0% found this document useful (0 votes)
23 views18 pages

Computer Science Basics

Notes

Uploaded by

Chelsea Lomongo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views18 pages

Computer Science Basics

Notes

Uploaded by

Chelsea Lomongo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

WEEK 2 - INTRODUCTION TO INFORMATION SYSTEM TYPES


CONCEPTS
1 Physical and Abstract Systems
What is a system? ★ Physical - we can touch,
see, and feel
1. a collection of different components that ★ Abstract - systems that
work together to achieve a goal are there but we cannot
see it physically such as
organizational hierarchy
MAIN CHARACTERISTICS
2 Open and Closed Systems
1 Common goal
★ Open - we can take input
Integration (different components from the external
2 grouped together/ work together to environment. It can
modify itself or update
achieve a goal) itself. It changes with the
Interaction (different components send change in the
3 environment.They last
and receive messages to each other)
longer for longer duration.
Interdependence (if there is a change in ★ Closed - do not interact
4 with the external
one component, it will affect the rest)
environment. Ultimately
Organization (system will work if one they collapse.
5 puts the right component at the right
place at the right time) 3 Probabilistic and Deterministic
Systems
★ Probabilistic - we cannot
predict the output in
SYSTEM COMPONENTS advance. Ex:
experimenting something
I. Input, process, output for the first time
II. Environment: factors/ circumstances ★ Deterministic - they
under which a system works determine the output in
- Internal: under the control of a advance. Routine
system, ex- resources, personnel activities, or routine in
- External: outside the control of a everyday life. Ex: if you
system, ex- market conditions press this button, you
III. Boundary: physical or abstract. know what will happen.
Something that separates internal and
external environments. It also defines 4 Natural and Man made Systems
what is included in the system and what ★ Natural - made by nature.
is not Ex: day and night,
IV. Interface: points in the system boundary seasons, rivers.
where internal and external ★ Man made - made by
environments can interact with each men. Ex: computer, car,
other. This is crucial for exchange of fan, TV
information and resources.
V. Feedback and Control: measure the 5 Parent and Candidate System
performance of the system so we can ★ Parent - old system which
ensure whether or not the system is is already working/
achieving its goals (feedback), if not, we working presently
take steps to mend or address the issues ★ Candidate - new system
in the system in order for it to work which is going to replace
(control). the old system
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!
Data Integration: Combining diverse

DATA VS INFORMATION VS KNOWLEDGE data sources.
● Skill Gap: Shortage of skilled data
☆ Data: is the lowest form, lacks any kind of professionals.
organization. Facts and figures which relay ➢ Characteristics
something specific ● Volume: Massive data amounts
☆ Information: data that’s organized, (terabytes to petabytes).
condensed, categorized, and contextualized. ● Velocity: High-speed data generation
Data now has a purpose and a direction. and processing.
Conveys something specific. ● Variety: Data in structured,
☆ Knowledge: deeper level of understanding, semi-structured, and unstructured
know-how. Based on experience, values, formats.
contextual information, insights, intuition. Ex: ● Veracity: Data accuracy and reliability
how to fix something, how to market a can vary.
product ● Value: Turning raw data into actionable
insights.

DIFFERENCE BETWEEN IT AND IS


★ ANSWERS TO STUDY GUIDE QUESTIONS ★
➔ Information System (business side of
1. What makes a system a system? A system is
technology) defined by a collection of components that work
○ A set of interrelated components that together to achieve a common goal. It exhibits
collect, and disseminate data and characteristics such as integration, interaction,
information and provide feedback to interdependence, and organization.
meet an objective. 2. Five components of a system? Describe.
○ Business oriented and focus on the ☆ Input: Resources or data fed into the system for
business domain processing. Process: Transformation or operations
○ Business skills and learn about applied to the inputs. Output: The results produced
technology to make decisions by the system.
☆ Environment: Factors affecting the system,
Elements: including internal (under control) and external
1. Hardware - - - - - - - - (outside control) elements.
2. Software - - - - - - - - ☆ Boundary: The separation between internal and
3. People - - – - external environments, defining what is included in
4. Data collection - - - - - - - - the system.
5. Information Generation - - ☆ Interface: Points where internal and external
environments interact, crucial for information and
➔ Information Technology (technical side) resource exchange.
○ The hardware and software that make ☆ Feedback and Control: Mechanisms to measure
information systems possible system performance and make necessary
adjustments to achieve goals.
○ Focuses on the selection, integration, 3. Ways to classify a system
and deployment of computing ☆ Physical and Abstract Systems: Tangible (e.g.,
technology, technical skills such as machines) vs. intangible (e.g., organizational
planning and deploying networking structures).
infrastructure or integrates data bases ☆ Open and Closed Systems: Interacts with the
or build websites environment vs. isolated from it.
☆ Probabilistic and Deterministic Systems:
➔ Relationship Unpredictable outcomes vs. predictable routines.
IT (hardware, software, database, network) are ☆ Natural and Man-made Systems: Occurs in nature
used to build → IS → customer services, payroll vs. created by humans.
system, inventory system ☆ Parent and Candidate Systems: Existing systems
vs. new systems intended to replace them.
➔ Confusion 4. How does information impact
People may not distinguish between IS and It, decision-making?
as they assume all information systems are ☆ Information, organized and contextualized data,
computer based systems provides insights that guide decision-making. It
enables managers to evaluate options, assess
risks, and develop strategies, ultimately improving
BIG DATA operational efficiency and effectiveness.
5. Is information processed data? If so, what
makes it become information and turn it into
➢ massive volumes of structured and unstructured knowledge?
data generated from various sources at high ☆ Yes, information is processed data. It becomes
velocity. information when data is organized, categorized,
➢ Challenges and contextualized, providing purpose and
● Data Privacy and Security: direction. Knowledge is further developed from
Compliance with regulations (e.g., information through experience, insights, and
GDPR). understanding, allowing for informed
decision-making and expertise.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!
7. Store and recall information: Can store large
WEEK 3 - COMPUTER BASED INFORMATION volumes of data and retrieve it as needed,
SYSTEM facilitating easy access to information.

