690 likes | 926 Views
CSCE 101 Introduction to Computer Concepts. Lecturer. Benito Mendoza E-mail: mendoza2@engr.sc.edu Phone: (803) 777-5609 (803) 447-6303 Meeting Time: MW 1:25PM- 2:15PM (Sections 7, 8, and 9) TTH 11:00AM-11:50AM (Sections 10, 11, and 12) Office Hours:
E N D
Lecturer • Benito Mendoza • E-mail:mendoza2@engr.sc.edu • Phone: (803) 777-5609 (803) 447-6303 • Meeting Time: MW 1:25PM- 2:15PM (Sections 7, 8, and 9) TTH 11:00AM-11:50AM (Sections 10, 11, and 12) • Office Hours: M 11:30 PM - 1:00 PM T 9:30 AM- 11:00 AM (appointment for other time) • Website: www.cse.sc.edu/~mendoza2/csce101/
What you’ll learn in this semester • Intro to Information Technology • Application and System Software • Hardware • Networking and Telecommunication Basics • Introductory Coverage of Programming • Databases • Number Systems • Web Design
Pattern of teaching • We’ll have 50 minutes lectures sessions. • Lectures will be focusing on theory • 50 minutes of lab sessions • Hands-on exercises will be given during labs • Hands-on will be related to application programs, covering part of the features in HTML and MS Office (Word, Excel, Access, PowerPoint), programming languages and tools. • With the following schedule:
Assessment • Homework/Quizzes 10%, Lab 30%, 2 Tests 40% (20% each), Final Exam 20% • The lowest homework/quiz grade will be dropped. • Exams are typically a combination of true/false (~ 35% of total points) and short answer questions (~ 65% of total points). The exams are not trivial and require thorough understanding of the course material. • A cumulative make-up test/quiz will be given at the end of the semester for students who have legitimate excuses confirmed before hand with the instructor. • Absolutely no late work is accepted except for documented emergencies. • The quality of your work and overall effort will greatly affect your assignment grades. • You must pass the lab to pass the course. In other words, you cannot pass the course if you fail the lab even if you have a passing grade for the lecture part of the course.
Frequently asked questions • Is CSCE101 an easy course? • How about textbook?
Chapter 1 – Expected Outcome • After this lecture, students are expected to be able to • Understand what “being computer savvy” means • Describe the roles of computer in daily life. • Name the different types of computer and briefly describe their common use. • Describe what are software and hardware with examples. • Name the hardware (Input / Output / Process / Storage / Communication) found in typical computer and briefly explain their respective usage. • Give examples on the major types of computer abuse.
Ubiquitous / Pervasive Computing 1. USB Darts (Engadget) 2. USB Eye Massager (Engadget) 3. Flying Alarm (Sleeptracker) 4. USB Slippers (Thanko) 5. Transparent Toaster (Inventables) 6. Spoon (Makezine) 7. USB Gloves (USBGeek) 8. Origami DVD Player (Inventables) 9. Scented MP3 Player (Akihabanews) 10. Roomba (IRobot)
Pervasive Computing • Effects of pervasive computing • Information overload • Lesser use of memory & surge is multitasking • Privacy concerns • “Smart” & “dumb” mobs
The “Net” Generation • Characteristics of Netgeners • Staying connected is essential • Multitasking is a way of life • Students are impatient and results-oriented (e.g. doing rather than listening) • They gravitate towards group activity • Being Computer Savvy • Computer literacy • Know how to make better buying decisions, fix ordinary computer problems, upgrade hardware and integrate it with new products, use the Internet most effectively, protect yourself against cyber villains, advance your career using IT • What is the worse computer problem you’ve encountered? • What intimidates you the most about computers?
