You are on page 1of 56

COMPUTING INDUSTRY & COMPUTING PROFESSION

GROUP 4
Computing Industry & computing profession
 A computer is a machine that can be
programmed to carry out sequences of
arithmetic or logical operations automatically.
Modern computers can perform generic sets of
operations known as programs. There programs
enable computer to perform a wide range of
task.
Computing Industry
 Computers have become a useful and necessary
part of modern society. They have been used in all
types of businesses ranging from mail order and
retail sales, to communications such as phone lines
and internet access. Computers are prevalent in
hospitals and supermarkets, universities and malls,
restaurants and government agencies. By 1998,
over 40% of all families in the United States had a
personal computer.
WHAT DOES COMPUTING INDUSTRY MEANS?
 Computer industry , The computer , or IT,
industry is the range of businesses involved in
developing computer software, designing
computer hardware and computer networking
intrastructures , the manufacture o computer
components and the information technology
services.
THE COMPUTING AND ITS IMPORTANCE
 Computing is any goal oriented activity requiring, benefiting form,
or creating computing machine , It includes the study and
experimentation of algorithmic processes and development of
both hardware and software ,It has scientific, engineering ,
mathematical, technological and social
aspects.
 Computing can be used for online educations &
research. with the help of the internet, student can find
useful information about their projects . Assignments
and also can take useful help their research as they store
& organize their research materials in computers.
OVERVIEW OF COMPUTING INDUSTRY
 The computer and peripherals Industry in composed of a diverse
group of companies. It produces a wide range of products for sale
to just about all business and consumer. The industry trends to
thrall the economic cycle, and is very competitive.
ADVANTAGE OF COMPUTERS IN THE INDUSTRY
 Speed and Accuracy
 The Ability to Forecast
 Increased Connectivity
 Information Security
 Entrepreneurial Opportunity
 Hiring and managing Employees
 Education and Training
ARTIFICIAL INTELLIGENCE
 Artificial Intelligence (AI) is the branch of computer
sciences that emphasizes the development of
intelligence machines, thinking and working like
humans.
 For example, speech recognition, problem-solving,
learning and planning
INTERNET OF THINGS (IoT)
 The internet of Things describes the network of physical objects –“things”-
that are embedded with sensors, software, and other technologies for the
purpose of connecting and exchanging data with other devices and systems
over the internet. These devices range from ordinary household objects to
sophisticated industrial tools.

 Examples of objects that can fall into the scope of Internet of Things include
connected security systems, thermostats, cars, electronic appliances, lights
in household and commercial environments, and more.
SECURITY
 IT security is a set of cybersecurity strategies that prevents unauthorized
access to organizational assets such as computers, networks, and data. It
maintains the integrity and confidentiality of sensitive information, blocking
the access of sophisticated hackers.
BIG DATA
 Big data is a combination of structured, semi structured and unstructured data
collected by organizations that can be mined for information and used in
machine learning projects, predictive modeling and other advanced analytics
applications.
MOBILE APPS DEVELOPMENT
 Mobile application development is the process of creating
software applications that run on a mobile device, and a typical
mobile application utilizes a network connection to work with
remote computing resources.
 Hence, the mobile development process involves creating
installable software bundles (code, binaries, assets, etc.),
implementing backend services such as data access with an API,
and testing the application on target devices.
AUGMENTED REALITY/VIRTUAL REALITY/MIXED REALITY/EXTENDES
REALITY (AR/VR/MR/XR)
 Augmented reality (AR) adds digital elements to a live view often
by using the camera on a smartphone. Examples of augmented
reality experiences include Snapchat lenses and the game
Pokemon Go.

 Visual reality (VR) implies a complete immersion experience that


shuts out the physical world. Using VR devices such as HTC Vive,
Oculus Rift or Google Cardboard, users can be transported into a
number of real-world and imagined environments such as the
middle of a squawking penguin colony or even the back of a
dragon
 Mixed Reality (MR) experience, which combines elements of both
AR and VR, real-world and digital objects interact. Mixed reality
technology is just now starting to take off with Microsoft’s HoloLens
one of the most notable early mixed reality apparatuses.

 Extended Reality (XR) is an umbrella term that covers all of the


various technologies that enhance our senses, whether they’re
providing additional information about the actual world or creating
totally unreal, simulated worlds for us to experience. It includes
Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (MR)
technologies.
ROBOT PROCESS AUTOMATION
 Robotic Process Automation is the technology that allows anyone
today to configure computer software, or a “robot” to emulate and
integrate the actions of a human interacting within digital systems
to execute a business process.
BLOCKCHAIN
 Blockchain is a system of recording information in a way that makes
it difficult or impossible to change, hack, or cheat the system. It is
essentially a digital ledger of transactions that is duplicated and
distributed across the entire network of computer systems on the
blockchain. Each block in the chain contains a number of
transactions, and every time a new transaction occurs on the
blockchain, a record of that transactions added to every
participant’s ledger. The decentralised database managed by
multiple participants is known as Distributed Ledger Technology
(DLT).

 Blockchain is a type of DLT in which transactions are recorded with


an immutable cryptographic signature called a hash.
BLOCKCHAIN
 This means if one  Blockchain is the
block in one chain  This allows financial
technology the
was changed, it transactions based
underpins digital
would be on blockchain
currency
immediately technology. It is
(Bitcoin,Litecoin,
apparent it had used in currency
Ethereum, and the
been tampered and payments.
like). The tech
with. If hackers Bitcoin is the most
allows digital
wanted to corrupt a prominent example
information to be
blockchain system, in this segment. The
distributed, but not
they would have to new key concepts
copied. You may
change every block are Smart Contracts,
hear it described as
in the chain, across small computer
a “digital ledger”
all of the distributed programs that "live"
stored in a
versions of the in the blockchain.
distributed network
chain.
AUTONOMOUS DRIVING
 An autonomous car is a vehicle capable of sensing its environment and
operating without human involvement. A human passenger is not required
to take control of the vehicle at any time, nor is a human passenger
required to be present in the vehicle at all. An autonomous car can go
anywhere a traditional car goes and do everything that an experienced
human driver does.
BUSINESS INTELLIGENCE (BI)
 Business intelligence combines business analytics, data mining, data
visualization, data tools and infrastructure, and best practices to help
organizations to make more data-driven decisions.
o The most common refers to o A virtualized pool of resources,
running workloads remotely from raw compute power to
over the internet in a application functionality,
commercial provider’s data available on demand. When
center, also known as the customers procure cloud
CLOUD COMPUTING “public cloud” model. Popular services, the provider fulfills
public cloud offerings—such as those requests using advanced
Amazon Web Services (AWS), automation rather than
Salesforce’s CRM system, and manual provisioning. The key
Microsoft Azure—all exemplify advantage is agility: the ability
this familiar notion of cloud to apply abstracted compute,
computing. Today, most storage, and network
businesses take a multicloud resources to workloads as
approach, which simply means needed and tap into an
they use more than one public abundance of prebuilt services
cloud service.
SERVICE DESK
 Service Desk Management/IT Service Desk Management is the process of
managing the IT service desk that forms the point of contact between the
IT service providers and the IT service users.
 Most organizations use a centralized approach of IT service desk
management, where there’ a central point of contact between service
providers and users and all incidents are managed centrally.
BIOMETRICS
 Biometrics is the technical term for body measurements and
calculations. It refers to metrics related to human characteristics.
Biometrics authentication (or realistic authentication) is used in
computer science as a form of identification and access control.

Examples include, but are not limited to fingerprint, palm veins,


face recognition, DNA, palm print, hand geometry, iris recognition,
retina and odor/scent. Behavioral characteristics are related to the
pattern of behavior of a person, including but not limited to typing
rhythm, gait, and voice.
3D PAINTING
 The 3D printing process builds a three-dimensional object from a
computer-aided design (CAD) model, usually by successively adding
material layer by layer, which is why it is also called additive
manufacturing, unlike conventional machining, casting and forging
processes, where material is removed from a stock item (subtractive
manufacturing) or poured into a mold and shaped by means of dies,
presses and hammers.
DRONES
• Drones are being commonly used these days to
capture addresses by politicians, concerts, and live
sports events. They can provide a perspective to
the audience that no other technology can
provide. In the past, cameras hung from cables
were used to capture aerial views.
COMPUTING
PROFESSION
WHAT IS COMPUTING PROFESSION
 Professions such a medicine, law, and
accounting exemplify these attributes.
Computing exhibits all of the attributes of
a profession…deep technical expertise.
COMPUTING PROFESSIONALS
 Computing professionals constitute a broad and diverse-
group-theoreticians. People who design chips and hardware
systems, developers of expert systems and data bases.
Builders of information systems for banks and insurance
companies, developers of software for personal computer.
Developers of hardware and software for local- and wide-
area networks. And so on.
 A computer professional can work in virtually any industry. Government
agencies, hospitals and other medical institutions, educational facilities
and a host of private industries hire computer professionals with basic
and advanced computer knowledge. This knowledge often centers
around computer hardware or computer software. Computer hardware
professionals work with the physical components that make up a
computer system, such as the motherboard, central processing unit and
hard drive. Computer software professionals work with the programs
that enable computers to perform specific tasks, such as a word
processor or operating system.
SOME OF THE MANY COMPUTER JOBS WORTH CONSIDEDING
 Big data Engineer
 Application Architect
 Web Developer
 Database Administrator
 Computer Hardware
 Computing software engineer
 Data security analyst
 Information system
security manager
Functions of The Listed Computer Professionals
* Computer Managers - A computer manager has the
overall responsibility of the computer department. He
ensures the computer installation runs efficiently in
satisfying the computer needs of an organization which
it serves. The computer manager is the communicator
of the computer department. He is the person who
often has to make presentations to superior officers in
the corporation. He ensures that every piece of
equipment in the computer room is in good working
conditions and should be upgrade when the need
arises.
*Computer Programmer – Programmers work
closely with a system analyst to either create new
software or to review existing programs. A programmer
uses programming languages like Basic, C++, Java, etc.
in highly structured systems. Programmers are of three
categories: Application programmer, System
programmer, and Maintenance programmer. Several
programmers work together as a team. Simple
programs can be written in a few hours but some
complex programs may require more than a year to
work on and test run.
ETHICS AND PROFESSIONAL RESPONSIBILITY
IN COMPUTING
 Computing professionals perform a variety of tasks: They write
specifications for new computer systems, they design instruction
pipelines for superscalar processors, they diagnose timing anomalies
in embedded systems, they test and validate software systems, they
restructure the back-end databases of inventory systems, they
analyze packet traffic in local area networks, and they recommend
security policies for medical information systems
 Write specifications for new computer systems
 Design instruction pipelines for superscalar
processors
 Diagnose timing anomalies in embedded systems
 Test and validate software systems
 Restructure the back-end databases of inventory
systems
 Analyze packet traffic in local area networks
 Recommend security policies for medical
information systems
CAREERS IN IT

With an ever expanding business needs, a wide


variety of career opportunities are available
in computing. This list is by no means exhaustive and
is only meant to be representation of the
types of jobs available, mainly being categorized
under two heads:

1. Software
2. Hardware
COMPUTER ENGINEERS

 Computer engineers work with  Computer hardware engineers


the hardware and software usually design, develop, test,
aspects of systems design and and supervise the manufacture
development. They often work of computer hardware—such
as part of a team that designs as chips or device controllers.
new computing devices or
computer-related equipment.
NETWORK
SPECIALIST
 The rapid spread of computer networks has resulted in the increase
of requirement of specialists responsible for the security and
administration of the networks they design and implement systems
that keep networks functioning smoothly.

 Their duties may be planning and installation of the hardware and


software that comprise the network, addition – deletion of files to
the network server, maintaining the peripherals connected to the
network, troubleshooting problems.
SOFTWARE COMPUTER
PROGRAMMERS
 Computer programmers write, test, and maintain the
programs or software. They also
conceive, design, and test logical structures for solving
problems by computer.
PROGRAMMERS ARE OF TWO TYPES:

1. Applications programmers
They usually focus on business, engineering, or science. They
write software to handle a
specific job they may also revise existing packaged software.
2. Systems Programmers
The Computer Systems software such as Operating System,
Compilers etc. are maintained and controlled by them.
CONTENT DEVELOPMENT
 Content developers write, edit, shape, and aggregate
information. They are responsible for producing high
quality, comprehensive product and system materials
for documentation by interpreting technical data into
written content that can easily be used by technical
personnel and end users with varying degrees of
knowledge.
DATABASE ADMINISTRATOR (DBA)
 They are the keepers of database accuracy, efficiency,
maintenance and development. The DBA function requires
Database Planning, requirements gathering and
conceptual design, logical design and transaction design,
physical design and implementation, testing and
debugging.
DATABASE SPECIALIST
 Database Specialists design, install, update,
modify, maintain, and repair computer databases.
Duties may include:
Providing technical support for existing databases

Modifying existing databases

Customizing commercial databases for specific needs

Planning and designing databases for new clients

Solving problems to meet the needs of clients

Programming databases for a wide variety of applications

Overseeing the installation of new databases


Training staff in client companies about the use of new or existing
databases
E-COMMERCE
 The primary activities may be
 E-Commerce deals
identifying E-commerce
with doing business fields, customers, marketing,
over the Internet and
providing online technical
World Wide Web.
support and finally
These professionals
administration, resulting into
are responsible for
improvement of online
exploring and
Business to Business(B2B)
developing the ever –
transactions, improving the
growing sales
channels and the
product sales on Internet.
expanding customer
base.
IT AND EDUCATION
• To match the speed at which the IT industry is growing, we
need more trained professionals every year. They could be
a faculty at of the training institutes that impart training on
various subjects or working with universities. All you need
to have is your degrees in place and a passion to teach.
INTERFACE
• DESIGNER
Human-computer interaction is a relatively upcoming field in computer
science, which deals with ergonomic and interface details in computing.

• Interface designers design the user interface of a computer system, the


communication system between the user and the computer, what you see
on the computer screen while using a program and, how a user is led
through a program or process.
QUALITY ASSURANCE
(QA)
• QA, when applied to web sites, is the process of
enforcing quality control standards and working to
improve the processes that are used in producing the
web site and its components, infrastructure and
content. When well implemented, a web site should see
progressive improvement in terms of both lessening
rate of defects and general increase in site usability and
performance.
SOFTWARE
•ENGINEERS
Software engineers or software developers working in applications
development analyze users’ needs and design, create, and modify
general computer applications software or specialized utility
programs.

• Those involved with the systems software may research, design, and
test operating system software, compilers, network distribution
software.
SYSTEM
ANALYST
 Also referred as a systems developer and
systems architect. They enable computer
technology to meet individual needs of an
organization. This may include planning and
developing new computer systems or devising
ways to apply existing systems’ resources to
additional operations.
TECHNICAL
WRITER
 They have a varied number of
activities to perform, which may be
to design, write and edit manuals,
brochures and online help in the
software industry.
WEB DESIGN
 Multimedia and Web developers
build, design / write or edit on-line
information, supporting websites
including on-line help.
INTERFACE DESIGN AND USABILITY TESTING
ENGINEERS

 Usability engineers and interface


designers help software developers
make and test programs that are user-
friendlier.
PROPOSAL WRITERS

 These help engineers


and scientists write
successful proposals.
WEB DESIGNER
 They are responsible for creating, maintaining
and supporting Internet sites for organizations.
They are responsible for day-to-day site design
and creation. They should be comfortable
working closely with clients and developing web
sites according to the client's requirements.
THANK YOU
FOR
WATCHING
MEMBERS
Bantiles, Jason B.
Lepon, April Jean D.
Ybañez, Glyza Luceñara Y.
Maroliña, Bearyl Kate Graces
Sacil, Johnpaul

You might also like