Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
887 views

ITC Lesson 1 - Introduction To Computing

The document provides an introduction to computing, including definitions and key concepts. It discusses what computing is, major areas of computing like information technology and computer science, and components such as hardware, software, networks, and ethics. Computing is defined as any goal-oriented activity that uses computers to process and manage information.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
887 views

ITC Lesson 1 - Introduction To Computing

The document provides an introduction to computing, including definitions and key concepts. It discusses what computing is, major areas of computing like information technology and computer science, and components such as hardware, software, networks, and ethics. Computing is defined as any goal-oriented activity that uses computers to process and manage information.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Introduction

to Computing
Lesson 1
What is Computing?

• In a general way, computing is


defined as any goal-oriented activity
requiring, benefiting from, or creating
computers.
What is Computing?

• Computing is any activity that uses computers.


• It includes developing hardware and software,
and using computers to manage and process
information, communicate and entertain.
• Computing is a critically important, integral
component of modern industrial technology.
What is Computing?

Computing includes:
▪ designing and building hardware and
software systems for a wide range of
purposes
▪ processing, structuring, and managing
various kinds of information
▪ doing scientific studies using computers
What is Computing?

Computing includes:
▪ making computer systems behave
intelligently
▪ creating and using communications and
entertainment media
▪ finding and gathering information relevant
to any particular purpose
What is Computing?

• The discipline of computing is the


systematic study of algorithmic processes
that describe and transform information:
their theory, analysis, design, efficiency,
implementation, and application.
• The fundamental question underlying all
computing is "What can be (efficiently)
automated?"
What is Computing?

• Major computing disciplines include:


▪ Information Technology
▪ Information Systems
▪ Computer Science
▪ Software Engineering
▪ Computer Engineering
Brief History of Computing

• The history of computing is longer


than the history of computing
hardware and modern computing
technology and includes the history of
methods intended for pen and paper
or for chalk and slate, with or without
the aid of tables.
Brief History of Computing

• Computing is intimately tied to the


representation of numbers. But long
before abstractions like the number
arose, there were mathematical
concepts to serve the purposes of
civilization.
Brief History of Computing

• The earliest known tool for use in


computation was the abacus, and it was
thought to have been invented in Babylon
circa 2400 BC.
Brief History of Computing

• Its original style of usage was by lines


drawn in sand with pebbles.
• Abaci, of a more modern design, are still
used as calculation tools today.
• This was the first known calculation aid -
preceding Greek methods by 2,000 years.
Computer

• A computer is a machine that manipulates


data according to a set of instructions
called a computer program.
• The program has an executable form that
the computer can use directly to execute
the instructions.
Computer

• The same program in its human-readable


source code form, enables a programmer
to study and develop a sequence of steps
known as an algorithm.
Computer

• Because the instructions can be carried


out in different types of computers, a
single set of source instructions converts
to machine instructions according to the
central processing unit type.
Computer

• The execution process carries out the


instructions in a computer program.
• Instructions express the computations
performed by the computer.
Computer

• They trigger sequences of simple


actions on the executing machine.
• Those actions produce effects
according to the semantics of the
instructions.
Computer Software

• a collection of computer programs and


related data that provides the instructions
for telling a computer what to do and how
to do it
• a set of programs, procedures, algorithms
and its documentation concerned with the
operation of a data processing system.
Application Software

• Application software, also known as an


"application" or an "app", is a computer
software designed to help the user to
perform specific tasks.
• Examples include enterprise software,
accounting software, office suites,
graphics software and media players.
Application Software

• Apps may be bundled with the computer


and its system software, or may be
published separately.
• Application software is contrasted with
system software and middleware, which
manage and integrate a computer's
capabilities, but typically do not directly
apply them in the performance of tasks
that benefit the user.
Application Software

• The system software serves the


application, which in turn serves the user.
• Application software applies the power of
a particular computing platform or system
software to a particular purpose.
System Software

• System software, or systems


software, is computer software
designed to operate and control the
computer hardware and to provide a
platform for running application
software.
System Software

• System software includes operating


systems, utility software, device
drivers, window systems, and
firmware.
• Frequently development tools such as
compilers, linkers, and debuggers are
classified as system software.
Computer Network

• A computer network, often simply referred


to as a network, is a collection of hardware
components and computers
interconnected by communication
channels that allow sharing of resources
and information.
Computer Network

• Where at least one process in one


device is able to send/receive data
to/from at least one process residing
in a remote device, then the two
devices are said to be in a network.
Computer Network

• Networks may be classified according to a


wide variety of characteristics such as:
▪ the medium used to transport the data
▪ communications protocol used
▪ scale
▪ topology
▪ organizational scope
Computer Network

• Communications protocols define the


rules and data formats for exchanging
information in a computer network,
and provide the basis for network
programming.
The Ten Commandments of
Computer Ethics
1. Thou shalt not use a computer to
harm other people.
2. Thou shalt not interfere with other
people's computer work.
3. Thou shalt not snoop around in other
people's computer files.
The Ten Commandments of
Computer Ethics
4. Thou shalt not use a computer to
steal.
5. Thou shalt not use a computer to
bear false witness.
6. Thou shalt not copy or use
proprietary software for which you
have not paid (without permission).
The Ten Commandments of
Computer Ethics

7. Thou shalt not use other people's


computer resources without
authorization or proper
compensation.
8. Thou shalt not appropriate other
people's intellectual output.
The Ten Commandments of
Computer Ethics

