NRS 3115: NURSING INFORMATICS (LEC) LESSON 1: FUNDAMENTALS OF COMPUTERS AND TECHNOLOGIES SEP. 20 / Week No. 3 | [Prof. Eric Villa] Adapted from: Powerpoint ● OUTLINE OF THE TOPIC I. II. III. IV. V. VI. VII. INTRODUCTION TO BASIC COMPUTER CONCEPTS KNOWLEDGE A. COMPUTER B. SOFTWARE AND OPERATING SYSTEM C. DATA REPRESENTATION COMPUTER NETWORKS AND THE INTERNET ALGORITHMS AND PROGRAMMING COMPUTER SECURITY AND PRIVACY OPERATING SYSTEMS COMPUTER OPERATIONS INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) INTRODUCTION TO BASIC COMPUTER CONCEPTS AND KNOWLEDGE ● ● ● Computers are integral in our daily lives and are used across industries. play a crucial role in various fields, including healthcare, education, business, and entertainment. The goal is to provide a solid understanding of computer science fundamentals ● ● ● ● ● ● WHAT IS A COMPUTER? ● ● ● ● ● ● ● ● ● ● An electronic device that processes data according to a set of instructions called programs. Can execute a wide range of tasks, from performing complex calculations to running software applications and accessing the internet Are ubiquitous in our modern society Become an essential tool in various aspects of our lives. Have revolutionized the way we work, communicate, access information, and solve problems from personal use to professional applications. Can perform a wide range of tasks, from simple calculations to complex simulations, data analysis, artificial intelligence, and more. Have vastly evolved since their inception. They have become faster, smaller, more powerful, and more affordable. Today they are in different forms and sizes, such as: ○ Desktop computers ○ Laptops ○ Tablets ○ Smartphones They're even embedded systems in everyday objects like cars, appliances, and wearable devices. One of the defining characteristics is their ability to operate based on digital signals. use discrete units of information called bits, Unlike analog devices that represent information in continuous waves. ○ Bits are binary digits and can represent two states: 0 or 1. The digital nature of computers enables them to store, process, and transmit data efficiently. It can manipulate vast amounts of data in a fraction of a second, enabling tasks that would be impossible or time-consuming to undertake manually. Its significance in today’s world is unparalleled. They are used in: ○ Education ○ Healthcare ○ Finance ○ Entertainment ○ Transportation ○ Communication ○ Scientific research ○ Other countless fields Computers have made tasks more streamlined, improved productivity, and opened up new opportunities for innovation and advancement. COMPONENTS OF A COMPUTER ● ● ● A computer consists of several basic components, which include: ○ Central Processing Unit (CPU): The brain of the computer that performs calculations and executes instructions. ○ Memory (RAM): Temporary storage that holds data and instructions currently being used by the CPU. ○ Storage Devices: Devices like hard drives and solid-state drives that store data for long-term use. Devices like ○ Input Devices: keyboards and mice that allow users to provide instructions and input data. Devices: Devices like ○ Output monitors and printers that display or provide the results of computer processing. A computer is an electronic device that processes data according to a set of instructions called programs. ○ It is a powerful tool that can execute a wide range of tasks and has become an integral part of our modern society. Computers come in various forms and sizes, from desktop computers to laptops, tablets, ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 ● ● ● ● ● smartphones, and even embedded systems found in appliances and vehicles. ○ Regardless of their physical form, computers share common basic components that enable them to function. One of the core components of a computer is the Central Processing Unit (CPU), often referred to as the "brain" of the computer. ○ The CPU performs calculations, executes instructions, and coordinates the activities of other hardware components. ○ It is responsible for carrying out complex mathematical operations and logical decisions at high speeds. Memory, also known as Random Access Memory (RAM), is another crucial component of a computer. ○ RAM is the temporary storage that holds data and instructions currently being used by the CPU. ■ It allows the processor to access information quickly, which enhances the speed and overall performance of the system. ■ However, it is important to note that RAM is volatile memory, meaning its contents are lost when the computer is powered off or restarted Storage devices, such as hard disk drives (HDDs) and solid-state drives (SSDs), are responsible for long-term data storage. ○ They retain information even when the computer is powered down and provide a means to store and retrieve vast amounts of data, including: ■ Operating systems ■ Software applications ■ Documents ■ Multimedia files ■ More Input devices, such as keyboards, mice, touchscreens, and scanners, facilitate interaction between users and computers. ○ These allow users to: ■ Provide instructions ■ Enter data with various ■ Interact software applications. Output devices, including monitors, printers, speakers, and projectors, display or provide the results of computer processing to users. ○ They enable users to: ■ Visualize information ■ Print documents ■ Listen to audio with the ■ Interact computer's output in different ways SOFTWARE AND OPERATING SYSTEMS ● ● ● ● ● ● ● ● ● ● ● Software refers to the programs that enable a computer to perform specific tasks. ○ Examples include word processors, web browsers, and video games. An operating system (OS) is a fundamental software that manages computer hardware and software resources, allowing other programs to run. Software and operating systems – two critical elements that enable computers to perform specific tasks and manage system resources