0% found this document useful (0 votes)
95 views62 pages

Anthony T. Imatong Instructor

The document discusses various computer hardware and software components. It describes physical hardware components like the monitor, keyboard, mouse, and internal components. It also discusses different types of software including open source software, proprietary software, system software, and application software.

Uploaded by

malinda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views62 pages

Anthony T. Imatong Instructor

The document discusses various computer hardware and software components. It describes physical hardware components like the monitor, keyboard, mouse, and internal components. It also discusses different types of software including open source software, proprietary software, system software, and application software.

Uploaded by

malinda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 62

ANTHONY T.

IMATONG
INSTRUCTOR
Computer Hardware
Computer hardware is the collection of
physical parts of a computer system. This
includes the computer case, monitor,
keyboard, and mouse. It also includes all the
parts inside the computer case, such as the
hard disk drive, motherboard, video card, and
many others.
Monitor
A computer monitor is an output
device that displays information in
pictorial form. A monitor usually
comprises the display device,

A computer keyboard is a
typewriter-style device. which
uses an arrangement of
buttons or keys to act as
mechanical levers or
electronic switches.
Following the decline of
punch cards and paper tape,
interaction via teleprinter-
style keyboards became the
main input method for
computers.
A computer mouse is a hand-held
pointing device that detects two-
dimensional motion relative to a
surface. This motion is typically
translated into the motion of a
pointer on a display, which allows
a smooth control of the graphical
user interface

Computer speakers, or multimedia speakers,


are speakers sold for use with computers,
although usually capable of other audio uses,
e.g. for an MP3 player
A device that converts sound waves into
analogous electrical waves. Usually called
a "mic" or "mike," it contains a flexible
diaphragm composed of film or foil that
vibrates as it makes contact with the
sound.

A webcam is a video camera that feeds or


streams its image in real time to or
through a computer to a computer
network
A computer tower is a metal
chassis that holds all of the
computer's components. ...
Computer towers are available in
an enormous variety of sizes to
suit every need. Bulky computer
towers contain all the
components your PC needs to
function
central processing unit
C P U (pronounced as
separate letters) is the
abbreviation for central
processing unit.
Sometimes referred to
simply as the central
processor, but more
commonly called
processor, the CPU is the
brains of the computer
where most calculations
take place.
a printed circuit board
controlling output to a
display screen.

A memory card, flash


card or memory
cartridge is an electronic
data storage device
used for storing digital
information, typically
using flash memory.
Computer hardware is
what you can physically
touch.
Computer Software and
Systems

Computer software. ... This includes application


software such as a word processor, which enables a
user to perform a task, and system software such as
an operating system, which enables other software
to run properly, by interfacing with hardware and
with other software
Open Source

Free and open-source software (FOSS) is


software that can be classified as both free
software and open-source software.That is,
anyone is freely licensed to use, copy, study, and
change the software in any way, and the source
code is openly shared so that people are
encouraged to voluntarily improve the design of
the software. This is in contrast to proprietary
software, where the software is under restrictive
copyright licensing and the source code is usually
hidden from the users.
Under the computer software
and systems
a. Open Source and Free Software
the term open source emphasizes on the practical benefits of
“free software”: supporting collaboration on software
development projects. In other words, while open source is a
development philosophy that is more business oriented, free
software is a social and moral philosophy.
Example free software:
Ready to download and ready to use.
b. Proprietary software is software that is owned by an
individual or a company (usually the one that developed it).
There are almost always major restrictions on its use, and its
source code is almost always kept secret.
c. System Software

System software is a type of


computer program that is
designed to run a computer's
hardware and application
programs. If we think of the
computer system as a layered
model, the system software
is the interface between the
hardware and user
applications
d. Application Software
Application software (app for short) is
software designed to perform a group of
coordinated functions, tasks, or activities
for the benefit of the user.
e. Data Processing Software
Data processing is the process of converting collected
information into another, more usable, type of data. This
process is complex and meaningful, so deep research
must be done to develop data processing software
properly. Any type of data can be processed.
end of computer software and
systems.
3. THE INTERNET: A NURSING
RESOURCE
The internet’s tremendous impact on
society
 · Changing the way we communicate
 · Conduct business
 · Obtain information
 · Manage life
Internet
 - describes as a network of computer
network
 -provides the ability for computes
attached in some way to one of wires or
cables on the system to send and
information from computer networks
regardless of the location.
THE HISTORY OF THE INTERNET
 1957 - Russian launch sputnik, the
result was the creation of Advanced
Research Project Agency (ARPA) by
President Eisenhower.
 Packet Switching- devised system result
of dividing message into smaller pieces,
each individually addressed, invented by
Paul Barran.
1962 - Dr. J.C.R licklider lead the research to
improve military use of computer technology.
This visionary moved ARPA work from the
private sector to universities.

1969 - Dr. J.C.R put his brainchild into operation


in the fall and named ARPANET, after its DoD
pentagon sponsor the ARPA.
First node was installed at the University of
California, Los Angeles.
 1973 The first step to this outcome was
taken by Vint Cerf and Bob Kahn-
leading to the creation of the
Transmission Control Protocol and the
internet protocol (TCP/IP).

