You are on page 1of 25

Technical

English I
Students:
Name: Frank Lewis Guimaraes
Teacher: Franco Guevara Milagros
Cycle: “9” Cycle

1
Notebook
VISION OF THE UNIVERSITY

To be recognized for providing an


educational experience with high
standards of quality, contributions to
research, and the ability to shape
individuals as transformative agents for the
benefit of society, supported by the
efficient management of our processes.

MISION OF THE UNIVERSITY

The mission of San Juan Bautista Private


University is based on the commitment to
the comprehensive development of the
individual, trained in information
management, research, with a broad
approach, and in environmental
management as a solid contribution to our
society.

2
Vision of the Systems Engineering program

To be a leading Computer and Systems


Engineering program, nationally and
internationally recognized for academic
excellence, research contributions, and
positive societal impact, fostering
adaptable professionals in an ever-
evolving technological landscape,
promoting ethical and sustainable
technology use.

Mision of the Systems Engineering program

The mission of the Computer


Engineering and Systems program is to
educate professionals capable of
creating innovative technological
solutions, with a solid foundation in
computer science and skills in analysis
and leadership, promoting ethical
commitment and social responsibility.

3
Week 1:
Parts and functions of a computer.

Modern computers are composed of a variety of components that perform specific


functions to enable their operation. Below are some of the main parts of a
computer along with their functions:

1. Central Processing Unit (CPU): The CPU is the "brain" of the computer and
executes program instructions. It performs arithmetic and logic operations, and
controls and coordinates all system operations.

2. Random Access Memory (RAM): RAM is the computer's working memory


where data and running programs are temporarily stored. The more RAM a
computer has, the more programs and data it can handle simultaneously.

3. Hard Disk Drive (HDD) or Solid State Drive (SSD): The HDD or SSD is where
data is permanently stored in the computer. It stores the operating system,
programs, and user files.

4. Motherboard: The motherboard is the main component of the computer that


connects all other components together. It contains the chipset that controls
communication between the CPU, memory, and other peripheral devices.

5. Graphics Processing Unit (GPU): The GPU processes and displays images on
the screen. It is especially important for graphics-intensive tasks such as gaming
and graphic design.

4
6. Power Supply Unit (PSU): The PSU provides electrical power to all
components of the computer.

7. Input/Output (I/O) Devices: These include keyboard, mouse, monitor, printer,


scanner, speakers, etc. They allow interaction between the user and the computer,
as well as communication with other devices.

8. Optical Drive: This includes CD/DVD/Blu-ray readers and writers that allow
reading and writing data on optical discs.

9. Fans and Heat Sinks: They keep the computer components at a safe
temperature by dissipating heat generated by the operation of the CPU, GPU, and
other components.

These are just some of the basic components of a computer and their main
functions. The specific combination of components may vary depending on the
type of computer and its intended use.

5
Week 2: Most used English words and
phrases in systems engineering
In the world of systems engineering, the English language plays a fundamental
role, as many of the international theories, concepts, and standards are
expressed in this language. Therefore, mastering technical English is essential
for professionals in this field, as it allows them to access a wide range of
resources and collaborate effectively in global environments. Below is a
compilation of common words and phrases used in this field, covering
everything from planning and design to the implementation and maintenance
of complex systems.

words and phrases:

• Risk Management (Risk Management).

• Quality Assurance (Quality Assurance).

• Performance Optimization (Performance Optimization).

• Network Topology (Network Topology).

• Disaster Recovery (Disaster Recovery).

• Virtualization (Vistualization).

• Artificial Intelligence (Artificial Intelligence).

• Machine Learning (Machine Learning).

• Cloud Computing (Cloud Comptung).

• Big Data Analytics (Big Data Analytics).

• Cybersecurity (Cybersegurity).
6
• System Engineering (System Enginneering).

• Requirements Analysis (Requirements Analysis).

• System Architecture (System Architecture).

• Integration Testing (Integration Testing).

• Deployment (Deployment).

• Maintenance (Maintenance).

• Reliability Engineering (Reliability Engineering)

• Scalability (Scalability)

• Fault Tolerance (Fault Tolerance)

• Data Modeling (Data Modeling)

7
Week 3: software

Software refers to computer programs, instructions, and data that enable


computers to perform specific tasks. It can be classified into two main
categories: system software and application software.

