Fms103 Handout
Fms103 Handout
What is Computing?
Computing refers to the process of using computers to perform various tasks, including calculations, data processing, programming, and
communication. It encompasses multiple disciplines, such as Computer Science, Software Engineering, Information Systems,
Cybersecurity, and Artificial Intelligence.
Modern Computing: Cloud computing, Artificial Intelligence (AI), Internet of Things (IoT).
1. Core Disciplines:
Computer Science: The study of algorithms, programming languages, and data structures.
Information Systems: How organizations use computers to collect, store, and manage information.
Cybersecurity: The practice of protecting computer systems and networks from digital attacks.
Artificial Intelligence (AI): The field focused on creating intelligent systems capable of learning, reasoning, and problem-solving.
2. Brief History of Computing
Napier’s Bones (1617): A set of rods invented by John Napier to aid in multiplication and division.
Mechanical Computing:
Charles Babbage’s Analytical Engine (1837): Considered the first conceptual design for a mechanical computer. It laid the groundwork
for modern computing with features like a central processing unit (CPU) and memory.
ENIAC (1945): The Electronic Numerical Integrator and Computer was the first general-purpose programmable computer, capable of
performing complex calculations for military applications during World War II.
IBM PC (1981): Introduced personal computers to the mass market, changing how people interacted with technology in homes and
offices.
Apple Macintosh (1984): Pioneered the graphical user interface (GUI) and made computers more user-friendly with the introduction of
the mouse and icons.
Modern Computing:
Cloud Computing: The ability to store and process data over the internet, allowing for scalable, on-demand computing resources.
Artificial Intelligence (AI): The development of systems that can perform tasks traditionally requiring human intelligence, such as
language processing, decision-making, and pattern recognition.
Internet of Things (IoT): A network of interconnected devices that communicate and share data, ranging from household appliances to
industrial machines.
Drives Innovation: Computing is the backbone of innovation in various sectors, such as:
Enhances Efficiency: Automation through software and algorithms increases productivity and reduces human error. From
manufacturing to customer service, computing streamlines workflows and optimizes operations.
Facilitates Global Communication and Information Access: The internet, mobile technologies, and social media platforms have made it
possible to communicate instantly across the globe and access vast amounts of information at the click of a button.
Class Discussion: Ask students to discuss how computing has impacted their daily lives. How do they use technology for work, learning,
or communication?
Activity: Have students research and present on one milestone in computing history, explaining its significance and how it shaped modern
technology.
a. System Software:
This week will focus on the foundational components of a computer system, breaking down both hardware and software. Students will
learn about the essential physical components of a computer (hardware) and the programs that run on them (software), which are
crucial for understanding how a computer works.
---
a. Input Devices: Devices that allow users to interact with the computer by inputting data.
Mouse: A pointing device used for navigating and selecting items on the screen.
Scanner: A device that converts physical documents or images into digital format.
b. Output Devices: Devices that display or produce results from the computer's processing.
HDD (Hard Disk Drive): A traditional mechanical storage device used for long-term data storage.
SSD (Solid State Drive): A faster, more durable alternative to HDDs, using flash memory.
USB Drives: Portable storage devices used for transferring files between computers.
Cloud Storage: A method of storing data online, allowing users to access it from anywhere with an internet connection (e.g., Google Drive,
Dropbox).
d. Processing Unit (CPU): The Central Processing Unit (CPU) is the brain of the computer. It processes instructions, performs
calculations, and manages data flow.
The CPU consists of cores (multiple processing units) that execute instructions from software applications and operating systems.
The speed and efficiency of the CPU play a significant role in the overall performance of the computer.
RAM (Random Access Memory): Temporary storage used by the computer for quick access to active data. More RAM allows the
computer to run more applications simultaneously without slowing down.
ROM (Read-Only Memory): Permanent storage used for firmware (essential programs that are required to start the computer). It is
non-volatile, meaning the data is not lost when the computer is powered off.
a. System Software: These are the essential programs that manage the hardware and software resources of the computer.
Operating Systems (OS): The software that allows the user to interact with the computer and manages hardware and software resources.
macOS: The OS used in Apple computers, known for its clean interface and seamless integration with Apple products.
Linux: An open-source OS that is customizable and commonly used for servers and development.
Android: A mobile operating system developed by Google, widely used in smartphones and tablets.
iOS: Apple's mobile operating system used in iPhones, iPads, and other Apple devices.
