0% found this document useful (0 votes)
61 views36 pages

Final Exam Topic

The document covers topics for a final examination including software designs, hardware designs, embedded systems, computer architecture, engineering ethics, computer ethics, and e-commerce. It provides details on each topic such as Charles Babbage's analytical engine, programming languages, microcontrollers, integrated circuits, and definitions of computer ethics and e-commerce.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views36 pages

Final Exam Topic

The document covers topics for a final examination including software designs, hardware designs, embedded systems, computer architecture, engineering ethics, computer ethics, and e-commerce. It provides details on each topic such as Charles Babbage's analytical engine, programming languages, microcontrollers, integrated circuits, and definitions of computer ethics and e-commerce.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

TOPICS FOR

FINAL EXAMINATION
Topics
Introduction to Computer Engineering Desig
n
• Software Designs
• Hardware Designs
• Embedded Systems
• Computer Architecture
Engineering Ethics
• Computer Ethics
• E-Commerce
Software Designs
Charles Babbage's programs for his Analytical Engine
In 19th century.
A mathematician,
philosopher,
inventor and
mechanical
engineer

Originated the
concept of a
digital
programmable 
computer
Software Designs
Deriving a solution which satisfies
software requirements
Software Designs
Software Designs
Software Designs
Software
SoftwareDesigns
Designs
Programming Languages & IDE
Hardware Designs
In engineering, hardware architecture
refers to the identification of a system’s
physical components and their
interrelationships.
Hardware Designs
Microcontrollers
Arduino Raspberry Pi 3

FPGA
Hardware Designs
Integrated Circuits
Hardware Designs
Embedded Systems
A controller with a dedicated function within a larger mechanical
or electrical system, often with real-time computing constraints
Embedded Systems
Embedded Systems
Embedded Systems
Embedded Systems
Computer Architecture
In computer engineering, computer architecture is a set of rules
and methods that describe the functionality, organization, and
implementation of computer systems.
Computer Architecture
Von Neumann Architecture
Computer Architecture
Computer Ethics
It is a branch of practical principal that deals with how
the computer experts should make decisions in regard to the
social and professional behavior.

is set of moral principles that


regulate the use of computers

The name “computer ethics”


was not commonly used until
the mid-1970s when Walter
Maner began to use it.
Computer Ethics

Maner’s Definition
“ethical problems aggravated,
transformed or created by
computer technology.”
Computer Ethics
Common issues of Computer Ethics

Intellectual property rights


 Privacy concerns
 How computers affect society
Computer Ethics
The Ten Commandments of Computer Ethics

1- Thou shalt not use a computer to harm other people.


2- Thou shalt not interfere with other people's computer work.
3- Thou shalt not snoop around in other people's computer files.
4- Thou shalt not use a computer to steal.
5- Thou shalt not use a computer to bear false witness.
Computer Ethics
The Ten Commandments of Computer Ethics
6- Thou shalt not copy or use proprietary software for which you
have not paid.
7- Thou shalt not use other people's computer resources without
authorization or proper compensation.
8- Thou shalt not appropriate other people's intellectual output.
9- Thou shalt think about the social consequences of the program
you are writing or the system you are designing.
10- Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
Computer Ethics
Common Myths
• Unless you make money and charge for the copy then you are
not in violation of copyright laws.
• If a work doesn't have a copyright notice it is not copyrighted.

• You can remain anonymous when you copy songs from a file

sharing software service on the web.


•Fair use is a defense against a copying lawsuit.

• Educators and students can copy any amount of work from a

copyright source without asking permission.


Computer Ethics
What is fair use?

Fair use provisions of the copyright law allow for


limited copying or distribution of published works
without the author's permission in some cases. Examples
of fair use of copyrighted materials include quotation of
excerpts in a review or critique, or copying of a small
part of a work by a teacher or student to illustrate a
lesson.
Computer Ethics
WHEN IS A USE A "FAIR USE"?

Creating Something New or Copying?


Giving Credit Doesn't Let You Off the Hook.
More Take - Less Fair.
Competing With the Source You're Copying From?
E-Commerce
E-Commerce
Stands for: Electronic Commerce

It’s basically a world of business


online. But it’s not only selling and
buying. There’s more to it than
just Amazon or Ebay. It’s
circulated around everything a
business can do, but online, or
“virtually.”
E-Commerce
HOW E-COMMERCE IS GROWING?

According to Heggins " Entrepreneurship is meant that


function of seeking investment and production opportunity
organizing and enterprise to undertake a new production
process, raising capital, having labor, arranging the supply of
raw materials, finding site and selecting to managers of day-to-
day operations.
E-Commerce
E-Commerce
E-Commerce
E-Commerce
E-Commerce

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy