1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Science
the study of computers and computational systems.
Data vs. Information
transformation of raw data (unprocessed facts) into meaningful information through electronic processing
Importance of computer science
Used in business, banking, communication
Improves efficiency + speed
The Computing Cycle
involves Input (data entry), Processing (manipulation by the CPU), Output (results), and Storage (keeping data for future use)
Role of Computer Science in Business
Data Management: Utilizing databases to store client information, inventory, and financial records securely
Decision Support: Using software to analyze market trends and financial data to make informed management decisions
Automation: Reducing human error and increasing speed in repetitive tasks like payroll or invoicing
Communication: Facilitating global collaboration through networks, email (Outlook), and shared digital workspaces
Evolution of Computers (Generations)
First:
1940s–1950s- Vacuum Tubes
Enormous size, high heat, expensive, and used machine language.
second:
1950s–1960s- Transistors
Smaller, faster, and more energy-efficient than vacuum tubes.
third:
1960s–1970s- Integrated Circuits (IC)
Used "chips" to increase speed; introduced keyboards and monitors.
fourth:
1970s–Present- Microprocessors
Thousands of ICs onto a single silicon chip (the birth of Personal Computers).
fifth:
Present–Future- Artificial Intelligence (AI)
Focuses on parallel processing and natural language recognition.
Hardware (physical parts)
things of a computer you can touch
Keyboard
Mouse
Monitor
CPU
Software (programs)
things you can’t touch. consists of the instructions that tell the hardware what to do.
Operating system
Apps (Word, Excel)
Internal Components
Central Processing Unit (CPU): Known as the "brain" of the computer, it executes instructions from software and hardware
RAM (Random Access Memory): Volatile "short-term" memory used to store data currently being processed for quick access
ROM (Read-Only Memory): Non-volatile memory that contains permanent instructions needed to start the computer
Motherboard: The motherboard is the main circuit board that connects all components
Buses:buses are the communication pathways (data highways) that move information between them
Central Processing Unit (CPU):
Known as the "brain" of the computer, it executes instructions from software and hardware.
RAM (Random Access Memory):
Volatile "short-term" memory used to store data currently being processed for quick access
ROM (Read-Only Memory)
Non-volatile memory that contains permanent instructions needed to start the computer
Motherboard and Buses:
The motherboard is the main circuit board that connects all components; buses are the communication pathways (data highways) that move information between them
Input Devices:
Tools used to provide data and control signals. Examples include the keyboard (text entry), mouse (navigation), and scanners
Output Devices:
Hardware that conveys information to the user. Key examples are the monitor (visual display) and printer (physical hard copies).
Hard Disk Drive (HDD):
Traditional magnetic storage; usually offers high capacity at a lower cost
Solid State Drive (SSD)
Newer technology using flash memory; significantly faster and more durable than HDDs, though often more expensive
USB Flash Drives:
Portable, removable storage used for transferring files between workstations
Storage Devices
Hard Disk Drive (HDD):
Solid State Drive (SSD)
USB Flash Drives:
Business Applications of Hardware
Server Hardware: High-performance computers designed to manage network resources and store company-wide databases
Point of Sale (POS) Systems: Specialized hardware (barcode scanners, receipt printers) used for retail transactions
Workstation Ergonomics: Selecting quality monitors and input devices to reduce employee fatigue and increase long-term efficiency
Network
a group of interconnected computing devices (nodes) that exchange data and share resources using common protocols over wired or wireless transmission media
Types of Networks
LAN (Local Area Network): Connects computers within a small, limited area like a single office, home, or building. It offers high data transfer speeds
MAN (Metropolitan Area Network): Covers a larger area than a LAN, typically a city or a large campus. It connects multiple LANs together across a town.
WAN (Wide Area Network): Spans a large physical distance, such as a country, continent, or the entire globe. The Internet is the most well-known example of a WAN.
Internet
public global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
public global network of interconnected computers that allows people all over the world to share information, communicate, and access services using websites, email, and apps.
Intranet
A private network contained within an organization. It is used by employees to share information, collaboration tools, and operational systems securely. it is protected by firewalls to prevent unauthorized access from the public internet.
Communication Protocols
TCP/IP (Transmission Control Protocol/Internet Protocol):
HTTP (Hypertext Transfer Protocol):
HTTPS (Hypertext Transfer Protocol Secure):
TCP/IP (Transmission Control Protocol/Internet Protocol)
the fundamental suite of communication protocols used to interconnect network devices on the internet and other computer networks
HTTP (Hypertext Transfer Protocol):
protocol used to transfer web pages and data between a web browser and a web server.
It allows users to view websites by sending requests and receiving responses.
HTTPS (Hypertext Transfer Protocol Secure):
The secure version of HTTP, which encrypts data to protect sensitive information like passwords or financial transactions.