9. Thou shalt think about the social


consequences of the program you
are writing or the system you are
designing.
10. Thou shalt always use a computer
in ways that ensure consideration
and respect for your fellow humans.
Commandment 1

• Simply put: Do not use the computer in ways


that may harm other people.
• Explanation: This commandment says that it
is unethical to use a computer to harm
another user. It is not limited to physical
injury. It includes harming or corrupting other
users' data or files. The commandment states
that it is wrong to use a computer to steal
someone's personal information.
Commandment 1

• Manipulating or destroying files of other


users is ethically wrong. It is unethical to
write programs, which on execution lead to
stealing, copying or gaining unauthorized
access to other users' data. Being involved
in practices like hacking, spamming,
phishing or cyber bullying does not
conform to computer ethics.
Commandment 2

• Simply put: Do not use computer


technology to cause interference in other
users' work.
• Explanation: Computer software can be
used in ways that disturb other users or
disrupt their work. Viruses, for example,
are programs meant to harm useful
computer programs or interfere with the
normal functioning of a computer.
Commandment 2

• Malicious software can disrupt the


functioning of computers in more ways
than one. It may overload computer
memory through excessive consumption
of computer resources, thus slowing its
functioning. It may cause a computer to
function wrongly or even stop working.
Using malicious software to attack a
computer is unethical.
Commandment 3

• Simply put: Do not spy on another


person's computer data.
• Explanation: We know it is wrong to read
someone's personal letters. On the same
lines, it is wrong to read someone else's
email messages or files. Obtaining data
from another person's private files is
nothing less than breaking into someone's
room.
Commandment 3

• Snooping around in another person's files


or reading someone else's personal
messages is the invasion of his privacy.
There are exceptions to this. For example,
spying is necessary and cannot be called
unethical when it is done against
illegitimate use of computers. For
example, intelligence agencies working on
cybercrime cases need to spy on the
internet activity of suspects.
Commandment 4

• Simply put: Do not use computer technology


to steal information.
• Explanation: Stealing sensitive information or
leaking confidential information is as good as
robbery. It is wrong to acquire personal
information of employees from an employee
database or patient history from a hospital
database or other such information that is
meant to be confidential.
Commandment 4

• Similarly, breaking into a bank account to


collect information about the account or
account holder is wrong. Illegal electronic
transfer of funds is a type of fraud. With
the use of technology, stealing of
information is much easier. Computers can
be used to store stolen information.
Commandment 5

• Simply put: Do not contribute to the spread of


misinformation using computer technology.
• Explanation: Spread of information has
become viral today, because of the Internet.
This also means that false news or rumors
can spread speedily through social
networking sites or emails. Being involved in
the circulation of incorrect information is
unethical.
Commandment 5

• Mails and pop-ups are commonly used to


spread the wrong information or give false
alerts with the only intent of selling products.
Mails from untrusted sources advertising
certain products or spreading some hard-to-
believe information, are not uncommon.
Direct or indirect involvement in the
circulation of false information is ethically
wrong. Giving wrong information can hurt
other parties or organizations that are
affected by that particular theme.
Commandment 6

• Simply put: Refrain from copying software


or buying pirated copies. Pay for software
unless it is free.
• Explanation: Like any other artistic or
literary work, software is copyrighted. A
piece of code is the original work of the
individual who created it. It is copyrighted
in his/her name.
Commandment 6

• In case of a developer writing software for


the organization she works for, the
organization holds the copyright for it.
Copyright holds true unless its creators
announce it is not. Obtaining illegal copies
of copyrighted software is unethical and
also encourages others to make copies
illegally.
Commandment 7

• Simply put: Do not use someone else's


computer resources unless authorized to.
• Explanation: Multi-user systems have user
specific passwords. Breaking into some
other user's password, thus intruding
his/her private space is unethical.
Commandment 7

• It is not ethical to hack passwords for


gaining unauthorized access to a
password-protected computer system.
Accessing data that you are not authorized
to access or gaining access to another
user's computer without her permission is
not ethical.
Commandment 8

• Simply put: It is wrong to claim ownership on a


work which is the output of someone else's
intellect.
• Explanation: Programs developed by a software
developer are her property. If he is working with an
organization, they are the organization's property.
Copying them and propagating them in one's own
name is unethical. This applies to any creative
work, program or design. Establishing ownership
on a work which is not yours is ethically wrong.
Commandment 9

• Simply put: Before developing a software,


think about the social impact it can have.
• Explanation: Looking at the social
consequences that a program can have,
describes a broader perspective of looking at
technology. A computer software on release,
reaches millions. Software like video games
and animations or educational software can
have a social impact on their users.
Commandment 9

• When working on animation films or


designing video games, for example, it is
the programmer's responsibility to
understand his target audience/users and
the effect it may have on them. For
example, a computer game for kids should
not have content that can influence them
negatively.
Commandment 9

• Similarly, writing malicious software is


ethically wrong. A software
developer/development firm should
consider the influence their code can
have on the society at large.
Commandment 10

• Simply put: In using computers for


communication, be respectful and
courteous with the fellow members.
• Explanation: The communication etiquette
we follow in the real world applies to
communication over computers as well.
While communicating over the Internet,
one should treat others with respect.
Commandment 10

• One should not intrude others' private


space, use abusive language, make false
statements or pass irresponsible remarks
about others. One should be courteous
while communicating over the web and
should respect others' time and resources.
Also, one should be considerate with a
novice computer user.

You might also like