1. System Software: This type of software provides the basic functions that
enable the computer hardware to operate and facilitate the execution of
other programs. It includes:

• Operating System: Controls and manages hardware resources and


provides common services for programs.

• Device Drivers: Enables the operating system to communicate with


specific hardware devices, such as printers, network cards, etc.

• System Utilities: Tools that perform maintenance and optimization


tasks on the system, such as disk defragmentation, backup, etc.

2. Application Software: These are programs designed to perform specific


tasks for end-users. Some examples include:

• Word Processors: To create and edit text documents.

• Spreadsheets: To perform calculations and data analysis.

• Web Browsers: To access and browse the internet.

• Graphic Design Software: To create graphics, images, and designs.

8
• Project Management Software: To plan, organize, and track project
progress.

• Database Software: To store, organize, and retrieve data efficiently.

Software is a fundamental part of any computer system and plays a crucial


role in performing a wide range of tasks, from simple to complex. The choice
of the right software can have a significant impact on the productivity and
efficiency of an individual or an organization. If you need more details about
any specific aspect of software, feel free to ask.

9
Week 4: Hardware

During this week, we'll delve into the fundamental components of computer
hardware, exploring their functionalities and interconnections.
Understanding hardware is crucial for comprehending how computers
process information and execute tasks efficiently.

Key Topics:

1. Central Processing Unit (CPU):

- Learn about the CPU, often referred to as the brain of the computer,
responsible for executing instructions and performing calculations.

- Explore the architecture of modern CPUs, including the concept of cores,


clock speed, cache memory, and instruction sets.

2. Memory (RAM):

- Understand Random Access Memory (RAM) and its role in storing data
temporarily for quick access by the CPU.

- Differentiate between RAM and other types of memory like ROM (Read-
Only Memory) and storage devices such as hard drives and SSDs (Solid State
Drives).

3. Storage Devices:

- Examine various types of storage devices, including hard disk drives


(HDDs), SSDs, and hybrid drives.

10
- Discuss the differences in terms of speed, capacity, and reliability among
these storage technologies.

4. Motherboard:

- Explore the motherboard, the main circuit board that connects all
hardware components, including the CPU, RAM, storage devices, and
expansion cards.

- Understand the different components of a motherboard and their


functions, such as the chipset, expansion slots, and connectors.

5. Graphics Processing Unit (GPU):

- Learn about GPUs, specialized processors designed to handle graphics-


intensive tasks like rendering images and videos.

- Understand the role of GPUs in gaming, artificial intelligence, and


scientific simulations.

6. Power Supply Unit (PSU) and Cooling Systems:

- Discuss the importance of a reliable power supply unit in ensuring stable


operation of computer hardware.

- Explore cooling systems, including fans, heat sinks, and liquid cooling
solutions, to prevent overheating and maintain optimal performance.

7. Peripheral Devices:

- Identify common peripheral devices such as keyboards, mice, monitors,


printers, and external storage devices.

11
- Understand how these devices connect to the computer and interact with
the CPU through various interfaces like USB, HDMI, and Thunderbolt.

By the end of this week, you will have a solid understanding of the essential
hardware components that constitute a computer system and their respective
roles in processing and storing data. This knowledge will serve as a foundation
for further exploration into computer architecture and system design.

12
Week 5: ICT (Information and
Communication Technologies)

This week, we'll focus on Information


and Communication Technologies (ICT),
which encompass a broad range of
technologies used to manage, transmit,
and exchange information. In our
increasingly interconnected world, ICT
plays a vital role in shaping how
individuals, businesses, and societies
communicate and access information.

Key Topics:

Introduction to ICT:

- Define ICT and its significance in modern society.

- Explore the evolution of ICT and its impact on various sectors, including
education, healthcare, business, and government.

Internet and Networking:

- Understand the architecture of the Internet and how data is transmitted


between devices using protocols such as TCP/IP.

