computers merit badge brazos valley merit badge college january 11 and 25, 2014
TRANSCRIPT
Your Instructor – Mr. Abernathy
Assistant Scoutmaster with Troop 326, Fort Worth, TX Webmaster for the Trinity Trails District, Longhorn Council Contact Information
Email: [email protected] Home phone: 817-441-8706
Work History: Research Program Manager at Lockheed Martin Teach several subjects, perform research, manage both internal
and external (government-paid) research contracts Education:
Bachelors and Masters degrees in Mathematics
Class Administration
Fill Out Blue Cards & Turn Them In Attendance Class Materials
Merit Badge Handbook Optional, but ensure you have the current version (2010)
Requirements Workbook (handout) Put Your Name and Unit (Troop) Number On It
Lecture Materials (online) Lab Guide Materials (Excel templates, online)
BlueCards
Fill Out asIndicated
Requirements:1 5D2 5E3A 63B 64A 64B 74C 8A4D 8B5A 8C5B 95C
HAND THEM IN
Computers
Douglas Abernathy
112 Prairie Ridge Dr
Aledo, TX 76008
817-441-8706Computers
Computers
Joe Boyscout Joe Boyscout
Joe Boyscout123 Main StSaginaw, TX
Troop 434
Shaggy HillsLonghorn
x
x434
1 2 3A
3B
4A
4B
4C
4D
5A
5B
5C
5D
5E
6 6 6 7 8A
8B
8C
9
BVMBC 2014 Course Syllabus
Week 1: January 11, 2014 Class presentation on Requirements 1,2,3,4,5,8 Take notes on Requirements 1, 2, 3(a,b), 4(a,b,c,d),
5(a,b,c,d,e), 8 on your workbooks During the two weeks until the next session
Review and finish workbook answers to Requirements 1,2,3,4,5, and 8 (use the website for resources)
Do your own research for Requirement 9 Week 2: January 25, 2014
Requirements 6 (do 3 of 8), 7 (do 1 of 5), 9
Week 1 Class Agenda Requirement 1
Online Safety Requirement 2
Computer History and Impact Requirement 3
Types & Uses of Computers Requirement 4
Parts of a Computer, Data Storage, File Compression, Chip-based devices
Requirement 5 Software Development, Programming Languages, Family Software,
Protecting Your Computer & its Information, How Internet Works Requirement 8
Copyright Laws and Your Responsibilities
Week 2 Class Agenda Requirement 6
Using different types of computer programs: spreadsheet, word processor, graphics, database
Choose any 3 from 8 options I have materials for 3 specific options in class
Requirement 7 Using different types of computer programs: database manager,
CAD, blog, web page, visit a business that uses computers Choose any 1 from 5 options
Important: Option e (visit a business) must be done outside of class I have materials for doing 1 specific option in class
Requirement 9 Discuss Career Opportunities in Computers You should research this between Day 1 and Day 2 of class
Tips for Online Safety Follow family rules
How long What Sites
Know with Whom You are Communicating Do not give out Personal Information
Phone numbers, address Names School or Parent’s work locations Driver’s license numbers or Social Security Numbers Photos
Do not open emails or files from people you don’t know or trust Report to your parents anything suspicious, unusual, or offensive
Tips for Online Safety Never agree to get together with someone you “meet” online,
unless your parents approve of the meeting and go with you. Never share Internet passwords with anyone, even if they sound
official, other than your parents or other responsible adults in your family.
Never shop online or enter a credit card number unless you have your parent’s permission.
Do not Believe Everything you see or read online. Do not do anything that harms others or is against the law. Anything you send or post can become public forever.
Never post information you don’t want others including strangers to see.
Requirement 2: Impact of the Inventionof the Computer & The Computer’s History
Give a short history of the computer. Explain how the invention of the computer has affected society, science, and technology.
What is a Computer? Machines that perform math! >>>>> Very fast! Enables them to operate robots, build cars, command monitors,
display a moving image, generate a fast moving video game or send emails.
The heart is the transistor, an electronic switch with two positions: on and off
One or Zero Yes or No True or False
Computers have no intelligence of their own. Software engineers write sets of instructions for computers called programs which accomplish complex tasks by performing simple yes/no logic millions of times per second. A computer can only do what a person programmed it to do.
Napier’s Bones (circa 1617) The Scottish inventor
of logarithms went on to construct calculating rods (made from bone) that perform multiplication and division by simply adding and subtracting
Led to slide rules (1621 – Fr. Oughtred)
Charles Babbage’s “Difference Machine” and “Analytical Engine”
1822 and 1833 designs Prototype for modern
computers Four parts: Input device,
memory (store), processor (mill), and an output device
The difference machine was actually built recently at MIT.. and worked!!
Boolean Logic George Boole, English Mathematician Developed in 1840’s & 50’s Allows “thoughts” to be expressed in math-like
terms. Boolean logic (Boolean algebra) uses AND, OR, &
NOT operations Years later computer designers arranged electric
switches to perform these operations in “logic circuits”.
Enabled digital computers (ones & zeroes) to mimic human thought processes.
Used everyday today by Internet Search Engine users
Herman Hollerith’s Punch Cards
Developed to win a contest by the Census Bureau to improve census data processing after the 1880 census had taken seven years to tabulate. They were used successfully in the 1890 U. S. Census
The concept was not THAT new – in France in 1801, Joseph-Marie Jacquard invented an automatic loom using punched cards for the control of the patterns in the fabrics.
Herman Hollerith later formed the company that became IBM (International Business Machines Corporation).
Colossus Mark I (England), Harvard Mark I, ENIAC, EDVAC
World War II: computers were developed to break German and Japanese message codes and create firing tables
Technologies: central processors were made up of vacuum tubes
Beginning with the Harvard Mark I, they could be re-programmed by re-wiring with plugs like a switchboard, or with paper punch tape
De-bugging computers is born
9 September 1945 –Ensign Grace Murray Hopper (RADM, USN) removed the first “bug” from a electromagnetic relay in the Harvard Mark II where it had been smashed, halting the computer. She taped the moth to a page the log book.
Technological Breakthroughs
1947 - William Shockley, John Bardeen, and Walter Brattain invent the "transfer resistance" device, later to be known as the “transistor,” to replace vacuum tubes
1951 – Magnetic-core memory also replaces tubes, making real-time memory use practical
Remington Rand UNIVAC – 1951 - Delivered to the Census Bureau
First mass-produced computer (46 made)
The size of a one-car garage (14’ x 8’ x 8.5’)
5,200 vacuum tubes required a chilled water air conditioning system
Government, GE, insurance companies, DuPont (scientific)
1956 Concordance of the Bible (6 mos. vs. 30 yrs)
Integrated Circuit
1958 – Jack Kilby created the first “integrated circuit” at Texas Instruments to prove that resistors and capacitors could exist on the same piece of semiconductor material. His circuit consisted of a sliver of poisonous germanium with five components linked by wires. Germanium was soon replaced by silicon (1961).
Microprocessors 1971 - Federico Faggin, Ted
Hoff, and others at Intel designed the 4004 microprocessor while building a custom chip for Busicom, a Japanese calculator maker. The 4004 had 2,250 transistors, handling data in four-bit chunks, and could perform 60,000 operations per second.
Invention of the Microprocessor made computers affordable for individuals
Electronic Hobby Computers evolve into Personal Computers!!
1975 - Electronics hobbyists buy the earliest personal computer MITS Altair 8800 (Intel 8080)
1976 - Consumer computers arrive after several companies begin large scale manufacturing 1976 - Apple Computer Apple II 1977 - Radio Shack TRS-80 Commodore PET Heath H8, H9 1981 – IBM PC
Effects of Computers on Society Entertainment
Movies, Games, Music, Photography Financial
Credit Cards, Debit Cards, Phone cards (cash-less society) Communication
Phones, Email, Instant Messaging Work
Auto-mechanic to Engineers, to Business Management, Time Clocks Work at Home New Jobs & How we do our Jobs
Home Thermostat, Coffee Makers, Home Network, Smoke & CO2 detectors,
Garage Doors, Security Alarms Transportation
Trains, Planes, Automobiles, Ships, Buses Access to Information Education Healthcare
Diagnostic Tests, Monitoring, New Surgical Procedures, New Medicines
Effects of Computers on Science
Engineering Computers are now used by all types of Engineering
Electrical, Chemical, Mechanical Design, Modeling, & Testing New Computer-specific types of Engineering
Software Engineering, Hardware Engineering Research Information sharing & access (Internet, email) Healthcare (database, privacy) Scientific computations Statistical analysis (medicine, politics)
Effects of Computers on Technology
Computers Everywhere Convergence of technologies Single-purpose to Multi-purpose devices Miniaturization Rapid Rate of Growth New Devices & Uses (communication, HDTV,
new storage devices) Shared Uses
e.g., wiring: TV, Phone, Electricity, Internet
Requirement 3: Types of Computers Uses of Computers
3a. Describe four uses of computers outside the home
3b. Describe three ways you and your family could use a personal computer other than for games and entertainment.