Information Technology (IT) • Computer Technology • Programmable, multiuse machines that accept data and process it into information • Speeds up problem solving and increases productivity • There are various categories of computers with respect to their size and the way in which they are used • Communications Technology • Electromagnetic devices and systems for communication over long distances • Allows for transmission of data over various mediums in a wired (e.g. via cables) or wireless (e.g. via IR and RF signals) manner
How is IT being used in Education? • 99% of schools have internet access • 85% of college students own their own computer • ¾ of college students use the internet 4 or more hours per week • ½ of all college professors require students to use email in their classes • Many college classes are either taught online or have a class website DistanceLearning is online education
Health: High Tech for Wellness • Health websites provide medical information • Telemedicine: Medical care via telecommunications lets doctors treat patients from far away • 3D Computer models allow accurate tumor location inside a skull • Robots permit precise microsurgery • Handheld computers allow patients to measure blood sugar • Medical implants allow stroke patients to directly control computers to talk for them
Money: Cashless Society? • Virtual means something that is created, simulated, or carried on by means of a computer or a computer network • Virtual airline tickets • Virtual money • Online bill paying • PayPal • Electronic payroll deposit • Micropayments for online music How important is security if all your money is virtual?
How computers change our life? • Communication • (Long dist. phone v.s. Skype 1:1->M:M) • Gathering after school -> icq -> msn • Entertainment (cinema -> DVD / youtube) • Project/Reports (paper-based -> doc / ppt) • Activities in daily life: • News: http://www.cnn.com • Banking: http://ww.bankofamerica.com • Shopping: http://www.amazon.comhttp://www.ebay.com/
Media / Entertainment • Computer graphics is used in films nowadays • To replace expensive physical models • Objects can be duplicated easily • Shorten the time-to-market • Examples: • Jurassic Park • Terminator
IT in Government & Democracy • Governments can’t control information • Individuals can find multiple viewpoints on internet • Email makes it easier to contact the government • Competing websites promote & criticize politicians • www.whitehouse.gov • www.whitehouse.org • Blogs are a tool for political candidates
Jobs & Careers • Hotels: Desk clerks use computerized reservations systems • Law Enforcement: Officers use computers • On patrol • To check stolen cars • To check criminal records • To check arrest warrants • Entertainment: • Office uses like budgets, payroll, ticketing • Also virtual set design, 3-D animation, special effects
Jobs & Careers • Office careers: Budget, payroll, letter-writing, email • Teaching: Automated grading systems, emailing parents • Fashion: Sales/inventory control systems, ordering, personnel • Job-hunting: • Use word processor to create resumes • Post resumes online • Online job searches Can you think of a career that does NOT require computer skills?
The Telephone Grows Up • 1973: First cellphone call • 2006: Nokia estimates 2 billion mobile phone subscribers • Today’s cellphones: • Are mobile • Can take and send pictures • Can connect to the internet • Can send and receive text messages Why are cellphones banned in high-security military bases?
Internet, World Wide Web, & Cyberspace • Internet • The worldwide computer network • Links thousands of smaller networks • Links educational, commercial, military entities, and individuals • Originally developed to share only text and numeric data
Internet, World Wide Web, & Cyberspace • World Wide Web • The multimedia part of the internet • An interconnected system of servers that support specially formatted documents in multimedia form • Includes text, still images, moving images, sound • Responsible for the growth and popularity of the internet
Internet, World Wide Web, & Cyberspace • Cyberspace • Term coined by William Gibson in Neuromancer (1984) • Described a futuristic computer network people “plugged” into directly with their brains • Now means • The web • Chat rooms • Online diaries (blogs) • The wired and wireless communications world
What’s so special about computer? • What makes computer different from other machines is that: Computer runs program! By changing the program (instructions), the same computer can be used to perform different function (That’s why X-Box can be hacked to run Linux OS)
Moore’s Law • It is an empirical observation attributed to Gordon Moore, a co-founder of Intel • The number of transistors on integrated circuits (a rough measure of computer processing power) doubles every 18 months • Why and for how long will it hold? • How “fast” will our computers become? • Does processor improvement always yield a faster computer?
