TO Computing: Jeziah Lois C. Catanus
TO Computing: Jeziah Lois C. Catanus
TO Computing: Jeziah Lois C. Catanus
TO
COMPUTING
Jeziah Lois C. Catanus
INDUSTRY
IN THE
PROFESSION
IT Manufacturing Companies:
Apple Inc. (AAPL) Hon Hai Precision Industry Co. Ltd. (HNHPF)
Samsung Electronics Co. Ltd International Business Machines Corp (IBM)
Dell Technologies Inc.
KANDA Software
IT Services Company:
Microsoft Corporation Oracle Corporation
Adobe Inc. SAP America Inc.
Electronics Art Inc.
IT Professions:
oDatabase Administrator - administrators handle the storage, organization, and security of data, including financial records
or customer information.
oComputer System Analyst - study computer systems and procedures and devise solutions to increase organizational
efficiency.
oWeb Developers - design and create both the technical and visual aspects of a website.
oSoftware Developers - create applications and systems that operate devices, control networks, and allow users to complete
specific tasks.
oHardware Engineers - research, develop, and test computer systems and their individual components.
IT Organizations
Association for Computing Machinery (ACM) - ACM community is as diverse as the subfields that comprise computer
science, from educators and researchers in academia to practitioners in project management, industrial research, and software
development, engineering, and application design.
Computing Technology Industry Association (CompTIA) - CompTIA is the association representing the international
technology community.
Association of Software Professionals (ASP) - ASP is a professional trade association of software developers who are
creating and marketing leading-edge applications.
IT roles in biology:
IT-aided instruments, such as gene sequencers, DNA microarrays, and microscopes, are used for data collection.
Large shared, Internet-connected databases, such as gene and protein data banks, allow many researchers to obtain and
contribute data to large problems.
Data analysis methods are used in assembling and searching gene sequences.
Imaging and visualization, such as Magnetic Resonance Imaging (MRI) and tomography are important in several areas of
bioscience.
Modeling and simulation are used to model protein folding and to help understand complex biological systems such as
cells, tissues, organisms, and populations.
Electronic communication technologies are used to share scientific information and aid scientific collaboration.
Mobile and Web Computing - The web and mobile computing major is about combining people and technology
to bring out the best in both. In this web development degree students learn how to integrate the back end code with the
front end user experience, and are able to do it across several languages and platforms, to impact the app design process
at all levels. Students are highly valuable to employers seeking today’s most skilled application developers.
Software Engineering - Software engineering is the process of analyzing user needs and designing, constructing,
and testing end-user applications that will satisfy these needs through the use of software programming languages. It is
the application of engineering principles to software development.
Professions
Computer and Network Security Mobile and Web Computing Software Engineering
Firewall Specialist or Administrator Mobile App Developer Application Analyst
First generation computers were actually the first general purpose and true digital computers.
A list of popular first generation computers:
The ENIAC (1946) EDVAC (1950)
EDSAC (1949) UNIVAC I (1951)
They:
Solved one problem at a time Used machine language
Used input based on punched cards Had limited primary memory
Had their outputs displayed in print outs Were programming only in machine language
Used magnetic tapes Used vacuum tubes for circuitry
Electron emitting metal in vacuum tubes burned out easily Were expensive to operate
Used magnetic drums for memory Were power hungry
Were huge, slow, expensive, and many times undependable Generated a lot of heat which would make them malfunction
They:
Used transistors Allowed assembly and high-level languages
Faster and more reliable than first generation systems Stored data in magnetic media
Were slightly smaller, cheaper, faster Were still costly
Generated heat though a little less Needed air conditioning
Still relied on punch cards and printouts for input/output Introduced assembly language and operating system
software
Third Generation of Computers: 1960-1970s (Integrated Circuits and Multi-Programming)
3rd generation computers used the integrated circuit (IC) microchip instead of transistors.
Other examples of third generation computers:
IBM-360 IBM-370
They:
Used ICs Data was input using keyboards
Used parallel processing Output was visualized on the monitors
Were slightly smaller, cheaper, faster Used operating systems, thus permitting multitasking
Used motherboards Simplified programming languages i.e. BASIC
Fourth Generation of Computers: 1970s to Present (The Microprocessor, OS, and GUI)
The birth of the microprocessor was at the same time the birth of the microcomputer.