Functions of a computer Computer-Based Information System (CBIS)

1. Input or inserting data and instructions or a system that leverages computer technology to gather,
transferring of information to the system. process, and analyze data to support decision-making
2. Processing: manipulating and controlling the within an organization. It integrates hardware, software,
data over the entire system. data, networks, and procedures to improve efficiency
3. Output or retrieving data or information: giving and effectiveness in managing information.
the processed data and information to the
external forces is done under output
4. Storing data or information: stored in a way that
COMPONENTS OF CBIS
they can be reused later as required.
5. Controlling: functions of a computer system ☆ Hardware– these are the devices like the
monitor, processor, printer and keyboard, all of
and its various devices should be controlled which work together to accept, process, show
properly. data and information.
☆ Software– are the programs that allow the
More functions: hardware to process the data.
★ Information tool: provide vast amounts of ☆ Databases– are the gathering of associated
information in many forms such as text, files or tables containing related data.
graphics, sound, video. ☆ Networks– are a connecting system that
★ Communication tool: Facilitates allows diverse computers to distribute
communication between users and systems. resources.
☆ Procedures– are the commands for
★ Constructive tool: used for manipulating combining the components above to process
information, visualizing one’s understanding, information and produce the preferred output
and building new knowledge.
★ Co-constructive tool: students can use
co-constructive tools to work cooperatively and
construct a shared understanding of new
knowledge. BASIC TYPES OF CBIS
★ Situating tool: can create 3D images on display
to give users the feeling that they are situated in 1 Transaction Processing Systems
a virtual environment. ★ is a way of computing that
★ Evaluation: assesses and analyzes data or divides work into individual,
processes to ensure accuracy, effectiveness, indivisible operations, called
and compliance with specified criteria.
transactions.
Capabilities of a computer ★ TPS is a software system, or
software/hardware
A computer is capable of many things. It's fast, efficient combination, that supports
and accurate. You can add as much functionality in a transaction processing.
computer as good you write a program for it. There is a ★ Day to day transactions,
lot of application software which is making things easy inventories
for us. The Internet has made this world a global village. ★ Helps supervisors by generating
Capabilities are as follow:
1. Accuracy: Performs calculations and processes databases that are needed for
data with a high degree of precision. the other information system
2. Speed: Executes tasks and processes ★ Provides detailed data for
information at remarkable speeds, often in Management Information
milliseconds. Systems (MIS), Decision Support
3. Automatic: Can perform tasks automatically Systems (DSS), and Executive
without human intervention once programmed.
4. Self Checking: Has the ability to check and Support Systems (ESS).
verify its operations to minimize errors.
5. Repetitiveness: Capable of performing the 2 Management Information Systems
same task repeatedly without loss of ★ Helps in monitoring
performance. performance and managing
6. Wide range of applications: Supports various
software applications for diverse tasks across resources effectively.
different fields (e.g., business, education,
entertainment). 3 Decision Support Systems
★ Interactive systems that assist
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!
○ Change in business model and
in decision-making by analyzing necessity of human drivers
data and presenting actionable ➢ Evolution of transportation from horse and
information. carriage to vehicles
★ Supports complex
decision-making and Cultural Shifts
➢ Skills that were once essential (e.g., driving)
problem-solving scenarios.
may become optional
➢ Technology blurring the line between work and
4 Executive Support Systems play
★ High-level systems designed to
provide senior executives with Creation of New Industries
quick access to internal and ➢ Entertainment industry transformation
external information relevant to ○ Recorded media (TV, radio, streaming)
○ Rapid evolution of technology in
their strategic goals. entertainment
★ Summarizes data for long-term
strategic planning and Opportunities and Challenges
performance monitoring. ➢ Disruption and transformation lead to new
possibilities
➢ Difficulty in predicting future developments
➢ Assurance of emerging opportunities and new
THE DIGITAL REVOLUTION business models

1. First Industrial Revolution (1700s-1800s) DIGITAL CONVERGENCE


○ Mechanization
○ Shift from rural to urban work ➔ Convergence of digital tools such as computers,
2. Second Industrial Revolution (Late phones, watches, and many other being
1800s-early 1900s) combined and ready to use in one single device
○ Electrification ○ Ex: smart phones
○ Mass production (e.g., Henry Ford) ○ Smart phones contain hundreds of
3. Third Industrial Revolution (1990s-early functions from other devices
2000s) ➔ Positive impacts:
○ Rise of the internet ○ Facilitates access to different functions,
○ Connectivity and smartphones helpful in cases of emergencies
○ Emergence of "big data" ○ Helps save money as instead of bing
4. Fourth Industrial Revolution different devices, thes only need to buy
○ Digital revolution one
○ New technologies driving change ○ Facilitates mobility as there is only one
device to carry
Key Characteristics ➔ Negative impacts:
➢ Increased speed and velocity of change ○ If there is damage done to the device, it
➢ Challenges for adaptation (individuals, would imply more than one function
businesses, and legal systems) being lost
○ disrupts work-life balance by making
New Technologies tools easily accessible on portable
➢ Combination of software and hardware devices, leading many to work from
➢ Gig economy as a new model home and potentially causing issues
➢ Technologies integrate across various sectors with family and friends.
➢ AI, robotics, blockchain, internet of things, VR, ○ Reinforces digital addiction
3D/4D printing, drones, sharing economy

