Download presentation
Presentation is loading. Please wait.
1
Chris McDougall cmcdougall@dccc.edu 610-209-5031
2
2 Office Hours Hours can be arranged set up an appointment
3
BECOMING COMPUTER LITERATE © 2009 Prentice-Hall, Inc.3 Technology in Action Book– Chapter 1
4
a. Germany b. Japan c. The U.S. d. South Korea © 2009 Prentice-Hall, Inc.4
5
5
6
6
7
7
8
8
9
9
10
10 What Is Computer Literacy? To be computer literate you must:To be computer literate you must: –Understand a computer’s capabilities and limitations –Know how to use a computer 1-3
11
Avoid hackers and viruses Protect your privacy Do you know how to protect your self from identity theft? Understand the real risks © 2009 Prentice-Hall, Inc.11 Being a Savvy Computer User and Consumer 1-4
12
Use the Internet wisely Avoid online annoyances Maintain your computer Make good purchase decisions Integrate the latest technology © 2009 Prentice-Hall, Inc.12 Being a Savvy Computer User and Consumer 1-4
13
© 2009 Prentice-Hall, Inc.13
14
Why Computers are important in EVERY Career? Computer careers in: Business Retail Shipping Arts Education © 2009 Prentice-Hall, Inc.14 Medicine Law Enforcement Legal System Agriculture Sciences 1-5-21
15
© 2009 Prentice-Hall, Inc.15 Computers in Business Data mining:Data mining: searching huge amounts of data for a patternsearching huge amounts of data for a pattern Example: Amazon and NetflixExample: Amazon and Netflix Items thought aboutItems thought about Past purchasesPast purchases GeographyGeography Results: coupons, suggestions Results: coupons, suggestions
16
© 2009 Prentice-Hall, Inc.16
17
© 2009 Prentice-Hall, Inc.17 Computers in Retail PSS: Personal Shopper Systems is a handheld computer – scans labels and picks up informationPSS: Personal Shopper Systems is a handheld computer – scans labels and picks up information Check prices, offers discounts, videosCheck prices, offers discounts, videos Coordinates with inventory and checkoutCoordinates with inventory and checkout
18
© 2009 Prentice-Hall, Inc.18 Computers in Shipping Package tracking software, databases, Maxicodes, infrared scannersPackage tracking software, databases, Maxicodes, infrared scanners Blue tooth: wireless communication transmits scanned dataBlue tooth: wireless communication transmits scanned data Maxicode: smart label that resembles an inkblot contains information about the packageMaxicode: smart label that resembles an inkblot contains information about the package
19
Web site galleries Virtual dance Computer- generated art © 2009 Prentice-Hall, Inc.19 Computers in the Arts
20
Computer Gaming Careers Computer games developed by the same culture Game Programming Game Artist © 2009 Prentice-Hall, Inc. 20
21
Computers in Education Computers in the classroom - tools Distance education Computerized research The Internet PDA (Personal Digital Assistant)- carry digital information for guided tours © 2009 Prentice-Hall, Inc.21
22
© 2009 Prentice-Hall, Inc.22 Computers in Law Enforcement Computers forensics: using computer systems to gather potential legal adviceComputers forensics: using computer systems to gather potential legal advice Databases: storing criminal informationDatabases: storing criminal information detect patterns detect patterns forecast criminal activity forecast criminal activity Wireless networksWireless networks intercept e-mail intercept e-mail chat sessions chat sessions
23
© 2009 Prentice-Hall, Inc.23 Computers in Law Enforcement Forecast Crime?? One study used was able to predict criminal activity before it happened 80% of the time By studying leading indicators that trigger crimes By studying leading indicators that trigger crimes Computer forensics is a growing field
24
© 2009 Prentice-Hall, Inc.24 Computers in the Legal System Surveillance cameras capture crimesSurveillance cameras capture crimes Forensic animations are extremely detailed and accepted in courtForensic animations are extremely detailed and accepted in court High-tech courtroomsHigh-tech courtrooms Handheld wireless devices used to display evidenceHandheld wireless devices used to display evidence
25
Computers in Agriculture Programs assist in managing complex farming business and information systems RFID: Radio Frequency ID tags track when an animal passes certain feed locations does not hold digital information minimize disease outbreaks Computerized sensors and equipment activation - protect crops – measures temperature, rainfall, wind © 2009 Prentice-Hall, Inc.25 EZ Pass