Types of Computers
Categories Special purpose (digital watch, emission control
computer, home security system) General purpose (Mainframes, Minis, PCs)
Sizes Supercomputers (beginning with the CRAY I in
1976!! - massively parallel processing) Mainframes (multi-user IBM, NCR, etc.) Minicomputers (multi-user IBM, HP, Sun, file
servers) Microcomputers (single-user personal computers)
Uses for Different Types of General Purpose Computers Supercomputers…
Specialized tasks involving complex calculations Weather forecasting, satellite tracking, simulation, research
Mainframe computers Large to mediums companies – highly reliable, centrally located supporting
100’s to 1000’s of users. e.g. 100,000 trans/sec Banking, library automation, flight scheduling, census
Minicomputers… Medium sized companies Operate manufacturing plants, track orders and inventory, multi-user
applications, web, email, and database services. Workstations
Powerful desktops used by engineers, scientists, graphic artists, moviemakers who need special software requiring hi-speed processors.
Microcomputers (Personal Computer) Spreadsheets, word processing, graphics, games, communications,
searching Desktop, laptop, notebook, and hand-held
Requirement 4 (a,b): Parts of a Computer How Data is Stored
4a. Identify and explain the major parts of a computer system.
4b. Explain how text, sound, pictures, and video are stored in a computer’s memory.
Parts of a Computer – CPU
Central Processing Unit (CPU) is the “brain,” and is some brand of microprocessor chip Processes data, stores
information into memory, performs operations on the information, & creates output.
Intel 4004 – 2,250 transistors; 8088 – 40,000; 80386 – 275,000; 80486 – 1 million; Pentium – 5.5 million; Pentium II – 7.5 million; Pentium III – 28 million; Pentium 4 – 42 million.
Input Devices (digitizers)
Keyboard (QUERTY, Dvorak, custom – an alphanumeric symbol digitizer)
Mouse and other Pointing devices Trackball, joystick, pressure-sensitive tablet,
touch screen – a location digitizer Sound digitizer (microphone, MIDI device) Scanner (an image digitizer) Sensor (temperature, light, moisture, smoke,
movement, or other environmental digitizer)
Output Devices Printers (the first output device) and Plotters
Impact (daisywheel) and dot-matrix Thermal (early BW and color) Laser (highest quality, BW and color) Plotters (pens on moving arms like seismographs) Ink-jet (color plotters lead to printers, some also thermal)
Monitor Analog: CRT (cathode-ray tube) – the “monitor” Digital: LCD (liquid-crystal display) screens
Sound Card (digital to analog converter) - speakers Modem (modulator-demodulator; another digital to
analog signal converter)
Input/Output Devices
Storage Units – hard disk drives, floppy drives, tape drives, CD/DVD drives
Touch Screens & Tablets – pressure &/or heat sensitive
Connecting Devices – modems (phone, broadband, DSL), Ethernet adapter, WI-FI (wireless fidelity), Router.
Parts of a Computer – Storage Devices
Tape Drives
Hard DrivesCD/DVD Drives
Floppy Drives
Storage Devices – Stores Programs & Data. Provides “virtual memory” for CPU.
Storage Media
Magnetic – disk, tape
Optical – CD / DVD Flash – memory
storage media
Tape
Disk – floppy, hardCD/DVD Drives
Optical – CD / DVD
Magnetic Storage Sequential Access
Magnetic Tape Reel-to-reel or cassette Original microcomputer media,
now used for backups Random Access
Floppy Disk (8”, 5 ¼”, 3.25”, etc.) Magnetic powder coating on flexible disk in sleeve Drive contains an actuator and read-write head on arm
Hard Disk Magnetically coated metallic platters on high-speed spindle Drive actuator with many floating read-write heads on arms
For more information see How Hard Drives Work andPC Tech Guide (where this diagram came from ----- >)
OpticalStorage
CD-ROM (Compact-Disc Read-Only Memory) Write laser burns pits into the surface of the disk Read laser bounces light off the pitted surface WORM – Write Once Read Many, or CD-R Newest formats: CD-RW, DVD, DVD-RW
Capacity (newer media have higher capacities) Compare the CD-ROM surface (left) to the DVD surface (right) For more information see How CDs Work and PC Tech Guide
Medium Typical Capacity Equivalent Size
High-density disk 1.4 megabytes 720 typed pages
Hard Drive 80 megabytes 40,000 pages
CD-ROM 540 megabytes 270,000 pages
DVD 4.5 gigabytes Motion picture
Blu-ray DVD 25/50 gigabytes HD Motion picture
Memory Read-Only Memory (ROM)
ROM is permanent, often re-writable (CMOS)
Random Access Memory (RAM) RAM is transient unless
permanently powered (Palm) Flash Memory
Type of RAM (re-writable memory) that retains information even after the device is turned off. Used in digital cameras, handhelds, cell phones, “Thumb” drives.
