SlideShare uma empresa Scribd logo
1 de 33
Chapter 01: Information Technology, the Internet, and You
Presentation Tips ,[object Object],[object Object],[object Object],[object Object]
Competencies   (Page 1 of 2)   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Competencies   (Page 2 of 2) ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object]
Five Parts of an Information System ,[object Object],[object Object],[object Object],[object Object],[object Object]
People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software ,[object Object],[object Object],[object Object],[object Object]
System Software ,[object Object],[object Object],[object Object],[object Object],Return
Application Software ,[object Object],[object Object],[object Object],[object Object],Return
Hardware - Types of Computers ,[object Object],[object Object],[object Object],[object Object]
Microcomputer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Desktop Computers ,[object Object],Return
Media Center System Units  ,[object Object],Return
Notebook or Laptop Computers Return ,[object Object]
Netbooks ,[object Object],[object Object],[object Object],[object Object],Return
Tablet PC ,[object Object],[object Object],Return
Handheld ,[object Object],[object Object],[object Object],Return
Microcomputer Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object]
System Unit ,[object Object],[object Object],[object Object],Return
Input/Output Devices ,[object Object],[object Object],Return
Secondary Storage ,[object Object],[object Object],Return
Communications ,[object Object],[object Object],[object Object],Return
Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Files ,[object Object],Return
Worksheet Files ,[object Object],Return
Database Files ,[object Object],Return
Presentation Files ,[object Object],Return
Connectivity, the Wireless Revolution, the Internet, and Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Careers in IT ,[object Object]
A Look to the Future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open-Ended Questions  (Page 1 of 2)   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Open-Ended Questions  (Page 2 of 2)   ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Types of Computer on the basis of work
Types of Computer on the basis of workTypes of Computer on the basis of work
Types of Computer on the basis of work
 
Components of a computer-Unit-2
Components of a computer-Unit-2Components of a computer-Unit-2
Components of a computer-Unit-2
 
Classification of computers by type
Classification of computers by typeClassification of computers by type
Classification of computers by type
 
Types of Computers
Types of ComputersTypes of Computers
Types of Computers
 
01 classification of computer
01  classification of computer01  classification of computer
01 classification of computer
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Types of computer
Types of computer Types of computer
Types of computer
 
types of computer
types of computer types of computer
types of computer
 
Classifications of computer by bikrant roy
Classifications of computer by bikrant royClassifications of computer by bikrant roy
Classifications of computer by bikrant roy
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Classification of computer_system
Classification of computer_systemClassification of computer_system
Classification of computer_system
 
Computer and its classification
Computer and its classificationComputer and its classification
Computer and its classification
 
DIGITAL COMPUTERS
DIGITAL COMPUTERSDIGITAL COMPUTERS
DIGITAL COMPUTERS
 
Cmp104 lec 4 types of computer
Cmp104 lec 4 types of computerCmp104 lec 4 types of computer
Cmp104 lec 4 types of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of computer on the basic of size
Classification of computer on the basic of sizeClassification of computer on the basic of size
Classification of computer on the basic of size
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 

Semelhante a O leary2012 intro_ppt_ch01

information tecnology
information tecnologyinformation tecnology
information tecnologyRezaSony
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Computing Essential
Computing Essential Computing Essential
Computing Essential VirusSami
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouJeremy Flores
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01drussell54
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01Nasir Jumani
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computerssir-smartt
 
Computer application in business
Computer application in businessComputer application in business
Computer application in businessManas Saha
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemCh Irfan
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxAdrianVANTOPINA
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015MUHAMADKASSIMMUHAMAD1
 

Semelhante a O leary2012 intro_ppt_ch01 (20)

TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
information tecnology
information tecnologyinformation tecnology
information tecnology
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Computing Essential
Computing Essential Computing Essential
Computing Essential
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Ch02
Ch02Ch02
Ch02
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015
 

Último

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 

Último (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 

O leary2012 intro_ppt_ch01

  • 1. Chapter 01: Information Technology, the Internet, and You
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Notas do Editor

