banner

About ITC 100


Overview

This course provides an overview of the computing industry and computing profession, including research and applications in different fields but not limited to Biology, Sociology, Environment and Gaming; an understanding of ACM requirements; an appreciation of the history of computing; and knowledge of the key components of computer systems (organization and architecture), malware, computer security, internet and internet protocols, HTML 4/5 and CSS.

General Objectives

At the end of the semester, the student must:



Summary of the Chapters


Chapter 1

Computer is a programmable, electronic device that accepts data, performs operations on that data, and stores the data. Its basic operations are to Input, Processing, Output, Storage and in the communication. Harare is the physical parts of a computer while the software is a programs or instructions that are used to tell the computer hardware what to do. Thus, the six basic categories of a computers are the Embedded Computer which it is designed to perform specific tasks or functions for that product; Mobile Device is a very small device with some type of built-in computing or Internet capability; Personal Computer (PC) is a small computer that is designed to be used by one person at a time and also can be called as a microcomputer; Server is a medium-sized computer used to host programs and data for a small networks; Mainframe Computer is a powerful computer used by many large organizations to manage large amounts of centralized data; and Supercomputer where it is the fastest, most expensive, most powerful type of a computer.

Learning Insight

Nowadays, computer is very essential in our daily living because it is integrated into our business and personal lives. Computer is an electronic device that accepts data, performs operation and also stores the data. This is being used to input, process, output, storage and communication. All of this are the basic operations that we are usually do in a computer. In a 21st century computers are widely used by an individual because it has as multiple capabilities that makes our work or job done easily. This is the reason why people adapt the skill of being computer literate. However, many schools today have computers and Internet access available in the classroom and/or a computer lab for student use. Computers have become a universal on the job tool for making, productivity and communication. It is encountered in nearly every aspect of daily life because we are consumed and used it in every transaction that we had.However, computers are consisting of two basic components the hardware and software. This component is very essential because they are connected to each other which makes it functional. Hardware is the physical parts of a computer while the software is a program or instruction used to tell the computer what to do. Therefore, hardware and software is really interrelated to each other because without the hardware the software cannot be functional and without the hardware the software also cannot be used. This is the vice versa. Yet, the computer has also six basic categories namely: Embedded computers, mobile devices, personal computers, server, mainframe computers and supercomputers. Each of this component has a distinct characteristic which makes it unique. Every individual uses this variety of basic categories of computer to entertain themselves, for educational purposes, businesses etc. In vast improvements in technology over the past decade have had a distinct impact on daily life, at home and at work because we are the one who used it and many benefits, we get in using computers. Lastly, computers are now part of our daily living and it is only depending on us how we are dependent in the computers.


Chapter 2

This chapter discuss about the unit: processing and memory which it also important to understand the programs. in a computer. Digital data presentation is a process of representation is a process of representing data in digital form so it can be understood by two state off and on (0 and 1). This called as bit which it is a smallest unit of data that a binary computer can recognise. Coding system for text-based data is the ASCII (American standard code for information interchange) traditionally used with personal computers and EBCDIC (Extended Binary-Code Decimal Interchange code) primarily for mainframes. This coding system is designed to represent text-based data that is somehow used by an individual. However, system unit is the main case of a computer that contains storage devices, power supply and as well as coding fans. Inside the system unit houses the CPU, memory and other important pieces of a hardware. Yet, the CPU (Central Processing Unit) is consist of a variety of circuitry and components packages together. Today's CPU's contain hundreds of millions of transistors, the number doubles about every 18 months. Finally, to make computers faster and better now and in the future all we have to do is to improve the performance of the system, perform system maintenance, and also always upgrade the Internet connection so that there is no problem will occur.

Learning Insight

Digital Data Representation is the process of representing data in digital form so it can be understood by a computer. Bit is the smallest unit of data that a binary computer can recognize (a single 1 or 0). However, system Unit is the main case of a computer which houses the processing hardware for a computer. This contains storage devices, the power supply, and cooling fans. Inside the system unit we have the motherboard, Computer Chip, Circuit Board, System Board, Power Supply, Drive Bays, Processors, and etc. Typically the CPU Components are the Arithmetic/Logic Unit (ALU); Floating Point Unit (FPU); Control Unit; Prefetch Unit; Decode Unit; Registers and Internal Cache Memory; and the Bus Interface Unit. All of this components is very essential in a Central processing unit.


