Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chris McDougall 610-209-5031.

Similar presentations


Presentation on theme: "Chris McDougall 610-209-5031."— Presentation transcript:

1 Chris McDougall cmcdougall@dccc.edu 610-209-5031

2 2 Office Hours Hours can be arranged set up an appointment

3 BECOMING COMPUTER LITERATE © 2009 Prentice-Hall, Inc.3 Technology in Action Book– Chapter 1

4 a. Germany b. Japan c. The U.S. d. South Korea © 2009 Prentice-Hall, Inc.4

5 5

6 6

7 7

8 8

9 9

10 10 What Is Computer Literacy? To be computer literate you must:To be computer literate you must: –Understand a computer’s capabilities and limitations –Know how to use a computer 1-3

11 Avoid hackers and viruses Protect your privacy Do you know how to protect your self from identity theft? Understand the real risks © 2009 Prentice-Hall, Inc.11 Being a Savvy Computer User and Consumer 1-4

12 Use the Internet wisely Avoid online annoyances Maintain your computer Make good purchase decisions Integrate the latest technology © 2009 Prentice-Hall, Inc.12 Being a Savvy Computer User and Consumer 1-4

13 © 2009 Prentice-Hall, Inc.13

14 Why Computers are important in EVERY Career? Computer careers in: Business Retail Shipping Arts Education © 2009 Prentice-Hall, Inc.14 Medicine Law Enforcement Legal System Agriculture Sciences 1-5-21

15 © 2009 Prentice-Hall, Inc.15 Computers in Business Data mining:Data mining: searching huge amounts of data for a patternsearching huge amounts of data for a pattern Example: Amazon and NetflixExample: Amazon and Netflix Items thought aboutItems thought about Past purchasesPast purchases GeographyGeography Results: coupons, suggestions Results: coupons, suggestions

16 © 2009 Prentice-Hall, Inc.16

17 © 2009 Prentice-Hall, Inc.17 Computers in Retail PSS: Personal Shopper Systems is a handheld computer – scans labels and picks up informationPSS: Personal Shopper Systems is a handheld computer – scans labels and picks up information Check prices, offers discounts, videosCheck prices, offers discounts, videos Coordinates with inventory and checkoutCoordinates with inventory and checkout

18 © 2009 Prentice-Hall, Inc.18 Computers in Shipping Package tracking software, databases, Maxicodes, infrared scannersPackage tracking software, databases, Maxicodes, infrared scanners Blue tooth: wireless communication transmits scanned dataBlue tooth: wireless communication transmits scanned data Maxicode: smart label that resembles an inkblot contains information about the packageMaxicode: smart label that resembles an inkblot contains information about the package

19 Web site galleries Virtual dance Computer- generated art © 2009 Prentice-Hall, Inc.19 Computers in the Arts

20 Computer Gaming Careers Computer games developed by the same culture Game Programming Game Artist © 2009 Prentice-Hall, Inc. 20

21 Computers in Education Computers in the classroom - tools Distance education Computerized research The Internet PDA (Personal Digital Assistant)- carry digital information for guided tours © 2009 Prentice-Hall, Inc.21

22 © 2009 Prentice-Hall, Inc.22 Computers in Law Enforcement Computers forensics: using computer systems to gather potential legal adviceComputers forensics: using computer systems to gather potential legal advice Databases: storing criminal informationDatabases: storing criminal information detect patterns detect patterns forecast criminal activity forecast criminal activity Wireless networksWireless networks intercept e-mail intercept e-mail chat sessions chat sessions

23 © 2009 Prentice-Hall, Inc.23 Computers in Law Enforcement Forecast Crime?? One study used was able to predict criminal activity before it happened 80% of the time By studying leading indicators that trigger crimes By studying leading indicators that trigger crimes Computer forensics is a growing field

24 © 2009 Prentice-Hall, Inc.24 Computers in the Legal System Surveillance cameras capture crimesSurveillance cameras capture crimes Forensic animations are extremely detailed and accepted in courtForensic animations are extremely detailed and accepted in court High-tech courtroomsHigh-tech courtrooms Handheld wireless devices used to display evidenceHandheld wireless devices used to display evidence

25 Computers in Agriculture Programs assist in managing complex farming business and information systems RFID: Radio Frequency ID tags track when an animal passes certain feed locations does not hold digital information minimize disease outbreaks Computerized sensors and equipment activation - protect crops – measures temperature, rainfall, wind © 2009 Prentice-Hall, Inc.25 EZ Pass