- Explore different types of networks, including LANs (Local Area


Networks), WANs (Wide Area Networks), and wireless networks.
13
Communication Technologies:

- Discuss various communication technologies, such as email, instant


messaging, Voice over Internet Protocol (VoIP), and video conferencing.

- Examine the role of social media platforms and their impact on


communication and information sharing.

Cybersecurity:

- Learn about the importance of cybersecurity in protecting data and


information systems from threats such as malware, phishing, and hacking.

- Explore strategies for securing networks, including encryption, firewalls,


and intrusion detection systems.

Cloud Computing:

- Understand the concept of cloud computing and its benefits, including


scalability, flexibility, and cost-effectiveness.

- Explore different cloud service models, such as Infrastructure as a Service


(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

Big Data and Analytics:

- Discuss the role of big data in ICT and its applications in areas such as
business intelligence, healthcare, and scientific research.

14
- Explore data analytics techniques, including descriptive, predictive, and
prescriptive analytics.

Emerging Technologies:

- Identify emerging ICT trends and technologies, such as artificial


intelligence, Internet of Things (IoT), blockchain, and 5G networks.

- Discuss the potential impact of these technologies on society, economy,


and daily life.

Ethical and Social Implications:

- Consider ethical issues related to ICT, including privacy concerns, data


ownership, and digital divide.

- Discuss the social implications of ICT, such as its role in promoting


inclusion, facilitating communication, and enabling access to information.

Throughout this week, we'll explore how ICT continues to transform our world
and shape the way we communicate, collaborate, and access information. By
gaining a deeper understanding of ICT, you'll be better equipped to navigate
the digital landscape and leverage technology to address various challenges
and opportunities.

15
Week 6: Database Structure

In Week 6, we'll explore the essential


components that constitute a database
and how they're organized to efficiently
store, modify, extract, and retrieve
information. Databases are managed
through Database Management Systems
(DBMS), which act as intermediaries
between users and the stored data.

Key Components of a Database:

1. Tables: These are the primary structures where data is stored. A database
may contain multiple tables, each comprising rows and columns. Rows, also
called records, hold unique sets of data, while columns (fields) store specific
types of information like names, dates, or quantities.

2. Fields (Columns): Fields represent the different types of data stored within
a table. Each field has a defined data type (e.g., text, number, date) that
dictates the kind of information it can contain.

16
3. Records (Rows): Records are individual entries in a table, each containing
specific data. They're unique and represent sets of related information.

4. Primary Key:This is a field or set of fields that uniquely identifies each


record within a table. It's crucial for maintaining data integrity and
establishing relationships between tables.

5. Foreign Keys: These fields reference the primary key of another table,
enabling the establishment of relationships between tables and maintaining
referential integrity.

Relationships between Tables:

- One-to-One Relationships: Each record in one table corresponds to a single


record in another table.

- One-to-Many Relationships: A record in one table can relate to one or more


records in another table.

- Many-to-Many Relationships: Multiple records in one table can be


associated with many records in another table, often necessitating an
intermediate or junction table.

Normalization:

Normalization involves structuring a database to reduce redundancy and


enhance data integrity. It entails applying rules to divide tables into smaller
parts and establish logical relationships between them, aiming to eliminate
redundancy, logically group data, and ensure logical dependencies between
tables.

17
Data Modeling:

Before implementing a database, data modeling is essential. This process


involves designing the database structure, defining tables, fields, data types,
primary and foreign keys, and relationships between tables. Data modeling
tools aid in visualizing and organizing this structure.

Database Management Systems (DBMS):

DBMS like MySQL, PostgreSQL, Oracle, and Microsoft SQL Server provide
frameworks for efficiently storing, modifying, extracting, and querying data.
They support data operations using query languages like SQL, simplifying
interaction with the database.

18
Week 7: Website Creation and Development

In Week 7, we'll immerse ourselves in the exciting world of website creation


and development, exploring the essential steps and technologies involved in
building modern websites. Whether you're a beginner or looking to enhance
your skills, this week will equip you with the knowledge needed to create
stunning and functional websites.

Key Topics:

Introduction to Website Development:

- Understand the significance of website development in today's digital


landscape.

- Explore the various types of websites and their purposes, including static
sites, dynamic sites, and web applications.

