0% found this document useful (0 votes)
4 views

Lecture 1 – Introduction to computers

The document provides an introduction to computers and their components, including hardware, software, and types of computers. It outlines the uses of computers in various fields such as education, communication, medicine, and e-commerce, while also addressing computer security and the importance of protecting data. Additionally, it discusses the evolution of computer generations and the significance of understanding computer systems for effective utilization in society.

Uploaded by

Samson ADIIBA
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Lecture 1 – Introduction to computers

The document provides an introduction to computers and their components, including hardware, software, and types of computers. It outlines the uses of computers in various fields such as education, communication, medicine, and e-commerce, while also addressing computer security and the importance of protecting data. Additionally, it discusses the evolution of computer generations and the significance of understanding computer systems for effective utilization in society.

Uploaded by

Samson ADIIBA
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

POST GRADUATE DIPLOMA IN EDUCATION

(PGDE)

COMPUTERS AND INTERNET IN EDUCATION

Lecture 1 – Introduction to computers

Emile BANGISHAKA PHD Student


MIS, MCS and BCS CEIT
Objectives
At end of this topic, you should be able to understand:
• The major concepts of the computer system and its parts,
• The use of the computer system,
• Types of computers,
• Programs and their application,
• Health tips, safety and security,
• Computer storage devises,
• Computer viruses,
• Desktop environment, organization files and folders.
1. What is a computer
What is Computer ?
Computer is an electronic device which solves problems after
accepting data (from input) and supplies results (Output) to the user.
• Computer uses many electronic Components which run on DC (Direct Current) such
as Integrated circuits, Capacitors, Transistors, Resistors, Buses, Printed Circuit
boards.
• Computer is Digital, means it process the data, stores the data in the form of binary
digits (0, 1) which are represented in the form of electric voltages 0 for negative
Current and 1 for positive voltages.
Elements of the computer system:
• Hardware
• Software
• User (people)
• Data/information
Input devices

An input device is any hardware


device that sends data to a computer

8/13/2018
Input devices
Output devices
An output device is any peripheral that receives data
from a computer, usually for display, projection, or
physical reproduction.

8/13/2018
Output devices
Central processing unit (CPU):

CPU: Controls the operation of the computer and performs its


data processing functions; often simply referred to as
processor.

8/13/2018
Memory
Computer memory is any physical device capable of storing
information temporarily or permanently.

8/13/2018
Computer Memory

Primary Memory or Secondary Memory or


Main Memory Secondary Storages
 RAM  Hard disk
Question:
 Cache  CD/DVD disk
Why do we need different types of  Floppy disk
memories in our computer?  flash disk
 Tape

When processor wants to perform any job it needs program( system software,
application Software) and Data (files or folders), all of the programs and Data
reside in the permanent secondary storage device (Hard disk) transferring data
between hard disk and processor is logical different because processor bus and
hard disk data transfer rates are quite different.

8/13/2018 11
Bits and Bytes
• 1bit= binary digit

• 8 bits = 1 byte

• 1 kilo Byte (1KB) = 1024 Bytes


1 Mega Byte (1MB) = 1024 Kilo Bytes

• 1 Giga Byte (1GB) = 1024 Mega Bytes

• 1 Terra Byte (1TB) = 1024 Giga Bytes

• 1 Peta Byte (1 PB) = 1024 Terra Byte

• 1 Exa Byte (1 EB) = 1024 Peta Bytes

• 1 Zetta Byte (1 ZB) = 1024 Exa Bytes

• 1 Yotta Byte (1 YB) = 1024 Zetta Bytes


Summary Of Computer Hardware
Input devices Output devices
- Projector
- Keyboard
- Screen
- Mouse
- Speaker
- Microphone - Printer

- RAM
- ROM
- Hard-disk
- Flash disk

8/13/2018 13
Software

System Software Application

OS Utility Translator Library General Special Bespoke


purpose purpose

Interpreter Compiler Assemble

8/13/2018 14
System software Deception
Operating Systems The Operating System is also an interface between the application software and computer.
Without the operating system, the application programs would be unable to communicate
with the computer.

Utility programs Utility software is a type of system software which has a very specific task to perform related
to the working of the computer, for example anti virus software, disk defragment etc.

Library programs Are a compiled collection of subroutines (e.g. libraries make many functions and procedures
available when you write a program). Library programs contain code and data that provide
services to other programs such as interface

Translator 1. Assembler translates assembly language programs into machine code


software (A binary code that a machine can understand).
2. Compiler translates high level language code into object code
(which is the machine language of the target machine).
3. Interpreter analyses and executes a high-level language program a line at a time.

8/13/2018 15
Application Description
software
General purpose General purpose application software is a type of software that can be used for a variety
application software of tasks. It is not limited to one particular function.
Examples: Word processors, Spreadsheet and Presentation software.
Special purpose Special purpose application software is a type of software created to execute one specific
application software task.
Examples are web browsers, calculators, media players, calendar programs etc.
Bespoke application Bespoke application software is tailor made for a specific user and purpose.
software For example a factory may require software to run a robot to make cars, however, it is the
only factory making that car in the world, so the software required would have to be
specially built for the task.
Other examples might include software for the military, software for hospitals and
medical equipment, software being written inside banks , universities and other financial
institutions.

8/13/2018 16
Classification
 Analog Computers
Analog computers are analog devices , they have continuous states rather than discrete
numbered states.
 Digital Computers
 A digital computer uses discrete states, uses Binary only with two discrete states,
such as positive/negative, high/low, on/off, to represent the binary digits “zero”
and “one.”
 The digital computers that are available nowadays, classified by their size and
processing power are:
1. Microcomputers or Personal computer,
2. Minicomputers,
3. Mainframe computers and
4. Supercomputer.
Microcomputers or Personal computer
2. Generation of Computers
Generation of Computers
First Generation Computers
• The first generation of computer was marked by the use of vacuum tubes
for the electronic components and the use of either electrostatic tubes
(i.e. cathode ray tubes) or mercury delay lines for storage.
Second Generation Computers
• The second generation machines were initially marked by either magnetic
drum or magnetic core storage and later by the use of transistor in place of
vacuum tubes.
Third Generation Computers
• The computers of third generation used integrated circuits (IC's) in place of
transistors. A single IC has many transistors, resistors and capacitors along
with the associated circuitry.
Fourth Generation Computers
• The distinguishing marks were the introduction of standard architecture for greater
mobility of systems, the introduction of micro technology and significant software
developments. Micro technology gave rise to the availability of microcomputers, word
processors and intelligent terminals.
Fifth Generation Computers
• The 5th generation, It is based on the technique of Artificial Intelligence (AI).
Computers can understand spoken words and imitate human reasoning. Can respond
to its surroundings using different types of sensors.
3. Use of the computer
system
We can use the computer system in:
• Schools/Institutions,
• hospitals,
• police stations,
• weather stations,
• airports,
• research centers,
• businesses.
• etc.
Group Assignment
Write an essay on how computers and internet in
education can contribute to Rwandan society to drive
the country development through communication,
corporate growth, economic development, financial
transaction and job creation.
Use of Computers in Education
• Computers are used in schools to provide the methods of teaching in
different ways. There are number of methods in which educational
institutions can use computer to educate the students.

For research and Educational uses

 The internet allows access to hundreds of online


research materials
 Computers can be used as a teaching aid.
 Allows colleagues to correspond quickly about
an ongoing research.
 Online classes.
 Doing assignments/course work, etc.
Use of computer in Communication
• computer is necessary in communication, allows people
across the world to communicate easily through e-mails,
chat rooms, sms, Radio broadcasting etc.
Use of computer in Medicine
• The computers are commonly used in some area of medical fields such as
laboratories, researches, scanning, monitoring, pharmacy etc.
Patients Records: Computerized databases are used to
store information about patients, doctors, medicines
and other chemicals and equipment.
Use of computer in Traffic control
• Briefly the computer in traffic control used to reduce the problems, such as
congestion and incident management, signal control optimization and public
transport priority
Use of computer in Airline Systems
• In airline system, computers are used to control passenger
aircrafts and vehicles.
• Computer is embedded in the pilot’s or driver’s controls. It is
linked up among different cities and gives full information about
its flight and seat reservation.
Use of computer in E-Commerce
• E-commerce (electronic commerce) describes the buying, selling, and exchanging of
products, services, and information via computer network. The term e-commerce as
describe. Transactions, conducted between business partners. There are many
application of e-commerce, such as: Mobile banking, Mobile Money, Online shopping,
4. Computer Security

8/13/2018 34
Types of attacks to computer security:
• Physical attacks result in theft, damage, and/or destruction to computer equipment.
• Data attacks result in removal, corruption, denial of access, unauthorized access, or theft of
information.

Potential threats:
• Internal threats from employees who have access may pose a malicious threat or an
accidental threat.
• External threats from those outside of an organization that do not have authorized access.

8/13/2018 35
What is a computer virus?
• A computer virus is software code that is deliberately created by an attacker. Viruses can be
attached to computer code or software and can then infect a computer when the software is
executed on that computer. Viruses may collect sensitive information or may alter or destroy
information.

Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan horses before
they infect a computer. Anti-virus software becomes outdated quickly, however, and we must therefore
apply the most recent updates, patches, and virus definitions as part of a regular maintenance schedule.

8/13/2018 36
Protect a computer
• Repair files, remove virus from computer, put in quarantine virus
• To an infected flash disk scanning it before you use it on the computer
• Protect you computer to unprotect transmission (media, network, Internet,
email, removable media…)
• Protect you computer by using one of protections tools like
 Antivirus
 Anti spyware
 Fire wall
• Using the Concept of encoding password (OS, BIOS)
• Preventive maintenance:
Regular cleaning
Properly shut down the compute
• use of maintenance tools (Scandisk, Defragmentation ,…)
8/13/2018 37
The tasks required to protect physical equipment
There are several methods of physically protecting computer equipment:
• Control access to facilities
• Use cable locks with equipment
• Keep telecommunication rooms locked
• Fit equipment with security screws
• Use security cages around equipment
• Label and install sensors, such as Radio Frequency Identification (RFID) tags, on
equipment

8/13/2018 38
There are several means of protecting access to facilities:

• Card keys are identity cards with a chip that stores user data, including the level of access

• Biometric sensors that identify physical characteristics of the user, such as a fingerprint or retina

• Posted security guard

• Sensors, such as RFID tags, to monitor equipment

8/13/2018 39
Protecting data
 Password protection

 Data encryption

 Data backups

8/13/2018 40
Electrical Protection
 Electrical Voltage Information for Rwanda is 220-240 Volts while in U.S./Canada are 110-120 Volts,
Please don’t change from 220-240 v to 110-120 v here in Rwanda.
5. Desktop environment
Thank You!!!!

You might also like