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Supercomputer
Supercomputer • Fastest, most powerful, most expensive among the categories • Priced from $1 million to $350 million • Suitable for intensive calculations and processing • High-capacity machines with thousands of processors • Multi-user systems • To learn more about one, go to http://www.llnl.gov/asc/computing_resources/bluegenel/bluegene_home.html Example Application: weather maps, construction of atom bombs, finding oil, earthquake prediction, etc.
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Mainframe
Mainframes mainframes support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe • Until late 1960’s, the only computer available • Allows hundreds of people to have simultaneous computer usage • Multi-user systems; accessed using a terminal • Processing speed: > 1,000,000,000,000 instructions per second • Cost $5,000 - $5 million • Terminals only have a keyboard and monitor; can’t be used alone • To see one, go to http://www3.ibm.com/servers/eserver/zseries/
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Workstation: Sun Ultra450 • Expensive, powerful computers usually used for complex scientific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. • Workstations provide capabilities comparable to midsize mainframes.
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers HP Compaq Business d220 tower microcomputer
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Compaq Evo desktop microcomputer
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Apple i-Mac computer
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers Laptop computer
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers • Personal Digital Assistant (PDA) • Perform simple tasks • Small screen • Input and output ? Personal Digital Assistant
The 5 types of ComputersAll Computers, Great & Small: The Categories of Machines DSP: Digital Signal Processor • Supercomputers • Mainframes • Workstations • Microcomputers • Microcontrollers
How about “Servers” ? • “Server” is not the name of a type of computer… • Generic definition: Server is the party providing service and Client is the party requesting service • For Example: • Server - a machine which stores your email / web page • Clients - PCs, workstations which access mail / webpage (e.g. running I.E.)
The client-server model Server: central computer that holds collections of data & programs Processes requests from clients Must be able to handle load E.g. web, e-mail, and file servers Client: PCs, workstations, and other devices that issue requests and receive data and services from servers Features: Highly structured Server is a centralized point of failure Roles of Computers
The peer-to-peer (P2P) model Peer = client + server Various degrees of distribution of load and tasks including the indexed (e.g. Napster), hybrid, and pure P2P (e.g. Gnutella) models Features: Pooling of resources No single point of failure Flexible structure Reliability, trust, and privacy concerns Some P2P Systems: BitTorrent Freenet Roles of Computers
How Computers WorkConcept #1 Test 1: 85 Test 2: 65 Final: 95 Total Grade: 83 Letter Grade: B Total Grade = Test 1 x 0.3 + Test 2 x 0.3+ Final x 0.4 Process Output Info Input Data • The purpose of the computer is to process data into information • Data: raw facts and figures • Information: data that has been summarized or otherwise manipulated for use in decision making
Hardware All the machinery and equipment in a computer system Software All the instructions that tell the computer how to perform a task How Computers Work - Concept #2Computers consist of hardware and software.
How Computers WorkConcept #3 Processing Input Data Storage Output Communications All computers perform the same five basic tasks
How Computers Work - Concept #3All computers follow the same five basic operations. • Input • Processing • Storage • Output • Communications Keyboard Thanks to the improvement of technology. Wireless version is more common Mouse
How Computers Work - Concept #3All computers follow the same five basic operations. • Input • Processing • Storage • Output • Communications Case or system cabinet
How Computers Work - Concept #3All computers follow the same five basic operations. • Input • Processing • Storage • Output • Communications Processor chip
How Computers Work - Concept #3All computers follow the same five basic operations. • Input • Processing • Storage • Output • Communications Motherboard
Primary storage (memory) - RAM Computer circuitry that temporarily holds data waiting to be processed Secondary storage(storage) - The area in the computer where data or information is held permanently How Computers Work - Concept #3All computers follow the same five basic operations. • Input • Processing • Storage • Output • Communications