26
Patient simulators - life size mannequins used by medical students Surgical robots – delicate and precise incisions Physiome Project - realistic computer simulations of the human anatomy © 2009 Prentice-Hall, Inc.26 Computers in Medicine
27
VeriChip: is a personal id chip Size of a piece of grain implanted under the skin When exposed to radio waves, transmits information Non-implant versions are used in some hospitals – HALO infant protection system © 2009 Prentice-Hall, Inc.27 Computers in Medicine
28
Simulations Supercomputers used to create simulations: Archeology – recreate historic sites - Pompeii Meteorology – tornado forecastingi © 2009 Prentice-Hall, Inc.28
29
Computers in Sports Improved training Data storage and statistics Smartballs: using a circuit chip and radio signals. senses when soccer goals are scored © 2009 Prentice-Hall, Inc. 29
30
Nanotechnolgy Nano: one-billionth Example: Nanometer is one-billionth of a meter Nanotechnology: science of using nanostructures to build extremely small devices Enhance fibers with a coating to repel stains, wrinkles Potential Deliver precise doses of drugs Lead to computers the size of a pencil eraser © 2009 Prentice-Hall, Inc. 30
31
Affective Computing Research Computing that relates to emotion or tries to influence emotion Project: Emotional-Social Prosthesis (ESP) device Helping people with autistics Gives users feedback © 2009 Prentice-Hall, Inc.31
32
Challenges Facing a Digital Society Digital divide Between the haves and have nots Privacy risks Personal data collection Email monitored Copyright infringement Reliance on computers for security © 2009 Prentice-Hall, Inc.32
33
BECOMING COMPUTER LITERATE © 2009 Prentice-Hall, Inc.33 Technology in Action Book– Chapter 1
34
Questions © 2009 Prentice-Hall, Inc.34
35
Check out your computer and fill in the Drives and Ports paper. © 2009 Prentice-Hall, Inc.35
36
External hard drives, video cameras… Keyboards, ipods, speakers An internet connection gives access to a cable or DSL modem. Also connects to network servers and printers. Newer version
37
Team Exercise 10 minute break 1. Get into groups (2-3 per group) 2. Login the computer 3. Go to www.prenhall.com/techinactionwww.prenhall.com/techinaction 1. Fill out the on-line study guide © 2009 Prentice-Hall, Inc.37
38
© 2009 Prentice-Hall, Inc.38 DCCC Computer Login 1.Make sure caps lock is off (check for light) 2.Fill in Username and Password (see below) Username:Student Id (Example: P00888888) Password:First letter of first name (lower case) First letter of last name (lower case) Last 4 digits of your Social Security Number (Example: cm9999) Windows Workstation screen will appear (do not enter another id and password) 3. Click OK When you FIRST Login May be asked to fill out a challenge question or several security questions. This is important if you forget your password. Change your password at the first opportunity.
39
To access the internet © 2009 Prentice-Hall, Inc.39 1.Click on your internet explorer button 2.In the address bar, type in www.prenhall.com/techinaction www.prenhall.com/techinaction
40
Click on Companion Website on Edition 5E
41
www.prenhall.com/techinaction Click on the chapter you want on the green navigation bar
42
www.prenhall.com/techinaction On- Line Study Guide
43
www.prenhall.com/techinaction For in-class points today, 1. As a group, fill out the study guide. 1. You can use your books and notes 2. Submit 1 on-line study guide for the group to cmcdougall@dccc.edu and to members of your group (copies) cmcdougall@dccc.edu 3. Name: put the initals of each member of your group or their last names
44
Extra Slides – not used © 2009 Prentice-Hall, Inc.44
45
Team Exercise 1. Break into groups per major (2-3 per group) 1. Business/Retail/Shipping 2. Arts/Video Gaming/Sports Science 3. Education/Agriculture 4. Law Enforcement/Legal 5. Medicine/Biomedical/Simulations 6. Terms – Nanotechnology/Affective Computing/Digital Divide 2. Use your book to describe ….Explain the technology being used in your field? Anything else ? 3. Your EXPERT information will be shared with the rest of the class © 2009 Prentice-Hall, Inc.45
46
www.prenhall.com/techinaction Key Terms Defined Key Terms : also available in the back of your book
47
www.prenhall.com/techinaction End of Chapter Summary
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.