Transformation vs. Disruption * DIGITAL ECONOMY


➢ Two sides of the same coin
➢ Transformation: significant changes in
processes or business models that enhance ● Definition:also known as the internet economy
efficiency and value, often through the adoption or web economy, refers to the impact of digital
of new technologies.
➢ Disruption: a sudden and significant change technology on business operations and trade.
that alters market dynamics, often leading to the ● Impact of Digital Technology:
obsolescence of existing technologies or ○ Facilitates easier access to meetings.
business models. ○ Removes barriers related to time,
➢ Example: London cab drivers vs. sat nav and
Uber location, devices, and network
connections.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

○ Enhances work-life balance for a. Hardware: The physical devices (e.g.,


employees. monitor, processor, printer, keyboard)
○ Increases productivity and agility for that work together to accept, process,
and display data.
organizations. b. Software: Programs and applications
● Examples of the Digital Economy: that instruct the hardware on how to
○ E-commerce process data.
c. Databases: Collections of related files
○ Digital banking or tables that store and organize data
○ Agriculture for retrieval and use.
○ Cryptocurrency mining d. Networks: Systems that connect
different computers, allowing for the
○ Manufacturing sharing and distribution of resources
● Top Five Challenges in the Digital Economy: and information.
○ Employee Pushback: Resistance from e. Procedures: Instructions and guidelines
that dictate how the components of the
employees towards adopting new CBIS work together to process
digital tools or processes, often due to information and achieve desired
fear of change or job insecurity. outcomes.
3. Transaction Processing Systems (TPS). What
○ Organizational Structure Issues: does it do? Is SAIS a TPS? Why or why not?
Challenges related to existing It manages day-to-day transactions by
hierarchies and workflows that may not processing individual operations, generating
databases that support other information
support agile digital transformation. systems. A Student Academic Information
○ Lack of Expertise: Insufficient skilled System (SAIS) can be considered a TPS if it
personnel capable of leading digital processes transactions related to student
initiatives, which hampers effective records, registrations, and grades. However, if
SAIS includes broader functions beyond
implementation. transaction processing (like analytics), it may not
○ Absence of a Digitalization Strategy: strictly fit the TPS definition.
A lack of a clear plan or roadmap for 4. What period of the Industrial Revolution does
the Internet fall into? Within this period, cite
integrating digital technologies into a few examples of hardware and software
business operations, leading to technologies mentioned.
inefficient efforts. The Internet falls into the Third Industrial
Revolution, which occurred in the 1990s to early
○ Limited Budget: Financial constraints 2000s. Examples of hardware technologies from
that restrict investment in necessary this period include smartphones and networking
technologies, training, and resources devices, while software technologies include
web browsers and database management
for digital transformation. systems.
● Challenges for Developing Countries: 5. Is digital convergence that is happening in
○ Inadequate access to the latest devices good or bad? Justify.
Digital convergence can be viewed as both
technology good and bad. On the positive side, it simplifies
○ Insufficient telecommunications access to multiple functions through a single
infrastructure device, enhancing convenience and mobility.
However, it can also have negative impacts,
○ Low computer literacy such as disrupting work-life balance and
○ Cultural and socio-economic factors increasing the risk of digital addiction, as the
● Handling Challenges: easy availability of work tools can lead to
○ Strategies to manage these challenges constant connectivity and blurred boundaries
between personal and professional life.
in the digital economy are essential for 6. What is a digital economy? What are other
success. references to it? Think of an example of a
traditional economy that is now transformed
into a digital economy that is not mentioned
as examples in the video.
A digital economy, also known as the internet
★ ANSWERS TO STUDY GUIDE QUESTIONS ★ economy or web economy, refers to the
economic activities that result from the use of
1. CBIS digital technologies in business operations and
a system that utilizes computer technology to trade. An example of a traditional economy
collect, store, manage, and disseminate transformed into a digital economy is real
information, supporting decision-making and estate, where platforms like Zillow and Redfin
operations within an organization. have shifted property buying and selling
2. Five (5) components of a CBIS? Describe. processes online, facilitating virtual tours and
digital transactions.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

