You are on page 1of 10

ITE101 | Class #13655

LIVING IN THE IT ERA


MARK LEONARD B. AGGABAO
MON, 1:00 PM - 4:00 PM

participate in simulations and all other academic


OUTLINE activities.
I. INTRODUCTION IX. COMPUTER ○ Accessible telecommunications and office
A. What is IT? APPLICATIONS equipment make communication and educational
B. Impacts of IT in daily X. COMPUTER SOFTWARE administrative functions accessible to everyone,
lives A. Software including those with mobility, visual, and hearing
C. Insights B. Operating System impairments.
II. OVERVIEW OF a. Basic Principle of ● IImproved communication
INFORMATION an OS ● Decreased privacy
TECHNOLOGY b. What does an OS ● Flexible working
A. Ethics of IT do? ● Accessible buying
a. Differences c. When do I directly
B. Ethics in IT interact with the C. Insights
a. Supporting Ethical OS? ● IT is the use of technology to create, process, store, retrieve
Practices of IT d. Where is the OS? and exchange all kinds of data and
Users e. Basic Function of ● information.
III. INFORMATION an OS ● IT can be many things and cover many facets of life.
TECHNOLOGY f. OS as an Interface ● IT have different impacts in our daily lives - good or bad
PROFESSIONALS g. Operating System
A. IT Professional Services II. OVERVIEW OF INFORMATION TECHNOLOGY
Malpractice h. Structure of an OS
IV. THE COMPUTER i. Types of OS Nature of Information Technology
A. Four Major C. Application Software
● It includes a wide range of fundamental skills such as
Components D. Nature of Execution of
agricultural advancement and chemical development,
B. Features Software
industries, medical technology, and software development, to
V. EVOLUTION OF THE E. Software Copyright
name a few.
COMPUTER a. Types of Software
● Understanding the attributes or elements necessitates
A. Mechanical Computing License
knowledge and comprehension of worker intelligence.
Devices XI. COMPUTER NETWORKS
B. Electrical Computing A. Types of
About Culture and Technology
Machines Communication
VI. COMPUTER CATEGORIES Transmission 8 Elements of Culture
VII. COMPONENTS OF B. Network Topologies ● Language
COMPUTER SYSTEM C. Distributed System ● Religion
VIII. COMPUTER D. Types of Network ● Daily Life
TECHNOLOGIES ● Economy
● Government
● Arts
● History
I. INTRODUCTION ● Social Groups

