You are on page 1of 125

What is MS?

 Microsoft is a company/corporation in USA.


 Bill Gates is the owner of Microsoft Company.
What is Microsoft Office?
 Microsoft office is used for special purpose office work
such as:
 Documentation
 Work Sheet
 Presentation
 Data base.
MS-OFFICE HAS FOUR PAKAGES

MS-WORD MS-EXCEL MS-


POWERPOINT

MS-ACCESS
FIRST PACKAGE
MS-WORD
What is MS-WORD ?
 Microsoft Word is a word processing software pakage.
 You can use it to type letters ,reports,and other
documents.
 The four main operations of a word processing pakage
are:
 Defining the form of the document
 Entering a document from a keyboard
 Editing (modifying) the document
 Printing the document.
Components of Microsoft Word
The Ribbon that displays various
commands and features of all the
tabs
Features of Microsoft Word
Creating Document.
Editing document.
Graphics.
Word Art.
Printing Document.
Proofing Word Document
 Spelling Checker
 Grammar checker
 Thesaurus
 Auto correct.
Formatting Word Document
 The process to change the appearance of a document is
called the document formating you can format a single
character, word, lines, paragraph or whole document.
 The document is formated to make it more attractive
and beautiful.
 The commands used to format the document are
selected from the Home tab.
Creating Tables
 Microsoft word provides a tool called table. It is used
to organize information of a rows and columns .

 A table is made of series of rows and columns.

 The intersection of row and column is called cell.


MS-EXCEL
Components of MS-Excel
The Ribbon displays various
commands and features of all the
tabs.
MS-Excel
 Excel is an Microsoft Application that is mainly used
for calculations and mathematical works.
a) It is a spreadsheet application in which we can add sheets
as per our requirements. In a single sheet, it consists of
rows and columns and cells, where every cell has different
address.
b) Sum, product, subtraction, division and many
mathematical, logical functions are available within it.
c) Other features include tables, charts, clip art and more.
d) It is basically used for payroll, accounts, mathematical,
and for other business purposes.
Features of MS-Excel
 Hyperlink. We can link one file to another file or page.
 Clip art. We can add images and also audio and video clips.
 Charts. With charts, we can clearly show a product(s) evaluation to a client. For example,
you can display a chart showing which product is selling more or less by month, week,
and so forth.
 Tables. Tables are created with different fields (e.g. name, age, address, roll number, and
so forth). You can add a table to fill these values.
 Functions. There are both mathematical functions (add, subtract, divide, multiply), and
logical ones (average, sum, mod, product).
 Images and backgrounds. You can incorporate images and backgrounds into each
sheet.
 Macros. Macros are used for recording events for future use.
 Database: With the data feature, you can add any database from other sources to it.
 Sorting and filtering. We can sort and/or filter our data so that anything redundant or
repetitive can be removed more easily.
 Data validations. This tool can help you consolidate your data.

 Grouping. The grouping feature helps you both to group your data and ungroup it so
that you have subtotals and so forth.
 Page layout. Themes, colors, sheets, margins, size, backgrounds, breaks, print, titles,
sheets height, width, scaling, grids, headings, views, bring to front of font or back
alignment, and many more are available for you to lay out your page.
Arithmetic calculation
Graphs And Charts
Some Functions of MS-Excel
 Average
 Count
 Pi
 Sum
 Product
 Max
 If
MS-Power point
What is Power Point ?
 PowerPoint is computer software created by
Microsoft which allows the user to create slides with
recordings, narrations, transitions and other features
in order to present information. An example
ofPowerPoint is presentation software made by
Microsoft.
Features of MS-Power Point
 Animatation
 Auto shapes
 Editing presentation
 Spell checking in presentation
 Hiding and Un-hiding slides
 Running presentation
 Slide transition
 Saving presentation
 Printing presentation
What is MS-ACCESS ?
 MS ACCESS is a tool which used for create database
and it is also a application software.
Features of MS-ACCESS
 Database
 Record
 Field
 Table
 Form
 Report
 Primary key
 Simply
 Ms word used for to write documents
 Ms excel used for to make spread sheets
 Ms PowerPoint for presentations
 Ms access for data base management purpose
2/3/2020

Introduction to
Computers & Internet

What is a computer ?

 Computer :

A computer is an electronic device, operating under the


control of instructions (software) stored in its own memory
unit, that can accept data (input), manipulate data
(process), and produce information (output) from the
processing. Generally, the term is used to describe a
collection of devices that function together as a system.

1
2/3/2020

What does a computer do?

 Computers perform four general operations


input, process, output, and storage

 Information processing cycle


inputting, processing, outputting, and storing make-up this
cycle.

 Processing requires data


data – collection of raw facts, figures, and symbols given to
a computer during the input operation (meanings and ideas)

 Manipulate data to create information


information – data that is organized, meaningful, and
useful. (the final form of data).

Why is a computer so powerful?

 Power is derived from the computer’s capability to perform the


information processing cycle with speed, reliability, and accuracy

 The computer’s capacity to store huge amounts of data and


information.

 The computer’s ability to communicate with other computers.

 The computer’s ability to reduce the cost and time. (point of


view).

2
2/3/2020

How does a computer know


what to do?

 It must be given a detailed set of instructions

 These instructions are called a computer program or


software

 Executes one program instruction after another until the job


is complete

What is computer system consists


of ?

 A computer system consists of hardware and software.

 Hardware is the equipment or physical parts of computer, which makes


up the computer system.

For example: Input devices [keyboard, mouse and scanner]

Output devices [printer, monitor and projector].

 Software is any sets of instructions that tells the hardware what to do. It
is divided to
i. system: programs that control operations of the computer.
ii. Application: programs that designed to make users more productive.

3
2/3/2020

Types of computer according to


their size

1. Super Computer:

It is a very large computer that can operate many programs at the same
time , where we can connect with hundreds of terminals.
The disadvantage of these computers are their cost.

2. Main Frames:

It is the most popular computer in frames and companies. We can use


(Control units) and (Modem) to connect with hundreds of terminal with their
computer according to the time sharing system.

Types of computer according to


their size

3. Mini computer:

This computer is widely used, because it’s cheap and we can connect with many
terminals and networks.

4. Micro computer:

It is called the personal computer (PC): it is popular everywhere and developed


very quickly. Some of its types are : (personal computer, laptop and palm).

5. Workstation computer:

It is like the personal computer (PC) and it is sufficient especially in viewing


graphics and colors. It is used by engineers and scientists in labs and factories.

4
2/3/2020

Types of computer according to


their size

6. Control computer:

It is used in controlling operations in industrials and medical devices, travel


media like planes and cars to alert in any dangerous case, and it is used in
communication media like the central to translate calls.

What are the components


of a computer?

 Six primary components


 input devices
 the processor
 memory
 output devices
 storage devices
 communications devices

 the processor, memory, and storage device are housed in a


box-like case called the system unit

5
2/3/2020

Input Devices

Input device – any hardware component the allows users to enter data,
programs, commands, and responses into a computer (translating the data
from users to processing unit)

 Examples of input devices


 Keyboard (board contains letters numbers …)
 Mouse ( small hand-held device……)
 Scanner (convert pages to electronic signals)
 Bar Code Reader
 digital camera
 Joy stick

Input Devices

 The Keyboard
 desktop computer keyboard typically has 101 to 105 keys
 handheld computers use an onscreen keyboard and use a stylus to select
keys

 The Mouse
 A pointing device that fits under the palm of your hand
 Control the movement of the pointer on the screen and make selections
from the screen
 One to five buttons
 bottom is flat and contains a mechanism or ball that detects movement
 Notebooks have a pointing device built into the keyboard

6
2/3/2020

Input Devices
 Scanner
A scanner can be used to input pictures and text into a computer.
There are two main types of scanner; Hand-held and Flat-bed.

13

Input Devices
 Bar Codes

 A bar code is a set of lines of different


thicknesses that represent a number.

 Bar Code Readers are used to input data from


bar codes. Most products in shops have bar
codes on them.

 Bar code readers work by shining a beam of


light on the lines that make up the bar code and
detecting the amount of light that is reflected
back.

14

7
2/3/2020

Input Devices
 Digital camera

A digital camera can store many more pictures than an ordinary camera.
Pictures taken using a digital camera are stored inside its memory and can be
transferred to a computer by connecting the camera to it. A digital camera
takes pictures by converting the light passing through the lens at the front into
a digital image.

15

Pointing Devices - Direct

 Touch Screens

16

8
2/3/2020

Touch Screens

 Often used for applications with occasional use, for example


 Bank ATMs.

 No extra hardware - used for input and for output.

 Can be precise to 1 pixel

 Good for menu choice - not so good for other functions

 Intuitive to use

17

Output Devices

 Output devices – make information from processing


available for use
 can be presented in many forms.
 printed report or displayed on a screen.
 printers and display devices are common output devices for
word processing, spreadsheets, and database management.

9
2/3/2020

Monitors

CRT LCD

 A monitor is a peripheral device which displays computer output on a


screen or – plastic or metal case that houses a display device
 Screen output is referred to as soft copy.

 Types of monitors:

 Cathode-ray tube (CRT)


 Liquid Crystal Display (LCD or flat-panel)
19

Video Display Terminology

 Pixel
picture element (smallest unit of an image, basically a
single dot on the screen)

 Resolution
 number of pixels in the image
 Common resolution size is 1024x768
 Refresh rate
The CRT electron gun
“shoots” 3 electrons at
the screen representing
the amount of red, green
20 and blue for the pixel

10
2/3/2020

Printers

A printer is a peripheral device that produces a physical copy or


hard copy of the computer’s output.

21

Output Devices

 Printers
There are two kinds of printers
 impact printers – strikes an inked ribbon against the paper (dot
matrix printer)

 Nonimpact printers – form characters by means other than


striking a ribbon against paper (ink-jet printers or laser printers)
 advantage – print higher-quality text and graphics, better job
printing different fonts, quieter.

22

11
2/3/2020

Types of Printers

Inkjet Laser

 Inkjet printer, also called a  Laser printer works like a


bubble-jet, makes characters copier
by inserting dots of ink onto
 Quality determined by dots
paper
per inch (dpi) produced
 Letter-quality printouts
 Color printers available
 Cost of printer is inexpensive
 Expensive initial costs but
but ink is costly 23
cheaper to operate per page

Audio Output: Sound Cards and


Speakers

 Audio output is the ability of the computer to output sound.


 Speakers: converts the voice signals to voice analog to be heard
by users.

 Two components are needed:


 Sound card – Plays contents of digitized recordings
 Speakers – Attach to sound card

24

12
2/3/2020

Processor

 Processor or central processing unit (CPU) – performs the


actual processing of data interprets and carries out the basic
instructions that operate a computer
 The processor tells your computer what to do and when to do
it, it decides which tasks are more important and prioritizes
them to your computers needs.
 The CPU is housed in a single silicon chip called
a microprocessor.

Processor

 The processor controls other parts of the computer such as the memory, the
hard drive and the video card.
 The processor is found in most high-tech gadgets such as
 game consoles, digital audio players, and GPS devices.

 Processors have complicated circuitry and their architecture gets more


complex with every improvement in their design.
 The performance or speed of a processor depends on the clock rate (generally
given in multiples of hertz) and the instructions per clock (IPC), which
together are the factors for the instructions per second (IPS) that the CPU can
perform.
 Clock rate is the speed at which a microprocessor executes instructions.

13
2/3/2020

Processor

 There are two components of a CPU :


1. Arithmetic/logic unit (ALU)
2. The control unit

Arithmetic/logic unit (ALU)


 Is one of the many components within a computer processor. The ALU performs
mathematical, logical, and decision operations in a computer and is the final
processing performed by the processor.
After the information has been processed by the ALU, it is sent to the
computer memory.
 In some computer processors, the ALU is divided into two distinct parts, the AU
and the LU. The AU performs the arithmetic operations and the LU performs the
logical operations.

Processor

 Control Unit
 is circuitry that directs operations within the computer's processor by
directing the input and output of a computer system.

 The processor then controls how the rest of the computer operates (giving
directions to the other parts and systems).

 A control unit works by gathering input through a series of commands it


receives from instructions in a running programs and then outputs those
commands into control signals that the computer and other hardware
attached to the computer carry out.

14
2/3/2020

Memory

 Memory or random access memory (RAM) – electronic components that


store instructions waiting to be executed by the processor, data needed by
those instructions, and the results of processed data.

 The RAM (Random Access Memory) within your computer is where the
operating system is loaded to when you switch on your computer and also
where your applications are copied to when you start an application, such
as a word processor or database program.

 When you create data, (e.g. letters and pictures), these are initially created
and held in RAM and then copied to disk when you save the data. As a rule
of thumb, the more RAM you have installed in your computer the better.
These days you will commonly find over 512 Megabytes of RAM installed.

Memory

 What is RAM?

 Random Access Memory (RAM) is the main 'working' memory


used by the computer.
 When the operating system loads from disk when you first switch on the
computer, it is copied into RAM.
 Commonly modern computers are supplied with over 128 MB of RAM.
 As a rough rule, a Microsoft Windows based computer will operate faster if
you install more RAM. When adverts refer to a computer having 128 Mbytes
of memory, it is this RAM which they are talking about.
 Data and programs stored in RAM are volatile (i.e. the information is lost
when you switch off the computer).

15
2/3/2020

Memory

 The two main forms of modern RAM are


 Static RAM (SRAM)
In static RAM, a bit of data is stored using the state of a flip-flop. This
form of RAM is more expensive to produce, but is generally faster and
requires less power than DRAM and, in modern computers, is often used
as cache memory for the CPU.
 Dynamic RAM
DRAM stores a bit of data using a transistor and capacitor pair, which
together comprise a memory cell.

Memory

 What is ROM?
 Is a class of storage medium used in computers and other electronic
devices. Data stored in ROM cannot be modified, or can be modified only
slowly or with difficulty.

 Read Only Memory (ROM) as the name suggests is a special type of


memory chip which holds software which can be read but not written to.

 A good example is the ROM-BIOS chip, which contains read-only


software. Often network cards and video cards also contain ROM chips.

 Most personal computers contain a small amount of ROM


that stores critical programs such as the program that boots the computer.

16
2/3/2020

Memory

 ROM-BIOS
 The ROM-BIOS (Read Only Memory - Basic Input Output System) chip is a
special chip held on your computer's system (mother) board.

 It contains software which is required to make your computer work with your
operating system, for instance it is responsible for copying your operating system
into RAM when you switch on your computer.

 The ROM-BIOS software performs a self-diagnostic to check that the computer


is working OK.

 This software then loads your operating system from the disk into the RAM.

Memory

 The types of ROM are


 Programmable Read-Only Memory (PROM)
This type of ROM can be re-programmed by using a special device called a PROM
programmer. Generally, a PROM can only be changed/updated once.
 These types of memories are frequently seen in video game consoles, mobile phones.
 Erasable Programmable Read-Only Memory (EPROM).
This type of ROM can have its contents erased by ultraviolet light and then
reprogrammed by an RPROM programmer.

 Electrically Erasable Programmable Read-Only Memory (EEPROM).


EEPROMs are used to store a computer system's BIOS, and can be updated without
returning the unit to the factory.

17
2/3/2020

Memory

RAM ROM

Stands for Random Access Memory Read-only memory


Volatility RAM is volatile i.e. its It is non-volatile i.e. its contents are
contents are lost when the retained even when the device is
device is powered off. powered off.

Types: The two main types of RAM The types of ROM include PROM,
are static RAM and dynamic EPROM and EEPROM.
RAM.

Use: RAM allows the computer to ROM stores the program required to
read data quickly to initially boot the computer. It only
run applications. It allows allows reading.
reading and writing.

Storage Devices

Storage devices – The hardware that writes data to or reads data from a storage
medium is called a storage device.

There are two storage devices used in computers:


A primary storage device such as computer RAM
 A secondary storage device such as a computer hard drive.
 Types of storage devices
 Tape drive.
 Is an old storage device, typically used for data backup on servers.
 The optical drives.
 Is the standard hard dive used in most modern desktops.
 The magnetic media.
 Formats like the CD, DVD .

18
2/3/2020

Storage measurement unit

 computer refers to the fact that ultimately the computer works in what is called
binary.
 A digital computer uses the numbers 0 and 1 (or on and off if you prefer).
 When we talk about computer storage, either the amount of memory (RAM) or the hard
disk capacity.

 Bit: All computers work on a binary numbering system, i.e. they process data in
ones or zeros.
 This 1 or 0 level of storage is called a bit.
 Often hardware is specified as a 32-bit computer, which means that the hardware can
process 32 bits at a time.
 Software is also described as 16 bit, 32 bit or 64 bit software.

Communications Devices

 Communications device – hardware component that enables


a computer to send (transmit) and receive data, instructions,
and information to and from one or more computers.

 widely used communication device is the modem


 communications occur over transmission media
 cables, telephone lines, cellular radio networks, and satellites.
 some are wireless.

19
Introduction to
Computers & Internet

S
Computer Networking

❖ Computer networking is a technique in which two or more than two


computers are link together for communications and file/data sharing
purposes.

❖ With these computers different other devices like printer, scanner, fax
machine etc are also connect for data storage and sharing purposes.

❖ Two main types of networking:


1. LAN (Local Area Network) 2. WAN (Wide Area Network)
Computer Networking LAN

❖ In this networking different personal computers within an office are liked


together to communication, sharing of data and devices like printer, scanner and
so on.

❖These computers and devices are connected with each other by means of
cables.

❖LAN is used in small office, where area is not big, or in a building or in group
of buildings.

❖LANs are also typically owned, controlled, and managed by a single person
or organization.
Computer Networking WAN

❖ In this kind of networking many offices situated in different countries are


connected.

❖A WAN is complicated. It uses multiplexers, bridges, and routers to connect


local and metropolitan networks to global communications networks like the
Internet.

❖Different LAN networks are connected


to establish a network which will enable
the users of one location to communicate with the users present in the other
location.
Network Advantages

✓ Software can be shared.

✓ Computers can communicate easily.

✓ Data storage and files can be shared.

✓ Devices like printer, scanner etc. can be shared.

✓ Information Protection

✓ Email
Networks Disadvantages

✓ Hackers and viruses can easily attack the system

✓ If there is a problem with server then it can may affect other


computers.

✓ Installation of devices may be expensive


Networks Architecture

➢ Client: a computer connected to the network, no control.

➢ Server: responsible for allocating network resource and


controlling them.

➢ Resources: files, printers …etc


Introduction to
Computers & Internet
Network Hardware

❖ Hub

❖ Cables

❖ Network cards

❖ Modem
Basics of Networking

❖ A network is either a peer-to-peer network (also called a


workgroup) or a server-based network (also called a
client/server network).

Peer to peer Server –based network


Peer to Peer

❖ In this types of networks , there is no server, no controller in this type.

❖ Each computer in this network can use the resource in any other computer
in the network. This means that users must remember which computers in
the workgroup have the shared resource or information that they want to
access.
❖ It also means that users must log on to each computer to access the shared
resources on that computer.
❖ it is difficult for users to track where information is located because data
is generally stored on multiple computers. This makes it difficult to back
up critical business information
Advantages of Peer to Peer
Network

❖ Peer to Peer Networks are easy and simple to set up and only require a Hub or a
Switch to connect all the computers together.

❖ The user can access any file on the computer as long as it is set to shared folder.

❖ The requirements for a Peer to Peer Network are that you have a 10 Base T
Ethernet cable and an Ethernet hub/ switch. This is rather cheap than having a
server.

❖ The architecture of the lay out (How It Connects) is simple.

❖ If one computer fails to work all the other computers connected to it continue to
work.
Disadvantages of Peer to Peer
Network

❖ If you have not connected the computers together properly then


there can be problems accessing certain files.

❖ It doesn’t always work if you have many computers and works


better with 2 – 8 computers.

❖ Security is not good and you can set passwords for files that
you don’t want people to access but apart from that the security
is pretty poor.
Server-Based Network

❖ In a server-based network, the server is the central location where users share
and access network resources.

❖ Each computer that connects to the network is called a client computer.

❖ In a server-based network, users have one user account and password to log on
to the server and to access shared resources.

❖ A domain is a collection of networks and clients that share security


information.

❖ In server-based networks, a network administrator centrally manages the


resource security. The administrator defines and manages user access to
network resources.
Advantages of Server-Based
Network

❖ A Client Sever Can Be scaled up to many services that can also be used by
multiple users.

❖ A client server enables the roles and responsibilities of a computing system. This
means that it can update all the computers connected to it. An example of this
would be software updates or hardware updates.

❖ All the data is stored on the servers, which generally have far greater security
controls than most clients. Servers can better control access and resources, to
guarantee that only those clients with the appropriate permissions may access
and change data.

❖ The security is a lot more advanced than a peer to peer network.

❖ It functions with multiple different clients of different capabilities.


Disadvantages of Server-Based
Network

❖ When the server goes down or crashes. All the computers connected
to it become unavailable to use.

❖ When everyone tries to do the same thing it takes a little while for
the server to do certain tasks.

❖ More expensive than a peer to peer network.


Basics of Networking

❖ In communication networks, a topology is a usually schematic


description of the arrangement of a network, including its
nodes and connecting lines.

❖ Networks are broken into 3 topologies:


✓ Bus topology
✓ Star topology
✓ Ring topology
BUS TOPOLOGY

➢ Bus Topology is the simplest of network topologies.

➢ In this type of topology, all the nodes (computers as well as servers) are
connected to the single cable (called bus), by the help of interface
connectors.

➢ This central cable is the backbone of the network and is known as Bus.

➢ Every workstation communicates with the other device through this Bus.
BUS TOPOLOGY

❖ How to transmit data through bus topology ?


➢ A signal from the source is broadcasted and it travels to all
workstations connected to bus cable.
➢ Although the message is broadcasted but only the intended
recipient, whose MAC address or IP address matches, accepts it.
➢ If the MAC /IP address of machine doesn’t match with the
intended address, machine discards the signal.
Advantages of Bus Topology

➢ It is easy to set-up and extend bus network.

➢ Cable length required for this topology is the least compared to other
networks.

➢ Bus topology costs very less.

➢ Linear Bus network is mostly used in small networks. Good for LAN.
Disadvantages of Bus Topology

➢ There is a limit on central cable length and number of nodes that can be connected.

➢ Dependency on central cable in this topology has its disadvantages. If the main
cable (i.e. bus ) encounters some problem, whole network breaks down.

➢ It is difficult to detect and troubleshoot fault at individual station.

➢ Maintenance costs can get higher with time.

➢ Efficiency of Bus network reduces, as the number of devices connected to it


increases.

➢ It is not suitable for networks with heavy traffic.

➢ Security is very low because all the computers receive the sent signal from the
source.
Star Topology

➢In Star topology, all the components of network


are connected to the central device called “hub”
which may be a hub, a router or a switch.

➢ Unlike Bus topology (discussed in the last


slide), where nodes were connected to central
cable, here all the workstations are connected to
central device with a point-to-point connection.
So it can be said that every computer is indirectly
connected to every other node by the help of
“hub”.
Advantages of Star Topology

➢ As compared to Bus topology it gives far much better performance, signals don’t
necessarily get transmitted to all the workstations. A sent signal reaches the intended
destination after passing through no more than 3-4 devices and 2-3 links.

➢ Performance of the network is dependent on the capacity of central hub.

➢ Easy to connect new nodes or devices. In star topology new nodes can be added
easily without affecting rest of the network. Similarly components can also be
removed easily.

➢ Centralized management. It helps in monitoring the network.

➢ Failure of one node or link doesn’t affect the rest of network. At the same time its
easy to detect the failure and troubleshoot it.
Disadvantages of Star Topology

➢ Too much dependency on central device has its own


drawbacks. If it fails whole network goes down.

➢ The use of hub, a router or a switch as central device increases


the overall cost of the network.

➢ Performance and as well number of nodes which can be added


in such topology is depended on capacity of central device.
Ring Topology

❖ In Ring Topology, all the nodes are


connected to each-other in such a way that
they make a closed loop.
❖ Each workstation is connected to two other
components on either side, and it
communicates with these two adjacent
neighbors.
❖ Data travels around the network, in one
direction. Sending and receiving of data
takes place by the help of TOKEN.
Ring Topology

❖ Token Passing (in brief) Token contains a piece of information


which along with data is sent by the source computer.
❖ This token then passes to next node, which checks if the signal is
intended to it.
❖ If yes, it receives it and passes the empty to into the network,
otherwise passes token along with the data to next node.
❖ This process continues until the signal reaches its intended
destination.
Advantages of Ring Topology

❖ This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision.

❖ Also in ring topology all the traffic flows in only one direction at very high speed.

❖ Even when the load on the network increases, its performance is better than that
of Bus topology.

❖ There is no need for network server to control the connectivity between workstations.

❖ Additional components do not affect the performance of network.


Each computer has equal access to resources.
Disadvantages of Ring Topology

❖ Each packet of data must pass through all the computers between
source and destination. This makes it slower than Star topology.

❖ If one workstation or port goes down, the entire network gets affected.

❖ Network is highly dependent on the wire which connects different


components.

❖ MAU’s and network cards are expensive as compared to Ethernet cards


and hubs.
Introduction to Health
Informatics
Health Informatics

❖ Basically, it is made up of two words :


What is Health Informatics

❖ The knowledge, skills and tools that enable information


to be collected, managed, used and shared to support the
delivery of healthcare and to promote health.

❖ Supports all hospital functions and activities such as


patient records, scheduling, administration, charge-back
and billing, and often links to or includes clinical
information systems.
The Goal of Health Informatics

❖ The goal of an HIS is to allow decisions to be made in a


transparent way, based on evidence. Therefore, the
objective of the HIS is to produce relevant and quality
information to support decision making.
Why Health Informatics is important

❖ Patient health record: this data forms part of the patient health record.
No clinical staff will be able to remember details about patient
treatment in detail. Thus there needs a place to record it in order to
remind clinicians about treatment protocols, treatment history,
continuity of care etc.

❖ Administrative purposes: information needs to be properly managed


to administrate the hospital. This aids in resources allocation.

❖ Research and knowledge discovery: imagine doing research when


data is not recorded.
Domains of Health Informatics

❖ Health determinants (e.g., risk factors, behavior, genetics ..)

❖ Inputs to the health system and related processes (e.g., health infrastructure,
human and financial resources, equipment, policy, and organization)

❖ Performance or outputs of the health system

❖ Health outcomes (e.g., mortality, morbidity, disability, well-being, and health


status)

❖ Health inequities in determinants (e.g., coverage and use of services stratified


by sex, socioeconomic status, ethnic group, and geographical location)
Domains of Health Informatics

Figure 2 Typology of measurement domains

Health
determinants

Risk factors
Behaviours Health
Genetics status
Environment
Health
Mortality
Socio-economic & system
demographic outcomes Morbidity /
disability
Health Health Well-being
system system Service
inputs outputs utilization

Policy Information
Financing Service
Human availability and
resources quality
Organization
Health Informatics In Saudi
Arabia

The Saudi Association for Health Information (SAHI) was


established in 2006 to work under direct supervision of King Saud
Bin Abdulaziz University for Health Sciences to practice public
activities, develop theoretical and applicable knowledge, and
provide scientific and applicable studies.
HIS in Health Services Planning

How will we know when


Where are we now?
we get there?
 Identification of needs and
 Monitoring and evaluation
problems
 Choice of appropriate
indicators
Pervasive role
of information

How will we get there?


 Development of Where do we want to go?
interventions  Setting priorities and targets
 Identification of resources
What Kinds of Data Flow In a HIS?

❖ Birth, morbidity and mortality data

❖ Type and location of health personnel

❖ Type and quality of clinical services provided at national and sub-


national level

❖ Population indicators
Types of Health informatics

Artificial Intelligence

Decision support systems,


Strategic simulation systems,
information financial forecasting,
systems performance assessment

Tactical information Management information


systems systems
Electronic patient records,
payroll, invoicing systems,
patient administration systems,
Operational information systems purchasing/inventory, office
automation
Benefits of Health Informatics

✓ helping decision makers to detect and control emerging and endemic


health problems, monitor progress towards health goals, and promote
equity.

✓ empowering individuals and communities with timely and understandable


health-related information, and drive improvements in quality of services.

✓ strengthening the evidence base for effective health policies, permitting


evaluation of scale-up efforts, and enabling innovation through research.

✓ improving governance, mobilising new resources, and ensuring


accountability in the way they are used.
EMR – Electronic
Medical Record
What is an EHR?

❖ An Electronic Health Record is "a repository of information


regarding the health of a subject of care, in computer processable
form“

❖ Electronic medical records (EMRs) are any and all documents


created and stored in electronic forms by health services providers
and facilities. These range from doctors with private practices to
hospitals, medical labs clinics and so on. They can be records of
patient care such as diagnoses, examinations performed,
immunizations received, and prescriptions as well as of basic patient
information, financial data, billing and insurance statements and so
on. These records are stored in databases and area accessed by health
professionals when the need arises.
EHR

❖ An Electronic Health Record system encompasses:


✓ Longitudinal collection of electronic health information about and for patients.
✓ Electronic access to patient-and population-level information by authorized
users.
✓ Provision of knowledge and decision support systems.
✓ Support for efficient processes for healthcare delivery.

❖ The 1997 Institute of Medicine report: The Computer-Based Patient Record: An


Essential Technology for Health Care, provides the following more extensive
definition:
➢ "A patient record system is a type of clinical information system, which is dedicated to
collecting, storing, manipulating, and making available clinical information important
to the delivery of patient care.
Advantages of Electronic
Medical Records
➢ Preventing medical errors.

➢ Reducing health-care costs.

➢ Reducing delays in treatments.

➢ Reducing office wait times.

➢ Improving communication between the health care team and patients.

➢ Ensuring continuity of care.

➢ Privacy and your EMR.

➢ Personal health records.


Elements of EHR
➢ Patient demographics.

➢ History, examination and progress reports

➢ Allergy lists, and immunization status

➢ Laboratory and tests.

➢ Medical imaging studies

➢ Medication

➢ Clinical practice guidelines

➢ Appointment scheduling

➢ Claims and payment processing

➢ Reminders
Multiple Uses of EHR

❖ Patient care

❖ Quality improvement

❖ Outcome reporting

❖ Resource management

❖ Public health communicable disease surveillance


Time Frame to HER Adoption
Assessment

❖ Are you ready to move to an EHR?

❖ What are your goals?

❖ Financial status

❖ Assessment of office workflow

❖ Who does what and how

❖ Assessment of staff satisfaction

❖ Barriers to implementation
Planning

❖ Identify a timeframe to complete ❖ Establish a budget


project
❖ Select staff to participate
❖ Dependencies may include
❖ Plan staff
❖ vendor schedule meetings/communications on
regular bases
❖ Vacation time
❖ Start an issues list
❖ Busy periods (e.g. flu season)
Select

❖ Identify vendors

❖ Ask other practices

❖ Visit websites

❖ Ask your PMS vendor which EHRs they interface with

❖ Keep your vendor list short

❖ Set-up vendor demos

❖ Include physicians, staff committee


Implementation

❖ Plan

❖ Be realistic about timeframes

❖ Staff involvement

❖ Workflow changes

❖ Paper to electronic

❖ Policies and procedures

❖ Test
Implementation

❖ Staff training

❖ Issues list

❖ Keep it going

❖ System/software issues

❖ Internal issues

❖ Workflow issues

❖ Transition to support
Barriers

Widespread implementation of EMRs has been hampered by many


perceived barriers including:
❖ Technical matters (uncertain quality, functionality, ease of use,
lack of integration with other applications).

❖ Financial matters - particularly applicable to non-publicly funded health


service systems (initial costs for hardware and software, maintenance,
upgrades, replacement, ROI ...)
❖ Resources issues, training and re-training

❖ Certification, security, ethical matters; privacy and confidentiality issues

❖ Incompatibility between systems (user interface, system


architecture and functionality can vary significantly between
suppliers' products).
Privacy Risks

❖ Access.

❖ A ccuracy.

❖ Theft.

