'Intro To IT' With You .
'Intro To IT' With You .
Technology can be away to make an impact, as well as accelerate changes around the
world.
It's not luxury, it's necessity .
Digitally native: is the name of new generation that is raised among pervasive environment.
First Generation:
1939-1955
vacuum tubes .
war era mainframes .
Huge, filled whole buildings, high electricity, high failure rate.
- Z1, Kunard Zuse, Germany.
- Colossus, Alan Turing, UK -> crack the Nazi codes "Enigma".
- Mark 1, Howard Aiken, USA.
Second Generation:
1956-1963
Transistors
Big, filled half rooms, faster them 1st, used punch cards as
input/output.
Third Generation:
1964-1970
Integrated circuits.
Lower costs faster, more efficient, smaller size.
Forth Generation:
1971-present
Microprocessors - CPU is a part of the microprocessor in the computer - “intel” .
Moor's low - silicon chips -double every 2years.
Embedded computers a microprocessor used as a component of a larger system that
preform specific tasks, they are operated by a firmware.
Servers is a Central computers that provides services other PCs over the network.
Faster processing power, serves multiple clients simultaneously "at the same time", Large
memory & storing capacity, connected via high speed network connection.
Supercomputer is a group of servers that provide critical mission " climate changes".
Faster & powerful then a server, thousands of cores, super speeds "Tera flops per
second".
The Internet:
Developed 1960s
used for research till 1980s
WWW - 1990s
The Journey of Computing
Institutional computing:
1950
corporate & government
Personal computing:
1975
schools & homes
Interpersonal computing:
1995
internet became Public
Collaborative computing:
2005
smartphones, wed 2.0 sites collaborating & contributing
Chapter 2
Hardware
Storage
Processing devices
Communication
Binary system: is the system used to store, process and exchange data in computers.
Its language has two symbols ( 1 or 0 )
Bit is the binary digit, smallest unit of information that the computer
Process.
Easy to store, process, read.
It represent numbers, videos, text, photos, instructions.
1 Byte = 8 bits
N bits represent 2^N options
Converting between binary and decimals
I- binary to decimal
0 I 1 O O O 1 0 Binary bits
Same
1 Weight Levert
12864 3216 8 4 2
time
-
6432 - - -
2 -
Value in decimals
So it's 64+32+2= 98
2- decimal to binary
Divide by 2 till we reach 1, the number would be odd or even
odd = 1 , even = 0 even number in binary end with o, odd numbers end
I 0 I 1 I 0 I
CPU: Central processing unit, electronic chip, it's boated in the motherboard, measured
in hertz.
1 GHz is equal to I billion clock cycles per second.
Older PCs 32 bits.
New PCs 64 bits.
Embedded systems 8 & 16 bits.
CPUs
1- Single Core: increase speed by increasing char speed but it's limit is overlocking.
2- Multi Core: multiple CPUs on single chip, parallel processing.
3- Cache Memory: internal storage of data in CPU.
CPU compatibility:
All softwares are not compatible with every CPU.
Newer versions can process instructions of older models but not vice Versa.
Memory
Random Access Memory “RAM”:
For primary storage or main memory.
Temporary storage, unique addresses, data can be stored randomly, very fast access,
data erase did power goes off.
Flash memory:
Read/Write/Erase data, data won’t be erased if power goes off.
Storing diverse:
Hard drives:
Secondary storage, stores programs & data, slower than main memory, huge storing
capacity.
Internal or portable.
Cloud storage:
Easy to access as long as you have internet connection, huge storage capacities, online
backup.
Green Computing
Use computer and related resources in an environmentally responsible manner.
Chapter 4
Software
Software is the link between humans and the computer, it's a set of instructions that tells
the computer what to do, how, where to send the result.
Desktop Apps
Applications
I Web Apps
i.
Mobile Apps
Software
Operating systems
System software
I Utility programs
Application software: designed to preform a group of functions for the benefit of the
user.
Some sensors:
Accelerometer: speed
Gyroscope: orientation
Magnetometer: directions
Barometer: atmosphere pressure
Proximity: the presence of nearby objects
NFC: near field communication
Software distribution:
Can be pre-installed in the operating system, download apps from digital distribution
platforms "AppStore, Google play, Microsoft Store", using server-side software.
Software issues:
Compatibility: designed for specifics OS, “cross-platform” is when a software can
run on more than one OS.
Minimum requirements: software won't work or be installed if it doesn't met with it.
Software maintenance:
Updating: minor enhancements & bug fixes, done frequently, changing the decimal
points.