Processors & Co-processors
Central Processing Unit (CPU) is the “brain,” and is some brand of microprocessor chip Processes data, stores
information into memory, performs operations on the information, & creates output.
Controllers & co-processors Used to offload computing tasks from the CPUGraphics controller, math co-processor, disk controller.
Networks Many computers make digital connections to a local
area network (LAN) or wide area network (WAN) via telephone lines (twisted pair), coaxial cable, fiber optic cables, radio, or wireless communications. Networks make it possible for large numbers of
computers to communicate with each other, and to share resources such as files, applications, and devices.
Networks manage digital traffic by moving data as packets, with elaborate protocols for ordering or prioritizing them, checking errors, and filtering.
Networks can be connected to WANs or to the Internet via modem, ISDN, cable modem, satellite, and other devices
Modems & Network Cards
Enable Connections to a Network Computers communicate if they are electronically
connected, have the appropriate software, and common protocols (rules for negotiating their communication). Computers are digital, as are networks Phones and wireless communications move data as analog
sound waves or as a digital signal.
Modems
Modems translate digital information to analog sound for transmission along telephone lines, and back to digital at the other end. They must synchronize speeds, block sizes, and correct errors during communications. Early modems were 300 baud (bits per second, or about 36
characters per second). Analog telephone lines are generally limited to modem speeds of
33.6 KBPS (4000 bytes/sec) & at most 56K. ISDN connections enable 64K to 128K ISDN and make use some of the digital aspects of modern telephone lines.
DSL uses high frequency compression for 1.5 Mbps down. Frequency is different then voice - enabes voice & data over same wire
Cable Modems from 3-5 Mbps of shared bandwidth. FIOS up to 15 Mbps.
Network Cards
Connects computer to a Network Ethernet – most common Separate Card or
Integrated into Motherboard
Wireless Fidelity (WiFi) Connects computer to
a Network wirelessly over a short distance.
Connects to a base station or router
Different Protocols & Speeds
Electronic Mail (Email) Email allows users to send and receive electronic messages
over any type of network or modem connection using a store and forward methodology. Messages are uploaded to the local mail server, passed to the
recipient’s account on that server, or forwarded to an external mail server over a number of “hops” via intermediate servers.
Messages are downloaded by the recipient’s mail client from their mail server when the messages arrive, or when the recipient opens an active connection to that server from their client.
Depending on the type of mail service, messages may remain on the host mail server or be downloaded to the local computer.
Improved bandwidth for networks and the Internet has made instant messaging and real-time chat a viable form of electronic communication, and is making voice-over-IP practical as well.
For more detailed information see How Email Works
SMTPConnections
SMTPConnections
SMTPConnections
SMTPConnections
Web Mail Server(HotMail, Yahoo,
AOL, etc.)
POP3 Server(your ISP)
IMAP Server(UNT EagleMail)
Proprietary data-based Mail Server(Exchange, GroupWise)
EmailClient
(Outlook)
WebBrowser
(IE orNetscape)
IMAP Client(Outlook Express)
POP3 Client(Netscape, OE)
* Proprietary servers usually store email messages and attachments in a real database of some form
* POP, IMAP, and some Web Email servers store email messages and text-encoded attachments as text files or html in most cases
* Email moves between
servers over SMTP
* The user reads their email by using some sort of client software to connect to the mail server
Parts of a Computer -Motherboard
MathCo-processor
Power SupplyAttachment
Ports
CPU
ExpansionSlots
GraphicsControllerSlot
Memory (RAM) Slots
Disk Attachment Slots
The CPU is normally mounted in a plug-in socket on the motherboard
Circuit board tying everything in the computer together via an electronic “bus”
Parts of a Computer
Controllers – (Co-processors) are used to offload computing tasks from the CPU, such as math co-processor, graphics controller, disk controller.
