Component 4:
Introduction to Information and Computer Science
Instructor Manual
Version 2.0/Spring 2011
Notes to Instructors
This Instructor Manual is a resource for instructors using the materials for Component 1: Introduction to Health Care and Public Health in the US. Each component is broken down into Units, which will include the following elements:
· Learning objectives
· Suggested student readings, texts, reference links to supplement the narrated and scripted PowerPoint slides
· Lectures (voiceover PowerPoint in Flash format); PowerPoint slides (PPT and PDF), lecture transcripts (MS Word documents); and audio files (MP3) for each lecture
· Self-assessment questions reflecting Unit Objectives with answer keys and/or expected outcomes
· Application Activities (e.g., discussion questions, assignments, projects) with instructor guidelines and answer keys and/or expected outcomes
Contents
Component Overview 4
Component Authors 5
Disclaimer 7
Component 4/Unit 1 8
Component 4/Unit 2 12
Component 4/Unit 3 17
Component 4/Unit 4 20
Component 4/Unit 5 24
Component 4/Unit 6 27
Component 4/Unit 7 29
Component 4/Unit 8 32
Component 4/Unit 9 35
Component 4/Unit 10 38
Component Glossary 40
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported 45
Component Overview
Introduction to Information and Computer Science is for students without an IT background. It provides a basic overview of computer architecture; data organization, representation and structure; structure of programming languages; networking and data communication. Includes basic terminology of computing.
After the completion of this components, students will be able to:
1. Use proper hardware, network, Internet and software computer terminology in written and verbal communications.
2. Write simple computer programs including constructs such as conditional statements, loops, functions, objects, simple data structures, etc.
3. Design a simple database and develop querying statements for it.
4. Describe network computing, its benefits and risks, and identify commonly-used communications hardware and software components.
5. Identify security risks for computing systems and discuss potential solutions.
6. Explain the design and development process of a large system such as an EHR.
Component Authors
Assigned Institution
Oregon Health Science University
Portland, Oregon
Component Lead
Michelle R. Hribar, PhD
Director of Biomedical Informatics Resource Core
Instructor, Department of Medical Informatics and Clinical Epidemiology
Oregon Health Science University
Portland, Oregon
Component Authors
John Blackwood, MS
Associate Professor
Umpqua Community College
Roseburg, Oregon
Justin Fletcher, PhD
Assistant Professor
Department of Medical Informatics and Clinical Epidemiology
Oregon Health Science University
Portland, Oregon
Vicki Jonathan, BS
Instructor
Computer Information Systems Department
Portland Community College
Portland, Oregon
Mike Talbert, BA
Instructor in Computer Information Systems and Health Informatics
Portland Community College
Portland, Oregon
Lecture Narration
Connie Bowman
Voiceover Talent
http://www.conniebowman.com
Mike Collins, Glenwood Sound
Sound Engineer
http://www.glenwoodsound.com
Team Members
Shelby Acteson, MEd
Instructional Specialist
Oregon Health & Science University
Corkey Devlin, BFA, PMP
Project Manager
Oregon Health & Science University
William Hersh, MD
Principal Investigator
Professor and Chair of the Department of Medical Informatics
Oregon Health & Science University
Nathan Skidmore, BA
Instructional Design Assistant
Oregon Health & Science University
Chris Weldon, BS
Web Specialist
Oregon Health & Science University
Disclaimer
These materials were prepared under thesponsorship of an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.
Likewise, the above also applies to the Curriculum Development Centers (including Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, University of Alabama at Birmingham, and their affiliated entities).
Component 4/Unit 1
Basic Computing Concepts Including History
Unit Description
This unit will discuss the history of basic computing concepts and the ways that computers input, manipulate, calculate, and output data. It will provide information on selecting a computer by discussing the range of computer types, from desktops to laptops to servers. It will also discuss computer hardware and software and other electronic devices that contain computers.
Learning Objectives
By the end of this unit the student will be able to:
a. Define what a computer is.
b. List different types of computers (PC's, mobile devices, embedded computers, etc.).
c. Define the common elements of computer systems.
d. Describe the various hardware and software options for typical desktop, laptop and server systems for home/business use (focusing on healthcare systems).
e. Explain the development of computers and the Internet, including healthcare systems up until the present time.
Unit Topic(s)
1.0 What is a computer?
1.0a - Definition of a computer
1.0b - Types of computers
1.0c - Common Elements of computer systems
2.0 - Selecting a computer
2.0a – Selecting a desktop
2.0b – Selecting a laptop
2.0c – Selecting a system for healthcare applications
3.0 – History of Computing
3.0a – The beginnings of computers
3.0b – The first computers
3.0c – Early electronic medical records
3.0d – Personal computers
3.0e – The Internet
3.0f – Current and future computers
Lecture(s)
1-1 Computer Definition, Examples and Components
1-2 Selecting a Computer
1-3 Selecting a Computer
1-4 Computer History
1-5 Computer History
Readings/References/Online Resources
Collen, Morris Frank B.E.E., M.D. A History of Medical Informatics in the United States: 1950 – 1990. Indianapolis: BooksCraft, Inc.; 1995.
Cringely, Bob. Triumph of the Nerds [DVD]. Ambrose Video; 2002.
Desktop Buying Guide. CNET [serial on the Internet]. 2010 March 24; [cited 22 March 2011]; Available from: http://reviews.cnet.com/desktop-computer-buying-guide/.
Electronic Health Record. Wikipedia [free encyclopedia on the Internet]. 2011 March 20; [cited 22 March 2011]; Available from: http://en.wikipedia.org/wiki/Electronic_health_record .
EMR Experts. Selecting the right hardware configuration for your EMR. [cited 22 March 2011]; Available from: http://www.emrexperts.com/articles/emr-hardware-buying.php.
Evans A, Martin K, Poatsey MA. Chapter 1: Why Computers Matter to You. In: Technology in Action: Complete. 7th ed. New Jersey: Prentice Hall; 2010.
Evans A, Martin K, Poatsey MA. Chapter 2: Looking at Computers: Understanding the Parts. In: Technology in Action: Complete. 7th ed. New Jersey: Prentice Hall; 2010.
Franklin, Eric. Monitor Buying Guide. CNET [serial on the Internet]. 2010 December 20; [cited 22 March 2011]; Available from: http://reviews.cnet.com/monitor-buying-guide/.
History of Computing Hardware. Wikipedia [free encyclopedia on the Internet]. 2011 March 18; [cited 22 March 2010]; Available from: http://en.wikipedia.org/wiki/History_of_computing_hardware.
History of Computing. Wikipedia [free encyclopedia on the Internet]. 2011 March 9; [cited 22 March 2011]; Available from: http://en.wikipedia.org/wiki/History_of_computing.
Kass-Bartelmes, Barbara L., M.P.H., C.H.E.S., Ortiz, Eduardo, M.D., M.P.H. Medical Informatics for Better and Safer Health Care. Research in Action, Issue 6 [serial on the Internet]. 2002, June; [cited 22 March 2011]; Available from: http://www.ahrq.gov/data/informatics/informatria.htm.
Laptop Buying Guide. CNET [serial on the Internet]. 2010 October 5; [cited 22 March 2011]; Available from: http://reviews.cnet.com/laptop-buying-guide/.
Parsons JJ, Oja D. Chapter 1: Computers and Digital Basics. In: New Perspectives on Computer Concepts 2011: Comprehensive. 13th ed. Boston: Course Technology; 2010.
Shelley GB, Vermaat ME. Chapter 1: Introduction to Computers. In: Discovering Computers 2011: Introductory. 1st ed. Boston: Course Technology; 2010.
VistA. Wikipedia [free encyclopedia on the Internet]. 2011 March 18; [cited 22 March 2011]; Available from: http://en.wikipedia.org/wiki/VistA.
Images
Lecture 1/Slide 5: Attribution: Lawrence Livermore National Laboratory
Lecture 1/Slide 6: Photo of ABS brakes © by Jeff Dean.
