Introto Technology

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 51

Introduction to Technology

Objectives Overview

Describe the purpose and


uses of smartphones, digital Describe the relationship
Differentiate among
cameras, portable media between data and
laptops, tablets, and servers
players, e-book readers, information
and game devices

Differentiate the Internet


Explain the purpose of a
from the web, and describe
Briefly explain various input browser, a search engine,
the relationship among the
options and an online social
web, webpages, websites,
network
and web servers

See Page IT 1 9
Introduction to Technology
for Detailed Objectives
Objectives Overview

Briefly describe digital


Differentiate between wired
security risks associated
Differentiate between an and wireless network
with viruses and other
operating system and technologies, and identify
malware, privacy, your
applications reasons individuals and
health, and the
businesses use networks
environment

Discuss how society uses


technology in education, Describe home users, small
government, finance, retail, office/home office users,
entertainment, health care, mobile users, power users,
travel, science, publishing, and enterprise users
and manufacturing

See Page IT 1 10
Introduction to Technology
for Detailed Objectives
A World of Technology

• Because technology
changes, you must keep
up with the changes to
remain digitally literate
• Digital literacy involves
having a current
knowledge and
understanding of
computers, mobile
devices, the Internet, and
related technologies
Page IT 2 Introduction to Technology 11
Figure 1
Computers

• A computer is an electronic device, operating


under the control of instructions stored in its own
memory

Accepts Produces
data Processing information
(input) (output)

Page IT 3 Introduction to Technology 12


The Components of a Computer

• The six primary components of a computer are


input devices, the processor (control unit and
arithmetic/logic unit), memory, output devices,
storage devices, and communications devices
• The processor, memory, and storage devices are
housed in a box-like case called the system unit
• A peripheral is a device that connects to the
system unit and is controlled by the processor in
the computer
13
The Components of a Computer

14
Computers

• Laptop
• Tablet
• Desktop
• Server

Pages IT 3, IT 5, and IT 6 Introduction to Technology 15


Figures 2 – 5
Mobile and Game Devices

Smartphone

Digital camera

Portable media player

E-book reader

Game console
Pages IT 7 – IT 10 16
Introduction to Technology
Figures 1-6 – 1-10
Data and Information

Page IT 11 17
Introduction to Technology
Figure 11
Data and Information

• A keyboard
contains keys you
press to enter data
and instructions
into a computer or
mobile device

Page IT 12 Introduction to Technology 18


Figure 12
Data and Information
• A pointing device is an input device
that allows a user to control a small
symbol on the screen, called a
pointer
• Some mobile devices and computers
enable you to speak data instructions
using voice input and to capture live
full-motion images using video input

Pages IT 12 – IT 13 Introduction to Technology 19


Figures 13 - 14
Data and Information

• A scanner is a light-sensing input device that


converts printed text and images into a form the
computer can process

Page IT 13 Introduction to Technology 20


Figure 15
Data and Information

• An output device is any hardware component


that conveys information from a computer or
mobile device to one or more people
• A printer is an output device that produces text
and graphics on a physical medium such as paper

Pages IT 13 – IT 14 Introduction to Technology 21


Figure 16
Data and Information

• A display is an output device that visually conveys


text, graphics, and video information

Page IT 14 Introduction to Technology 22


Figure 17
Data and Information

• Speakers allow you to hear audio such as music,


voice, and other sounds
– Earbuds
– Headphones

Page IT 15 Introduction to Technology 23


Figure 18
Data and Information

Memory consists of electronic components that store


instructions waiting to be executed and the data needed by
those instructions

A computer keeps data, instructions, and information on a


storage media

A storage device records (writes) and/or retrieves (reads) items


to and from storage media

Page IT 15 Introduction to Technology 24


Data and Information

Hard Disk Solid-State USB Flash Drive


Drive

Memory Card Optical Disc Cloud Storage

Pages IT 15 – IT 17 Introduction to Technology 25


Figures 19 – 24
The Internet

• The Internet is a worldwide collection of networks that


connects millions of businesses, government agencies,
educational institutions, and individuals

Pages IT 18 – IT 19 26
Introduction to Technology
Figure 25
The Internet

The World Wide Web (or web, for short) is a global library of
information available to anyone connected to the Internet

The web consists of a worldwide collection of electronic


documents, each of which is called a webpage

A website is a collection of related webpages

A web server is a computer that delivers requested


webpages to your computer or mobile device
Pages IT 19 – IT 20 Introduction to Technology 27
The Internet

Page IT 19 Introduction to Technology 28


Figure 26
The Internet

• A browser is software that enables users with an


Internet connection to access and view webpages
on a computer or mobile device

Page IT 20 Introduction to Technology 29


The Internet

• A search engine is software that finds websites,


webpages, images, videos, news, maps, and other
information related to a specific topic

Page IT 21 Introduction to Technology 30


The Internet

• An online social network encourages members to


share their interests, ideas, stories, photos, music,
and videos with other registered users

Pages IT 21 – IT 22 31
Introduction to Technology
Figure 27
Web Site Address
URL

http://cis.ncu.edu.jm/courses/cptr120.htm

protocol path Web page/file name


Domain name
COUNTRY CODE
Top-Level Domain Extensions

• EDU • STORE
• COM • BIZ
• ORG • FIRM
• NET • INFO
• MIL • AERO
• GOV • NAME
• TV
Top-Level Domain Extensions

• EDU - Education • STORE - Stores


• COM - Commercial • BIZ - Businesses
• ORG - Organization • FIRM – Firms
• NET – Network • INFO – Information
• MIL – Military • AERO – Air Transport
• GOV – Government Industry
• TV – Television • NAME- Individuals, by
name
Digital Safety and Security

• It is important that users protect their computers


and mobile devices
Viruses and
Other Privacy
Malware

Health Environmental
Concerns Issues

Pages IT 23 – IT 24 Introduction to Technology 37


Malware

• Malware, or malicious software, is any program or


file that is harmful to a computer user.
• A virus is the most
common type of
malware which
can execute itself
and spread by
infecting other
programs or files.
Introduction to Technology 38
• A worm can self-replicate without a host program
and typically spreads without any human
interaction or directives from the malware
authors.
• A Trojan horse is designed to appear as a
legitimate program in order to gain access to a
system. Once activated following installation,
Trojans can execute their malicious functions.
• Spyware is made to collect information and data
on the device user and observe their activity
without their knowledge.

Introduction to Technology 39
• Ransomware is designed to infect a user's system
and encrypt the data. Cybercriminals then
demand a ransom payment from the victim in
exchange for decrypting the system's data.
• Adware is used to track a user’s browser and
download history with the intent to display pop-
up or banner advertisements that lure the user
into making a purchase.
• Keyloggers, also called system monitors, are used
to see nearly everything a user does on their
computer. This includes emails, opened web-
pages, programs and keystrokes.
Introduction to Technology 40
Computer Viruses
and Other Malware

41
Digital Safety and Security

• Green computing involves reducing the electricity


consumed and environmental waste generated when
using a computer
• Strategies include:
– Recycling
– Using energy efficient hardware and energy saving features
– Regulating manufacturing processes
– Extending the life of computers
– Immediately donating or properly disposing of replaced computers

Page IT 25 Introduction to Technology 42


Programs and Apps

• Software, also called a program, tells the


computer what tasks to perform and how to
perform them
System Software
• Operating system
• Utility program

Application Software

Pages IT 25 – IT 26 43
Introduction to Technology
Figure 28
Programs and Apps

• Installing is the process of setting up software to


work with the computer, printer, and other
hardware
• Once installed, you can run an application so that
you can interact with it
• You interact with a program or application
through its user interface

Page IT 27 Introduction to Technology 44


Programs and Apps

• A software developer, sometimes called an


application developer or computer programmer, is
someone who develops programs and apps or writes
the instructions that direct the computer or mobile
device to process data into information

Page IT 28 Introduction to Technology 45


Figure 29
Communications and Networks

• In the course of a day, it is likely you use, or use


information generated by, one or more of these
communications technologies
Chat rooms Email Fax FTP GPS

Instant
Internet Newsgroups RSS Videoconference
messaging

Wireless Wireless
Voice mail VoIP Internet access messaging
points services

Pages IT 28 - IT 29 Introduction to Technology 46


Communications and Networks

• A communications device is hardware capable of


transferring items from computers and devices to
transmission media and vice versa

Page IT 29 Introduction to Technology 47


Figure 30
Communications and Networks

• Examples of wireless communications


technologies include:

Wi-Fi

Bluetooth

Cellular radio
Pages IT 29 – IT 30 Introduction to Technology 48
Communications and Networks

• A network is a collection of computers and


devices connected together via communications
devices and transmission media

Page IT 30 Introduction to Technology 49


Figure 31
Communications and Networks

Home Networks Business Networks


• Connect to the Internet • Facilitate communications
• Share a single high-speed • Share hardware
Internet connection • Share data, information,
• Access photos, music,
and software
videos, and other content
• Share devices
• Play multiplayer games
• Connect game consoles to
the Internet
• Subscribe to and use VoIP

Page IT 31 Introduction to Technology 50


Uses of Technology in Society

Education Government Finance Retail

Entertainment Health Care Travel Science

Publishing Manufacturing

Pages IT 31 – IT 35 Introduction to Technology 51


Technology Users

Home User Small/Home Mobile User


Office User

Power User Enterprise User

Page IT 35 Introduction to Technology 52


Ethics

Ethics, in the classical sense, refers to


the rules and standards governing
the conduct of an individual with
others
Computer Ethics

Thou Shalt Not Use A Computer To Harm Other People.


Thou Shalt Not Interfere With Other People’s Computer Work.
Thou Shalt Not Snoop Around In Other People’s Computer Files.
Thou Shalt Not Use A Computer To Steal.
Thou Shalt Not Use A Computer To Bear False Witness.
Thou Shalt Not Copy Or Use Proprietary Software For Which You have
Not Paid.
Thou Shalt Not Use Other People’s Computer Resources Without
Authorization Or Proper Compensation.
Thou Shalt Not Appropriate Other People’s Intellectual Output.
Thou Shalt Think About The Social Consequences Of The Program You
Are Writing Or The System You Are Designing.
Thou Shalt Always Use A Computer In Ways That ensure Consideration
And Respect For Your Fellow Humans.
Scenarios
• A software company executive is caught embezzling funds

• A friend of yours has a great collection of MP3 music, but some of it


was never officially released by the artist.

• A computer scientist loses his/her job for playing video games


instead of working.

• Your friend enjoys writing software and giving it away to anyone who
wants it

• Many companies join together to form an Internet-filtering program


designed to block out obscene content from the World Wide Web.
Ethics
• Computer ethics is concerned with
standards of conduct as they pertain to
computers.
• Why do we need computer ethics?
• the growth of the WWW has created several novel
legal issues
• the existence of new questions that older laws
cannot answer
• traditional laws are outdated/anachronistic in this
world a more coherent body of law is needed to
govern Internet and computers
Software Ethics and Legal Use

Software ethics is the science of morals in


computer/software usage. It is honourable
to follow and live by software ethics which
are a set of moral rules/principles.
Software Ethics and Legal Use

• Unauthorized, copying of software is illegal and a


violation of software ethics.
• Unauthorized copying of software by individuals
can harm the entire academic community
• Unauthorized copying and use of software,
violating software ethics deprive publishers and
developers of a fair return for their work.
Chapter Summary

Various methods
Basic computer for input, output,
The Internet
concepts memory, and
storage

Digital security Uses of technology


and safety risks applications in
and precautions society

Page IT 36 Introduction to Technology 59


Introduction to Technology
Chapter Complete

You might also like