Gee 103 Module Part 1
Gee 103 Module Part 1
LE
Jrigarbosa 2024
LIVIN
G IN
THE IT
ERA
Prepared by:
JUNE REY I. GARBOSA,
EdD
Jrigarbosa 2024
LIVING IN THE IT
ERA
MODULE ONE
PRELIMINARIES
Module Title: Module One - Introduction to Information and Communication
Course Description:
Living in the Information Technology Era was written specifically for K-12 graduates who are transitioning
from senior high school to higher education. It is one of the 3-unit elective courses offered for general
education under the Mathematics, Science, and Technology domain. Using the same title of the course as
described by the Commission on Higher Education, this textbook explores the science, culture, and
ethics of information technology, its various uses and applications, as well as its influence on culture
and society. It also aims to strike a balance between conceptual instruction and socially- and culturally-
oriented discussions as it not only explains the basic concepts or key terms in IT but also features the
major IT trends along with the issues and challenges these developments bring. Moreover, it uses the
outcomes-based approach with assessment tests and tasks to effectively measure student learning. This
volume is divided into four chapters.
Pre-requisites: N/A
OVERVIEW
Chapter 1 of this module, Introduction to Information and Communications Technology, orients
students to the concepts of ICT and IT. It also examines the different parts of the computer system,
and the categories of computer peripherals, and assesses why computers are considered powerful
thinking machines. Chapter 2, The Internet and the World Wide Web, traces the origin of the Internet
and its evolution, describes how it works, and illustrates how it is used (e.g., how to search on the web).
Information as a resource is also discussed in this chapter together with Ergonomics, Security,
Control, and Privacy that tackles the issues on information control and privacy with reference to the
Intellectual Property Code of the Philippines and the Data Privacy Act of 2012. Chapter 3 of this module
focus on the trends and issues in IT. IT, Culture, and the Society, the Internet of Things an
auto-motion are discussed in detail. The influence of IT on culture and social behavior is likewise analyzed
with emphasis on both the proper netiquette and code of conduct for IT professionals and the negative
practices in social media such as cyberbullying. Also in this chapter that IT Trends, Issues, and
Challenges features texts and articles that reinforce the use of IT and the issues and challenges
surrounding its application in various fields such as banking, education, health, and business, among
others is being discussed. Finally, Chapter 4, talks about Networking that basically highlights the
types of networks, wired and wireless connections used in a computer system, as well as the desktop
applications and mobile applications and their relevance to day-to-day activities. It is hoped that through
this module, more knowledgeable and responsible young netizens who are able to maximize the benefits
of information technology without compromising values and ethics will be developed.
LEARNING OUTCOMES
This course/module made a concerted effort to achieve the following learning outcomes;
Jrigarbosa 2024
Apply the use of computer in our daily life
Jrigarbosa 2024
INDICATIVE CONTENT
CHAPTER 1 - INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
Lesson 1. History of Computer
Lesson 2. Computer’s Today
Lesson 3. Concepts of ICT and
IT
Lesson 4. Hardware: Types of
Computer Lesson 5. Motherboard
Lesson 6. Computers in our Daily Life
DISSCUSSION
Lesson 1. HISTORY OF COMPUTER
The Abacus
About 4,000 years ago, the Chinese
invented the ABACUS. It is an adding tool
that can help can you add & subtract
numbers by moving beads back & forth on
rods. The abacus was one of the earliest
counting devise invented to help man solve
his counting problems.
Leibnitz Calculator
In 1673, Gottfried Leibntiz, a German
mathematician & philosopher, enhanced
the Pascaline by creating a device that
could also multiply. It can even find the
square root of number. The device was
called the Leibnitz Calculator/ machine.
ENIAC
Between 1943 and 1946, the ENIAC or the
Electronic Numerical Integrator and
Computer was developed by John Presper
Eckert and John Mauchly. This
general purpose computer computed at a speed
1,000 times faster than the Mark 1.
EDVAC
Between 1947 & 1948, the EDVAC or the
Electronic Discrete Variable Automatic
Computer was invented by John von
Neumann. This invention had a Central
Processing Unit (CPU), which allowed all
computer functions to be coordinated through
a single source.