A. What is Information Technology? Technology Shapes Culture


● Technology, as defined, is an art, skill, or ability used to Five ways that technology has altered the way we work:
create and develop products as well as to acquire knowledge. ● Mobility
● It is the use of any computers, storage, networking and other ● The Cloud
physical devices, infrastructure and processes to create, ● AR/VR Innovation
process, store, secure and exchange all forms of electronic ● Customer Data
data. ● Social Impact
● It is the use of technology to create, process, store, retrieve
and exchange all kinds of data and information A. Ethics of Information Technology
● Information technology can be many things and cover Ethics in society - is a set of beliefs about what is right and
many facets of life. wrong. Many widely accepted norms govern ethical behavior.
● Morality refers to social conventions about what is right and
B. Impacts of IT in daily lives wrong that are so widely shared that they form the foundation
● Better information access of an established consensus.
○ Students with disabilities can access information, ● A virtue is a habit that encourages people to do what is
share their work, engage with peers, teachers, and acceptable, whereas a vice is a habit that encourages people
mentors, and take advantage of distant learning to do what is unacceptable.
opportunities thanks to accessible web pages. ● A person who acts with integrity follows a personal set of
○ Accessible instructional courseware allows principles.
students with disabilities to participate side by side
with their peers in computer labs, classrooms, and What are the differences?
online as they complete assignments; collaborate
with peers; create and view presentations, MORALS ETHICS LAW
documents, and spreadsheets; and actively
1
These are one's personal These are the It is a set of rules that ● Someone neglected to do something, and
beliefs about what is standards or codes of govern what we are ● That neglect caused a problem.
right and wrong. behavior that a group and are not allowed to
As a set of conduct, it is to which one belongs do. IT freelancers can be professionally negligent if they fail to do
determined by society as expects of an Defined as a rule, something in their work and a client suffers financially. If a client thinks
the acceptable behavior individual. usually made by a you delivered substandard work or failed to take certain precautions,
that satisfies intellect, It is a branch of government, that is you could face a negligence lawsuit.
volitional conditions, and philosophy that used to order the way
rationality. Although, it is studies the nature of in which a society THE SURPRISING REASON YOU COULD BE SUED FOR
arguable that not all morality and good and behaves (Cambridge, PROFESSIONAL NEGLIGENCE
codes put forward by bad conduct. It is 2023), law is often Professional negligence lawsuits can happen when you fail to
societies can be focused on what described as a science take all the precautions an IT professional should. However, there’s
considered as moral defines a right action and as the art of another reason you could be sued in a professional negligence case: a
codes. and how people justice. client accuses you of shirking your duties.
should behave.
Often, professional negligence lawsuits occur when a client
B. Ethics in Information Technology thinks you could have done a better job. Disappointed clients can sue
Ethics is “a set of beliefs about what is and is not acceptable even if there’s no merit to their claim. In particular, disagreements about
behavior.” functionality, scope, and data security could lead to a major lawsuit.
● Virtues
○ "Addictions that lead people to do what is IV. THE COMPUTER
acceptable" A computer is a device or set of devices that work under the
● Vices control of a stored program, automatically accepts and processes data
○ “Habits of unacceptable behavior “ to provide information.
The computer...
The significance of ethics and human values has been ● First, accepts data such as raw facts, figures, and
understated in recent years. IT breakthroughs have a wide range of symbol
consequences. Here are some examples of public concern about ● Then, processes data into information (data that is
information technology's ethical application: organized, meaningful, and useful)
● Software Piracy ● Finally, it produces and stores results
○ Software piracy in the workplace can sometimes be
traced back to IT professionals, who may either A computer is defined as an electronic device designed to
allow it to happen or actively participate in it. manipulate data and to gather, store, connect, or process meaningful
● Inappropriate Use of Computing Resources and useful information.
○ Some employees use their computers to visit
popular Web sites unrelated to their jobs, chat in A. Four Major Components
chat rooms, view pornographic sites, and play 1. Hardware refers to any tangible or physical part of the
computer games. computer, which can be perceived by the human senses. It is
● Inappropriate Sharing of Information classified as input, process, output, and storage devices.
○ Every organization stores vast amounts of data that 2. Software is any intangible, or commonly known as a program
can be classified as private or confidential installed in the computer, which can also be categorized as
application, operating system, or utility software.
Supporting Ethical Practices of IT Users 3. Data is the distinct pieces of information, usually formatted in
● Establishing Guidelines for Use of Company Software a special way. All software is divided into two general
● Defining and Limiting the Appropriate Use of IT Resources categories: data and programs.
● Structuring Information Systems to Protect Data 4. Peopleware refers to the people who use the computer or
● Information Installing and Maintaining a Corporate Firewall develop the computer software and hardware system.

III. INFORMATION TECHNOLOGY PROFESSIONALS B. Features of a Computer


● Certification 1. Speed
○ According to the certifying organization, certification a. Unlike other machines, a computer is able to
indicates that a professional possesses a specific multitask and can accomplish a task in just a
set of skills, knowledge, or abilities. second.
● Certification for vendors 2. Accurate
○ Workers who complete a program successfully can a. It can provide an exact, correct, and concise output
represent themselves as certified users of a if the command is properly executed.
manufacturer's product. 3. Endurance
● Industry association certifications a. Unlike humans, a computer never gets tired and
○ Set of preventive measures applied to all patients exhausted unless the hardware malfunctions. It can
that are designed to reduce the risk of infection in last 24/7 or more with no definite time to shut down.
the health care setting 4. Self-operating
● Potentially infectious a. It does not need to be monitored, supervised, or
○ Their worth varies significantly depending on where intervened. If it is commanded properly, the
people are in their careers, what other certifications computer can do and accomplish anything on its
they have, and the nature of the IT job market. own.
5. Store and recall information
A. IT Professional Malpractice a. There are internal and external devices that can be
Negligence is defined as doing something that a reasonable used to store data. These devices can store data
person would not do or not doing something that a reasonable person based on their storage sizes and capabilities.
would do. The obligation to protect people from unreasonable harm or
risk is referred to as the duty of care. V. EVOLUTION OF THE COMPUTER

Negligence means two things: A. Mechanical Computing Devices


2
project.
Devices Definitions Tabulating Machine
Abacus ● 1890
● Wooden frame with beads sliding on wires; ● Herman Hollerith
● Addition, subtraction and multiplication; ● Designed to have a coding sche
● 17387; mechanical tabulating machine.
● ‘abakos’ ● Uses a punched card that can b
● Greek, ‘abax’ or calculating table read to process high volumes o
● Helped in counting censuses in
● It was first described in his doc
Napier’s Bones which he presented at Columbia
● 1614 1889
● John Napier
● Multiplication and division of large numbers B. Electrical Computing Machines
through the use of foldable tube
● . The method was based on lattice multiplication,
Devices Definitions
and also called rabdology, a word invented by Atanasoff-Berry Computer
Napier ● between the year 1939 and 194
● Vincent Atanasoff and Clifford B
● first electronic-digital computer
● binary system of arithmetic, par
Pascaline processing, regenerative memo
● 1642 separation of memory and com
● Blaise Pascal functions
● Add and subtract large numbers ● Conventionally, the ABC would
● Eight rotating gear with a wheel representing considered the first electronic A
places in the (arithmetic logic unit)
● decimal system Colossus
● The first calculator or adding machine to be ● 1943
produced in any quantity and actually used ● Alan Turing
● Also called Arithmetic Machine ● first electronic digital machine w
Step Reckoner programmability and is capable
● 1671 running a stored program
● Built (1673) by the German mathematician- ● A set of computers developed
philosopher Gottfried Wilhelm von Leibniz codebreakers in the years 1943
● An improved Pascaline machine, made of copper to help in the cryptanalysis of th
and steel cipher
● Expanded on the French mathematician- EDVAC (Electronic Discrete Variable
philosopher Blaise Pascal's ideas and did Automatic Computer)
multiplication by repeated addition and shifting ● 1944
● Can multiply, divide, add and subtract numbers ● John William Mauchly and John
Jacquard’s Loom Eckert
● Also called Jacquard attachment or Jacquard ● One of the earliest binary serial
mechanism computers with automatic addit
● 1801 subtraction, multiplication, prog
● Joseph Marie Jacquard division and automatic checking
● Uses punch cards to program designs on fabrics ● EDVAC's average addition time
and carpets, making it easier to be woven. microseconds and its average
● Enabled looms to produce fabrics having multiplication time was 2,900
intricate woven patterns such as tapestry, microseconds
brocade, and damask ENIAC (Electronic Numerical Integrato
Computer)
Difference Engine ● 1946
● 1822 ● John William Mauchly and John
● Charles Babbage Eckert
● First attempt to make an automatic, mechanical ● First electronic digital computer
calculator to tabulate polynomial functions big and noisy
● It can compute many useful sets of numbers, like ● Operated by thousands of vacu
both logarithmic and trigonometric functions that ● Can perform long calculations in
can be approximated by polynomials ● The first programmable, electro
general-purpose digital compute
Analytical Engine completed in 1945
● Charles Babbage ● First put to work for practical pu
● 1837 but never completed on December 10, 1945
● In its logical design, the machine was essentially Manchester Mark 1
modern, anticipating the first completed general- ● Began in August 1948 and the
purpose computer operational by April 1949
● First described in 1837 as the successor to ● One of the earliest stored-progr
Babbage's difference engine computers, developed at the Vi
● Construction of this machine was never University of Manchester, Engla
completed; Babbage had conflicts with his chief ● Developed at the Victoria Unive
engineer, Joseph Clement, and ultimately the Manchester from the Small-Sca
British government withdrew its funding for the
3
Experimental Machine (SSEM) or ‘Baby’ Minicomputers
● Also called the Manchester Automatic ● 1970’s
Digital Machine ● evolved to describe the ‘small’ t
● (MADM) generation computers that beca
● The machine's successful operation was possible with the use of integrat
widely reported in the British press, and core memory technologies
which used the phrase "electronic brain" ● Minis were designed for control
in describing it to their readers instrumentation, human interact
UNIVAC I (Universal Automatic Computer I) communication switching as dis
● In the years before successor models of calculation and record keeping.
the UNIVAC I appeared, the machine ● The term "minicomputer" is seld
was simply known as "the UNIVAC" today; the contemporary term fo
● 1951 class of system is "midrange co
● Eckert and Mauchly Computer
Corporation
● Was completed after the company had Microcomputers
been acquired by ● After the introduction of minicom
● Remington Rand microcomputers came into popu
● First commercial computer that can in the year 1980.
perform 10,000 calculations per second ● These are the present compute
● The fifth machine was used by CBS to use microprocessors.
predict the result of the 1952 presidential ● It can easily be transferred from
election. With a sample of a mere 5.5% place to another.
of the voter turnout, it famously predicted ● These are now being used in sc
an Eisenhower landslide malls, banks, and even at home
● These computers come in smal
VI. COMPUTER CATEGORIES work fast and easy to run, and
reasonable in terms of price.
Devices Definitions ● It is known today as the Person
Supercomputers Computer (PC).
● 1960’s ● IBM Company was the first com
● considered the most expensive and extend microcomputers.