Chapter 3

This chapter covers the characteristics of common among all storage systems such as Volatility, Random and Sequential Access, Logical and Physical Representation and etc. Types of Storage Technology used are the Magnetic (conventional hard drives), Optical (optical discs), and Electrons (flash memory media). Hard Drive is used to store most programs and data that can be internal or external. Solid State Drives (SSDs) is use flash memory technology and also use less power and have no moving parts. Internal hard drives is permanent storage devices located inside the system unit that can only removed only if a problem develops. However, External hard drives commonly used to transport large amounts of data from one computer to another. Optical Disc is type of storage read from and written to using laser beams. Types of Flash Memory Storage Systems are the flash memory in which it is a chip-based storage medium that represents data using electrons and used in SSDs and hybrid hard drives; Embedded Flash Memory is an embedded into products, such as portable digital media players, digital cameras, Flash memory card small card containing one or more flash memory chips, a controller chip, and metal contacts to connect the card to the device or reader with which it is being used.

Learning Insight

Storage is an act of putting things in a special place for use in the future, or the place where you put things. This is a process through which digital data is saved within a data storage device by means of computing technology. Storage is a mechanism that enables a computer to retain data, either temporarily or permanently. Stosrage may referred to as computer data storage or electronic data storage.


Chapter 4

Keyboards is an input device used to enter characters at the location marked by the insertion point or cursor. It consist of Standard alphanumeric keys, Numeric keypad, Function keys, Delete and Backspace keys, Control and Alternate keys and Arrow directional keys and special keys. Pointing devices are used to select and manipulate objects, Input data and Issue commands to the computer. Scanners (Optical Scanners) is an input devices that read printed text and graphics and transfers them to a computer in digital form. The data is typically input as a single image. Radio Frequency Identification (RFID) Readers is used to store and transmit data located in RFID tags. Optical Mark Readers (OMRs) is an input data from special forms to score or tally exams, questionnaires, ballots. Optical Character Recognition (OCR) Devices is the ability of a computer to recognize scanned text characters and convert them to electronic form as text, not images. Biometric Readers is used to input biometric data such as an individual’s fingerprint or voice. Digital Cameras can take pictures and records them as digital images and can either be still cameras or video cameras. Audio Input is a process of entering audio data into the computer. Inputting spoken words and converting them to digital form via microphone or headset. Display Device presents output visually on some type of screen. Organic Light Emitting Diode (OLED) Displays use layers of organic material and emit visible light when current is applied. Laser Printers use toner powder and technology similar to that of a photocopier to produce images on paper.

Learning Insight

The computer will be useless unless with the ability to communicate with the exterior world. Type and End result devices are required for users to communicate with the computer. In simple terms, type devices bring information into the computer and output devices bring information out of your computer system. These source/output devices are also called peripherals since they enclose the CPU and storage of your computer system. A hardware device that accepts inputted information and also offers the ability of outputting that information. Good examples of an type and outcome devices are a floppy diskette drive and a hard drive drive. An outcome device is any piece of computers equipment used to speak the results of data processing completed by an information control system (like a computer) to the exterior world. In computing, type and output, identifies the communication between an information handling system (such as computer), and the outside world. Inputs are the signs or data delivered to the machine, and output are the alerts or data dispatched by the machine to the outside. The most typical input devices used by the computer will be the key pad and mouse. The computer keyboard allows the admittance of textual information as the mouse allows the selection of a point on the display by moving a screen cursor to the idea and pressing a mouse button. The most typical input devices used by the computer will be the key pad and mouse. The computer keyboard allows the admittance of textual information as the mouse allows the selection of a point on the display by moving a screen cursor to the idea and pressing a mouse button. The most common outputs are monitors and audio system.


Chapter 5

This chapter discuss about System software where it has two types the System Software and Application Software. System Software is the operating system and utility programs that control a computer system and allow you to use your computer. Application Software a programs that allow a user to perform specific tasks on a computer. Operating System is a collection of programs that manage and coordinate the activities taking place within a computer. Utility Program is a software that performs a specific task, usually related to managing or maintaining the computer system. The Future of Operating Systems will continually become more user-friendly and eventually be driven primarily by a voice interface, touch, and/or gesture interface.

