Minggu, 27 November 2011

Learning Objective PTI

CHAPTER 1

Ø  Computers and their applications are involved in all aspects of our daily life and almost activity in our life use computer to make our life easier.
Ø  Charles Babbage and Lady Lovelace are the person who have ideas that led to the development of the modern computer..The computer is an incredibly versatile tool.
It can compute your taxes or deploy a missile. Circumstances and ideas that led development of modern computer because people needs grew more and more various, based on what they want and what they need.
Ø  Trends in evolution of modern computers began with discovered first microprocessor by Intel engineers & PC revolutions in 
Ø  Relationship between hardware and software are computer’s versatility divide into 2 parts, hardware (physical part) & software (instructions tells hardware how to transform/ process input data into output. Without them or each one of them, computer is nothing
Ø    Five major types of computers today and their principal uses 
1.      PC’s (word processor, accounting, gaming, digital music & videos)
2.      Workstations (massive computing power used for high-end interactive applications)
3.      Portable Computers (no need desktop, easy handle & bring anywhere)
4.      Servers (provide software & other resources to other computers over network)
5.      Mainframes (big computing jobs, multiple communications at one time through process of time sharing)
6.      Supercomputers (fastest access, most powerful computers made)
Ø  Explosive growth of internet changing way people use computers and IT because with internet, many people buy & use computers each day to access internet network
Ø  Today’s information age differs from other times in history and prehistory because back then in history of society we have had agricultural & industrial age. Now, peoples earn livings working with words, numbers & ideas
Ø  Social and ethical impact of IT on society: threat to personal privacy, hazard of high-tech crime, abuse information, emergence of bio-digital technology, dangers dependence on complex technology

CHAPTER 2
         
·         Computers manipulate information by performing arithmetic/logical (decision-making) operations. Finally, the information being communicated the world outside. Inside computers, information can be move and store in memory
·         Basic structure and organization of computer are computers has four main components, there are input & output devices, Central Processing Unit (CPU), also memory & storage devices
INPUT DEVICE →  PROCESSOR  → OUTPUT DEVICES
           (keyboard, pointing devices)               (CPU)         (display/video monitor,printer,speakers)
for memory and storage devices, each component attach on processor.
·         Computer system’s principal internal components is Central Processor Unit (CPU), it functions are: interprets & executes instructions in each program, supervise arithmetic &logical data manipulations, communicates with other parts of computer system indirectly, extraordinarily complex collection of electronic circuits and housed along with other chips & electronic components
·         Computer typically has different types of memory and storage devices it happened because people’s need of it is full of variation

CHAPTER 3

o   Examples of input devices, how they make computer useful
1.      Keyboard standard, ergonomic, wireless, folding, one-handed, membrane’s printed
2.      Pointing devices:
Mouse
Touchpad
Pointing stick
Trackball
Text Box: gambar 1.keyboardJoystick
Graphics tablet
Touch screen
Stylusmouse
3.      Reading Tools; optical mark, magnetic-ink character, bar code, pen scanner, tablet PC, smart whiteboard, RFID
4.       Digitizer; scanner, digital camera, video digitizer, videoconference, audio digitizer, speech recognition software, sensors

o   Examples of output device,how they make computer useful
1.      Screen Output (monitor)
2.      Paper Output; impact and non-impact printer, multifunction printer, plotter
3.      Fax Machines and Fax Modems
4.      Audio Output; sound card, synthesizers
5.      Other Control Machines; robot arms, telephone switchboards, transportation devices, automated factory equipment, spacecraft, force feedback joystick
Computers begin more useful because it’s not just receives, stores & manipulates information but also provides & gives something that we need, in certain different forms
o   Computer typically has different types of memory and storage devices it happened because people’s need of it is full of variation
o   Diagram how the components of a computer system fit together.


CHAPTER 4

o   Fundamental categories of software are :
1.      Compilers and other translator programs: enable programmers to create other
software
2.      Software applications: serve as productivity tools to help computer users
solve problems
3.      System software: coordinates hardware operations and does behind-the-scenes
work the computer user seldom sees
o   Computer system’s hardware equipped to produce whatever output a user requests. 
Relationship of algorithms to software 
§  Programmers begin with an algorithm: a set of step-by-step instructions written in a natural language, e.g., English.
§  The steps are often ambiguous, error-prone generalities.
§  The steps are translated into the vocabulary of a programming language.
       
o   Factors make computer application a useful tool
1.      Replacing printed documentation with other forms
2.      Upgrade to adjust with new circumstances & software conditions
3.      Compatibility
4.      Disclaimers, software manufacturers not responsible with the software deformity after being installed & used
5.      Licenses, software can’t legally duplicated
6.      Distributed via direct sale, retail, mail order, website, website & copyrighted
o   Role of the operating system in modern computer system it is hardware-software connection. Envisioned to handle complex input our output operations by communicate with a variety of disk drive
o   File system organized with logically by system folders
o   Evolution of user interfaces from early machine-language programming to futuristic virtual-reality interfaces starts with Desktop Operating System, Graphical User Interface,Multiple User Operating Systems , Finally for the future there will be interfaces around emerging development technologies
o   Unauthorized copying software against the law cause a loose of billion dollars each year in business sector

