SlideShare a Scribd company logo
1 of 10
Chapter 3
Computer Science
and the
Foundation of
Knowledge Model
Objectives
• Describe the essential components of computer
systems including hardware and software.
• Recognize the rapid evolution of computer systems and
the benefit of keeping up to date with current trends
and developments.
• Analyze how computer systems function as tools for
managing information and generating knowledge.
• Define the concept of human–technology interfaces.
• Articulate how computers can support collaboration,
networking, and information exchange.
Introduction
• The discipline of computer science is introduced
through a focus on computers and the hardware
and software that make up these evolving
systems.
• Computer science offers extremely valuable tools
that, if used skillfully, can facilitate the acquisition
and manipulation of data and information by
nurses, who can then synthesize these into an
evolving knowledge and wisdom base.
The Computer as a Tool for Managing
Information and Generating Knowledge
• Computer technology has ushered in what has been called
the “information age,” an age when data, information, and
knowledge are both accessible and able to be manipulated
by more people than ever before in history.
• Essentially, a computer is an electronic information-
processing machine that serves as a tool to manipulate
data and information.
• The easiest way to begin to understand computers is to
realize they are input–output systems.
• These unique machines accept data inputted via a variety
of devices, process data through logical and arithmetic
rendering, store the data in memory components, and
output data and information to the user.
Acquisition of Data and Information
(input components)
• Input devices include the keyboard; mouse; joysticks
(usually used for playing computer games); game
controllers or pads; web cameras (webcams); stylus (often
used with tablets or personal digital assistants); image
scanners for copying a digital image of a document or
picture; or other plug and play input devices, such as a
digital camera, digital video recorder (camcorder), MP3
player, electronic musical instrument, or physiologic
monitor.
• These devices are the origin or medium used to input text,
visual, audio, or multimedia data into the computer system
for viewing, listening, manipulating, creating, or editing.
The two primary input devices on a computer are the
keyboard and mouse.
Processing of Data and Information
(throughput/processing components)
• Specific software is used, depending on the application
and data involved.
• One key hardware component, the computer monitor,
is a unique example of a visible throughput component
because it is the part of the computer focused on the
most when users are working on a computer. Inputted
data can be visualized and accessed by manipulating
the mouse and keyboard input devices, but it is the
monitor that receives the user’s attention.
• The monitor is critical for the efficient rendering during
this part of the cycle, because it facilitates user access
and control of the data and information.
What is the Relationship of
Computer Science to Knowledge?
• Scholars and researchers are just beginning to
understand the effect that computer systems,
architecture, applications, and processes have
on the potential for knowledge acquisition
and development.
• Users are able to contribute to the
development of knowledge and through the
use of productivity, creativity, and
communication software.
What is the Relationship of
Computer Science to Knowledge? (continued)
• Using the World Wide Web interface, users
are also able to disseminate knowledge on a
grand scale with other users.
• The deluge of information available via
computers must be mastered and organized
by the user for knowledge to emerge.
• Discernment and the ability to critique and
filter this information must also be present to
facilitate the further development of wisdom.
Summary
• The field of computer science is one of the fastest
growing disciplines.
• Astonishing innovations in computer hardware,
software, and architecture have occurred over
the past few decades and there are no indications
that this trend will stop anytime soon.
• Computers have developed in speed, accuracy,
and efficiency, yet also cost less and have reduced
physical size. These trends are predicted to
continue.
Summary (continued)
• The productivity, creative, and communicative
software tools can enable nurses to work with
computers to further foster knowledge acquisition and
development.
• Wide access to vast stores of information and
knowledge shared by others also facilitates the
emergence of wisdom in users, which can be applied to
nursing in meaningful and creative ways. It is
imperative that nurses become discerning yet skilled
users of computer technology to apply the principles of
nursing informatics to practice, and to contribute to
the profession’s ever growing body of knowledge.

More Related Content

What's hot

Group 4 historical perspective events
Group 4  historical perspective eventsGroup 4  historical perspective events
Group 4 historical perspective eventsgroup04NI
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introductionIan Jasper Mangampo
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)Rendell Apalin
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informaticsjhonee balmeo
 
Application of nursing informatics
Application of nursing informaticsApplication of nursing informatics
Application of nursing informaticsJoannie Rose Pelien
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentationLeeann Sills
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksJoseph Lagod
 
Ppt on nursing informatics
Ppt on nursing informaticsPpt on nursing informatics
Ppt on nursing informaticsshwetaGejam
 
Nursing Informatics historical perspective
Nursing Informatics historical perspectiveNursing Informatics historical perspective
Nursing Informatics historical perspectivejhonee balmeo
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
"Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation""Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation"chandy-20
 
computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer systemloveobi25
 
Chapter 30
Chapter 30Chapter 30
Chapter 30bodo-con
 
Nursing informatics: background and application
Nursing informatics: background and applicationNursing informatics: background and application
Nursing informatics: background and applicationjhonee balmeo
 
Nursing Informatics.pptx
Nursing Informatics.pptxNursing Informatics.pptx
Nursing Informatics.pptxasst professer
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 

What's hot (20)

Group 4 historical perspective events
Group 4  historical perspective eventsGroup 4  historical perspective events
Group 4 historical perspective events
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introduction
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informatics
 
Application of nursing informatics
Application of nursing informaticsApplication of nursing informatics
Application of nursing informatics
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentation
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
 
Ppt on nursing informatics
Ppt on nursing informaticsPpt on nursing informatics
Ppt on nursing informatics
 
Nursing Informatics historical perspective
Nursing Informatics historical perspectiveNursing Informatics historical perspective
Nursing Informatics historical perspective
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
"Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation""Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation"
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer system
 
Chapter 30
Chapter 30Chapter 30
Chapter 30
 
Nursing informatics: background and application
Nursing informatics: background and applicationNursing informatics: background and application
Nursing informatics: background and application
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Nursing Informatics.pptx
Nursing Informatics.pptxNursing Informatics.pptx
Nursing Informatics.pptx
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 

Viewers also liked

Chapter 14
Chapter 14Chapter 14
Chapter 14bodo-con
 
Chapter 12
Chapter 12Chapter 12
Chapter 12bodo-con
 
Chapter 11
Chapter 11Chapter 11
Chapter 11bodo-con
 
Chapter 16
Chapter 16Chapter 16
Chapter 16bodo-con
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best PracticesDavid Lange
 
Chapter 19
Chapter 19Chapter 19
Chapter 19bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 23
Chapter 23Chapter 23
Chapter 23bodo-con
 

Viewers also liked (11)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Similar to Chapter 3

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxArti Parab Academics
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
Computer & generations
Computer & generationsComputer & generations
Computer & generationsAnkitdhiman43
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptxBadeIbnuBade
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxMark Dave Morco
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxkisakitaemmanuel1
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesFaindra Jabbar
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 

Similar to Chapter 3 (20)

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptx
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related Terminilogies
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Computer & generations
Computer & generationsComputer & generations
Computer & generations
 
chapter1.pptx
chapter1.pptxchapter1.pptx
chapter1.pptx
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptx
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptx
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Eskwela ict basics
Eskwela ict basicsEskwela ict basics
Eskwela ict basics
 
intro to pc.pdf
intro to pc.pdfintro to pc.pdf
intro to pc.pdf
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Comp App Lect 1.ppt
Comp App Lect 1.pptComp App Lect 1.ppt
Comp App Lect 1.ppt
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 

More from bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

More from bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Chapter 3

  • 1. Chapter 3 Computer Science and the Foundation of Knowledge Model
  • 2. Objectives • Describe the essential components of computer systems including hardware and software. • Recognize the rapid evolution of computer systems and the benefit of keeping up to date with current trends and developments. • Analyze how computer systems function as tools for managing information and generating knowledge. • Define the concept of human–technology interfaces. • Articulate how computers can support collaboration, networking, and information exchange.
  • 3. Introduction • The discipline of computer science is introduced through a focus on computers and the hardware and software that make up these evolving systems. • Computer science offers extremely valuable tools that, if used skillfully, can facilitate the acquisition and manipulation of data and information by nurses, who can then synthesize these into an evolving knowledge and wisdom base.
  • 4. The Computer as a Tool for Managing Information and Generating Knowledge • Computer technology has ushered in what has been called the “information age,” an age when data, information, and knowledge are both accessible and able to be manipulated by more people than ever before in history. • Essentially, a computer is an electronic information- processing machine that serves as a tool to manipulate data and information. • The easiest way to begin to understand computers is to realize they are input–output systems. • These unique machines accept data inputted via a variety of devices, process data through logical and arithmetic rendering, store the data in memory components, and output data and information to the user.
  • 5. Acquisition of Data and Information (input components) • Input devices include the keyboard; mouse; joysticks (usually used for playing computer games); game controllers or pads; web cameras (webcams); stylus (often used with tablets or personal digital assistants); image scanners for copying a digital image of a document or picture; or other plug and play input devices, such as a digital camera, digital video recorder (camcorder), MP3 player, electronic musical instrument, or physiologic monitor. • These devices are the origin or medium used to input text, visual, audio, or multimedia data into the computer system for viewing, listening, manipulating, creating, or editing. The two primary input devices on a computer are the keyboard and mouse.
  • 6. Processing of Data and Information (throughput/processing components) • Specific software is used, depending on the application and data involved. • One key hardware component, the computer monitor, is a unique example of a visible throughput component because it is the part of the computer focused on the most when users are working on a computer. Inputted data can be visualized and accessed by manipulating the mouse and keyboard input devices, but it is the monitor that receives the user’s attention. • The monitor is critical for the efficient rendering during this part of the cycle, because it facilitates user access and control of the data and information.
  • 7. What is the Relationship of Computer Science to Knowledge? • Scholars and researchers are just beginning to understand the effect that computer systems, architecture, applications, and processes have on the potential for knowledge acquisition and development. • Users are able to contribute to the development of knowledge and through the use of productivity, creativity, and communication software.
  • 8. What is the Relationship of Computer Science to Knowledge? (continued) • Using the World Wide Web interface, users are also able to disseminate knowledge on a grand scale with other users. • The deluge of information available via computers must be mastered and organized by the user for knowledge to emerge. • Discernment and the ability to critique and filter this information must also be present to facilitate the further development of wisdom.
  • 9. Summary • The field of computer science is one of the fastest growing disciplines. • Astonishing innovations in computer hardware, software, and architecture have occurred over the past few decades and there are no indications that this trend will stop anytime soon. • Computers have developed in speed, accuracy, and efficiency, yet also cost less and have reduced physical size. These trends are predicted to continue.
  • 10. Summary (continued) • The productivity, creative, and communicative software tools can enable nurses to work with computers to further foster knowledge acquisition and development. • Wide access to vast stores of information and knowledge shared by others also facilitates the emergence of wisdom in users, which can be applied to nursing in meaningful and creative ways. It is imperative that nurses become discerning yet skilled users of computer technology to apply the principles of nursing informatics to practice, and to contribute to the profession’s ever growing body of knowledge.