Utility Programs: Software designed to help manage and maintain the computer.
Antivirus Software: Programs that detect and remove malicious software (e.g., Norton, McAfee).
File Management Tools: Programs for organizing, storing, and managing files (e.g., Windows File Explorer, Finder in macOS).
Information processing refers to the cycle of collecting, storing, processing, and distributing information. It involves transforming raw
data into meaningful information that can be used to make decisions, drive innovation, and improve efficiency. This cycle plays a crucial
role in various industries, from business to healthcare.
Collection: Gathering raw data from various sources (e.g., surveys, sensors, user input).
Processing: Using software or algorithms to analyze and convert raw data into meaningful insights or actions.
Distribution: Delivering processed information to the appropriate stakeholders or systems for decision-making or action.
---
Information processing has a profound impact across various sectors, improving efficiency, decision-making, and accessibility.
a. Business:
Data Management: Businesses rely on information processing to collect and manage data effectively, ensuring it’s available for analysis,
reporting, and decision-making.
Customer Relationship Management (CRM): CRM systems allow businesses to process and analyze customer data to enhance
relationships, improve service, and drive sales. CRM tools help businesses track customer preferences, past interactions, and feedback to
offer personalized experiences.
b. Education:
E-learning Platforms: The rise of online education and digital classrooms depends heavily on information processing. E-learning
platforms track student progress, deliver course materials, and analyze performance to enhance learning experiences.
Virtual Classrooms: In a virtual classroom, information processing is key to facilitating real-time communication, sharing educational
resources, and assessing student participation and performance.
c. Healthcare:
Electronic Medical Records (EMRs): Healthcare providers use EMRs to store, process, and access patient health data. This system
improves diagnosis accuracy, speeds up treatments, and helps manage patient care more effectively.
AI-assisted Diagnosis: AI systems process large datasets from medical imaging, patient history, and genetic information to assist doctors
in diagnosing diseases, identifying treatment options, and predicting patient outcomes.
d. Government:
Biometric Verification: Governments use biometric information (e.g., fingerprints, facial recognition) to process identity data for purposes
like immigration, national ID systems, and voter registration.
Digital Tax Systems: Information processing enables governments to manage taxation, track income, and process returns more efficiently.
Digital systems reduce human error and increase transparency in tax collection.
As more personal and sensitive information is processed, the importance of protecting this data becomes paramount.
Privacy Concerns: As people share more information online, from personal details to financial data, the risk of data breaches, identity
theft, and misuse grows. Safeguarding personal data is essential to maintaining privacy and trust.
Legal and Ethical Considerations: Governments and organizations must adhere to regulations such as the General Data Protection
Regulation (GDPR) in Europe, which mandates strict rules on data collection, processing, and storage.
b. Cybersecurity Measures:
To protect sensitive data and maintain privacy, several cybersecurity measures can be employed:
Strong Passwords: Using complex, unique passwords for different accounts reduces the risk of unauthorized access.
Encryption: This process converts data into an unreadable format unless the user has the appropriate decryption key. Encryption
ensures that even if data is intercepted, it cannot be read or used maliciously.
Anti-malware Software: Programs designed to detect, prevent, and remove malicious software (viruses, ransomware, spyware) that can
damage or steal data.
Two-Factor Authentication (2FA): This security measure adds an extra layer of protection by requiring users to verify their identity
through two forms, typically something they know (password) and something they have (smartphone or authentication app).
Class Discussion: How does information processing impact daily life? Encourage students to think about how they interact with
information in their daily tasks, whether it's through work, education, or personal activities.
Activity: Have students analyze real-world examples of information processing in business (e.g., CRM tools) or healthcare (e.g., EMRs).
How do these technologies improve efficiency and decision-making?
Lab Activity: Students can practice setting up basic security measures, like creating strong passwords and using a password manager.
You could also demonstrate how to use encryption tools to secure sensitive files.
Week 4: Operating Systems and Kernel Functionality
Functions of an OS:
User Interface Management: Enables interaction with the computer (GUI, CLI).
This week, we'll explore Operating Systems (OS), the essential software that manages a computer's hardware and software resources.
We'll dive into the functions of an OS and discuss the crucial role of the Kernel, which is the heart of the system.
---
An Operating System (OS) is system software that acts as an intermediary between computer hardware and the software applications
running on the computer. It manages and coordinates the hardware components (e.g., CPU, memory, storage devices) and software
resources, ensuring that the system operates efficiently and securely.