effectivel. Software refers to the programs and applications that run on a computer. It can be categorized into two main types: ○ System software ○ Application software System software- comprises the operating system (OS) and utilities that manage and control computer hardware resources. The operating system acts as an interface between the user and the computer, providing an environment for running applications and managing processes, memory, and storage. Examples of popular operating systems include Windows, macOS, Linux, iOS, and Android. Application software- refers to the programs designed for specific tasks or purposes, such as word processors, spreadsheets, web browsers, graphic design software, and video games. Application software allows users to perform a wide range of activities, such as document creation, data analysis, web browsing, entertainment, and much more. Examples of application software include Microsoft Office, Adobe Photoshop, Google Chrome, and Minecraft. Operating systems and software work hand in hand to enable users to interact with computers, execute tasks, and achieve their objectives. The operating system manages hardware resources, provides a platform for running applications, and ensures smooth and efficient operation of the computer system. Application software, on the other hand, utilizes the resources made available by the operating system to carry out specific user-defined tasks Furthermore, operating systems and software are continuously updated and improved to enhance functionality, security, and performance. Regular updates from software developers and OS providers address vulnerabilities, introduce new features, and improve the user experience. Understanding the role of software and operating systems is crucial in navigating the digital landscape, choosing the right tools for specific tasks, and ensuring the security and efficiency of computer systems ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 DATA REPRESENTATION ● ● ● ● ● ● ● ● ● ● Computers store and process data in binary form, using 0s and 1s Binary digits, or bits, can represent two states: OFF (0) or ON (1) Multiple bits combine to form bytes, which represent different types of data such as characters, numbers, or images Now, let's delve into the fascinating world of data representation, which lies at the core of how computers store, process, and manipulate information. Computers use a binary system, also known as base-2, for data representation. This means that all data within a computer is represented using only two symbols Os and 1s. These Os and 1s are known as binary digits or bits. At the most fundamental level, a bit can represent two states: OFF (represented by 0) or ON (represented by 1). Combining bits allows us to represent more complex data and information. The basic unit of information in computers is the byte. A byte is a group of 8 bits and can represent 256 different values (2^8). Bytes provide enough capacity to represent different types of data, such as characters, numbers, and images. For example, using the ASCII (American Standard Code for Information Interchange) encoding scheme, each character of the English alphabet, along with numbers and special symbols, is assigned a unique byte representation. This enables computers to process and display textual information To represent larger numbers or different types of data, multiple bytes can be combined. For instance, two bytes (16 bits) can represent a 16-bit integer, allowing for a larger range of values. Four bytes (32 bits) can represent a 32-bit integer or a floatingpoint number. Additionally, computers store and manipulate data in various data structures, such as arrays, lists, and databases, which enable efficient organization and retrieval of information. COMPUTER NETWORKS AND THE INTERNET ● ● ● ● ● COMPUTER NETWORKS AND THE INTERNET ● ● ● Computers can be connected in networks to share resources and communicate with each other. The Internet is a global network of interconnected networks that allows people worldwide to exchange information and access various services. Now, let's delve into the critical topic of computer networks and the internet - two interconnected concepts that have revolutionized the way we communicate, share information, and access resources. A computer network is a collection of interconnected computers and other devices that are linked together to facilitate communication, resource sharing and collaboration. Networks can be connected through various means, including wired connections such as Ethernet cables and Wireless connections like Wi-Fi Computer networks enable users to share resources such as printers, storage devices, and internet connections. They also allow for efficient communication through emails, instant messaging, and video conferencing, fostering collaboration and productivity. One of the greatest advancements in computer networking is the internet. The internet is a global network of interconnected networks that spans across the globe. It provides access to an immense amount of information, services, and resources. The internet has transformed the way we access and exchange information. It allows users to browse websites, search for information, communicate through email and social media,stream videos and music, and much more. It has become an integral part of our daily lives and has revolutionized various industries, including education, business, healthcare, and entertainment. The World Wide Web (WWW) is one of the most widely used services on the internet. It allows users to access and navigate websites using web browsers like Google Chrome, Mozilla Firefox, or Microsoft Edge The web consists of web pages, which are documents written in languages like HTML (Hypertext Markup Language) that can contain text, images, videos, and interactive elements. Computer networks and the internet have made it possible for us to connect with people worldwide, access information from any corner of the globe, and leverage a wide range of online services and resources. ALGORITHMS AND PROGRAMMING ● An algorithm is a step-by-step procedure for solving a problem or achieving a goal. ○ Set of instructions designed to solve a specific problem or achieve a particular goal. ○ Range from simple to complex, depending on the task at hand. ○ Form the backbone of computer programming and provide a ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 ● ● ● ● ● ● ● systematic approach to problem-solving. Programming involves writing instructions (code) using programming languages to solve problems and perform specific tasks. ○ Writing code that a computer can understand and execute. ○ Programming languages such as Python, Java, C++, and Javascript, enable humans to communicate with computers and create software applications. Let's dive into the exciting world of algorithms and programming - the building blocks that enable computers to perform tasks and solve problems. Software developers and programmers use algorithms to design and implement solutions to various problems. ○ Break down tasks into smaller, manageable steps, which are then translated into code that the computer can execute. Developing efficient algorithms and writing clean, well-structured code, programmers can create robust and functional software applications. Programming is both a creative and logical process that requires logical thinking, problem-solving skills, and attention to detail. ○ Allows us to automate tasks, analyze data, build websites and mobile apps, create video games, and more. technology advances, ○ As programming becomes an increasingly valuable skill, opening up a wide range of career opportunities. Understanding algorithms and programming concepts empowers individuals to become creators and innovators in the rapidly evolving digital landscape. It enables them to develop solutions to real-world problems, build software applications, and contribute to the advancement of technology. ● ● ● unauthorized access, damage, or disruption. In our increasingly connected world, where cyber threats are prevalent, computer security is of utmost importance. Practice of protecting computer systems and networks from unauthorized access, theft, destruction, and disruption. Encompasses a wide range of techniques, practices, and technologies to ensure confidentiality, integrity, and availability of information. Various aspects of computer security: 1. AUTHENTICATION AND ACCESS CONTROL ● This involves verifying the identity of users and granting them appropriate levels of access based on their roles and privileges. ● Secure passwords, biometric authentication, and two-factor authentication are commonly used methods. 2. FIREWALL AND NETWORK SECURITY ● Firewalls act as a barrier between a computer network's internal trusted network and external untrusted networks, monitoring and controlling incoming and outgoing network traffic. ● Network security measures also include the use of encryption, virtual private networks (VPNs), and intrusion detection systems. 3. ANTIVIRUS AND MALWARE PROTECTION ● Antivirus software detects, prevents, and removes harmful programs such as viruses, worms, Trojans, and ransomware. ● Regular updates and scans help maintain protection against the latest threats. 4. DATA BACKUP AND RECOVERY COMPUTER SECURITY AND PRIVACY ● ● ● Computer security ensures the protection of computer systems and data from unauthorized access or harm. Privacy refers to the protection of personal information stored on computers or transmitted over networks. These two areas ensure the protection of computer systems and personal information. COMPUTER SECURITY ● ● Regular backups ensure that critical data can be restored in case of accidental deletion, hardware failure, or cyber-attacks. ● Offsite backups and cloud storage provide additional security layers. Key aspects of computer security include: 1. THREATS AND ATTACKS ● Computer systems face numerous threats from malicious actors, including hackers, viruses, malware, and ransomware. ● Understanding these threats helps in designing effective security measures. Refers to the measures taken to protect computer systems and data from ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 2. VULNERABILITY MANAGEMENT ● Regularly assessing and patching software vulnerabilities is essential to prevent exploitation. ● Software updates, security patches, and vulnerability scanning contribute to maintaining system security. 3. SECURITY POLICIES AND PROCEDURES security policies and ● Establishing procedures helps define rules for user behavior, passwords, access control, and incident response. ● Creating a security-aware culture is vital in preventing security incidents. 4. SECURITY MONITORING AND INCIDENT RESPONSE ● Monitoring systems and networks for suspicious activities helps detect and respond to potential security incidents. response plans outline ● Incident step-by-step actions to mitigate and recover from security breaches. 4. 5. 6. PRIVACY ● ● ● Concerns protecting personal information and ensuring individuals have control over how their data is collected, used, and shared. In the digital age, where vast amounts of data are collected and analyzed, privacy has become a significant concern for individuals, organizations, and lawmakers. The collection and use of personal data are pervasive, which calls for privacy safeguards. Key aspects of privacy include: 1. 2. 3. DATA PROTECTION LAWS AND REGULATIONS ● Governments enact laws and regulations that define the rights of individuals and organizations regarding data privacy. laws may include ● These requirements for obtaining consent, providing clear privacy policies, and ensuring secure data storage SECURE COMMUNICATION ● Encryption ensures that sensitive information remains confidential during transmission. ● Secure protocols such as HTTPS (Hypertext Transfer Protocol Secure) encrypt data between a user's computer and a website. PRIVACY SETTINGS AND CONTROL ● Web services and applications often provide privacy settings and 7. 8. ● ● controls that allow users to manage how their personal information is shared and used. ETHICAL CONSIDERATIONS and individuals ● Organizations should consider the ethical implications of collecting, storing, and using personal data responsibly and transparently. PERSONALLY IDENTIFIABLE INFORMATION (PII) ● PII refers to any information that can identify an individual, such as name, address, Social Security number, or email address. PII is crucial in ● Protecting preventing identity theft and unauthorized use of personal information. DATA COLLECTION AND CONSENT ● Organizations should obtain explicit consent from individuals before collecting and using their personal data. privacy policies and ● Clear transparent data practices help build trust. DATA ENCRYPTION AND ANONYMIZATION ● Encrypting sensitive data and anonymizing personally identifiable data are crucial to protect individuals’ privacy. the data ● Encryption ensures remains confidential even if it is intercepted, while anonymization removed identifiable elements to preserve privacy. PRIVACY BY DESIGN ● Privacy by design is an approach that incorporates privacy considerations into the design and development of systems, ensuring privacy measures are integrated from the outset. Understanding and implementing computer security and privacy measures are essential for individuals and organizations to protect sensitive data, prevent security incidents, and comply with privacy regulations. By educating ourselves and adopting best practices, we can create a safer and more privacy-respecting digital environment COMPUTER NETWORKS ● ● Interconnected systems that allow communication and resource sharing between computers and devices. Examples: Network protocols, network architectures, network security, and the ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 technologies used to connect and transmit data between devices. NETWORKS ICT is a broad term encompassing the technologies, hardware, software, and networks used to manage and transmit information. ● It includes areas such as computer systems, telecommunications, digital media, software development, and data management. ▪ ICT has transformed the way we communicate, access information, and carry out business and personal tasks. ● OPERATING SYSTEMS (OS) ● ● ● ● ● ● In the context of computer science, networks refer to the interconnection of devices for the purpose of sharing resources, data, and communication. Networks can be classified based on their scale: 1. LOCAL AREA NETWORKS (LANS) a network contained within a small geographic area, usually within the same building. 2. WIDE AREA NETWORKS (WANS) a large computer network that connects groups of computers over large distances. WANs are often used by large businesses to connect their office networks; each office typically has its own local area network, or LAN, and these LANs connect via a WAN. 3. INTERNET - defined as a global network of linked computers, servers, phones, and smart appliances that communicate with each other using the transmission control protocol (TCP) standard to enable the fast exchange of information and files, along with other types of services. They rely on network protocols and technologies, including Ethernet, TCP/IP, WIFI, and cellular networks. Network security is a crucial aspect, involving measures to protect data and prevent unauthorized access. INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ● ● ● An operating system is software that manages computer hardware and software resources and provides a platform for running applications. It controls the functions of the computer, manages memory and storage, handles input and output operations, and provides a user interface. They are softwares that provide a platform for running applications and managing hardware and software resources. They facilitate interaction between users and computer hardware, handle tasks such as process scheduling, memory management, and file management, and provide a user-friendly interface. Examples: ○ Windows ○ MacOS ○ Linux ○ iOS ○ Android COMPUTER OPERATIONS FILE MANAGEMENT ● ● ● File management involves organizing, storing, and accessing files on a computer system. It includes creating, renaming, moving, copying, and deleting files and directories. It involves organizing and controlling computer files, directories, and storage systems. It includes creating, storing, retrieving, and managing files and directories, as well as performing operations like copying, moving, renaming, and deleting files. File Management Systems ● Provide a structured approach to handling data and facilitate efficient storage and retrieval. Ensure efficient storage and retrieval of data, enabling users to organize and access their files effectively. It includes creating, renaming, moving, copying, and deleting files and directories. Refers to the integration of telecommunications, computers, and ● networks to store, retrieve, transmit, and manipulate information. ● It ecompasses various technologies and tools used to handle digital information, including hardware, software, networks, and digital communications. ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2 ● UTILITY SOFTWARE PROGRAMS ● ● ● Computers utilize utility software programs to perform specific tasks that enhance system performance, security, and maintenance. These utilities can include: ○ antivirus software ○ disk cleanup ○ defragmentation tools ○ backup software ○ system optimizers ○ diagnostic tools, etc. Utilities help users manage their computer systems, maintain performance, improve security, and troubleshoot issues. ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING, HINOJALES | BSN 3-2