Learning Insight

A software is a program or instructions used to tell computer hardware what to do. It is widely used in a computer to make it functional and visible of the user which they manipulate the computer and interact with it. There are two types of software namely: System Software and Application Software where it is integrated in the software. The difference between this two software is that System Software is an operating system and utility programs that control a computer system and allow you to use your computer while application software allows a user to perform specific task on a computer. Thus, an operating system is a program that manage and coordinate the activities taking place within a computer. Its function is to interface the users, booting the computer, configuring devices, managing network connections and monitoring resources and jobs. Recently, the most popular operating system is the window 8 because it is newest version of Window. It is designed to be used with smart phones, desktop computers, with or without a keyboard or mouse. Windows is developed by Microsoft corporation that is designed for personal computers. However, utility program is a software that performs a specific task usually related to managing or maintaining the computer system. This is very important in an operating system because it will secure the whole system and backing up the files. To look out for the future an operating system is to will continue to become more user-friendly and likely to continue to become more stable and self-healing.


Chapter 6

The Basics of an Application Software are the Commercial Software which it is a copyrighted software developed and sold for profit and a single-user license; Shareware is a copyrighted software distributed on the honor system; Freeware is copyrighted software programs that are given away by the author for others to use free of charge; Public Domain Software that is not copyrighted and ownership rights have been donated to the public domain. A Word Processing is used to create, edit, save, and print written documents such as letters, contracts, and manuscripts. Spreadsheet is a documents containing a group of numbers and other data organized into rows and columns. Database is the collection of related data that is stored in a manner enabling information to be retrieved as needed. Graphics is a graphical images, such as digital photographs, clip art, scanners drawings, and original images created using a software program. Multimedia technically refers to any application that contains more than one type of media and often used to refer to audio or video content.

Learning Insight

Presently, mostly people used application where they can communicate, entertained, serve as sources, business etc. We cannot deny the fact that even young children use application because they are more addicted with the mobile games and other purposes. If we talk about application software, it allows to perform specific task in a computer. Yet, there is a software ownership rights that specify the allowable use of a program includes: Commercial software, Shareware, Freeware and Public Domain Software. Commercial software is developed and sold for profit and it is a single-user licensed. Shareware is also a copyrighted software in which it is distributed on the owner system and the user should pay for it or uninstall it after the trial period. Freeware is a program that are given away by the author for others to use free charge. Lastly, public domain software is not copyrighted, and ownership rights have been donated to the public domain. There's a lot of software that are very crucial in our daily living because it is beneficial to a work which makes it easy with out any difficulties.


Chapter 7

Computer network is a collection of computers and other hardware devices connected together so users can share hardware, software, and data, and electronically communicate. To define its network characteristics we have had the wired in which computers and other devices are physically connected to the network with cables; and the wireless network in which computers and other devices are connected to the network without physical cables. Thus, in a network there are also its topologies these are Network Topologies that Indicates how the devices in the network are arranged; Star Networks that are all of the devices connect to a central device/server; Bus Network uses a central cable to which all network devices connect; and also the Mesh network in which there is a multiple connections among the devices on the network. The transmission Type and Timing in a network are the Serial; Parallel; Synchronous Transmission; Asynchronous Transmission; and the Isochronous Transmission. TCP/IP is most widely used communications protocol that consists of two protocols. These are the Transmission Control Protocols (TCP) that are responsible for delivery of data and Internet Protocols (IP) which provides addresses and routing information.

Learning Insight

bThis chapter talked about computer networks that defined as the collection of computers and other hardware devices connected so that the user can share hardware and software and electronically communicate. Internet is the largest computer network in the world where all of us need the Internet because of its usage and purposes. Without Internet the communication would probably will be decrease because people nowadays are relying in the Internet. Network has its several usages such as telephone service, television and radio broadcasting, global positioning system (GPS) applications, GPS receiver, monitoring systems, multimedia networking, etc. This proves that network is very essential in any aspect of our lives and gives directions to each of everyone. Besides the network has also its characteristics this are the wired and wireless network. Wired network in which computers and other devices are physically connected to the network with cables while wireless network in which computers and other devices connected to the network without any physical cables. Yet, there are a lot of network size coverage area that are fully understand how it was really position in following those area networks.