fastest type of computer which at the Desktop Computer
frontline of current processing capacity, ● PC intended for regular use at a
particularly speeds of calculation location
● Supercomputers were introduced in the ● It is designed to fit comfortably
1960s, and for several decades the a desk, typically with the monito
fastest was made by Seymour Cray at on top of the system unit.
Control Data Corporation (CDC), Cray ● broad and low
Research and subsequent companies ● It was not until the 1970s when
bearing his name or monogram programmable computers appe
● Supercomputers play an important role could fit entirely on top of a des
in the field of computational science, and ● Desktops have an advantage o
are used for a wide range of laptops in that the spare parts a
computationally intensive tasks in extensions tend to be standardi
various fields, including quantum resulting in lower prices and gre
mechanics, weather forecasting, and availability.
climate research Tower computer
Mainframe Computer ● Personal computers with their c
● Usually slower, less powerful and less oriented vertically are referred t
expensive than supercomputers towers.
● Can support hundreds or thousands of ● Computer in which the power su
users, handling massive amounts of motherboard, and mass storage
input, output, and storage are stacked on top of each othe
● The term mainframe was derived from cabinet
the large cabinet, called a main frame, ● The main advantage of tower m
that housed the central processing unit that there are fewer space cons
and main memory of early computers. which makes installation of add
storage devices easier
● Multiple size subclasses of the
form factor have been establish
differentiate their varying height
including full-tower, mid-tower,
tower and mini-tower
Laptop computer
● designed for mobile use and is
light enough to sit on a person’s
● 1981, Adam Osborne, Osborne
● Laptops typically have a clamsh
factor with a flat panel screen (u
11–17 in or 280–430 mm in dia
size) on the inside of the upper
an alphanumeric keyboard and
4
device (such as a trackpad and/or Input unit
trackpoint) on the inside of the lower lid ● Computers respond to comman
given to them in the form of
numbers, alphabets, images etc
through input units or devices li
keyboard, joystick etc.
● These inputs are then processe
converted to computer languag
Palmtop computer then the response is the output
● computer with specialized keyboards or language that we understand or
keypads to enter data, or small one we have programmed the
QWERTY keyboards computer with.
● handheld/pocket computers Output unit
● PDA (Personal Digital Assistant) ● The result of the command we
● small, light, draw power from a battery provide the computer with throu
and are intended the input device is called the ou
● for general usage The most used is the monitor si
we give commands using the
Mobile categories keyboard and after the process
● small enough to be carried in a pocket the result or outcome is display
● aside from its telephone capability, it is the monitor.
also internet enabled which allows the Graphics processing unit (GPU)
user to access the web, send and ● The Graphics Processing Unit o
receive email messages and share video card helps generate high-
photos and visuals like the ones in video ga
● videos. Good graphics like these are al
● smartphone and Iphone helpful for people who have to
execute their work through imag
like 3D modellers and others wh
use resource-intensive software
Tablet PC generally communicates directly
● a special type of notebook computer that the monitor.
allows you to write or draw on the screen Central processing unit (CPU)
using a digital pen or also called Stylus ● The CPU is called the brain of t
● Has wireless adapter for internet and computer since no action can ta
local internet connection place without its permission and
● The form of the tablet was execution as the main processin
conceptualized in the middle of the 20th unit. It communicates with all th
century and prototyped and developed in other components of the compu
the last two decades of that century. and has 3 components that help
the smooth functioning of the C
● Components:
○ Arithmetic and
○ Logical Unit
iPad ○ Memory Unit
● With the prompt innovation in ○ Control Unit
technology, tablet computers are
Arithmetic and Logical Unit
developed into touch screens as its input
● This unit does mathematical
device.
calculations, arithmetic operatio
● The Ipad is one of the examples, which
comparison of data and decisio
is controlled by a multi-touch display.
making. It has circuits that are b
● It was a departure from most previous
for addition, subtraction,
tablet computers, which used a
multiplication, division and othe
pressure-triggered stylus, as well as a
calculations.
virtual on screen keyboard instead of a
physical keyboard. Memory unit
● It uses a Wi-Fi (Wireless Fidelity) data ● The information entered through
connection to browse the internet, load input devices is saved in the me
and stream media, and install software. of the CPU and then passed on
the other parts. Similarly, when
output is ready it is saved in the
VII. COMPONENTS OF COMPUTER SYSTEM memory before the result is give
the user.
Components Definitions Control unit
Motherboard ● This unit controls the functionin
● A motherboard is a circuit board component of the computer. It
through which all the different collects the data entered, leads
components of a computer for processing after the process
communicate and it keeps everything done, receives the output and
together provides it to the user. So gettin
