SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Computers:  Information Technology in Perspective, 11e Chapter 1 The Technology Revolution Copyright Prentice Hall, Inc.
Objectives  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Why this chapter is important to you! ,[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Our Information Society  ,[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Technology Revolution: Today   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Technology Revolution: Tomorrow ,[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Looking Back a Few Years Copyright Prentice Hall, Inc. 1950 1960s mid- 1970s 2001 ENAIC &  UNIVAC I PCs introduced! Very expensive computers for large companies. Computer professionals ran the show. Powerful PCs on every desktop. Explosion of applications. 2003 Home computers & networks
Rx for Cyberphobia: Information Technology Competency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Reasons to Become IT-Competent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Computer Proficiency Digital Divide ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The NET Connection:  Our Global Village ,[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Net Connection:  The Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Basics: Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Basics: Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Basics: Computer Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Personal Computers  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Notebook PCs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Desktop PCs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Wearable PCs ,[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Handhelds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Computer System Capabilities Processing Data and Producing Information ,[object Object],[object Object],Copyright Prentice Hall, Inc.
Computers in Action:  A Payroll System ,[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
The Computer’s Strengths  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
How Do We Use Computers? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Computer Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Prentice Hall, Inc.

Weitere ähnliche Inhalte

Was ist angesagt?

Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computer
Amanjot_kaur
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
Mkhululi Silinga
 
Smart phones.pptx lwazi ntshalintshali
Smart phones.pptx lwazi ntshalintshaliSmart phones.pptx lwazi ntshalintshali
Smart phones.pptx lwazi ntshalintshali
lbnts1
 
Technology in business communications
Technology in business communicationsTechnology in business communications
Technology in business communications
Hitesh Kothari
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01
zelalwattar
 
Harry knapp project
Harry knapp projectHarry knapp project
Harry knapp project
knapp112
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
kmodasia
 

Was ist angesagt? (19)

Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computer
 
Introduction To Information Technology
Introduction To Information TechnologyIntroduction To Information Technology
Introduction To Information Technology
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
 
TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01
 
Wk 8
Wk 8 Wk 8
Wk 8
 
Smart phones.pptx lwazi ntshalintshali
Smart phones.pptx lwazi ntshalintshaliSmart phones.pptx lwazi ntshalintshali
Smart phones.pptx lwazi ntshalintshali
 
Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
 
Technology in business communications
Technology in business communicationsTechnology in business communications
Technology in business communications
 
O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01O leary2011 comp_ppt_ch01
O leary2011 comp_ppt_ch01
 
Tech nol-ogy stack
Tech nol-ogy stackTech nol-ogy stack
Tech nol-ogy stack
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
 
Harry knapp project
Harry knapp projectHarry knapp project
Harry knapp project
 
The Social Impact of ICT
The Social Impact of ICTThe Social Impact of ICT
The Social Impact of ICT
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
Uses of computers
Uses of computersUses of computers
Uses of computers
 
Advantages and disadvantages of technology in business communication
Advantages and disadvantages of technology in business communicationAdvantages and disadvantages of technology in business communication
Advantages and disadvantages of technology in business communication
 
Technology and its impact on Society
Technology and its impact on Society Technology and its impact on Society
Technology and its impact on Society
 
impact of information technology on society
impact of information technology on societyimpact of information technology on society
impact of information technology on society
 

Andere mochten auch

Впровадження проектів ГО у відповідності до правил ПРООН
Впровадження проектів ГО у відповідності до правил ПРООНВпровадження проектів ГО у відповідності до правил ПРООН
Впровадження проектів ГО у відповідності до правил ПРООН
Olena Ursu
 
му к пз ск мартынова
му к пз ск мартыноваму к пз ск мартынова
му к пз ск мартынова
Demanessa
 
Mgceu presentation
Mgceu presentationMgceu presentation
Mgceu presentation
Olena Ursu
 
Israel Advocacy and Education - by Daniel Gold
Israel Advocacy and Education - by Daniel GoldIsrael Advocacy and Education - by Daniel Gold
Israel Advocacy and Education - by Daniel Gold
Daniel Gold
 
Valentyna darnopykh 2
Valentyna darnopykh 2Valentyna darnopykh 2
Valentyna darnopykh 2
Olena Ursu
 
Java projects
Java projectsJava projects
Java projects
msudan92
 
византия
византиявизантия
византия
Demanessa
 

Andere mochten auch (20)

Enterprise Mobile Methodology with Salesforce + MobileIron
Enterprise Mobile Methodology with Salesforce + MobileIronEnterprise Mobile Methodology with Salesforce + MobileIron
Enterprise Mobile Methodology with Salesforce + MobileIron
 
IB Abnormal psychology SL notes
IB Abnormal psychology SL notesIB Abnormal psychology SL notes
IB Abnormal psychology SL notes
 
Automotive
AutomotiveAutomotive
Automotive
 
Впровадження проектів ГО у відповідності до правил ПРООН
Впровадження проектів ГО у відповідності до правил ПРООНВпровадження проектів ГО у відповідності до правил ПРООН
Впровадження проектів ГО у відповідності до правил ПРООН
 
му к пз ск мартынова
му к пз ск мартыноваму к пз ск мартынова
му к пз ск мартынова
 
9. prokopiv
9. prokopiv9. prokopiv
9. prokopiv
 
Mgceu presentation
Mgceu presentationMgceu presentation
Mgceu presentation
 
TURNING A REVOLUTIONARY MEDICAL CONCEPT INTO REALITY: THE INSIGHTEC STORY
TURNING A REVOLUTIONARY MEDICAL CONCEPT INTO REALITY: THE INSIGHTEC STORYTURNING A REVOLUTIONARY MEDICAL CONCEPT INTO REALITY: THE INSIGHTEC STORY
TURNING A REVOLUTIONARY MEDICAL CONCEPT INTO REALITY: THE INSIGHTEC STORY
 
Pengembangan sistem
Pengembangan sistemPengembangan sistem
Pengembangan sistem
 
Mecenazgo
MecenazgoMecenazgo
Mecenazgo
 
Israel Advocacy and Education - by Daniel Gold
Israel Advocacy and Education - by Daniel GoldIsrael Advocacy and Education - by Daniel Gold
Israel Advocacy and Education - by Daniel Gold
 
第1回 プログラマのための計算機科学
第1回 プログラマのための計算機科学第1回 プログラマのための計算機科学
第1回 プログラマのための計算機科学
 
Report 1612
Report 1612Report 1612
Report 1612
 
Valentyna darnopykh 2
Valentyna darnopykh 2Valentyna darnopykh 2
Valentyna darnopykh 2
 
Project Management Presentation
Project Management PresentationProject Management Presentation
Project Management Presentation
 
Research
ResearchResearch
Research
 
Java projects
Java projectsJava projects
Java projects
 
หนึ่ง
หนึ่งหนึ่ง
หนึ่ง
 
O ursu
O ursuO ursu
O ursu
 
византия
византиявизантия
византия
 

Ähnlich wie Chap1a

Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
sir-smartt
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
Ranz
 
ITBIS105 7
ITBIS105 7ITBIS105 7
ITBIS105 7
Suad 00
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
Mazhar Masood
 
O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01
Vay Su
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc concepts
honeynut67
 

Ähnlich wie Chap1a (20)

Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
ITBIS105 7
ITBIS105 7ITBIS105 7
ITBIS105 7
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
 
Categories of computer
Categories of computerCategories of computer
Categories of computer
 
Infotech
InfotechInfotech
Infotech
 
O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01O leary2012 intro_ppt_ch01
O leary2012 intro_ppt_ch01
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
SKOLA
SKOLASKOLA
SKOLA
 
Technology
TechnologyTechnology
Technology
 
ICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptxICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptx
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
Computer fundamental on Discovering Computer
Computer fundamental on Discovering ComputerComputer fundamental on Discovering Computer
Computer fundamental on Discovering Computer
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc concepts
 

Kürzlich hochgeladen

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Kürzlich hochgeladen (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Chap1a

  • 1. Computers: Information Technology in Perspective, 11e Chapter 1 The Technology Revolution Copyright Prentice Hall, Inc.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Looking Back a Few Years Copyright Prentice Hall, Inc. 1950 1960s mid- 1970s 2001 ENAIC & UNIVAC I PCs introduced! Very expensive computers for large companies. Computer professionals ran the show. Powerful PCs on every desktop. Explosion of applications. 2003 Home computers & networks
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.