CHAPTER 5
·         Word processors  revolutionized with processing handwritten words. Otherwise, desktop publishing revolutionized with saves money & time efficiently
·         Basic functions and applications of spreadsheets and other types of statistical & simulation programs is for money managers, automatic mathematics, statistics and data analysis, scientific visualization, computer modeling & simulations
·         Computers can be used to answer “What If?” questions, because with spreadsheets they can allow you to change numbers & instantly see the effect of those changer also equation solvers
·         Computers are used as tools for simulating mechanical, biological and social systems because it can create abstract models of objects, organisms, organizations & processes

CHAPTER 6

·         Contrast types of computer graphics programs
1.      Painting: paints pixel on the screen with pointing device moves translated into lines and patterns on the screen
2.      Image Processing: manipulate photographs/other high resolution images
3.      Drawing: stores a picture as a collection of lines and shape
4.      3D Modeling Software: create 3D objects with similar tools in drawing software
5.      CAD: create design on screen for products ranging from computer chips to public buildings
6.      CAM: the process data related to product design are fed into a program
7.      Presentation Graphics: create visual aids for presentation, slide show directly.
·         Computers changing way professionals and amateurs works with video, animation, audio and music because these programs makes people work in simply way
·         Relationship between hypermedia and multimedia is hypermedia refers to information linked in non-sequential ways not only combines text & numbers, but also all kinds of multimedia, like graphics, video, animation, etc
·          Present applications for multimedia technology is just like all the programs above. Otherwise for the future, there are Virtual Reality, Tele-immersion & Augmented Reality

CHAPTER 7

·         Database is collection of information stored on computer disks.  consists of database program
·         Problems that can be solved with database software like storing large quantities of information, retrieving information with quickly & flexible, organize-reorganize information database printing output in variety ways
·         Kinds of database software, simple file manager complex relational database are batch processing, real-time computing and interactive processing.
·         Database operations are: storing (entering records); sorting (rearrange records); updating (renewing record’s field); querying (find records that match specific criteria); and summarizing information (the conclusion we get from the record’s field)
·         Easily accessible databases makes lives safer/more convenient because there are many kinds of database software & we just have to choose what would likely we need. Then, database systems, can we use to save our personal information that we might forget if we don’t write it down somewhere.
·          Ways databases threaten our privacy because database load personal information, which might be great value for someone. This information could be privacy that can maintain our dignity and freedom

CHAPTER 8
·         Basic types of technology that make telecommunication possible is Geostationary Communications Satellites that match the Earth’s rotation, so they can hang in stationary position relative to the spinning planet below, relaying wireless transmissions between locations on the planet
·         Local Area Networks (LAN) computers are physically close to each other, usually in the same building or cluster of buildings. Each computer & peripheral is an individual node on the network. This node connected by cable
·         Uses of :
–E-mail: send and receive messages to others on network(with HTML)
-Mailing List: participate in e-mail discussion groups on special-interest topics
-Newsgroup: public discussion on a particular object
-Computer Telephony: messaging system that can store, organize and forward messages
·         How wireless network technology transforming ways people work and communicate  because it provides practical solutions. A lightning-fast network connection to desktop is of little use, when bandwidth is less important than mobility and portability
·         Current trends in telecommunications and networking like video rentals, cable TV, newspapers, and magazines will be transformed or replaced by digital high-bandwidth interactive delivery systems of the future

CHAPTER 9

·         Internet was created with the build of ARPANet (Advanced Research Projects Agency Network) in 1969 by team of visionary computer sciences developing request of the Department of Defense, because the world needs something that making connection or network easier, simple,and to help us in academic, research, government, and commercial institutions.Peer-to-peer networking philosophy and protocols were copied in other networks in the 1980s .Disbanded in 1990, having fulfilled its research mission, but its technology spawned the Internet.
·         Transmission Control Protocol/Internet Protocol (TCP/IP) Technology is the heart of internet that allows cross network communication.
·         Technology that makes web work as a multimedia mass medium are some utility’s software that can connect to programs that we are working on it
·         Tools to build website is HTML (HyperText Markup Language)
·          Important social and political issues raised by the growth of the internet: filtering software to combat inappropriate content, digital cash to make online transactions easier and safer, encryption software to prevent credit card theft, digital signature to prevent e-mail forgery, access & censorship, and digital divide


CHAPTER 10

·         Types computer crime involves :
1.      Spoofing: the use of a computer for stealing passwords
2.      Identity theft: the use of computers and other tools to steal whole identities
3.      social engineering: slang for the use of deception to get individuals to reveal sensitive information
4.      Online fraud
-          87% related to online auctions
-          Average cost per victim: $600
How to prevent this crime: make all online purchases using (separated) credit card, make sure a secure web is managing the transaction, don’t disclose personal information over the phone & shred sensitive information
·          Security issues facing computer users, system administrators, law enforcement are security measures prevent crime, but can also post threats to personal privacy, and system administrators play a key role in security and back-up.
·          Computer security relates to personal privacy issues with active badges, it can simultaneously improve security and threaten privacy
·         Security and computer reliability related because computer security involves more than protection from trespassing, sabotage & other crimes. Then, software errors and hardware glitches account for some of the most important security issues