Planning and Research:

- Learn the importance of meticulous planning and thorough research


before diving into website development.

- Identify target audience demographics, define website goals, and outline


functional requirements to guide the development process effectively.

Web Design Principles:

- Dive into key design principles to create visually appealing and user-
friendly websites.

19
- Explore topics such as layout design, typography, color theory, and
responsive design for optimal viewing across devices.

HTML (Hypertext Markup Language) and CSS (Cascading Style Sheets):

- Get hands-on with HTML and CSS, the foundational languages for
structuring and styling web content.

- Master HTML markup for creating the structure of web pages and utilize
CSS to control the layout, design, and visual presentation.

JavaScript and Frontend Development:

- Explore the role of JavaScript in frontend development for adding


interactivity and dynamic functionality to web pages.

- Learn about essential JavaScript concepts, DOM manipulation, and event


handling to create engaging user experiences.

Frontend Frameworks and Libraries:

- Discover popular frontend frameworks and libraries like React.js, Angular,


and Vue.js.

- Understand the benefits of using these tools for building interactive,


single-page applications (SPAs) with reusable components.

20
Backend Development:

- Gain insights into backend development for handling server-side logic and
data interactions.

- Explore backend technologies such as Node.js, Python with Django, and


Ruby on Rails, and understand their respective strengths and use cases.

Database Integration:

- Learn about integrating databases into web applications for storing and
managing data.

- Explore relational databases like MySQL, PostgreSQL, and NoSQL


databases like MongoDB, and understand how to interact with them using
backend frameworks.

Web Hosting and Deployment:

- Explore different web hosting options, including shared hosting, VPS


(Virtual Private Server), and cloud hosting.

- Understand the deployment process, including transferring files to a web


server, configuring domain settings, and ensuring website accessibility.

Website Optimization and Security:

- Learn strategies for optimizing website performance, including code


optimization, image compression, and caching techniques.

- Understand the importance of website security measures such as HTTPS


encryption, input validation, and protection against common vulnerabilities.

21
Testing and Maintenance:

- Explore testing methodologies to ensure website functionality,


compatibility, and performance across various browsers and devices.

- Discuss ongoing website maintenance tasks, including updates, backups,


and security patches, to keep the website running smoothly.

By the end of Week 7, you'll have a solid understanding of the website


development process, from planning and design to deployment and
maintenance. Armed with this knowledge, you'll be well-equipped to create
dynamic, user-friendly websites that cater to the needs of your audience
effectively.

22
Week 8: Cybersecurity
Cybersecurity is an increasingly relevant aspect in our digitalized society,
where the protection of computer systems, networks, devices, and data
against intrusions or unauthorized access is sought. In an environment where
technology is constantly evolving and encompassing more areas of our lives,
safeguarding our personal, financial, and business information becomes
paramount.

Within this field, there are several key topics to consider:

Cyber Threats: Encompass a range of risks such as malware, phishing,


ransomware, and denial-of-service (DDoS) attacks, which can compromise the
security and confidentiality of data.

Network Security: Involves safeguarding computer networks against


intrusions and malicious attacks through measures such as firewalls, intrusion
detection, and monitoring network traffic.

Application Security: It is essential to protect software against vulnerabilities


and attacks through penetration testing, secure coding, and security patch
management.

Information Security: Focuses on preserving the confidentiality, integrity, and


availability of data through identity and access management, data encryption,
and the implementation of retention policies.

23
Risk Management and Compliance: Involves identifying, evaluating, and
mitigating cybersecurity risks, as well as ensuring compliance with regulations
and security standards.

Education and Cybersecurity Awareness: It is essential to promote safe


practices among users through training on how to recognize and respond to
cyber threats, as well as fostering a security culture within organizations.

Intelligence: Involves the collection and analysis of information on cyber


threats to understand attackers' tactics and improve preparedness and
response to potential attacks.

Emerging Technologies and Trends: The advancement of technologies such


as artificial intelligence, blockchain, the Internet of Things (IoT), and cloud
computing poses new challenges and opportunities in cybersecurity.

It is essential to address these aspects comprehensively to protect systems,


data, and assets in an increasingly interconnected and digitized world.

24
25

You might also like