Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers Designed by Terry Wilhelmi Joseph Jacquard Jacquard’s Loom in 1810 Emphasized three computer concepts: 1. Instructions - used punched cards.

Similar presentations


Presentation on theme: "Computers Designed by Terry Wilhelmi Joseph Jacquard Jacquard’s Loom in 1810 Emphasized three computer concepts: 1. Instructions - used punched cards."— Presentation transcript:

1

2 Computers Designed by Terry Wilhelmi

3 Joseph Jacquard Jacquard’s Loom in 1810 Emphasized three computer concepts: 1. Instructions - used punched cards 2. Simple Program - series of instructions 3. Automate job - because of program

4 Charles Babbage Father of Computers Invented Analytical Engine in 1832 5 characteristics of modern computer  Input device – punch cards  Processor – mill  Control Unit  Storage Facility – store  Output device

5 Ada Augusta First Computer Programmer  wrote programs for Analytical Engine Her notes on the Analytical Engine used in future development of computers Gifted Mathematician

6 John Mauchly Presper Eckert ENIAC (Electronic Numerical Integrator & Computer) 1946 First electronic computer to go into operation Developed to determine artillery shell trajectories

7 A moth got caught in the MARK II and shorted out a relay Grace crawled in and removed it from inside the computer Popularized the term “bug” to signify any system failure The term “debugging” signifies solving a computer problem

8 John von Neumann EDVAC - first electronic computer to use stored-program “First Draft” – based on his concepts, all computers process data by carrying out four specific activities: Input data Store data Process data Output data/results This initiated the modern computer era.

9 Computer An electronic device that does computations and makes logical decisions according to instructions and data that have been given to it.  Accomplished by accepting input, processing it according to instructions, storing the data, and producing the requested results (output). Three basic functions:  Arithmetic operations – add, subtract, multiply, divide  Logical comparisons of values - >,, >=, <=  Storage and retrieval operations

10 AdvantagesLimitations Speed Speed  Billions of operations per second Accuracy Accuracy  Durability and reliability of its circuitry Storage Capabilities Storage Capabilities  Stores large amounts of data that can be retrieved quickly Unable to think and build on past experiences Not suited for tasks that involve complex decision making

11 Internal Representation of Data Input Input  Data that is put into the computer for processing Data Data  The raw material to be processed by a computer Information Information  Data that is organized, meaningful, & useful To be useful, information must be: To be useful, information must be:  Complete, accurate, relevant, & timely

12 Pioneers George Boole George Boole  1800’s  Boolean mathematics  Human reason could be reduced to yes/no questions George Shannon George Shannon  1937  Used Boolean logic to wire electrical switching

13 Binary Number System Electrical circuits/switches have one of two states – on or off (light switch) Binary System (Base of 2) – uses two numbers to represent the states: 1 for ON and 0 for OFF Bit (Binary Digit) – each 1 or 0 Byte – an 8-bit unit that represents one character

14 Decimal to Binary There can be as many 0’s and 1’s as required within eight places to represent a particular character

15 ASCII Code American Standard Code for Information Interchange Small computers use ASCII code to convert characters into the machine language of 1’s and 0’s. Conversion is handled by the computer system’s input and output devices

16 Crimes Using Computers Computer Crime Computer Crime Theft of Services Theft of Services Theft of Property Theft of Property Financial Crimes Financial Crimes Software Software

17 Computer Crime A criminal act that is accomplished through the use of a computer A criminal act that is accomplished through the use of a computer A criminal act that poses a greater threat to a computer user than it would to a non-computer user A criminal act that poses a greater threat to a computer user than it would to a non-computer user Kinds of activity: Kinds of activity:  Perpetrate acts of deceit, theft, or concealment to provide financial, business-related, property, or service advantages  Threats to computer itself – sabotage, theft

18 Theft of Services Using a company’s computer after working hours Using a company’s computer after working hours Obtaining inside information on a business/corporation Obtaining inside information on a business/corporation Making unauthorized changes to data (grades) Making unauthorized changes to data (grades) Theft of valuable computer time and the data stored on the system Theft of valuable computer time and the data stored on the system

19 Theft of Property Computer itself Computer itself Computer parts for assembly later Computer parts for assembly later Stealing merchandise from a company whose orders are processed by computers Stealing merchandise from a company whose orders are processed by computers Software Software Illegally copying software, music, etc. Illegally copying software, music, etc.

20 Financial Crimes Creating illegal checks by an employee Creating illegal checks by an employee “Round-off fraud” – an employee collects the fractions of cents in customers’ accounts due to applicable interest rate allocations “Round-off fraud” – an employee collects the fractions of cents in customers’ accounts due to applicable interest rate allocations

21 Software Software piracy – stealing commercial software either outright or illegally copying it for personal use or for resale Software piracy – stealing commercial software either outright or illegally copying it for personal use or for resale Commercial software – software ordinarily purchased at a store, via Internet or mail Commercial software – software ordinarily purchased at a store, via Internet or mail  Copyrighted – we purchase right to use software  Constitution in 1790 – protects rights of authors  US Copyright Office & courts in 1964 – established that computer programs are the “writing of an author”

22 Laws Copyright Act of 1976 Copyright Act of 1976  “It is illegal to make unauthorized copies of a copyrighted computer program.” Software Piracy and Counterfeiting Amendment of 1983 Software Piracy and Counterfeiting Amendment of 1983  Added to the Copyright Act of 1976  Commercially copying and selling pirated software is a felony

23 Security Issues in Workplace Safeguards designed to protect a computer system and data from deliberate or accidental damage or access by unauthorized persons. Safeguards designed to protect a computer system and data from deliberate or accidental damage or access by unauthorized persons. Dishonest employees sell information to competitor Dishonest employees sell information to competitor Employee carelessness/poor training causes damage to computer hardware, software, and data Employee carelessness/poor training causes damage to computer hardware, software, and data Infecting computer systems with destructive viruses Infecting computer systems with destructive viruses Sabotage Sabotage

24 Privacy and Confidentiality of Information Privacy – keeping personal information personal; protecting it from improper use Privacy – keeping personal information personal; protecting it from improper use Computer Fraud and Abuse Act (1986) Computer Fraud and Abuse Act (1986)  Obtaining records from financial institutions Electronic Communication Privacy Act (1986) Electronic Communication Privacy Act (1986)  Prohibits the interception of data communications Computer Matching and Privacy Protection Act (1988) Computer Matching and Privacy Protection Act (1988)  Regulates use of data for eligibility of federal benefits

25 Ethics A set of moral principles or values that are designed to guide human conduct A set of moral principles or values that are designed to guide human conduct  Dealing with what is good and bad, ethics represents a pattern of personal conduct that is acceptable to society Computer ethics Computer ethics  The standard of moral conduct in computer use  A way in which the “spirit” of laws can be carried to other computer-related activities Individual license - use only one program on one computer at a time Individual license - use only one program on one computer at a time

26 Ethical Responsibilities of a Programmer Increased use of computers to control potentially dangerous devices such as aircraft, nuclear reactors, or sensitive medical equipment places a strong ethical burden on the programmer to insure, as best as he orshe can, the reliability of the computer software.

27 Ethics A set of moral principles or values that are designed to guide human conduct

28 Control Frustrations


Download ppt "Computers Designed by Terry Wilhelmi Joseph Jacquard Jacquard’s Loom in 1810 Emphasized three computer concepts: 1. Instructions - used punched cards."

Similar presentations


Ads by Google