© paradigm publishing, inc. 2 concepts the information processing cycle the information processing...

41

Upload: tiffany-davidson

Post on 25-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output
Page 2: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

© Paradigm Publishing, Inc. 2 Concepts

The Information Processing Cycle

Input

Processing

Output

Storage

CHECKPOINT 1

System Unit Ports

Computer Software

Networks

CHECKPOINT 2

The Internet

Security Issues

Email Etiquette and Computer Ethics

CHECKPOINT 3

CONCEPTS

Page 3: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 3

The Information Processing Cycle The information processing cycle can be divided into four

segments:1. Input2. Processing3. Output4. Storage

Page 4: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 4

Input A keyboard is primarily used for typing text. A mouse is a pointing device used for issuing commands and

selecting text or files. With a touchpad, you move your forefinger across the pad to

position the cursor, then use your thumb to press the equivalent of the mouse “button.”

A touch screen allows you to select an item and input commands by physically touching a specific area of the monitor.

Page 5: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 5

Input…continued A scanner works like a photocopier to transfer pictures or

text into the computer. Better detail can be achieved with a digitizing pen and

drawing tablet. A joystick is an input device used for moving objects on a

computer screen and is a common input device for computer gaming.

A digital camera captures images in a digital format and often contains an output device for viewing those images.

A webcam is a digital camera that can be controlled remotely over the Internet.

Page 6: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 6

Input…continued With a microphone you can add a “sound bite” to a

computerized slide presentation or speak to a friend over the Internet.

A bar code reader scans a UPC and resulting input can be used to check a patient’s identity and medication requirements.

Flash drives are small, easy-to-handle, portable storage devices that many people use to carry important data with them wherever they go.

Page 7: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 7

Processing A processor chip performs the calculations in a

computer. Memory chips are the hardware that provides the

workspace for the data and instructions the computer is processing.

The motherboard is a container for the computer’s CPU and RAM, and contains slots for adding expansion cards.

Page 8: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 8

Output A monitor is the screen used for

displaying graphics and text. Printers provide hard copy printouts on

paper. Speakers and headphones provide audio

output in stereo for movies, radio programs, streaming video, online learning courses, and telephone calls.

Page 9: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 9

Storage

Hard drives contain a stack of metal platters (disks), a drive motor, and read/write heads.

Data CDs are made of the same material that is used for music CDs.

DVDs can hold from 4 GB to 8 GB, depending on whether they can record on both sides and on one or two layers per side.

Blu-ray discs are used both for high-definition video and for data.

The flash drive storage device has a USB connectorthat fits into a standard USB port.

Page 10: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

© Paradigm Publishing, Inc. 10 Concepts

1) The information processing cycle can be divided into how many segments?a. 2b. 3c. 4d. 5

3) This is a temporary version and includes any output that cannot be physically handled.a. hard copyb. soft copyc. temp copyd. perm copy

2) This works like a photocopier to transfer pictures or text into the computer.a. scannerb. mousec. touch padd. joystick

4) CDs can hold about this much data.a. 100 MBb. 100 GBc. 700 MBd. 700 GB

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 1

Page 11: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 11

System Unit Ports Ports are the “sockets” that the input, output, and storage

devices plug into as displayed in the image on this slide. In the early days of personal computing, serial, parallel, and

printer cables and ports were found on all PCs. Today, most “peripheral” devices use Universal Serial Bus (USB) cables and ports.

Page 12: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 12

Computer Software Software refers to the operating instructions and applications

that allow computers to process the numbers, pictures, sounds, and text we enter into them.

Today, most operating systems have Graphical User Interfaces (GUIs), in which a mouse is used to manipulate graphic objects such as icons and windows onscreen.

The Windows 7 operating system requires a CPU that runs at 1 GHz.

The Mac OS X operating system can run on IBM-compatible PCs.

Page 13: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 13

Computer Software…continued The thousands of software applications available provide the

instructions that empower users to perform these and other tasks from the mundane to the amazing.

A word processing program such as Microsoft Word can support photos and drawings, mathematical calculations, text in table format, text in varying sizes, shapes, and colors— and even sound bites.

Spreadsheet software such as Microsoft Excel can be used for both simple and very complex calculations.

Page 14: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 14

Computer Software…continued Database software such as

Microsoft Access is designed to keep track of information.

Presentation software such as Microsoft PowerPoint allows users to create slide shows that can be viewed on the computer or projected onto a large screen.

Page 15: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 15

Computer Software…continued Photo editing software is used for organizing, retouching, and

editing photographs and videos that have been saved on CDs and DVDs, scanned in, or transferred directly from the camera to the PC.

Applications such as CorelDraw, Adobe Illustrator, SmartDraw, Microsoft Paint, and Paint Show Pro are popular software packages that provide the tools to design graphical images that can be used for web pages, posters, marketing brochures, and greeting cards.

