Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2008 Prentice-Hall, Inc.1 Technology In Action.

Similar presentations


Presentation on theme: "© 2008 Prentice-Hall, Inc.1 Technology In Action."— Presentation transcript:

1 © 2008 Prentice-Hall, Inc.1 Technology In Action

2 © 2008 Prentice-Hall, Inc.2 Technology In Action Chapter 1 Why Computers Matter to You: Becoming Computer Fluent

3 © 2008 Prentice-Hall, Inc.3 Chapter Topics Computer fluencyComputer fluency Computers and careersComputers and careers Computer functionsComputer functions Data vs. informationData vs. information Computer hardware and softwareComputer hardware and software Societal challenges and computersSocietal challenges and computers Future technologiesFuture technologies

4 © 2008 Prentice-Hall, Inc.4 What is Computer Fluency? Computers are everywhere in our society.Computers are everywhere in our society. You find them inYou find them in –Schools –Cars –Airports –Shopping Centers –Toys –Medical Devices –Homes –Peoples’ pockets

5 © 2008 Prentice-Hall, Inc.5 What is Computer Fluency? Americans interact with computers almost every day, sometimes, without even knowing it.Americans interact with computers almost every day, sometimes, without even knowing it. –Credit cards –E-mail –Cell phones –Digital cameras –Web sites

6 © 2008 Prentice-Hall, Inc.6 What is Computer Fluency? To be computer fluent you must:To be computer fluent you must: –Understand a computer’s capabilities and limitations –Know how to use a computer

7 © 2008 Prentice-Hall, Inc.7 What is Computer Fluency? You can use your computer more wisely and be a more knowledgeable consumer.You can use your computer more wisely and be a more knowledgeable consumer. Computer-fluent employees are sought after in most every vocation.Computer-fluent employees are sought after in most every vocation. Becoming computer fluent will help you better understand and take advantage of future technologies.Becoming computer fluent will help you better understand and take advantage of future technologies.

8 © 2008 Prentice-Hall, Inc.8 Make good purchase decisionsMake good purchase decisions –Understanding the computer buzz-words Maintain your computerMaintain your computer Keep abreast of changes in technologyKeep abreast of changes in technology Understand the real risksUnderstand the real risks –Be able to identify the real privacy and security risks Use the Internet wiselyUse the Internet wisely –Finding information and finding good information are two different things Avoid online annoyancesAvoid online annoyances –Spam - adware Avoid hackers and virusesAvoid hackers and viruses –What are they and how can you avoid them Protect your privacyProtect your privacy –Identity theft Being a Savvy Computer User and Consumer

9 © 2008 Prentice-Hall, Inc.9 Computers in your Career? Regardless of your profession, if computers are not already in use, they most likely will be soon.Regardless of your profession, if computers are not already in use, they most likely will be soon. The U.S. Department of Labor predicts that by 2010, 70% of the U.S. work force will be using computers at work.The U.S. Department of Labor predicts that by 2010, 70% of the U.S. work force will be using computers at work. The Department of Agriculture has found that employees who use a computer on the job earn 10% more than those who don’t.The Department of Agriculture has found that employees who use a computer on the job earn 10% more than those who don’t.

10 © 2008 Prentice-Hall, Inc.10 Computers in your Career? Becoming truly computer fluent – understanding the capabilities and limitations of computers and what you can do with them – will undoubtedly help youBecoming truly computer fluent – understanding the capabilities and limitations of computers and what you can do with them – will undoubtedly help you –Perform your job more effectively –Become a more desirable employee –Earn more and grow your career

11 © 2008 Prentice-Hall, Inc.11 Computers in your Career? Computer careers in:Computer careers in: –Business –The Arts –The Medical Field –Law Enforcement –Legal Fields –Education –The Sciences –Gaming –Homes

12 © 2008 Prentice-Hall, Inc.12 Computers in Business Point of Sale TerminalsPoint of Sale Terminals Tracking merchandiseTracking merchandise Data miningData mining

13 © 2008 Prentice-Hall, Inc.13 Computers in Business Businesses accumulate a lot of dataBusinesses accumulate a lot of data How do they separate the anomalies from the trends? They use a process called -How do they separate the anomalies from the trends? They use a process called - Data MiningData Mining –The process of searching huge amounts of data with the hope of finding a pattern. –Allows retailers to respond to consumer buying patterns.