WEEK 4 - COMPUTER HARDWARE ● Represents the amount of space required to


store a single letter or symbol in a text
Types of Computer document.
● Example: The word "Hello" requires 5 bytes
1. Supercomputers (one byte for each letter).
★ Fastest and most expensive Kilobyte (KB)
★ Large
★ Used for: nuclear science, weather ● Kilobyte: 1,024 bytes (commonly simplified to
forecasting, rocket launching 1,000 bytes for ease of understanding).
★ Examples: summit, sierra, deep blue ● Approximately one-third of a page of text.
2. Mainframe computers
★ Designed to handle huge volumes of ● Example: A text file containing a short story
data and information might be around 10 KB in size.
★ Perform multiple instructions from ● Historical context: A 5.25-inch floppy disk
multiple users
★ Have multiple processors could hold 360 KB.
★ Typically used by large organizations Megabyte (MB)
★ Examples: IBM Z, UNIVAC ● Megabyte: 1,000 kilobytes.
3. Mini computers or midrange servers
★ Lie somewhere between ● Can store about one book, one photo, or one
supercomputers and mainframe minute of music, though this can vary based on
computers quality and encoding.
★ Used for: web servers, database, ● Example: A typical MP3 song is approximately
gaming servers
★ Examples: magnum, vax 3-5 MB.
4. Micro Computers ● Historical context: A 3.5-inch floppy disk
★ Are single user system used in home, introduced in the 1980s could hold 1.4 MB.
office, schools, shops
★ Types: personal, workstation, laptops, Gigabyte (GB)
mobile, embedded computers ● Gigabyte: 1,000 megabytes.
★ Personal/ desktop computers are most ● Can hold about 1,000 books, 1,000 photos, or
common. Used for browsing, gaming,
learning and business use. 16 hours of music.
★ Workstations: like desktop computers ● Example: A standard DVD holds about 4.7 GB
but have higher memory capacity and of data.
processing power. USed for animation,
designing, complex calculations. ● Context: By the mid-1990s, 1 GB hard drives
★ Laptops: portable computers. were sold for a couple hundred dollars,
Sometimes called notebook computers. whereas today, 1 GB is considered minimal
★ Mobile: gaming, video, cameras storage.
★ Embedded computers: TVs, watches,
cars, microwaves Terabyte (TB)
● Terabyte: 1,000 gigabytes.
● Can store about 1 million books (equivalent to
* DIGITAL STORAGE TERMS around 80 school libraries), 1 million photos, or
Binary System two years of continuous music.
● Digital storage uses a binary system where all ● Example: A modern external hard drive
data is saved as ones and zeros. typically offers 1-4 TB of storage.
● A bit (short for binary digit) is the smallest unit Recap of Data Measurements
of data in a computer. ● 8 bits = 1 byte
● Example: The binary representation of the letter ● 1,000 bytes = 1 kilobyte (KB)
'A' is 01000001. ● 1,000 kilobytes = 1 megabyte (MB)
Function of Bits ● 1,000 megabytes = 1 gigabyte (GB)
● Bits are used to store all kinds of information, ● 1,000 gigabytes = 1 terabyte (TB)
including: ● Larger Units
● Text documents, Digital photos, Sound (e.g., Following terabyte:
audio files) ● Petabyte (PB): 1,000 terabytes (e.g., large data
Byte centers).
● Byte: Composed of 8 bits.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

● Exabyte (EB): 1,000 petabytes (e.g., total data ■ CD-R: Recordable, can
stored by large tech companies). be written once.
● Zettabyte (ZB): 1,000 exabytes (e.g., global ■ CD-RW: Rewritable,
data generated per year). data can be written
● Yottabyte (YB): 1,000 zettabytes (theoretical for multiple times.
future data storage). ■ DVDs (Digital Versatile Discs):
Storage capacity nearly 10
times that of CDs, faster data
STORAGE DEVICES access.
■ DVD-R: Written once,
Overview of External Memory can be read multiple
● External memory, also known as storage times.
devices, is the hardware used to store data and ■ DVD-RW: Rewritable,
instructions for computers. data can be written
● Classified into two types: multiple times.
○ Primary (Internal) Memory: Directly ■ Blu-ray Discs: Use blue lasers
accessed by the CPU. for reading/writing, allowing
○ Secondary (External) Memory: Used storage of up to 25 GB.
for long-term data storage and backup, Available in dual-layer and
slower than primary memory but triple-layer formats for
permanent. increased capacity.
Characteristics of Secondary Memory 3. Flash Storage Devices
● Slower than primary memory. ○ Includes USB Flash Drives and
● Permanent data storage. Memory Cards (SD Cards).
● Facilitates data transfer between computers. ○ USB Flash Drive: Compact, portable
● Examples include floppy drives, CD drives, and device; stores data up to 1 TB. Typically
tapes. used for file storage and transfer.
Historical Context ○ Memory Cards: Used in cameras,
● The earliest storage device was the punch card smartphones, and gaming consoles,
made of paper. can store images and videos up to 128
Types of Storage Devices GB.
1. Magnetic Storage Devices ○ SD Cards: Available in microSD and
○ Hard Disks: Usually installed inside miniSD sizes.
computers, can also be portable. Emerging Trends
Contains spinning disks (platters) ● Increasing popularity of cloud storage, allowing
coated with magnetic material. access to data across multiple devices.
■ Components: Spindle, platters, ● Data stored online relies on a network of remote
and a magnetic head for servers, which may be magnetic or optical.
reading/writing data.
○ Floppy Disks: Used in early computers;
WHICH IS BETTER: WIRED OR WIRELESS?
available in sizes of 5.25 inches and 3.5
inches. Limited data capacity. ☆ Devices can connect to the Internet using
○ Pen Drives (USB Flash Drives): More either wired (Ethernet cable) or wireless
popular for portable data storage. (Wi-Fi) connections.
2. Optical Storage Devices ☆ Definitions
○ Types: Wired Connection: Physically connects a
■ CDs (Compact Discs): device to the Internet router using an Ethernet
cable. Common with stationary devices like
Portable, can store up to 700 desktop computers.
MB. Wireless Connection: Uses radio signals to
■ CD-ROM: Read-only connect devices to the Internet router.
Common with portable devices like tablets
memory. and smartphones.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