Chapter 8

Internet is the largest and most well-known computer network, linking millions of computers all over the world. The Internet has actually operated in one form or another for several decades. Yet, the World Wide Web is the collection of Web pages available through the Internet in which it is proposed by Tim Berners-Lee in 1989. Search Sites is a web sites designed to help users search for Web pages that match specified keywords or selected categories. Typically use a search engine in conjunction with a database containing information about Web pages to locate appropriate Web pages. Some countries block some Internet content to hinder spread of information from political opposition, to filter out material determined to be offensive and protect national security.

Learning Insight

essential because millions of people need it as imparted to their lives. The Internet community today is the users and Internet providers (IPS) which provide access to the Internet. Nowadays, computers should be connected to the Internet in order to obtain access and most of the connections today are broadband. However, websites are designed to help the user search for webpages that match specified keywords. This means that a search engine is in conjunction with a database containing information about webpages to locate appropriate webpages. Yet, Internet has its variety of usage and beneficial to each individual because everyday they access in the Internet to browse and look for their daily needs. In using Internet, it could facilitate learning and give an entertainment to the user. Thus, we cannot deny the fact that we should also observed about the censorship and privacy issues because we are the one who affected to the breakdown of Internet. It is our responsibility to keep our privacy secured and cannot be corrupted of anyone.


Chapter 9

Computer Crime is any illegal act involving a computer. Unauthorized Access is gaining access to a computer, network, file, or other resource without permission while Unauthorized Use using a computer resource without any approval activities. Hacking is using a computer to break into another computer system. This is a serious threat for individuals, businesses, and the country (national security) cyberterrorism that is often performed via wireless networks today. Computer Sabotage is an acts of malicious destruction to a computer or computer resource. Protecting against Computer Sabotage we have the Security Software that is typically a suite of programs used to protect your computer against a variety of threats. However, there are also a lot of personal safety such as the Cyber stalking and Online Pornography.

Learning Insight

Currently, computer crime is very important because some users are not aware in terms of Internet security and some of the users are not knowledgeable about computer safeguard. Yet, all computer users should be aware of security concerns and the precautions that can be taken for us to avoid any crime in the computers. Approximately in order to protect your computer from the unauthorized access and unauthorized use we should imposed firewalls, intrusion prevention system (IPS) software, virtual private networks (VPNs), additional public hotspot precautions and sensible precautions. This makes your computer secure from any unauthorized users. Furthermore, computer sabotage is also a primary concern that user faces because their computers are easily to corrupt and destroy. This are the botnet, malware, computer viruses, computer worm, trojan horse and denial of service attack that are commonly experienced by the users. Yet, there is a way to prevent this computer sabotage such as keeping your security software up to date as new malware is introduced all the time and should be controlled in accessing computers and networks.


Chapter 10

Web-Based Multimedia (also called rich media) that is located on Web pages. It is an integral component of the Web. Businesses and individuals need to understand the characteristics of the various types of multimedia elements and the impact of adding them to a Web site. Multimedia has it element these are the Text used to supply basic content, and to add text-based menus and hyperlinks; Images (Graphics) is a digital representations of photographs, drawings, charts, and other visual images; and also the Animation that is a series of graphical images are displayed in succession to simulate movement. Web Site Design is the process of planning what a Web site will look like and how it will function. Thus, Web Site Development is the process of creating, testing, publishing, and maintaining a Web site. The Future of Web-Based Multimedia will be more exciting and more embedded into everyday events.

Learning Insight

Multimedia is an integral component of the Web because it is the integration of a variety of media such as text, images, video, animation and sound. Each one of us must learn about web-based multimedia because business and individuals need to understand the characteristics of the various types of multimedia elements and the impact of adding them to a website. Of its advantages is that it can deliver some content that could not be delivered, can address a variety of learning styles and many ideas are easier to convey in multimedia format. In contrary, the Web based multimedia disadvantages are that the cost of hosting and delivering the multimedia needs to be considered and the impact on visitors that have slow Internet connections or low bandwidth caps. This will be more exciting and more embedded into everyday events. In the vast changing times technology, I'd also evolving where it will support mobile multimedia. The usage of multimedia applications that are tied to a geographical location or current status and that involve user-generated content will also likely continue to grow.


