INTRODUCTION TO THE
COMPUTING PROFESSIONS
CC 100
A. THE COMPUTING INDUSTRY
The computing industry is influenced by technologies used
in the following fields:
Real Estate, Consumer Business,
Automotive, Financial, Manufacturing, Healthcare,
Education, Telecom, Media,
Energy, and Government.
B. CAREERS IN THE COMPUTING INDUSTRY
• Computing professionals perform a variety of tasks: They
write specifications for new computer systems, they design
instruction pipelines for superscalar processors, they diagnose
timing anomalies in embedded systems, they test and validate
software systems, they restructure the back-end databases of
inventory systems, they analyze packet traffic in local area
networks, and they recommend security policies for medical
information systems.
B. CAREERS IN THE COMPUTING INDUSTRY
• Computing professionals are obligated to perform
these tasks conscientiously because their decisions
affect the performance and functionality of
computer systems, which in turn affect the welfare
of the systems’ users directly and that of other
people less directly.
C. LIST OF PROFESSION AND CERTIFICATION
Careers in IT
With an ever expanding business needs, a wide
variety of career opportunities are available in
computing.
• Computer Engineers - they work with the hardware and
software aspects of systems design and development. They
often work as part of a team that designs new computing
devices or computer-related equipment. Computer hardware
engineers usually design, develop, test, and supervise the
manufacture of computer hardware—such as chips or device
controllers
• Network Specialist – they are responsible for the security and
administration of the networks they design and implement systems
that keep networks functioning smoothly.Their duties include
planning and installation of the hardware and software that comprise
the network, addition – deletion of files to the network server,
maintaining the peripherals connected to the network,
troubleshooting problems.
• Software Computer Programmers - they write, test, and maintain the
programs or software. They also conceive, design, and test logical
structures for solving problems by computer
Programmers are of two broad types:
1. Applications programmers - they usually focus on business,
engineering, or science. They write software to handle a specific job they
may also revise existing packaged software
2. Systems Programmers – the Computer Systems software such as
Operating System, Compilers are maintained and controlled by them
• Content Development - includes product descriptions, basic operations and field
applications, installation and configuration, alignment procedures, maintenance and
system performance information. Content developers write, edit, shape, and aggregate
information. They are responsible for producing high quality, comprehensive product
and system materials for documentation by interpreting technical data into written
content that can easily be used by technical personnel and end users with varying
degrees of knowledge.
• Database Administrators (DBA) - they are the keepers of database accuracy, efficiency,
maintenance and development. The DBA function requires Database Planning,
requirements gathering and conceptual design, logical design and transaction design,
physical design and implementation, testing and debugging.
• Database Specialist - they design, install, update, modify, maintain,
and repair computer databases. Duties may include:
*Providing technical support for existing databases
*Modifying existing databases
*Customizing commercial databases for specific needs
* Planning and designing databases for new clients
*Solving problems to meet the needs of clients
*Programming databases for a wide variety of applications
*Overseeing the installation of new databases
*Training staff in client companies about the use of new or
existing databases
• E-Commerce - deals with doing business over the Internet and World
Wide Web. These professionals are responsible for exploring and
developing the ever – growing sales channels and the expanding
customer base. The primary activities may be identifying E-commerce
fields, customers, marketing, providing online technical support and
finally administration, resulting into improvement of online Business to
Business (B2B) transactions, improving the product sales on Internet.
• IT and Education - To match the speed at which the IT industry is
growing, we need more trained professionals. They could be a faculty
at of the training institutes that impart training on various subjects or
working with universities.
• Interface Designer - Human-computer interaction is a
relatively upcoming field in computer science, which deals
with ergonomic and interface details in computing. Interface
designers design the user interface of a computer system,
the communication system between the user and the
computer, what you see on the computer screen while using
a program and, how a user is led through a program or
process.
• Quality Assurance (QA) - is the process of enforcing quality control
standards and working to improve the processes that are used in
producing the web site and its components, infrastructure and content.
When well implemented, a web site should see progressive
improvement in terms of both lessening rate of defects and general
increase in site usability and performance. Even the best designed and
developed sites will experience problems and failures, so a good
quality assurance team should set expectations -- for the entire web site
team and with management -- for what QA can effectively accomplish.
• Software Engineers - or software developers working
in applications development, they analyze users’ needs
and design, create, and modify general computer
applications software or specialized utility programs.
Those involved with the systems software may
research, design, and test operating system software,
compilers, network distribution software.
• Systems Analyst - also referred as a systems developer and systems
architect. They enable computer technology to meet individual needs of
an organization. This may include planning and developing new
computer systems or devising ways to apply existing systems’
resources to additional operations. They also may prepare cost-benefit
and return-on-investment analysis to help management decide whether
implementing the proposed system will be financially feasible. They
coordinate tests and monitor the system to ensure it performs as
planned. They prepare specifications, work diagrams, and structure
charts for computer programmers to follow and then work with them
to"debug," or eliminate errors from the system.
• Technical Writer They have a varied number of activities to
perform, which may be to design, write and edit manuals,
brochures and online help in the software industry.
• Web Design Multimedia and Web developers build, design / write
or edit on-line information, supporting websites including on-line
help.
• Interface Design and Usability Testing Engineers Usability
engineers and interface designers help software developers make
and test programmes that are user-friendlier.
• Proposal Writers These help engineers and scientists write
successful proposals.
• Web Designer They are responsible for creating,
maintaining and supporting Internet sites for
organizations. They are responsible for day-to-day site
design and creation. They should be comfortable
working closely with clients and developing web sites
according to the client's requirements.
D. LATEST TRENDS AND TECHNOLOGIES IN
COMPUTING
• Artificial Intelligence (AI)
- is a wide-ranging branch of computer
science concerned with building smart
machines capable of performing tasks that
typically require human intelligence.
- is the simulation of human intelligence processes by machines,
especially computer systems. These processes include learning (the
acquisition of information and rules for using the information), reasoning
(using rules to reach approximate or definite
conclusions) and self-correction.
- is the branch of computer sciences that emphasizes the development of
intelligence machines, thinking and working like humans.
Example
- speech recognition, problem-solving, learning and planning
• Internet of Things (IoT)
- describes the network of physical objects –“things”- that are
embedded with sensors, software, and other technologies for the
purpose of connecting and exchanging data with other devices and
systems over the internet. These devices range from ordinary household
objects to sophisticated industrial tools.
Examples
- security systems, thermostats, cars, electronic appliances, lights in
household and commercial environments, alarm clocks, speaker
systems, vending machines
• Security
- IT security is a set of cybersecurity strategies that prevents
unauthorized access to organizational assets such as computers,
networks, and data. It maintains the integrity and confidentiality of
sensitive information, blocking the access of sophisticated hackers
• Big Data
- is a combination of structured, semi structured and unstructured data
collected by organizations that can be mined for information and used
in machine learning projects, predictive modeling and other advanced
analytics applications.
• Mobile Application Development
- is the process of creating software applications that run on a
mobile device, and a typical mobile application utilizes a
network connection to work with remote computing
resources. Hence, the mobile development process involves
creating installable software bundles (code, binaries, assets,
etc.) , implementing backend services such as data access
with an API, and testing the application on target devices.
• Augmented reality (AR) adds digital elements to a live view
often by using the camera on a smartphone. Examples of
augmented reality experiences include Snapchat lenses and the
game Pokemon Go.
• Virtual reality (VR) implies a complete immersion experience
that shuts out the physical world. Using VR devices such as
HTC Vive, Oculus Rift or Google Cardboard, users can be
transported into a number of real-world and imagined
environments such as the middle of a squawking penguin colony
or even the back of a dragon
• Mixed Reality (MR) experience, which combines elements of both
AR and VR, real-worldand digital objects interact. Mixed reality
technology is just now starting to take off with Microsoft’s
HoloLens one of the most notable early mixed reality apparatuses.
• Extended Reality (XR) is an umbrella term that covers all of the
various technologies that enhance our senses, whether they’re
providing additional information about the actual world or creating
totally unreal, simulated worlds for us to experience. It includes
Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality
(MR) technologies.
• Robot Process Automation (RPA)
- Robotic Process Automation is the technology that allows anyone
today to configure computer software, or a “robot” to emulate and
integrate the actions of a human interacting within digital systems to
execute a business process.
- RPA robots utilize the user interface to capture data and manipulate
applications just like humans do. They interpret, trigger responses
and communicate with other systems in order to perform on a vast
variety of repetitive tasks.
• Blockchain is a system of recording information in a way
that makes it difficult or impossible to change, hack, or
cheat the system. It is essentially a digital ledger of
transactions that is duplicated and distributed across the
entire network of computer systems on the blockchain. Each
block in the chain contains a number of transactions, and
every time a new transaction occurs on the blockchain, a
record of that transaction is added to every participant’s
ledger.
Blockchain is a type of DLT in which transactions are
recorded with an immutable cryptographic signature called a
hash .This means if one block in one chain was changed, it
would be immediately apparent it had been tampered with. If
hackers wanted to corrupt a blockchain system,they would have
to change every block in the chain, across all of the distributed
versions of the chain.
Example:
Blockchain is the technology the underpins digital currency
(Bitcoin, Litecoin, Ethereum, and the like). It is used in
currency and payments. Bitcoin is the most prominent example
in this segment. The new key concepts are SmartContracts,
small computer programs that "live" in the blockchain.
• Autonomous Driving - an autonomous car is a vehicle
capable of sensing its environment and operating without
human involvement. A human passenger is not required to
take control of the vehicle at any time, nor is a human
passenger required to be present in the vehicle at all. An
autonomous car can go anywhere a traditional car goes and
do everything that an experienced human driver does
• Business Intelligence (BI)Business intelligence combines
business analytics, data mining, data visualization, data toolsand
infrastructure, and best practices to help organizations to make
more data-driven decisions
• Cloud Computing
- refers to running workloads remotely over the intern in a
commercial provider’s data center, also known as the “public cloud”
model. Popular public cloud offerings—such as Amazon Web
Services (AWS), Salesforce’s CRM system, and Microsoft Azure
• Service Desk Management/IT Service Desk Management
is the process of managing the IT service desk that forms
the point of contact between the IT service providers and
the IT service users. Most organizations use a centralized
approach of IT service desk management, where there’s a
central point of contact between service providers and
users and all incidents are managed centrally.
• Biometrics is the technical term for body measurements and
calculations. It refers to metrics related to human
characteristics. Biometrics authentication (or realistic
authentication) is used in computer science as a form of
identification and access control.
Examples
• fingerprint, palm veins, face recognition, DNA, palm
print, hand geometry, iris recognition, retina and
odour/scent.
Thank You
Presented by : Ma'am Fey
Credits: Modules CPL 2023