310 likes | 432 Views
COMM 226 Hardware and Software. Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal. Types of computers. Sources: https://upload.wikimedia.org/wikipedia/commons/d/d3/IBM_Blue_Gene_P_supercomputer.jpg
E N D
COMM 226Hardware and Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal
Types of computers Sources: https://upload.wikimedia.org/wikipedia/commons/d/d3/IBM_Blue_Gene_P_supercomputer.jpg https://upload.wikimedia.org/wikipedia/commons/2/21/Front_Z9_2094.jpg https://upload.wikimedia.org/wikipedia/commons/f/f5/Rack001.jpg http://bacikgroup.com/wp-content/uploads/2013/11/server-farm-shot.jpg http://sameeroostatics.meethi.com/spex_1021208898_650.png http://www.admiralmarkets.com/images/mtmac/MetaTrader4-for-Mac-OS.png https://www.apple.com/macbook-air/images/design_unibody2.jpg http://www.laptopjoy.com/wp-content/uploads/2009/10/laptop-computer-and-best-buy9.jpg http://static.digit.in/fckeditor/besttablets2013.jpg http://actu.meilleurmobile.com/wp-content/uploads/2014/07/smartphones3.jpg
Inside a computer • Tour inside a computer
Computer memory basics • Computers are digital, and represent data in bit patterns • Bit is shorthand for Binary digIT. The binary system consists of two values: 0 and 1 • 8 bits = 1 byte • Bytes are the basic measure of storage in computers • ASCII Code (8 bits) and Unicode (usually 8 or 16 bits) assign a unique character to each pattern of 0s and 1s in a byte
Kilobytes, megabytes, etc. Source: https://en.wikipedia.org/wiki/Template:Quantities_of_bytes
How computers represent data • 0 or 1: One bit • Characters are represented by one byte • The word, CANADA, is represented by six bytes in ASCII encoding:
Software sourcing How organizations get their software
Three major options for acquiring application software • Buy off-the-shelf • Buy off-the-shelf with alterations • Tailor-made - custom-developed software
Owning versus licensing software • Unless you build it yourself, you don’t actually “buy” software—you buy a license to use program • When you buy a book, you don’t actually buy the rights to modify and redistribute the book; you only buy a license to read your own paper or electronic copy of it • Ownership remains with development company • Licensor usually needs to pay again for new versions
Open-source software • Open-source software is owned by all the software contributors in the community • A special case of “buy off-the-shelf with alterations” • Contributing companies save money by shared labour with other contributors • Some vendors make money by offering support • Users make money because they can use the software for free without paying license fees • The most important open source software is usually of high quality
Cloud computing • Clients do not own the computers; they just use the cloud providers’ computers • Hardware, software, and applications are provided as a service, through a web browser • The cloud is a metaphor for the Internet, which makes software and data services available from any location at any time • Common examples of cloud computing for personal use: • Software as a Service (SaaS): Web e-mail (Gmail), online applications (Google Docs) • Infrastructure as a Service (IaaS): online backup (Dropbox, iCloud), blogs (WordPress.com) • What are the Business Benefits of Cloud Computing?
Computer viruses and malicious code • Virus: A program that attaches itself to other programs, replicates itself, and spreads • Usually combined with some other malware (called its payload) to cause damage • Usually computerized vandalism: Might damage data or disrupt normal operations • Worm: Replicates itself and spreads over a network, without attaching itself to other programs • Botnet: a network of hijacked computers (zombies) that can do whatever the hacker wants them to do • Hacker uses a virus or worm to install a payload that secretly takes control of victims’ computers • Like a good biological virus, the botnet virus doesn’t usually let the user know that it’s even there, maybe even for years
Virus prevention • Install antivirus software • Make backups (and scan them for viruses!) • Avoid unknown sources of free software • Never open unexpected e-mail attachments, even if you know the sender • If your computer gets a virus… • Run anti-virus program with fresh updates • If still necessary, reformat your computer: • Reformat • Run antivirus • Reinstall programs • Reinstate your backups—you have backups, right?
What is Linux? https://www.youtube.com/watch?v=5ocq6_3-nEw
Popular operating systems • Major desktop operating systems • Windows (90%) • Apple (4-7%) • Linux (1-2%) • Major web server operating systems • Linux/Unix (67%) • Windows (33%) • Major mobile operating systems (smartphones) • Android (75-85%) • iOS (11-19%) Sources https://en.wikipedia.org/wiki/Usage_share_of_operating_systems http://w3techs.com/technologies/overview/operating_system/all
Why is Windows more popular for business than Mac? • A somewhat biased (pro-Mac) but detailed perspective: • How Windows REALLY Became The Market Leader (Pt.1) • How Windows REALLY Became The Market Leader (Pt.2)