Resource Management: Allocates hardware resources such as CPU time, memory space, and storage to running applications.
Task Scheduling: Ensures that multiple applications or processes run efficiently, sometimes simultaneously, without interfering with one
another.
User Interaction: Provides users with an interface to interact with the system, whether through graphical user interfaces (GUI) or
command-line interfaces (CLI).
2. Functions of an Operating System
An OS performs several crucial functions that are essential for the computer's proper operation:
a. Process Management
Definition: Process management ensures that the system can run multiple programs simultaneously (multitasking). It involves scheduling
processes and managing their execution.
Key Tasks:
Process Scheduling: The OS decides which process gets to use the CPU at any given time, depending on priority and fairness.
Multitasking: The OS divides CPU time among several tasks, giving the illusion of simultaneous execution, even on single-core systems.
Process Control: The OS manages the lifecycle of processes, from creation to execution and termination.
b.Memory Management
Definition: Memory management controls the allocation and deallocation of memory for programs and processes.
Key Tasks:
Allocating Memory: The OS decides how much memory to assign to each running process. This is crucial for ensuring that programs
don’t interfere with each other’s memory space.
Virtual Memory: The OS uses hard disk space as virtual memory to extend the available RAM, enabling programs to run that require
more memory than what is physically available.
Memory Protection: Ensures that one process cannot access the memory allocated to another process, preventing errors or malicious
actions.
Definition: The OS organizes and controls access to the computer’s storage resources (e.g., hard drives, SSDs, USB drives).
Key Tasks:
File Storage: The OS uses a file system (e.g., NTFS, FAT32, ext4) to organize and store files in directories and subdirectories.
File Access: Provides mechanisms for reading, writing, and modifying files.
File Permissions: The OS enforces rules about who can access or modify particular files, ensuring security and privacy.
d.User Interface Management
Definition: The user interface (UI) is the means by which the user interacts with the computer. This could be a Graphical User Interface
(GUI) or a Command-Line Interface (CLI).
Key Tasks:
Graphical User Interface (GUI): Most modern OSes provide a GUI that allows users to interact with the system through visual elements
like windows, icons, and buttons (e.g., Windows, macOS).
Command-Line Interface (CLI): Some systems or tasks rely on a CLI, where users interact with the OS by typing commands (e.g., Linux,
older versions of Windows).
The Kernel is the core part of an operating system. It acts as a bridge between the user and the hardware, managing the communication
and execution of processes.
System Resource Management: The Kernel is responsible for managing CPU time, memory, and other system resources efficiently,
ensuring that multiple processes can run simultaneously without interfering with one another.
CPU Management: The Kernel handles the scheduling of processes to ensure efficient CPU usage, deciding which process gets to use the
CPU and for how long.
Memory Management: The Kernel allocates and deallocates memory to processes, ensuring that each process has the required memory
and preventing conflicts between them.
Device Management: The Kernel handles communication between the operating system and hardware devices (e.g., keyboard, mouse,
printer). It uses device drivers to interface with different hardware components.
Inter-Process Communication (IPC): The Kernel provides mechanisms for processes to communicate with each other (e.g., message
passing, shared memory).
Types of Kernels:
Monolithic Kernel: In this type, the entire OS, including the device drivers, file system, and memory management, runs in a single large
block of code. Examples: Linux, Unix.
Microkernel: A smaller kernel that only provides basic services, like communication between hardware and software, and other services
(e.g., file systems, device drivers) are handled by separate processes. Example: Minix.
Hybrid Kernel: Combines features of both monolithic and microkernels, aiming to provide the flexibility of microkernels with the
performance of monolithic kernels. Example: Windows NT, macOS.
Key Takeaways:
Operating systems are essential for managing a computer’s hardware and software resources and provide user interfaces for interaction.
The Kernel is the core component of the OS, responsible for controlling the system’s resources, including the CPU, memory, and device
communication.
OS functions like process management, memory management, and file system management ensure efficient operation and security of the
system.
Class Discussion: What are the advantages and disadvantages of monolithic vs. microkernels? Which do you think is better suited for
modern computing environments, and why?
Activity: Have students explore the Task Manager (Windows) or System Monitor (Linux) to understand how process management
works on their operating systems. Ask them to observe CPU usage, memory allocation, and running processes.
What is Programming?
Programming Languages:
print("Hello, World!")