Software I → 1.1
Upgrading: significant new features, every year or two, changing the whole version
number.
Win 7- → Win 10
Performance issues:
Network issues: slow connection, if the server is down; web based apps can't run,
far from the network coverage.
Smartphones issues: poor battery, low ram/storage, multiple apps running in the
background.
Rooting Android: Process of allowing users running the Android operating system to
attain privileged control (root access)
Copyright (to protect software owner rights): Is the legal right to copy, distribute, modify
and sell an original work.
Types:
Closed Source Code – not permitted to modify the code.
Open source code - right to use, modify and redistribute.
1
Algorithms:
A unified common language that all programmers understand, they convert it to software
using different programming languages.
Programming languages:
Low level: machine, assembly languages
High level: C++, Java, VB, Python, …
Programmers use high level languages, they are the people who write the software.
Debugging: to detect & correct errors.
Operating systems: Microsoft OS family, Mac OS, Unix OS “ used by internet servers,
enables timesharing”, Apple iOS “2007”, Google android, Chrome OS “ web-based”
Utility programs: analyze, configure, optimize or maintain a computer, Some are included
with the OS while others are stand-alone applications. “ Copy files, Compress files (eg:
zip), Virus protection, Disk Cleanup, Backup”.
Device drivers: small programs that enable communication with devices. "Keyboard,
printers, flash memory".
Some Computing devices have full OS in ROM, Others have only a part in ROM and the
core in the Hard Drive, Booting Process “Loads OS from the Hard Drive into memory
(RAM)”.
How computer works:
WIMP:
Graphical User Interface ( GUI ): Menu Based, Submenus, Pop up Menus, RightClick, Task
Bar, Any Icon, Start Menu.
Tiles on the Start Screen, Windows Icon Shortcuts, Mac Icon Dock.
SILK:
Gesture Based Interfaces “motion”, VR, Augmented Reality “ikea app, Pokémon go”,
Mixed reality “3d interactive holograms”, Voice Commands “ Siri, Alexa”.
Chapter 5
Artificial Intelligence
AI vs. Automation:
- Automation: bunch of machines doing a repetitive task without human intervention.
- AI: simulation of intelligent behavior in computers, that should be compared to the
humans intelligence, helps improve the automation process by learning and improving
itself, let the machine make selections and decisions based on different factors.
Narrow AI: the only form humanity had achieved so far, preform a single task within
limited context. " playing chess, purchase suggestions, translation engine, self-driving
cars".
General AI: " human-level, strong", understanding & reasoning it's environment like
humans.
Super AI: much smarter than the smartest human being in every field.
Graphics terminology:
Graphic types:
Color depth" bit depth": the number of bits devoted to each pixel.
- Monochrome → simple bit mapped, I bit per pixel can be 0,1 - black, white.
- Gray-scale → 8 bits per pixel, up to 256 shades of gray.
- Colored → 24 bits per pixel, RGB. Red, Green. Blue.
~
Image processing:
- Filtering & cleaning: eliminate red eye & facial blemishes.
- Can distort & combine photos → tabloids.
- Can fabricate images.
- Clear X-ray images.
- Natural language processing → cleaning captcha phrases.
Computer vision:
Field that include acquiring, processing, analyzing & understanding images.
- Object detection.
- Tracking.
- Action recognition.
- Facial recognition.
3D modeling software:
Process of developing mathematical representation of any surface of an object in 3d via
specialized software.
- Rotate and view from different Angeles.
- Create walk through 3d environment that exists only in memory.
- Blender, 3D Max, autocad,unity "game engine".
- Animation movies,3D home design.
Multimedia:
Computer information can be represented through audio, video, & animation in addition to
traditional media.
Animation:
Pictures are manipulated to appear as moving images.
Frame → one of the images which compose the complete moving picture.
Frame Rate → number of images changing in one second.
- Standard = 30fps
Computer animation:
- Used in tv and movies to create effect that is hard to achieve without computers.
- Most are made with CGI " computer generated imagery".
- Tweeting → creating the in between frames.
Video:
Series of bitmap images that when played back create the illusion of movement.
The quality depends on:
- Frame size.
- Bit depth.
- Fps.
↳frame rate
Data Compression:
Encoding information using fewer bits than the original representation.
I- Lossless: don't want to loss any of the original info.
- WinZip, WinRar.
- Not good enough for multimedia data.
2- Lossy: recover a representation similar to the original one.
- More practical
- Reduce the colors → reduce the bits.
