspicious email links or downloading attachments from unknown sources.

Keep Software Updated: Regular updates fix vulnerabilities in browsers, operating systems, and other applications.

Data Protection:

Encryption: Use secure websites (HTTPS) and encrypt sensitive data before sharing.

Secure Wi-Fi Networks: Use a strong password for your home Wi-Fi and avoid public networks for sensitive activities.

Online Activity:

Perform a security check-up on your online accounts and update privacy settings on social media platforms and email accounts.

---

Cloud Computing and Online Storage Solutions

Cloud Computing refers to accessing and storing data, applications, and services via the internet instead of locally on a computer’s hard
drive.

Benefits of Cloud Computing:

Accessibility: Access files from anywhere with an internet connection.

Scalability: Cloud services can easily be expanded to accommodate more data or users.

Cost-Efficiency: Reduces the need for expensive hardware and software infrastructure.

Popular Cloud Storage Solutions:

Google Drive: Offers file storage, document editing, and sharing features.

OneDrive:A cloud service integrated with Microsoft for file storage and management.
Create a free cloud storage account (Google Drive or Dropbox) and upload a file with a classmate and review how easy it is to
collaborate using cloud-based tools.

---

Role of the Internet in Communication, Research, and Business

The internet has revolutionized the way we communicate, conduct research, and do business.

Communication:

Email: Fast, efficient, and widely used for both personal and professional communication.

Messaging Apps: Platforms like WhatsApp, Slack, and Zoom facilitate real-time communication.

Research:

Online Databases and Journals: Databases like Google Scholar and JSTOR allow access to academic papers and research materials.

Websites and Forums: The internet hosts a wealth of knowledge from professional blogs, educational websites, and online communities.

Business:

E-commerce: Online stores (e.g., Amazon, eBay) enable businesses to reach global markets.

Digital Marketing: The internet allows businesses to advertise through social media, search engines, and email marketing campaigns.

Remote Work: Collaboration tools like Google Workspace, Microsoft Teams, and Zoom allow employees to work from anywhere.

Activity: Research how businesses in your area are using the internet for marketing, e-commerce, or customer engagement. Present your
findings to the class.
Week 10: Assessments and Practical Applications

Review of key concepts covered throughout the course.

Quizzes and short tests on theoretical aspects.

Practical assignments using real-world software applications.

Mini programming projects for problem-solving.

Final project: developing a small computing-related solution.

This week focuses on reviewing the key concepts learned throughout the course and applying them through various assessments and
hands-on assignments.

1. Review of Key Concepts Covered Throughout the Course

We’ll revisit the major topics, including:

Computer hardware and software

Information processing and security

Quizzes and short tests on theorical aspects:

Quiz on Operating Systems: Covering the functions and roles of OS.

Test on Programming: Basic concepts and understanding of code structure.

Practical Assignments Using Real-World Software Applications

Assignment 1: Use a word processor to create a professional document (resume, report, etc.).

Assignment 2: Create a spreadsheet with basic calculations and formulas (e.g., budgeting, analysis).

Programming Projects for Problem-Solving

Project 1: Write a Python script that takes input from the user and calculates the area of a rectangle.
Project 2: Create a simple to-do list application using JavaScript that stores tasks in an array.

Final Project: Developing a Small Computing-Related Solution

Final Project: Choose a computing-related problem (e.g., a personal finance tracker, to-do list app) and develop a solution using
programming or available software tools.

Activity:

Prepare for the final project by planning your solution, gathering any necessary resources, and determining the tools you will use (e.g.,
Python, Excel, Google Docs).

Wrap-Up

This week is crucial for consolidating your understanding of the course material through practical tasks.

The final project will help you apply your skills in solving real-world computing problems.

Conclusion:

This course offers a comprehensive foundation in computing concepts, hardware, software, programming, and practical applications. By
the end, students will have gained both theoretical knowledge and hands-on experience, preparing them for further studies or careers in
computing-related fields.

Practical Activities

Requirements:

Identify computer hardware components.

Explain the role of an OS in computing.

Applications:
Create and format a Word document.

Perform basic calculations in Excel.

Design a PowerPoint presentation.

Programming Task:Write a simple Python program.

Final Project:Develop a small computing-related solution (e.g., a basic website, automated spreadsheet, or data entry system).

You might also like