1
CISM1502 LECTURE
Thomas Burns
Asst. Professor, Business
Information Systems
2
Computer Field and Job Market
Number One top paying 4 yr. degree is Computer
Science and most Engineering degrees. Many
business degrees are not far behind. Social Science
and humanities majors have a rough time of it!!.
The computer field has a surplus of jobs and not
enough people to fill them and it will be even
more so in the future.
You will be working with computers eventually in
every occupation. Pick your niche or occupation
and specialize in computers. Ex. Geographic Info
Systems.
3
Computer Field and Job Market
Programmer
System Analyst
Web Master or Designer
Networking Specialist
Database Specialist
Game Designer
Computer Consultant
Common positions in the field
4
INTRODUCTION
Agrarian Society
Industrial Society
Information Society
5
Computer Issues
Information Privacy (identity theft)
Information Accuracy
Hackers and Crackers
Viruses and Worms, Trojan Horses and logic
time bombs
Software Piracy
Computer security: firewalls and Encryption
6
Authorized employees
59%
Unauthorized employees
24%
Hackers 14%
Competitors 3%
Computer Issues
Who commits Cyber crime?
Protect yourself from problems
involving hackers and viruses
Do not open email attachments unless your
certain that they don’t carry a virus
Always be sure that your operating system
has all the up
-
to
-
date patches
Always use encryption for any sensitive
data such as giving out credit card #s over
Internet
8
What makes computers so
powerful??
Speed of Circuitry
Memory (storage capacity)
9
BINARY STORAGE
8 Bits (electronic impulses) = 1 Byte
1 Byte = 1 character of information
1 Kilobyte = 1,000 bytes
1 Megabyte = 1,000,000 bytes
1 Gigabyte = 1,000,000,000 bytes
10
History of Computers
1
st
Generation
–
(1950s) Vacuum
tubes
2
nd
Generation
–
(1960s) Transistors,
Assembler language
3
rd
Generation
–
(1960s) Silicon
chips and higer level languages
4
th
Generation
–
(1970s)
Microcomputers and VLSI
5
th
Generation
–
(1990s) Networking,
supercomputers
11
A computer is an
electronic device
used to manipulate information
based on a
set of instructions
HARDWARE
SOFTWARE
Central Processing Unit
Input Devices
Output Devices
Secondary Storage
–
Disk, Tape, Optical
Operating Systems
Application Software
Programming languages
SECONDARY STORAGE
MAGNETIC TAPE
DISK DRIVES
OPTICAL STORAGE
13
A computer is an
electronic device
used to manipulate information
based on a
set of instructions
HARDWARE
SOFTWARE
Central Processing Unit
Input Devices
Output Devices
Secondary Storage
14
TYPES OF COMPUTERS
MICRO
-
COMPUTER (P.C.)
–
handheld, laptop (notebook), and desktop
MINI
-
COMPUTER
MAINFRAME COMPUTER
SUPERCOMPUTER
15
Distributed Data Processing
(Networking)
WHAT IS A NETWORK
–
dumb terminal vs. node in a network
WHY IS IT BETTER
–
much less expensive than purchasing a mainframe or
minicomputer.
–
distances are no longer a factor
-
more efficiency
(client/server relation)
–
It matches our interaction more precisely
-
A group of
individuals sharing and collaberating. Not Borgs
The Internet is the largest network in the
world comprised of thousands of
independent networks in academia, military,
government and commercial enterprises
(several hundred thousand networks and
growing). Over 500 million users and
expanding every day by tens of thousands.
Then type in the URL address
(1) (2) (3) (4)
Protocol Host name Path File Name
http:// gc.peachnet.edu /www/tburns/ stu.htm
Otherwise use search engines such as Yahoo,
or even better a meta search engine such as
www.IXQUICK.com
First pick a ISP and a browser such as explorer.
Write HTML
-
Hyper
-
Text Markup
Language
( JAVASCRIPT)
Or use a web developer tools such as
Frontpage or Flash
Submit your page to your ISP. Then submit
it to the major search engines or let the web
-
bots find you.
INTRANET
More and more business networks are going to
Intranets so that they can connect easily with
the Internet and so they can use the same easy
TCP/IP protocol user friendly environment.
Groupware and outside access can be achieved
but firewalls are used for protection of
confidential data.
INTRODUCTION TO
WINDOWS
Everything is stored in files:
–
.com .exe .gif .jpg .wav .doc .mov
Files are stored in Folders on secondary
storage
You can copy and paste, delete, and rename
files and folders
Windows allows multi
-
tasking
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Σχόλια 0
Συνδεθείτε για να κοινοποιήσετε σχόλιο