You are on page 1of 18

BASIC COMPUTER CONCEPTS

COMPUTER is an electronic device that performs tasks based on instructions


given by the user.
- Is a digital electronic device that combines hardware and software to accept
the input of data, process and store the data, and produce some useful
output
Uses
-

of Computer
To keep records.
For mathematical computations.
To perform repetitive task.
For publishing.
For entertainment.
For communication.

COMPUTER SYSTEM composed of hardware and software


COMPUTER LITERACY is working understanding of the fundamental of
computers and their uses
3 Measurements to Asses the Level of Computer Literacy
1. AWARENESS Studying the importance of computers.
2. KNOWLEDGE Learning what computers are and how they function.
- requires knowing some technical jargon in order to understand the
computer language.
3. INTERACTION Using the computer directly
EVOLUTION OF COMPUTER
500 B.C. the ABACUS was the first used by the Babylonians as an aid to
simple arithmetic at sometime around this date. The ABACUS in the form we
are most familiar with was first used in China around 1300 A.D.
1614 John Napier published a paper outlining his discovery of the
logarithm and invented the NAPIERS RODS / NAPIERS BONES (an
ingenious system of movable rods)
1623 Wilhelm Schickard made a CALCULATING CLOCK ( a mechanical
machine capable of adding and subtracting up to 6 digit numbers and
warned of an overflow by ringing a bell)
1642 Blaise Pascal invented the mechanical calculation machine
(PASCALINE / ADDING MACHINE) capable of adding up to 8 digit
numbers
1671 Gottfried Leibniz designed the STEPPED RECKONER (a machine
to carry out multiplication)
1801 Joseph Marie Jacquard developed an automatic loom that was
controlled by punched cards
1820 Charles Xaviers Thomas de Colmar made his ARITHMOMETER
(the first mass-produced calculator)
1821 Charles Babbage (father of computers) invented the first
modern computer design and made a machine to automatically solve mat
problems.
1842 Ada Lovelace (the first computer programmer) made the
program for the invention of Charles Babbage which is the Difference
Engine
1852 George Boole developed binary algebra (BOOLEAN ALGEBRA)
1890 Herman Hollerith founded Tabulating Machine Company (later
named as International Business Machine / IBM Corporation)

1939 David Hewlett and William Packard formed Hewlett-Packard


(HP) a coin toss in a garage decided the name
1940 John Von Neumann presented a paper outlining the storedprogram concept
1942 John Atanasoft and Clifford Berry invented the first allelectronic computer (the first computer to use electricity in the form of
vacuum tubes) called the ABC (ATANASOFT-BERRY COMPUTER)
1943 Alan Turing (British mathematician who made history) used vacuum
tube technology to build British COLOSSUS, to counteract the German
Code scrambling device (Enigma)
1944 Howard Aiken is a Ph. D. student at Harvard University when he
built the MARK (the first automatic sequence-controlled calculator, use
by military to compute ballistic data, with a capacity of 23 digits plus sign)
1945 Presper Eckert and John Mauchly built the ENIAC (ELECTRONIC
NUMERICAL INTEGRATORS AND COMPUTER) the second general
purpose electronic digital computer, was over 1,000 times faster than
Mark I and could perform 5,000 additions per second
1949 Maurice Wikes built the EDSAC (ELECTRONIC DELAY STORAGE
AUTOMATIC CALCULATOR) the firs stored program computers
1949 Presper Eckert, John Mauchly and John Von Neumann built the
EDVAC (ELECTRONIC DISCRETE VARIABLE AUTOMATIC COMPUTER)
1949 An Wang developed Magnetic Core Memory (was the fastest type
memory until the 1980s)
1949 Jay Forrester organized magnetic core memory to be more
efficient
1950 Alan Turing built the ACE which some consider it to be the first
programmable digital computer
1950 Grace Hopper (found the first Computer Bug) developed the
UNIVAC I Compiler
1951 Presper Eckert and John Mauchly built UNIVAC I (UNIVERSAL
AUTOMATIC COMPUTER I) - the first computer designed and sold
commercially (specifically for business data processing applications)
1957 John Backus, one of a group of IBM engineers to develop FORTRAN
or FORmula TRANslation (is an example of high level programming
language)
1959 Jack Kilby and Robert Noyce developed and perfected the IC
(INTEGRATED CIRCUIT ) also known as CHIP
1961 Grace Hopper developed COBOL (COMMON BUSINESS
ORIENTED LANGUAGE)
1963 Ken Olsen founded DEC (Digital Equipment Corporation) and
produced the PDP 1 (the first minicomputer)
1965 John Kemeny and Thomas Kurts developed BASIC (BEGINNERS
ALL-PURPOSE SYMBOLIC INSTRUCTION CODE) programming
language the objectives of this programming language to help teach
people how to program
1968 Robert Noyce and few friends founded INTEL
1969 U.S. Department of Defense started ARPANET (for research into
networking)
1970 Hoff developed the famous INTEL 4004 microprocessor chip
1972 the first international connections to ARPANET are established
1975 Robert (father of microcomputer) designed ALRTAIR 8800
which is the first microcomputer
1975 Bill Gates and Paul Allen formed the Microsoft
1976 Wozniak and Jobs founded the Apple Computer, Inc.
1976 - Cray developed CRAY I SUPERCOMPUTER

1977 Steve Jobs and Steve Wozniak designed and built the first APPLE
MICROCOMPUTER
1982 William Gibson invented the term cyberspace
1985 Alexey Pazhitnov (Russian) wrote the Tetris
1985 Philips invented the CD-ROM
1988 Robert Morris lunched an Internet WORM
1989 Tim Berners-Lee (who saw the need for a global information
exchange) invented the World Wide Web
1977 IBMs Deep Blue (the first computer to beat a reigning World Chess
Champion, Gary Kasparov)
Amdahl designed the IBM SYSTEM / 360 series mainframe computers
(the first general purpose digital computers to use integrated circuits)
Daniel Bricklin and Bob Frankston designed the VISICALC (VISIBLE
CALCULATOR) the first spreadsheet program / an electronic
spreadsheet.
TECHNOLOGICAL EVOLUTION OF COMPUTERS
1. First Generation (1951 - 1959)
- Computers were powered by thousands of VACUUM TUBES (can store
data in memory).
2. Second Generation (1959 - 1965)
- TRANSISTOR were smaller, faster and cheaper, required less power,
and produced less heat than vacuum tubes.
3. Third Generation (1965 - 1971)
- INTEGRATED CIRCUITS / ICs / CHIP a single wafer that can hold
many transistor and electronic circuits.
4. Fourth Generation (1971 - PRESENT)
- Computers lie in the technique of implementation of integrated circuits
by using Large Scale Integration (LSI) of chips with several
thousand transistors.
- In the middle of 1970s the development of Very-Large-Scale
Integration (VLSI) produced a chip containing a MICROPROCESSOR
5. Fifth Generation (FUTURE)
- Creation and use with Artificial Intelligence (AI)
- ARTIFICIAL INTELLIGENCE (AI) indicates the ability to perform
humanlike thinking and reasoning.
COMPONENTS OF A COMPUTER SYSTEM
The Elements of a Computer System
1. PEOPLE. People are the most important element of a computer system. They
use and operate the computer.
2. SOFTWARE. Software is the programs or instructions that a computer must
follow to do its task. The purpose of software is to process data into useful
information for people. Software gives flexibility to computers.
3. HARDWARE. Hardware id the physical equipment that you can feel and
touch. The hardware needs software to function properly. Hardware comes in
a variety of shapes, size, price, and computing power.
4. DATA. Raw data are normal inputs entered into the computer. The software
installed in the computer determines largely the resulting output. Processed
data are called information and they are useful to people.
5. CONNECTIVITY. A computer must be connected to other computers
especially through the internet. Using the internet, people can share and
access data and greatly expand ones capability and reach.

6. PROCEDURE. The step by step instructions to follow when using hardware,


software and data. The procedures are normally written in manuals of
hardware and software manufacturer.

Capabilities of Computers
1. SPEED. Computer operates on data and commands at incredibly fast speed.
Billions or trillions of operations are done by the computer in a second.
2. STORAGE. Computer can store enormous amount of data and information in
its memory. This information easily transferred and used anytime and
anywhere
3. RELAIBILITY. Computers made of modern technology rarely breakdown and
when they are easily repaired. They could operate the whole day, even
months and years without interruption in some application.
4. CONSSISTENT. If you input the same data into the computer using the same
program, it will give you the same result all the same.
5. COMMUNICATE. Computers have made it possible to talk and see other
people. Information n all forms is shared faster and easier as well.
Dangers of Using Computer
1. SAFETY. Be careful in using sharing personal information.
2. HEALTH RISK. Long and improper use of the computer can lead to injuries
and hazards to the user.
3. ENVIRONMENT. Old computer must be disposed off properly. Computer
parts could release toxic or dangerous materials into the environment. Heat
generated by the computer maybe small but if there are so many they could
add to pollution and global warming, contributing to an already fragile
worldwide environmental condition.
4. USE OF POWER. Computers need electricity to run.
5. PRIVACY VIOLTION. Personal information when stored in a computer can be
viewed and stolen.
Limitations of Computer
1.
2.
3.
4.

Dependence on prepared instructions.


It is subject to human control.
It cannot correct wrong instructions.
It is subject to occasional breakdown.
CLASSIFICATION OF COMPUTER

According to Capacity
1. SUPERCOMPUTERS. The fastest computers in the world. They have very
high processing capacity, speed of calculation, and are able to perform
multiple tasks.
2. MAINFRAME COMUTERS. Refers to computers manufactured by IBM that
are compatible and descendant of the system/360 line. They are used by
large corporations and organizations for bulk data processing such as bank
transactions, consumer statistics and large database. They are less powerful
than the supercomputers but are still capable of great processing speeds,
multi-tasking capability and high data storage.
3. SERVER COMPUTERS. Used as the main computers in a network serving
and connected to several to other computers. They have the capability to
handle multiple requests for data and other processing tasks.

4. PERSONAL COMPUTERS. A computer designed to be operated by an


individual whose size, price, and capabilities are determined by the usual
application the person uses it for.

COMPUTER HARDWARE
1. PROCESS DEVICES
a) CPU(Central Processing Unit) the brain of computer
MOCROPROCESSOR small chip contained inside a CPU.
- Controls the flow of data throughout the computer system.
3 BASIC COMPONENTS:

ALU (Arithmetic Logic Unit) does the arithmetic and logical operaions
of the computer.
CONTROL UNIT it directs the sequence of operation that the CPU
follows.
MEMORY UNIT holds or manages every data.

b) MOTHERBOARD (SYSTEM BOARD) the main base of the computer


hardware system
c) VIDEO CARD (GRAPHICS ACCELERATO CARD/GRAPHICS CARD) a
computer component whose main function is to generate video and images
to a monitor.
2. INPUT DEVICES used to input data into the computer.
- Tools used to feed data into the computer and permit the
communication between the user and the computer.
EXAMPLES:
Keyboard, Mouse, Scanner, Digital Camera, Video Recorder, Microphone, Joystick,
Gamepad.
3. OUTPUT DEVICES allow the user to see the result of the data that has been
processed.
- The data entered into the computer into a form such as printed reports or
visual display.
EXAMPLES:
Monitor, Printer, Speaker, Projectors

INPUT/OUTPUT DEVICES computer components that function as input and


output devices.
EXAMPLES:
a) MODEM (Modulator Demodulator) a communication device that
allows the computer to receive and send data and information to and from
the other computers.
b) TOUCH SCREEN - a display that can sense the incidence and position of a
touch within the screen area.
c) HEADSET a device that has a microphone and a headphone.
4. STORAGE DEVICES where data is kept for future use
- retains information even when power is turned off.
STORAGE a means to hold and store data, programs, and information for the
present and future use.

VOLATILE STORAGE a storage that loses its contents when power is off.
EXAMPLES: RAM, Register
NON-VOLATILE STORAGE the storage that retains its contents,
EXAMPLES: Floppy disk, Optical Disc, Flash Drives, Memory Card, Hard Disk, and
Solid-state Disk
WRITING is the process of saving data, programs and information into the storage
device.
READING is the process of retrieving data, programs and information from the
storage device.
3 KINDS OF MEMORY
a. RAM (Random Access Memory)
b. ROM (Read Only Memory)
c. CMOS (Complimentary Metal-Oxide Semiconductor)
SOFTWARE
COMPUTER SOFTWARE is a set of instruction that tells the computer what to do
and how to arrive at a desired result.
SOFTWARE PIRACY the unauthorized duplication or use of computer software.
1. SYSTEM SOFTWARE set of rules on hoe the hardware and software should
work together.
- They are also used as a base to launch application software and make them
work with the hardware resources.
A. OPERATING SYSTEM a program responsible for the coordination,
management and sharing of hardware resources and tasks in the computer.
WINDOWS
MACINTOSH
LINUX
B. UTILITY SOFTWARE a program that performs maintenance tasks.
C. DEVICE DRIVER a program that allows a particular hardware device to
work and communicate with the computer system.
2. APPLICATION SOFTWARE program that performs specific tasks.
a. WORD PROCESSOR a program that allows the user to create and change
documents or reports.
b. SPREADSHEET a program where rows and columns of data organized and
calculations are performed.
c. PRESENTATION SOFTWARE used to convey information, ideas, messages, or
products to a target group of persons.
d. DATABASE PROGRAM created to organize data and information in a manner
desired by the user.
e. GRAPHICS SOFTWARE a program for drawing and coloring. They can also edit
pictures.
f. VIDEO SOFTWARE a program allows user to create, modify and enhance, add
and remove segments and other effects a user may want to apply to video files.
g. COMPUTER AIDED DESIGN (CAD) SOFTWARE a program optimized for
designing and drawing of houses, buildings, cars, airplanes and other machineries.

h. ELECTRONIC MAIL (E-MAIL) used to compose, send and receive messages


from a mail server.
i. INTERNET BROWSER used to find and view web pages.

INFORMATION
Why people require information?
ENLIGHTENMENT and ENTERTAINMENT
How people require information?
Viewing television
Watching movies
Listening to the radio
Reading magazines, books, news paper
Browsing internet (Researching)
Interviewing people
DATA vs. INFORMATION
Data derived from the Latin datum
- Given or fact (form of a number, statement or a picture)
The raw material in the production of information
Information - data that have been collected and process into a meaningful form.

Processed data
Information refers to the knowledge obtained from reading, investigation,
study or research.

Data Processing manipulation of data to produce meaningful information


CHARACTERISTICS OF USEFUL INFORMATION
1.
2.
3.
4.
5.

RELEVANT Information must pertain to the problem at hand.


COMPLETE Partial information is often worse than no information.
ACCURATE Erroneous information might lead to disastrous decisions.
CURRENT Decisions ore often based on the latest information available.
ECONOMICAL In a business setting, the cost of obtaining information must
be considered as one cost element involved in any decision.
COMMMUNICATION

COMMUNICATION - is an act of transmitting messages. It is a process whereby


information is exchanged between individuals by symbols, signs or verbal
interactions
- Communication is important in order to gain knowledge. With knowledge, we
are more confident in expressing our thoughts and ideas.

TECHNOLOGY - is the use of scientific knowledge, experience and resources to


create processes and products that fulfill human needs.
Technology is vital in communication.
Aiding Communication
Telephone and fax machines are the devices used in extending
communication.
Spreading Information
To broadcast information such as news or weather reports effectively. Radio,
television, satellites and the World Wide Web (www) are powerful tools that can be
used.
TECHNOLOGY TIMELINE
Technology

Year
In 3500 BC, the Sumerians
developed cuneiform writing.