Factors to Consider ○ Directs data packets only to the


☆ Convenience: Wireless connections offer intended destination port.
more freedom of movement, especially for
mobile devices. Wired connections limit ○ Example: If Computer A wants to
device placement to the proximity of the communicate with Computer B, the
router.
☆ Physical Location: Wired devices must be switch will deliver the data
located close to the router due to the need for specifically to Computer B without
an Ethernet cable.If a device is far from the
router, long cables or in-wall wiring may be broadcasting it to all ports.
necessary. ● Advantages:
☆ Speed and Reliability
Speed: Wired connections generally offer ○ Reduces unnecessary traffic,
faster speeds compared to wireless, which making switches preferred over
are improving but still lag behind.
Reliability: Wired connections are more stable hubs for network efficiency.
as they provide a direct connection. Wireless
connections may face interference from other Comparison:
networks. ● Hubs detect only physical connections,
Opt for a wired connection when feasible for better while switches recognize specific devices
speed and reliability. Use wireless connections when via MAC addresses.
wiring is not practical, enjoying the convenience they
provide. Usage Context:
● Both hubs and switches are used for data
exchange within a local area network
HUB, SWITCH, AND ROUTER
(LAN), such as home or office networks.
Hubs
They do not handle data exchange beyond
● Purpose: Connect multiple network their own network (e.g., the internet).
devices in an internal network.
Routers
● Functionality:
● Purpose: Route data between different
○ Has multiple Ethernet ports for networks based on IP addresses.
device connections.
● Functionality:
○ Intelligence: Considered "dumb"; it
○ Inspects data packets and
cannot filter or direct data.
determines if they are meant for its
○ When a data packet arrives at one own network or another.
port, it is sent to all other ports,
○ If the packet is intended for its
making it visible to all devices
network, the router processes it; if
connected.
not, it forwards it to another
● Drawbacks: network.
○ Creates unnecessary traffic and ● Role: Acts as a gateway for data traveling
security concerns because all between networks.
devices receive every data packet,
● Example:
even if not intended for them.
○ In a private network (red network),
Switches
the router accepts data packets
● Purpose: Also connects multiple network only if their IP addresses match its
devices but with more intelligence. network. Packets from other
● Functionality: networks (e.g., yellow, blue) are
○ Learns and stores the MAC rejected.
addresses of connected devices in Data Exchange Between Networks:
a table.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

● When devices from one network (e.g., red) ○ Typically provided by telephone
want to communicate with devices on companies (e.g., AT&T).
another network (e.g., blue), their data Modem/Router Combos
● Many ISPs provide modem/router combination
packets must leave their local network.
devices, integrating both functions into one unit.
● The data packet goes to the network's Network Examples
router, which forwards it based on the IP 1. Home/Office Setup:
address, passing through multiple routers ○ Cable modem connected to a small
office/home office router, allowing
until it reaches the destination network. multiple devices to access the internet.
Conclusion: 2. DSL Setup:
● Hubs and Switches: Used for creating and ○ DSL modem connected to a small
office/home office router for multiple
managing local networks. device access.
● Routers: Connect different networks, 3. Business Network:
allowing for communication across the ○ Cable modem connected to a business
router for computers and servers.
internet.
4. Single Device Setup:
○ Direct connection of a single device to the
modem without needing a router.
Hubs and Switches
MODEM VS ROUTER ● Most routers include a built-in switch.
● Additional switches are only necessary if more
➔ Modem: wired connections are needed beyond what the
○ Function: Connects to the Internet router provides.
Service Provider (ISP) and brings internet Summary of Internet Connection Flow
into a home or business. 1. Internet: Contains multiple routers.
○ Signal Conversion: 2. Private Network:
● Converts analog signals from the ○ Incoming connection first goes to the
internet to digital signals for modem.
devices (demodulation). ○ Modem connects to the router with an
● Converts outgoing digital signals integrated switch.
from devices to analog signals ○ Internet is then distributed to all
for the internet (modulation). connected devices.
○ Terminology: "Modem" stands for
"modulator-demodulator."
➔ Router: NAS VS SAN
○ Function: Distributes internet connection
NAS (Network Attached Storage)
from the modem to multiple devices (e.g.,
computers, tablets, phones). ● Definition: A storage device designed to store data in
a centralized location accessible over a network.
○ Components: Typically includes a built-in
switch with multiple Ethernet ports and ● Functionality:
functions as a wireless access point. ○ Primarily used for data storage; does not
○ Need: A router is necessary when perform additional functions.
multiple devices need internet access; ○ Typically consists of multiple hard drives
otherwise, a single device can connect configured in RAID for redundancy.
directly to the modem. ○ Connects to a switch or router via a network
Types of Modems interface card.
1. Cable Modems: ● Accessibility:
○ Connect using coaxial cable. ○ Data can be accessed by various devices
○ Usually provided by cable TV companies (desktops, laptops, servers) as a shared
(e.g., Comcast). drive.
2. DSL Modems: ● Common Use:
○ Connect using standard phone lines. ○ Used in homes and small to medium-sized
businesses.
● Disadvantages:
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!
○ Single Point of Failure: If a component ○ NAS: More affordable, suitable for small to
(e.g., power supply) fails, all devices lose medium applications.
access to data. ○ SAN: High-cost solution designed
SAN (Storage Area Network)
for large organizations.
● Definition: A high-speed, dedicated network that
stores and provides access to large amounts of data.
● Functionality:
★ ANSWERS TO STUDY GUIDE QUESTIONS ★
○ Composed of multiple disk arrays, switches,
and servers.
1. Classification Hierarchy of Computers
○ Fault tolerant: Data is shared among several
(Excluding Supercomputers)
disk arrays; if one fails, data remains
accessible. ● Mainframe Computers
○ Servers access data as if it were on a local ○ Size: Large.
hard drive, not as a shared network drive. ○ Speed: High, with multiple
● Scalability: processors for handling numerous
○ Easily scalable; additional storage can be tasks simultaneously.
added without network interruption. ○ Tasks: Designed for large
● Connection: organizations to manage huge
○ All devices are interconnected using Fiber volumes of data and support multiple
Channel, a high-speed standard with
users concurrently (e.g., banking,
speeds from 2 Gbps to 128 Gbps.
government).
○ Alternatively, some SANs use iSCSI, which
is less expensive but slower than Fiber ● Mini Computers (Midrange Servers)
Channel. ○ Size: Medium, between mainframes
● Advantages: and microcomputers.
○ Not affected by local network traffic, thus ○ Speed: Moderate, capable of serving
avoiding bottlenecks. multiple users and applications.
○ Highly scalable and redundant. ○ Tasks: Used for web servers,
● Cost: databases, and gaming servers (e.g.,
○ Generally very expensive, mainly used by VAX, Magnum).
large companies and organizations.
● Micro Computers
Key Comparisons
○ Size: Small, typically single-user
● Purpose:
systems.
○ NAS: Centralized storage accessible over
the network. ○ Speed: Lower than mainframes and
○ SAN: High-speed network for large-scale minis; generally one processor.
data access. ○ Tasks: Personal use in homes,
● Architecture: schools, and offices. Includes:
○ NAS: Simple device with a focus on data ■ Personal/Desktop
storage. Computers: General tasks
○ SAN: Complex network of interconnected like browsing and business
devices for fault tolerance and speed. applications.
● Accessibility:
■ Workstations: Higher
○ NAS: Accessible as a shared drive.
memory and processing for
○ SAN: Appears as a local hard drive to
tasks like animation and
servers.
complex calculations.
● Scalability:
○ NAS: Limited scalability.
■ Laptops: Portable personal
○ SAN: Highly scalable without interruption. computers.
● Performance: ■ Embedded Computers:
○ NAS: Can suffer from bottlenecks due to Integrated into other devices
network traffic. (e.g., TVs, cars).
○ SAN: Dedicated network avoids such 2. Is a Supercomputer a Special Kind of
issues. Mainframe Computer?
● Cost:
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

● Justification: No, supercomputers and ○ Description: Connects computers


mainframe computers serve different over larger geographical distances.
purposes. Supercomputers are designed for ○ Use: Facilitates communication
extreme computational power and speed, between LANs across cities or
handling complex simulations (e.g., weather countries.
forecasting, nuclear science), while 7. Wired vs. Wireless Networking
mainframes focus on managing large ● Opinion: Wired is generally better due to:
amounts of data and multiple transactions ○ Speed and Reliability: Wired
simultaneously for organizations. connections tend to be faster and
3. PC Workstation vs. Regular Desktop PC more stable.
● Differences: ○ Security: Wired networks are less
○ Performance: Workstations have susceptible to interference and
higher memory capacity and unauthorized access.
processing power than standard ● Justification: While wireless offers
desktops. convenience and mobility, wired connections
○ Usage: Workstations are used for are preferable for high-performance needs
resource-intensive tasks such as and secure environments.
graphic design and engineering 8. Hub vs. Switch
simulations, while desktops are for ● Main Difference:
general computing tasks.
○ Hub: A "dumb" device that
4. What Does 'Bit' Stand For and Represent? broadcasts data to all ports.
● Definition: 'Bit' stands for binary digit. ○ Switch: An intelligent device that
● Representation: It is the smallest unit of data directs data only to the intended
in a computer, representing either a 0 or 1. recipient based on MAC addresses.
Bits form the basis of binary code used in ● Electricity Consumption: Generally,
digital data storage and processing. switches consume more electricity than hubs
5. Two Types of Computer Memory due to their processing capabilities, but the
● Primary (Internal) Memory: overall efficiency of switches reduces network
○ Characteristics: Directly accessed traffic.
by the CPU; volatile (data is lost when 9. Network Devices
power is off). ● Device for Creating a Network:
○ Examples: RAM (Random Access ○ Hub or Switch: Both can connect
Memory). multiple devices within a local
● Secondary (External) Memory: network.
○ Characteristics: Used for long-term ● Device for Inter-Network Communication:
data storage; non-volatile (data ○ Router: Allows networks to
remains when power is off). communicate with other networks by
○ Examples: Hard drives, SSDs, USB routing data based on IP addresses.
drives. 10. Why is a Modem Called as Such?
Comparison: Primary memory is faster but ● Explanation: "Modem" stands for
temporary, while secondary memory is slower but modulator-demodulator. It converts signals
provides permanent storage. between analog (from the ISP) and digital (for
6. Two Major Types of Network devices).
● Local Area Network (LAN): ● Device Connectivity: A modem can connect
○ Description: Connects computers multiple devices if connected to a router,
within a limited area like an office or allowing sharing of the internet connection.
home. 11. Can a Router Perform the Function of a
○ Use: Sharing resources and files Switch?
among connected devices. ● Justification: Yes, many routers have built-in
● Wide Area Network (WAN): switches that allow them to connect multiple
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

devices. They can route data between


networks and manage local data traffic
effectively.
12. Recommendation for Computer Storage
Solution (UP Cebu Lahug Campus)
● Appropriate Option: NAS (Network
Attached Storage).
○ Justification: NAS is suitable for a
campus setting due to its
cost-effectiveness, ease of use, and
centralized data access for multiple
users, making it ideal for educational
environments. SAN would be overkill
and too expensive for typical campus
needs.
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

WEEK 5 - COMPUTER HARDWARE CONT. CURRENT TRENDS IN COMPUTER HARDWARE


PLATFORM
Moore’s Law
1 Mobile Digital Platform
1. Understanding Computer Power ★ Alternatives to larger computers.
● Core Components: ★ Devices:
● Smartphones: Data
○ Built from integrated circuits (ICs) made
transmission and web
of transistors.
surfing.
○ Transistors manage electric current ● Netbooks: Lightweight
flow, enabling binary encoding of notebooks for wireless
information. communication and core
2. Moore's Law tasks.
● Definition: ● Tablets: Examples include
○ Observed in 1965 by Gordon Moore. iPads and eBook readers.
○ States that the number of transistors on ● Wearable Devices: Fitness
integrated circuits doubles trackers, smartwatches,
approximately every two years. etc.
● Significance:
2 Bring Your Own Device (BYOD)
○ Led to the co-founding of Intel. ★ Allows employees to use personal
○ Integral to the growth of the devices (smartphones, tablets) at
semiconductor industry. IN work.
3. Accuracy and Trends ★ Increases interest in personal
● Historical Accuracy: mobile device applications in the
○ Remarkably accurate from 1965 to workplace.
2013.
3 Consumerization of IT
● Recent Changes:
★ Technology originating in
○ Doubling period slowed to consumer markets that is
approximately every three years adopted by businesses.
post-2013. ★ Includes personal devices and
○ By 2015, about 30 million times more Software as a Service (SaaS).
transistors than in 1965.
4. Impact on Speed 4 Quantum Computing
● Performance Factors: ★ Enhances processing power using
○ Speed increase is influenced by: principles of quantum physics.
★ Can perform multiple operations
■ Clock speed.
simultaneously.
■ Heat emitted by processors. ★ Potential to solve problems
■ Chip size. millions of times faster than
● Example: current technologies.
○ Apple A8X processor (2014) has ~3
billion transistors; as powerful as the 5 Cloud Computing
fastest supercomputer from 1995. ★ Uses a network of remote servers
5. Consumer Technology hosted on the internet for data
storage, management, and
● Current Applications:
processing.
○ Powerful chips are integrated into ★ Types of Services:
devices like iPads for tasks such as web ○ Infrastructure as a Service
browsing and gaming. (IaaS)
● Exponential Development: ○ Platform as a Service
○ Highlights the advancement from (PaaS)
specialized scientific computing to ○ Software as a Service
general consumer devices. (SaaS)
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

★ Deployment Models: ○ A personal computer may suffice


○ Public Cloud: Owned by for small startups.
cloud service providers. ○ Growing businesses may need
○ Private Cloud: Operated
advanced equipment.
solely for one organization.
Staff Training
6 Virtualization ● New equipment may require training for
★ Presentation of computer
staff.
resources to be accessed without
restrictions based on physical ● Conduct an IT training and learning needs
configuration or location. analysis to determine necessary training.
★ Enables a single physical resource
Compatibility
to appear as multiple logical
resources. ● Ensure new or replacement hardware is
★ Reduces hardware and power compatible with existing systems.
expenditures. ● Assess overall costs; it may be cheaper to
7 Green Computing: install a new system than to upgrade.
★ Practices and technologies Security
focused on environmentally ● Theft or loss of hardware poses a risk to
friendly computing.
data security.
★ Promotes energy efficiency in the
design, manufacturing, and ● Implement measures to manage IT risks
disposal of hardware. and protect both hardware and data.
★ Recommendations:
Long-term IT Strategy
★ Use Energy Star devices.
★ Switch devices to safe mode. ● Consider future market changes,
★ Avoid leaving computers on employee needs, and products/services in
overnight. your IT strategy.
★ Choose high-performance,
power-saving devices. ● Integrate hardware refresh and software
rollout strategies.
● Keep a record of purchase dates and
HOW TO ASSES COMPUTER HARDWARE costs for accounting, tax, warranty, and
NEEDS insurance purposes.
Understanding Usage Hardware Life Expectancy
● Evaluate how computers will be used in ● Typical life expectancy: 3-5 years for
your business: hardware.
○ Tasks to automate: ● Hardware may need replacement after
record-keeping, payroll, invoicing, 3-4 years for PCs and 5 years for servers.
advertising. Disposal of Old Hardware
○ Basic requirements: networking ● Before disposal, securely delete
equipment, operating systems, confidential or sensitive data.
software. ● Methods include:
○ Business-specific needs: web ○ Securely wiping the data.
servers for e-commerce. ○ Physically destroying storage
Business Considerations drives.
● Different businesses have varying
hardware requirements:
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

★ ANSWERS TO STUDY GUIDE QUESTIONS ★ Consumerization of IT has benefits, such as increased


employee satisfaction and productivity by allowing
1. Is Moore’s Law Still Accurate Nowadays? the use of familiar personal devices. However, it
Moore's Law has slowed in its accuracy, transitioning poses security risks, as personal devices may lack
from a consistent doubling of transistor density every robust security measures, exposing organizations to
two years to approximately every three years since vulnerabilities. Managing the integration of personal
2013. This shift is largely due to physical limitations in and corporate devices can complicate IT
silicon technology and rising manufacturing costs. infrastructure, requiring careful oversight
While the historical significance of Moore's Law
remains, its applicability in the future is uncertain as
new computing technologies emerge. .

2. Decision Factors When Acquiring Computer


Hardware
● Usage Needs: Assess how computers will be
used for tasks like payroll and invoicing, along
with any specific requirements for your
business.
● Compatibility: Ensure new hardware works
seamlessly with existing systems to avoid
operational issues.
● Cost-Effectiveness: Weigh the costs of new
hardware against upgrading current systems;
sometimes a new system is more
economical.
● Security: Address risks of hardware theft or
loss to protect sensitive data.
● Long-term IT Strategy: Align hardware
choices with future business growth and
technological advancements.

3. Important Consideration: Staff Training


Staff training is crucial when selecting hardware.
Effective use of new technology depends on
employee proficiency; without proper training, new
systems may not be utilized fully. Conducting a
training needs analysis ensures staff are equipped to
maximize the benefits of new hardware, enhancing
overall productivity.

4. Current Trends in Computer Hardware Platform


Quantum computing is an exciting trend as it utilizes
quantum physics to significantly enhance processing
power and solve complex problems at unprecedented
speeds. This technology holds the potential to
revolutionize various fields, from scientific research to
data analysis. Its implications could redefine industry
standards and create new opportunities for
innovation.

