Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

INTRODUCTION TO

COMPUTING
CHAIZEN C. LUMIDO
TOPIC OUTLINE
APPLICATION OF COMPUTING IN DIFFERENT FIELDS

TYPES OF
VARIOUS
SPECIALIZATIONS

COMPUTER
APPLICATIONS
IN COMPUTING
USERS OF COMPUTERS

IN TODAY'S ERA
TYPES OF COMPUTER USERS'

CATEGORIES:
TYPES OF COMPUTER USERS
-BY USER LEVEL-
ADMINISTRATOR
This “God-level” user is fully

unrestricted. Administrators

have the power to install and

delete applications, copy and

delete files, and even cause a

massive system crash by

messing with the critical

system files.
TYPES OF COMPUTER USERS
-BY USER LEVEL-
STANDARD USER
The “regular Joe standard

user”. Pretty much able to

do anything except

messing with the critical

system files – Install and

delete applications, copy

and delete files.


TYPES OF COMPUTER USERS
-BY USER LEVEL-
GUEST
A restricted user, maybe

for allowing a friend to

access your computer. Able

to run selected applications

and touch some files, but is

otherwise unable to install

or delete anything.
TYPES OF COMPUTER USERS
-BY USER LEVEL-
CHILD
The cyberworld is full of dangers

and has “too many violent adult

contents”. Some operating

systems acknowledge this fact

and have a “child account” that is

bound by parental control. Child

users are unable to open any

application/game/content that

says “parental guidance is

advised”, and the actions are

usually recorded.
TYPES OF COMPUTER USERS
-BY SKILL LEVEL-
COMPUTER NEWBIE
A complete

beginner and

someone who is

new to the cyber

world.
TYPES OF COMPUTER USERS
-BY SKILL LEVEL-
COMPUTER USER
People who have “used

computers for long

enough”, and have a

“good enough”

understanding of how
computers work.
TYPES OF COMPUTER USERS
-BY SKILL LEVEL-
POWER USER
People who have a

“better than average”

understanding of

computers, know

some tech tricks up

the sleeve.
TYPES OF COMPUTER USERS
-BY SKILL LEVEL-
COMPUTER WIZARD
The almighty tech geeks.

Give them a mess of

wires, and they can sort

it out. Bring them a

broken gadget, and they

can fix it. Everything bad

will turn good in their

magical hands.
TYPES OF COMPUTER USERS
-BY USER INTENT-
APPLICATION-ORIENTED USERS
These are users who have been

trained to use particular

software applications. Their

purpose for using a computer, be

it for school, work, or play, is to

exactly use those applications to

complete a task. For example, a

product designer using CAD

(Computer-aided design)

software to draft designs for a

new product.
TYPES OF COMPUTER USERS
-BY USER INTENT-
GOAL-ORIENTED USERS
These are the type of users

who don’t care about what

applications are used, as long

as things get done using

computers. For example, the

user does not care if it is

Microsoft Office, LibreOffice,

or WPS office. So long as it is

capable of creating a

document, anything goes.


TYPES OF COMPUTER USERS
-BY USER INTENT-
COMPUTER ORIENTED USERS
This is an uncommon

group of users who uses

computers to “build

computers”. Sounds

confusing? Simply put,

these people are either

hackers or

programmers.
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
ENTERTAINMENT
Examples – Gamers,

streamers, artists.
The gaming and

entertainment industry is

huge… It is so common

these days to see people

glued to the smartphone

for gaming or watching

videos.
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
ACADEMIC
Examples – Teachers and

students.
Gone are the good old days

where teachers write on

chalkboards. Computers

simply offer a better way to

teach with slides, images, and

videos; Also a better way to

learn with illustrations and

not a whole bunch of text.


TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
SCIENCE
Examples –

Researchers and

scientists.
To do all kinds of mad

scientists

calculations and

simulations.
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
COMMERCE
Examples – Cashiers,

managers, analysts, office

workers.
Computer users for the

commerce section are so wide

these days. To do office work,

manage customer orders,

generate reports, monthly

sales, warehouse

management, etc…
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
BANKING & FINANCE
Examples – Bankers and

traders.
The people who use
computers to keep their

money safe in the bank…

Or use it to make more

money.
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
MANUFACTURING & PRODUCTION
Examples – Publishers,

operators, managers.
Hand-made with love these

days are rare. Factories

adopt computers and

machines for mass

production these days,

people use computers to

control and manage the

production line.
TYPES OF COMPUTER USERS
-BY INDUSTRY & PURPOSE-
MILITARY & LAW ENFORCEMENT
Examples – Intelligence and

crime analyst.
How do we know if a

certain psycho will most

likely strike? Welcome to

criminal science, where

smart people use

computers and past data

to predict the future.


VARIOUS

APPLICATIONS

OF

COMPUTERS IN

TODAY'S ERA
http://generalnote.com/Basic-computer/Application-of-Computer.php
1. BUSINESS
THE VARIOUS
2. EDUCATION
APPLICATIONS
3. MARKETING
OF

4. BANKING
5. INSURANCE
COMPUTERS
6. COMMUNICATION
IN TODAY'S
7. HEALTH CARE
8. MILITARY
ERA: 9. ENGINEERING

DESIGN
A COMPUTER HAS HIGH

1. BUSINESS
SPEED OF CALCULATION,

DILIGENCE, ACCURACY,

RELIABILITY, OR VERSATILITY

WHICH MADE IT AN

INTEGRATED PART IN ALL

BUSINESS ORGANISATIONS.
COMPUTER IS USED IN

BUSINESS ORGANISATIONS

FOR: PAYROLL

CALCULATIONS, SALES

ANALYSIS, BUDGETING,

FINANCIAL FORECASTING,

MANAGING EMPLOYEES

DATABASE AND

MAINTENANCE OF STOCKS

ETC.
COMPUTERS HAVE ITS

2. EDUCATION
DOMINANT USE IN THE

EDUCATION FIELD WHICH

CAN SIGNIFICANTLY

ENHANCE PERFORMANCE IN

LEARNING. EVEN DISTANCE

LEARNING IS MADE

PRODUCTIVE AND EFFECTIVE

THROUGH INTERNET AND

VIDEO-BASED CLASSES.

RESEARCHERS HAVE

MASSIVE USAGE OF THESE

COMPUTERS IN THEIR WORK

FROM THE STARTING TO TILL

THE END OF THEIR

SCHOLARLY WORK.
IN MARKETING THERE ARE TWO

WAYS OF USING COMPUTERS:


3. MARKETING
1. ADVERTISING - CREATES

ART AND GRAPHICS, WRITE

AND REVISE COPY, AND

PRINT AND DISSEMINATE

ADS WITH THE GOAL OF

SELLING MORE PRODUCTS.


2. HOME SHOPPING - HAS

BEEN MADE POSSIBLE

THROUGH USE OF

COMPUTERISED

CATALOGUES THAT

PROVIDE ACCESS TO

PRODUCT INFORMATION

AND PERMIT DIRECT ENTRY

OF ORDERS TO BE FILLED BY

THE CUSTOMERS.
TODAY, BANKING IS

ALMOST TOTALLY

4. BANKING DEPENDENT ON

COMPUTER. BANKS

PROVIDE THE FACILITIES OF:


BANKS PROVIDE ONLINE

ACCOUNTING FACILITY,

WHICH INCLUDES CURRENT

BALANCES, DEPOSITS,

OVERDRAFTS, INTEREST

CHARGES, SHARES, AND

TRUSTEE RECORDS.
ATM MACHINES ARE

MAKING IT EVEN EASIER

FOR CUSTOMERS TO DEAL

WITH BANKS.
INSURANCE

5. INSURANCE
COMPANIES ARE

KEEPING ALL

RECORDS UP-TO-

DATE WITH THE HELP

OF COMPUTERS. THE

INSURANCE

COMPANIES, FINANCE

HOUSES AND STOCK

BROKING FIRMS ARE

WIDELY USING

COMPUTERS FOR

THEIR CONCERNS.
COMMUNICATION MEANS

6. COMMUNICATION TO CONVEY A MESSAGE,

AN IDEA, A PICTURE OR

SPEECH THAT IS

RECEIVED AND

UNDERSTOOD CLEARLY

AND CORRECTLY BY THE

PERSON FOR WHOM IT IS

MEANT FOR. SOME MAIN

AREAS IN THIS CATEGORY

ARE: CHATTING, E-MAIL,

USENET, FTP, VIDEO-

CONFERENCING AND

TELNET.
MOST OF THE MEDICAL

7. HEALTH CARE INFORMATION CAN NOW

BE DIGITIZED FROM THE

PRESCRIPTION TO

REPORTS.

COMPUTATION IN THE

FIELD OF MEDICINE

ALLOWS US TOOFFER

VARIED MIRACULOUS

THERAPIES TO THE

PATIENTS. ECG’S,

RADIOTHERAPY WASN’T

POSSIBLE WITHOUT

COMPUTERS.
COMPUTERS ARE THE MAIN

TOOLS WHICH HELP IN

8. MILITARY
DEVELOPING MISSILES AND

OTHER EQUIPMENT IN THE

DEFERENCE SYSTEM. DESIGNING

AND THE MAINTENANCE ARE

POSSIBLE ONLY THROUGH

COMPUTERS. COMPUTER BUILDS

THE LINKS BETWEEN THE

SOLDIERS AND COMMANDERS

THROUGH THE SATELLITE.

CONSTRUCTION OF WEAPONS

AND CONTROLLING THEIR

FUNCTION IS NOT POSSIBLE

WITHOUT THE AID OF

COMPUTERS. THE LIST OF THE

CRIMINALS AND THE RECORDS

OF THE COPS ARE MAINTAINED

REGULARLY IN THE SYSTEM.


AS PER THE

9. ENGINEERING
TITLE,COMPUTERS AID

DESIGN IN DESIGNING

BUILDINGS,

MAGAZINES, PRINTS,

NEWSPAPERS, BOOKS

AND MANY OTHERS.

THE CONSTRUCTION

LAYOUTS ARE

DESIGNED BEAUTIFULLY

ON SYSTEM USING

DIFFERENT TOOLS AND

SOFTWARE’S.
SPECIALIZATIONS
IN
COMPUTING
REFERS TO A COMPUTING

1. ARTIFICIAL
SYSTEM’S ABILITY TO

SOLVE PROBLEMS, MAKE

INTELLIGENCE PREDICTIONS, OR

COMPLETE COMPLEX

TASKS. AI APPLICATIONS

USE EMERGING

TECHNOLOGY SUCH AS

NATURAL LANGUAGE

PROCESSING, WHICH

INTERPRETS WRITTEN AND

SPOKEN WORDS, AND

MACHINE LEARNING, WHICH

ENABLES APPLICATIONS TO

MAKE PREDICTIONS AND

RECOMMENDATIONS.
CONSIDERS THE MANY

2. COMPUTER-
WAYS THAT PEOPLE

INTERACT WITH

HUMAN
COMPUTERS, FROM

INTERFACE WEBSITES AND MOBILE

PHONES TO VOICE-ENABLED

SPEAKERS AND VIRTUAL

REALITY. EFFECTIVE

INTERFACE DEVELOPMENT

AND DEPLOYMENT

REQUIRES THE USE OF

STANDARD LIBRARIES TO

ENSURE THE COMPATIBILITY

AND USABILITY OF

APPLICATIONS ACROSS

SYSTEMS.
REALISTIC IMAGES THAT

3. GAME DESIGN MAKE TODAY’S COMPUTER

GAMES SO APPEALING, THE

COMPUTER SCIENCE

SPECIALIZATION OF GAME

DESIGN LOOKS AT THE AI AND

MACHINE LEARNING THAT

DETERMINES HOW PLAYERS

PROGRESS THROUGH A

GAME. GAME DESIGN ALSO

CONSIDERS HOW THE WORK

OF FRONT-END DESIGNERS

AND BACK-END DEVELOPERS

SHOULD COME TOGETHER

FOR A COHESIVE PRODUCT

EXPERIENCE.
FOCUSES ON HOW

4. NETWORKS ORGANIZATIONS USE BOTH

WIRED AND WIRELESS

NETWORKS TO EXCHANGE
INFORMATION WITH

INTERNAL AND EXTERNAL

STAKEHOLDERS.

RESPONSIBILITIES INCLUDE

MANAGING BANDWIDTH,

TRAFFIC, USER ACCESS,

AND THE SECURITY OF

NETWORKS THEMSELVES,

AS WELL AS ANY DEVICES

CONNECTED TO THE

NETWORK.
FOCUSES ON TWO- AND

5. COMPUTER

THREE-DIMENSIONAL IMAGES

USED IN A VARIETY OF

GRAPHICS SOFTWARE APPLICATIONS,

INCLUDING GAMES,

COMPUTER-ASSISTED

DESIGN, MANUFACTURING,

AND MULTIMEDIA PUBLISHING.

BEYOND THE CONCEPTS OF

CREATING REALISTIC IMAGES,

EFFECTIVE COMPUTER

GRAPHIC DESIGN ALSO

CONSIDERS THE BEST WAY TO

DISPLAY THOSE IMAGES

GIVEN LIMITATIONS SUCH AS

SCREEN SIZE, SYSTEM

MEMORY, AND BANDWIDTH.


MANAGE ALL ASPECTS OF AN

6. INFORMATION
ORGANIZATION’S SECURITY,

INCLUDING SOFTWARE

SECURITY APPLICATIONS, NETWORKS,

STORAGE HARDWARE,

DEVICES, AND SO ON.

REQUIRES A DEEP

UNDERSTANDING OF

SECURITY VULNERABILITIES

AND THE VARIOUS METHODS

THAT INTERNAL AND

EXTERNAL ATTACKERS USE

TO EXPLOIT THEM. BALANCE

SECURITY REQUIREMENTS

WITH THE NEED FOR

EMPLOYEE OR END-USER

PRODUCTIVITY.
REFERS TO THE ABILITY TO

“MINE” LARGE DATA SETS TO

7. DATA SCIENCE GAIN USEFUL INFORMATION

OR INSIGHT.

ORGANIZATIONS BENEFIT

MOST FROM DATA SCIENCE

AS A PRACTICE WHEN A

VARIETY OF TECHNIQUES

ARE USED TO RETRIEVE AND

ANALYZE DATA, AND WHEN

IT IS USED TO PROCESS

LARGE, COMPLEX, AND


SOMETIMES UNSTRUCTURED

SETS OF INFORMATION,

COMMONLY REFERRED TO

AS “BIG DATA.”
PROFESSIONALS WHO

8. PROGRAMMING
SPECIALIZE IN

PROGRAMMING

LANGUAGES LANGUAGES UNDERSTAND

THE KEY DIFFERENCES

BETWEEN COMMON

LANGUAGES SUCH AS

JAVASCRIPT, PYTHON,

RUBY, VISUAL BASIC .NET,

SQL, R, AND C#. THIS

INCLUDES KNOWLEDGE

ABOUT THE TYPES OF

APPLICATIONS, DATABASES,

OR OTHER USE CASES FOR

WHICH EACH LANGUAGE IS

BEST SUITED.
FOCUSES ON THE SYSTEMS

9. SOFTWARE
AND PROTOCOLS FOR

USING THESE

ENGINEERING APPLICATIONS.

PROFESSIONALS IN THESE

ROLES MAY HAVE A

NUMBER OF DIFFERENT

SPECIALTIES, SUCH AS
DEBUGGING AND TESTING,

SECURITY AND

SCALABILITY, OR THE

ABILITY OF AN APPLICATION

TO ADD USERS OR

FEATURES WITHOUT A

NEGATIVE IMPACT ON

PERFORMANCE.
FOCUSES ON ADVANCED

10. THEORY
MATHEMATICAL THEORIES

AND PRINCIPLES

(KURU-KURO/PALIWANAG) INCLUDING ADVANCED

CRYPTOGRAPHY,

APPROXIMATION

ALGORITHMS,

COMPUTATIONAL

ALGEBRA, AND

RANDOMNESS, ALSO

THEORIES EXAMINE

TECHNIQUES FOR DATA

AND SYSTEM PROCESSING

SUCH AS DISTRIBUTED

COMPUTING AND PARALLEL

COMPUTING.
THANK YOU FOR LISTENING!
GOOD LUCK ON YOUR EXAMINATION!
BUT BEFORE THAT, YOU MUST READ THE NEXT PAGE

You might also like