Professional Documents
Culture Documents
of Computer
To keep records.
For mathematical computations.
To perform repetitive task.
For publishing.
For entertainment.
For communication.
1977 Steve Jobs and Steve Wozniak designed and built the first APPLE
MICROCOMPUTER
1982 William Gibson invented the term cyberspace
1985 Alexey Pazhitnov (Russian) wrote the Tetris
1985 Philips invented the CD-ROM
1988 Robert Morris lunched an Internet WORM
1989 Tim Berners-Lee (who saw the need for a global information
exchange) invented the World Wide Web
1977 IBMs Deep Blue (the first computer to beat a reigning World Chess
Champion, Gary Kasparov)
Amdahl designed the IBM SYSTEM / 360 series mainframe computers
(the first general purpose digital computers to use integrated circuits)
Daniel Bricklin and Bob Frankston designed the VISICALC (VISIBLE
CALCULATOR) the first spreadsheet program / an electronic
spreadsheet.
TECHNOLOGICAL EVOLUTION OF COMPUTERS
1. First Generation (1951 - 1959)
- Computers were powered by thousands of VACUUM TUBES (can store
data in memory).
2. Second Generation (1959 - 1965)
- TRANSISTOR were smaller, faster and cheaper, required less power,
and produced less heat than vacuum tubes.
3. Third Generation (1965 - 1971)
- INTEGRATED CIRCUITS / ICs / CHIP a single wafer that can hold
many transistor and electronic circuits.
4. Fourth Generation (1971 - PRESENT)
- Computers lie in the technique of implementation of integrated circuits
by using Large Scale Integration (LSI) of chips with several
thousand transistors.
- In the middle of 1970s the development of Very-Large-Scale
Integration (VLSI) produced a chip containing a MICROPROCESSOR
5. Fifth Generation (FUTURE)
- Creation and use with Artificial Intelligence (AI)
- ARTIFICIAL INTELLIGENCE (AI) indicates the ability to perform
humanlike thinking and reasoning.
COMPONENTS OF A COMPUTER SYSTEM
The Elements of a Computer System
1. PEOPLE. People are the most important element of a computer system. They
use and operate the computer.
2. SOFTWARE. Software is the programs or instructions that a computer must
follow to do its task. The purpose of software is to process data into useful
information for people. Software gives flexibility to computers.
3. HARDWARE. Hardware id the physical equipment that you can feel and
touch. The hardware needs software to function properly. Hardware comes in
a variety of shapes, size, price, and computing power.
4. DATA. Raw data are normal inputs entered into the computer. The software
installed in the computer determines largely the resulting output. Processed
data are called information and they are useful to people.
5. CONNECTIVITY. A computer must be connected to other computers
especially through the internet. Using the internet, people can share and
access data and greatly expand ones capability and reach.
Capabilities of Computers
1. SPEED. Computer operates on data and commands at incredibly fast speed.
Billions or trillions of operations are done by the computer in a second.
2. STORAGE. Computer can store enormous amount of data and information in
its memory. This information easily transferred and used anytime and
anywhere
3. RELAIBILITY. Computers made of modern technology rarely breakdown and
when they are easily repaired. They could operate the whole day, even
months and years without interruption in some application.
4. CONSSISTENT. If you input the same data into the computer using the same
program, it will give you the same result all the same.
5. COMMUNICATE. Computers have made it possible to talk and see other
people. Information n all forms is shared faster and easier as well.
Dangers of Using Computer
1. SAFETY. Be careful in using sharing personal information.
2. HEALTH RISK. Long and improper use of the computer can lead to injuries
and hazards to the user.
3. ENVIRONMENT. Old computer must be disposed off properly. Computer
parts could release toxic or dangerous materials into the environment. Heat
generated by the computer maybe small but if there are so many they could
add to pollution and global warming, contributing to an already fragile
worldwide environmental condition.
4. USE OF POWER. Computers need electricity to run.
5. PRIVACY VIOLTION. Personal information when stored in a computer can be
viewed and stolen.
Limitations of Computer
1.
2.
3.
4.
According to Capacity
1. SUPERCOMPUTERS. The fastest computers in the world. They have very
high processing capacity, speed of calculation, and are able to perform
multiple tasks.
2. MAINFRAME COMUTERS. Refers to computers manufactured by IBM that
are compatible and descendant of the system/360 line. They are used by
large corporations and organizations for bulk data processing such as bank
transactions, consumer statistics and large database. They are less powerful
than the supercomputers but are still capable of great processing speeds,
multi-tasking capability and high data storage.
3. SERVER COMPUTERS. Used as the main computers in a network serving
and connected to several to other computers. They have the capability to
handle multiple requests for data and other processing tasks.
COMPUTER HARDWARE
1. PROCESS DEVICES
a) CPU(Central Processing Unit) the brain of computer
MOCROPROCESSOR small chip contained inside a CPU.
- Controls the flow of data throughout the computer system.
3 BASIC COMPONENTS:
ALU (Arithmetic Logic Unit) does the arithmetic and logical operaions
of the computer.
CONTROL UNIT it directs the sequence of operation that the CPU
follows.
MEMORY UNIT holds or manages every data.
