Uploaded by mark.bordamonte

NI-LEC Fundamentals-of-Computers-and-Technologies

advertisement
NRS 3115: NURSING INFORMATICS (LEC)
LESSON 1: FUNDAMENTALS OF COMPUTERS AND TECHNOLOGIES
SEP. 20 / Week No. 3 | [Prof. Eric Villa]
Adapted from: Powerpoint
●
OUTLINE OF THE TOPIC
I.
II.
III.
IV.
V.
VI.
VII.
INTRODUCTION
TO
BASIC
COMPUTER
CONCEPTS KNOWLEDGE
A. COMPUTER
B. SOFTWARE AND OPERATING SYSTEM
C. DATA REPRESENTATION
COMPUTER NETWORKS AND THE INTERNET
ALGORITHMS AND PROGRAMMING
COMPUTER SECURITY AND PRIVACY
OPERATING SYSTEMS
COMPUTER OPERATIONS
INFORMATION
AND
COMMUNICATION
TECHNOLOGY (ICT)
INTRODUCTION TO BASIC COMPUTER
CONCEPTS AND KNOWLEDGE
●
●
●
Computers are integral in our daily lives and
are used across industries.
play a crucial role in various fields, including
healthcare,
education,
business,
and
entertainment.
The goal is to provide a solid understanding
of computer science fundamentals
●
●
●
●
●
●
WHAT IS A COMPUTER?
●
●
●
●
●
●
●
●
●
●
An electronic device that processes data
according to a set of instructions called
programs.
Can execute a wide range of tasks, from
performing
complex
calculations
to
running
software
applications
and
accessing the internet
Are ubiquitous in our modern society
Become an essential tool in various aspects
of our lives.
Have revolutionized the way we work,
communicate, access information, and
solve problems from personal use to
professional applications.
Can perform a wide range of tasks, from
simple calculations to complex simulations,
data analysis, artificial intelligence, and
more.
Have vastly evolved since their inception.
They have become faster, smaller, more
powerful, and more affordable.
Today they are in different forms and sizes,
such as:
○ Desktop computers
○ Laptops
○ Tablets
○ Smartphones
They're even embedded systems in
everyday objects like cars, appliances, and
wearable devices.
One of the defining characteristics is their
ability to operate based on digital signals.
use discrete units of information called bits,
Unlike analog devices that represent
information in continuous waves.
○ Bits are binary digits and can
represent two states: 0 or 1.
The digital nature of computers enables
them to store, process, and transmit data
efficiently.
It can manipulate vast amounts of data in a
fraction of a second, enabling tasks that
would be impossible or time-consuming to
undertake manually.
Its significance in today’s world is
unparalleled.
They are used in:
○ Education
○ Healthcare
○ Finance
○ Entertainment
○ Transportation
○ Communication
○ Scientific research
○ Other countless fields
Computers
have
made tasks more
streamlined, improved productivity, and
opened
up
new
opportunities
for
innovation and advancement.
COMPONENTS OF A COMPUTER
●
●
●
A computer consists of several basic
components, which include:
○ Central Processing Unit (CPU): The
brain
of the computer that
performs calculations and executes
instructions.
○ Memory (RAM): Temporary storage
that holds data and instructions
currently being used by the CPU.
○ Storage Devices: Devices like hard
drives and solid-state drives that
store data for long-term use.
Devices like
○ Input Devices:
keyboards and mice that allow
users to provide instructions and
input data.
Devices:
Devices like
○ Output
monitors and printers that display
or provide the results of computer
processing.
A computer is an electronic device that
processes data according to a set of
instructions called programs.
○ It is a powerful tool that can
execute a wide range of tasks and
has become an integral part of our
modern society.
Computers come in various forms and sizes,
from desktop computers to laptops, tablets,
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
●
●
●
●
●
smartphones, and even embedded systems
found in appliances and vehicles.
○ Regardless of their physical form,
computers share common basic
components that enable them to
function.
One of the core components of a computer
is the Central Processing Unit (CPU), often
referred to as the "brain" of the computer.
○ The CPU performs calculations,
executes
instructions,
and
coordinates the activities of other
hardware components.
○ It is responsible for carrying out
complex mathematical operations
and logical decisions at high
speeds.