5. Consumerization of IT: Good or Bad?


SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

WEEK 6 - SOFTWARE ■Backup Software: Creates


copies of information for
Computer Software and Its Types recovery (full, differential,
incremental backups).
Categories of Software ■ Antivirus Software: Protects
against viruses and malware.
1. System Software
■ Disk Defragmentation Tools:
○ Controls computer operations and
Organizes scattered files to
manages hardware and software.
improve efficiency.
○ Examples:
4. Application Software
■ Operating Systems: Windows
○ Software that performs specific tasks
10, Ubuntu, Linux, Mac OS X.
for users.
2. Application Software
○ Types:
○ Designed for specific tasks to aid users.
■ Customized Software: Tailored
○ Examples: for specific business needs
■ Media Players: Windows (e.g., Sampoorna for school
Media Player. management in Kerala).
■ Office Tools: Microsoft ■ Word Processing Software:
PowerPoint, Notepad, Paint. Tools for writing (e.g., Microsoft
Detailed Breakdown Word, Notepad).
1. Operating System (OS) ■ Graphics Software: Allows
○ A crucial part of system software that users to create and manipulate
enables the computer to function. images (e.g., Paint, Photoshop).
○ Analogy: Similar to how a motorbike ■ Desktop Publishing Software:
needs a driver to operate. For designing pages with text
○ Examples: Windows, Ubuntu, Linux, and images (e.g., Corel Draw,
Mac OS. PageMaker).
2. Operation Support System (OSS) ■ Multimedia Software: Used for
○ A system used by service providers to editing audio, video, and
manage network infrastructure and images (e.g., Adobe Flash,
deliver services. Adobe Premiere).
○ Functions: Backup Types
■ Network Management ● Full Backup: A complete copy of all selected
Systems: Monitors network data.
operations. ● Differential Backup: Copies data changed
■ Service Delivery: Deploys since the last full backup.
services to customers. ● Incremental Backup: Copies data changed
■ Service Fulfillment: Manages since the last backup, whether full or
network inventory, activation, incremental.
and provisioning.
■ Service Assurance: Ensures Open Systems
services meet quality
standards. is a computing environment that allows for the
■ Customer Care: Handles interoperability of hardware and software components. It
customer service and support. promotes transparency, flexibility, and user accessibility,
3. Utility Software enabling users to integrate various technologies and
○ System software designed to analyze, systems.
configure, optimize, or maintain a
computer.
○ Examples:
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

HOW DO OPERATING SYSTEMS WORK ○ Controls computer hardware.


○ Manages and allocates
➔ Purpose of Computers: Used for various resources (e.g., memory,
tasks such as: processing power).
○ Playing games ○ Provides a user interface.
○ Watching videos Operating System Startup
○ Running calculations ● The OS is one of the first programs to run
○ Communicating and when a computer is powered on.
collaborating ● Startup Process:
➔ Key Component: The operating system ○ The computer issues lines of code
(OS) is the essential program that as commands.
integrates hardware and software. ○ Prepares essential components
Historical Context like the display and network
● Early Computers: connections.
○ Could handle ~5,000 calculations ● Library of Commands:
per second. ○ The OS organizes common
○ Today's supercomputers perform commands into a "library" for
nearly 34 trillion calculations per other programs to access.
second.
● Programming Method:
○ Initially used punch cards
★ ANSWERS TO STUDY GUIDE QUESTIONS ★
(cardboard with holes).
○ Cards fed into the Central 1. What are the two major types of software?
Processing Unit (CPU), enabling Describe.
early batch processing. ★ System Software: This type of software
○ An operator was responsible for controls computer operations and manages
hardware and software resources. It includes
feeding cards and managing
operating systems like Windows 10, Ubuntu,
jams and scheduling. Linux, and Mac OS X, which are crucial for
Challenges the overall functioning of a computer.
● As computers become faster: ★ Application Software: Designed for specific
○ They could process tasks quicker tasks to assist users, application software
includes media players (e.g., Windows Media
than punch cards could be fed in.
Player), office tools (e.g., Microsoft
○ Variability in computer resources PowerPoint, Notepad), and graphics software
(e.g., RAM, printers) made it (e.g., Photoshop). It performs specific
complex: functions based on user needs.
■ Programmers had to write 2. What is the major reason why the OS was
created? Discuss.
different programs for
★ The operating system (OS) was created to
different machines.
manage the complexities of computer
Solution: Operating System (OS) operations and to provide a standardized
● Definition: A software that handles interface between users and the hardware. As
common tasks across various programs. computers became faster and more complex,
the OS streamlined operations by managing
● Functions of OS:
resources, allowing different programs to
SUPPLEMENTARY NOTES FIRST SEMESTER SAM!

work together efficiently, and providing a


user-friendly interface.
3. What differentiates between the system
software and the application software in
terms of its intended use? Explain.
★ System Software: Intended to control and
manage the computer hardware, system
software runs in the background to ensure
that the hardware operates efficiently. It
includes the OS and utility programs that
manage system resources.
★ Application Software: Intended for
end-users to perform specific tasks or
functions. It helps users accomplish activities
such as document creation, media playback,
or graphic design. Unlike system software,
application software is focused on user needs
rather than system management.
4. Why is it that you need an OS installed in
the computer before you can install and
use application software? Explain.
★ An OS is necessary before installing
application software because it provides the
environment and resources that applications
require to function. The OS manages
hardware resources, allocates memory, and
provides essential services such as file
management and user interface, which
application software relies on to operate
effectively.
5. What is the best analogy of an OS to a
human being? Justify.
★ The best analogy of an OS to a human being
is that of a driver operating a vehicle (e.g., a
motorbike). Just as a driver is essential to
control and navigate the bike, the OS is
crucial for managing and directing the
computer's operations. Without a driver, the
bike cannot function; similarly, without an OS,
the computer remains inoperative. The OS
directs the interaction between the user and
the computer hardware, much like how a
driver interacts with the vehicle's controls.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy