© Paradigm Publishing Inc. 1 Information Technology Essentials

Preview:

Citation preview

© Paradigm Publishing Inc. 1

Information Technology Essentials

© Paradigm Publishing Inc. 2

Presentation Overview

• The Information Processing Cycle

• Computer Software

• Networks

• The Internet

• Security Issues

• E-mail Etiquette

• Computer Ethics

© Paradigm Publishing Inc. 3

The Information Processing Cycle

InputInput is getting data into the computer so that it can be processed.

© Paradigm Publishing Inc. 4

The Information Processing Cycle

Input– A keyboard is

primarily used for typing text.

© Paradigm Publishing Inc. 5

The Information Processing Cycle

Input– A keyboard is

primarily used for typing text.

– Most PC keyboards also include a calculator-style number pad.

© Paradigm Publishing Inc. 6

The Information Processing Cycle

Input– A keyboard is

primarily used for typing text.

– Most PC keyboards also include a calculator-style number pad.

– Keys labeled F1 through F12 can be programmed to perform special functions.

© Paradigm Publishing Inc. 7

The Information Processing Cycle

Input– A mouse is a pointing

device used for issuing commands and selecting text or files for processing.

© Paradigm Publishing Inc. 8

The Information Processing Cycle

Input– A touch pad

is a pad where the user slides a finger to move the pointer and taps to select a command.

© Paradigm Publishing Inc. 9

The Information Processing Cycle

Input– A touch screen allows

you to select an item andinput commands by physically touching a specific area of the monitor.

© Paradigm Publishing Inc. 10

The Information Processing Cycle

Input– A scanner works like a

photocopier to transfer pictures or text into the computer.

© Paradigm Publishing Inc. 11

The Information Processing Cycle

Input– A digitizing pen and

drawing tablet allow better control than a mouse for drawing designs and pictures.

© Paradigm Publishing Inc. 12

The Information Processing Cycle

Input– A joystick is a small

box that contains avertical lever that, when pushed in a certain direction, moves the graphics cursor correspondingly on the screen.

© Paradigm Publishing Inc. 13

The Information Processing Cycle

Input– A digital camera can transfer still and moving

picturesinto the computer.

© Paradigm Publishing Inc. 14

The Information Processing Cycle

Input– A microphone adds a “sound bite” to a

computerized slide presentation or speaks to a friend over the Internet.

© Paradigm Publishing Inc. 15

The Information Processing Cycle

Input– A bar code reader is

used for entering the Universal Product Code (UPC) found on grocery and retail store products.

© Paradigm Publishing Inc. 16

The Information Processing Cycle

Input– Dual purpose devices such as compact discs

(CDs), digital video discs (DVDs), flash drives, and hard drives, allow you to reenter data into the computer without having to retype it.

© Paradigm Publishing Inc. 17

The Information Processing Cycle

ProcessingProcessing is using a computer to make calculations or to move text from one paragraph to another.

© Paradigm Publishing Inc. 18

The Information Processing Cycle

Processing– Processors process data at clock speeds from 2.0

to 4.0 gigahertz (GHz).

© Paradigm Publishing Inc. 19

The Information Processing Cycle

Processing– Memory chips provide the workspace for the

data and instructions the computer processes.

© Paradigm Publishing Inc. 20

The Information Processing Cycle

OutputOutput is processed data that can be used immediately or stored in computer-usable form for later use.

© Paradigm Publishing Inc. 21

The Information Processing Cycle

Output– A monitor is the

screen used for displaying graphics and text.

© Paradigm Publishing Inc. 22

The Information Processing Cycle

Output– A printer provides hard copy

printouts on paper and other similar media.

© Paradigm Publishing Inc. 23

The Information Processing Cycle

Output– Speakers and headphones

provide audio output in stereo for movies, radio programs, streaming video, online learning courses, and telephone calls.

© Paradigm Publishing Inc. 24

The Information Processing Cycle

StorageStorage records output so that

it will be available after the computer has been shut off and RAM has been erased. Output can be stored on CDs, DVDs, flash drives, and hard drives.

© Paradigm Publishing Inc. 25

The Information Processing Cycle

StorageHard drives contain one or more hard disks on which data are stored.

