Computer concepts
Hybrid computers
Machines that incorporate in a single computer both the analog and digital features. These computers are used in working out special types of problems in science and various areas of engineering, such as space vehicle simulations and training of astronauts.
Republic Act No. 8293 - Intellectual Property Code of the Philippines
Philippine copyright law for literary and artistic works also protects patents and trademarks
Hardware
Refers to the physical component of the computer system.
Peopleware
Represent the personnel involve in system analysis, programming, computer operation, system maintenance, the enduser, and the like.
Output
Results are collected
Data processing
The manipulation of raw data into a more useful form called information.
Data processing
The modern name of paperwork and involves collection, processing and distributing of facts and figures to achieve a desired result.
Secondary storage device
The physical devices are physically separated but connected directly to the CPU through a communication line so that programs or data can be accessed with almost no intervention from human operator
Manual data processing
The processing of data manually or through mechanical devices.
Electronic data processing
The processing of data through the use of computers.
Software privacy
The unauthorized copying of software or any intellectual property
Super computers
These are the biggest and fastest machines today where numerical computations are carried out at speeds of up to 50 million operations per second.
World Intellectual Property Organization (WIPO).
This organization was founded in 1967 as one of the specialized agencies of the United Nations organizations, and it has since remained responsible for the protection of intellectual property.
Hacking
To modify a program, often in an unauthorized manner, by changing the code itself.
Manual & Electronic Data processing
Types of data processing
On-Line processing
Uses device directly connected to the CPU either for data entry or inquiry purposes.
Gigabyte (GB)
a billion bytes or 1,073,744,824 bytes
megabyte (MB)
a million bytes or 1,048,576 bytes
John Brunner
a novel entitled the "Shockwave Rider" coined the term "worm" by using it to describe a particular program that circulates itself through a computer network.
RAM (random access memory)
a place where the programs and software we load gets stored.
Scavenging
a simple search to company trash cans and dumpsters for printouts containing no - for - distribution information.
Hertz(Hz)
a single clock cycle per second
salami technique
a technique that reflects the small "slices" of money that may be squirreled away undetected from a large financial system.
Terabyte (TB)
a trillion bytes or 1,009,511,627,776 bytes
Bit (binary)
either ON (1) or OFF (0)
Nibble
group of 4 bits.
Byte
group of 8 bits.
Frederick Cohen
he used the term virus in order to explain when a particular computer program is able to infect additional computer programs because it was capable of replicating itself.
John Walker
he wrote the ANIMAL for the UNIVAC 1108. This became known as on of the first non-malicious Trojans. It spread to other UNIVACs when computer users discovered the game due to overlapping permissions. It was also spread by sharing tapes.
Input
initial data is entered. it is how we input data
Store
input data and results are stored for future use. For us to reuse the data. Saving time and effort.
Processing
input data is changed and is usually combined with other information.
Software
instructions that tell the computer what to do.
ILOVEYOU worm
is a computer worm purportedly created by a Filipino computer science student. Written in VBScript, it infected millions of Windows computers worldwide within a few hours of its release. Using social engineering techniques, it is considered to be one of the most damaging worms ever.
Microcomputers
is a digital computer system that uses a microprocessor (the CPU on a chip), a programmable ROM and a RAM. Basically designed for hobbyist.
Computer
is an electronic device designed to accept data, process data based on stored instructions, store data so that useful information can be generated.
Computer
is an electronic device designed to manipulate data so that useful information can be generated.
BPS (Bytes per second)
is used to measure modem speeds.
control unit
it acts as a supervisor that controls and supervises the operation in the CPU
Copyright implementation
it is done with the coordination of the Intellectual Property Office or IPO and the Copyright Division of the National Library of the Philippines.
Clock speed
it is how fast a computer processes
Primary storage device
it is the computers main memory.
Memory unit
it is the storage device of the computer.
ROM ( read only memory)
it is where the CPU fetches or reads instructions.
Arithmetic logic unit (ALU)
it performs the mathematical and logical operations of the computer system.
Denial of service (DoS) attack
occurs when hackers bombard a site with more requests for service that it can possibly handle, preventing legitimate users from accessing the site.
Ordinary users
people who uses computer on day to day basis.
Information
process data, e.g. number of students, average age, number of male students, highest score in a quiz
System software
programs which control and assist in the computer operation. (e.g. operating system, compilers, utility programs, etc.) *classification of software*
Application software
programs which provide a solution to a specific operation or application. (e.g. business software, desktop publishing, Office productivity, etc.)
Data
raw fact, e.g. name, age, sex, score
data diddling
refers to changing data before or as it enters the system.
ethics
refers to the rules and standards governing the conduct of an individual with others.
Worm
similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action; takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
false
t/f? A computer can come out with an original "decision."
true
t/f? A computer cannot correct wrong instructions.
true
t/f? A computer cannot derive meanings from objects
true
t/f? A computer has dependence on prepared instructions
true
t/f? A wireless mouse and keyboard run on batteries and communicate with the computer the same way a remote control communicates with a television.
false
t/f? The computer can generate information on its own.
false
t/f? analog, digital and hybrid computers are classified according to their capacity.