Random Access Memory (RAM) and Read-Only Memory (ROM) ROM is permanent, often re-writable (CMOS) RAM is transient unless permanently powered (Palm)
Ports – Enable you to connect devices to the computer. Input – Keyboard, Mouse, Scanner, Sensors Output – Printer, Display Monitor, Controller, USB/Firewire – Supports input/output devices & other peripheral
devices for hi-speed transfer of information Power Supply – Provides electricity to the motherboard, disk
drives, & other devices in the computer. Converts household current to a voltage level that can be used by the computer. (e.g. 120V to 12V or 20V)
File Types & File Contents
Computers use binary numbers (1’s and 0’s) to store ALL data. One digit is a bit; four are a nibble, eight are a byte. File extensions typically identify type of data in file.
Text.txt ASCII text
.doc Microsoft Word (word processing)
Image.jpg Photographs. Adjustable compression ratio
.gif Icons, buttons, drawings, figures
.bmp Bitmap
Sound.mp3 High compression of sound.wav Windows platform sound file.wma High compression quality sound
Video.mov Movie file.mpeg Movie file
Data Representation in Memory and Storage: Numbers Integers (whole numbers) can be stored directly in binary bytes.
0 = 00000000 3 = 00000011 1 = 00000001 4 = 00000100 2 = 00000010 5 = 00000101
A byte can be translated into a decimal number by adding up the decimal values indicated by “1’s” in the binary number 128 64 32 16 8 4 2 1 decimal values 0 0 0 0 0 0 0 0 binary places (8-bit) 0 0 1 0 1 0 1 0 binary equals 42 decimal (32+8+2)
Additional translation schemes have been developed to match character sets to decimal and binary, such as ASCII & EBCDIC
Data Storage: Text
Text and numeric characters are stored as ASCII (American Standard Code for Information Interchange ) values, consisting of 128 different decimal codes. Extended ASCII goes to 256 codes. (0 to 255)
ASCII translates each letter and number into a binary byte (8 bits) that the computer understands. "1" is ASCII decimal “49” and binary 00110001 "A" is ASCII decimal “65” and binary 01000001 “&” is ASCII decimal “38” and binary 00100110 “z” is ASCII decimal “122” and binary 01111010
EBCDIC (Extended Binary Coded Decimal Interchange Code), also an 8 bit representation. Mainframe usage.
UNICODE support and implementations are increasing to provide “Universal” character set support.
ASCII Translation - Text
ASCII Decimal ASCII Binary Alphanumeric
2 1000010 B
18 1001111 O
26 1011001 Y
20 1010011 S
3 1000011 C
18 1001111 O
22 1010101 U
21 1010100 T
20 1010011 S
Data Storage: Pictures Computer pictures are stored as millions of colored dots
called “pixels” (picture elements) that have to be translated to an analog signal for an analog CRT monitor to display them (LCD panels are already digital so no translation is required).
The more pixels a picture has, the better it looks (it has a higher resolution). Each pixel has an associated color and location on the screen expressed in binary terms.
Black & White Monitors – One Pixel Represented by 1 bit., each black & white pixel is either on or off.
Grayscale – One Pixel Represented by 1 byte (8 bits) for 256 shades of gray between black & white.
Color – One color pixel is three dots, Red, Green, and Blue (RGB) that combine to create a color. Color pixel combinations range from 256 possible colors (8 bit) to over 16.7 million colors (real color, 32 bit, or true color).
When stored, each pixel’s information is saved to disk separately. In a true color (32 bit) pixel, 4 bytes are used to store the color information for each dot in the pixel. For a 1600x1200-pixel display this is 8-million bytes of video memory, stored as one 8mb disk file.
Sample of a 8-Bit Color Palette0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1100
Data Storage: Sound Normal sound is made up of waves or vibrations.
Each sound wave has a wavelength (how far between the waves) and amplitude (how high the wave is).
A mixed, analog waveform signal comes in to the sound card from a source (microphone) and is processed in real-time by an analog-to-digital converter (ADC) circuit chip to create a binary (digital) output of 1s and 0s. This is done at a specified interval or “sampling frequency” (i.e., 1/10th of a second).
The digital output from the ADC is further processed and compressed by the digital sound processor (DSP), and the output from the DSP is sent to the computer's CPU via the sound card connections and the data bus on the motherboard.