❖ D isposal.
Computer Ethics
Computer Ethics

• Computers are involved to some extent in almost every aspect of our lives
• They often perform life-critical tasks
• Computer science is not regulated to the extent of medicine, air travel, or
construction zoning
• Therefore, we need to carefully consider the issues of ethics
Ethics

Ethics are standards of moral conduct


• Standards of right and wrong behavior
• A gauge of personal integrity
• The basis of trust and cooperation in relationships with others
Ethical Principals

Ethical principals are tools which are used to think through difficult situations.
Three useful ethical principals:
An act is ethical if all of society benefits from the act.
An act is ethical if people are treated as an end and not as a means to an
end.
An act is ethical if it is fair to all parties involved.
Computer Ethics

Four primary issues:

• Privacy – responsibility to protect data about individuals


• Accuracy - responsibility of data collectors to authenticate information
and ensure its accuracy
• Property - who owns information and software and how can they be sold
and exchanged
• Access - responsibility of data collectors to control access and determine
what information a person has the right to obtain about others and how the
information can be used
Problems with
Large Databases
• Spreading information without consent
• Some large companies use medical records and credit records as a
factor in important personnel decisions

• Spreading inaccurate information


• Mistakes in one computer file can easily migrate to others
• Inaccurate data may linger for years
The Internet and the
Web

• Most people don’t worry about email privacy on the Web due
to illusion of anonymity
• Each e-mail you send results in at least 3 or 4 copies being stored on
different computers.

• Web sites often load files on your computer called cookies to


record times and pages visited and other personal information
• Spyware - software that tracks your online movements, mines
the information stored on your computer, or uses your
computer for some task you know nothing about.
General Internet Issues

• Inflammatory interchange of messages via internet (email, chat rooms, etc.)


• Chain mail
• Virus warning hoaxes
• “Spam” – unsolicited, bulk email
E-Mail Netiquette

• Promptly respond to messages.


• Delete messages after you read them if you don’t need to save the
information.
• Don’t send messages you wouldn’t want others to read.
• Keep the message short and to the point.
• Don’t type in all capital letters.
• Be careful with sarcasm and humor in your message.
Information Ownership
Issues

• Illegal software copying (pirating)

• Infringement of copyrights by copying of pictures or text from


web pages

• Plagiarism by copying text from other sources when original


work is expected
Terms

• INTELLECTUAL PROPERTY:
Intangible creations protected by law
• TRADE SECRET:
Intellectual work or products belonging to a business, not in public domain
• COPYRIGHT:
Statutory grant protecting intellectual property from copying by others for 28 years
• PATENT:
Legal document granting owner exclusive monopoly on an invention for 17 years
Computer Crime

Computer criminals -using a computer to commit an illegal act


Who are computer criminals?
• Employees – disgruntled or dishonest --the largest category
• Outside users - customers or suppliers
• “Hackers” and “crackers” - hackers do it “for fun” but crackers have
malicious intent
• Organized crime - tracking illegal enterprises, forgery, counterfeiting
Types of Computer
Crime

• Damage to computers, programs or files


• Viruses - migrate through systems attached to files and programs
• Worms - continuously self-replicate
• Theft
• Of hardware, software, data, computer time
• Software piracy - unauthorized copies of copyrighted material
• View/Manipulation
• “Unauthorized entry” and “harmless message” still illegal
Computer Security

• Computer security involves protecting:


• information, hardware and software

• from unauthorized use and damage and

• from sabotage and natural disasters


Measures to Protect Computer Security

• Restricting access both to the hardware locations (physical access) and into the
system itself (over the network) using firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently
• Making backup copies
• Using anti-virus software
• Encrypting data to frustrate interception
• Anticipating disasters (disaster recovery plan)
• Hiring trustworthy employees
Computer Ethics for Computer Professionals

Competence– Professionals keep up with the latest knowledge in


their field and perform services only in their area of competence.
Responsibility– Professionals are loyal to their clients or
employees, and they won’t disclose confidential information.
Integrity– Professionals express their opinions based on facts, and
they are impartial in their judgments.
Quality of Life Issues


Rapid Change:

Reduced response time to competition


Maintaining Boundaries:

Family, work, leisure


Dependence And Vulnerability

Employment:

Re-engineering job loss


Equity & Access:

Increasing gap between haves and have nots


Health Issues
Physical Health Issues

• Avoid eyestrain and headache


• Take regular breaks every couple of hours
• Control ambient light and insure adequate monitor
brightness

• Avoid back and neck pain


• Have adjustable equipment with adequate back support
• Keep monitor at, or slightly below eye level
Physical Health Issues

• Avoid effects of electromagnetic fields (VDT radiation)


• Possible connection to miscarriages and cancers, but no statistical
support yet
• Use caution if pregnant
• Avoid repetitive strain injury (RSI)
• Injuries from fast, repetitive work
• Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and
wrists
The Environment

• Microcomputers are the greatest user of electricity


in the workplace
• “Green” PCs
• System unit and display - minimize unnecessary energy
consumption and power down when not in use
• Manufacturing - avoids harmful chemicals in
production, focus on chlorofluorocarbons (CFC’s) which
some blame for ozone layer depletion
Personal Responsibility
of Users

• Conserve
• Turn computers off at end of work day
• Use screen savers
• Recycle
• Most of the paper we use is eligible
• Dispose of old parts via recycling programs – most computer parts
are dangerous in landfills
• Educate
• Know the facts about ecological issues

You might also like