Sunday, November 27, 2011

CHAPTER 1

| Computers and their applications are involved in all aspects of our daily life. Its a versatile tools, compute your taxes & deploy a missile. Now, computer very important for everything in the world because all people use that computers. 
| Circumstances and ideas that led development of modern computer because people needs grew more and more various, based on what they want and what they need. Every computer in use today follows the basic plan laid out by Charles Babbage and Lady Lovelace.
| Trends in evolution of modern computers began with discovered first microprocessor by Intel engineers & PC revolutions.
| Relationship between hardware and software are computer’s versatility divide into 2 parts, hardware (physical part) & software (The instructions that tells hardware how to transform the input data (information in a form it can read) into the necessary output)
| Five major types of computers today and their principal uses 
           -PC’s (word processor, accounting, gaming, digital music & videos)
            -Workstations (massive computing power used for high-end interactive applications)
-Portable Computers (no need desktop, easy handle & bring anywhere)
-Servers (provide software & other resources to other computers over network)
            -Mainframes (big computing jobs, multiple communications at one time through     process of time sharing)
-Supercomputers (fastest access, most powerful computers made)

| Explosive growth of internet changing way people use computers and IT because with internet, many people buy & use computers each day to access internet network.
      | Today’s information age differs from other times in history and prehistory because back then in history of society we have had agricultural & industrial age. Now, peoples earn livings working with words, numbers & ideas.
      | Social and ethical impact of IT on societythreat to personal privacy, hazard of high-tech crime, abuse informationemergence of bio-digital technology, dangers dependence on complex technology


CHAPTER 2
| Computers manipulate information by :
a.    Receive input: Accept information from the outside world
b.    Process information: Perform arithmetic or logical (decisionmaking)
operations on information
c.    Produce output: Communicate information to the outside world
d.    Store information: Move and store information in memory                 
| Basic structure and organization of computer are computers has four main components
      -INPUT DEVICE = (keyboard, pointing devices)
      -PROCESSOR = (CPU)   
      -OUTPUT DEVICES = (display/video monitor,printer,speakers)
-for memory and storage devices, each component attach on processor.
      | Computer system’s principal internal components is Central Processor Unit (CPU), it functions are: interprets & executes instructions in each program, supervise arithmetic &logical data manipulations, communicates with other parts of computer system indirectly, extraordinarily complex collection of electronic circuits and housed along with other chips & electronic components
      | Computer typically has different types of memory and storage devices it happened because people’s need of it is full of variation


CHAPTER 3
     | Input devices & how they make computer useful  à
–    Keyboard;
{Ergonomic keyboards
To address possible medical
problems
{Wireless keyboard                                               
{Folding keyboards
Used with palm-sized computers
{One-handed keyboards
{Keyboards printed on membranes
J purpose = Used to enter letters, numbers
and special characters
   -    Pointing devices;
{ Mouse
{Touchpad
{Pointing stick
{Trackball
{Joystick
{Graphics tablet
{Touch screen
   {Stylus         
   J Pointing device , To direct cursor
   -    Reading Tools;
JRead marks representing codes specifically designed for computer input
   {Optical mark
   { magnetic-ink character
   {bar code
   {pen scanner
   {tablet PC
   {smart whiteboard
   {RFID
   -    Digitizer;
Scanners capture and digitize printed images (Flatbed, Slide, Drum, Sheet-fed),
Digital camera (Snapshots captured as digital images & Digital images stored as bit patterns on disks or other digital storage media,
Video digitizer (Capture input from a : Video camera, Video cassette recorder or television ; Convert it to a digital signal (Stored in memory and displayed on computer screens) , videoconference (People in diverse locations can see and hear each other : Used to conduct long-distance meetings , Video images transmitted through networks),  audio digitizer(Digitize sounds from=Microphones,Other input devices; Digital signals can be=Stored, Further processed with specialized Software ;A digital signal processing chip compresses the stream of bits before it is transmitted to the CPU), speech recognition software  (Converts voice data into words that can be edited and printed), sensors (Designed to monitor physical conditions = Temperature, humidity, pressure ; Provide data used in: Robotics, Environmental climate control, Weather forecasting, Medical monitoring, Biofeedback, Scientific research).
      | Output Device & how they make computer useful  à
       -    Screen Output (monitor) A monitor or video display terminal (VDT) displays characters, graphics, photographic images, animation and video.
-    Paper Output , Printers produce paper output or hard copy ( impact and non-impact printer, multifunction printer, plotter)
      -    Fax Machines and Fax Modems
      -    Audio Output; sound card, synthesizers
   -    Other Control Machines; robot arms, telephone switchboards, transportation devices, automated factory equipment, spacecraft, force feedback joystick
| Computers begin more useful because it’s not just receives, stores & manipulates information but also provides & gives something that we need.


CHAPTER 4
| Fundamental categories of software are compiler/translator, software application software system.
            The three major categories of software:
Compilers and other translator programs: enable programmers to create other software
Software applications: serve as productivity tools to help computer users solve problems
System software: coordinates hardware operations and does behind-the-scenes work the computer user seldom sees

| Computer system’s hardware equipped to produce whatever output a user requests.
| Factors make computer application a useful tool
–    Replacing printed documentation with other forms
   -    Upgrade to adjust with new circumstances & software conditions
   -    Compatibility
   -    Disclaimers, software manufacturers not responsible with the software deformity      after being installed & used
   -    Licenses, software can’t legally duplicated
   -    Distributed via direct sale, retail, mail order, website, website & copyrighted
| Role of the operating system in modern computer system it is hardware-software connection. Envisioned to handle complex input our output operations by communicate with a variety of disk drive.
| With logically by system folders.
| Evolution of user interfaces from early machine-language programming to futuristic virtual-reality interfaces starts with Desktop Operating System  Graphical User Interface Multiple User Operating Systems  Finally for the future there will be interfaces around emerging development technologies
      | Unauthorized copying software against the law cause a loose of billion dollars each year in business sector.


CHAPTER 5
| Word processors  revolutionized with processing handwritten words. Otherwise, desktop publishing revolutionized with saves money & time efficiently.
| Basic functions and applications of spreadsheets and other types of statistical & simulation programs is for money managers, automatic mathematics, statistics and data analysis, scientific visualization, computer modeling & simulations.
| Computers can be used to answer “What If?” questions, because with spreadsheets they can allow you to change numbers & instantly see the effect of those changer also equation solvers.
| Computers are used as tools for simulating mechanical, biological and social systems because it can create abstract models of objects, organisms, organizations & processes.





CHAPTER 6
| Contrast types of computer graphics programs
-Painting: paints pixel on the screen with pointing device moves translated into lines and patterns on the screen
-Image Processing: manipulate photographs/other high resolution images
-Drawing: stores a picture as a collection of lines and shape
-3D Modeling Software: create 3D objects with similar tools in drawing software
-CAD: create design on screen for products ranging from computer chips to public buildings
-CAM: the process data related to product design are fed into a program
-Presentation Graphics: create visual aids for presentation, slide show directly.
| Computers changing way professionals and amateurs works with video, animation, audio and music because these programs makes people work in simply way.
      | Relationship between hypermedia and multimedia is hypermedia refers to information linked in non-sequential ways not only combines text & numbers, but also all kinds of multimedia, like graphics, video, animation, etc.
      | Present applications for multimedia technology is just like all the programs above. Otherwise for the future, there are Virtual Reality, Tele-immersion & Augmented Reality



CHAPTER 7
| Database is a collection of information stored in an organized form in a computer, consists of database program. Database program: a software tool for organizing the
storage and retrieval of information.
| Problems that can be solved with database software like storing large quantities of information, retrieving information with quickly & flexible, organize-reorganize information database printing output in variety ways.
| Kinds of database software, simple file manager, complex relational database are batch processing, real-time computing and interactive processing.
| Database operations are: storing (entering records); sorting (rearrange records); updating (renewing record’s field); querying (find records that match specific criteria); and summarizing information (the conclusion we get from the record’s field).
        | Easily accessible databases makes lives safer/more convenient because there are many kinds of database software & we just have to choose what would likely we need. Then, database systems, can we use to save our personal information that we might forget if we don’t write it down somewhere..
        | Ways databases threaten our privacy because database load personal information, which might be great value for someone. This information could be privacy that can maintain our dignity and freedom.


CHAPTER 8
|Basic types of technology that make telecommunication possible is Geostationary Communications Satellites that match the Earth’s rotation, so they can hang in stationary position relative to the spinning planet below, relaying wireless transmissions between locations on the planet
| Local Area Networks (LAN) computers are physically close to each other, usually in the same building or cluster of buildings. Each computer & peripheral is an individual node on the network. This node connected by cable
| Uses of :
–E-mail: send and receive messages to others on network(with HTML)
-Mailing List: participate in e-mail discussion groups on special-interest topics
-Newsgroup: public discussion on a particular object
-Computer Telephony: messaging system that can store, organize and forward messages
| How wireless network technology transforming ways people work and communicate  because it provides practical solutions. A lightning-fast network connection to desktop is of little use, when bandwidth is less important than mobility and portability
|  Current trends in telecommunications and networking like video rentals, cable TV, newspapers, and magazines will be transformed or replaced by digital high-bandwidth interactive delivery systems of the future.


CHAPTER 9
| Internet was created with the build of ARPANet (Advanced Research Projects Agency Network) in 1969 by team of visionary computer sciences developing request of the Department of Defense, because the world needs something that making connection or network easier and simple.
| Technology that is at heart at internet is Transmission Control Protocol/Internet Protocol (TCP/IP) that allows cross network communication.
| Technology that makes web work as a multimedia mass medium are some utility’s software that can connect to programs that we are working on it
| Tools to build website is HTML (HyperText Markup Language).
|Important social and political issues raised by the growth of the internet: filtering software to combat inappropriate content, digital cash to make online transactions easier and safer, encryption software to prevent credit card theft, digital signature to prevent e-mail forgery, access & censorship, and digital divide.


CHAPTER 10
| Types computer crime, possible crime prevention are theft by computer, software piracy, software sabotage, and hacking and electronic trespassing. How to prevent this crime: make all online purchases using (separated) credit card, make sure a secure web is managing the transaction, don’t disclose personal information over the phone & shred sensitive information.
| Security issues facing computer users, system administrators, law enforcement are security measures prevent crime, but can also post threats to personal privacy, and system administrators play a key role in security and back-up.
| Computer security relates to personal privacy issues with active badges, it can simultaneously improve security and threaten privacy
| Security and computer reliability related because computer security involves more than protection from trespassing, sabotage & other crimes. Then, software errors and hardware glitches account for some of the most important security issues



CHAPTER 11
| Computer changed people work in factories, offices, home, and variety industries because computers have a big impact on it. Now there are automated factory that is more efficient but keep traditional factories running with workers on it. Also automated office, with its evolution: enterprise computing, workgroup computing, electronic commerce, electronic cottage & paperless office.
| Computer changed quality job, in positively way, computers have caused more problems solved than workers did. In negatively way, computers technology to track, record and evaluate employee’s performance can raise issues for the employee itself.
| Information age places new demands on our educational system because education provides technological familiarity, literacy, mathematics, culture, communication, and learning how-to-learn. This is for students in the information ages.
| Computer are used in classroom is program that usually computers have in classroom, like: Computer Aided, Programming, Productivity, Digital, and others.



CHAPTER 12
      | Business organization as system by using the value chain model is organization performs activities to provide products & services for customer
      | Business organization from the viewpoint value chain model divides activities of organization in 2 types:
a.    Primary
b.    support activities
|  Transaction processing system support business processes because it can keeps tracks of routine transactions by information system
      |Enterprise resource planning change the flow of information within & among business organization because it’s emphasis is to improve the free flow of information between different parts of a firm
      | Computers support the work of managers with technology that helped the manager everything about making decision and Executive Information System (EIS) to monitor important economic and social trends affecting the organization.