14 © 2008 Prentice-Hall, Inc.14 Computers in Business Data MiningData Mining –Large retailers often study the data gathered from register terminals to determine which products are selling on a given day and in a specific location This helps managers figure out how much merchandise they need in order to replace stock that is sold.This helps managers figure out how much merchandise they need in order to replace stock that is sold.

15 © 2008 Prentice-Hall, Inc.15 Computers in Business Data MiningData Mining –Managers determine that for a certain product to sell well, they must lower its price – especially if they cut the price at one store and see sales increase.

16 © 2008 Prentice-Hall, Inc.16 Computers in Business Personal Shopper Systems (PSS)Personal Shopper Systems (PSS) –A small handheld computer that you can pick up when you enter the store –As you move about the store, scanning the item’s tag or a label near the item pulls up the current price and any specials the store is offering

17 © 2008 Prentice-Hall, Inc.17 Computers in Business Personal Shopper Systems (PSS)Personal Shopper Systems (PSS) –If you decide to buy, pull the trigger and place the item in your basket, bagging the items as you move along. –If you’d rather think about it a bit more, the system can e-mail information about the product to you. –At any time prior to leaving the store, you can check the total amount of your purchases.

18 © 2008 Prentice-Hall, Inc.18 Computers in Business Personal Shopper Systems (PSS)Personal Shopper Systems (PSS) –When you have completed shopping, simply get into a self-checkout lane. –The information collected in the PSS will be integrated with the POS terminal in the self- checkout lane –Press the “end of trip” button and pay the total. –There’s no need to unload and individually scan the items in your shopping cart.

19 © 2008 Prentice-Hall, Inc.19 Computers in Business Point of Sale Terminal (POS Terminal)Point of Sale Terminal (POS Terminal) –Records purchases, processes debit or credit cards, and updates inventory.

20 © 2008 Prentice-Hall, Inc.20 Computers in Business United Parcel Service (UPS) handles more than 14 million packages per day.United Parcel Service (UPS) handles more than 14 million packages per day. UPS uses a sophisticated database and a very efficient package-tracking tracking system that follows the packages as they move around the worldUPS uses a sophisticated database and a very efficient package-tracking tracking system that follows the packages as they move around the world

21 © 2008 Prentice-Hall, Inc.21 Computers in Business When the sender drops off a package, UPS creates a “smart label” for the package.When the sender drops off a package, UPS creates a “smart label” for the package. In addition to the standard postal bar code and a bar code showing UPS customer numbers, the smart label contains a MaxiCode.In addition to the standard postal bar code and a bar code showing UPS customer numbers, the smart label contains a MaxiCode. –Contains information about the package Class of service, destination, etc.Class of service, destination, etc.

22 © 2008 Prentice-Hall, Inc.22 Computers in Business When the package is handled in processing centers, UPS workers scan the MaxiCode.When the package is handled in processing centers, UPS workers scan the MaxiCode. The information is transmitted to terminals the workers wear.The information is transmitted to terminals the workers wear. The terminals then sends the data across wireless networks to the UPS database.The terminals then sends the data across wireless networks to the UPS database.

23 © 2008 Prentice-Hall, Inc.23 Computers in Business To track package delivery, UPS carriers use delivery acquisition devices that feature wireless networking capabilities, infrared scanners to scan the smart labels and transmit the information back to the UPS database, and an electronic pad to capture customer signatures.To track package delivery, UPS carriers use delivery acquisition devices that feature wireless networking capabilities, infrared scanners to scan the smart labels and transmit the information back to the UPS database, and an electronic pad to capture customer signatures.

24 © 2008 Prentice-Hall, Inc.24 Computers in Business By capturing this data and making it available on its Internet database, UPS enables its customers to track their packages through the delivery process.By capturing this data and making it available on its Internet database, UPS enables its customers to track their packages through the delivery process.

