The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
 Existem 3 ajudas: Ajuda do manual Ajuda de um colega Ajuda do professor  Cada equipa pode utilizar as três ajudas
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
Unit 1: Getting Started. What is a network?? A group of two or more computers that are linked together. Network Interface Card (NIC), basic network software.
Computer Systems.
Security, Privacy, and Ethics Online Computer Crimes.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
CIT The evolution of the computer:  The first known device used to assist with mathematical calculation was the Abacus developed around 3000 BC.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Possible WebQuest type links  
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
1.1 1 Introduction Foundations of Computer Science  Cengage Learning.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Staying Safe Online Keep your Information Secure.
Chapter 8 The Internet: A Resource for All of Us.
Computer Ethics for Computer Users
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics. Ethics are the principles and standards we use to decide how to act.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
 byte  short  int  long  float  double  boolean  char.
Writing an message Finish off your slide on recommendations of how to write an .
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Internet Etiquette or Netiquette
Introduction to Computers
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
People and Computers. People and Computers History of Computers.
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Presentation transcript:

The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.

Hardware Hardware is a general term for the physical artifacts of a technology. The Motherboard is the main component located inside of the computer. It connects all of the different pieces of the computer to one another. The Sound Card lets the computer produce sound in any way needed. It is also located inside of the computer. The Power Supply of a computer is the computers source of power. This piece of hardware converts electricity to low-voltage power for the computer components.

Software Software is the collection of computer programs and related data that provide the instructions telling a computer what to do. Most software has software documentation so that the end user can understand the program, what it does, and how to use it. Software libraries include collections of functions and functionality that may be embedded in other applications. The software's license gives the user the right to use the software in the licensed environment.

Programs A program is a sequence of instructions written to perform a specified task for a computer. Historical computer programs were manually input to the central processor via switches. This is an example of Manual Programming. Some computer programs are embedded into hardware. This is an example of Embedded Programming. Computer programs can be categorized by the programming language paradigm used to produce them. Two of the main paradigms are imperative and declarative.

Computer Safety Tips Website information - Limit the personal and financial data you send to websites. Do not give out information unless you'll get something worthwhile in return. Antivirus Software - Use it! Download and install the updates every week or two. Find some great deals on anti-virus software by shopping the computer department of Free World Mall. Passwords - Use long, random passwords and write them down. Don't store your passwords on your computer, use a notebook or place them in your wallet or file system. - Delete spam without opening or reading it. Some nasty viruses will attack your computer when you simply open a message or attachment. Surfing The Web - Browse the web with cookies disabled. Only allow cookies from web site you will revisit. Consider using a web browser other than Microsoft Internet Explorer. Explorer is a prime target of hackers. Shut Down - Be sure to turn off your computer when you are not using it.

The Ten Commandments for Computer Ethics Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect.

Computer History The first computers were people! The abacus was an early aid for mathematical computations. In 1617, an eccentric Scotsman named John Napier invented logarithms, which are a technology that allows multiplication to be performed via addition. Napier's invention led directly to the slide rule, first built in England in 1632 and still in use in the 1960's by the NASA engineers of the Mercury, Gemini, and Apollo programs which landed men on the moon. Leonardo da Vinci made drawings of gear-driven calculating machines from , but apparently never built any. The first gear-driven calculating machine to actually be built was probably the calculating clock, so named by its inventor, the German professor Wilhelm Schickard in By 1822 the English mathematician Charles Babbage was proposing a steam driven calculating machine the size of a room, which he called the Difference Engine. This machine would be able to compute tables of numbers, such as logarithm tables. Another candidate for granddaddy of the modern computer was Colossus.