Business Importance of Connectivity
Resource Sharing: Allowing multiple employees to use the same printer or access a centralized database.
Data Security: Implementing intranets and secure protocols (HTTPS) to protect company intellectual property.
Remote Work: Utilizing WANs and secure connections to allow staff to work from different locations while staying connected to the main office.
Operating Systems (OS)
critical system software that manages computer hardware and software resources, acting as an intermediary between users/applications and hardware
The Intermediary: It acts as a bridge, allowing you to interact with the computer without needing to speak "machine code"
Resource Management: The OS decides which programs get to use the CPU, how much RAM they can occupy, and how data is written to the storage drives
User Interface (UI): It provides the visual environment (icons, windows, menus) or command line where you perform your daily tasks
graphical user interface- users interact with computer by using icons, windows, menus and mouse
command line interface- user interacts with computer by typing text commands
types of operating systems
Desktop OS:
Microsoft Windows :
Standard for most business and office environments.
very familiar to most office workers.
Mac OS :
developed by Apple
Preferred for graphic design, video editing, and media.
known for its intuitive "plug and play" nature.
Linux:
developed by Open-source community
Used heavily in servers, coding, and specialized technical fields
can be complex but offers high customization.
functions of OS
Functions:
Runs programs
Manages hardware
Controls files
File and Program Management
One of the most critical daily functions of an OS is organizing and protecting business data.
File Systems: The OS organizes data into a hierarchy of folders and files, making it possible to retrieve documents quickly.
Process Management: It ensures that if one program (like a web browser) crashes, it doesn't necessarily take down the entire system or your unsaved work.
Access Control: The OS manages user accounts and permissions, ensuring that only authorized personnel can access sensitive financial or personnel files
Why the OS Matters to a Manager
Compatibility: You must ensure the OS you choose supports the specific accounting or management software your team needs to use.
Security: Regular OS updates are the first line of defense against malware and cyber-attacks.
Total Cost of Ownership: Beyond the initial computer price, managers must consider licensing fees (like those for Windows) and training costs for their staff
Digital security and backups
the protection of online identities, devices and systems from unauthorized access, disruption, and other threats.
Involves the use of strong passwords, antivirus softwares, security updates and safe browsing habits
data protection concept
Practices and measures to safeguard sensitive data from unauthorized access, corruption, loss, disclosure, or destruction throughout its lifecycle.
key principles of data protection concept
Confidentiality: Ensures only authorized users can access data
Integrity: Keeps data accurate, unchanged, and reliable
Availability: Ensures authorized users can access data when needed
password
A secret string of characters used to authenticate and verify user identity, restricting access to devices, accounts, files, and systems.
Authentication
process of verifying a user's identity, usually through something they know (password), something they have (security token), or something they are (biometrics like fingerprints)
Strong Password Criteria:
passwords should be complex, including a mix of uppercase letters, numbers, and symbols
Multi-Factor Authentication (MFA):
This adds a second layer of security, requiring a code from a mobile device in addition to a password
backup
a copy of data stored separately so it can be recovered if the original files are lost, damaged, deleted, or hacked.
types of backup
Local Backups: stores data on a physical device such as an external hard drive, USB flash drive, or another computer.
Pros: Fast recovery and full physical control
Cons: Vulnerable to physical threats like fire, theft, or hardware failure.
Cloud Backups: stores data on remote online servers through the internet such as Google Drive, iCloud
Pros: Accessible from anywhere and protected from local physical disasters.
Cons: Requires a stable internet connection and involves monthly subscription costs.
Internet Security Measures
tools, technologies, and practices used to protect devices, networks, data, and online communications from unauthorized access, cyberattacks, and data breaches.
Main Function of internet security measures
Protect sensitive information
Prevent unauthorized access
Reduce cyber risks
Detect and respond to security threats
internet security measures- Technical Measures
Firewalls: Software or hardware that monitors and filters incoming and outgoing network traffic based on an organization's security policies
Antivirus/Antimalware: Software designed to detect, stop, and remove malicious software like viruses, worms, and ransomware
Encryption: The process of encoding information so that only authorized parties can read it, especially vital when sending sensitive financial data over the internet (using protocols like HTTPS)
Secure Passwords and Multi-Factor Authentication (MFA): This adds a second layer of security, requiring a code from a mobile device in addition to a password.
internet security measures- Administrative and Physical Measures
Access Control- Limits data access via user accounts and permission levels.
Security Policies and Training-Establishes safe internet use rules, educates on phishing and scams.
Regular Updates and Backups-Software updates patch vulnerabilities, backups prevent data loss.
Business Management Perspective: The Cost of Data Loss
Reputational Risk: Losing client data can destroy trust in your business.
Compliance: Many industries have legal requirements for how long data must be kept and how securely it must be stored.
Disaster Recovery: A proper backup strategy ensures that a business can resume operations quickly after a system failure, minimizing costly downtime.