250 likes | 400 Vues
This overview explores the transformative impact of computers on society and the evolution of their usage. It delves into various computer categories—from microcomputers to supercomputers—and their essential components, including hardware, software, and memory types. We examine networking concepts, the World Wide Web, and the significance of different programming languages. Additionally, the ethical considerations of data privacy and cyber security challenges, such as hacking and software piracy, are addressed. Gain a deeper understanding of the fundamental aspects of computing in today’s digital landscape.
E N D
Overview of Computers • How have computers changed? • How have the way we use computers changed? • Terms • World wide web • Computer chip • Time sharing
Computer Categories • Microcomputers • Minicomputers • Mainframe computers • Supercomputers
Computer Components • Hardware • Software • Programs
Computer Components • Memory • Main • Secondary • Store-program concept • CPU • Input • Output • Network Connection
Main Memory • Memory cells • Address • Byte • Bit • RAM (volatile) • ROM (boot)
Secondary Memory • Disk drive • Floppy • Hard disk • CD-ROM • USB/Flash Drive • Others?? • Files
CPU • Coordinate functions • Perform math and logic • Fetching instruction
Input/Output • Keyboard/Monitor • Function Keys • Cursor • Mouse • Icon • Printer • Others?
Computer Networks • LAN • Server • Internet • Digital versus Analog • File servers • Client/server • Peer-to-peer
World Wide Web • Links • Web browser • Platform independence!!! • Multimedia • Applets
1.3 Computer Software • Operating System • Booting computer Page 13 • Application Software
Programming Languages • Machine language • Assembly Language • High Level Language
Object Oriented Programming • Object • State • Behavior • Methods • Behavior • Class • Properties/attributes
Processing High-Level Language programs • Source code • Object code • Compiler
Java Is Different • Source code • Byte code • Java Virtual Machine (JVM Interpreter • Applet (where stored??) • Application
Problem solving and classes • Plan First, before typing!!!(also, budget time for the unexpected) • Plan for classes (pg 21) • Problem, Analysis, Design, Implement, Test, Maintain • Plan for reuse • Desk check solution • Document!
Case Study • Problem • Analysis • Design • Implementation • Testing • Maintenance
NameInStars public class NameInStars { private String name; public NameInStars(String nam) { name = nam; } public String surroundNameInStars() { return "*****" + name + "*****\n" + "*****" + name + "*****\n" + "*****" + name + "*****"; } }
ShowNameInStars import javax.swing.*; public class ShowNameInStars { public static void main(String[] args) { // Get the user's name String userName = JOptionPane.showInputDialog("Enter your name"); // Create a NameInStars object that stores the user's name. NameInStars you = new NameInStars(userName); // Display your name in stars three times JOptionPane.showMessageDialog(null, you.surroundNameInStars()); } }
Ethics • Privacy and data misuse • Programmers get access to large amounts of data • Using the data for any purpose than is intended is fraud or theft
Hacking • Entering anyone’s computer without permission is illegal, just as entering a persons home without permission is illegal. • Viruses are an incredible drain on our economy.
Piracy and plagiarism • Having software that you have not properly licensed on your computer is illegal. • In your professional world you must make sure that your organization is 100% legal. • Plagiarism we have discussed
Misuse of resources • Protect your access to the network. • Only use the network for it’s intended purposes. • Mass Emails can be a drain on network resources and offending to other individuals.
Miscellaneous • Computer resources belong to the company. • Company Email can legally be monitored • It can be subpoenaed for court • Don’t say anything in an Email that you would not want to see posted on an internet site.