Chapter 1: Introduction

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Chapter 1:Introduction to the world of computers
FUNDAMENTALS OF COMPUTER SYSTEMS OCR GCSE Computing.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Computer Science and Computer Engineering. parts of the computer.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Legislation in ICT.
Chapter 1 - Introduction to Computers and the Internet Basic functions of a Computer Input – entering info into the computer (e.g. keyboard, mouse, mic,
B1051 Fundementals of Information Technology (Intro)
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Lecture # 1 M.Sc / BS(CS)/ BS(I.T) DPT www. Shahid Rasul.com.
Definition and Importance of Computer
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Chapter 1- Introduction
Introduction to Computers
Introduction to Computers
General Purpose Packages
Computer Hardware and Software
INTRODUCTION TO COMPUTING
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Business Computer Information Systems I.  Knowing how to use a computer is a basic skill necessary to succeed in business or to function effectively.
Week 1 Review of Computer Concepts. Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer.
IT Introduction to Information Technology CHAPTER 01.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 1: Introduction Omar Meqdadi SE 2730 Lecture 1 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 2 Hardware. Learning Objectives Upon successful completion of this chapter, you will be able to: describe information systems hardware; identify.
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Chapter 2: Memory.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Computer Basic Vocabulary
Unit 22 People in Computing
Computing and Information Science 1 Databases START.
GCSE COMPUTING Lesson 4. Computer systems What is a system? InputsOutputs Processes System boundary.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Copyright©2008 N.AlJaffan®KSU1 Introduction to Computers Created By: N.AlJaffan Modified By: N.AlShehri Chapter 1.
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Lesson Objectives To understand why computer systems must be reliable To investigate the consequences of an unreliable system.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Chapter 1 WHAT IS A COMPUTER Faculty of ICT & Business Management Tel : BCOMP0101 Introduction to Information Technology.
Chapter 1 Objectives Define the term, computer Identify the components of a computer Discuss the advantages and disadvantages of using computers Recognize.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
FUNDAMENTALS OF COMPUTER SYSTEMS Lesson 1. Starter What is the difference between hardware and software?
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Lesson Objectives To understand environmental, legal and ethical considerations of computing To understand the importance of different types of industry.
Legislation in ICT.
Computer Hardware-Meeting the machine
Introduction to Computing
* 07/16/96 CMPE 101 Introduction to Information Technologies Chapter 1: Computers and You Copyright © 2012 Pearson Education, Inc. Publishing as Prentice.
Basic Introduction to Computers
Chapter 2: Input and output devices
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Chapter 1 – Introduction to Computers
Chapter 1: Introduction
Legislation in ICT.
Presentation transcript:

Chapter 1: Introduction OCR GCSE Computing Chapter 1: Introduction

Index to topics Systems Embedded systems Reliability Standards Regulation Environment

Chapter 1: Systems What is a system? A system is a collection of parts that work together for a common purpose. For a system to be useful, it must produce something – an output. It needs to receive and process inputs in order to produce outputs. INPUT PROCESS OUTPUT

Press key on controller Chapter 1: Systems Enquiry, deposit Search, make booking Tickets, reservations Examples of systems Holiday booking system: Computer game: Press key on controller Work out movement Changes to screen

Chapter 1: Systems Computer systems are based on processing data and producing information. They are fast, and the important thing about them is that they are programmable. Computer systems are found in most electronic gadgets. For example, washing machines, cameras, burglar alarms and telephones

Chapter 1: Systems Computer systems used in electronic gadgets have all of the basic functionality that drives a desktop PC. There are input and output devices, storage, a processor and, most importantly, software. INPUTS OUTPUTS

Chapter 1: Systems This washing machine has various input devices: Buttons, Sensors including weight, temperature, water-level & Door sensor PROCESS It uses the data from these inputs to calculate the water temperature, steps to follow, time to complete the program etc. OUTPUT And it outputs information on a display and by using ‘beeps’ played through a speaker

Chapter 1: Embedded Systems Software that is programmed to carry out a number of dedicated functions. For example, the software to run a washing machine is stored on a computer chip and embedded into the system.

Chapter 1: Embedded Systems Control systems can be quite complex, for example an engine management system.

Chapter 1: Embedded Systems A typical engine management system in a car has over 50 processors, which explains why car engine faults can be difficult to trace without the right equipment. The embedded systems in a car look after various safety features and it is easy to see why these must be reliable and thoroughly tested, both as individual items and as integrated systems.

Chapter 1: Reliability Use of and reliance on computer systems Computer systems are important and are involved in most human activities: Safety Travel Business Entertainment Education Science Given our dependence on them, it is vital we are able to trust in the reliability of these systems.

Chapter 1: Reliability IT failures can be catastrophic and expensive. Air travel makes extensive use of computer systems. If these fail, then lives are put in danger: On 7th October 2008 an airbus operated by Quantas started to pitch violently because of a fault in an inertial reference sensor, causing the auto-pilot to try to correct suddenly. Fortunately there were few major injuries on this occasion. The problem was caused by faulty data sensors providing incorrect information to an automatic control system.

Chapter 1: Reliability Badly designed IT systems failing to achieve the desired result can cost millions or even billions of pounds that cannot be recovered. http://www.information-age.com

Chapter 1: Reliability Thorough analysis of the situation and thorough testing of the system are essential parts of the process to avoid such dangers. The NatWest banking system failure was, according to one banking technology specialist, such a failure: the glitch was almost inevitably caused by the introduction of a change. "This would be either a software or hardware upgrade to either the bank's payment processing systems or the mainframe systems that handle the actual account data. If an upgrade is not sufficiently tested first, then this sort of problem occurs.” (David Silverstone NMQA, Guardian 22/06/12)

Chapter 1: Standards Standards agreed by the IT industry are an essential element of system design and development. “ICT standards are tools that help vendors—including hardware and software providers—develop products and services that work together and enhance interoperability among different technologies and processes.” (Microsoft) Open standards are agreed so that community developers can modify source code freely available in the public domain, and do so effectively.