Memory, also known as Random Access
Memory
(RAM),
is
another
crucial
component of a computer.
○ RAM is the temporary storage that
holds
data
and
instructions
currently being used by the CPU.
■ It allows the processor to
access information quickly,
which enhances the speed
and overall performance of
the system.
■ However, it is important to
note that RAM is volatile
memory,
meaning
its
contents are lost when the
computer is powered off or
restarted
Storage devices, such as hard disk drives
(HDDs) and solid-state drives (SSDs), are
responsible for long-term data storage.
○ They retain information even when
the computer is powered down
and provide a means to store and
retrieve vast amounts of data,
including:
■ Operating systems
■ Software applications
■ Documents
■ Multimedia files
■ More
Input devices, such as keyboards, mice,
touchscreens, and scanners, facilitate
interaction between users and computers.
○ These allow users to:
■ Provide instructions
■ Enter data
with
various
■ Interact
software applications.
Output
devices,
including
monitors,
printers, speakers, and projectors, display or
provide the results of computer processing
to users.
○ They enable users to:
■ Visualize information
■ Print documents
■ Listen to audio
with
the
■ Interact
computer's
output
in
different ways
SOFTWARE AND OPERATING SYSTEMS
●
●
●
●
●
●
●
●
●
●
●
Software refers to the programs that
enable a computer to perform specific
tasks.
○ Examples include word processors,
web browsers, and video games.
An operating system (OS) is a fundamental
software that manages computer hardware
and software resources, allowing other
programs to run.
Software and operating systems – two
critical elements that enable computers to
perform specific tasks and manage system
resources effectivel.
Software refers to the programs and
applications that run on a computer. It can
be categorized into two main types:
○ System software
○ Application software
System software- comprises the operating
system (OS) and utilities that manage and
control computer hardware resources. The
operating system acts as an interface
between the user and the computer,
providing an environment for running
applications and managing processes,
memory, and storage. Examples of popular
operating
systems
include Windows,
macOS, Linux, iOS, and Android.
Application software- refers to the
programs designed for specific tasks or
purposes, such as word processors,
spreadsheets,
web browsers, graphic
design
software, and video games.
Application software allows users to
perform a wide range of activities, such as
document creation, data analysis, web
browsing, entertainment, and much more.
Examples of application software include
Microsoft Office, Adobe Photoshop, Google
Chrome, and Minecraft.
Operating systems and software work
hand in hand to enable users to interact
with computers, execute tasks, and achieve
their objectives.
The operating system manages hardware
resources, provides a platform for running
applications, and ensures smooth and
efficient operation of the computer system.
Application software, on the other hand,
utilizes the resources made available by the
operating system to carry out specific
user-defined tasks
Furthermore,
operating
systems and
software are continuously updated and
improved to enhance functionality, security,
and performance. Regular updates from
software developers and OS providers
address vulnerabilities, introduce new
features, and improve the user experience.
Understanding the role of software and
operating systems is crucial in navigating
the digital landscape, choosing the right
tools for specific tasks, and ensuring the
security and efficiency of computer systems
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
DATA REPRESENTATION
●
●
●
●
●
●
●
●
●
●
Computers store and process data in binary
form, using 0s and 1s
Binary digits, or bits, can represent two
states: OFF (0) or ON (1)
Multiple bits combine to form bytes,
which represent different types of data
such as characters, numbers, or images
Now, let's delve into the fascinating world
of data representation, which lies at the
core of how computers store, process, and
manipulate information.
Computers use a binary system, also
known as base-2, for data representation.
This means that all data within a computer
is represented using only two symbols Os and 1s. These Os and 1s are known as
binary digits or bits.
At the most fundamental level, a bit can
represent two states: OFF (represented by
0) or ON (represented by 1). Combining bits
allows us to represent more complex data
and information.
The basic unit of information in
computers is the byte. A byte is a group of
8 bits and can represent 256 different
values (2^8). Bytes provide enough
capacity to represent different types of
data, such as characters, numbers, and
images.
For example, using the ASCII (American
Standard
Code
for
Information
Interchange) encoding scheme, each
character of the English alphabet, along
with numbers and special symbols, is
assigned a unique byte representation.