Page 16: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 16

Computer Software…continued Software applications are often bundled into packages called

“suites.” Money management software enables users to manage

their money by helping them pay bills, balance checkbooks, keep track of income and expenses, maintain investment records, and other financial activities.

Tax preparation software allows users to efficiently fill out state and federal tax forms and submit them electronically and direct your refund to your bank account.

Page 17: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 17

Computer Software…continued Microsoft Outlook and Lotus Organizer are examples

of personal information management (PIM) programs that keep track of your to-do list, address book, and personal calendar.

Collaborative software or groupware, such as Lotus Notes and Microsoft Office SharePoint, provides a way to keep track of who has made or suggested changes to documents or plans and to distribute everything electronically.

Page 18: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 18

Computer Software…continued Today’s games contain high-quality

3D animations, sound, and action that is very realistic.

Open source software is the general term for applications that are provided completely free of charge, with no license fees or restrictions, and no copyrights to worry about. You can download the software, copy it, and give it to your friends.

Page 19: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 19

Networks A Local Area Network (LAN) consists of

several computers that are physically connected to one another via a central hub called a switch.

LANs can be connected to one another to form Wide Area Networks (WANs).

Page 20: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 20

Networks…continued Clients are the computer workstations

where end users run the various applications necessary for them to do their jobs.

Servers are data providers that are often larger and more powerful computers than clients. They house the network operating system software that organizes the sharing of data among the end users’ PCs.

Page 21: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 21

Networks…continued

A switch provides a central connection place for cables from multiple computers.

A router enables you to join two or more networks, or to join your LAN to the Internet.

Page 22: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 22

Networks…continued The PCs that make up a network have to be connected to each

other in some way. The original method uses physical cables containing several

strands of wire. The latest method is wireless and uses radio frequencies to

carry data over short distances from a PC to a switch or router. All the devices are often located in the same room, but the

signals are strong enough to penetrate the types of walls found in homes and offices.

The most commonly used network cable is unshielded twisted pair cable (UTP).

Page 23: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 23

Networks…continued

continues on next slide…

802.11n is the current Wi-Fi standard. It has a maximum data rate of 150 Mbps and a range of about 70 meters indoors or 250 meters outdoors.802.11g is an earlier Wi-Fi standard; many 802.11g devices are still in use today. It has a maximum data rate of 54 Mbps and a range of 38 meters indoors or 140 meters outdoors.802.11b and 802.11a are now obsolete Wi-Fi standards, with a maximum data rate of 54 Mbps and 11 Mbps, respectively.TCP/IP (Transmission Control Protocol/Internet Protocol) defines the rules for sending and receiving data between network devices. Each device has a unique IP address, which is a series of four numbers between 0 and 255, separated by periods, like this: 192.168.0.1.HTTP (HyperText Transfer Protocol) defines the rules for sending and receiving web pages (hypertext) on the Internet. For example, you might see http://emcp/mys hool.edu on the uniform resource locator (URL) or Address line of your Internet browser.

Page 24: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 24

Networks…continued

HTTPS (HyperText Transfer Protocol Secure Sockets) encrypts data before sending it over the Web. You can see the letters https on the URL line when you reach a web page asking for your credit card number or when you are paying your bills online, such as https://emcp/mybank.com/ my account.POP3 is the current version of Post Office Protocol for receiving email. POP is a store-and-forward system in which your email waits on the mail server until you pick it up via an email application such as Outlook; then it forwards it to that application.SMTP (Simple Mail Transfer Protocol) enables you to send email. The message is transferred to the recipient’s mail server on the Internet, where it waits for the user to pick it up via his or her email application.FTP (File Transfer Protocol) provides an efficient, fast way to transfer files between computers. It is commonly used for files that are too large for email attachments, and for large repositories of files.

Page 25: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 25

Networks…continued Data moves across the Internet by traveling through a

collection of physical objects.

Page 26: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

© Paradigm Publishing, Inc. 26 Concepts

1) The Windows 7 operating system requires a CPU that runs at this speed.a. 100 GHzb. 100 MHzc. 1 GHzd. 1 MHz

3) Software applications are often bundled into packages called this.a. suitesb. collectionsc. groupsd. piles

2) Microsoft Access is an example of this type of program.a. word processingb. presentationc. spreadsheetd. database

4) This is the term for applications that are provided completely free of charge.a. Open Useb. Open Sourcec. Source Freed. Source Use

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 2

Page 27: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 27

The Internet The World Wide Web is a collection of hypertext files,

containing graphics, audio, and video that can be accessed on the Internet.

Page 28: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 28

The Internet…continued

Page 29: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 29

The Internet…continued Electronic mail (email) uses its own

protocols (such as SMTP and POP3) to route a message between computers on the Internet and hold it at a destination mail server until the recipient picks it up.

File Transfer Protocol (FTP) is aninformation workspace on the Internet and is It is used for file transfer.