Lecture 1/Slide 11: Photo by Andrew Dunn; http://www.andrewdunnphoto.com/
Lecture 2/Slide 5: Photo by Robert Nelson from Tarpon Springs, Florida, USA; derivative work: Max Naylor
Lecture 4/Slide 2: Photo of the Ishango bone from two different points of view. Science Museum of Brussels gave the photo.
Lecture 4/Slide 3: http://www.ee.ryerson.ca/~elf/abacus/leeabacus/
Lecture 4/Slide 4: (An old sliderule (showing the calculation 1.3 x 2 = 2.6). Photo taken on 23 Dec 2005 by Roger McLassus und uploaded the same day.)
Lecture 4/Slide 5: National Archaeological Museum, Athens, No. 15987 | http://commons.wikimedia.org/wiki/File:NAMA_Machine_d%27Anticyth%C3%A8re_1.jpg |
Lecture 4/Slide 6: Replica and drawing: Erez Kaplan, 1996 | http://192.220.96.166/leonardo/leonardo.html
Lecture 4/Slide 9: Photo of difference engine at the Computer History Museum in Mountain View, California: Canticle at en.wikipedia | http://en.wikipedia.org/wiki/File:Difference_engine.JPG
Lecture 4/Slide 10: Photo of modern model of Babbage's Analytical Engine by Marcin Wichary from San Francisco, U.S.A.
| http://en.wikipedia.org/wiki/File:Analytical_Engine_%282290032530%29.jpg
Lecture 4/Slide 16: Photo of Grace Hopper: Hagley Museum and Library | http://digital.hagley.org/u?/p268001coll4,1203
Lecture 4/Slide 20: Photo of Women programming Eniac; U.S. Army photo, from archives of the ARL Technical Library, courtesy of Mike Muuss | http://www.library.upenn.edu/exhibits/rbm/mauchly/img/eniac4.jpg
Lecture 4/Slide 25: Photo of CRAY-1 (no longer used, of course) displayed in the hallways of the EPFL in Lausanne | Photo by Rama | http://commons.wikimedia.org/wiki/File:Cray-1-p1010221.jpg
Lecture 5/Slide 4: Photo of Apple-1, with keyboard attached. Image from Michael Holley of SWTP Corporation.
Lecture 5/Slide 5: Photo of IBM PC 5150 with keyboard and green monochrome monitor (5151), running MS-DOS 5.0 | Photo by Boffy b. | http://commons.wikimedia.org/wiki/File:IBM_PC_5150.jpg
Lecture 5/Slide 13: Created by Sam Johnston using OminGroup's OmniGraffle and Inkscape (includes Computer.svg by Sasa Stefanovic) | http://en.wikipedia.org/wiki/File:Cloud_computing.svg
Student Application Activities
comp4_unit1_activity.doc
comp4_unit1_activity_key.doc
comp4_unit1_activity_results_page.doc
comp4_unit1_activity_dataset.xls
comp4_unit1_discuss.doc
comp4_unit1_discuss_key.doc
comp4_unit1_exercises.doc
comp4_unit1_exercises_key.doc
comp4_unit1_self-assess.doc
comp4_unit1_self-assess_key.doc
Component 4/Unit 2
Internet and World Wide Web
Unit Description
This unit will cover the implications, origins, and use of the Internet and the World Wide Web. It will also discuss the advantages and disadvantages of this technology.
Learning Objectives
By the end of this unit the student will be able to:
1. Define the Internet and how to connect to it.
2. Define the World Wide Web and how to access it—with URL's and search engines .
3. Learn how to write effective search queries for Internet search engines, filtering the results and evaluate credibility of information.
4. Discuss security and privacy concerns on the Internet (phishing, identify theft, keystroke copying).
5. List ethical issues for the Internet, including intellectual property rights and copyright, free speech vs. libel/slander, etc.
6. Explore online healthcare applications and associated security and privacy issues (including HIPAA).
Unit Topic(s)
2.0 - What is the Internet?
2.1a - The Origins of the Internet.
2.1b - The Internet Today.
2.1c - The Internet Spawns the WWW.