25 © 2008 Prentice-Hall, Inc.25 Computers in Business UPS is also able to make informed decisions about staffing and deploying equipment (trucks, airplanes, etc.) based on the volume and type of packages in the system at any given time.UPS is also able to make informed decisions about staffing and deploying equipment (trucks, airplanes, etc.) based on the volume and type of packages in the system at any given time.

26 © 2008 Prentice-Hall, Inc.26 Computers in Farming and Ranching Assist in managing complex farming business and information systemsAssist in managing complex farming business and information systems RFID tags track and record animals in case of diseasesRFID tags track and record animals in case of diseases Computerized sensors and equipment activation protect cropsComputerized sensors and equipment activation protect crops

27 © 2008 Prentice-Hall, Inc.27 Computers in Farming and Ranching Ranchers must watch out for and prevent diseases like hoof and mouth, mad cow, and even E.coli outbreak.Ranchers must watch out for and prevent diseases like hoof and mouth, mad cow, and even E.coli outbreak. Outbreaks can be managed and minimized with the use of radio frequency identification tags (RFID tags).Outbreaks can be managed and minimized with the use of radio frequency identification tags (RFID tags). The RFID tag placed on each cow’s ear is a very small button.The RFID tag placed on each cow’s ear is a very small button.

28 © 2008 Prentice-Hall, Inc.28 Computers in Farming and Ranching When the cow walks past a panel reader, its location is automatically recorded and tracked in a database.When the cow walks past a panel reader, its location is automatically recorded and tracked in a database. If a cow is identified as having disease, all of its movements have been recorded.If a cow is identified as having disease, all of its movements have been recorded. By using the database that stores the RFID information, it is simple to identify exactly which food lots it ate from and which other animals from that same food.By using the database that stores the RFID information, it is simple to identify exactly which food lots it ate from and which other animals from that same food.

29 © 2008 Prentice-Hall, Inc.29 Computers in Farming and Ranching Cranberry crops easily can be destroyed by frost.Cranberry crops easily can be destroyed by frost. Growers had to race to protect the bogs of berries on cold nights by turning on pumps to force out water to surround the berries and keep them from freezing.Growers had to race to protect the bogs of berries on cold nights by turning on pumps to force out water to surround the berries and keep them from freezing.

30 © 2008 Prentice-Hall, Inc.30 Computers in Farming and Ranching Today, growers use a web-based system that can automatically control the pumps.Today, growers use a web-based system that can automatically control the pumps. It analyzes information about the current time, the temperature measured near the berries, watering schedules, rainfall, and wind conditionsIt analyzes information about the current time, the temperature measured near the berries, watering schedules, rainfall, and wind conditions Automatically turn on and off the pumps around the bog fields as needed.Automatically turn on and off the pumps around the bog fields as needed.

31 © 2008 Prentice-Hall, Inc.31 Computers in the Arts Virtual artVirtual art Virtual dance

32 © 2008 Prentice-Hall, Inc.32 Computers in the Arts Virtual ArtVirtual Art –Many artists today work exclusively with computers to create digital art. –Camille Utterback used a computer and video clips of pedestrians in Tokyo to create a visual art piece entitled Liquid Time. –When no one is near the visual art piece, the screen displays a static image.

33 © 2008 Prentice-Hall, Inc.33 Computers in the Arts Virtual ArtVirtual Art –As onlookers in the gallery move closer to the work, a camera mounted on the ceiling of the art gallery captures the movements and dimensions of the onlookers in the gallery. –A computer with specialized software then uses this captured data and causes the video playing in the Liquid Time piece to ripple.

34 © 2008 Prentice-Hall, Inc.34 Computers in the Arts Virtual ArtVirtual Art –Because the rippling effect is based on the movement and size of the gallery patrons, the work looks different to each person looking at it. –As viewers move away from the work, the video returns to a static display.

35 © 2008 Prentice-Hall, Inc.35 Computers in the Arts Virtual DanceVirtual Dance –Georgia Institute of Technology is using computers to create virtual dancers and new performances for audiences. –Live dancers are wired with sensors that are connected to a computer that captures the dancers’ movements. –Based on the data it collects, the computer generates a virtual dancer on the screen.