This enables computers to process and
display textual information
To represent larger numbers or different
types of data, multiple bytes can be
combined. For instance, two bytes (16 bits)
can represent a 16-bit integer, allowing for a
larger range of values. Four bytes (32 bits)
can represent a 32-bit integer or a floatingpoint number.
Additionally,
computers
store
and
manipulate
data
in
various
data
structures, such as arrays, lists, and
databases,
which
enable
efficient
organization and retrieval of information.
COMPUTER NETWORKS AND THE
INTERNET
●
●
●
●
●
COMPUTER NETWORKS AND THE
INTERNET
●
●
●
Computers can be connected in networks
to share resources and communicate with
each other.
The Internet is a global network of
interconnected networks that allows
people
worldwide
to
exchange
information and access various services.
Now, let's delve into the critical topic of
computer networks and the internet - two
interconnected
concepts
that
have
revolutionized the way we communicate,
share information, and access resources.
A computer network is a collection of
interconnected computers and other
devices that are linked together to facilitate
communication, resource sharing and
collaboration.
Networks can be connected through
various means, including wired connections
such as Ethernet cables and Wireless
connections like Wi-Fi
Computer networks enable users to
share resources such as printers,
storage
devices, and internet
connections. They also allow for
efficient communication through
emails, instant messaging, and
video
conferencing,
fostering
collaboration and productivity.
One of the greatest advancements in
computer networking is the internet. The
internet
is
a
global
network
of
interconnected networks that spans across
the globe. It provides access to an immense
amount of information, services, and
resources.
The internet has transformed the
way we access and exchange
information. It allows users to
browse
websites,
search
for
information, communicate through
email and social media,stream
videos and music, and much more.
It has become an integral part of
our
daily
lives
and
has
revolutionized various industries,
including
education,
business,
healthcare, and entertainment.
The World Wide Web (WWW) is one of the
most widely used services on the internet.
It allows users to access and navigate
websites using web browsers like Google
Chrome, Mozilla Firefox, or Microsoft Edge
The web consists of web pages, which are
documents written in languages like HTML
(Hypertext Markup Language) that can
contain text, images, videos, and interactive
elements.
Computer networks and the internet have
made it possible for us to connect with
people worldwide, access information from
any corner of the globe, and leverage a
wide range of online services and resources.
ALGORITHMS AND PROGRAMMING
●
An algorithm is a step-by-step procedure
for solving a problem or achieving a goal.
○ Set of instructions designed to
solve a specific problem or achieve
a particular goal.
○ Range from simple to complex,
depending on the task at hand.
○ Form the backbone of computer
programming
and
provide
a
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
●
●
●
●
●
●
●
systematic
approach
to
problem-solving.
Programming involves writing instructions
(code) using programming languages to
solve problems and perform specific tasks.
○ Writing code that a computer can
understand and execute.
○ Programming languages such as
Python, Java, C++, and Javascript,
enable humans to communicate
with
computers
and
create
software applications.
Let's dive into the exciting world of
algorithms and programming - the building
blocks that enable computers to perform
tasks and solve problems.
Software developers and programmers use
algorithms to design and implement
solutions to various problems.
○ Break down tasks into smaller,
manageable steps, which are then
translated into code that the
computer can execute.
Developing efficient algorithms and writing
clean, well-structured code, programmers
can create robust and functional software
applications.
Programming is both a creative and logical
process that requires logical thinking,
problem-solving skills, and attention to
detail.
○ Allows us to automate tasks,
analyze data, build websites and
mobile apps, create video games,
and more.
technology
advances,
○ As
programming
becomes
an
increasingly valuable skill, opening
up a wide range of career
opportunities.
Understanding
algorithms
and
programming
concepts
empowers
individuals to become creators and
innovators in the rapidly evolving digital
landscape.
It enables them to develop solutions to
real-world
problems,
build
software
applications,
and contribute to the
advancement of technology.
●
●
●
unauthorized
access,
damage,
or
disruption.
In our increasingly connected world, where
cyber threats are prevalent, computer
security is of utmost importance.
Practice of protecting computer systems
and networks from unauthorized access,
theft, destruction, and disruption.
Encompasses a wide range of techniques,
practices, and technologies to ensure
confidentiality, integrity, and availability of
information.