● The input and output devices are instructions, decoding it, signali
plugged into the motherboard for the execution and receiving the
function. output is done by the control ce
and hence it is called the center
5
processing actions that happen in ● CPU (Central Processing Unit)
the computer. ○ the brain or engine of a computer, where most of the
Random Access Memory (RAM) processing and operations take place.
● RAM is the most commonly referred ● RAM (Random-Access Memory)
component in a computer. ○ a type of data storage (memory element) used in
● The RAM is also known as the computers that temporarily stores programs and
volatile memory since it gets erased data. RAM is a kind of volatile memory, meaning its
every time the computer restarts. contents are lost when the computer is turned off.
● It stores the data regarding the ● ROM (read-only memory)
programs which are frequently ○ A type of data storage used in computers that
accessed programs and processes. permanently stores data and programs. ROM is a
● It helps programs to start up and kind of non-volatile memory, meaning its contents
close quickly. It being slower has are retained even when the computer is turned off.
made it more obsolete these days. ● Bit (Binary Digit)
Storage unit ○ The smallest, most basic unit of measurement for
● The computers need to store all their computer data storage, represented as either a 0 or
data and they have either a Hard a 1. One byte is equal to 8 bits.
Disk Drive (HDD) or a Solid State ● Byte (Binary Term)
Drive (SSD) for this purpose. ○ a unit of measurement for data storage. One byte is
● Hard disk drives are disks that store equal to 8 bits.
data and this data is read by a
mechanical arm. IX. COMPUTER APPLICATIONS
● Solid-State drives are like SIM cards
in mobile phones. They have no Business
moving parts and are faster than ● A computer has high speed of calculation, diligence,
hard drives. accuracy, reliability, or versatility which has made it an
● There is no need for a mechanical integrated part in all business organizations.
arm to find data on a physical ● Computer is used in business organizations for:
location on the drive and therefore ○ Payroll calculations
this takes no time at all. ○ Budgeting
○ Sales analysis
Common PC Ports and Connectors ○ Financial forecasting
○ Managing employee database
○ Maintenance of stocks, etc.
Banking
● Today, banking is almost totally dependent on computers.
● Banks provide the following facilities:
○ Online accounting facility, which includes checking
current balance, making deposits and overdrafts,
checking interest charges, shares, and trustee
records.
○ ATMs which are completely automated are making it
even easier for customers to deal with banks.
Insurance
● Computer Insurance - Insurance companies are keeping all
records up-to-date with the help of computers. Insurance
companies, finance houses, and stock broking firms are
widely using computers for their concerns.
● Insurance companies are maintaining a database of all clients
with information showing:
○ Procedure to continue with policies
○ Starting date of the policies
○ Next due installment of a policy
○ Maturity date
○ Interests due
○ Survival benefits
VIII. COMPUTER TECHNOLOGIES ○ Bonus
● PC (Personal Computer) Engineering Design
○ a small computer designed for use by a single user ● Computers are widely used for Engineering purposes.
at a time. ● One of the major areas is CAD (Computer Aided Design) that
● Mac (Macintosh) provides creation and modification of images. Some of the
○ a type of personal computer made by Apple Inc. fields are:
○ It runs a version of the macOS (Apple’s operating ○ Structural Engineering − Requires stress and strain
system, pronounced “mack-oh-ess”) analysis for design of ships, buildings, budgets, airplanes,
● OS (Operating System) etc.
○ a powerful program that controls and coordinates a ○ Industrial Engineering − Computers deal with design,
computer’s hardware devices and runs software and implementation, and improvement of integrated systems
applications. of people,materials, and equipment.
○ Examples include Windows, Android, OS X, and ○ Architectural Engineering − Computers help in
Linux. planning towns, designing buildings, determining a range
● Reboot of buildings on a site using both 2D and 3D drawings.
○ to shut down and restart a computer, allowing its Military
operating system and programs to be reloaded.
6
● Computers are largely used in defense. Modern tanks,
missiles, weapons, etc. Military also employs computerized X. COMPUTER SOFTWARE
control systems.
● Some military areas where a computer has been used are: A. Software
○ Missile Control ● Software
○ Military Communication ○ comprises of computer programs, support modules,
○ Military Operation and Planning and data modules
○ Smart Weapons ○ provides a computer with the instructions and data
Government to carry out a specific type of task.
● Computers play an important role in government services. ● Program
● Some major fields in this category are: ○ a set of instructions that solves a problem or carries
○ Budgets out a task
○ Sales tax department ● Support Module
○ Income tax department ○ provides an auxiliary set of instructions used in
○ Computation of male/female ratio conjunction with the main software program
○ Computerization of voters lists ○ not designed to be run by the computer user
○ Computerization of PAN card
○ Weather forecasting Types of Software
Education 1. Systems software or System programs
● The computer helps in providing a lot of facilities in the 2. Application software or Application programs
education system.
