Please enable JavaScript.
Coggle requires JavaScript to display documents.
STRUCTURED ALGORITHM & PROGRAMMING [ Chapter 1 ] - Coggle Diagram
STRUCTURED ALGORITHM & PROGRAMMING [ Chapter 1 ]
Computer: an electronic machines that can receive, process or store data according to a set of instructions
input >process>output
CATEGORIES OF COMPUTER
Personal computer
Laptop,tablet (suitable to be placed on table)
embedded computer
Small& embendded into devices
main frames
Large ,expensive ,powerful server that can handle many connected users
mobile computer
smartphone,digital camera( portable& fits by hand carrying)
Server
Computer dedicated to provide services to another computer in network (small cupboard)
Super computer
-Capable of processing many trillions of innstructions in a single second
-a room full of equipment
COMPUTER HARDWARE
network devices
System unit
Input&Output devices
Memory & storage devices
COMPUTER SOFTWARE
Software : series of related instructions, organized for a common purpose that tells the computer what tasks to perfom and how to perfom
System software : controls and maintains the operations of computer and devices
Operating system
utility programs
Computer languages
Application software
an application
SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)
Planning phase
Analysis phase
Design phase
Development phase
testing phase
implementation phase
maintenance phase
WRITING A PROGRAM
Editor > source file > compiler > machine code & library files > linker > executable program
SOCIAL NETWORKING MEDIA
Website that encourages members in its online community to share their interests,ideas,stories ,etc with other registered users
DATABASE ,BIG DATA& ANALYTICS
Collection of data organized in a manner that allows access ,retrieval and use that data
BIG DATA : refers to the large , diverse sets of information that grow at ever-increasing rates
Vability
model's ability to represent reality
Value
the worth of data to the customers
Variety
need to be identified& normalized before computing
Veractly
uncertainly in the data not be trusted
Velocity
speed of data
Validity
accurancy the data for intended use
Volume
amount of data to be processed
Votatility
timeframe data before considered irrelevant,historic or not valueble
COMPUTER SECURITY
Digital security risk: event or action that could loss of or damage to computer/ mobile devices
Internet and network attacks
Unautorized access and use
Hardware theft
Software theft
Information theft
System failure
MALWARE ( MALICIOUS SOFTWARE)
Virus
Damaging program that affects,infects computer or mobile device
Worm
Program that copies itself repeatedly
Trojan horse
program that hides within or looks like legitimate program
Spyware
Secrectly placed on computer or devices without user's knowledge
Secretly collect information about the user, then communicates the information
Rootkit
allows someone from remote location to take full control of computer or device
Adsware
displays an online advertisement
ETHICS
Moral guidelines that govern the use of computers, mobile devices,information systems & related technologies
Intelectual property rights
Computer ethics
Code of conduct
Information privacy
GREEN COMPUTING
Environmentally responsible use of computer and related resourcess
Power down CPU and all peripherals during extended periods of inactivity
Power up and power down energy intensive peripherals such as laser printers according to need
Minimize the use of paper and properly recycle waste paper
Dispose of e-waste according to federal ,state ,local regulations
MEMORY
Writing: process of saving data from memory to storage medium
Reading: process to recall data from storage medium to memory
storage unit > application program > memory
main memory
Ram : temporary storage and volatile
Rom : stores information permanently& not volatile
Secondary memory
Provides semi -permanent data storage capability