Debugging and Correctness
---
This week, we'll introduce Programming as a core component of computing, covering its essential concepts, programming languages, and
how to write a simple program. We'll also explore the importance of debugging and ensuring program correctness.
1. What is Programming?
Programming is the process of writing a set of instructions (known as code) that a computer can execute to perform specific tasks. These
instructions tell the computer how to manipulate data, interact with hardware, or perform computations.
Key Concepts:
Programming Logic: The logical sequence of instructions that guide the computer to produce the desired output.
2. Programming Languages
Programming languages serve as the medium through which we communicate instructions to computers. These languages can be
classified into two main categories: low-level and high-level languages.
a. Low-Level Languages
-Assembly Language: A human-readable representation of machine language that uses mnemonics instead of binary code. It still directly
corresponds to the hardware and requires a translator (assembler) to convert it into machine code.
Example: MOV AX, 5 (Assembly instruction to move the value 5 into the AX register)
High-Level Languages
High-level languages are closer to human languages, making them easier to write, read, and maintain. These languages are abstracted
from the hardware, meaning programmers don’t need to manage low-level details like memory allocation directly.
Python: Known for its readability and simplicity, Python is widely used in web development, data science, and automation.
Java: A versatile, object-oriented language used for web applications, enterprise software, and Android apps.
C++: A powerful, performance-oriented language used in systems programming, game development, and applications requiring high-
speed processing.
JavaScript: The primary language for building interactive websites and web applications. It runs in web browsers and is essential for
front-end development.
Now that we understand programming languages, let’s look at how to write a basic program.
Here’s a simple program in Python that prints "Hello, World!" to the screen.
print("Hello, World!")
Explanation:
1. Open a Python environment (e.g., IDLE, Jupyter notebook, or an online Python compiler).
Hello, World!
Debugging is for identifying and fixing errors in programs and, testing ensures correctness
Class Discussion: What are the advantages of using high-level programming languages over low-level languages for most applications?
Activity: Have students write their own simple Python programs (e.g., a program that asks for the user’s name and greets them).
Designing slideshows.
In this week, we will cover the practical applications of widely used software programs in daily business and academic activities, focusing
on Word Processing, Spreadsheets, and Presentation Software. We'll explore the key features of each application, demonstrate how to
use them effectively, and provide practical exercises for hands-on experience.
Word Processing Software allows users to create, edit, and format documents such as reports, essays, and letters. Popular word
processing tools include Microsoft Word and Google Docs.
Microsoft Word and Google Docs allow users to create text documents from scratch or using pre-built templates
Font size: Adjusting text size for headings, subheadings, and body text.
Example:
To format a heading, select the text and choose a larger font size, then apply bold or use the Heading 1 style.
Templates:
Both Word and Google Docs offer templates that help users quickly create professional-looking documents (e.g., resumes, reports, and
newsletters).
Example: In Word, go to File -> New and choose a template, such as a letter template.
Collaboration Tools:
Google Docs: Allows real-time collaboration where multiple people can edit a document simultaneously. You can track changes, leave
comments, and suggest edits.
Microsoft Word (with Office 365 or OneDrive): Offers real-time collaboration through cloud storage.
Activity:
Create a simple document in Word or Google Docs. Format the title, add a few bullet points, and experiment with inserting a table.
---
Spreadsheets are used to organize and analyze data. Excel and Google Sheets are the most popular spreadsheet applications for both
personal and professional use.
Entering Data: Type data into individual cells organized in rows and columns.
Example: A simple budget spreadsheet might have columns for "Expense," "Amount," and "Date."
Sorting and Filtering: Organize data alphabetically or numerically and use filters to view specific information.
Example: Click the Data tab and use the Sort or Filter options to organize data in ascending or descending order.
Basic Formulas:
Formula: =AVERAGE(B1:B5)
Formula: =IF(C2>50, "Pass", "Fail") (If the value in C2 is greater than 50, the result will be "Pass"; otherwise, "Fail.")
Activity
Create a basic budget spreadsheet in Google Sheets or Excel, entering data on monthly expenses. Then use SUM to calculate total
expenses and AVERAGE to find the average spending.
---
Presentation software is used to create visual presentations, typically in the form of slideshows. The most common tools are Microsoft
PowerPoint and Prezi.
Designing Slideshows
Microsoft PowerPoint: Allows users to create slides with text, images, videos, and charts.
Inserting Objects: Use the Insert tab to add text boxes, images, tables, and charts to slides.
