1 / 24

Overview of Computers

Overview of Computers . How have computers changed? How have the way we use computers changed? Terms World wide web Computer chip Time sharing. Computer Categories . Microcomputers Minicomputers Mainframe computers Supercomputers. Computer Components . Hardware Software Programs.

rupali
Download Presentation

Overview of Computers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of Computers • How have computers changed? • How have the way we use computers changed? • Terms • World wide web • Computer chip • Time sharing

  2. Computer Categories • Microcomputers • Minicomputers • Mainframe computers • Supercomputers

  3. Computer Components • Hardware • Software • Programs

  4. Computer Components • Memory • Main • Secondary • Store-program concept • CPU • Input • Output • Network Connection

  5. Main Memory • Memory cells • Address • Byte • Bit • RAM (volatile) • ROM (boot)

  6. Secondary Memory • Disk drive • Floppy • Hard disk • CD-ROM • USB/Flash Drive • Others?? • Files

  7. CPU • Coordinate functions • Perform math and logic • Fetching instruction

  8. Input/Output • Keyboard/Monitor • Function Keys • Cursor • Mouse • Icon • Printer • Others?

  9. Computer Networks • LAN • Server • Internet • Digital versus Analog • File servers • Client/server • Peer-to-peer

  10. World Wide Web • Links • Web browser • Platform independence!!! • Multimedia • Applets

  11. 1.3 Computer Software • Operating System • Booting computer Page 13 • Application Software

  12. Programming Languages • Machine language • Assembly Language • High Level Language

  13. Object Oriented Programming • Object • State • Behavior • Methods • Behavior • Class • Properties/attributes

  14. Processing High-Level Language programs • Source code • Object code • Compiler

  15. Java Is Different • Source code • Byte code • Java Virtual Machine (JVM Interpreter • Applet (where stored??) • Application

  16. Problem solving and classes • Plan First, before typing!!!(also, budget time for the unexpected) • Plan for classes (pg 21) • Problem, Analysis, Design, Implement, Test, Maintain • Plan for reuse • Desk check solution • Document!

  17. Case Study • Problem • Analysis • Design • Implementation • Testing • Maintenance

  18. NameInStars public class NameInStars { private String name; public NameInStars(String nam) { name = nam; } public String surroundNameInStars() { return "*****" + name + "*****\n" + "*****" + name + "*****\n" + "*****" + name + "*****"; } }

  19. ShowNameInStars import javax.swing.*; public class ShowNameInStars { public static void main(String[] args) { // Get the user's name String userName = JOptionPane.showInputDialog("Enter your name"); // Create a NameInStars object that stores the user's name. NameInStars you = new NameInStars(userName); // Display your name in stars three times JOptionPane.showMessageDialog(null, you.surroundNameInStars()); } }

  20. Ethics • Privacy and data misuse • Programmers get access to large amounts of data • Using the data for any purpose than is intended is fraud or theft

  21. Hacking • Entering anyone’s computer without permission is illegal, just as entering a persons home without permission is illegal. • Viruses are an incredible drain on our economy.

  22. Piracy and plagiarism • Having software that you have not properly licensed on your computer is illegal. • In your professional world you must make sure that your organization is 100% legal. • Plagiarism we have discussed

  23. Misuse of resources • Protect your access to the network. • Only use the network for it’s intended purposes. • Mass Emails can be a drain on network resources and offending to other individuals.

  24. Miscellaneous • Computer resources belong to the company. • Company Email can legally be monitored • It can be subpoenaed for court • Don’t say anything in an Email that you would not want to see posted on an internet site.

More Related