True
t/f? notebook computers are low-end functional, computers (cheap PCs), fully-powered PCs, workstations
Digital computers
they are computers that specialize in counting or discrete values such as business systems.
optical mouse
type of mouse that operates by using an infrared sensor. You can identify an optical mouse by the telltale red glow emanating from its underside.
Republic Act No. 10175
"Cybercrime Prevention Act of 2012" Approved by Pres. Benigno Aquino on Sept. 12, 2012
Republic Act No. 8792
"Electronic Commerce Act of 2000" approved by Pres. Joseph Estrada in June 14, 2000. -An Act Providing For The Recognition And Use Of Electronic Commercial And Non -Commercial Transactions And Documents, Penalties For Unlawful Use Thereof And For Other Purposes
Richard Skrenta
"Elk Cloner" for the Apple II Systems was created by ________ . It infected the Apple DOS 3.3 and spread to other computers by floppy disk transfer. The "Elk Virus" was responsible for being the first computer virus to cause a massive outbreak ever in history.
Republic Act No. 10844
-Department Of Information And Communications Technology Act Of 2015 -Approved by Pres. Benigno Aquino on May 23, 2016 -An Act Creating The Department Of Information And Communications Technology, Defining Its Powers And Functions Appropriating Funds Therefor, And For Other Purposes
Mini Computers
-These are increasingly powerful and do almost anything that large computers do, only more slowly and at much lower cost. -This makes it ideal for small companies where capacity and speed of operations is not highly critical.
Mainframes
-These computers are the ultimate in sophistication, flexibility and speed. -These are very expensive machines and their main concern is to prove their cost effectiveness. -These computers are valuable to the larger firms which can provide both skilled programmers and continuous applications, involving thousands of employees and hundreds of thousands of customer accounts on a daily basis.
Midrange computers
-These computers provide greater operating speed, larger memory capacity, and high-speed input-output devices than the mini-computers and microcomputers. -It have a unique feature called virtual memory by which the main memory capacity is made to appear larger than the actual size.
CPU (central processing unit)
-This is the brain of the computer. -All operations performed by the computer system are controlled by this physical device. -This is sometimes referred to as the processor or central processor. -This is the most important element of a computer system
End users
-specialized user -The user of Information System.
Megahertz (MHz)
1 million cycles per second.
kilohertz (kHz)
1000 cycles per second.
kilobyte (KB)
1024 or 210 bytes
according to: purpose, data handled, capacity
3 Classifications of computer
computer ethics
A code of ethics provides direction for computer professionals and users so that they act responsibly in their application of information technology.
Copyright
A form of protection provided by laws to the authors of original works, or owners of intellectual property.
Recording, Storing, retrieving, selecting/classifying, sorting, computing
Basic data processing activity.
etc.
Capabilities of a computer
etc.
Characteristics of computer.
Hardware, Software, Peopleware, Data / information, Procedures
Computer system components
Analog computers
Computers commonly used for scientific and engineering problems, particularly in chemical industries, electric power plants, and petroleum refineries.
Batch processing
Data are collected by groups to permit convenient, efficient and serial processing.
Input, Processing, Store, Output
Data processing cycle
Batch, On-Line, Real-Time Distributed processing
Data processing methods
Distributes processing
Generally consists of remote terinals linked to a large central computer systems to help the user conduct inquiries about accounts, process jobs or other data processing operations.
Specific purpose
Handles specific problem or to perform a specific task. (e.g. those used for collecting highway tolls, airline reservations, satellite tracking, air traffic control and industrial process control).
General Purpose
Handles variety of different problems and to meet different needs (e.g. varied business applications such as payroll, accounts receivable, inventory control, budgeting and sales analysis)
Real-Time processing
Has a capability of fast response to obtain data from an activity or a physical process, perform computations and return a response fast enough to affect the outcome of the activity or process.
John von Neumann
He wrote an article the entitled "Theory of Self-Reproducing Automata" This was based his lectures he had held 18 years earlier on this theory.
SINGLE-CHIP PROCESSOR or a SYSTEM-ON-A-CHIP
aka Microcomputers
Love bug worm
aka as ILOVEYOU worm
auxiliary devices
aka as secondary storage
Piggybacking
an illicit user "rides" into the system on the back of another user.
Trojan Horse
appears to be useful software but will actually do damage once installed or run on your computer. Once activates, results may vary; from annoying (changing the desktop or adding silly icons) to serious (deleting or destroying files); can also create backdoor to your computer, allowing malicious access to your confidential or personal information.
Virus
attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels; can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files; Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
Bomb
causes a program to trigger damage under certain conditions; it is usually set to go off at a later date.
Intellectual property
creations of the human intellect and their protection, usually by copyright which includes: literary, artistic, and scientific works performances of performing artists, phonograms, and broadcasts inventions in all fields of human endeavor scientific discoveries.