 This decentralized structure together


with standard communication methods
made expansion easy.
 1980’s many networks had adopted the
standards, and internet became reality
 1990’s Commercial networks such as
CompuServe and Prodigy became part
of the internet; users of these networks
could only communicate with those
using the same service.
WHO CONTROLS THE INTERNET
 The internet itself has no owners,
censors, bosses, board of directors, or
stockholders.
 In principle, any computer or network
that obeys the protocols, which are
technical, not social or political, can be
an equal player.
 ISOC (www.isoc.org) - the overall
organizing force an international,
nonprofit, professional membership
organization with no governmental
allegiances.
 The society works to maintain
standards, develop public policy, provide
education, and increase membership.
THE TECHNOLOGY BEHIND THE
INTERNET
-The main protocols on which the functioning of
the internet is dependent are referred to as TCP
and IP.
IP the lower level protocol, responsible for
making decisions about packets.
TCP- data grams, detects and reorder the
packets as necessary.
HTTP- Hypertext transmission protocol,
supports the World Wide Web (www)
FTP- files transmission protocol, permits
users to send all types of electronic files over
the internet.
Network Host. From a networking point of
view, a 'host' refers to any computer
(server) that is interlinked with another
machine(s) through an Internet
connection. Each host has its unique IP
address, formed by the computer's local
number and the particular number of the
network it belongs to.
THE DOMAIN NAME SYSTEM
(DNS)
The internet’s DNS permits us to give
globally unique “names” to networks and
computers.
BENEFITS:
Easier to remember than long string of
numbers.
Allows for a change of physical location
that is transparent to the user.
HOW LARGE IS THE INTERNET?
The internet had over 109 million hosts in
230 countries as released by the Internet
Software Consortium in March 15, 2001
from data collected during January 2001

The growth rate of the internet is


estimated to be between 46 and 67%
annually.
 Net is growing worldwide at the amazing
rate of 63 new hosts and 11 new domains
per minute.
 Archie sites- they pooled the
information from their searchers and
made it available to users at other sites.
 Gopher system- developed at the
University of Minnesota, provides users
a menu of items available on internet
servers globally.
FILE TRANSFER PROTOCOL
 The FTP was mentioned use to
download and upload files from distant
computers and transferring data.

 This protocol is still in use today for


exchange of data but most use is
transparent to the user.
ELECTRONIC MAIL (E-MAIL)
 One of the most popular users for
internet remains the ability to send and
receive e-mail.

 Many individual uses e-mail for


different purposes.
THE ANATOMY OF AN E-MAIL
ADDRESS 
 An e-mail address has two parts
separated by “@” sign:
 Username
 Name of the computer that
assigned the username.
 Example: [email protected]
 Mara.clara- username
 Redcross.org- name of computeR
EMOTICONS
To accurate judge the mood of the sender
the practice of typing characters available
on a standard keyboard to form a picture,
these small icons is called emoticons or
smiley that use to denote a mood.
ABBREVIATIONS
 Cautiously used in e-mails and other
messaging applications
 Ž Examples: AFK- Away from the
keyboard
 BTW- By the way
 FTF- face to face
 HTH- Hope this helps
LIST FUNDAMENTALS
 Two address of mailing list:
 1. The address of the software that
manages the list, used to subscribe to
the list, unsubscribe, or use some of the
functions that the software makes
available.
 2. The one that subscribers use to post
a message to the mailing list.
THE WORLD WIDE WEB
 WWW is not just some passing trend but
an integral part of the world today.
 Tim Berners-lee- inventor of the WWW
named as one of the top 20 thinkers of
20th century.
 Browser- is a client program that
translates files to the image you see on
the screen.
ORIGIN OF THE WWW
 First propose in 1989 by Tim Berners-
lee while working with Robert Cailliau
 First prototype appeared in 1990 but
released in 1991.
 Browser was released in 1992 to the
public as freeware and there were only
50 Web servers.
 By the end of 1995 there had been
improvements in browser.
FUNCTIONS OF WWW
Has special software that allows
receiving, interpreting, and sending to
the client computer the request file.
 Web’s use of HTTP enables the
transmitting and interpretation of all
types of files.
 -hypertext is a system which permits
objects to be linked to another.
CRITERIA FOR ASSESSING THE QUALITY OF HEALTH
INFORMATION ON THE INTERNET
 Credibility- what is the source of the
information, how current is it, useful and
relevant; what was the process for editorial
review.
 Content- to help judge accuracy examines
the hierarchy of evidence, presence of original
source.
 Disclosure- what is the purpose of the site;
who is sponsoring it, and what will the site
owners will do with any information that they
collect.
 Links- what is the quality of the links provided.
End of the internet, a nursing resources
4. PDA and Wireless Devices
Introduction
 Individual use of information depends on a
continuum along several dimensions:
 Ø the desired physical size and
characteristics of the hardware
 Ø the length of time a mobile device runs
before requiring recharging
 Ø whether the computer functions as stand-
alone or as part of a network, the availability of
applications to support an individual’s work
 Ø the appropriate of security level .
Continuum of Information Technology for
Personal Computing
 A smart phone represents a convergence
between computing and communication.
A smart phone fits in a shirt pocket, weighs
ounces, has a 2 in. or slightly larger display,
Desktop Computer
vs. Smartphone Physical Characteristics