VOLATILE STORAGE a storage that loses its contents when power is off.
EXAMPLES: RAM, Register
NON-VOLATILE STORAGE the storage that retains its contents,
EXAMPLES: Floppy disk, Optical Disc, Flash Drives, Memory Card, Hard Disk, and
Solid-state Disk
WRITING is the process of saving data, programs and information into the storage
device.
READING is the process of retrieving data, programs and information from the
storage device.
3 KINDS OF MEMORY
a. RAM (Random Access Memory)
b. ROM (Read Only Memory)
c. CMOS (Complimentary Metal-Oxide Semiconductor)
SOFTWARE
COMPUTER SOFTWARE is a set of instruction that tells the computer what to do
and how to arrive at a desired result.
SOFTWARE PIRACY the unauthorized duplication or use of computer software.
1. SYSTEM SOFTWARE set of rules on hoe the hardware and software should
work together.
- They are also used as a base to launch application software and make them
work with the hardware resources.
A. OPERATING SYSTEM a program responsible for the coordination,
management and sharing of hardware resources and tasks in the computer.
WINDOWS
MACINTOSH
LINUX
B. UTILITY SOFTWARE a program that performs maintenance tasks.
C. DEVICE DRIVER a program that allows a particular hardware device to
work and communicate with the computer system.
2. APPLICATION SOFTWARE program that performs specific tasks.
a. WORD PROCESSOR a program that allows the user to create and change
documents or reports.
b. SPREADSHEET a program where rows and columns of data organized and
calculations are performed.
c. PRESENTATION SOFTWARE used to convey information, ideas, messages, or
products to a target group of persons.
d. DATABASE PROGRAM created to organize data and information in a manner
desired by the user.
e. GRAPHICS SOFTWARE a program for drawing and coloring. They can also edit
pictures.
f. VIDEO SOFTWARE a program allows user to create, modify and enhance, add
and remove segments and other effects a user may want to apply to video files.
g. COMPUTER AIDED DESIGN (CAD) SOFTWARE a program optimized for
designing and drawing of houses, buildings, cars, airplanes and other machineries.
INFORMATION
Why people require information?
ENLIGHTENMENT and ENTERTAINMENT
How people require information?
Viewing television
Watching movies
Listening to the radio
Reading magazines, books, news paper
Browsing internet (Researching)
Interviewing people
DATA vs. INFORMATION
Data derived from the Latin datum
- Given or fact (form of a number, statement or a picture)
The raw material in the production of information
Information - data that have been collected and process into a meaningful form.
Processed data
Information refers to the knowledge obtained from reading, investigation,
study or research.
Year
In 3500 BC, the Sumerians
developed cuneiform writing.
Students
Researchers use computers to collect and
process data.
Researchers
School administrators use computers for
administrative purposes to make sure that
the entire operation runs smoothly.
School Administrator
BANKING
Electronic banking provides 24 hour services. The services include:
Automated Teller Machine (ATM)
Cheque Deposit
Electronic Fund Transfer
Direct Deposit
Pay by phone system
Personal computer banking/ internet banking
Businessmen can save their time by using the
online services offered by banks. They can
access company accounts for loan applications,
business transactions and update on their cash
flow at any time.
Businessmen
Bank administrators can oversee the entire
banking activities such as reconciliations, interbranch transactions (IBT), telegraphic transfer
and others by referring to the banking system.
Bank administrators
INDUSTRY
Workers
Customers
Suppliers use computers to keep track of
their transactions. All products are bar
coded and can be read by the computer
scanner to help in determining prices and
managing inventory.
Suppliers
Employees use computers and telephones
to communicate with their customers for
any enquiries.
The system helps employees to get the
latest updates on inventory to be informed
to the customers.
Employees
OTHER SECTOR
Trademarks
Service marks
Trade/company names
Domain names
Geographical indications
Copyrights
Patents
Cookies - enable web sites to collect information about your online activities
and store them for future use, and then the collected details will be sold to
any company that requests for it.
Recognition
Hand
Geometry
Scanning
Iris
Scanning
Retinal
Scanning
Voice
Voice recognition system compares
a persons live speech with their stored voice
pattern.
Recognition
Signature
Signature verification system uses
special pen and tablet. After pre-processing
the signature, several features are extracted.
Verification System
2. Callback system refers to the checking system that authenticates the user.
The callback system is commonly used in the bank
operation and business transaction.
For example, when you book for the taxi service, the
operator will ask you to hang up and she will call you back to
confirm for the service required.
VERIFICATION
Verification is the act of proving or disproving the correctness of a system
with respect to a certain formal specification.
METHODS OF VERIFICATION
1. USER IDENTIFICATION
User identification refers to the process of validating the user.
The examples of validating process using the user identification are:
Key in the user name to log-in to a system and the system will verify whether
the user is valid or invalid user
Show the exam slip to verify that you are the valid candidate for the exam.
Show a passport before departure.
2. PROCESSED OBJECT
Processed object refers to something the user has such as identification card,
security token and cell phone.
The examples of validating process using the processed object are:
the policeman will check on the drivers license to identify the valid driver
employees have to swipe their security card to enter the building