Sunday, March 17, 2013

Computer Science as a Career Path


Haloo GerBro AND GerSist .. This time we will discuss a bit about a lot of questions that might come up when we make choices, one of them in order to choose a course and finally the desired career path, we can ask the important questions. Why did we choose this field? Are we able to work well? There will be jobs for us when we finish our education? Will we enjoy our work? true where further our position? This is related about life choices but not pasangn lhoo yaaa .. but about our career .. for a discussion of fault should let me check this time!!!!!

A.  Why Computer Science Field Maybe Right for You? 
  Reasons to Major in Computer Science 
The computer industry is one of the fastest growing segments of our economy and pledged to continue to see growth well into the future. To be competitive, companies must continue to employ trained professionals not only to produce high quality products for today, but also to plan creative scientific and engineering advances for the future.

The nature of the Computer Scientist 
 You want to build things that are useful to the people and that will have a positive impact on their lives.
To be successful in the workplace: You also have to be good communicators. You should be able to explain your plans and solutions both for both technical and non-technical. You should be able to write clearly and concisely in a technical environment. Fourth is the joy of always learning as a non-recurring nature of the work. Finally, there is the joy of working with the media is very obedient. Programmers can make in his or her imagination and easily deliver products that can be tested and easy to change and reset.

 B.  Computer Disciplines and Majors to Choose From 
Computing is a broad discipline that cuts other areas such as math-ematics, science, engineering, and business. Because such a wide selection, it is impossible for anyone to be an expert in all merekaMereka students who are also members of underrepresented minorities will find the field to be full of prospects.

  1. Computer science degrees 
  2. Computer Engineering Degree 
  3. Software engineering degrees 
  4. Electrical engineering department 
  5. Engineering colleges 
  6. Department of Computer Science 
  7. Level information technology 
  8. Business college 
  9. Information systems degree 
  10. Science lecture 


Computer Science 
   Computer science as a discipline covers a wide range of topics-cal and theoretical foundation for the development of cutting-edge algorithms. Work computer scientists are trained to do can be organized into three categories:
 • Design and implement software that is useful.
 • Designing new ways to use computers.
 • Develop effective ways to solve computing problems.

 Computer Engineering 
     For students who are more interested in understanding and designing the actual computing devices, many opportunities are available in computer engineering, which deals with the design and construction of computers and computer-based systems. Computer engineering degree involves the study of hardware, soft-ware, communications, and interactions between them, and a customizable mix with a bachelor's degree in Electrical Engineering Computer Science.

Information Systems 
    The information systems (IS) field focuses on integrating technology into the business and other companies to manage their information in a man-ner efficient and safe. In this area, the technology is seen as an instrument to produce, process, and distribute information. Therefore, the focus in this area is on the principles of business and organizations.

Information Technology 
    An Information Technology (IT) program prepares students to meet the needs of computer technology business, government, healthcare, schools, and other organizations. TI has an emphasis on the technology itself, more than the information that is handled, the theory behind it, or how to design hardware or software.

Software Engineering 
     Software engineering (SE) is the discipline of the development and maintenance of large software systems. This system should behave reliably and efficiently, be affordable, and meets all the requirements set for them. SE tried to integrate the theory of computer science and mathematics to practical engineering principles devel-oped for physical objects.

Mixed Disciplinary Majors
    Technology which opens the door to the field of study that combines different scientific or engineering field with computing. Higher education institutions have responded by offering a multidisciplinary graduate program for majors.
Bioinformatics is the use of computer science to store, analyze, and store biological data and to assist in          
 solving biological problems-usu-ally at the molecular level.
Artificial Intelligence (AI) is the implementation and study of systems that can exhibit autonomous  
 ntelligence or behavior. AI exciting research from many fields including computer science, psychology,
 philosophy, linguistics, neuroscience, logic, and economics. Applications include robotics, control systems,
 scheduling, logistics, speech recognition, handwriting recognition, natural language understanding, proving
 mathematical theorems, data mining, and face recognition.
 • Computer Forensics is a branch of forensic science pertaining to legal evi-dence that may be found in computers and digital storage devices. The col-reading of evidence must comply with the standards of acceptable evidence in a court of law. Computer forensics involves the fields of law, law enforcement, and business.
Cryptology (or cryptography) is the practice and study of hiding information and involve mathematics, computer science, and engineering. Electronic data security to trade, personal use, and to use the military continues to be important.
 • Mechatronics is the combination of mechanical engineering, mechanical engi-neering, and software tools in order to design advanced hybrid systems. Examples of mechatronics include production systems, inventor of planetary exploration, automotive subsystems such as anti-lock braking systems, and autofo-cus camera.
 computer science is probably the title that will open the door in the most diverse areas of computing.

 C. Career Opportunities 
This means that computer science are listed in the job description, or the type of degree you want, or recommended courses for the job. Suitable examples include engineers Computer Software, Computer Systems Analysts, Mathematicians, Computer Programmer, Web Designer and Developer, Secondary and Postsecondary Teachers, Statistics, Medical Records and Health Information Technicians, atmospheric scientists, and Market Research survey, economists, Radiation Therapist, Urban and regional planners, Surveyors and Mapping Technician, Conservation Scientists and Foresters, Travel Agencies, Private Detectives and Investigators, Geoscientists, psychologists, and Interpreter Translator. 

COMPUTER CATEGORY 
A. Electronic Computers Then and Now 

  FIGURE 1.1      
The Intel Atom processor chip contains the full circuitry of a central processing unit in an integrated circuit whose small size and low power requirements make it suitable for use in mobile internet devices. (Intel Corporation Pressroom Photo Archives)


FIGURE 1.2
(A) Desktop Computers, iMac. (© Hugh Threlfall / Alamy). (B) Hewlett Packard Laptop. (© Hewlett-Packard Company). (C) iPad. (© D. Hurst / Alamy). (D) an Android phone, the LG Thrill 4G. (© Handout / MCT / NewsCom).

 Hardware is the equipment used to perform the necessary calculations and includes a central processing unit (CPU), monitor, keyboard, mouse, printer, and speakers.
The software consists of programs that enable us to solve the problem with the computer by providing a list of instructions to perform

 In essence, consists mainly of the following components:
 ■ ■ Main memory secondary memory, which includes storage devices such as hard disks, CDs, DVDs, and
       flash drives Central processing unit
 ■ ■ input devices, such as keyboard, mouse, touch pad, scanner, joystick
 ■ ■output devices, such as monitors, printers, and speaker
 
Figure 1.3 shows how these components interact in a computer, with an arrow pointing in the direction of the flow of information

  Memory 
Memory is an important component in any computer. Let's see what it consists of and how a computer works with it.


Byte and Bits




A memory cell is actually a grouping of smaller units called bytes. Byte is the amount of storage required to store one character. The number of bytes of memory cell can contain varies from computer to computer. A byte consists of units smaller bits called storage (Figure 1.5).


   Main Memory 
program memory stores, Main data, and results. Most computers have two main types of memory: random access memory (RAM), which offers
store programs or data permanently. RAM temporarily stores programs while they are being executed (performed) by the computer
                                                           

  Storage Device 
computer systems provide secondary storage in addition to the main memory for two reasons. First, the computer needs a permanent or semi-permanent storage so that information can be held during power loss or when the computer is turned off. Second, the system typically store more information than fit in memory. Figure 1.6 shows some of the most common secondary storage and storage media.

Read-only memory (ROM) 
Part of the main memory that permanently store programs or data
volatile memory is memory that it lost when the computer is turned off
secondary storage unit such as a disk or flash drive that stores data even when the power to drive off    thin   disk of metal or plastic plate on the data represented by the magnetic spots arranged in tracks
   optical drive is a device that uses a laser to access or store data on CD or DVD
CD Hard disk Flash drive


  Central Processing Unit 
The central processing unit (CPU) has two roles: coordinating all computer operations and perform arithmetic and logic operations on data.

  Input / Output Devices 
We use the input / output (I / O) devices to communicate with the computer. In particular, they allow us to enter data for calculations and to observe the results of such calculations. You have to send that information to an output device called printer.

  Computer Networks 
A network that connects many individual computers and local area networks in a wide geographical area called a wide area network (WAN). The most popular WAN is the Internet, a network of universities, corporations, government, and public-access network. Internet is a descendant of the computer network ARPAnet project designed by the 1969 U.S. Department of Defense. The most widely used aspect of the Internet is the World Wide Web (WWW), the universe of Internet accessible resources are navigable through the use of a graphical user interface (GUI)
FIGURE 1.8


Wireless high-speed Internet to bring Internet data to your computer with the speed of several billion bits per second using the same coaxial cable that brings cable TV. Wireless communications and satellites provide data speeds comparable to cable.


computer software
 Taking repeated and instruction execution. In this section we focus on this all-important list of instructions called computer programs or computer software

  Operating System 


 The collection of computer programs that control the interaction of the user and the computer hardware is called the operating system (OS). Here is a list of some of the many responsibilities of the operating system:

  1. Communicate with computer users: take orders and carry them out or reject them with an error message. 
  2. Managing the allocation of memory, processor time, and other resources for various tasks. 
  3. Gather input from keyboard, mouse, and other input devices, and pro-viding data to the program is running. 
  4. Delivering the program output to the screen, printer, or other output device. 
  5. Accessing data from secondary storage. 6. Writing data to secondary storage. 

 You can see the directory of your hard drive (C :), backup drive (F :), optical drive (D :), or flash drive (E :) by double-clicking the appropriate icon.
 
Software applications
   Application program developed to help computer users in completing certain tasks.

Computer Languages 
 machine language is a set of num-bers binary. Another disadvantage of machine language is that it is not standard: There are machine language is different for each type of CPU.



Implementing Programs 
  To execute a machine language program, the CPU must check each instruction program in memory and sends command signals needed to carry out those instructions. Although the instructions are usually executed sequentially, as we will discuss later, is likely to have missed a few CPU instructions or execute multiple instructions more than once. During execution, data can be entered into memory and manipulated in some particular way. Instructions specific program that is used to enter or scan data from a program (called input data) into memory. Once the input data has been processed, instructions for displaying or printing values ​​in memory can be executed to display the results of the program. The lines displayed by a program called the program output.


D.  Method Development Software 
Programming is a problem-solving activity. If you are a good problem solver, you have the potential to become a good programmer. Therefore, one goal of this book is to help you improve your problem solving ability. Problem-solving methods are covered in a variety of subjects. Students learn to solve business problems with a systems approach, while engineering and science students use engineering and scientific method. Programmers use software development methods.

  Software Development Methods 

  1. Determine the requirements of the problem. 
  2. Analyze the problem.
  3. Design algorithms to solve the problem. 
  4. Implementing algorithms. 
  5. Test and verify the program is completed.
  6. Maintain and update the program. 


  ALGORITHM FOR PROGRAMMING PROBLEM 

  1. Get the data. 
  2. Perform calculations. 
  3. Displaying results. 

 Checking the table is an important part of the design of algorithms that are often overlooked. To check the algorithm table, you have to be careful doing every step of the algorithm (or its refinement) as the computer and verify that the algorithm works as intended. You will save time and effort if you find errors earlier algorithm in the troubleshooting process. .

  IMPLEMENTATION 
  Applying the algorithm (step 4 in the software development method) involves writing as a program. You have to change every step of the algorithm into one or more statements in a programming language.
  TESTING
  Testing and verifying the program requires completion of testing program to verify that it works as desired. Do not rely on just one test case. Run the program several times using different sets of data to ensure that it works correctly for every situ-ation is set in the algorithm.
  MAINTENANCE
  Maintain and update the program involves modifying a program to delete a previously undetected errors and keep up-to-date as changes in government regulations or company policy. Many organizations maintain the program for five years or more, often after the programmer who originally encoded have left or moved to another position. A disciplined approach is essential if you want to create a program that is easy to read, understand, and maintain. You must follow the accepted style guidelines program (which will be emphasized in this book) and avoid tricks and shortcuts programming.

E Professional Ethics for Computer Programmer 
As with other professionals, computer programmers and software designers system (called software engineers) must follow certain standards of professional conduct.

Privacy and Abuse Data 
 Programmers should always behave in a socially responsible manner and not take the information that they are authorized to see. A programmer that changed the information in a database containing financial records for his personal gain-for example, changing the amount of money in the bank account was guilty of theft computer or computer fraud. It is a crime that can lead to fines and imprisonment.

Computer Hacking 
  Secret or confidential information taken in this way have been sold to the intelligence agencies of other countries. Other hackers have tried to break into computers to retrieve information for their own amusement or as a joke, or just to show that they can do it. Of course, data theft and virus propagation can not be considered harmless pranks, they are illegal and carry serious penalties.

Plagiarism and Piracy Software 
 Using the program to others without permission is also unprofessional behavior. While it is certainly possible to use modules from the library that has been developed for reuse by programmers of their own company, you can not use another programmer private program or programs of other companies without getting permission first-ting.

Misuse of a Computer Resources 
  Computer system permissions or account user code is personal property. The privilege must be protected, should not be loaned or shared with anyone else and should not be used for purposes not intended.

0 comments:

Post a Comment

Newer Post Older Post Home

Nozh_Statistik

Selamat Datang, di Tunggu Ocehannya :) © copyright by Nozhbitha

Translate

Facebook Nozhbitha

Twitter-nozhbitha

Followers

copyright by Nozhbitha. Powered by Blogger.
 

Blog Archive