Digital sound data is processed by the CPU and sent to the hard-disk controller to be recorded on the hard-disk drive as a wav file.
Playback is a reversal of this process, using a a digital-to-analog converter (DAC) circuit chip to play back the binary sound file. For more detailed information see How Sound Cards Work
Storing Sound Sound waves are sampled at a constant rate (sample rate) Amplitude (height) of the wave is stored. The higher the sample rate the better the sound The higher the sample rate the more data is stored
Wavelength
ampl
itud
e
sample rate
Analog to Digital
CD Audio DVD Audio
Sampling Rate 44.1 kHz 192 kHz
Samples per second 44,100 192,000
Sampling Accuracy 16-bit 24-bit
Number of possible Output Levels
65,536 16,777,216
Data Storage Video
Video is lots of pictures with accompanying sound.
Video formats combine Many Picture “files” With Audio file data
Into a Single file format
Requirement 4 (c,d): File CompressionChip-based devices
4c. Explain how file compression works and how compression affects the quality of the file.
4d. Describe two computer chip-based devices, and describe how they are "smarter" because of the chip and its program.
File Compression
Data files can take up lots of storage on your hard drive. The term “compression” means using special methods to reduces these file sizes. For most types of documents, it is critical to restore all of the
information when the file is de-compressed (returned to its full size), such as when it is opened
Images, on the other hand, can be compressed to either save every detail, or to lose some detail in return for a smaller file size.
“Lossless” compression methods save all of the data Lossy compression gives up some data in return for much better
file size reductions. See http://en.wikipedia.org/wiki/Data_compression
Text Compression
Text data compression takes advantage of the fact that words and word fragments are often repeated in documents. The words or fragments are saved to a list (called
a dictionary) and replaced by reference numbers that link back to the dictionary items
When the document is opened for editing or viewing, the reference numbers point to the original text, which is retrieved from the dictionary
Image Compression
Image files are capable of being compressed because pixels near one another are often the same color Lossless: Run-length encoding (RLE), GIF Lossy: JPEG, PNG
Sound files are compressed by discarding parts of the digitized waveforms that humans cannot easily hear (e.g., MP3, MP4 iTunes)
Chip-based Devices
Almost all electronic devices today have some type of computer “chip” to help them
Modern cell phones have far more computing capability than desktop PCs of 10 years ago
GPS receivers were originally the size of a large toaster oven but now fit comfortably on a small chip, found in most cell phones
Chips used to have only Read-Only Memory (ROM) but many are now re-programmable and can change how they operate as they run
Chip-based Devices:Small Wonders
DVD Players
(Old)
(New)
Cell Phones
(Old)
(New)
USB Drives Digital Cameras
iPads, Tablets
GPS
Requirement 5 (a,b,c):Program Development,Software, and Programming Languages
5a. Explain what a program is and how it is developed.
5b. Name 3 programming languages, and describe their uses.
5c. Name 4 software packages you or your family could use, and explain how you would use them.
What is a Program?
A set of Organized Instructions that Tell the Hardware what to Do Examples
Math – add, subtract, multiply, divide Compare Logic IF, THEN, ELSE AND, OR, NOT Execute Another Instruction Open/Close File, Read/Write Record Display Output to Screen Read Sensor
Computer Software Three main categories of programs
Operating Systems Control all of the computer’s basic operations
Input, output, file, memory, and task management Text-based (z/OS, UNIX, CP/M, MS-DOS) and graphical (GUI)
(Xerox Star, Macintosh, X-Windows, Microsoft Windows) Application Programs
Perform specific jobs or tasks with the computer Database manager, Transaction Managers, spreadsheet, word
processor, page layout, graphics, CAD, animation, sound, communications
Programming Languages A program used to develop and write other
programs and applications
How a Program is Developed
Machine code (low-level code, object code) Specific to the microprocessor (Z80, 6502, 8088) An instruction set to move binary data through the CPU Assembly language is a mnemonic symbol set for the CPU
High-level languages Source code
COBOL, FORTRAN, BASIC, Pascal, Ada, C, VB Object oriented (modular) languages – C++, Java
Translated by a compiler into object code before run-time …or translated by an interpreter into object code at run-time (MUCH slower
– Basic, scripting languages like Perl, JavaScript, VBScript, HTML, XML)
Compile &Assemble
ObjectCodeWrite Program
In Hi-levelLanguage Runtime
Interpreter
CPUInstructionsto CPU
Requirement 5 (a,b,c):Program Development,Software, and Programming Languages
5a. Explain what a program is and how it is developed.