2.2 - Who Created the WWW?
2.2a - How does the Web Work?
2.2b - HTML – The Language of the Web.
2.2c - The World’s First Web Server.
2.2d - Who Owns the Web?
2.3 - Standardized Communications.
2.3a - Internet Addressing Basics.
2.3b - How to Obtain an IP Address.
2.4 - Introducing Domain Names.
2.4a - DNS and IP Work Well Together.
2.4b - What is a Domain Name?
2.5 - Connecting to the Internet.
2.5a - Service Providers and You.
2.5b - Internet Access For a Fee.
2.5c - Provider Equipment.
2.5d - Customer Premises Equipment.
2.5e - Leasing an IP Address.
2.5f - Leasing a Dynamic IP Address.
2.5g - Leasing a Static IP Address.
2.5h - DNS – Another ISP Service.
2.6 - Searching the Internet.
2.6a - Search Engine Providers.
2.6b - How do Search Engines Function?
2.6c - Using a Search Engine.
2.6d - Web Search Tips.
2.6e - Search Results in a Nutshell.
2.7 - Internet Security and Privacy Concerns.
2.7a - What Devices are Usually Attacked?
2.7b - How do Hackers Attack Devices?
2.7c - Secure Your Operating System.
2.7d - Secure Your Files.
2.7e - Engage in Safe Browsing.
2.7f - Close Popup Windows Safely.
2.7g - Secure Your Computer System.
2.7h - Manage Cookies.
2.7i - Passwords and the Internet.
2.7j - Passwords and the Internet.
2.8 - Other Internet Security Considerations.
2.9 - Trojans, Viruses, and Worms.
2.9a - Trojans.
2.9b - Viruses.
2.9c - Macros.
2.9d - Worms.
2.9e - Phishing.
2.9f - E-mail Links.
2.9g - Hoaxes.
2.10 – Ethical Considerations of the Internet.
2.10a – Sharing Internet Connections with Neighbors.
2.10b – Downloading Music and Movies from the Internet.
2.10c – Copyright Infringement.
2.10d – Internet Databases.
2.10e – Truth or Lies?
2.11 – Everyone’s Online Today – Social Networking Sites.
2.12 – What is Privacy?
2.13 – What is Confidentiality?
2.14 – Federal Rules Emerge - HIPAA.
2.14a – HIPAA – Privacy and Security Rules.
2.15 – Free Online PHR Systems Readily Available.
2.15a – EHRs Used by Health Care Providers.
2.16 – EHR Security Q & A.
Lecture(s)
2-1 Internet, WWW, standardized communications, IP addressing, DNS, Domain Names, Connecting to the Internet, Service Providers.
2-2 Internet Access, Equipment, Leasing IP addresses, DNS services, searching the Internet, Internet security and privacy, devices attacked
2-3 How hackers attack devices, securing the OS and files, safe browsing, popups, securing the system, cookies, passwords, who uses computer, other security considerations, trojans, viruses, worms, ethical considerations of the Internet.
2-4 Continuation of discussion related to ethical considerations of the Internet; describes and defines privacy andconfidentiality; defines HIPAA, personal health record (PHR)and electronic health record (EHR) systems and their use; raises and answers questions related to Internet and EHR data security.
Readings/References/Online Resources
Barretto, M. The count reached 1 Billion Internet Users Worldwide. [Online]. 2009, January 27; [cited 10 July 2010]; Available from: http://lab.77agency.com/marketing-analysis/the-count-reached-1-billion-internet-users-worldwide-1069/.
Confidentiality. Wikipedia [free encyclopedia on the Internet]. 2010 July 10; [cited 12 July 2010]; Available from: http://en.wikipedia.org/wiki/Confidentiality.
Domain name. Wikipedia [free encyclopedia on the Internet]. 2010 July 10; [cited 12 July 2010]; Available from: http://en.wikipedia.org/wiki/Domain_name.
Evans A, Martin K, Poatsey MA. Chapter 1: Why Computers Matter to You. In: Technology in Action: Complete. 7th ed. New Jersey: Prentice Hall; 2010.