SlideShare a Scribd company logo
1 of 10
Chapter 3
Computer Science
and the
Foundation of
Knowledge Model
Objectives
• Describe the essential components of computer
systems including hardware and software.
• Recognize the rapid evolution of computer systems and
the benefit of keeping up to date with current trends
and developments.
• Analyze how computer systems function as tools for
managing information and generating knowledge.
• Define the concept of human–technology interfaces.
• Articulate how computers can support collaboration,
networking, and information exchange.
Introduction
• The discipline of computer science is introduced
through a focus on computers and the hardware
and software that make up these evolving
systems.
• Computer science offers extremely valuable tools
that, if used skillfully, can facilitate the acquisition
and manipulation of data and information by
nurses, who can then synthesize these into an
evolving knowledge and wisdom base.
The Computer as a Tool for Managing
Information and Generating Knowledge
• Computer technology has ushered in what has been called
the “information age,” an age when data, information, and
knowledge are both accessible and able to be manipulated
by more people than ever before in history.
• Essentially, a computer is an electronic information-
processing machine that serves as a tool to manipulate
data and information.
• The easiest way to begin to understand computers is to
realize they are input–output systems.
• These unique machines accept data inputted via a variety
of devices, process data through logical and arithmetic
rendering, store the data in memory components, and
output data and information to the user.
Acquisition of Data and Information
(input components)
• Input devices include the keyboard; mouse; joysticks
(usually used for playing computer games); game
controllers or pads; web cameras (webcams); stylus (often
used with tablets or personal digital assistants); image
scanners for copying a digital image of a document or
picture; or other plug and play input devices, such as a
digital camera, digital video recorder (camcorder), MP3
player, electronic musical instrument, or physiologic
monitor.
• These devices are the origin or medium used to input text,
visual, audio, or multimedia data into the computer system
for viewing, listening, manipulating, creating, or editing.
The two primary input devices on a computer are the
keyboard and mouse.
Processing of Data and Information
(throughput/processing components)
• Specific software is used, depending on the application
and data involved.
• One key hardware component, the computer monitor,
is a unique example of a visible throughput component
because it is the part of the computer focused on the
most when users are working on a computer. Inputted
data can be visualized and accessed by manipulating
the mouse and keyboard input devices, but it is the
monitor that receives the user’s attention.
• The monitor is critical for the efficient rendering during
this part of the cycle, because it facilitates user access
and control of the data and information.
What is the Relationship of
Computer Science to Knowledge?
• Scholars and researchers are just beginning to
understand the effect that computer systems,
architecture, applications, and processes have
on the potential for knowledge acquisition
and development.
• Users are able to contribute to the
development of knowledge and through the
use of productivity, creativity, and
communication software.
What is the Relationship of
Computer Science to Knowledge? (continued)
• Using the World Wide Web interface, users
are also able to disseminate knowledge on a
grand scale with other users.
• The deluge of information available via
computers must be mastered and organized
by the user for knowledge to emerge.
• Discernment and the ability to critique and
filter this information must also be present to
facilitate the further development of wisdom.
Summary
• The field of computer science is one of the fastest
growing disciplines.
• Astonishing innovations in computer hardware,
software, and architecture have occurred over
the past few decades and there are no indications
that this trend will stop anytime soon.
• Computers have developed in speed, accuracy,
and efficiency, yet also cost less and have reduced
physical size. These trends are predicted to
continue.
Summary (continued)
• The productivity, creative, and communicative
software tools can enable nurses to work with
computers to further foster knowledge acquisition and
development.
• Wide access to vast stores of information and
knowledge shared by others also facilitates the
emergence of wisdom in users, which can be applied to
nursing in meaningful and creative ways. It is
imperative that nurses become discerning yet skilled
users of computer technology to apply the principles of
nursing informatics to practice, and to contribute to
the profession’s ever growing body of knowledge.