UNIVAC 1
The 1948, the UNIVAC or the Universal
Automatic Computer was manufactured by
Jrigarbosa 2024
Hollerith’s Tabulating Machine
In 1889, Herman Hollerith, an
American inventor, invented the
Hollerith’s Tabulating
Machine. The machine was a punch
card reader & had the capacity to store
& process data. Hollerith brought his
punch card reader into the business
world, founding the Tabulating
Machine Company which later became
International Business Machine (IBM) in
1924.
Jrigarbosa 2024
Lesson 2. COMPUTER’S TODAY
Figure 1. Supercomputers
Figure 4. Charles
Babbage
Figure 5. Henry Edward Roberts
Jrigarbosa 2024
In 1936 to 1938 Konrad Zuse create Z1 in his parent’s living room,
this computer consisted of over 30,000 metal parts and is considered to be the
first electro-mechanical binary programmable computer. In 1939, the German
military commissioned Zuse to build the Z2, which was largely based on the Z1.
Later, the completed the Z3 in May of 1941, the Z3 was a revolutionary computer
for its time and is considered the first electro-mechanical and program-controlled computer.
Finally, on July 12, 1950 Zuse completed and shipped the Z4
computer, which is considered to be the first commercial
computer.
The term ICT can be defined as “the integration of computing, networking, and information processing technologies
and their applications” Thus, ICT means a combination of computer applications' and communication
technology for gathering, processing, storing and disseminating of information. Information and
communications technology (ICT) an extensional term for information technology (IT) that stresses
the role of unified communications and the integration of telecommunications (telephone lines and
wireless signals) and computers, as well as necessary enterprise software, middleware, storage, and audiovisual
systems, that enable users to access, store, transmit, and manipulate information.
Concepts:
Desktop are now common tools in all areas of our daily lives
Secretary type letters
Artists draw pictures
Engineers and Architects make designs
Scientist, Mathematician solves problems and equation
Students, Teachers, Businessmen and even ordinary individuals do all these and much more
4. Digital Literacy is the ability to find, evaluate, utilize, share and create
contents using information technologies and internet (Cornell University).
According to American Library Association (2018), digital literacy is the ability to
use information and communication, requiring both cognitive and technical
skills.
Jrigarbosa 2024
6. Online digital tools and Apps use an Internet connection to access the information needed. A common
example is Skype. It is a telecommunication application software product that specializes in providing a video chat
and video calls between computers, tablets, mobile devices via Internet and to regular telephones.
7. Off-line digital tools and Apps can still be used even if there is no internet access. Among these are Canary
Learning, Pocket, Evertone, e-book.
Jrigarbosa 2024
8. Instructional technology is the theory and practice of design, development, utilization, management, and
evaluation of the processes and resources for learning
9. Software refers to program control instructions and accompanying documentation stored on disks or tapes
when not being used in the computer. By extension, the term refers to audiovisual materials
10.Multimedia is a sequential or simultaneous use of a variety of media formats in a given presentation or self-study
program .
12.World Wide Web (www) is also called a Web which is a graphical environment on computer networks that allows
you to access, view and maintain documentations that can include text, data, sound and videos (Smaldino, 2005). It
is a way of accessing information over the medium of the internet. It is an information sharing model that is built on
top of the Internet.
13.Productivity tools refers to any type of software associated with computers and related technologies that
can be used as tools for personal, professional or classroom productivity.
Examples: Microsoft Office, Apple Works – word processing, grade and record keeping, web page production,
presentation)
14.Technology tool is an instrument used for doing work. It can be anything that help you accomplish your goal
with the use of technology. These technology tools can be classified as:
a) Data/Calculation tools. Examples: spreadsheets, Excels, Sketchpads, probability constructor
b) Design tools. These are used to make models and design, creating and building. Included here are
Family Tree Maker, GollyGee, and Crazy Machines among others.
C. Discussion tools. There are 4 different approaches that utilize discussion and interaction in the Internet.
These threaded discussion forum, Blogging, Live chat and Video Teleconferencing, Netiquette and Safety on
the Net.
d) Email tools. Emails are great communication tools for sending messages, photographs, videos and
other files. It allows you to reach out to others around the world. Examples are google mail, Ymail,
Yahoo mail and many more.
e) Handheld devices. Handheld devices have become popular among learners. These include
Personal Digital Assistants, global positioning system, (GPS) and geographic Information system
(GIS) in the classroom, Portable electronic keyboards, Digital cameras, Mobile phones, Palm,
Handheld computers.
15.Google Apps is a cloud-based teaching tool which is stored in the Google server and is available for students
both at home and in school. It includes the gmail, a free-mail for all; Google calendar – a tool used for organizational
purposes; Google sites that provide options for developing blogs and wikis; and Google docs is used for sophisticated
word processing and editing for the document.
16.Blog is an online journal where posted information from both teachers and students are arranged. There are
three kinds of blogs: blogs used for communication, blogs used for instruction, and blogs used for both
17.Wiki, an editable website usually with limited access, allows students to collaboratively create and post written
work or digital files, such as digital photos or videos. Wikipedia is one of the most widely recognized of all the wikis
18.Flipped classroom utilizes a reverse instructional delivery, where the teacher is required to use the web
resources as homework or out of class activity as initial instruction of the lesson which will be discussed
during class time.
Jrigarbosa 2024
Connectivity - today, it is important for a computer to have connectivity. Connectivity allows the computer to
access and share data and information that are available elsewhere through an internet connection. An
internet connection may be transmitted in many forms such as telephone line, a wireless connection, satellite or
cable. Connectivity will enhance the capability and usefulness of your information systems technology.
1. Supercomputers
The most powerful computer available. These computers are high capacity computers that run continuously and are
being used by very big organizations and government institution. Users of super computers include NASA and the US
government and some big schools and companies. They are used for advanced scientific research and simulations
and massive data application.
2. Mainframe Computers
Are less powerful than super computers but are capable of processing data at greater speed, multitasking capability
and high data storage. They are used by most banks to process information of depositors and millions of daily bank
transactions. Insurance companies use them for their policy holder’s database. These computers have specialized
wiring system and usually occupy a big room at controlled temperature.
3. Server Computers
Refer to the main computers in a network serving and connected to several other computers.
It has the capability to handle multiple requests for data and other processing tasks.
Server such as running a web server for an organization’s web site. Many web sites
on the World Wide Web
are serviced by stacks of computer servers. Figure 9. Server Computer
4. Desktop Computers
The most common and widely used computers today. They are designed to be used by one or
more persons. Desktop computers are the computers that you see in homes, school, and in
most
businesses. They are small enough to be placed on a desk or table but are too big to be carried
around. Depending on their use, desktop computers come in a wide range of processing power,
size and cost.
6. Laptop Computer
A laptop or notebook computer is a small personal computer whose components, display, keyboard, pointing device,
CPU and rechargeable battery are packed together in one single portable unit intended for mobile use.
Desktop Replacement - High performance and high capacity computers whose screen size is 17” and larger.
These laptops
are also called Media Center Laptop or Gaming Laptop.
Standard laptop - The most common size notebook with screen range of 13-15”. It covers a wide range of
features in microprocessor speeds and memory capacity. Features include an optical disk drive, card
readers, USB port, wired and wireless network capability and a web cam.
Sub-notebook - Sized of less than 13” of screen size. Portability is the emphasis of this computer. These
notebooks retain
the standard features of a standard notebook but they have small sizes, less weight and long battery life.
Netbook - A tablet PC is a notebook equipped with a touch screen which allows the user to operate the
computer using a digital pen or stylus. A fingertip may also be used in some models. A keyboard or a mouse
comes as an option. Tablet PCs are designed for those who prefer to use stylus or pen rather than a keyboard;
however, they come at a higher cost.
Portable Computer
Pocket PC - A pocket PC (personal computer) is a handheld or pocket size computer running on Microsoft
Windows Pocket PC edition with all features of a modern Windows PC. Pocket PCs may have mobile phone
Jrigarbosa 2024
features.