5b. Give 3 examples of programming languages, and describe their uses.
5c. Name 4 software packages you or your family could use, and explain how you would use them.
Programming Languages COBOL (COmmon Business Oriented Language) for business
data processing FORTRAN (FORmula TRANslator) for scientific and engineering
problems BASIC (Beginner’s All-Purpose Symbolic instruction Code) for
educational and personal computing. Visual Basic for Applications (VBA) is used to build client-server applications and integrate them with office applications.
C, C++ and Java for cross-platform portable, object oriented (reusable modules) application and game development
PHP, Perl, JavaScript, VBScript, and MANY other scripting languages, all interpreted, for system administration, web pages, data work
Web Languages
Aid in building web sites & performing operations over the internet. HTML – hypertext markup language, basic
language for displaying text & pictures on web sites & linking web pages together
PHP, ColdFusion – run on a web server to create the web pages that are sent to the user’s browser
Java, JavaScript and VBScript – run within the user’s web browser to make a web page interactive (like Google Maps)
How Are Programs Written
Programs Combine Boolean Logic with Comparison, Mathematical & Other OperationsIF “You complete all the requirements” THEN “Mr. Abernathy will sign your Blue Card” ELSE “You will get a Partial completion”Where “You complete all the requirements” =
If (Requirement 1 = Correct AND Requirement 2 = Correct AND Requirement 3 = Correct AND …… … Requirement 9 = Correct)
Requirement 6 Do 3 Options Correctly
Requirement 5 (a,b,c):Program Development,Software, and Programming Languages
5a. Explain what a program is and how it is developed.
5b. Give 3 examples of programming languages, and describe their uses.
5c. Name 4 software packages you or your family could use, and explain how you would use them.
Database Managers
Examples: Microsoft Access, Oracle, MySQL, SQL Server
Easy way to Store, Access, Query, & Update data Data typically organized in a Table like format with
Columns and Rows. Example: Troop Database of Tables with columns
Scouts: Name, Address, Patrol, Current Rank Staff: Scout Name, Role, Start Date, End Date Merit Badges: Scout Name, Merit Badge, Eagle, Date
Word Processing Programs
Examples: Microsoft Word, Corel Word Perfect & others
Make writing & FORMATTING text easier Arranging – line space, paragraph styles, headers, Correcting – spell-checking, grammar, format Text format – size, font, color, & style Inclusion of graphics & tables
Mail merge from a database program for names & addresses for a form letter.
Spreadsheet Programs
Examples: Microsoft Excel, Lotus 123, & others
Performs arithmetic on numbers arranged in rows and columns, and displayed in a table with cells, identified by Numbered rows and Lettered columns
User specified formulas and/or program provided functions.
Have interfaces to database programs Enable “What-if” operations
Presentation Programs
Examples: Microsoft Powerpoint, Freelance Graphics, Visio
Aid for public speaking Feature screens/slides that list important points Can include pictures, charts, graphs Can include Sounds & Animations Can be projected onto a screen, printed, or sent as
a file for others to view
More Application Programs Desktop publishing – design a page with a variety of elements
including words, pictures, & drawings. Graphics & design – create & edit pictures and drawings. Could
be 2 & 3 dimensional varieties. CAD (computer-aided design) programs used by engineers.
Photo-editing – digital darkroom enabling you to enhance pictures by cropping, sharpening, adjusting brightness & contrast, deepening color. Also photo-album programs for organizing photos.
Video editing – digital movie studio for enhancing video. Web Page editors – help create Web Sites without having to
write HTML (common formatting language for the web). Create web page using desktop publishing or document editing packages and it converts it into html for you Enables adding animation & scrolling text.
Communications – email, web-browsers, terminal emulators
Requirement 5d:Protecting Your Computer & Information Saved on It
5d. Discuss ways you can help protect a computer from viruses and how to protect the information stored on a computer.
Protecting Your Computer from Viruses Virus – program that could execute on your computer and cause
“malicious” damage. Erase Files, Obtain personal information, record keystrokes,
copy screens, make machine inoperable, massive email, spread the same virus to others
Anti-virus Software Run Regular Full System Scans Keep Software Current Keep Virus Information Current Enable email & file scanning
Don’t open or execute anything from someone you don’t trust Don’t open or execute anything that looks suspicious (even if it is
from someone you trust). Only visit Web Sites you trust
Protecting the Information on Your Computer
Use Antivirus Software Backup important files regularly onto backup
drives/CDs. Scan backup disks for viruses
Buy software from trusted sources. Unauthorized copies could contain viruses and are illegal.