 The distinctions between different forms of


computers are relative according to
characteristics such as weight, display size,
processing power, memory, storage capacity, and
battery life.
 In general, a desktop computer is too heavy to
hand carry, has a larger display, processing
power measured in gigahertz (GHz), memory
capacity up to gigabytes (GB), storage capacity
up to GB, and is not designed to run on internal
battery power.
Notebook/Laptop vs. Tablet vs.
PDA Physical Characteristics
 A notebook/laptop computer is lighter enough
to hand carry, has a slightly smaller display,
and slightly less processing power and
storage capacity than a desktop computer.

 The most important difference between a


desktop and a notebook/laptop is that a
notebook/laptop is designed to run on battery
power so that in addition to being portable, it
can run without requiring access to an
electrical outlet.
 The tablet is lighter, has a slighter
smaller display, and slightly less
processing power and storage capacity
than a laptop.
The most important difference between
a notebook/laptop and a tablet is that
the display allows use of a stylus for
input on a tablet.
Keyboard and mouse input is possible
but not necessary when using a tablet
since the user may employ a stylus for
writing or drawing.
PDA (Personal Digital Assistant)

 -weighing in at 8 oz. or less, it is a small


enough to fit in a shirt pocket.
-comes with a miniature keyboard and a
stylus for data entry.
-it is possible to add an external portable
keyboard.
-has many characteristics in common with
the Smartphone (a hybrid of PDA and
telephone), but tends to have a longer
battery life since it need not support voice
communication.
 Battery Life
Mobile devices depend on batteries. The
length of time a battery supports use of
the device and the length of time for the
battery to recharge determine the
usefulness of the device.
 PDA Operating Systems
 The operating system for a computer
determines many of the characteristics of
the computer because the operating
system controls how the hardware and the
software work together. The most two
commonly used operating systems for
PDAs are Palm OS or Windows
Mobile.
 Mobile Devices

 Any computer systems that can be hand


carried or rolled around is a portable device.

 Computers that are small and light weight


enough to be hand carried are mobile
devices. A laptop is considered mobile. The
key to a mobile device is the nonbulky display.
a
Wireless Devices
For a computer to connect wirelessly there must be
a physical component added to the device to enable
wireless communication. Depending on what
standard device follows, there is also a requirement
for a wireless access point to the network.

With the right card added to the computer and a


wireless local area network (WLAN), it is possible for
a wirelessly enabled desktop computer to connect
through an over-the-air interface to a computer.

The most commonly standard used for this is IEEE


802.11 that governs how local area networks (LANs)
connect wirelessly using wireless fidelity (Wi-Fi).
Clinical Applications by
Functional Categories
 There are applications that support clinical care
(e.g., medications, treatment, documentations,
clinical decision- making), administrative functions
(e.g., reporting), research, (e.g., data collecting),
and education (e.g., presentation).
Available healthcare applications range from simple
reference material, to interactive tracking
databases, and to highly sophisticated decision
support systems.
Clinicians utilize their PDAs to support
their workflow by having ready access to relevant
information at the point of care.
Evaluation of Clinical Application
 A systematic approach to evaluating clinical
applications starts with an understanding of the
goal of the nurse selecting and using that
software. The software selected must be
compatible with the operating system of the
PDA. Factors to consider include the amount of
time and level of effort required to install and
successfully run the application.
End of PDA and wireless devices
5. INCORPORATING EVIDENCE USE OF
COMPUTER –BASED"
 Decision support systems (DSS) are automated tools
designed to support decision-making activities and
improve the decision-making process and decision
outcomes. A CDSS is designed to support healthcare
providers in making decisions about the delivery and
management of patient care.
 A CDSS program’s goals may include patients safety
and improved outcomes for specific patient
populations as well as compliance with clinical
guidelines, standards of practice , and regulatory
requirements. The primary goal of CDSS is the
optimization of both the efficiency and effectiveness
with which clinical decisions are made and care is
delivered.
CDSS may be defined as any computer program
that helps health professionals make clinical
decisions. CDSS software has a knowledge base
designed for the clinician involved in patient care to
aid in clinical decisions-making.
Johnston et al. (1994) defined CDSS as “computer
software employing a knowledge base designed for
use by a clinician involved in patient care, as a
direct aid to clinical decision-making.”
Three main purposes of a DSS:
 Assist in problem solving with semi
structured problems
 Support, not replace, the judgment of a
manager or clinician
 Improve the effectiveness of the
decision-making process
CDSS structural elements include
 Triggering
 Dispatching
 Rule logic
 Process control
 Notification / acknowledgements
 Action choices
 Action execution
 Rule editor
DSSs could be divided into:
 Data-based (population-based)
 Model-based (case-based)
 Knowledge-based (rule-based)
 Graphics-based systems

You might also like