Page 30: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 30

Security Issues Malware is a relatively new term describing computer

programs that have a malicious intent. Viruses, worms, spyware, and adware programs all fall into this category.

A computer virus is a string of code written by someone who wants to hurt others by damaging or destroying their computer files or making their computer experience difficult.

Page 31: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 31

Security Issues…continued A worm is a self-replicating

computer program that distributes itself via a network. Unlike a virus, it does not necessarily attach itself to another file.

Named after the infamous Trojan horse of the Greek legend, a Trojan is malware that masquerades as a useful program.

Page 32: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 32

Security Issues…continued Adware looks at files on your computer and then sends pop-up

advertisements that try to sell you products and services. Spyware tracks your activity as you surf the Internet and

reports it to companies that want to sell you their products—or steal your identity.

Page 33: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 33

Security Issues…continued

Spyware programs can steal your personal information and tell it or sell it to other people who might be able to impersonate you and take money from your bank account or charge large purchases to your credit card.

Phishing is a method of convincing people to reveal their passwords, credit card numbers, social security numbers, and other private or confidential information.

Page 34: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 34

Security Issues…continued Several computer programs are available to provide protection

from virus attacks and from the installation of spyware or adware on your computer.

Some examples are McAfee VirusScan and Symantec AntiVirus for viruses; and Spybot Search & Destroy, SpySweeper, AdAware, and Spyware Detector for spyware and adware.

Windows 7 and Windows Vista include an anti-spyware program called Windows Defender.

Page 35: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 35

Email Etiquette and Computer Ethics Etiquette refers to the rules that govern courteous behavior. Etiquette also involves the rules for language appropriate in a

businesslike environment. Showing proper etiquette is a way of showing a person respect.

Page 36: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 36

Email Etiquette and Computer Ethics…continued Ethics are the moral principles

that govern behavior. Ethics are the rules we use to

determine what is right and wrong.

Page 37: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 37

Email Etiquette and Computer Ethics…continued Everyone is sending email these days. Speedy communication with other people all over the world

can be fun, exciting, and productive. However, it can also cause problems.

What you write in an email message can hurt someone’s feelings, be misinterpreted, or might accidentally be sent to the wrong person.

You can cause yourself embarrassment or even get yourself fired.

Page 38: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 38

Email Etiquette and Computer Ethics…continued

continues on next slide…

1. Be brief and to the point. Emails are supposed to be a fast way to communicate. Don’t slow down the process.

2. Don’t use ALL CAPITAL letters. It looks and feels like you’re shouting or angry.

3.Remember to attach the attachment. Mentioning what you are “enclosing” in any type of letter is a good idea. Get in the habit of stopping as soon as you type the phrase “I am attaching…” and immediately clicking the Attach button.

4.

Use the spelling check (even if you’re a great speller). Using the spelling check feature only takes a few seconds and it shows that you care about quality. But watch out! It is very easy to click “Change” instead of “Ignore” and change a person’s name to a common word and that, whether humorous or not, is an embarrassing mistake.

5.Reread what you wrote from the perspective of the receiver. Ask yourself how the recipient is likely to interpret your words. Did you leave out or misspell a word that completely changes the meaning?

Page 39: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 39

Email Etiquette and Computer Ethics…continued

6.Double-check the address in the To box. Confirm that you clicked the correct name in your address list. Once you click the Send button, there is no way to stop the message or undo an address mistake.

7. Watch your language. Profanity can come back to haunt you.

8.Assume your email will be read by lots of other people. Emails are often forwarded so others can take action or to inform a supervisor. Avoid cute or friendly asides and comments that you only want a close friend to see.

9.Always put something in the Subject line. A well-written subject will help the receiver decide where to file your message and whether to read it now or wait until later.

10.Privacy does not exist in emails, especially those in a corporate environment. The email administrator can potentially see the contents of any email. Company policy may allow checking emails to ensure that no company secrets are exposed, or to stop harassing or abusive email.

Page 40: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

Concepts© Paradigm Publishing, Inc. 40

Email Etiquette and Computer Ethics…continued Most software is copyrighted. The exception is open source

software mentioned earlier. Infringing on a copyright is illegal, and this law is enforced.

Page 41: © Paradigm Publishing, Inc. 2 Concepts  The Information Processing Cycle The Information Processing Cycle  Input Input  Processing Processing  Output

© Paradigm Publishing, Inc. 41 Concepts

1) This is an information workspace on the Internet and is used for file transfer.a. ftfb. ftpc. fptd. fft

3) This is a self-replicating computer program that distributes itself via a network.a. Spywareb. Trojanc. Wormd. Virus

2) This is typically spread via an email attachment.a. Spywareb. Trojanc. Wormd. Virus

4) This refers to the rules that govern courteous behavior.a. Etiquetteb. Ethicsc. Moraled. Protocol

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 3