SlideShare una empresa de Scribd logo
1 de 13
INTRO TO COMPUTING
LOGIC FORMULATION
FOR-IAN V. SANDOVAL
ASST. PROFESSOR II
LAGUNA STATE POLYTECHNIC UNIVERSITY
LEARNING OBJECTIVES
• Gain knowledge on the fundamental principles and
concepts of information system and their relation to
the different fields.
• Explore the vast field of information system in search
of developments that can lead to the future trend of
the computing world.
• Examine solutions that are applied in the industry to
solve underlying information system threats.
CONTENTS
• Computer
• Information
• Computing Science
• Business Process
• Ethics
• Data Security
• Data and Knowledge Management
COMPUTER
• The word computer comes from the word “compute” which
means, “to calculate”.
• a computer is an electronic device that can perform
arithmetic operations at high speed
• also called a data
processor because it
can store, process,
and retrieve data
whenever desired
DATA PROCESSING
DATA VS INFORMATION
DATA INFORMATION
Data is raw, unorganized facts that
need to be processed. Data can
something simple and seemingly
random and useless until it is
organized.
When data is processed,
structured or presented in a given
context so as to make it useful, it is
called information.
"Data" comes from a singular Latin
word, datum, which originally
meant "something given." Its early
usage dates back to the 1600s.
Over time "data" has become the
plural of datum.
"Information" is an older word that
dates back to the 1300s and has
Old French and Middle English
origins. It has always referred to
"the act of informing, " usually in
regard to education, instruction, or
other knowledge communication.
TURNING DATA INTO INFORMATION
COMPUTING SCIENCE
• Computing science deals with the study of both computer
hardware and software design.
• It encompasses both the study of theoretical algorithms and the
practical problems involved in implementing them through
computer hardware and software.
• The study of computer science has many branches, including
artificial intelligence, software engineering, programming and
computer graphics.• The need for computer science as a discipline
has grown as computers become more
integrated into our day-to-day lives and
technology continues to advance.
BUSINESS PROCESSES
• A business process is an activity or set of activities that can
accomplish a specific organizational goal.
• Business processes should have purposeful goals, be as
specific as possible and have consistent outcomes.
Source: https://bmbgroup.com/business-process-management/
ETHICS
Ethics came from the greek word ethos
[character/custom/disposition]
defined as the systematic study of morality.
Ethics is related to the code or set of principles,
standards, or rules that guide the moral action of an
individual within a particular social framework.
It is concerned with moral judgement and moral
decision, involving questions about human behaviour or
conduct.
DATA SECURITY
Source: https://www.google.com/search?q=data+security&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjy-
uz93_3jAhWBMd4KHcZTAs8Q_AUIEigC&biw=1280&bih=608#imgrc=zNUNxB9BOSHmcM:
• Data security refers to protective digital privacy measures that
are applied to prevent unauthorized access to computers,
databases and websites.
• Data security also protects data from corruption. Data security is
an essential aspect of IT for organizations of every size and type.
• Data security is an essential aspect of IT for organizations of
every size and type.
• Data security is also
known as information
security (IS) or
computer security.
DATA AND KNOWLEDGE MANAGEMENT
• Knowledge Management (KM) is a
discipline that crosses many areas
such as economics, informatics,
psychology and technology.
• KM is seen as a strategy that
creates, acquires, transfers,
consolidates, shares and enhances
the use of knowledge in order to
improve organizational
performance and survival in a
business environment.
REFERENCES
https://www.diffen.com/difference/Data_vs_Information
https://www.guru99.com/difference-information-data.html
https://www.youtube.com/watch?v=TqrtH7LMDFk
https://www.techopedia.com/definition/592/computer-science
https://searchcio.techtarget.com/definition/business-process
https://www.techopedia.com/definition/26464/data-security
http://www.kmworld.com/Articles/Editorial/What-Is/What-is-KM-Knowledge-Management-Explained-
122649.aspx

Más contenido relacionado

La actualidad más candente

Information technology
Information technologyInformation technology
Information technology
Enes Bolfidan
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
KMJ Science Computer
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
syifaaismail
 
Importance of computer in professional life
Importance of computer in professional lifeImportance of computer in professional life
Importance of computer in professional life
Vïpĭn Râẁât
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
drussell54
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
Rimple Darra
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
Shaheen Khan
 
Basics of computer science
Basics of computer scienceBasics of computer science
Basics of computer science
Paul Schmidt
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
AjboyDiog
 

La actualidad más candente (20)

Information technology
Information technologyInformation technology
Information technology
 
information technology
information technologyinformation technology
information technology
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer Science
 
information technology
information technology information technology
information technology
 
Information technology and its impact on society
Information technology and its impact on societyInformation technology and its impact on society
Information technology and its impact on society
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
 
Role of IT in Research: How to improve productivity of Research Process
Role of IT in Research: How to improve productivity of Research ProcessRole of IT in Research: How to improve productivity of Research Process
Role of IT in Research: How to improve productivity of Research Process
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
 
Importance of computer in professional life
Importance of computer in professional lifeImportance of computer in professional life
Importance of computer in professional life
 
Why we use computer and need it
Why we use computer and need itWhy we use computer and need it
Why we use computer and need it
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Basics of computer science
Basics of computer scienceBasics of computer science
Basics of computer science
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 

Similar a Introduction to Computing Logic Formulation

Management information system (1)
Management information system (1)Management information system (1)
Management information system (1)
Aily Sangcap
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Mis for class lecture 1 final
Mis for class lecture 1 finalMis for class lecture 1 final
Mis for class lecture 1 final
Awais Idrees
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
alinainglis
 

Similar a Introduction to Computing Logic Formulation (20)

Management information system (1)
Management information system (1)Management information system (1)
Management information system (1)
 
Week-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfWeek-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdf
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Introduction to Information management
Introduction to Information management Introduction to Information management
Introduction to Information management
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Chapter 1 Introduction to Datascience (1).pptx
Chapter 1 Introduction to Datascience (1).pptxChapter 1 Introduction to Datascience (1).pptx
Chapter 1 Introduction to Datascience (1).pptx
 
Mis for class lecture 1 final
Mis for class lecture 1 finalMis for class lecture 1 final
Mis for class lecture 1 final
 
Data Science-1 (1).ppt
Data Science-1 (1).pptData Science-1 (1).ppt
Data Science-1 (1).ppt
 
Data Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptxData Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptx
 
Computer Science.pptx
Computer Science.pptxComputer Science.pptx
Computer Science.pptx
 
Managing digital in this era for information systems more developing
Managing digital in this era for information systems more developingManaging digital in this era for information systems more developing
Managing digital in this era for information systems more developing
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
 
Data Analytics and Big Data on IoT
Data Analytics and Big Data on IoTData Analytics and Big Data on IoT
Data Analytics and Big Data on IoT
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
Information Management
Information ManagementInformation Management
Information Management
 
Computing curriculum design workshop
Computing curriculum design workshopComputing curriculum design workshop
Computing curriculum design workshop
 
National Agenda ACARA
National Agenda ACARANational Agenda ACARA
National Agenda ACARA
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 

Más de Laguna State Polytechnic University

Más de Laguna State Polytechnic University (20)

Number Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number TheoryNumber Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number Theory
 
Formal Logic - Lesson 8 - Predicates and Quantifiers
Formal Logic - Lesson 8 - Predicates and QuantifiersFormal Logic - Lesson 8 - Predicates and Quantifiers
Formal Logic - Lesson 8 - Predicates and Quantifiers
 
Machine Learning Algorithms (Part 1)
Machine Learning Algorithms (Part 1)Machine Learning Algorithms (Part 1)
Machine Learning Algorithms (Part 1)
 
Artificial Intelligence Algorithms
Artificial Intelligence AlgorithmsArtificial Intelligence Algorithms
Artificial Intelligence Algorithms
 
Formal Logic - Lesson 7 - Rules of Inference
Formal Logic - Lesson 7 - Rules of InferenceFormal Logic - Lesson 7 - Rules of Inference
Formal Logic - Lesson 7 - Rules of Inference
 
Formal Logic - Lesson 6 - Switching Circuits
Formal Logic - Lesson 6 - Switching CircuitsFormal Logic - Lesson 6 - Switching Circuits
Formal Logic - Lesson 6 - Switching Circuits
 
Formal Logic - Lesson 5 - Logical Equivalence
Formal Logic - Lesson 5 - Logical EquivalenceFormal Logic - Lesson 5 - Logical Equivalence
Formal Logic - Lesson 5 - Logical Equivalence
 
Formal Logic - Lesson 4 - Tautology, Contradiction and Contingency
Formal Logic - Lesson 4 - Tautology, Contradiction and ContingencyFormal Logic - Lesson 4 - Tautology, Contradiction and Contingency
Formal Logic - Lesson 4 - Tautology, Contradiction and Contingency
 
Formal Logic - Lesson 3 - Truth Tables
Formal Logic - Lesson 3 - Truth TablesFormal Logic - Lesson 3 - Truth Tables
Formal Logic - Lesson 3 - Truth Tables
 
Formal Logic - Lesson 2 - Logical Connectives
Formal Logic - Lesson 2 - Logical ConnectivesFormal Logic - Lesson 2 - Logical Connectives
Formal Logic - Lesson 2 - Logical Connectives
 
Formal Logic - Lesson 1 - Introduction to Logic
Formal Logic - Lesson 1 - Introduction to LogicFormal Logic - Lesson 1 - Introduction to Logic
Formal Logic - Lesson 1 - Introduction to Logic
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Number Systems Basic Concepts
Number Systems Basic ConceptsNumber Systems Basic Concepts
Number Systems Basic Concepts
 
Number Systems Basic Concepts
Number Systems Basic ConceptsNumber Systems Basic Concepts
Number Systems Basic Concepts
 
Exploring the Difference Between Information Technology and Information System
Exploring the Difference Between Information Technology and Information SystemExploring the Difference Between Information Technology and Information System
Exploring the Difference Between Information Technology and Information System
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Oasis of Sparkling and Refreshing Truisms
Oasis of Sparkling and Refreshing TruismsOasis of Sparkling and Refreshing Truisms
Oasis of Sparkling and Refreshing Truisms
 
My Teacher Got IT v2.0 - Software Installation Track
My Teacher Got IT v2.0 - Software Installation TrackMy Teacher Got IT v2.0 - Software Installation Track
My Teacher Got IT v2.0 - Software Installation Track
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Centralized Learning and Assessment Tool
Centralized Learning and Assessment Tool Centralized Learning and Assessment Tool
Centralized Learning and Assessment Tool
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Introduction to Computing Logic Formulation

Notas del editor

  1. Each student's test score is one piece of data. The average score of a class or of the entire school is information that can be derived from the given data.
  2. 5 Ways to Enhanced Data Security 1. Limit Data Access 2. Identify Sensitive Data 3. Pre-Planned Data Security Policy 4. Strong and Different Passwords for Every Department 5. Regular Data Backup and Update