components of a computer LESSON 1 COMPUTER ▪ electronic device, operating under the control of instructions stored in its own memory generation of computers ❖ A computer contains many electric, electronic, and mechanical components known as hardware Allows you to input data into a computer ex: Keyboard, Mouse, Microphone Hardware component that conveys information from one person tp another and displays the results of that processing. ex: Monitor, Projector, Speakers first generation (1951 – 1959) UNIVAC I FORTRAN (programming language) manufactured the first Integrated Circuit (IC) second generation (1959 – 1965) IBM System/360 COBOL (programming language) PDP-I (1st minicomputer) BASIC (programming language) third generation (1965 – 1971) Internet started (1969) Intel 4004 microprocessor chip PASCAL (programming language) fourth generation (1971 – present) Altair 8800 (1st microcomputer) Microsoft Apple Computer IBM PC Macintosh Computer fifth generation (present – beyond) Cloud Computing: storing and accessing data and programs over the Internet instead of your computer's hard drive. Virtual Reality Robotics devices based on Artificial Intelligence The goal of fifth-generation computing is to develop devices that: a) respond to natural language input b) capable of learning and selforganization. Case that contains electronic components of the computer that are used to process data. Records (writes) or Retrieves (reads) items to and from storage media. Enables a computer to send and receive data to and from one or more computer or mobile devices. CATEGORIES OF COMPUTERS •Can perform all input, processing, output, and storage activities on itself. (Desktop PC) •e.g. Notebook computers, Tablet PCs, SmartPhones and •PDAs, e-book reader, portable media, digital players •a mobile computing device designed for single‐player or multiplayer video games •controls access to the hardware, software, and other resources on a network •a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously •capable of processing more than one quadrillion instructions in a single second •a special‐purpose computer that functions as a component in a larger product © Catherine Aperocho | 12 ABM 9 ict Information and Communications Technology UNESCO: scientific, technological and engineering disciplines and the management techniques used to handle transmit information with men and machines. information technology Role: Unified Communications communication technologies mobile phones, intelligent landlines, Internet locate, save, send, and edit information digital communication blogging, email, data presentations, etc. roles of ict 1. 2. 3. 4. Education Business Industry Transportation Military Forces Communication Economic Structure Scientific Exploration Banking trends in ict convergent technologies ➢ o It is coming together of two or more distinct entities or phenomena Google+ & Facebook BOOKMARKING SITES store and manage links to various websites and resources. SOCIAL NEWS post their own news items or links to other news sources Reddit and Digg MEDIA SHARING upload and share media content images, music, and video. Flickr, YouTube, and Instagram MICROBLOGGING focus on short updates from the users Twitter and Plurk BLOGS AND FORUMS personal posts Blogger, WordPress and Tumblr ➢ able to move from one place to another ➢ Platform enables multiple transmission of data in one channel ➢ provide aid or assistance ➢ help people who have impairments. user-generated content (ugc) appears as supplements to online platforms ex: social media, websites, blog posts, Wikis, videos, e-commerce different operating systems of mobile devices: ➢ combination of two or more technologies in a single device ex: surfing the web on television; taking pictures using a cellphone social, mobile, and assistive media A. iOS – used in Apple devices such as the iPhone and iPad. B. Android – an open source operating system developed by Google. C. Blackberry OS – used in Blackberry devices. ➢ activities with others ➢ variety of internet applications that allows users to create content and interact with each other types of social media D. Windows Phone OS – a closed source and proprietary operating system develop by Microsoft. E. Symbian – The original smartphone OS; used by Nokia devices. F. WebOS – originally used by smartphones; now used by smart TVs. SOCIAL NETWORK © Catherine Aperocho | 12 ABM 9 G. Windows Mobile – developed by Microsoft for smartphones and pocket PCs. internet & the web internet LESSON 2 technopreneur ▪ ▪ ➢ Global communication system world wide web / web ➢ is a network of online content ➢ INTERLINKED HTML evolution of the web web 1.0 ▪ ▪ ▪ ▪ ▪ readable phase flat data information portal limited interaction between sites and web user can not post review, feedback, and comment. web 2.0 • • • • writable phase interactive data interaction between sites and web users encourages participation, collaboration and information sharing web 3.0 ✓ executable phase ✓ with dynamic applications, interactive services, and “machine-to-machine” interaction. ✓ computers can interpret information ✓ intelligently generate and distribute useful data. basic file naming 1. 2. 3. 4. 5. 6. 7. Be descriptive Never use the word final in a file name Be consistent Use lowercase only Don’t use special characters Use dates in your file names Use version numbers in files you create ▪ ▪ ▪ ▪ ▪ ▪ An entrepreneur A new age entrepreneur who makes use of technology to come out with something new to make some innovation Technology savvy Creative Innovative Dynamic Dares to be different Passionate personal entrepreneurial competencies and skills (pecs) ➢ Key characteristics of successful entrepreneurs 1. Initiative 2. Sees and acts on opportunities 3. Persistence 4. Information Seeking 5. Concern for High Quality of Work 6. Commitment to Work Contract 7. Efficiency Orientation 8. Systematic Planning 9. Problem-Solving 10. Self-Confidence 11. Assertiveness 12. Persuasion 13. Use of Influence Strategies 14. Willingness to take Risks LESSON 3 online safety & security THE INTERNET ⇛ a powerful tool BENEFITS OF THE INTERNET ✓ ✓ ✓ ✓ promote business gain new friends stay in touch with friends from the past source of entertainment DANGERS / RISKS the flip side of the coin – “another side of the coin” © Catherine Aperocho | 12 ABM 9 attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program. spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments. damaging data or software and causing denial-of-service (DoS) conditions. worm COMMON SAFETY CONCERNS ON THE INTERNET MALICIOUS USERS SPAM: unwanted email mostly from bots or advertisements. PHISHING: practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information PHARMING: a more complicated way of phishing where it exploits the DNS (Domain Name Service) systems. cyberbullying cyberstalking WEBSITES AND SOFTWARE malware computer viruses VARIOUS TYPES OF OBSCENE OR OFFENSIVE CONTENT CRIMES fraud identity theft MALWARE malicious code short for malicious software code or software that is specifically designed to damage, disrupt, steal in general inflict illegitimate action on data, hosts, or networks. TYPES OF MALWARE virus propagates by inserting a copy of itself into and becoming part of another program. spreads from one computer to another, leaving infections as it travels. replicate functional copies of themselves and can cause the same type of damage. standalone software and do not require a host program or human help to propagate. enters a computer through a vulnerability in the system and takes advantage of filetransport or information-transport features on the system, allowing it to travel unaided. trojan Attaches itself to a program and interpret as useful software. It permits an intruder to obtain some confidential information about a computer network. typically tricked into loading and executing it on their systems, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). DO NOT REPRODUCE BY INFECTING OTHER FILES nor do they self-replicate. must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. bot derived from the word “robot” often automate tasks and provide information or services that would otherwise be conducted by a human being A typical use of bots is to: a) gather information (such as web crawlers) b) interact automatically with instant messaging (IM) c) Internet Relay Chat (IRC) or other web interfaces. © Catherine Aperocho | 12 ABM 9 online safety ➢ the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet ➢ the self-protection from computer crime in general. internet safety a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. OBJECTIVE: establish rules and measures to use against attacks over the Internet. 5 tips to be safe 1. Be Aware 2. Check for Website Safety website uses a Web address that starts with "https" and has a padlock symbol either in the address bar or at the bottom of the browser. site encrypts your information, making the data nearly useless to any thieves or hackers who may intercept the transmission. 3. Choose strong and varied passwords 4. Avoid spyware SPYWARE: any piece of software the top commandments of computer ethics 1. Thou shalt not use computer to harm other people 2. Thou shalt not interfere with other people’s computer work 3. Thou shalt not snoop around in other people’s files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not use or copy software for which you have not paid 7. Thou shalt not use other people’s computer resources without authorization 8. Thou shalt not appropriate other people’s intellectual output 9. Thou shalt think about the social consequences of the program you write 10. Thou shalt use a computer in ways that show consideration and respect Philippine copyright law intellectual property o creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images (used in commerce). that records your actions or information without your knowledge MUST HAVE ANTI-VIRUS AND ANTI-SPYWARE 5. It’s not all about spyware and scams ✓ Locking your screen or device ✓ Securing your password ✓ Signing-in and -out ✓ Using secured networks ✓ Limiting the personal information that you share online COMPUTER ETHICS through ethics you become a more ethical person, who knows how to do the right thing (Bowyer, 2001) we should think of computer ethical issues as new species of moral issues (Johnson, 2001) types of intellectual property I. patent an exclusive right granted for an invention technical information about the invention must be disclosed to the public in a patent application. DURATION: 20 YEARS II. trademark a word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others SERVICE MARK: a word, phrase, symbol, and/or design that identifies and distinguishes the source of a service rather than goods. DURATION: As long as it is used. III. copyright legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or © Catherine Aperocho | 12 ABM 9 distribution of a literary, musical, dramatic, or artistic work. protects “original works of authorship” that are fixed in “a tangible form of expression.” FAIR USE: an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching and education. DURATION: 50 years plus age of the author (after death) CYBERCRIME a crime committed or assisted through the use of the internet. CYBERBULLYING: bullying that takes place using electronic technology. hehe goodluck <3 <3 © Catherine Aperocho | 12 ABM 9