© Paradigm Publishing Inc. 26

The Information Processing Cycle

System Unit PortsPorts are “sockets” that input, output, and storage devices plug into. In early days, serial and parallel ports were on most PCs. Today, most peripheral devices use Universal Serial Bus (USP) cables and ports.

© Paradigm Publishing Inc. 27

The Information Processing Cycle

System Unit Ports

© Paradigm Publishing Inc. 28

Discussion

What happens if any one element of the information processing cycle breaks down?

© Paradigm Publishing Inc. 29

Computer Software

Personal Computer Operating Systems– PC operating systems primarily include systems

made by Microsoft, such as DOS versions 1 through 6, Windows 95, 98, ME, XP, and Vista. UNIX and Linus are two other PC operating systems.

© Paradigm Publishing Inc. 30

Computer Software

Personal Computer Operating Systems– PC operating systems primarily include systems

made by Microsoft, such as DOS versions 1 through 6, Windows 95, 98, ME, XP, and Vista. UNIX and Linus are two other PC operating systems.

– The Apple MacIntosh operating system is Mac OS, and the tenth version is called “Mac OS X.”

© Paradigm Publishing Inc. 31

Computer Software

Applications– Word processing software was originally

designed to replace the typewriter, but now it can also support photos and drawings.

© Paradigm Publishing Inc. 32

Computer Software

Applications– Word processing software was originally designed

to replace the typewriter, but now it can also support photos and drawings.

– Spreadsheet software such as Microsoft Excel 2007 can be used for simple and complex calculations.

© Paradigm Publishing Inc. 33

Computer Software

Applications– Word processing software was originally designed

to replace the typewriter, but now it can also support photos and drawings.

– Spreadsheet software such as Microsoft Excel 2007 can be used for simple and complex calculations.

– Database software such as Microsoft Access 2007 is designed to keep track of information.

© Paradigm Publishing Inc. 34

Computer Software

Applications– Presentation software such as PowerPoint 2007

creates slide shows that can be viewed on computers or projected onto large screens.

© Paradigm Publishing Inc. 35

Computer Software

Applications– Presentation software such as PowerPoint 2007

creates slide shows that can be viewed on computers or projected onto large screens.

– Photo editing software can organize, retouch, and edit photographs and videos.

© Paradigm Publishing Inc. 36

Computer Software

Applications– Presentation software such as PowerPoint 2007

creates slide shows that can be viewed on computers or projected onto large screens.

– Photo editing software can organize, retouch, and edit photographs and videos.

– Video editing software such as ArcSoft Video Impressions can edit video clips to remove scenes, add music, or rearrange scenes.

© Paradigm Publishing Inc. 37

Computer Software

Applications– Audio editing software such as Nero StartSmart

transfers music from cassette tapes or vinyl records to CDs, iPods, and MP3 players. This software can remove noise and vocals and tweak sound qualities.

© Paradigm Publishing Inc. 38

Computer Software

Applications– Audio editing software such as Nero StartSmart

transfers music from cassette tapes or vinyl records to CDs, iPods, and MP3 players. This software can remove noise and vocals and tweak sound qualities.

– Suites are software applications that are bundled into packages.

© Paradigm Publishing Inc. 39

Computer Software

Applications– Money management software helps users pay bills,

balance checkbooks, keep track of income and expenses, maintain investment records, and other financial activities.

© Paradigm Publishing Inc. 40

Computer Software

Applications– Money management software helps users pay bills,

balance checkbooks, keep track of income and expenses, maintain investment records, and other financial activities.

– Tax preparation software allows users to fill out state and federal tax forms and submit them electronically.

© Paradigm Publishing Inc. 41

Computer Software

Applications– Personal information management software keeps

track of your to-do list, address book, and personal calendar.

© Paradigm Publishing Inc. 42

Computer Software

Applications– Personal information management software keeps

track of your to-do list, address book, and personal calendar.

– Collaborative software or groupware provides a way to keep track of changes and who makes them to documents and distributes everything electronically.

© Paradigm Publishing Inc. 43

Computer Software

Applications– Gaming software includes programs such as

baseball and football games, auto racing, fantasy worlds, and many others.