Chapter 1: Standards Hardware standards allow the interconnection of devices; Software standards allow software to share data efficiently; Some standards simply develop through common usage, eg HTML and PDF.

Chapter 1: Standards Hardware standards allow devices to connect: used to connect printers, cameras, mobile phones and other computer peripherals USB used to connect entertainment systems and monitors HDMI standard connector to connect to wired network points RJ45

Chapter 1: Standards Hardware standards go beyond simply connecting peripheral devices. Standards exist for all aspects of computer hardware, including: Visual displays and ports; Internal connections such as SATA or PCI; Hard drive characteristics; Motherboard architecture; Processor specification.

Chapter 1: Standards Software standards include agreement on various file types, enabling software to use data from other systems effectively: For example, a number of image file types exist including png, jpeg, GIF, TIFF and various others. Knowing what to expect in such a file makes it possible for software packages to deal with them.

Chapter 1: Standards Some software standards are designed, such as the Joint Photographic Experts Group image type or JPEG. Others develop through common usage such as HTML (hypertext markup language), and PDF, (portable document format). In order to communicate, share data and be compatible, most software dealing with word processed documents or spreadsheet files will understand the .doc and .xls file types.

Chapter 1: Standards Open standards provide various benefits: Application independence: access to resources is not dependent upon a single application. Platform independence: access is not restricted to a specific hardware platform. Long-term access: resources are openly developed and updated.

Chapter 1: Standards Developers working on open source material are encouraged to cooperate and share ideas with others, because: Open standards are maintained by not-for-profit organisations, which ensure open decision-making about developments; Access to the resources is freely available to all on a royalty free basis; There are no constraints on the re-use of the standard.

Chapter 1: Regulation IT systems store vast amounts of data about individuals. If this data is not correct then there may be serious consequences: If credit information is incorrect, then there may be problems obtaining a mortgage or bank account. If an individual is associated incorrectly with a crime, then obtaining employment may be impossible.

Chapter 1: Regulation If data is lost or stolen then there may well be issues with identity theft: Following a security breach at an American data broker in 2005, a Connecticut salesman had his identity stolen. The thief bought cars, motorcycles, furniture and other items under the salesman’s name over four months, spending $265,000. The victim has spent over 2,000 hours trying to reclaim his life after having his identity stolen. There are around 10 million cases of identity theft in the USA every year.

Chapter 1: Regulation Data is valuable and must be protected, and the Data Protection Act attempts to regulate organisations that store data. Data should: be processed fairly and lawfully; be obtained for a specified and lawful purpose and used accordingly; be limited to the specified data, be accurate, and up to date; be kept only for as long as necessary for the specified purpose; be kept securely; not be transferred outside the EU.

Chapter 1: Regulation A news article from techweekeurope.co.uk, August 2012, contains the following: The Metropolitan Police Service has arrested a former Times journalist in an investigation into computer hacking offences. The Met said a 28-year-old man had been arrested at his home address in North London this morning as part of Operation Tuleta, the investigation into criminal breaches of privacy including computer hacking, running alongside the phone-hacking scandal investigation. He was arrested for suspected offences under the Computer Misuse Act 1990, and suspected conspiracy to pervert the course of justice.

Chapter 1: Regulation The Computer Misuse Act became law in 1990 and covers four major offences: Unauthorised access to computer material; Unauthorised access with intent to commit or facilitate a crime; Unauthorised modification of computer material; Making, supplying or obtaining anything which can be used in computer misuse offences.

Chapter 1: Regulation The Computer Misuse Act covers: illegal access and the associated privacy issues; phishing for personal details; keylogging software to obtain information about what a user is entering on their keyboard; introducing viruses and other malware into a computer system.

Chapter 1: Regulation Intellectual Property Developers spend a lot of time and money creating applications. If people share this software then the developer will not recoup the costs of development and will not be able to continue developing software. Estimates suggest almost half of all software is copied, costing thousands of jobs and billions of pounds in revenue. The Copyright, Designs and Patents Act protects intellectual property by making it illegal to copy software or music, images or photographs from the web, or to copy text from web pages to use as your own work.

Chapter 1: Regulation Organisations working with computer professionals seek to maintain standards of conduct by introducing voluntary codes of practice. Typically, these will provide guidance on acceptable behaviour, including: Acceptable use policies; Netiquette; Rights and responsibilities; Good practice.

Chapter 1: Environment Computer hardware disposal Some of these are: Computer hardware components contain various toxic substances that must be disposed of carefully. Some of these are: Substance Main use Environmental impact Lead PCB soldering, CRT monitor screens Accumulates in the environment and is toxic to humans, plants and animals Arsenic Transistors and PCBs Damage to skin and nervous system and can cause lung cancer. Mercury Sensors and switches Can cause chronic brain damage. Plastics including PVC Cabling and computer cases Connected to various cancers

Chapter 1: Environment Computer Hardware Recycling Computers also contain some valuable substances that should be recycled, including: Copper in circuit boards and wiring; Gold on circuit boards and in connectors; Metals like zinc, cadmium, mercury – these can be recycled to reduce the demand for extracting them from new sources on the planet; Plastic – this can be recycled, reducing the demand for petroleum from which it is made.