CHAPTER 11

·         Computer changed people work in factories, offices, home, and variety industries because computers have a big impact on it. Now there are automated factory that is more efficient but keep traditional factories running with workers on it. Also automated office, with its evolution: enterprise computing, workgroup computing, electronic commerce, electronic cottage & paperless office
·         Computer changed quality job, in positively way, computers have caused more problems solved than workers did. In negatively way, computers technology to track, record & evaluate employee’s performance can raise issues for the employee itself
·         Information age places new demands on our educational system because education provides technological familiarity, literacy, mathematics, culture, communication, and learning how-to-learn. This is for students in the information ages
·          Computer are used in classroom is program that usually computers have in classroom, like: Computer Aided, Programming, Productivity, Digital, and others

CHAPTER 12

·         Business organization as system by using the value chain model is organization performs activities to provide products & services for customer
·         Business organization from the viewpoint value chain model divides activities of organization in 2 types: primary and support activities
·         Transaction processing system support business processes because it can keeps tracks of routine transactions by information system
·         Enterprise resource planning change the flow of information within & among business organization because it’s emphasis is to improve the free flow of information between different parts of a firm
·         Computers support the work of managers with technology that helped the manager everything about making decision and Executive Information System (EIS) to monitor important economic and social trends affecting the organization.
CHAPTER 13

·         Phases of company goes through using internet for business like Amazon.com that leveraged the internet’s unique ability to deliver huge amounts of information rapidly & efficiently
·         Forms of electronic commerce are business-to-business, business-to-consumer, and consumer-to-consumer
·          -Intranet
Characteristic: internal information system based on internet client/server activities between individuals & departments within an organization & made from physical technology & information content
Purpose: Middleware & TCP/IP
Uses: as information access for employee, collaboration and teamwork in US, and internal business transaction
-Extranet
Characteristic: secure private, public network & virtual private
Purpose: connects intranets of two or more companies in a business alliance & enable global business strategy of companies to build alliances vendors, suppliers & other organizations internationally
Uses: increase speed business-to-business transactions, reduces errors in intercompany transactions, reduce costs of telecommunications, increase volume business with partners, allows exchange business-to-business documents, streamlines checking inventory and order status from suppliers & enables collaborating with business partners on joint projects
·         Design and use of public web sites for supporting business-customer transactions by it speed & secure transactions, up-to-date product selection, ease of use & after-sale features
·         Technical requirements of electronic commerce by web server and e-commerce software
·         Ethical issues of electronic commerce are clear & explicit statement of organization’s privacy policy; policy statement addressing situations in which a person’s permission must be secure before his/her ID, photo, ideas, or communications are used/transmitted; clear policy stating how company will inform customers of the intended uses of personal information gathered during an online transactions & how the company will secure permission from the customer for those uses; statement that address issues of ownership with respect to network postings and communications; and policy of how company monitors/tracks user behavior on web site

CHAPTER 14

·         Process of designing, programming & debugging a computer program involves 4 steps: 1) Define and understand the problem; 2) Devise and refine plan for solving problem, like test algorithm; 3) Carry out the plan with writing the program; 4) Evaluate solution by testing and debugging the program
·          Different programming language and examples are: Machine language (instruction of 4 basic arithmetic operations, comparing pairs of numbers, etc.); Assembly language & High-Level language (C++, Java, Basic, etc.)
·         Step in life cycle of an information system: Investigation , Analysis,Design ,Development , Implementation , Maintenance , Retirement
·          Relationship between computer programming & computer science is the object of focuses on the process of computing
·         Problems faced by software engineers in trying to produce reliable large systems are errors of mission, syntax, logic, clerical, capacity & judgment errors
 Software companies provide only limited warranties for their products because the additional precautions needed to make the software work better would inflate the cost & extend the time needed for development and only large companies are able to sustain the pressure such scenario

CHAPTER 15

·         Two basic approaches of artificial intelligence research are use computers to simulate human processes (best way to do something with machine often very different from the way people would do) & designing intelligent machines independent of the way people think (more common approach)
·         Several hard problems that artificial intelligence research has not been able to solve yet are three inherent problem :
1.      Most people have trouble knowing and describing how they do things.
2.       There are vast differences between the capabilities of the human brain and those of a computer.
3.      Even the most powerful supercomputers can’t approach the brain’s ability to perform parallel processing..
·         Practical applications of artificial intelligence are searching (looking ahead possibilities generated by each potential move); heuristics (rule of thumb); pattern recognition (identifying recurring patterns in input data) & machine learning (learn from experience)  
·         Robot is computer-controlled machine designed to perform specific manual tasks.
Several example illustrating what robots can do are :
1.      save labor costs
2.      Robots can work 24 hours a day, 365 days a year, without vacations,
strikes, sick leave, or coffee breaksworks anytime
3.      improve quality, increase productivity, doing repetitive jobs and ideal for dangerous, uncomfortable or impossible for human 

Tidak ada komentar:

Posting Komentar