In 1500 BC, the Phoenicians


developed the alphabet

In 105 BC, Tsai Lun of China invented


paper.

In 1454, the first printing began with


the creation of a printing machine.

In 1793, the telegraph line was


invented.

In 1876, the first telephone was


introduced.

In 1925, television was made known


to public.

In 1941, the computer was created.

In 1958, the photocopier machine


was introduced.

In 1963, the communication satellite


was
introduced.

In 1969, the first Internet known as


ARPANET was introduced.

INFORMATION AND COMMUNICATION TECHNOLOGY - is the technology


required for information processing, in particular, the use of electronic
computers, communication devices and software applications to convert,
store, protect, process, transmit and retrieve information from anywhere,
anytime.
USAGE OF ICT IN DAILY LIFE
SCHOOL
Teachers use computers to research for
teaching materials, participate in online
forums and online conferences as well as to
aid their teaching.
Teachers
Students use the computers as a reference
tool. They use computers to browse the
internet to look for information.

Students
Researchers use computers to collect and

process data.

Researchers
School administrators use computers for
administrative purposes to make sure that
the entire operation runs smoothly.

School Administrator
BANKING
Electronic banking provides 24 hour services. The services include:
Automated Teller Machine (ATM)
Cheque Deposit
Electronic Fund Transfer
Direct Deposit
Pay by phone system
Personal computer banking/ internet banking
Businessmen can save their time by using the
online services offered by banks. They can
access company accounts for loan applications,
business transactions and update on their cash
flow at any time.
Businessmen
Bank administrators can oversee the entire
banking activities such as reconciliations, interbranch transactions (IBT), telegraphic transfer
and others by referring to the banking system.
Bank administrators
INDUSTRY

Workers

Workers use machines that are connected


to computers to operate. In some
productions, robots are used to take over
jobs that are dangerous to the workers.

Researchers use computers to analyze and


collect research data for future reference.
Researchers

Administrators use computers to oversee


the entire operations in the plant or factory
to detect specific errors or defects that
occurred in the process.
Administrators
E-COMMERCE
Customers use computers to be connected
online with suppliers to purchase products.
This method can save time and cost as they
do not have to go to any outlets.

Customers
Suppliers use computers to keep track of
their transactions. All products are bar
coded and can be read by the computer
scanner to help in determining prices and
managing inventory.
Suppliers
Employees use computers and telephones
to communicate with their customers for
any enquiries.
The system helps employees to get the
latest updates on inventory to be informed
to the customers.
Employees

OTHER SECTOR

IMPACT OF ICT ON SOCIETY


1.
2.
3.
4.
5.
6.
7.
8.

Faster communication speed


Lower communication cost
Reliable mode of communication
Effective in sharing of information
Paperless environment
Borderless of communication
Social problems
Health problems

THE TEN COMMANDMENTS OF COMPUTER ETHICS


1.
You shall not use a computer to harm other people.
2.
You shall not interfere with other people's computer work.
3.
You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5.
You shall not use a computer to bear false witness.
6.
You shall not copy or use proprietary software for which you have not
paid.
7.
You shall not use other people's computer resources without
authorization or proper compensation.
8.
You shall not appropriate other people's intellectual output.
9.
You shall think about the social consequences of the program you are
writing or the system you are designing.
10.
You shall always use a computer in ways that ensure consideration and
respect for your fellow humans.

UNETHICAL COMPUTER CODE OF CONDUCTS


Examples of unethical computer code of conducts include:

modifying certain information on the Internet, affecting the accuracy


of the information
selling information to other parties without the owners permission
using information without authorization
involvement in stealing software
invasion of privacy

ETHICAL COMPUTER CODE OF CONDUCTS


Examples of ethical computer code of conducts include:

sending warning about viruses to other computer users


asking permission before sending any business advertisements to
others
using information with authorization
INTELLECTUAL PROPERTY RIGHTS

Intellectual Property refers to works created by inventors, authors and artists.


These works are unique and have value in the market place. In our daily lives, we
are surrounded by things that are protected by IP.
INTELLECTUAL PROPERTY LAW - cover ideas, inventions, literary creations,
unique names, business models, industrial processes, computer program codes and
more.
INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS
As businesses continue to expand globally, business owners must realize the
importance of getting professional advice on how to establish and safeguard their
intellectual property rights. These include:

Trademarks
Service marks
Trade/company names
Domain names
Geographical indications
Copyrights
Patents

INTELLECTUAL PROPERTY PROTECTION


Patents for inventions
Utility, design or plant patents that protect inventions and
improvements to existing inventions

Trademarks for brand identity


Words, names, symbols, devices and images that represent products,
goods or services

Design for product appearance


Literary and artistic material, music, films, sound recordings and
broadcasts, including software and multimedia

Copyright for material


The features of, in particular, the lines, contours, colors, shape, texture
or material of the product itself or its ornamentation

PRIVACY IN COMPUTER USAGE


Information privacy is described as the rights of individuals and companies to
deny or restrict the collection and use of information about them.
WHAT IS PRIVACY?
Privacy in IT refers to data and information privacy. Information privacy is
described as the rights of individuals and companies to deny or restrict the
collection and use of information about them.
How does computer technology threaten the privacy of our data?
It is done through:

Cookies - enable web sites to collect information about your online activities
and store them for future use, and then the collected details will be sold to
any company that requests for it.

Electronic profile - electronic profile is the combining of data in a database


that can be sold to the Internet by the company to the interested parties.

Spyware - refers to a program that collects user information without the


users knowledge.
Can enter computers, sneaking in like a virus.

PRIVACY CAN BE PROTECTED BY?


Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.
AUTHENTICATIONS
Authentication is a process where users verify that they are who they say
they are. The user who attempts to perform functions in a system is in fact the user
who is authorized to do so.
METHODS OF AUTHENTICATION
1. Biometric device is a device that translates personal characteristics into a
digital code that is compared with a digital code stored in the database.
BIOMETRIC DEVICES

In order to prevent fake fingers from


being used, many biometrics fingerprint
systems also measure blood flow, or check
for correctly arrayed ridges at the edges of
the fingers.
Fingerprint Recognition
Facial

Recognition
Hand
Geometry
Scanning

Iris
Scanning

Facial recognition analyses the


characteristics of an individual's face images
captured through a digital video camera.
Facial recognition is widely used, touted as a
fantastic system for recognizing potential
threats (Whether terrorists, scam artists, or
known criminals).

Hand scanning involves the


measurement and analysis of the shape of
one's hand.

Iris scanning analyses the features


that exist in the colored tissues surrounding
the pupil which has more than 200 points that
can be used for comparison, including rings,
furrows and freckles.

Retinal
Scanning

Retinal biometrics involves the


scanning of retina and analyzing the layer of
blood vessels at the back of the eye.

Voice
Voice recognition system compares
a persons live speech with their stored voice
pattern.

Recognition
Signature
Signature verification system uses
special pen and tablet. After pre-processing
the signature, several features are extracted.

Verification System
2. Callback system refers to the checking system that authenticates the user.
The callback system is commonly used in the bank
operation and business transaction.
For example, when you book for the taxi service, the
operator will ask you to hang up and she will call you back to
confirm for the service required.
VERIFICATION
Verification is the act of proving or disproving the correctness of a system
with respect to a certain formal specification.
METHODS OF VERIFICATION
1. USER IDENTIFICATION
User identification refers to the process of validating the user.
The examples of validating process using the user identification are:
Key in the user name to log-in to a system and the system will verify whether
the user is valid or invalid user
Show the exam slip to verify that you are the valid candidate for the exam.
Show a passport before departure.
2. PROCESSED OBJECT
Processed object refers to something the user has such as identification card,
security token and cell phone.
The examples of validating process using the processed object are:
the policeman will check on the drivers license to identify the valid driver
employees have to swipe their security card to enter the building

buy blouses at the mall using a credit

You might also like