Use a Firewall – software, hardware, or both. Controls what programs can communicate out of or into your computer or network.
Protect your passwords. Consider using an encrypted password manager application.
Requirement 5e:The Internet & The World Wide Web
5e. Describe how computers are linked to generate and access the Internet and the World Wide Web.
World Wide Web Traces to ARPANET (1969) – small network launched by the
Advanced Research Projects Agency in the US Dept of Defense. Researchers developed a way to link that network to others around
the world. The birth of the Internet
Tim Berners-Lee (1990), physicist working at CERN (European Organization for Nuclear Research) developed way to access & display the vast stores of information on the intenet.
Simple system of organization Main Innovations:
Universal resource locator – form of address HTML – hypertext markup language
Every computer connected to the Internet can be identified by its Internet protocol address (IP address, e.g. 168.18.99.248) or by its domain name (e.g. scouting.org) Domain names are registered – maintained by a nonprofit group
(International Organization for Assigned Names and Numbers)
Requirement 6:Using Computer Software Programs - Labs
6. Of 8 different options, do 3 of your choice.
Do as homework, or Next Session in Class (in 2 weeks)
Requirement 6 Options:(see workbook for details) Spreadsheet Program Word Processor Computer Graphics Program Internet Search Engine Presentation Software Digital Photography Database Manager (sorting, filtering)
I NEED TO SEE EVIDENCE THAT SHOWS THAT YOU COMPLETED YOUR SELECTED OPTIONS (e.g. File, hardcopy, visual inspection of work)
Requirement 7:Programming Labs or Visit to a Business
7. Of 5 different options, do 1 of your choice.
Do as homework, or Next Session in Class (in 2 weeks)
Requirement 7 Options:(see workbook for details)
Write a simple database program Use a CAD program (like Google Sketchup) Create a blog Design a web page Visit business or an Industrial plant that uses
computers.I NEED TO SEE EVIDENCE THAT SHOWS THAT
YOU COMPLETED YOUR SELECTED OPTION
(e.g. File, hardcopy, visual inspection of work)
Requirement 8:Copyright Laws
a. Explain why copyright laws exist. b. Explain why is it not permissible to
accept a free copy of a copyrighted computer game or program from a friend.
c. Explain the restrictions and limitations of downloading music from the Internet.
Copyrights & Software Piracy Software publishers have always taken pains to protect their
intellectual property. Most software is covered by copyright, meaning that it cannot be
copied without special permission from the author Often there will be a specific statement that you can make a backup
Most commercial software packages have elaborate licensing agreements, much more like leasing than buying
Shareware, freeware, banner ware, ad ware, and open-source software are all variations on the licensing of software
Public-domain software is not copyrighted, and is free to be copied and used
Copying software outside the limits of the licensing agreement is a crime; the Software Publishers Association (now called SIIA) has an extensive anti-piracy program and web site.
Copyright Laws
Digital Millennium Copyright Act (DMCA) defines copyright laws for electronic media
Punishments can include: First Offense:
Fine: up to $500,000 or Imprisonment: up to 5 years, Or Both
Subsequent Offenses: Fine: Up to $1,000,000 or Imprisonment: up to 10 years, Or Both
Requirement 9:Career Opportunities
Find out about three career opportunities in the computer industry. Pick one and find out what education, training, and experience this position requires.
Computers at Work The computer industry is HUGE with many
opportunities in sales, development, manufacturing, training, implementation, support, and consulting Electrical engineers, electronics technicians, repairmen Application designers, developers, support staff, instructors,
consultants, technical writers, and editors Graphics designers, special effects, art and film technicians,
medical technicians, geosystems analysts, and any other job where the individual primarily processes computer-based information
System administrators, network administrators, database administrators, security analysts, communications specialists, and outsourcing service providers
Jobs related to the use of robotics in manufacturing
Summary Online Safety Computer’s History & its Impact on Society,
Science, & Technology Types & Uses of Computers Parts of a Computer How Data is Stored in a Computer Program Development & Programming Languages Protecting Your Computer & its Information Software Programs Copyright Laws Career Opportunities