● The computer provides a tool in the education system known
as CBE (Computer Based Education).
● CBE involves control, delivery, and evaluation of learning.
● Computer education is rapidly increasing the graph of the
number of computer students.
● There are a number of methods in which educational
institutions can use a computer to educate the students.
● It is used to prepare a database about performance of a
student and analysis is carried out on this basis.
Marketing
● In marketing, uses of the computer are following:
○ Advertising – With computers, advertising
professionals create art and graphics, write and
revise copy, and print and disseminate ads with the
goal of selling more products.
○ Home Shopping – Home shopping has been made
possible through the use of computerized catalogs B. Operating System
that provide access to product information and
permit direct entry of orders to be filled by the Basic Principle of an Operating System
customers. ● An operating system is a collection of software that
Health Care coordinates the working of the different components of the
● Computers have become an important part in hospitals, labs, system and gets the user’s job done.
and dispensaries. ● The operating system provides the user with all the basic
● They are being used in hospitals to keep the record of things necessary to do his job.
patients and medicines. It is also used in scanning and
diagnosing different diseases. What does an Operating System do?
● ECG, EEG, ultrasounds and CT scans, etc. are also done by ● A computer’s software acts similarly with the chain of
computerized machines. command in an army
● Following are some major fields of health care in which ○ Using application software, you issue a command –
computers are used: Application software tells the operating system what
○ Diagnostic System – Computers are used to collect to do
data and identify the cause of illness. ○ The Operating System instructs the device drivers,
○ Lab-diagnostic System − All tests can be done and the device drivers instruct the hardware and the
reports are prepared by computer. hardware actually does the work
○ Patient Monitoring System − These are used to check ● The Operating System interacts with the application software ,
the patient's signs for abnormality such as in Cardiac device drivers, and hardware to manage a computer’s
Arrest, ECG, etc. resources.
○ Pharma Information System − Computer is used to ● While interacting with application software, operating system
check drug labels, expiry dates, harmful side effects, etc. is busy behind the scenes with other tasks
○ Surgery − Nowadays, computers are also used in
performing surgery. When do I directly interact with the operating system?
Communication ● Launch programs
● Communication is a way to convey a message, an idea, a ● Customize the user interface
picture, or speech that is received and understood clearly and ● Manage files
correctly by the person for whom it is meant. ● Configure equipment
● Some main areas in this category are: ● Get help
○ E-mail
○ Chatting Where is the operating system?
○ Usenet ● The entire operating system is small enough to be stored in
○ FTP ROM for typically handheld computers and video game
○ Telnet consoles
○ Video-conferencing
7
● For nearly all personal computers, servers, workstations, protection of resources, and data from unauthorized
mainframes, and supercomputers, the operating system users, and resolves resource conflicts
program is quite large, so most of it is stored on a hard disk ● Error detection and response
● The bootstrap program provides the instructions needed to ○ Variety of errors may occur in computer systems.
load the core parts (kernel) into memory when the system Responses may range from program termination,
boots. retrial of the same operation, or reporting error to the
● Customization utilities and other parts of the operating system application.
are loaded into memory as they are needed. ● Accounting
○ collecting usage statistics, CPU usages, monitor
Basic Function of an Operating System performance, etc.
● Process Management
○ handles multi-programs that are simultaneously Structure of an Operating System
running. ● User – The system representation of the human operator who
● Memory Management requests for services.
○ manage memory between processes and data ● Application Software – Special software to help the user do
according to priority. his task (E.g.. MS Word)
● Storage Management ● Shell – The program that interprets the commands or
○ Managing the permanent Storage of data on disks requests given by the user and gets the job done by the
or other media kernel.
● I/O Management ● Kernel – The core of the operating system. It uses the
○ Manage and schedule the input and output hardware to do the jobs required by the user or the system. It
operations coordinates among the hardware and interfaces it with the
● Device / Resource Management above layers.
○ Managing devices and resources and allowing the ● System Software – Software that can access the hardware
users to share the resources directly and generally provides various system services. (E.g..
● Security and Protection The kernel itself, device drivers etc.).
○ Securing the system against possible unauthorized ● Hardware – The set of electronic devices that work together
access to data or any other entity. Protecting the to ultimately do the job required by all the upper levels
parts of the system against damage.
● Booting the System and getting it ready to work
● Data communications
○ Providing an interface to connect to other computers
or allowing others to connect.

Operating System as an Interface

Types of Operating System


● Single-user Operating System
○ Deals with one set of input devices, those that can
Operating System Services
be manipulated by one user at a time.
● Program Development ● Multi-user Operating System
○ variety of services and utilities such as Editors and ○ Deals with input, output, and processing requests
debuggers. They are usually referred to as from many users, all at the same time
application program development tools. ● Network Operating System
● Program Execution ○ Provides communications and routing services that
○ Involves a number of steps, such as loading allow computers to share data, programs and
Instruction and data in the main memory, peripheral devices
initialization of I/O devices and files, and other ● Multitasking Operating System
resources to be allocated. OS handles the ○ Provides process and memory management
scheduling. services that permit two or more programs to run
● Access to I/O devices simultaneously
○ Each I/O device has its own set of Instructions and ● Desktop Operating System
control signals. O.S. hides these details to provide a ○ Designed for a personal computer, either a desktop
common interface to the user/programmer. or notebook computer
● Controlled access to files ○ Designed to accommodate a single user, but may
○ nature of I/O device (disk drive, tape drive) and also provide networking and multitasking capabilities
structure of the data stored in the files in the storage
medium. In the case of multiple users accessing the
C. Application Software
processor concurrently, proper protection
mechanisms have to be used. ● also known as an application or an "app",
● System access ● a computer software designed to help the user to perform
○ For shared or public systems, the O.S. controls specific tasks.
access to the system as a whole and to specific ● e.g., office suites, enterprise software, accounting software,
system resources. Access system provides graphics software, media players
● Many application programs deal principally with documents.

8
● may be bundled with the computer and its system software, or ○ Examples: Linux, FreeBSD
may be published separately
XI. COMPUTER NETWORKS
D. Nature of Execution of Software Networking is the process of delivering a message from a
● Desktop applications such as web browsers and Microsoft source to a destination.
Office, as well as smartphone and tablet applications (called Communication is the process of giving meaning to these
"apps"). messages received.
● JavaScript scripts are pieces of software traditionally
embedded in web pages that are run directly inside the web Computer Network
browser when a web page is loaded without the need for a ● It is a bunch of computers linked together.
web browser plugin. ● It is cost efficient and reliable.
● Server software, including web applications, usually runs on ● It serves as a good communication medium.
the web server and outputs dynamically generated web pages
to web browsers. Uses of Network for People
● Plugins and extensions are software that extends or ● Access to remote information
modifies the functionality of another piece of software, and ● Person-to-person communication
require that software be used in order to function. ● Interactive entertainment
● Embedded software resides as firmware within embedded
systems, devices dedicated to a single use or a few uses Communication Channels
such as cars and televisions (although some embedded ● a pathway over which information can be transferred
devices such as wireless chipsets can themselves be part of ● information sent over a channel has a source (transmitter),
an ordinary, non-embedded computer system such as a PC from which the information originates, and destination
or smartphone).
● Microcode is a special, relatively obscure type of embedded A. Types of Communication Transmission
software which tells the processor itself how to execute 1. Simplex Channel
machine code, so it is actually a lower level than machine a. a channel whose direction of transmission is
code. unchanging

E. Software Copyright
● a form of legal protection that grants the author of an original
”work”
● an exclusive right to copy, distribute, sell, and edit that work,
except under special circumstances described by copyright 2. Half–Duplex Channel
laws a. a channel in which the direction may be reversed,
but the transmission does not occur at the same
Exceptions: time
● Purchaser
○ can make a backup or extra copy of the software for
erased or damaged original copy
○ allowed to copy and distribute parts of a software 3. Full–Duplex Channel
program for reviews and teaching a. a channel that allows simultaneous exchange in
○ has the right to copy software from a distribution both directions
disk or Web site for installation

License Agreement is a legal contract that defines the way in


which a computer program may be used.

Techniques Validating Software License: Types of Transmission Technologies


● shrink-wrap licenses ● Point-to-point Networks
● installation agreements ○ composed of many connections in individual pairs of
machines
Types of Software License ● Broadcast Networks
○ all the machines on the network share a single
● Public Domain Software
channel
○ may be freely copied, distributed, and resold
○ not protected by copyright
● Commercial Software B. Network Topologies
○ sold in computer stores or at Web sites
○ adheres closely to the limitations provided by
copyright law
● Freeware
○ a copyrighted software that is available for free
○ allows you to use, copy, and distribute the software
● Shareware
○ a copyrighted software marketed under a “try before
you buy” policy
○ allows you to copy and distribute the software
○ provide a low-cost marketing and distribution 1. Bus topology
channel a. each machine is connected to a single cable
● Open Source Software b. a terminator is required at each end of the bus cable
○ may be sold or distributed free of charge to prevent the signal from bouncing back and forth
○ uncompiled program instructions are available to on the bus cable
programmers who want to alter and improve the 2. Star topology
software

9
a. each network host (PC) is connected to a central
hub with a point-to-point connection
b. all traffic on the network passes through the central
hub
3. Ring topology
a. a network topology that is set up in a circular fashion
b. data travels around the ring in one direction
c. each device incorporates a receiver for the incoming
signal and a transmitter to send the data on to the
next device in the ring
4. Tree topology
a. (a.k.a. hierarchical topology) can be viewed as a
collection of star networks arranged in a hierarchy
b. has individual peripheral nodes (e.g. leaves) which
are required to transmit to and receive from one
other node only
c. unlike the star network, the functionality of the
central node may be distributed
5. Mesh topology
a. the fully connected mesh topology is generally too
costly and complex for practical networks
b. it has been used on networks with only a small
number of nodes.
6. Hybrid networks
a. a combination of any two or more topologies in such
a way that the resulting network does not exhibit one
of the standard topologies (e.g., bus, star, ring, etc.)
b. are always produced when two different basic
network topologies are connected

Except for star-based networks, the easiest way to add more


computers into a network is by daisy-chaining, or connecting each
computer in series to the next.
If a message is intended for a computer partway down the
line, each system bounces it along in sequence until it reaches the
destination. A daisy-chained network can take two basic forms: linear
and ring.

C. Distributed System
● Centralized Data Processing (CDP)
○ The conventional way of doing all the processing
and control on centralized computers.
● Distributed Data Processing (DDP)
○ refers to the manipulation of data using distributed
systems
● Client/Server
○ an extension of distributed data processing wherein
it provides the best of both centralized and
distributed data processing

D. Types of Network
1. Local Area Network (LAN)
a. connects network devices over relatively short
distances
b. usually owned by an individual or corporation, 10-
100Mbps
2. Metropolitan Area Network (MAN)
a. connects computers that are in specific geographical
area like cable television
b. 5-10 Mbps, slower than LAN and smaller than WAN.
3. Wide Area Network (WAN)
a. spans a large physical distance (geographically-
dispersed collections of LANs)
b. not owned by any one organization but rather exist
under collective or distributed ownership and
management
c. 256Kbps-2Mbps
4. Personal Area Network (PAN)
a. a network arranged within an individual person,
typically within a range of 10 meters.
b. personal computer devices that are used to develop
the personal area network are the laptop, mobile
phones, media player and play stations.

10

You might also like