Chapter 12

Information System is a system used to generate the information needed to support the users in an organization. Types of Information Systems namely: Office and User Productivity Support Systems; Transaction Processing Systems (TPSs), Decision Making Support Systems; Decision Support Systems (DSSs); Geographic Information Systems (GISs); Integrated Enterprise System; Design and Manufacturing Systems; and also the Artificial Intelligence Systems. However, the development of a system from the time it is first studied until the time it is updated or replaced. The approaches to a System Development that can be could as traditional approach or the waterfall. The System Development Life cycle phases are carried out in a present order the Preliminary investigation; System analysis; System design; System acquisition; System implementation; and System maintenance. The Iterative Approach is system that is developed incrementally and called prototyping.

Learning Insight

Information system is very essential especially to the organization because it will generate information needed to support their institutions. This information system has its various components namely: people, hardware, software, data and procedures that are necessary in order to maintain an information system in an organization. Some information systems are designed for management decision making. All those systems have its functionality and usage which makes the job done easily without feel of any difficulties because it is designed to help an organization transaction efficiently. The information system department are the responsible for system development because it is their duty to secure an organization computer, system, and other technology. The development of a system from the time it is first studied until the time it is updated or replaced. The system development life cycle is very important because each phase of the system development life cycle produces some types of documentation to pass on the next phase.


Chapter 13

Approaches to a Program Design and Development are the Procedural Programming to program design in which a program is separated into small modules that are called by the main program or another module when needed; Object-Oriented Programming (OOP) that consist of a collection of objects that contain data and methods to be used with that data; Aspect-Oriented Programming (AOP) separates functions so program components can be developed and modified individually from one another; Adaptive Software Development is designed to make program development faster and more efficient and focuses on adapting the program as it is being written. However, The five phase of Program Development Life Cycle (PDLC) are the Problem Analysis, Program Design, Program Coding, Program Debugging and Testing and Program Implementation and Maintenance. Tools for Facilitating Program Development are the Application Lifecycle Management (ALM) Tools, Application Generators, Device Development Tools, Integrated Development Environments (IDEs), Software Development Kits (SDKs) and the Application Program Interfaces (APIs). Yet, Programming Language is a set of rules, words, symbols, and codes used to write computer programs. The Categories of Programming Languages are the following: Low-Level Languages, High-Level Languages, Fourth-Generation Languages (4GLs) and so.

Learning Insight

The most common approaches to program design and development are the procedural programming, object-oriented programming (OOP), Aspect-Oriented Programming (AOP), and Adaptive software development. Each approach has its characteristics that are functional and useful in a such development. Procedural Programming is an approach to program design in which a program is separated into small modules. This approach allows each procedure to be performed as many times as needed and multiple copies of code not needed. Object-oriented programming (OOP) is a collection of objects that contain data and methods to be used with that data. Aspect-oriented programming (AOP) can be easily reuses with separated nonrelated objects. Adaptive software development is a faster and more efficient and focus on adapting the program as it is being written. All the life cycle is very crucial in terms of the program development because each phase of the program development life cycle produces some type of documentation to pass on the next phase. Computer language is language is used to write computer programs and it needs appropriate software for the programming language being used. It is categorized by their level or generation. Thus, in a vast exchanging time there were a lot of languages evolved because people are not really contented in only one language.


Chapter 14

Database is a collection of related data stored in a manner that enables information to be retrieved as needed. This is typically consists of tables, Fields (columns) and Records (rows). Data Concepts and Characteristics of a database can be in a Data Hierarchy in which the fields/columns will hold single pieces of data, Records/rows is the groups of related fields, tables is a collection of related records and as well as a database contains a group of related tables. Data Definition is the process of describing the properties of data to be included in a database table. Single-User Database System is designed to be accessed by one user and widely used for personal applications. Multiuser Database System is designed to be accessed by multiple users.

Learning Insight

Database is a collection of related data stored in a manner that enables information to be retrieved as needed. This typically consist of table, fields, and records that are important to make such databases. Using database, it will decrease the level of redundancy, easier to secure, faster response time, and it will be increased data accuracy. In a contrary, database will be increased vulnerability and it necessary to have backup. The database has its model these are hierarchical and network database models and relational database model. The difference between this work model is that hierarchical and network database models allow both one to many and many to many relationships between data elements and it is organized data in a tree structure. While the relational database model is most widely used database model today and the data is organised in tables related by common fields. However, cloud database is typically built using a cloud provider and individuals can create via Microsoft access webpages. To make the cloud database functional the visitors make request by filling out a webpage form and selecting an option from a new displayed on a webpage form.


Chapter 15

Hardware Loss occur when a personal computer, USB flash drive, mobile device, or other piece of hardware is stolen, lost, damaged, or experiences a system failure. Hardware Damage occur from power fluctuations, heat, dust, static, electricity, water, and abuse. System Failure and Other Disasters is the complete malfunction of a computer system. Protecting Against Hardware Loss, Hardware Damage, and System Failure the door and Computer Equipment Locks. Software Piracy is an unauthorized copying of a computer program occurs when an individuals make illegal copies of software to give to friends. Digital Counterfeiting is the use of computers or other types of digital equipment to make illegal copies of documents. Information Privacy is the rights of individuals and companies to control how information about them is collected and used. Protecting the Privacy of Personal Information is to safeguard your e-mail address, Be Cautious of Revealing Personal Information, Use Filters and Opt Out, Secure Servers and Otherwise Protect Personal Information and Properly Dispose of Hardware Containing Data.

Learning Insight

Nowadays, there are several security concerns related to computers that users should be concerned about, including having a computer or other device stolen, losing important documents, losing a smartphone containing contacts and other important data, and buying pirated or counter field products. All of this can be address and lessen the number of security concerns of a users by being a responsible enough and used our common sense because it is our belongings. Each one of us must be concerned about information privacy because it is the rights of individual and companies to control how information about them is collected and used. Thus, we should also be cautious of revealing personal information because there is a big possibility that they will use it to fool other people and in a bad way. The first thing to do is to safeguard your E-mail address, use filters and opt out, secure servers and otherwise protect personal information and properly dispose of hardware containing data so that know one can see it and use in the other purposes.


Chapter 16

ntellectual Property Rights to which creators of original creative works are entitled and indicate who has the right to use, perform, or display a creative work. Ethics is an overall standards of moral conduct and can vary with individual and religious beliefs, country, race, or culture. Computer use can cause physical injuries such as eyestrain, blurred vision, fatigue, headaches, Wrist and finger pain, Repetitive stress injury (RSI) and etc. There is a lot of environment concerns such as the Green Computing is the use of computers in an environmentally friendly manner and recycling and Disposal of Computing Equipment. There is legislation to protect intellectual property rights, such as: Family Entertainment and Copyright Act of 2005, U.S. Ant cybersquatting Consumer Protection Act of 1999 and Digital Millennium Copyright Act (DMCA).

Learning Insight

Intellectual property rights are a right to which creators of original creative works are entitle and indicate who has the right to use, perform or display a creative work. Ethics is an overall standard of moral conduct these are the personal ethics, business ethics and computer ethics. The ethical use of copyrighted material serves as resources and information, business practices and decision making. However, in the field of health access the computer usage can cause physical injuries. The emotional health has raised concerns in the increase of computer usage and mobile devices in the home and offices. We cannot day the fact that using computers has its negative impact to our health because it can increase diseases. In addition, the computers disadvantage of using computer is that the user unable to stop using computer and they may over use it. This is also having a significant consequence such as the relationship problems, jobless and academic failure. The computer users may be addicted and increasingly being tied to crime and even death. However, environmental concerns are also the most well-known issues in our society which can be fixed and can take an action of it. The most efficient solution for this environment concerns are the green computing, recycling and disposal of computing equipment because we can be able to minimize the population in our society and we can conserve and save energy without wasting electricity by doing an alternative power.