26 Patient simulators - life size mannequins used by medical students Surgical robots – delicate and precise incisions Physiome Project - realistic computer simulations of the human anatomy © 2009 Prentice-Hall, Inc.26 Computers in Medicine

27 VeriChip: is a personal id chip Size of a piece of grain implanted under the skin When exposed to radio waves, transmits information Non-implant versions are used in some hospitals – HALO infant protection system © 2009 Prentice-Hall, Inc.27 Computers in Medicine

28 Simulations Supercomputers used to create simulations: Archeology – recreate historic sites - Pompeii Meteorology – tornado forecastingi © 2009 Prentice-Hall, Inc.28

29 Computers in Sports Improved training Data storage and statistics Smartballs: using a circuit chip and radio signals. senses when soccer goals are scored © 2009 Prentice-Hall, Inc. 29

30 Nanotechnolgy Nano: one-billionth Example: Nanometer is one-billionth of a meter Nanotechnology: science of using nanostructures to build extremely small devices Enhance fibers with a coating to repel stains, wrinkles Potential Deliver precise doses of drugs Lead to computers the size of a pencil eraser © 2009 Prentice-Hall, Inc. 30

31 Affective Computing Research Computing that relates to emotion or tries to influence emotion Project: Emotional-Social Prosthesis (ESP) device Helping people with autistics Gives users feedback © 2009 Prentice-Hall, Inc.31

32 Challenges Facing a Digital Society Digital divide Between the haves and have nots Privacy risks Personal data collection Email monitored Copyright infringement Reliance on computers for security © 2009 Prentice-Hall, Inc.32

33 BECOMING COMPUTER LITERATE © 2009 Prentice-Hall, Inc.33 Technology in Action Book– Chapter 1

34 Questions © 2009 Prentice-Hall, Inc.34

35 Check out your computer and fill in the Drives and Ports paper. © 2009 Prentice-Hall, Inc.35

36 External hard drives, video cameras… Keyboards, ipods, speakers An internet connection gives access to a cable or DSL modem. Also connects to network servers and printers. Newer version

37 Team Exercise 10 minute break 1. Get into groups (2-3 per group) 2. Login the computer 3. Go to www.prenhall.com/techinactionwww.prenhall.com/techinaction 1. Fill out the on-line study guide © 2009 Prentice-Hall, Inc.37

38 © 2009 Prentice-Hall, Inc.38 DCCC Computer Login 1.Make sure caps lock is off (check for light) 2.Fill in Username and Password (see below) Username:Student Id (Example: P00888888) Password:First letter of first name (lower case) First letter of last name (lower case) Last 4 digits of your Social Security Number (Example: cm9999) Windows Workstation screen will appear (do not enter another id and password) 3. Click OK When you FIRST Login May be asked to fill out a challenge question or several security questions. This is important if you forget your password. Change your password at the first opportunity.

39 To access the internet © 2009 Prentice-Hall, Inc.39 1.Click on your internet explorer button 2.In the address bar, type in www.prenhall.com/techinaction www.prenhall.com/techinaction

40 Click on Companion Website on Edition 5E

41 www.prenhall.com/techinaction Click on the chapter you want on the green navigation bar

42 www.prenhall.com/techinaction On- Line Study Guide

43 www.prenhall.com/techinaction For in-class points today, 1. As a group, fill out the study guide. 1. You can use your books and notes 2. Submit 1 on-line study guide for the group to cmcdougall@dccc.edu and to members of your group (copies) cmcdougall@dccc.edu 3. Name: put the initals of each member of your group or their last names

44 Extra Slides – not used © 2009 Prentice-Hall, Inc.44

45 Team Exercise 1. Break into groups per major (2-3 per group) 1. Business/Retail/Shipping 2. Arts/Video Gaming/Sports Science 3. Education/Agriculture 4. Law Enforcement/Legal 5. Medicine/Biomedical/Simulations 6. Terms – Nanotechnology/Affective Computing/Digital Divide 2. Use your book to describe ….Explain the technology being used in your field? Anything else ? 3. Your EXPERT information will be shared with the rest of the class © 2009 Prentice-Hall, Inc.45

46 www.prenhall.com/techinaction Key Terms Defined Key Terms : also available in the back of your book

47 www.prenhall.com/techinaction End of Chapter Summary


Download ppt "Chris McDougall 610-209-5031."

Similar presentations


Ads by Google