Prezi: An alternative to traditional slideshows, Prezi uses a zoomable canvas to create more dynamic and interactive presentations.
Zoomable Canvas: You can arrange content in a non-linear way, providing a more engaging flow to the presentation.
Animations: Used to add effects to individual elements on a slide, such as text, shapes, and images.
Example: Apply a fade-in effect to a text box or animate a chart to appear in sequence.
Example: Apply the Fade transition between slides for a smooth effect.
Activity
Create a short presentation in PowerPoint or Prezi. Add at least three slides with a title, bullet points, and images. Apply animations
and a transition to make it more engaging.
Key Takeaways
Word Processing software allows you to create and format text documents, with collaboration tools enhancing group work.
Class Activities:
Word Processing: Create a professional-looking document using templates and format it according to given guidelines.
Spreadsheet: Enter data for a sample budget or project plan and perform basic calculations using formulas.
Presentation: Prepare a short slide deck on a topic of your choice, using animations and transitions to present information clearly.
This week focuses on understanding the Internet and its role in connecting people and resources globally. We’ll also explore key tools for
browsing the web, safe browsing practices, and how cloud computing and online storage work.
1. What is the Internet?
The Internet is a global network of interconnected computers and devices that communicate with each other using a set of protocols, most
commonly TCP/IP (Transmission Control Protocol/Internet Protocol). The Internet allows users to access information, communicate,
and engage in various online activities such as social media, shopping, and learning.
Communication: Facilitates real-time communication through email, chat, social media, etc.
Information Sharing: Hosts an extensive range of websites and databases, enabling easy access to information on almost every topic
imaginable.
Web Browsers:
A web browser is software that allows users to access, view, and navigate the Internet. Common web browsers include:
Microsoft Edge: Integrated with Windows and designed for high performance.
Safari: Default browser for Apple devices, optimized for macOS and iOS.
Activity: Install and explore the features of at least one browser of your choice. Try accessing websites and adjusting settings like privacy
options and bookmarks.
Search Engines:
A search engine helps users find information on the web. The most common search engines include:
Google: The most popular search engine globally, known for its accurate and fast results.
Bing: Microsoft's search engine with a visually appealing interface and integration with other Microsoft products.
Yahoo: One of the earliest search engines, still popular in some regions.
Effective Search Techniques:
Example: Searching for “best laptops for students 2025” will give you more relevant results than just “laptops”.
Boolean Operators:
AND: Combines results with all included keywords. For example, “laptops AND students” will show results containing both words.
OR: Retrieves results that include at least one of the keywords. For example, “laptops OR tablets” shows results with either term.
NOT: Excludes results with specific terms. For example, “laptops NOT Apple” will exclude results related to Apple laptops.
Activity: Practice using Boolean operators to search for specific information (e.g., “Cloud storage AND security NOT Dropbox”).
Browsing Practices
To browse the Internet, it's important to stay safe and protect yourself from malicious attacks. Below are some key practices for safe
browsing:
Phishing: Fraudulent attempts to collect personal information by pretending to be a trustworthy entity. Phishing usually comes in the
form of emails, fake websites, or phone calls asking for personal data like passwords or credit card information.
Tip: Always verify the sender of an email, and avoid clicking on suspicious links or attachments.
Malware: Software designed to harm your computer, such as viruses, trojans, and ransomware.
Tip: Use up-to-date antivirus software, avoid downloading files from untrusted sources, and be cautious of pop-ups and ads.
HTTPS (HyperText Transfer Protocol Secure) ensures that the data transferred between your browser and a website is encrypted,
making it more secure.
Tip: Always check that the website URL begins with "https://" before entering personal or payment information.
Activity: Visit several websites and check if they are secure by looking for the lock icon next to the URL or by verifying if the URL starts
with "https://". Make sure to avoid sites that don’t offer this level of security when browsing or making transactions.
---
Cloud Computing and Online Storage
Cloud Services:
Cloud computing allows users to store data and run applications over the Internet, rather than on local devices. Cloud storage provides
users with virtual storage space that is accessible from anywhere with an Internet connection.
Google Drive: Offers 15 GB of free storage and integrates with Google's suite of applications like Docs, Sheets, and Slides.
Dropbox: Known for its simplicity and ease of file sharing. Offers 2 GB of free storage with additional space available through referrals
or paid plan
Scalability: Easily scale your storage or computing resources as your needs grow.