36 © 2008 Prentice-Hall, Inc.36 Computers in the Arts Virtual DanceVirtual Dance –The computer operator can easily manipulate this virtual dancer as well as change the dancer’s costume with the click of a mouse. –This allows the ballet company to create new experiences for the audience by pairing virtual dancers with live dancers.

37 © 2008 Prentice-Hall, Inc.37 Computers in the Medical Field Virtual reality in medical applicationsVirtual reality in medical applications Patient simulatorPatient simulatorDa Vinci Surgical System

38 © 2008 Prentice-Hall, Inc.38 Computers in the Medical Field Virtual Reality in Medical ApplicationsVirtual Reality in Medical Applications –Wired magazine recently reported that a company called Cyberkinetics has designed a human neural interface system, known as BrainGate, capable of translating a person’s thoughts into cursor movements.

39 © 2008 Prentice-Hall, Inc.39 Computers in the Medical Field Patient SimulatorPatient Simulator –Medical students are getting access o better training opportunities thanks to a computer technology called a Patient Simulator Life-sized mannequins that can speak, breathe, and blink.Life-sized mannequins that can speak, breathe, and blink. They have a pulse and a heartbeat, and they respond just like humans to procedures such as the administration of intravenous drugs.They have a pulse and a heartbeat, and they respond just like humans to procedures such as the administration of intravenous drugs.

40 © 2008 Prentice-Hall, Inc.40 Computers in the Medical Field Patient SimulatorPatient Simulator –Medical students can train on patient simulators and experience firsthand how a human would react to their treatments without any risk to a live patient. Physiome ProjectPhysiome Project –Bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. –They have recently completed a digital recreation of the human heart and lungs.

41 © 2008 Prentice-Hall, Inc.41 Computers in the Medical Field Da Vinci Surgical SystemDa Vinci Surgical System –Surgeons are often limited by their manual dexterity and can have trouble making small, precise incisions. –Robotic surgery devices can exercise much finer control when making delicate incisions than can a human guiding a scalpel.

42 © 2008 Prentice-Hall, Inc.42 Computers in Law Enforcement Computer forensicsComputer forensics

43 © 2008 Prentice-Hall, Inc.43 Computers in Law Enforcement Computer forensicsComputer forensics –The application of computer systems and techniques to gather potential legal evidence. –Facial reconstruction systems can turn a skull into a finished digital image of a face, allowing investigators to proceed with identification. –Computers can search the vast number of databases on the Internet

44 © 2008 Prentice-Hall, Inc.44 Computers in Law Enforcement Computer forensicsComputer forensics –Proprietary law enforcement databases such as the National Center for the Analysis of Violent Crime (NCAVC) database enable detectives to track a wealth of information about similarities between crimes, trying to detect patterns that may reveal serial crimes.

45 © 2008 Prentice-Hall, Inc.45 Computers in the Legal Fields Surveillance camerasSurveillance cameras Forensic animationForensic animation

46 © 2008 Prentice-Hall, Inc.46 Computers in the Legal Fields Surveillance camerasSurveillance cameras –Video of crimes in progress are sometimes displayed to the jury to help them understand how a crime unfolded.

47 © 2008 Prentice-Hall, Inc.47 Computers in the Legal Fields Forensic AnimationForensic Animation –Extremely detailed (and often lifelike) re- creations that have been generated with computers based on forensic evidence, disposition of witnesses, and the opinions of experts.

48 © 2008 Prentice-Hall, Inc.48 Computers in Education Computers in the classroomComputers in the classroom Distance educationDistance education Computerized researchComputerized research The InternetThe Internet

49 © 2008 Prentice-Hall, Inc.49 Computers in Education Computers are part of most schools, even preschoolsComputers are part of most schools, even preschools The Internet has obvious advantages in the classroom as a research tool for students.The Internet has obvious advantages in the classroom as a research tool for students. Many museums have virtual tours on their Web sites that allow students to examine objects in the museum collectionsMany museums have virtual tours on their Web sites that allow students to examine objects in the museum collections

50 © 2008 Prentice-Hall, Inc.50 Computers and the Sciences SupercomputersSupercomputers ArcheologyArcheology MeteorologyMeteorology

51 © 2008 Prentice-Hall, Inc.51 Computers and the Sciences SupercomputersSupercomputers –Using data collected during a tornado in South Dakota, scientists have been able to create the most advanced color-coded digital storm model known to date. –The model is so detailed it takes nine days for a supercomputer to generate the simulation, even though the computer is executing four billion operations a second.