- MP3, JPEG, MPEG Video.
- High compression ratios.
Digital Audio:
Using microphone to capture sound from electric waves → digital data by ADC "Audio
digitizer: captures sound (analog) and stores it as a data file ". les
- Sampled "digitally recorded". DAC Is the obssite
- Synthesized "generated - fake ": of it, it converts
- Electronic instrument that generates, create, produces sound digital data to
- Using mathematical formulas. analog wave and
plays it.
Samplers:
Electronic instrument that uses recording "samples" of sounds that are loaded or recorded
into it by the user.
Audio quality:
1 - The sampling rate: number of samples per seconds, Hz.
2- The sample size" bit depth": bits used to represent a sample" 0 , 1 ", bits.
3- The number of channels: mono 'ID', stereo "more then 2D''.
Ge ID
Audio formats:
- WAV, AIFF: uncompressed → window & Mac OS.
- MP3: l / 10 of the original.
- WMA: MP3 for windows.
- AAC: MP3 for Apple.
- OGG : MP3 but open source and freely available.
Hypertext: text that contains links, non-sequential information, non-linear travel through
pages.
Network types:
I- PAN (Personal Area Network): communication between one persons’ devices.
- Connecting AirPods to iPhone and iPad using bluetooth.
2- LAN (local Area Network): computers are physically close to each other.
- Every node has a unique ip address.
- Can be connected wire, wireless.
3- MAN (Metropolitan Area Network): large network for specific geographical area.
- Entire city.
4- WAN (Wide Area Network): network that extends over a large physical distance.
- Internet is the largest WAN.
- Each LAN site = mode on WAN.
Networking models:
I- Client / receiver model: one or more computers act as dedicated servers and the
others act as clients.
2- peer to peer model: every computer on the network is both client & server.
Networking software:
I- NOS (Network operating system): is system that is available on servers and handles
communication and requests from multiple clients.
2- Communication protocols: system of rules that allow two for more entities of a
communications system to transmit information.
- Protocols are required for data exchange.
2- Packets: the name of the small pieces that contain transmitted information over the
internet.
Making connections:
1- Modem connection: through telephone lines,conversion at both ends, up to 56.6 Kbps.
Wireless networks:
Computer network, uses wireless data connections between networkers nodes.
Examples:
- Wireless LAN. ->
local access network.
- Cell phone / modile network.
- Wireless sensor network.
Bluetooth:
Used for exchanging data between fixed and mobile devices over short distance.
- Communicate regardless of Os
- Uses low power, low cost, transmitters & receivers with long of 10-100 meters.
Specialized Networks:
Blockchain: system that records transactions across several computers that are linked in
peer to peer, transactions are verified by network nodes & recorded in a
public ledger.
Applications:
- Cryptocurrencies: digital asset designed to work as a medium of exchange that uses
strong cryptography to secure financial transactions.
Interpersonal Computing:
Human to human: 70% of connected time is to communicate with other users, chatting,
blogging.
Online Communication:
Allows people to interact while being physically located at different places in the world.
1- Synchronous Communication:
- Real time Communication between all parties, instant messaging, Audio & Video
Conferencing.
2- Asynchronous Communication:
- Posters & readers don't have to be logged in at the same time.
- Emails,SMS.
Email:
Messages distributed by electronic means from one to one or more receivers via network.
Email Server: handles & delivers email over the internet.
Common issues:
- Spam: unwanted junk mail.
- Attachment sizes.
- Email size limitations.
Audio Communication:
Enables two or more people to use the computer as a telephone conferencing system.
1- IP telephony or voice over IP (VoIP): use internet protocols to exchange voice .
2-voice mail: computer-based system that allows users to exchange personal voice
messages.
Video Communication:
Video teleconferencing: Communication between people in feel-time " zoom meeting ".
Benefits:
- No need to travel.
- Saves time.
- Share resources and collaborate.
Blogging:
I- Blogs (web log): ongoing online diary or commentary written by an individual.
2- Micro blog: posting small pics (Instagram).
3- Video blog (vlog): posting video.
Media sharing:
- Video shearing platforms: YouTube.
- Viral Video.
- Streaming: transmit or recivel ( dates "video" ) over the internet in continuous flow.
- Live streaming: recorded &broadcast in real time.
- Podcasting: digital recording, can be downloaded "audio".
Community collaboration:
Crowdsourcing: using the internet &the intelligence of the crowd to accomplish a task or
solve a problem for the benefit of all.
Forms:
- Crowdsolving: collaborative, holistic way using many people.