Security: Cloud services often include encryption, backup, and data redundancy to
vity:
Create a free account with one of the cloud services (Google Drive, Dropbox, or
Drive), upload a document or photo, and practice accessing it from another device or
ser
Takeaways:
Web Browsers like Chrome, Firefox, and Safari help you access the Internet, while
search engines like Google, Bing, and Yahoo help you find relevant information.
Safe Browsing practices include avoiding phishing and malware, using HTTPS for
Class Activities:
Web Browsing: Practice using search engines and Boolean operators to find specific
information online.
Safe Browsing: Check the security of websites you visit and learn how to identify
suspicious websites.
Cloud Computing: Set up an account with a cloud service and explore uploading and
This week explores the concepts of information processing and its application in various
sectors. We will focus on understanding the stages of data processing, the importance of data
Information processing refers to the manipulation and organization of data into meaningful
information. The process involves converting raw data into structured, usable information for
decision-making, analysis, and operational purposes. The core activities in information
processing are:
ages
ut:
Definition: The stage where raw data is collected from various sources such as
cessing:
useful information.
Examples: Calculating sums or averages, sorting data into categories, filtering out
irrelevant information.
tput:
Definition: The final stage where the processed data is presented in a form that is
rage:
Definition: The stage where data is saved for future use or reference.
Examples: Storing documents in a cloud storage system, saving images to a hard
cre data is processed, stored, and shared, the importance of data security becomes
Security:
ryption:
Definition: The process of converting data into a code to prevent unauthorized access.
and personal identifiers) is secure during transmission over the internet or wus
stored.
computer.
cy:
Definition: Ensuring that personal information is only used for its intended purpose
Tools: Privacy policies, secure login systems, and consent management tools,
vity: Research an instance where data security was compromised, such as a data breach,
tomation refers to using technology to perform tasks that would typically require human
vention. Artificial Intelligence (AI) plays a significant role in automating decision-
ing processes.
tomation:
involvement.
rtificial Intelligence:
Definition: The simulation of human intelligence in machines that can perform tasks
Applications in Decision-Making:
Predictive Analytics: AI can analyze historical data and predict future trends
suggestions).
Activity: Explore a business that uses AI in its decision-making process (such as Netflix,
Amazon, or Spotify) and discuss how the AI impacts customer experiences and operational
iciency.
Case Studies of Information Processing in Different Sectors
Electronic Medical Records (EMR): Healthcare providers use EMR systems to store and manage patient data. This streamlines patient
care by giving doctors instant access to a patient's medical history, medications, and test results.
AI in Diagnosis: AI is increasingly used for diagnostic purposes. Machine learning models analyze medical imaging (X-rays, MRIs, etc.)
to detect conditions such as cancer or heart disease.
Inventory Management: Retailers use data processing to monitor inventory levels in real-time, ensuring that popular products are always
in stock and that outdated items are cleared from shelves.
Customer Data Analysis: Retailers use customer data to understand buying patterns and improve personalized marketing efforts.
Digital Tax Systems: Governments use information processing to collect taxes efficiently and ensure compliance. Digital tax systems allow
for easier filing, payment, and tracking of taxes.
Biometric Verification: Governments use biometric data (fingerprints, facial recognition) to ensure secure access to services like
passports and national ID cards.
Fraud Detection: Banks use AI and machine learning algorithms to detect fraudulent activity by analyzing transaction patterns and
flagging any unusual behavior in real-time.
Credit Scoring: Financial institutions process large amounts of data to determine an individual's creditworthiness, allowing them to make
lending decisions.
Activity: Choose a sector (healthcare, retail, government, finance) and find a real-world example of how information processing is used to
improve operations or services.
Key Takeaways:
Information Processing includes the collection, organization, processing, and presentation of data, which is essential for decision-making
in various sectors.
Data Security, Encryption, and Privacy are critical in protecting sensitive information and ensuring compliance with laws.
Automation and AI enhance decision-making by reducing manual effort and enabling systems to perform tasks that traditionally
required human intelligence.
Case Studies demonstrate the wide application of information processing, from healthcare to finance, improving both efficiency and
effectiveness.
Research and analyze a real-world example of how AI or automation has improved decision-making in a company or industry.
Discuss the impact of data breaches in different sectors and propose measures to mitigate these risks.
This week covers the internet’s structure, how web browsers and search engines work, and the importance of cybersecurity. We’ll also
explore cloud computing, online storage, and the internet’s influence on communication, research, and business.