Various aspects of computer security:
1. AUTHENTICATION AND ACCESS CONTROL
●
This involves verifying the identity of users
and granting them appropriate levels of
access based on their roles and privileges.
●
Secure
passwords,
biometric
authentication,
and
two-factor
authentication
are
commonly
used
methods.
2. FIREWALL AND NETWORK SECURITY
●
Firewalls act as a barrier between a
computer
network's
internal
trusted
network and external untrusted networks,
monitoring and controlling incoming and
outgoing network traffic.
●
Network security measures also include the
use of encryption, virtual private networks
(VPNs), and intrusion detection systems.
3. ANTIVIRUS AND MALWARE PROTECTION
●
Antivirus software detects, prevents, and
removes harmful programs such as viruses,
worms, Trojans, and ransomware.
●
Regular updates and scans help maintain
protection against the
latest threats.
4. DATA BACKUP AND RECOVERY
COMPUTER SECURITY AND PRIVACY
●
●
●
Computer security ensures the protection
of computer systems and data from
unauthorized access or harm.
Privacy refers to the protection of personal
information stored on computers or
transmitted over networks.
These two areas ensure the protection of
computer
systems
and
personal
information.
COMPUTER SECURITY
●
●
Regular backups ensure that critical data
can be restored in case of accidental
deletion, hardware failure, or cyber-attacks.
●
Offsite backups and cloud storage provide
additional security layers.
Key aspects of computer security include:
1. THREATS AND ATTACKS
● Computer systems face numerous threats
from malicious actors, including hackers,
viruses, malware, and ransomware.
● Understanding these threats helps in
designing effective security measures.
Refers to the measures taken to protect
computer
systems
and
data from
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
2. VULNERABILITY MANAGEMENT
● Regularly assessing and patching software
vulnerabilities is essential to prevent
exploitation.
● Software updates, security patches, and
vulnerability
scanning
contribute
to
maintaining system security.
3. SECURITY POLICIES AND PROCEDURES
security
policies
and
● Establishing
procedures helps define rules for user
behavior, passwords, access control, and
incident response.
● Creating a security-aware culture is vital in
preventing security incidents.
4. SECURITY MONITORING AND INCIDENT
RESPONSE
● Monitoring systems and networks for
suspicious activities helps detect and
respond to potential security incidents.
response
plans
outline
● Incident
step-by-step actions to mitigate and
recover from security breaches.
4.
5.
6.
PRIVACY
●
●
●
Concerns protecting personal information
and ensuring individuals have control over
how their data is collected, used, and
shared.
In the digital age, where vast amounts of
data are collected and analyzed, privacy has
become
a
significant
concern
for
individuals, organizations, and lawmakers.
The collection and use of personal data are
pervasive,
which
calls
for
privacy
safeguards.
Key aspects of privacy include:
1.
2.
3.
DATA
PROTECTION
LAWS
AND
REGULATIONS
● Governments enact laws and
regulations that define the rights of
individuals
and
organizations
regarding data privacy.
laws
may
include
● These
requirements
for
obtaining
consent, providing clear privacy
policies, and ensuring secure data
storage
SECURE COMMUNICATION
● Encryption ensures that sensitive
information remains confidential
during transmission.
● Secure protocols such as HTTPS
(Hypertext
Transfer
Protocol
Secure) encrypt data between a
user's computer and a website.
PRIVACY SETTINGS AND CONTROL
● Web services and applications often
provide
privacy
settings
and
7.
8.
●
●
controls that allow users to manage
how their personal information is
shared and used.
ETHICAL CONSIDERATIONS
and
individuals
● Organizations
should
consider
the
ethical
implications of collecting, storing,
and
using
personal
data
responsibly and transparently.
PERSONALLY
IDENTIFIABLE
INFORMATION (PII)
● PII refers to any information that
can identify an individual, such as
name, address, Social Security
number, or email address.
PII
is
crucial
in
● Protecting
preventing
identity theft and
unauthorized use of personal
information.
DATA COLLECTION AND CONSENT
● Organizations should obtain explicit
consent from individuals before
collecting and using their personal
data.
privacy
policies
and
● Clear
transparent data practices help
build trust.
DATA ENCRYPTION AND ANONYMIZATION
● Encrypting sensitive data and
anonymizing personally identifiable
data
are
crucial
to
protect
individuals’ privacy.
the data
● Encryption ensures
remains confidential even if it is
intercepted, while anonymization
removed identifiable elements to
preserve privacy.
PRIVACY BY DESIGN
● Privacy by design is an approach
that
incorporates
privacy
considerations into the design and
development of systems, ensuring
privacy measures are integrated
from the outset.
Understanding and implementing computer
security and privacy measures are essential for
individuals and organizations to protect
sensitive data, prevent security incidents, and
comply with privacy regulations.
By educating ourselves and adopting best
practices, we can create a safer and more
privacy-respecting digital environment
COMPUTER NETWORKS
●
●
Interconnected
systems
that
allow
communication and resource sharing
between computers and devices.
Examples: Network protocols, network
architectures, network security, and the
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
technologies used to connect and transmit
data between devices.
NETWORKS
ICT is a broad term encompassing the
technologies, hardware, software, and
networks used to manage and transmit
information.
● It includes areas such as computer systems,
telecommunications,
digital
media,
software
development,
and
data
management.
▪ ICT has transformed the way we communicate,
access information, and carry out business and
personal tasks.
●
OPERATING SYSTEMS (OS)
●
●
●
●
●
●
In the context of computer science,
networks refer to the interconnection of
devices for the purpose of sharing
resources, data, and communication.
Networks can be classified based on their
scale:
1. LOCAL AREA NETWORKS (LANS) a network contained within a small
geographic area, usually within the
same building.
2. WIDE AREA NETWORKS (WANS) a large computer network that
connects groups of computers
over large distances. WANs are
often used by large businesses to
connect their office networks; each
office typically has its own local
area network, or LAN, and these
LANs connect via a WAN.
3. INTERNET - defined as a global
network of linked computers,
servers,
phones,
and
smart
appliances that communicate with
each other using the transmission
control protocol (TCP) standard to
enable the fast exchange of
information and files, along with
other types of services.
They rely on network protocols and
technologies, including Ethernet, TCP/IP,
WIFI, and cellular networks.
Network security is a crucial aspect,
involving measures to protect data and
prevent unauthorized access.
INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)
●
●
●
An operating system is software that
manages computer hardware and software
resources and provides a platform for
running applications.
It controls the functions of the computer,
manages memory and storage, handles
input and output operations, and provides a
user interface.
They are softwares that provide a platform
for running applications and managing
hardware and software resources.
They facilitate interaction between users
and computer hardware, handle tasks such
as
process
scheduling,
memory
management, and file management, and
provide a user-friendly interface.
Examples:
○ Windows
○ MacOS
○ Linux
○ iOS
○ Android
COMPUTER OPERATIONS
FILE MANAGEMENT
●
●
●
File management involves organizing,
storing, and accessing files on a computer
system.
It includes creating, renaming, moving,
copying, and deleting files and directories.
It involves organizing and controlling
computer files, directories, and storage
systems. It includes creating, storing,
retrieving,
and
managing files and
directories,
as
well
as
performing
operations like copying, moving, renaming,
and deleting files.
File Management Systems
●
Provide a structured approach to handling
data and facilitate efficient storage and
retrieval.
Ensure efficient storage and retrieval of
data, enabling users to organize and access
their files effectively. It includes creating,
renaming, moving, copying, and deleting
files and directories.
Refers
to
the
integration
of
telecommunications,
computers,
and
●
networks to store, retrieve, transmit, and
manipulate information.
● It ecompasses various technologies and
tools used to handle digital information,
including hardware, software, networks,
and digital communications.
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
●
UTILITY SOFTWARE PROGRAMS
●
●
●
Computers utilize utility software programs
to perform specific tasks that enhance
system
performance,
security,
and
maintenance.
These utilities can include:
○ antivirus software
○ disk cleanup
○ defragmentation tools
○ backup software
○ system optimizers
○ diagnostic tools, etc.
Utilities help users manage their computer
systems, maintain performance, improve
security, and troubleshoot issues.
ADARLO, AJON, ALVEAR, BACARO, BERNARDO, BORDAMONTE, CALASIN, CAPILOS, CASERES, CHING,
HINOJALES | BSN 3-2
Download