- Crowdfunding: collection of funds from the crowd to sponsor a project.
- Non-commercial work:anyone can contribute to it "Wikipedia".
Online gaming:
Gaming networks: playstation Network, Xbox Network,Nintendo Network.
Characteristics:
- Thousands of simultaneous players
- Players take roles in the virtual worlds
- Passionate addiction of the Players
- Cooperation among group of players required
Sharing resources:
I- Peer to Peer: sharing without posting on central server.
2- Grid computing: sharing processing power rather than data.
3- Cloud computing: from the internet.
Chapter 11
Computer Security & Risks
Computer Security: The protection of Computing systems & data from unauthorized
access, change or destruction.
Computer uses:
- Upholding laws:
Computer forensics: investigation of variety of Computer crimes, use special
softwares to find clues in complex cases, trace digital fingerprints "deleted files",
automated detection.
- Breaking the laws: viruses, identity theft…
Computer Crime:
- Cybercrime: any crime using computer or networks " company insiders → covered
up".
- Cyberstalking: repeatedly harm / harass people in a deliberate manner the internet.
(limit how much personal info you share )
- Cyber bullying: targeting children &young adults online (involves humiliation, rumors,
lies)
- Intellectual property theft: software piracy, plagiarism of copy righted text / songs,
illegal duplication of movies.
What is stolen?
Money, goods, info, software resources.
Computer theft:
- Theft of computer itself: the software & info on the computerare more valuable than
the hardware.
Social engineering:
- Spoofing: trick the target to extract secret info " internet technician → passwords".
- Shoulder surfing: used to obtain info by looking over the victim's shoulder.
- Phishing (fishing for sensetive info): is the act of attempting to acquire sensitive info
By: Masquerading as a trustworthy entity in an electronic communication
- Sending an email posing as a bank → fill a fake bank web form.
-As the users to reveal credit card numbersto prove age → makes no sense.
Identity theft:
Extract personal info commit a crime in another person identity.
- National ID, driving license, credit card number.
Software Sabotage:
Malicious software: used to disrupt computer operation, gather sensitive info, or gain
access to private computer systems.
I- Viruses: attached to a file/program & spread when files are exchanged via email
attachments or flash drives.
- When the virus program is opened/executed it:
- Damage the operating system.
- Display annoying pop-up messages
- Destroys or steals data.
- Viruses are cross-platform.
- Macro viruses: attach themselves to documents containing macros → set of
commands to automate repetitive tasks.
2- Worms: independed programs, capable of reproducing themselves, memory freezes,
spreads through the internet slowing it down.
- Famous worm: code red (2001)
Didn't attack PCs, it attacked internet servers running
Microsoft servers.
3- Trojan horse: disquise themselves as useful programs or apps, has hidden viruses.
Often posted in shareware, sound like games or utilities, act as a
backdoor → allow the attacher to control Your PC.
4- Spyware: gets installed & collects info without user's knowledge, slows down PC
performance " spybot, tracking software".
-Tracks: keystrokes, websites visited, screen displays.
5- Ransomware: malware that locks your computer & encrypts data in your hard drive,
you pay a ransom to unblock the files (by bitcoin because it is
untraceable).
- You get infected by opening an infected email attachment or
malicious link.
Passwords: used to restrict access to computers, to make it effective → don't use real
words, change it frequently ( have more them 8 characters, don't use your
name or birthday ).
Access privileges:
Use access control software, doesn't need to treat all users identically.
Firewalls:
protect from hackers, it filters info between a private system &the rest of the internet.
Could be:
- Software programs.
- Hardware device.
- Both together.
Encryption:
Scrambling transmitted messages to secure them using a secret code called "key",and the
reverse process called "decryption"
- Left key: replace every letter with 5th letter before it.
- Right key: replace every letter with 5th letter successive letter.
Safe Computing:
If it’s important, back it up. If it’s sensitive, lock it up. If you’re sending sensitive
information, consider encryption. Beware of email bearing gifts. Share with care. Handle
shareware and freeware with care. Don’t pirate software. Disinfect regularly. Take your
passwords seriously.
Security vs. Privacy:
Security is to prevent crimes but it can threaten privacy
" smart badges, Smart phone → proximity recognition technology".
Computers at war:
- Smart weapons: missiles that use computerized guidance systems to locate their
targets.
- Autonomous system: complex system that can assume responsibility for a task
without human input.
- Cyber warfare: attacking computer networks the enemy can cripple
(telecommunications, power grids, water & gas supplies ).