© Paradigm Publishing Inc. 44

Computer Software

Applications– Gaming software includes programs such as

baseball and football games, auto racing, fantasy worlds, and many others.

– Open-source software is applications that are provided completely free, with no license restrictions, and no copyrights.

© Paradigm Publishing Inc. 45

Discussion

What kinds of computer software do you use the most? How do you use each type?

© Paradigm Publishing Inc. 46

Networks

Local Area Networks– consist of computers connected by physical cables.

© Paradigm Publishing Inc. 47

Networks

Local Area Networks– consist of computers connected by physical cables, – or computers connected wirelessly in an

environment that does not use public carriers such as Internet service providers, telephone, or cable companies.

© Paradigm Publishing Inc. 48

Networks

Local Area Networks

© Paradigm Publishing Inc. 49

Networks

Wide Area Networks are acollection of LANs.

© Paradigm Publishing Inc. 50

Networks

Network Components– Clients are computer workstations that request

information from servers.

© Paradigm Publishing Inc. 51

Networks

Network Components– Clients are computer workstations that request

information from servers. – Networking paths allow a network client

computer to send information to a server, which then can relay information back to the client computer or to another client on the same network.

© Paradigm Publishing Inc. 52

Networks

Network ComponentsClient-Server Architecture

© Paradigm Publishing Inc. 53

Networks

Network Components– Servers are data providers that are more powerful

computers than clients.

© Paradigm Publishing Inc. 54

Networks

Network Components– Servers are data providers that are more powerful

computers than clients. – These more powerful computers can function as

both client and server in a peer-to-peer network where all computers are equal and each one is both data requester and data provider.

© Paradigm Publishing Inc. 55

Networks

Network ComponentsPeer-to-Peer Architecture

© Paradigm Publishing Inc. 56

Networks

Network Components– Hubs are devices that physically connect computers

in a LAN or the local portion of a WAN.

© Paradigm Publishing Inc. 57

Networks

Network Components– Hubs are devices that physically connect computers

in a LAN or the local portion of a WAN.– Switches are hubs that provide faster transmission

of data from the sender to the receiver.

© Paradigm Publishing Inc. 58

Networks

Network Components– Hubs are devices that physically connect computers

in a LAN or the local portion of a WAN.– Switches are hubs that provide faster transmission of

data from the sender to the receiver.– Routers know how to pass data from one network to

another in a large LAN or WAN and throughout the Internet.

© Paradigm Publishing Inc. 59

Networks

Network Components– Connectivity links PCs in a network by physical

cables or with wireless connections.

© Paradigm Publishing Inc. 60

Networks

Network Components– Connectivity links PCs in a network by physical

cables or with wireless connections.– Protocols are generally accepted agreements on how

to behave in certain situations.

© Paradigm Publishing Inc. 61

Networks

Network Components

The process of sending e-mail with SMTP and a POP server

© Paradigm Publishing Inc. 62

Discussion

How are networks used in your home, school, or office environments? How are the needs the same? How are they different?

© Paradigm Publishing Inc. 63

The Internet

The Internet is a worldwide network of service providers, individual computers, and networks of all kinds.

© Paradigm Publishing Inc. 64

The Internet

– The World Wide Web is a collection of hypertext files containing graphics, audio, and video that can be accessed on the Internet.

© Paradigm Publishing Inc. 65

The Internet

– The World Wide Web is a collection of hypertext files containing graphics, audio, and video that can be accessed on the Internet.

– Electronic mail (e-mail) uses its own protocols to route a message between computers on the Internet and hold it at a destination mail server until the recipient is ready to access it.

© Paradigm Publishing Inc. 66

The Internet

– The World Wide Web is a collection of hypertext files containing graphics, audio, and video that can be accessed on the Internet.

– Electronic mail (e-mail) uses its own protocols to route a message between computers on the Internet and hold it at a destination mail server until the recipient is ready to access it.

– File transfer protocol (FTP) is used to transfer large amounts of data between computers on the Internet.

© Paradigm Publishing Inc. 67

Discussion

How do you use the Internet? How would your life change if the Internet shut down?

© Paradigm Publishing Inc. 68

Security Issues

– Viruses are computer programs that damage or destroy computer files or otherwise make computer usage difficult.

© Paradigm Publishing Inc. 69

Security Issues

– Viruses are computer programs that damage or destroy computer files or otherwise make computer usage difficult.

– Worms are programs that can spread to any other computer connected to the Internet or any other network.

© Paradigm Publishing Inc. 70

Security Issues

– Viruses are computer programs that damage or destroy computer files or otherwise make computer usage difficult.

– Worms are programs that can spread to any other computer connected to the Internet or any other network.

– Spyware tracks your activity on the Internet and reports it to companies that want to sell you products or steal your identity.

© Paradigm Publishing Inc. 71

Security

IssuesViruses are often transmitted over the Internet and through shared devices such as flash drives.

© Paradigm Publishing Inc. 72

Security Issues

– Adware looks at files on your computer and sends pop-up advertisements to sell you products and services.

© Paradigm Publishing Inc. 73

Security Issues

– Adware looks at files on your computer and sends pop-up advertisements to sell you products and services.

– Spyware programs steal your personal information to take money from your bank account or charge purchases to your credit card.

© Paradigm Publishing Inc. 74

Security Issues

– Adware looks at files on your computer and sends pop-up advertisements to sell you products and services.

– Spyware programs steal your personal information to take money from your bank account or charge purchases to your credit card.

– Protection software programs provide protection from virus attacks and from the installation of spyware or adware on your computer.

© Paradigm Publishing Inc. 75

Discussion

What type of protection software is installed on your computers at home? At school? Are the protection needs different in these two locations?

© Paradigm Publishing Inc. 76

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

© Paradigm Publishing Inc. 77

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

© Paradigm Publishing Inc. 78

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

© Paradigm Publishing Inc. 79

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

© Paradigm Publishing Inc. 80

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

© Paradigm Publishing Inc. 81

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

• Double-check the address in the To box.

© Paradigm Publishing Inc. 82

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

• Double-check the address in the To box.

• Watch your language.

© Paradigm Publishing Inc. 83

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

• Double-check the address in the To box.

• Watch your language.

• Assume your e-mail will be read by other people.

© Paradigm Publishing Inc. 84

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

• Double-check the address in the To box.

• Watch your language.

• Assume your e-mail will be read by other people.

• Always put something in the Subject line.

© Paradigm Publishing Inc. 85

E-mail Etiquette

Ten Rules of E-mail Etiquette• Be brief and to the point.

• Don’t use ALL CAPITAL letters.

• Remember to attach the attachment.

• Use the Spelling Checker.

• Reread what you wrote from the perspective of the receiver.

• Double-check the address in the To box.

• Watch your language.

• Assume your e-mail will be read by other people.

• Always put something in the Subject line.

• Assume privacy does not exist for your e-mail.

© Paradigm Publishing Inc. 86

Discussion

What are some examples of situations where e-mail etiquette was not followed and how did that affect communication?

© Paradigm Publishing Inc. 87

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

© Paradigm Publishing Inc. 88

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

• Most software is copyrighted.

© Paradigm Publishing Inc. 89

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

• Most software is copyrighted.

• Copying works is not allowed without the author’s permission.

© Paradigm Publishing Inc. 90

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

• Most software is copyrighted.

• Copying works is not allowed without the author’s permission.

• The Software & Information Industry Association can investigate and prosecute.

© Paradigm Publishing Inc. 91

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

• Most software is copyrighted.

• Copying works is not allowed without the author’s permission.

• The Software & Information Industry Association can investigate and prosecute.

• Piracy costs authors and artists more in production costs.

© Paradigm Publishing Inc. 92

Computer Ethics

• Accepting a license agreement means you agree to everything it says.

• Most software is copyrighted.

• Copying works is not allowed without the author’s permission.

• The Software & Information Industry Association can investigate and prosecute.

• Piracy costs authors and artists more in production costs.

• Increase costs reduces their ability to create.

© Paradigm Publishing Inc. 93

Discussion

How has information technology changed the way we view copyright issues?

Recommended