Module 1 Basic Concepts 1.1 Data, Information, Knowledge, Wisdom 1.2: Brief History of Computing Module 2: Data Representation in a Computer 2.1 Number Representation in Different Numeral Systems 2.2 Units of Information & Binary Number System Module 3: Computer Systems 3.1 Computer Architecture Hardware and Software 3.2 Operating Systems Module 4: Learning to Program 4.1 C Programming Language Introduction Module 5: Computer Networking 5.1 Introduction to Networking 5.2 Introduction to Internet 5.3 Introduction to Client Server Model Connecting computing Developing computational artifacts Abstracting Analyzing problems and artifacts Communicating Collaborating Big Ideas History of computers http://inventors.about.com/library/blcoindex.htm http://www.computerhistory.org/timeline/ The abacus was the first device known to carry out calculations invented in Asia. It uses a sliding beads ... Hardware Software OS application software Basic file system navigation skills File system external storage Basic DOS commands Number System Conversion Decimal System Binary Oct Hexadecimal ASCII Bit Byte mega, peta ... How binary data are stored and represented The IEEE Standard memory, space Data Representation Multimedia Data Management Big Data Database Management Information System Data Mining Text Mining What is Text Mining? The discovery by computer of new, previously unknown information, by automatically extracting information from a usually large amount of different unstructured textual resources. Knowledge Logics Programming Function Programming CPU Machine languages instruction set assemble compiler interpreator Design, code, compile, run, and debug computer programs using an object-oriented programming language. Computational Thinking virus ... Internet HTML XML Computers and Society (need to be reworded) This chapter examines the impact computers have on our everyday lives. In its many incarnations, the computer has become ubiquitous and affects our lives in a myriad of ways. From secure shopping on line to identity theft, from texting while driving to the privacy of our phone calls, from the creative commons and the GPL to copyright law and the DMCA, from CAT scans and MRI’s to medical device malfunctions leading to injury and death, it is impossible to escape the effects of computers on us, our relatives, and friends. This course will look at good and evil ways computing can be used, and discuss ways to protect oneself from the “evil wily hacker” types. Topics could include security, privacy, social media, file sharing, government leaks, ethical uses of computing, the ACM code of conduct, and other current issues in the news. Internet and how internet work background concepts: Internet, HTTP, web server, file system, file name, path, URL, browser, different browser features, client server 1 week ip address, domain name search engine Copyright Ethics cybersecurity Digital Crime frensic Sustainable Computing sustainable computing, energy consumption, E-waste, green IT, Different fields Application software This chapter discuss typical application software, which may target at the particular campus. MS Office What Computing resource you have at SUCO Virtualization Famous computer scientists Cloud computing Parallel computing Mobile Computing Mobile and Cloud Computing life long learning big data sustainable computing Opportunities and Challenges of Computing field and subjects