The internet is a global network that connects millions of computers and devices, enabling the exchange of information and
communication. It is made up of:
IP Addresses and DNS: Unique numerical identifiers for devices and a system to translate human-readable domain names to IP
addresses.
Protocols (HTTP, HTTPS, TCP/IP): Rules that govern data transmission and ensure secure, reliable communication.
Web Browsers:
Functionality:
Address Bar: Used to enter URLs (Uniform Resource Locators) to visit websites.
Tabs and Bookmarks: For navigating multiple pages simultaneously and saving favorite sites.
Search Engines:
Functionality:
Crawling: Search engines use bots to scan and index web pages.
Ranking: Algorithms rank pages based on relevance and quality of content to provide the best search results.
Try using advanced search operators (e.g., quotes for exact phrases, site: for websites) to refine search results on Google.
As more of our personal information is shared and stored online, it’s crucial to protect ourselves and our data.
Practices for Safe Browsing:
Use Strong Passwords: Create passwords that are difficult to guess and use a password manager for storage.
Enable Two-Factor Authentication (2FA): Add an extra layer of security by requiring a second form of verification.
Be Wary of Phishing: Avoid clicking on suspicious email links or downloading attachments from unknown sources.
Keep Software Updated: Regular updates fix vulnerabilities in browsers, operating systems, and other applications.
Data Protection:
Encryption: Use secure websites (HTTPS) and encrypt sensitive data before sharing.
Secure Wi-Fi Networks: Use a strong password for your home Wi-Fi and avoid public networks for sensitive activities.
Online Activity:
Perform a security check-up on your online accounts and update privacy settings on social media platforms and email accounts.
---
Cloud Computing refers to accessing and storing data, applications, and services via the internet instead of locally on a computer’s hard
drive.
Scalability: Cloud services can easily be expanded to accommodate more data or users.
Cost-Efficiency: Reduces the need for expensive hardware and software infrastructure.
Google Drive: Offers file storage, document editing, and sharing features.
OneDrive:A cloud service integrated with Microsoft for file storage and management.
Create a free cloud storage account (Google Drive or Dropbox) and upload a file with a classmate and review how easy it is to
collaborate using cloud-based tools.
---
The internet has revolutionized the way we communicate, conduct research, and do business.
Communication:
Email: Fast, efficient, and widely used for both personal and professional communication.
Messaging Apps: Platforms like WhatsApp, Slack, and Zoom facilitate real-time communication.
Research:
Online Databases and Journals: Databases like Google Scholar and JSTOR allow access to academic papers and research materials.
Websites and Forums: The internet hosts a wealth of knowledge from professional blogs, educational websites, and online communities.
Business:
E-commerce: Online stores (e.g., Amazon, eBay) enable businesses to reach global markets.
Digital Marketing: The internet allows businesses to advertise through social media, search engines, and email marketing campaigns.
Remote Work: Collaboration tools like Google Workspace, Microsoft Teams, and Zoom allow employees to work from anywhere.
Activity: Research how businesses in your area are using the internet for marketing, e-commerce, or customer engagement. Present your
findings to the class.
Week 10: Assessments and Practical Applications
This week focuses on reviewing the key concepts learned throughout the course and applying them through various assessments and
hands-on assignments.
Assignment 1: Use a word processor to create a professional document (resume, report, etc.).
Assignment 2: Create a spreadsheet with basic calculations and formulas (e.g., budgeting, analysis).
Project 1: Write a Python script that takes input from the user and calculates the area of a rectangle.
Project 2: Create a simple to-do list application using JavaScript that stores tasks in an array.
Final Project: Choose a computing-related problem (e.g., a personal finance tracker, to-do list app) and develop a solution using
programming or available software tools.
Activity:
Prepare for the final project by planning your solution, gathering any necessary resources, and determining the tools you will use (e.g.,
Python, Excel, Google Docs).
Wrap-Up
This week is crucial for consolidating your understanding of the course material through practical tasks.
The final project will help you apply your skills in solving real-world computing problems.
Conclusion:
This course offers a comprehensive foundation in computing concepts, hardware, software, programming, and practical applications. By
the end, students will have gained both theoretical knowledge and hands-on experience, preparing them for further studies or careers in
computing-related fields.
Practical Activities
Requirements:
Applications:
Create and format a Word document.
Final Project:Develop a small computing-related solution (e.g., a basic website, automated spreadsheet, or data entry system).