CHAPTER 13
| Phases of company goes through using internet for business like Amazon.com that leveraged the internet’s unique ability to deliver huge amounts of information rapidly & efficiently.
| Forms of electronic commerce are business-to-business, business-to-consumer, and consumer-to-consumer.

| -Intranet
            ]Characteristic: internal information system based on internet client/server        activities between individuals & departments within an organization & made from       physical technology & information content
            ]Purpose: Middleware & TCP/IP
            ]Uses: as information access for employee, collaboration and teamwork in US, and         internal business transaction

-Extranet
            ]Characteristic: secure private, public network & virtual private
            ]Purpose: connects intranets of two or more companies in a business alliance &    enable global business strategy of companies to build alliances vendors, suppliers and other organizations internationally
            ]Uses: increase speed business-to-business transactions, reduces errors in            intercompany transactions, reduce costs of telecommunications, increase volume   business with partners, allows exchange business-to-business documents,         streamlines checking inventory and order status from suppliers & enables   collaborating with business partners on joint projects
| Design and use of public web sites for supporting business-customer transactions by it speed & secure transactions, up-to-date product selection, ease of use & after-sale features
      | Technical requirements of electronic commerce by web server and e-commerce software.
      | Ethical issues of electronic commerce are clear & explicit statement of organization’s privacy policy; policy statement addressing situations in which a person’s permission must be secure before his/her ID, photo, ideas, or communications are used/transmitted; clear policy stating how company will inform customers of the intended uses of personal information gathered during an online transactions & how the company will secure permission from the customer for those uses; statement that address issues of ownership with respect to network postings and communications; and policy of how company monitors/tracks user behavior on web site.


CHAPTER 14
| Process of designing, programming & debugging a computer program involves 4 :
1) Define and understand the problem
2) Devise and refine plan for solving problem, like test algorithm
3) Carry out the plan with writing the program
4) Evaluate solution by testing and debugging the program.
| Different programming language and examples are: Machine language (instruction of 4 basic arithmetic operations, comparing pairs of numbers, etc.); Assembly language & High-Level language (C++, Java, Basic, etc.)
| Step in life cycle of an information system:
Investigation {
Analysis {
Design {
Development {
Implementation {
Maintenance {
Retirement{
| Relationship between computer programming & computer science is the object of focuses on the process of computing
      | Problems faced by software engineers in trying to produce reliable large systems are errors of mission, syntax, logic, clerical, capacity & judgment errors.
      | Software companies provide only limited warranties for their products because the additional precautions needed to make the software work better would inflate the cost & extend the time needed for development and only large companies are able to sustain the pressure such scenario


CHAPTER 15
| Two basic approaches of artificial intelligence research are computers simulate human processes (best way to do something with machine often very different from the way people would do) & designing intelligent machines independent of the way people think (more common approach)
|Three inherent problems:
Most people have trouble knowing and describing how they do things.
There are vast differences between the capabilities of the human brain and those of a computer.
Even the most powerful supercomputers can’t approach the brain’s ability to perform parallel processing.
| -Practical applications of artificial intelligence are searching (looking ahead possibilities generated by each potential move);
-heuristics (rule of thumb) = Heuristics guide us toward judgments that experience tells us are likely to be true.
-pattern recognition (identifying recurring patterns in input data) = The goal of pattern recognition is understanding or categorizing that input.
The best human chess and checkers players remember thousands of critical board patterns and know the best strategies for playing when those patterns or similar patterns appear.
Game-playing programs recognize recurring patterns, too, but not nearly as well as people do.
-machine learning (learn from experience) = If a move pays off, a learning program is more likely to use that move (or similar moves) in future games.
| Robot is computer-controlled machine designed to perform specific manual tasks. The advantages of robots are: save labor costs, works anytime, improve quality, increase productivity, doing repetitive jobs and ideal for dangerous, uncomfortable or impossible for human .
 

Sugeng Rawuh Ing Blog Kula Copyright © 2011 Designed by Ipietoon Blogger Template and web hosting