Wednesday, October 27, 2010

Chapter 1:Continued

Computer Connections:

- Web Browsers: programs that in effect serve as navigable windows into the Web

- hypertext links: Tie together millions of Web pages created by diverse authors

- Internet Supports varied activities: ebay used to make international transactions. real-Time multiplayer games.

Explainations: Clarifying technology:

- Computer literacy is already imporoving our day-today lives and careers.

Applications: enable you to use a computer for specific purposes.

Implications- Social and Ethical Issues:

- The threat to personal privacy posed by large databases and computer networks.

- The hazards of high-tech crime and the difficulty of keeping dara secure.

- The difficulty of defining and protecting intellectual property in an all- digital age.

- The threat of automation and the dehumanization of work.

- The abuse of information as a tool of political and economic power.

- The emergence of bio-digital technology.

- The dangers of dependence on complex technology.

-micro chipping animals.

hw: 5 examples about bio-digital technology


Wednesday, October 20, 2010

Chapter 1: Our Digital Planet

-Creating Communites on the Living Web

  • MySpace: online community for young people.
  • Flickr: creates a community for people to share pictures

-Computers are no longer a luxury, but instead its a commodity.

- Computers and there applications are included in our daily lives.

- All computers take in information called input and give out information called output.

- Hardware: The physical part

-Software: The instruction that tells hardware how to transform the input data.

- In 1939: Konrad Zuse compeleted the first programmable, general-purpose computer.

- Around the same time the British government was assembling a top-secret team of mathematicians and engineers to crack Nazi- military codes.

- 1943: the team led by mathematicians Alan Turning and others completed Colossus, considerded by many to be the first electronic digital computer.

-1944: Thanks to a one million dollar grant from IBM, Harvard prof. Howard Aikwn developed the Mark I

-John Mauchly and J. Presper Eckert helped the U.S. effort in World War II by constructing a machine to calculate trajectory tables for new guns.

-Vacuum tubes: were used in early computers.

-Transistors: replaced vacuum tubes starting in 1956

-By thw mid-1960's transistors were replaced by integrated circuits.

-Integrated circuits brought:

  • increased reliability
  • smaller size
  • higher speed
  • higher efficency
  • lower cost

- 1971: The first microproceeor was invented by Intel engineers.

- The personal computer revolution began in 1970:

  • apple
  • commodore

- Desktop computers havent completely replaced big computers, wich have also evolved.

-Embedded Computers

  • Special-purpose compter:Dedicated computers that perform specific tasks.
  • Controlling the temp. and humidity.
  • monitoring your heart rate.
  • monitoring your house security system.

-The program is etched on silicon so it cannot be altered. this is called firmware.

-Personal Computers:

  • PC's serve a single user at a time.

-Workstations: high-end desktop computers with massive computing power used for high-end interactive applications.

-Portable Computers:machines that are not tied to the desktop.

- Serves

  • computeres degined to provide software and other resources to other compters over a network.

- mainframes:

  • Used by large organizations, such as airlines, for big computing jobs
  • communicate with mainframe through terminals
  • multiple communications at one time through process of timesharing.

- Supercomputers:

For power users who need access to the fastest most powerful computers made.

-The emergence of networks.

  • Connect devices together
  • 1960's: Internet deeveloped with backing of the U.S. government.

- The internet explosion-over a billiob people with Internet access by the end of 2005

-Web Browsers:

  • Programs that, in effect, serve as navigable windows into the web.

-Hypertext links:

  • Tie together millions of Web pages created by diverse authors.

-internet supports varied activities:

  • ebay used to make interantional transactions
  • Real-time multiplayer games.

-In the history of out society we have had:

  • An agricultural age
  • An industrial age

-

Wednesday, October 13, 2010

Chapter 4: The User Interface

- Future users interfaces will be built around emreging development technologies such a:
the end of applications
natural-language interface
agents
virtual realities
- files can be scatteres all over the system, which often ,akes data managemnet difficult.
- one solution to this problem is to organize data files logically.
- both windows and the Mac support the notion of common system floders with self-explanatory names.
  • my documents
  • my pictures
  • my music

- File-managment utilities:

  • view, rename, copy, move, and delete files and folders
  • Hierarchies help with organization
  • help with locating a file
  • get size, file type, and last modification date.

-Managing Files from Applications:

  • operations:open, Save as, Save, and Close

Defragmentaion

- Software Piracy: illegal duplication of copyrighted software

  • the software industry is a 50 billion a year business sector
  • billions of dollars are lost each year to software piracy.

- The WIMP(windows, icons, menus, and pointing devices) interface is easier to learn and use than earlier character-based interfaces.

- The SILK interface incoperates many important emerging user interface software technologies.

Friday, October 1, 2010

Chapter 4: continued

Software Bundles:
Vertical-market and Custom Software
-tends to cost far more than mass-market applications
-Job specific software:
  • medical billings
  • library cataloging
  • legal reference software
  • restaurant management
  • software needs

System Software:

a class of software that includes the operating system and utility programs, handles these details, and hundreds of other tasks behind the scenes.

operating system functions:

  • supports multitasking
  • manages virtual memory
  • maintains file system
  • responsible for authentication and authorization

What is the difference between authentication and authorization? Give Examples

utility programs:

-Serve as tools for doing system maintenence and repairs that arent automatically handled by the operating system.

-make it easier for users to:

  • copy files between storage devices
  • repair damaged data files
  • translate files so that different programs can read them.
  • gaurd against viruses and other potential harmful programs(as described in the chapter on computer security and risks)
  • compress files so they take up less disk space
  • perform other important, is unexciting

- Norton provides a package that includes software tools for recovering damaged files, and repairing damaged disks.

Device Drivers:

-small programs that enable I/O devices to communicate with the computer

-included with the operating system

-Some computers store their operating system in ROM

other include only part of it in ROM

The remainder of the operating system is loaded into memory in a process called booting. which occurs when you turn on the computer.

-interacting with the operating system, like interacting with an application, cam be intuitive or challenging and it depends on something called the user interface.

User Interface

- The interface defines the look and feel of the comupting experience from a human point of view.

-MS-DOS is a disk operating system in which the user intacts using character

  • letters
  • numbers
  • symbols

Features Included:

-Commanded-line interface

-Menu-driven interface

Graphical User Interface: Mac Os was developed by Macintosh in 1954 using GUI.

-Mulitiple User operating Sytem: UNIX and Linus

-Unix was developed at Bell labs before personal computers were available.

-linuz is free for anyone to use or improve.

Uniz remains teh dominant operating system for internet servers.

-Some of the UNIX is available for personal computers, workstations, servers, mainframes, and supercomputers.