More Related Content

What's hot

Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informaticsjhonee balmeo
 
Chapter 17
Chapter 17Chapter 17
Chapter 17bodo-con
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentationLeeann Sills
 
Nursing Informatics - Team 3 Presentation
Nursing Informatics - Team 3 PresentationNursing Informatics - Team 3 Presentation
Nursing Informatics - Team 3 PresentationShirldrexel2014
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 
Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)abhijyotsaini
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`Kate Balgos
 
Emr presentation
Emr presentationEmr presentation
Emr presentationChris Oyibe
 
An Introduction to Clinical Informatics
An Introduction to Clinical InformaticsAn Introduction to Clinical Informatics
An Introduction to Clinical InformaticsCorinn Pope
 
Health informatics
Health informaticsHealth informatics
Health informaticsPinki Barman
 
NURSE INFORMATICS.pptx
NURSE INFORMATICS.pptxNURSE INFORMATICS.pptx
NURSE INFORMATICS.pptxanjalatchi
 
Healthcare information technology
Healthcare information technologyHealthcare information technology
Healthcare information technologyDr.Vijay Talla
 
Chapter 11
Chapter 11Chapter 11
Chapter 11bodo-con
 
Health Information Systems
Health Information SystemsHealth Information Systems
Health Information SystemsNikhil Agarwal
 

What's hot (20)

Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informatics
 
CLINICAL INFORMATICS ppt
CLINICAL INFORMATICS pptCLINICAL INFORMATICS ppt
CLINICAL INFORMATICS ppt
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentation
 
Nursing Informatics - Team 3 Presentation
Nursing Informatics - Team 3 PresentationNursing Informatics - Team 3 Presentation
Nursing Informatics - Team 3 Presentation
 
Informatics
Informatics Informatics
Informatics
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
Tele medicine
Tele medicineTele medicine
Tele medicine
 
Nsg informatics
Nsg informaticsNsg informatics
Nsg informatics
 
Ethical & Social Issues in Health IT
Ethical & Social Issues in Health ITEthical & Social Issues in Health IT
Ethical & Social Issues in Health IT
 
Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`
 
Emr presentation
Emr presentationEmr presentation
Emr presentation
 
An Introduction to Clinical Informatics
An Introduction to Clinical InformaticsAn Introduction to Clinical Informatics
An Introduction to Clinical Informatics
 
Health informatics
Health informaticsHealth informatics
Health informatics
 
NURSE INFORMATICS.pptx
NURSE INFORMATICS.pptxNURSE INFORMATICS.pptx
NURSE INFORMATICS.pptx
 
Healthcare information technology
Healthcare information technologyHealthcare information technology
Healthcare information technology
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Health Information Systems
Health Information SystemsHealth Information Systems
Health Information Systems
 

Viewers also liked

Chapter 14
Chapter 14Chapter 14
Chapter 14bodo-con
 
Chapter 12
Chapter 12Chapter 12
Chapter 12bodo-con
 
Chapter 16
Chapter 16Chapter 16
Chapter 16bodo-con
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best PracticesDavid Lange
 
Chapter 19
Chapter 19Chapter 19
Chapter 19bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 23
Chapter 23Chapter 23
Chapter 23bodo-con
 

Viewers also liked (9)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Similar to Chapter 3

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxArti Parab Academics
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
Computer & generations
Computer & generationsComputer & generations
Computer & generationsAnkitdhiman43
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptxBadeIbnuBade
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxMark Dave Morco
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxkisakitaemmanuel1
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesFaindra Jabbar
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 

Similar to Chapter 3 (20)

COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptx
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related Terminilogies
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Computer & generations
Computer & generationsComputer & generations
Computer & generations
 
chapter1.pptx
chapter1.pptxchapter1.pptx
chapter1.pptx
 
intro to pc (1).pptx
intro to pc (1).pptxintro to pc (1).pptx
intro to pc (1).pptx
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptx
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Eskwela ict basics
Eskwela ict basicsEskwela ict basics
Eskwela ict basics
 
intro to pc.pdf
intro to pc.pdfintro to pc.pdf
intro to pc.pdf
 
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptxCOMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
COMPUTER SKILLS AND COMPUTER APPLICATIONS.pptx
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Comp App Lect 1.ppt
Comp App Lect 1.pptComp App Lect 1.ppt
Comp App Lect 1.ppt
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 

More from bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

More from bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Chapter 3

  • 1. Chapter 3 Computer Science and the Foundation of Knowledge Model
  • 2. Objectives • Describe the essential components of computer systems including hardware and software. • Recognize the rapid evolution of computer systems and the benefit of keeping up to date with current trends and developments. • Analyze how computer systems function as tools for managing information and generating knowledge. • Define the concept of human–technology interfaces. • Articulate how computers can support collaboration, networking, and information exchange.
  • 3. Introduction • The discipline of computer science is introduced through a focus on computers and the hardware and software that make up these evolving systems. • Computer science offers extremely valuable tools that, if used skillfully, can facilitate the acquisition and manipulation of data and information by nurses, who can then synthesize these into an evolving knowledge and wisdom base.
  • 4. The Computer as a Tool for Managing Information and Generating Knowledge • Computer technology has ushered in what has been called the “information age,” an age when data, information, and knowledge are both accessible and able to be manipulated by more people than ever before in history. • Essentially, a computer is an electronic information- processing machine that serves as a tool to manipulate data and information. • The easiest way to begin to understand computers is to realize they are input–output systems. • These unique machines accept data inputted via a variety of devices, process data through logical and arithmetic rendering, store the data in memory components, and output data and information to the user.
  • 5. Acquisition of Data and Information (input components) • Input devices include the keyboard; mouse; joysticks (usually used for playing computer games); game controllers or pads; web cameras (webcams); stylus (often used with tablets or personal digital assistants); image scanners for copying a digital image of a document or picture; or other plug and play input devices, such as a digital camera, digital video recorder (camcorder), MP3 player, electronic musical instrument, or physiologic monitor. • These devices are the origin or medium used to input text, visual, audio, or multimedia data into the computer system for viewing, listening, manipulating, creating, or editing. The two primary input devices on a computer are the keyboard and mouse.
  • 6. Processing of Data and Information (throughput/processing components) • Specific software is used, depending on the application and data involved. • One key hardware component, the computer monitor, is a unique example of a visible throughput component because it is the part of the computer focused on the most when users are working on a computer. Inputted data can be visualized and accessed by manipulating the mouse and keyboard input devices, but it is the monitor that receives the user’s attention. • The monitor is critical for the efficient rendering during this part of the cycle, because it facilitates user access and control of the data and information.
  • 7. What is the Relationship of Computer Science to Knowledge? • Scholars and researchers are just beginning to understand the effect that computer systems, architecture, applications, and processes have on the potential for knowledge acquisition and development. • Users are able to contribute to the development of knowledge and through the use of productivity, creativity, and communication software.
  • 8. What is the Relationship of Computer Science to Knowledge? (continued) • Using the World Wide Web interface, users are also able to disseminate knowledge on a grand scale with other users. • The deluge of information available via computers must be mastered and organized by the user for knowledge to emerge. • Discernment and the ability to critique and filter this information must also be present to facilitate the further development of wisdom.
  • 9. Summary • The field of computer science is one of the fastest growing disciplines. • Astonishing innovations in computer hardware, software, and architecture have occurred over the past few decades and there are no indications that this trend will stop anytime soon. • Computers have developed in speed, accuracy, and efficiency, yet also cost less and have reduced physical size. These trends are predicted to continue.
  • 10. Summary (continued) • The productivity, creative, and communicative software tools can enable nurses to work with computers to further foster knowledge acquisition and development. • Wide access to vast stores of information and knowledge shared by others also facilitates the emergence of wisdom in users, which can be applied to nursing in meaningful and creative ways. It is imperative that nurses become discerning yet skilled users of computer technology to apply the principles of nursing informatics to practice, and to contribute to the profession’s ever growing body of knowledge.