52 © 2008 Prentice-Hall, Inc.52 Computers and the Sciences SupercomputersSupercomputers –By studying the data produced by this simulation, forecasters hope to improve their predictions about where tornadoes will form and touch down.

53 © 2008 Prentice-Hall, Inc.53 Computers and the Sciences ArcheologyArcheology –The ancient site of Pompeii has been under the intense scrutiny of tourists and archeologists for decades. –All the foot traffic and exposure to the elements is eroding portions of the ruins. –Today, scientists are using three-dimensional scanners and imaging software to capture a detailed record of the current condition of the ruins.

54 © 2008 Prentice-Hall, Inc.54 Computers and the Sciences ArcheologyArcheology –The virtual re-creation of the ruins is so lifelike that archeologists can study the ruins on screen instead of at the actual site.

55 © 2008 Prentice-Hall, Inc.55 Computers in Sports TrainingTraining Timing and scorekeepingTiming and scorekeeping Data storage and statisticsData storage and statistics “Smartballs” sense when soccer goals are scored“Smartballs” sense when soccer goals are scored

56 © 2008 Prentice-Hall, Inc.56 Computers in Sports Computers are now being used to help athletes analyze their performance and improve their game.Computers are now being used to help athletes analyze their performance and improve their game. Employees in golf shops are now using sophisticated motion capture equipment to improve golfers’; swings.Employees in golf shops are now using sophisticated motion capture equipment to improve golfers’; swings. Adidas is developing a new soccer ball that contains an integrated circuit chip.Adidas is developing a new soccer ball that contains an integrated circuit chip. When the “Smartball” crosses a goal line, it sends a radio signal to the referee’s watch.When the “Smartball” crosses a goal line, it sends a radio signal to the referee’s watch.

57 © 2008 Prentice-Hall, Inc.57 Computer Gaming Careers ProgrammingProgramming 3D animation3D animation

58 © 2008 Prentice-Hall, Inc.58 Computer Gaming Careers Revenues from computer gaming in the United States have surpassed revenues from the Hollywood film industry.Revenues from computer gaming in the United States have surpassed revenues from the Hollywood film industry. Computer gaming is now a $10 billion industry in the United States.Computer gaming is now a $10 billion industry in the United States.

59 © 2008 Prentice-Hall, Inc.59 Computers at Home RoboticsRobotics Smart appliancesSmart appliances Robomower Internet- connected refrigerator

60 © 2008 Prentice-Hall, Inc.60 Computers at Home Robotic “maintenance workers” are now emerging for the home market.Robotic “maintenance workers” are now emerging for the home market. Smart Devices – devices such as temperature controls, lights, and security devices that contain computer chips and can control functions in the home without human intervention – are becoming widely available for the home.Smart Devices – devices such as temperature controls, lights, and security devices that contain computer chips and can control functions in the home without human intervention – are becoming widely available for the home.

61 © 2008 Prentice-Hall, Inc.61 Technology of Tomorrow NanoscienceNanoscience Biomedical chip implantsBiomedical chip implants Artificial IntelligenceArtificial Intelligence

62 © 2008 Prentice-Hall, Inc.62 Nanoscience Molecules and nanostructuresMolecules and nanostructures NanomachinesNanomachines Four-α-helix protein scaffold 5.4n m Fluid flow inside Nanomachines

63 © 2008 Prentice-Hall, Inc.63 Nanoscience Involves the study of molecules and structures (nanostructures)Involves the study of molecules and structures (nanostructures) NanotechnologyNanotechnology –the science revolving around the use of nanostructures to build devices on an extremely small scale. –Nanoscience is currently limited to improving existing products such as enhancing fibers used in clothing with coatings so that they repel stains or don’t wrinkle.

64 © 2008 Prentice-Hall, Inc.64 Nanoscience Scientists hope to use nanostructures to build computing devices too small to be seen by the naked eye.Scientists hope to use nanostructures to build computing devices too small to be seen by the naked eye. Developments such as this could lead to computers the size of a pencil eraser that are far more powerful than today’s desktop computer.Developments such as this could lead to computers the size of a pencil eraser that are far more powerful than today’s desktop computer.

65 © 2008 Prentice-Hall, Inc.65 Biomedical Chip Implants Technological solutions to physical problemsTechnological solutions to physical problems Identity chipsIdentity chips Retinal Implants VeriChip

66 © 2008 Prentice-Hall, Inc.66 Biomedical Chip Implants To provide technological solutions to physical problems and to provide a means for positively identifying individuals.To provide technological solutions to physical problems and to provide a means for positively identifying individuals. Providing sight to the blindProviding sight to the blind –Macular degeneration and retinitis pigmentosa are two diseases that account for the majority of blindness in developing nations. –Both diseases result in damage to the photoreceptors contained in the retina of the eye.

67 © 2008 Prentice-Hall, Inc.67 Biomedical Chip Implants Providing sight to the blindProviding sight to the blind –Researchers are experimenting with chips that contain microscopic solar cells and are implanted in the damaged retina of patients. –The idea is to have the chip take over for the damaged photoreceptors and transmit electrical images to the brain.

68 © 2008 Prentice-Hall, Inc.68 Biomedical Chip Implants Identity ChipsIdentity Chips –The VeriChip is already being implanted in humans as a means of verifying a person’s identity. –This “personal ID chip” is about the size of a grain of rice and is implanted underneath the skin. –When exposed to radio waves from a scanning device, the chip emits a signal that transmits its unique serial number to the scanner. –The scanner connects to a database that contains the name, address, and medical conditions of the person in whom the chip has been implanted.

69 © 2008 Prentice-Hall, Inc.69 Artificial Intelligence RobotsRobots Neurons vs. MicrochipsNeurons vs. Microchips

70 © 2008 Prentice-Hall, Inc.70 Artificial Intelligence Artificial IntelligenceArtificial Intelligence –The science that attempts to produce machines that display the same type of intelligence that humans do. –The performance of tasks by current robots is based on preprogrammed algorithms –Currently, no computer can emulate the human thought process completely.

71 © 2008 Prentice-Hall, Inc.71 Artificial Intelligence Artificial IntelligenceArtificial Intelligence –The human brain is capable of processing almost a limitless number of tasks at the same time. Just to write an e-mail on your computer, your brain coordinates thousands of nerve impulses that control your hands, eyes, and thought processes.Just to write an e-mail on your computer, your brain coordinates thousands of nerve impulses that control your hands, eyes, and thought processes. –Until the human brain is fully understood, progress in the area of artificial intelligence is likely to proceed slowly.

72 © 2008 Prentice-Hall, Inc.72 Challenges Facing a Digital Society Computer use ethicsComputer use ethics Privacy risksPrivacy risks Personal data collectionPersonal data collection Monitoring e-mailMonitoring e-mail Copyright infringementCopyright infringement Software piracySoftware piracy

73 © 2008 Prentice-Hall, Inc.73 Becoming Computer Fluent Data processingData processing Bits and bytesBits and bytes Computer hardwareComputer hardware Computer softwareComputer software Computer platformsComputer platforms Specialty computersSpecialty computers

74 © 2008 Prentice-Hall, Inc.74 Computers are Data Processing Devices Four major functions:Four major functions: –Input data –Process data –Output information –Store data and information DATA IN INFORMATION OUT

75 © 2008 Prentice-Hall, Inc.75 Bits and Bytes: The Language of Computers BitBit –Binary digit –0 or 1 ByteByte –Eight bits ASCIIASCII –Each byte represents a letter, number or special character OFF 0 ON 1 Microchip Switch 1000011 = 4 00000011 = A 0

76 © 2008 Prentice-Hall, Inc.76 How Much is a Byte? NAMEABBREVIATIONNUMBER OF BYTES RELATIVE SIZE ByteB 1 byteCan hold one character of data. KilobyteKB 1,024 bytesCan hold 1,024 characters or about half of a typewritten page double-spaced. MegabyteMB 1,048,576 bytesA floppy disk holds approximately 1.4 MB of data, or approximately 768 pages of typed text. GigabyteGB 1,073,741,824 bytesApproximately 786,432 pages of text. Since 500 sheets of paper is approximately 2 inches, this represents a stack of paper 262 feet high. TerabyteTB 1,099,511,627,776 bytesThis represents a stack of typewritten pages almost 51 miles high. PetabytePB 1,125,899,906,842,624 bytes The stack of pages is now 52,000 miles high, or about one-fourth the distance from the Earth to the moon.

77 © 2008 Prentice-Hall, Inc.77 Computer Hardware Input devicesInput devices System unitSystem unit Output devicesOutput devices Storage devicesStorage devices

78 © 2008 Prentice-Hall, Inc.78 The rain in Spain Input Devices Enter data to be processedEnter data to be processed –Keyboard –Scanners –Mouse –Trackball –Touch screen –Microphone –Game controller –Digital camera ABCD

79 © 2008 Prentice-Hall, Inc.79 System Unit Cabinet that houses all componentsCabinet that houses all components MotherboardMotherboard CPUCPU Memory modulesMemory modules System Unit CPU Motherboard Memory Module

80 © 2008 Prentice-Hall, Inc.80 Output Devices Enable us to see or hear the processed informationEnable us to see or hear the processed information –Monitor –Speakers –Printers

81 © 2008 Prentice-Hall, Inc.81 Storage Devices Enable us to store data or information to be accessed againEnable us to store data or information to be accessed again Hard Disk DriveCD / DVD DriveFloppy Disk Flash Drive

82 © 2008 Prentice-Hall, Inc.82 Computer Software Software - programs that enable the hardware to perform different tasksSoftware - programs that enable the hardware to perform different tasks Application softwareApplication software –Tools for getting things done

83 © 2008 Prentice-Hall, Inc.83 Computer Software System softwareSystem software –Essential for platform operation and support

84 © 2008 Prentice-Hall, Inc.84 Computer Platforms: PCs and Macs PC CPU – Intel, AMDCPU – Intel, AMD Operating system – Microsoft WindowsOperating system – Microsoft Windows Mac CPU – Motorola Operating system – Apple Mac OS

85 © 2008 Prentice-Hall, Inc.85 Specialty Computers PDAPDA ServerServer MainframeMainframe SupercomputerSupercomputer MicrocontrollersMicrocontrollers Server Mainframe Supercomputer PDA

86 © 2008 Prentice-Hall, Inc.86 Chapter 1 Summary Questions What does it mean to be “computer fluent”?What does it mean to be “computer fluent”?

87 © 2008 Prentice-Hall, Inc.87 Chapter 1 Summary Questions What is a savvy computer user and consumer?What is a savvy computer user and consumer?

88 © 2008 Prentice-Hall, Inc.88 Chapter 1 Summary Questions How can becoming computer fluent help you in a career?How can becoming computer fluent help you in a career?

89 © 2008 Prentice-Hall, Inc.89 Chapter 1 Summary Questions What are some future technologies?What are some future technologies?

90 © 2008 Prentice-Hall, Inc.90 Chapter 1 Summary Questions What kinds of challenges do computers bring to society?What kinds of challenges do computers bring to society?

91 © 2008 Prentice-Hall, Inc.91 Chapter 1 Summary Questions What are a computer’s four main functions?What are a computer’s four main functions?

92 © 2008 Prentice-Hall, Inc.92 What is the difference between data and information?What is the difference between data and information? Chapter 1 Summary Questions

93 © 2008 Prentice-Hall, Inc.93 Chapter 1 Summary Questions What are a bit and a byte?What are a bit and a byte?

94 © 2008 Prentice-Hall, Inc.94 Chapter 1 Summary Questions What hardware does a computer use to perform its functions?What hardware does a computer use to perform its functions?

95 © 2008 Prentice-Hall, Inc.95 Chapter 1 Summary Questions What are the two main types of software?What are the two main types of software?

96 © 2008 Prentice-Hall, Inc.96 Chapter 1 Summary Questions What different kinds of computers are there?What different kinds of computers are there?


Download ppt "© 2008 Prentice-Hall, Inc.1 Technology In Action."

Similar presentations


Ads by Google