  1. To be comfortable and competent with IT, one must comprehend the five parts an information system (refer to the ensuing slides)
  2. Define an information system Some students may think of a system as pertaining to just the hardware Remind them that a microcomputer is part of an information system To be a competent end user (Key Term), one must understand the essentials of IT Note that IT stands for information technology (Key Term) Concept check: What are the five parts of an information system? What is the difference between data and information? What is connectivity?
  3. People are the most important part of an information system Our lives are touched everyday by computers- many time the contact is direct and obvious, such as creating documents using a word processing program or when connecting to the internet. Other times, it isn’t as obvious and is much more indirect as shown in a couple of the pictures Have students give examples of how they use computer applications throughout the day Some examples are: Instant messaging Web-based applications Personal Web site Virus protection TV tuners and video clips Digital photography Music Home networking Spyware Job opportunities Refer to Figure 1-3 on pg. 8 in text. It provides a partial list of applications that students can use to “Make IT work for You”
  4. Software is another name for programs Programs are instructions that tell the computer how to process data into the form you want Emphasize differences between application and systems software System software Operating system (Key Term) Utilities Device drivers (Key Term) Application software Basic applications (Key Term) or General-purpose Specialized applications (Key Term) Concept Check Describe the two major kinds of software. Describe three types of system software programs. Define and compare basic and specialized applications.
  5. System Not a single program A collection of programs Two best known Operating systems are: Windows 7 Mac OS X Utilities Service programs such as Windows Disk Defragmenter Performs tasks related to managing computer resources Device drivers Application
  6. “ End-user” software – these are the types of programs you have to know to be considered computer competent An example of a basic application is a browser to navigate, explore and find information (Key Term) on the Internet Two major categories Basic applications - general purpose or “off-the-shelf” programs, such as Web browsers, and word processing, spreadsheet, and presentation software Specialized application – narrow focus on specific disciplines and occupations, such as graphics, audio, video, Web authoring, and cell phone apps
  7. There are four types of computers Supercomputers (key term) – the most powerful; special high-capacity computers used in very large corporations Mainframe computers (key term) – are capable of great processing speed and data storage; occupy specially wired, air-conditioned rooms; insurance companies use to process information about millions of policyholders Minicomputers (key term) - known as midrange computers (key term), are refrigerator sized machines used in medium sized companies or departments in large companies Microcomputers (key term) – least powerful but most widely used and fastest-growing type of computers Desktop (key term) Laptop or notebook (key term) Tablet PC (key term) Handheld computers (Key Term) Palm computers (Key Term) Personal digital assistants (PDA) (Key Term)
  8. Microcomputers Desktop Notebook Media Center Tablet PC Handheld computers Netbook
  9. Have students begin discussing the type(s) of a desktop computer (key term) they are using or familiar with
  10. Notebook computers are also known as laptops Have students begin discussing the type(s) of notebook or laptop computer(s) they are using or familiar with
  11. Accepts handwriting Ask students if they are familiar with tablet PCs
  12. Personal digital assistants (PDA) are the most widely used handheld computer Ask students if they are familiar with palm computers or PDAs
  13. System Unit is the container that houses most of the electronic components that make up a computer system. Input/Output – Input devices (key term) translate data and programs from a form humans understand to a form computers can process; Secondary Storage – Unlike memory (key term), secondary storage holds data and programs even after the electrical power has been turned off—examples of secondary storage include USB drives, hard drives and optical drives Communication – one computer communicating with another computer or other computer systems using communication devices (key term) such as a modem
  14. Systems unit-container houses most of the electronic components that make up a computer system The microprocessor controls and manipulates data to produce information Memory holds data and program instructions for processing the data. It also holds the processed information before it is output Memory is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted
  15. Hard disks are typically used to store programs and very large data files. Solid-state storage does not have any moving parts, is more reliable, and requires less power to operate Solid-state drives (SSDs) Flash memory cards USB drives Optical disks use laser technology and have the greatest capacity. Examples of optical disks include: compact discs (CDs) (Key Term) digital versatile discs (DVDs) (Key Term) high definition (hi def) (Key Term) discs
  16. Data is raw, unprocessed facts, that can be stored electronically in files. Four common types of files include: Document files (key term) - created by word processors to save memos, term papers, and letters Worksheet files (key term) - electronic spreadsheets for analyzing budgets and to predict sales Database files (key term) - electronic database management programs to contain highly structured and organized data Presentation files (key term) - electronic slide shows, audience handouts, and speaker notes
  17. Word processors are used to prepare written documents Create text-based documents One of the most flexible and widely used software tools Features to make entering, editing, and formatting documents easy
  18. Files created by spreadsheet programs Uses functions and formulas to analyze numeric data Manipulates numeric data Features include workbooks, worksheets, cells, ranges, text and numeric entries, formulas, functions, charts, recalculation, and what-if analysis
  19. A database management system (DBMS) or database manager is a program that sets up, or structures, a database Files created by database management programs Organizes data for efficient retrieval Is the electronic equivalent of a file cabinet It also provides tools to enter, edit, and retrieve data from the database
  20. Used to create a variety of visual objects to create attractive, visually interesting presentations Features include slides, AutoContent wizard, color schemes, slide layouts, special effects, master slides, and design templates Presentation files may contain audience handouts, speaker notes, and electronic slides
  21. Connectivity is the capability of your microcomputer to share information with other computers Wireless /mobile communication devices are more popular than ever A network is central to the concept of connectivity Ask students questions about the Internet. Here are some facts: No one owns the Internet There is no Internet, Inc. The Internet is a network of networks The Word Wide Web (key term) (WWW) provides multimedia interface to resources on the Internet Cloud computing can be used to create and store your work, such as documents, spreadsheets, databases, and presentations
  22. Internet & Web - browse the Web, communicate with others, locate Information, etc. Powerful Software - create professional looking documents, analyze massive amounts of data, create dynamic multimedia pages, and more. Powerful Hardware – more powerful & robust, new technologies such as wireless networks & their impact to connect, equipment can be dynamic vs. essential features of devices remain static Security & Privacy – negative impacts, potential mental & physical health risk, negative effects on the environment, etc. Organizations – organizational information systems and their use Changing Times – fast paced era and rapid change
  23. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements
  24. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements