Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology...
-
Upload
jeffry-stafford -
Category
Documents
-
view
214 -
download
0
Transcript of Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology...
![Page 1: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/1.jpg)
Spring 2013 CS 103Computer Science – Business Problems
Lecture 2: Intro to Information Technology Part 2
Instructor: Zhe He
Department of Computer Science
New Jersey Institute of Technology
![Page 2: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/2.jpg)
Tech news last week
Apple’s smartphone OS still the top selling in the US for last quarter of 2012. 51.2% (Android: 44.4%, Windows: 2.6%) http://www.engadget.com/2013/01/22/kantar-ios/
Microsoft Surface Pro on sale Feb 9 in US $899 for 64GB model $999 for 128GB model http://techcrunch.com/2013/01/23/haters-gonna-
hate-2/
![Page 3: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/3.jpg)
Experience
Synthetic Complexity Snow White, Fantasia
Analog art Toy Story, Monster Inc. WallE
Digital art Start scene animation generated by computer ->
End scene
![Page 4: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/4.jpg)
Virtual Reality
Stanford lab makes virtual reality more life-like http://www.youtube.com/watch?v=v-mK5oNkr-I
How Avatar was made (The Art of Performance Capture) http://www.youtube.com/watch?v=P2_vB7zx_SQ
![Page 5: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/5.jpg)
Virtual Worlds
Programmers use these features because they are familiar, intuitive, easy to learn, and efficient to use
These examples are “not real, but as if” Sometimes, the virtual devices are better than the real one:
Example: if you mistype a phone number, you can delete the wrong numbers before you “dial”
![Page 6: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/6.jpg)
Artificial Worlds
Everything else that you experience with computers is simply artificial
Systems like iTunes, Facebook, Twitter, and Angry Birds are entirely the product of human imagination
This means the creators had almost unlimited flexibility when designing
This flexibility to create anything is one of the exciting aspects of computing
![Page 7: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/7.jpg)
Artificial Worlds
Extended Abilities. Key advantage of software is that it can often do
difficult tasks that are user-friendly These are “artificial” solutions in the sense that
they are not the standard techniques used previously
They depend on a computer to “do the work” We are now “experts” at tasks that were once
people’s careers: for example, video editing
![Page 8: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/8.jpg)
Artificial Worlds
New Phenomena. Systems, such as Twitter, Facebook, YouTube,
give us experiences that did not exist before they were created
Some aspects, such as communication via phone and snail mail, did exist They were not equivalent to social networks, primarily
because they are either person-to-person, or person-to-tiny group
![Page 9: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/9.jpg)
Artificial Worlds
New Phenomena/New Problems New privacy concerns Spam ( junk mail ) Scams (the Nigerian Widow fraud) online bullying stalking (physically following someone)
![Page 10: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/10.jpg)
The Data
Data vs. Information are interchangeable works in computing
Physical Form Information is literally everywhere in the physical
world Much of it can be captured and converted to
digital form. It is always represented as bits
(0’s and 1’s)
![Page 11: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/11.jpg)
The Data Data can be encapsulated in various format XML (Extensible Markup Language)
<?xml version="1.0" encoding="iso-8859-1"?>
<MyPersonalInformation>
<FullName>
<FirstName>Mandrix Mortel </FirstName>
<LastName>Mortini</LastName>
</FullName>
<BirthDate>
<Month>May</Month>
<Date>17</Date>
<Year>1983</Year>
</BirthDate>
<Address>
<Street>St. Michael</Street>
<Province>Palo</Province>
<City>Tacloban</City>
<Country>Philippines</Country>
<PostalCode>6501</PostalCode>
</Address>
</MyPersonalInformation>
![Page 12: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/12.jpg)
The Information You Use
Most of the information used daily is delivered by the World Wide Web
Newspapers, TV, magazines, and libraries also deliver information but in a diminishing role
Traditional newspapers versus web version Some digital data (like GPS or ATM
transactions) is not delivered at all by the Web
![Page 13: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/13.jpg)
Sourced Content
Sourced content is content produced for commercial purposes or to fulfill an information dissemination obligation
Examples include newspapers, shopping, government, celebrities, etc.
It is content that is entirely controlled by the source organization or person
The general public cannot add newinformation to sourced content
![Page 14: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/14.jpg)
Social Content
Social content refers to information created by visitors to the site
Examples include the social networking, media sharing, gaming, and reference
Users generate or contribute to the content of these sites
Although Google and other search engines do not create the content they display,they are not social networking sites
![Page 15: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/15.jpg)
The Files and Databases
The digital information we access through the WWW is stored on Web servers around the world as files and databases. Sourced content sites create the files and
databases and places them on their own servers Databases are everywhere; your digital
music (for example, iTunes) is organized as a database, as are your photos
![Page 16: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/16.jpg)
The Files and Databases
Your smart phone contacts are a database, and much of the other “stuff ” you’ve stored on your phone is organized that way, too.
![Page 17: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/17.jpg)
Application of Databases
Information retrieval Audio recognition Search by image (Google Goggles) Web search Face recognition Social networking for IR
Knowledge management Large-scale statistical techniques Text mining
![Page 18: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/18.jpg)
![Page 19: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/19.jpg)
Terms of Endearment
Not only should you learn the right computing terms, but you should also understand how to use them to benefit completely from the technology.
There are two practical reasons for this:1. Tech Support: Everyone needs and uses it
2. To learn a new subject, we must learn its terminology
![Page 20: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/20.jpg)
Tech Support
Usually, you must look up the answer yourself using the Help feature, or you must contact tech support The technician might not know what you talking
about Without the right word, the search algorithm of the
Help facility definitely won’t know what you mean
![Page 21: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/21.jpg)
Algorithms
What’s an algorithm? An algorithm is a precise, systematic method for
producing a specified result Important points about algorithms:
We use and invent algorithms all the time to solve our problems
Often the agent that “runs” the algorithm is a person, NOT a computer
![Page 22: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/22.jpg)
Algorithms (cont’d)
Computers are clueless. They need to be told what to do
For a method to be precise enough for a computer to follow, everything needs to be spelled out
Programmers make algorithms perfectly precise for computers by writing them in a programming language
![Page 23: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/23.jpg)
Algorithms (cont’d)
People do have a clue, so many things can be left out of an explanation when people have to follow directions
Example: After finding a letter, a computer has to be told to
go back to the beginning of the letter sequence to start looking for the next letter
People figure that out by themselves! Bubble Sort:
http://en.wikipedia.org/wiki/Bubble_sort
![Page 24: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/24.jpg)
Algorithm Versus Program
Algorithms are a precise, systematic method for producing a specified result
Programs are algorithms that have been specialized to a specific set of conditions and assumptions, and (usually) written in a specific programming language
In most cases however, we use the terms interchangeably
![Page 25: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/25.jpg)
The Words for Ideas
“Abstract” The word has several meanings:
In natural language: to remove can mean to steal In computing: to abstract also means to remove, but
this time, it’s an idea or a process, and it is extracted from some form of information
Abstractions Parables and fables require us to abstract the
essential point of the story so that wecan learn from it
![Page 26: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/26.jpg)
Abstractions
Notice two key points:1. Many, but not all the details, of the story are
irrelevant to the concept
2. The abstraction has meaning beyond the story
In computing, separating the relevant from the irrelevant, and applying the abstraction to other cases are essential
![Page 27: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/27.jpg)
2704/19/23 27
![Page 28: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/28.jpg)
2804/19/23 28
![Page 29: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/29.jpg)
Excerpt from MED
04/19/23 29
Medical Entity
Conceptual Entity Sampleable Entity Measurable EntityPhysical Object Event SpecimenEtiologic Agent
SubstanceAnatomic StructureOrderable Entity Intellectual Product Patient Problem Intravascular Fluid Specimen Activity
Classification Disease or Syndrome Finding Acquired Abnormality Chemical Serum Specimen Intravascular Chemistry Specimen Occupational Activity
Pharmacy Concepts ICD9 Element Laboratory or Test Result Lesion Chemical Viewed Structurally Serum Chemistry Specimen Health Care Activity
Pharmacy Item(Drug and Nondrug)
Drug Enforcement Agency (DEA)
Controlled Substance Category
ICD9 Disease Number OrString Result
Calcified Body Part or Structure
Organic Chemical
Allen SerumSpecimen
LaboratoryProcedure
DiagnosticProcedure
American HospitalFormulary
Service Class
CPMC Formulary Drug Item
Disorder ofCirculatory System
Common In-PatientDiagnoses
Diphenhydramine Amino Acid,Peptide or Protein
Laboratory DiagnosticProcedure
Antihistamine DrugDrug Enforcement
Agency (DEA) Class 0
Cardiovascular DiseaseEnzyme
Single-ResultLaboratory Test
CPMC Laboratory Diagnostic Procedure
Heart DiseaseAmylase
Single-Result Chemistry Test CPMC Chemistry Panels
DiphenhydraminePreparation
CPMC DrugsBenadryl 25 MG Cap
Disease of Pericardium
Disease of Pericardium,Other (ICD9)
Calcified of Pericardium
Pancreatin
Intravascular Chemistry Test
Serum Chemistry Test
Serum Amylase Test
Serum Total Amylase Test
Allen Serum Amylase Measurement
Amylase Panels
![Page 30: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/30.jpg)
The Words for Ideas
“Generalize” Process to recognize the common idea in two or
more situations To generalize is to express an idea, concept, or
process that applies to many situations The statement that sums up that idea is called a
generalization If it is true most of the time, we can generalize an
idea
![Page 31: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/31.jpg)
Summary
Recognize the three-part decomposition of everyday computing: hardware, software, and the experience.
Recognize Web information sources: sourced and social.
Determine how close to reality our interactions with computers are by identifying recorded, virtual, and artificial content.
![Page 32: Spring 2013 CS 103 Computer Science – Business Problems Lecture 2: Intro to Information Technology Part 2 Instructor: Zhe He Department of Computer Science.](https://reader036.fdocuments.us/reader036/viewer/2022062517/56649e8a5503460f94b8f491/html5/thumbnails/32.jpg)
Summary
Know and use the right word because as we learn words, we learn ideas; knowing the right words helps us to communicate.
Consider a brief list of “idea” words, such as abstract and generalize.