Examples of open source and free software:
Ubuntu OS MySQL
They:
Used CPUs which contained thousands of transistors Were cheap
Were much smaller and fitted on a desktops, laps and palms Had GUI
Used a mouse Were very fast
Were used in networks
Registerover 19 billion transistors in high-end microprocessors IBM z9 (2005), z10 (2008) and z13 (2015) are examples of
(Compare with 2,300 in Intel 4004) mainframes.
The fourth generation of mainframes and supercomputers evolved Cray 1 (1975), Fugitsu K (2011), Titan (2013), Sunway TaihuLight
to powerful systems: (2016) are examples of supercomputers
Ongoing AI projects:
Virtual personal assistants e.g. Siri, Google Now and Briana.
Smart cars e.g. Tesla's autopilot cars and Google's self-driving cars.
News generation tools like Wordsmith are used by Yahoo and Fox to generate news snippets.
Computer Aided Diagnosis for detection of cancer.
KEY COMPONENTS
OF A
COMPUTER SYSTEM,
OPERATING SYSTEM
Computer System
Components of a Computer System
Input Devices (keyboard, mouse etc.) Secondary Storage Devices (hard disk drive, CD/DVD drive etc)
Output Devices (Monitor, Speakers etc) Processor and Primary Storage Devices (CPU, RAM
Motherboard
The motherboard is central to any computer system.
All components plug into the motherboard either directly (straight into the circuit board) or indirectly (via USB ports).
Once connected to the motherboard, the components can work together to form the computer system.
faster the clock rate, the faster the performance of the computer.
There are two main brands of CPU currently on the market... AMD and Intel.
The more RAM you have installed in your computer -- the faster it can perform. You can open and use more programs at
Information stored in ROM is known as READ ONLY. This means that the contents of ROM cannot be altered or added to
by the user.
ROM is fast memory. Data stored in ROM can be accessed and read very quickly.
ROM is Non-Volatile memory. This means that stored information is not lost when the computer loses power.
to use the graphics card and also allows you to alter settings to change image quality and size.
Sound Card
Sound cards are internal hardware devices that plug into the motherboard.
sound card's main function is to allow the computer system to produce sound but they also allow users to connect
Input Devices
Input devices are pieces of hardware that get raw data into the computer ready for processing.
Processing involves taking raw data and turning it into more useful information.
Output Devices
When inputted raw data has been processed it becomes usable information. Output devices are pieces of hardware that send
this usable information out of the computer.
Some output devices send information out temporarily and some send information out permanently:
Temporary Output Devices - E.g. Monitors which constantly refresh the outputted image on the screen
Permanent Output Devices - E.g. Printers which output information onto paper as a hard copy.
Peripheral Devices
Almost all input and output devices are known as 'Peripheral devices'.
These are 'non-essential' hardware components that usually connect to the system externally
Peripherals are called non-essential because the system can operate without them.
Operating System
An operating system or OS is software installed on a computer's hard drive that enables the computer hardware to
communicate and operate with the computer software. Without a computer operating system, a computer and software
programs would be useless.
Functions
Manage all of the computer hardware inside your computer and all of the connected peripherals. In some situations, the OS
may need the assistance from additional device drivers.
Manage all of the software and communication between software programs installed on the computer.
Chromium / Chrome OS
Chrome OS is an operating system used with Google Chromebooks.
Types of Malware:
Viruses - a piece of code that inserts itself into an application and executes when the app is run.
Worms - target vulnerabilities in operating systems to install themselves into networks. They may gain access in
several ways: through backdoors built into software, through unintentional software vulnerabilities, or through flash
drives.
Trojan - disguises itself as desirable code or software. can take control of victims’ systems for malicious purposes.
Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in
phishing emails.
Ransomware - is software that uses encryption to disable a target’s access to its data until a ransom is paid. but there
is no guarantee that payment will result in the necessary decryption key or that the decryption key provided will function
properly.
Adware - tracks a user’s surfing activity to determine which ads to serve them. Danger in adware is the erosion of a
user’s privacy.
Anti-Malware Solution:
Norton 360 - it uses advanced machine learning, heuristic scanning, and a massive malware database to detect and
remove even the most sophisticated malware.
Bitdefender - has a fast, cloud-based malware scanner which keeps devices 100% protected without affecting CPU
performance.
Features:
Firewall. VPN.
Wi-Fi protection (Home Network Security). Password manager.
Anti-phishing protection. Permanent file deletion.
System tune-up tools. Identity theft protection (US users only).
TotalAV - is simple, easy to use, and provides some of the most comprehensive malware removal and protection
around.
Features:
Web attack prevention. Password manager.
Performance optimization tools. Identity theft protection (additional purchase).
VPN.
Avira - has a strong, fast, lightweight, and free malware scanner — it’s offered with no restrictions in Avira’s free
package.
Features:
Web privacy extension (Safe Shopping). VPN (500 MB monthly limit).
Performance optimizer. Password manager.
Intego’s - macOS malware removal software provides significant improvements over macOS’s built-in anti-
malware protections.
Features:
Smart firewall. Parental controls.
System clean-up and optimization tools. Data backup.
COMPUTER
SECURITY
Cybersecurity
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology security or electronic information security.
Malware - is a type of software designed to gain unauthorized access or to cause damage to a computer.
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary
payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make
you more likely to click on links, download malware, or trust a malicious source.
Cyber attacks can cause electrical blackouts, failure of military equipment and breaches of national security secrets. They can
result in the theft of valuable, sensitive data like medical records. They can disrupt phone and computer networks or paralyze
systems, making data unavailable.
Man-in-the-middle attack
The man-in-the-middle attack is a security breach where cybercriminals place themselves between the
communication system a client and the server.
How to prevent man-in-the-middle attacks?
Strong WEP/WAP Encryption on Access Points Force HTTPS
Strong Router Login Credentials Public Key Pair Based Authentication
Virtual Private Network
Drive-by Attack
Drive-by attacks are security threats that download unwanted materials from a website. It is also one of the most
common ways of spreading malware.
Password Attack
As its name implies, password attack is an attempt to steal passwords from a user.
Two common techniques they use to get a user’s password are:
Brute-force guessing
This entails using different random words, hoping that one of them would be the correct password
If the hacker knows his or her victim, they can apply logic while guessing and try the person’s title, name, job, or
hobbies as the password
Dictionary Attack
In this case, the hacker uses some of the common passwords to gain access to the user’s device
For instance, 1234 or ‘abcde’ are passwords that a lot of people use on their devices and these two are at the top of
the list of common ones an attacker will try out
To protect yourself from either of these two types of password attacks, implement a lockout policy to your cybersecurity.
Ransomware Attack
One cyber threat with scary consequences is the ransomware attack. Moreover, in this type of security breach, the
malware prevents users from accessing the data they stored on a server or database.
Eavesdropping Attack
Other names for eavesdropping attack are snooping, network security threat, or sniffing. It is very similar to the
man-in-the-middle attack, but it does not allow a secure connection between the user and a server. Theft of data and
information occurs after you send them out, so they do not get across to the server.
AI-Powered attacks
Artificial intelligence (AI) has been making ground-breaking success in recent years. Almost every gadget has
some application of AI in it, which heightens the scare of an AI-powered cyber-attack. Such security threats will have
the most devastating effects as autonomous cars, drones, and computer systems can be hacked by artificial
intelligence. AI can also shut down power supplies, national security systems, and hospitals.
Malware
Malware is a common type of cyber threat, defined as malicious software which gets installed into the system when
the user clicks on a dangerous link or email.
Zero-day exploit
A zero-day attack is an attack done by hackers when the network, hardware or software vulnerability is
announced publicly. They make use of this time to exploit the vulnerabilities before the solution is implemented.
How to prevent a Zero-Day Attack?
Use an advanced, proactive email security solution Implement network access control
Educate users Use IPsec
Deploy a web application firewall
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly
two endpoints, then it is called Linear Bus topology.
Features of Bus Topology:
It transmits data only in one direction. Every device is connected to a single cable
Advantages of Bus Topology:
It is cost effective. Cable required is least compared to other network topology.
Used in small networks. Easy to expand joining two cables together.
It is easy to understand.
Disadvantages of Bus Topology:
Cables fails then whole network fails. If network traffic is heavy or nodes are more the performance
of the network decreases.
Cable has a limited length. It is slower than the ring topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one
connected to the first. Exactly two neighbors for each device.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all
others nodes are connected to the central node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh
has n(n-1)/2 physical channels to link n devices.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should
at least have three levels to the hierarchy.
Features of Tree Topology
Ideal if workstations are located in groups. Used in Wide Area Network.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one
department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).
Internet Protocols
Transmission Control Protocol (TCP)
a connection oriented protocol and offers end-to-end packet delivery. It acts as back bone for connection.
A network communication protocol designed to send data packets over the internet.
A transport layer protocol in the OSI layer and is use to create a connection between remote computer by transporting and
ensuring the delivery of messages over supporting network s and the internet.
All HTML pages have a series of HTML elements, consisting of a set of tags and attributes. HTML elements are the building blocks of
a web page. A tag tells the web browser where an element begins and ends, whereas an attribute describes the characteristics of an element.
This image tag has two attributes – an src attribute, the image path, and an alt attribute, the descriptive text. However, it does not have
content nor an end tag.
Lastly, every HTML document must start with a <!DOCTYPE> declaration to inform the web browser about the document type. With
HTML5, the doctype HTML public declaration will be:
<!DOCTYPE html>
Most Used HTML Tags and HTML Elements
Block-Level Elements
A block-level element takes up the entire width of a page. It always starts a new line in the document. For example,
a heading element will be in a separate line from a paragraph element.
Every HTML page uses these three tags:
<html> tag is the root element that defines the whole HTML document.
<head> tag holds meta information such as the page’s title and charset.
<body> tag encloses all the content that appears on the page.
Other popular block-level tags include:
Heading tags – these range from <h1> to <h6>, where heading h1 is largest in size, getting smaller as they move up to h6.
Paragraph tags – are all enclosed by using the <p> tag.
List tags – have different variations. Use the <ol> tag for an ordered list, and use <ul> for an unordered list. Then, enclose individual list
items using the <li> tag.
Inline Elements
An inline element formats the inner content of block-level elements, such as adding links and emphasized strings. Inline elements are
most commonly used to format text without breaking the flow of the content.
For example, a <strong> tag would render an element in bold, whereas the <em> tag would show it in italics. Hyperlinks are also inline
elements that use an <a> tag and an href attribute to indicate the link’s destination:
<a href="https://example.com/">Click me!</a>
CSS Syntax
CSS Syntax includes selectors, properties, values, declarations, declaration blocks, rulesets, at-rules, and statements.
A selector is a code snippet used to identify the web page element or elements that are to be affected by the styles.
A property is the aspect of the element that is to be affected. For example, color, padding, margin, and background are some of the most
commonly used CSS properties.
A value is used to define a property. For example, the property color might be given the value of red like this: color: red;.
The combination of a property and a value is called a declaration.
In many cases, multiple declarations are applied to a single selector. A declaration block is the term used to refer to all of the
declarations applied to a single selector.
A single selector and the declaration block that follows it in combination are referred to as a ruleset.
At-rules are similar to rulesets but begin with the @ sign rather than with a selector. The most common at-rule is the @media rule which
is often used to create a block of CSS rules that are applied based on the size of the device viewing the web page.
Both rulesets and at-rules are CSS statements.
Inline Styles
Inline styles are applied to specific HTML elements. The HTML attribute style is used to define rules that only apply to that specific
element. Here’s a look at the syntax for writing inline styles.
<h1 style="color:red; padding:10px; text-decoration:underline;">Example Heading</h1>
That code would cause just that heading to render with red underlined text and 10 pixels of padding on all sides. There are very few
instances where inline styles should be used. In nearly all cases they should be avoided and the styles added to a stylesheet.
Internal Stylesheets
The earlier examples in this tutorial make use of internal stylesheets. An internal stylesheet is a block of CSS added to an HTML
document head element. The style element is used between the opening and closing head tags, and all CSS declarations are added between
the style tags.
External Stylesheets
External stylesheets are documents containing nothing other than CSS statements. The rules defined in the document are linked to one or
more HTML documents by using the link tag within the head element of the HTML document.
To use an external stylesheet, first create the CSS document.
Now that we have an external stylesheet with some styles, we can link it to an HTML document using the link element.
When this HTML document is loaded the link tag will cause the styles in the file styles.css to be loaded into the web page. As a result, all
level 1 heading elements will appear with red text, underlined, and with 10 pixels of padding applied to every side.
Cascading Inheritance
Why are CSS styles called cascading? When multiple rules are written that conflict with each other, the last rule written will be
implemented. In this way, styles cascade downward and the last rule written is applied.
This same cascading effect comes into play when using external stylesheets. It’s common for multiple external stylesheets to be used.
When this happens, the style sheets are loaded in the order they appear in the HTML document head element. Where conflicts between
stylesheet rules occur, the CSS rules contained in each stylesheet will overrule those contained in previously loaded stylesheets.
Inheritance of styles is another example of the cascading behavior of CSS styles. When you define a style for a parent element the child
elements receive the same styling.
Not every property passes from a parent to its child element. Browsers deem certain properties as non-inherited properties. Margins are
one example of a property that isn’t passed down from a parent to a child element.
Specificity
The second rule that determines which rules are applied to each HTML element is the rule of specificity.
CSS rules with more specific selectors will overrule CSS rules with less specific selectors regardless of which occurs first. As we
discussed, the three most common selectors are element tags, classes, and ids.
o The least specific type of selector is the element level selector.
o When a class is used as a selector it will overrule CSS rules written with the element tag as the selector.
o When an ID is used as a selector it will overrule the CSS rules written with element or class selectors.
Another factor that influences specificity is the location where the CSS styles are written. Styles written inline with the style attribute
overrule styles written in an internal or external stylesheet.
Another way to increase the specificity of a selector is to use a series of elements, classes, and IDs to pinpoint the element you want to
address. For example, if you want to pinpoint unordered list items on a list with the class “example-list” contained with a div with the id
“example-div” you could use the following selector to create a selector with a high level of specificity.
div#example-div > ul.example-list > li {styles here}
While this is one way to create a very specific selector, it is recommended to limit the use of these sorts of selectors since they do
take more time to process than simpler selectors.
Once you understand how inheritance and specificity work you will be able to pinpoint elements on a web page with a high degree
of accuracy.
What Can CSS Do?
A better question might be: “What can’t CSS do?”
CSS can be used to turn an HTML document into a professional, polished design. Here are a few of the things you can accomplish wish
CSS:
o Create a flexible grid for designing fully responsive websites that render beautifully on any device.
o Style everything from typography, to tables, to forms, and more.
o Position elements on a web page relative to one another using properties such as float, position, overflow, flex, and box-sizing.
o Add background images to any element.
o Create shapes, interactions, and animations.
COMPUTER SYSTEMS
(ORGANIZATION
AND
ARCHITECTURE)
Computer System Organization
A computer system is made up of various components. The components can be hardware or software. Because these systems are so
massively complex, the components are organized in layers.
Layers of Organization
Devices
Computer is an electronic machine that makes performing any task very easy. In computer, the CPU executes each instruction provided to
it, in a series of steps, this series of steps is called Machine Cycle, and is repeated for each instruction. One machine cycle involves fetching
of instruction, decoding the instruction, transferring the data, executing the instruction.
Computer system has five basic units that help the computer to perform operations, which are given below:
Input Unit Arithmetic Logic Unit
Output Unit Control Unit
Storage Unit
Input Unit
Input unit connects the external environment with internal computer system. It provides data and instructions to the computer system.
Commonly used input devices are keyboard, mouse, magnetic tape etc.
Input unit performs following tasks:
Accept the data and instructions from the outside environment. Supply the converted data to computer system.
Convert it into machine language.
Output Unit
It connects the internal system of a computer to the external environment. It provides the results of any computation, or instructions to the
outside world. Some output devices are printers, monitor etc.
Storage Unit
This unit holds the data and instructions. It also stores the intermediate results before these are sent to the output devices. It also stores the
data for later use.
The storage unit of a computer system can be divided into two categories:
Primary Storage: This memory is used to store the data which is being currently executed. It is used for temporary storage of data. The
data is lost, when the computer is switched off. RAM is used as primary storage memory.
Secondary Storage: The secondary memory is slower and cheaper than primary memory. It is used for permanent storage of data.
Commonly used secondary memory devices are hard disk, CD etc.
CPU
It is Central Processing Unit of the computer. The control unit and ALU are together known as CPU. CPU is the brain of computer
system. It performs following tasks:
It performs all operations. It controls all the units of computer.
It takes all decisions.