PDA - (Personal Digital Assistant) is a handheld computer also called palmtop computers. Modern PDAs have
phone capabilities, web browsers, internet capabilities, and music and video player applications. Touch
screen is a standard feature on most PDAs.
Smart Phone - a mobile phone with additional capabilities such as e-mail and internet, keyboard, personal
organizer, built0in camera, touch screen, ability to read PDF and Microsoft documents, music, photo and video
viewing.
Desktop Computers
A desktop computer is a collection of different devices connected to a central processing unit (CPU).
This system generally has four basic components; Central Processing Unit; Input Devices; Output Devices and
Storage.
Jrigarbosa 2024
1. Central Processing Unit
The CPU is housed inside the CPU box together with most of the components that make up a computer system.
The microprocessor, memory and storage are the most important parts of the computer system.
The microprocessor is an integrated circuit (IC) that encapsulates all the functions of a CPU.
It is the one that controls and process input data to useful information.
The microprocessor is usually placed in a support electronic board also known as the motherboard.
The microprocessor is so delicate and important component of the CPU that it is protected, encased and shielded.
Since the microprocessor tends to produce heat, in most cases a fan and a cooling unit called heat sink is
attached to it.
A heat sink is usually a metallic material with fins that absorbs heat from the CPU and then dissipates it to the
surrounding air.
The random access memory (RAM) is inserted or placed in a slot on the motherboard.
The RAM is the primary storage for data and programs that are currently being processed.
RAM is oftentimes referred to as the temporary storage because its contents are lost when electrical power to
the computer is turned off.
Inside the CPU is also an important storage component known as the hard disk. Hard disk is used to store all of
the data and information in the computer. Hard disk has a big storage capacity.
Data stored here are not lost even when the power is turned off.
The CPU may also include other storage device handlers such as floppy disk drive and optical disk drive for CDs
or DVDs.
2. Input Devices. Allows you to enter data into the computer for processing.
Mouse - acts as the pointing device that can be used to choose programs and files to open. Functions to
activate, to determine a typing or r drawing starting point, selection and to scroll pages up or down.
Keyboard - A computer input device modeled from the keys of a typewriter. It is an arrangement of keys or
button when characters are printed. The keyboard allows one to input numbers, special characters and other
functions into the computer.
Scanner - A computer input device that capture and copies images, objects, texts, handwriting and converts
them into digital forms. Printed pictures especially those from the pre-computer home era can now be scanned,
modified, saved and printed.
Web Camera - Web camera or webcam functions like a digital and video camera, captures video and
images. It allows you to show images into the computer. It can be used for videoconferencing with friends,
relatives or business associates so that they will be able to see one another. Today, digital and video cameras
are also used as input devices.
Game pad - Game pad or control pad functions as handheld game controller for today’s computer games. It
has buttons
corresponding to some of the fingers which give one better control of the characters being played in a computer
game.
Joystick - used as control devices that pivot around so that you could move the cursor in any direction in the
monitor. It is usually used in video games involving flight control for airplanes and other aircraft. Joystick has
also found use in controlling cranes, unmanned submarines, and trucks and in some medical surgical
operations.
Digitizing Tablet - graphic tablet is an electronic device that allows one to draw images by hand. It has pen
and pad where one can draw just like drawing on the paper but the image goes into the CPU and unto the
monitor screen.
Microphone - A voice and sound input into the computer. Allows the user to speak and the computer will
accept and record your voice or music into the computer. The computer can the process your voice.
3. Output Devices. Convey or present the result of the data processed by the CPU. The monitor, printer and the
speakers are the most commonly used output devices of most computer desktop computers.
Monitor - Functions as a visual display unit for images, text, graphics or video generated by the computer.
There are two kinds of monitors; the modern, flat panel liquid crystal display (LCD) which occupy less space
and use less power And the older and bulkier cathode ray tube (CRT) models but are less expensive that LCD.
Printer - An output device that produces a permanent or hard printed copy, human readable text and/or
graphic of documents stored in the computer.
a. Dot Matrix Printer - A printer that prints by hammering or striking an ink-soaked cloth ribbon against a
paper. It functions just like the typewriter, and the advantage of this type of printer is that it can easily
create carbon copies because of the impact action of the printing process and the cost per page printing is
relatively cheap.
b. Ink Jet Printer - Common for the general use at home or at the office. The price of this kind of printer
significantly eased and now allows you print high quality output both in colour and in black and white.
c. Laser Jet Printer - Produces high quality prints of text or graphics. Faster speed than do matrix and ink
jet printer Laser technology is based on xerographic printing process which is a combination of
photography and electrostatic printing.
Jrigarbosa 2024
d. Plotter - Operates by moving a pen over a paper surface. Most used in printing computer-aided designs of
houses and buildings. Plotters are replaced by large format ink jet printers that are not only capable of
printing CAD drawings on paper but also used for vinyl plastic printing for billboards
and posters.
Speakers - Audio output for music, video and computer alerts. Speakers may have the simple two piece-
systems or the three, four or five pieces system with sub-woofer and surround system.
Headphone - Small speaker with a way to hold them close to the ears of the user. Allows you to listen to
music and sounds all alone. Ideal when you do not want to disturb other people around you with the sound
generated by the computer.
Jrigarbosa 2024
Data Projector - Commonly called LCD Projector that displays computer information on a big screen so
that many will be able to see the show or presentation. Used for classrooms instructions and business
presentations. Today, Television set also used as projectors.
4. Storage/Memory Devices. Memory devices have made significant advancement recently because of the
downward trend in their prices. The advantages of these devices are mobility and high capacity at reasonable cost.
Once can simply bring this data or information in the portable memory and work in another place as long as there is
an available computer with software able to read the data.
Floppy Drives - Popular before the advent of the optical drives (CD and DVDs) and the flash drive. The size of
this media is
3.5” and has a capacity of 1.44MB and encased in a thin square plastic enclosure.
Memory Cards - Can be accessed with the USB connector. Offers the same data handling capabilities of the
memory cards, since data in these drives are re-writable. Up to 32GB and would allow data storage for 10 years
or more.
USB Flash Drive - Can be accessed with the USB connector. Offers the same data handling capabilities of the
memory cards, since data in these drives are re-writable. Up to 32GB and would allow data storage for 10 years
or more.
External Hard Disks - A hard disk housed in an enclosure usually made of aluminium or hard plastic. Can be
accessed by connecting it to the USB port and access is the same as that of the flash drive. Capacities beginning
from 80GB and up to TB level.
Optical Storage/Optical Disk - A storage medium that used laser technology to store data onto a
circular plastic or metallic disk. The data in the disc are accessed by the used of an optical disk drive
(ODD). There are two most common optical disks available today, they are the Compact Disc (CD) and the
Digital Versatile Disc (DVD).
CD-ROMs - CDs with pre-installed data such as music, videos and programs. Data or information inside the CD
could not be altered and are only available for access or reading.
CD-R or Compact Disk Recordable - One can store or write data using a CD writer and once written into the
CD, it stays there permanently. Also known as the “write once” CD. Used to store data such as music, movies,
word processing and spreadsheet files and other data for future access.
CD-RW - Known as Re-Writable CD or erasable CD. CD where in data stored inside can be altered, erased and
then saved again. A versatile disc because it can be used as temporary storage for work in progress.
Compact Disk - Commonly known as the CD and is the most widely used optical disc with a standard capacity
of around 700MB. There are three types of CDs; the CD-ROMs, CDRs, and the Re-writable CD.
DVDs /DVD-ROM - Used extensively to distribute movies, since full length movie can be stored in one DVD.
Music and video quality is lot higher comparable to those we view on wide screen theaters. Used to distribute
computer programs and music videos.
DVD Recordable - DVD-R has two formats, the DVD-R and DVD+R, these are competing recording
formats for DVD, although most present players and recorder can view and write on the same format. User
can only write or record once into the DVD, and data is now permanently stored into the DVD.
DVD Rewritable or DVD-RW - Stored data can be altered, erased and restored into the DVD. Versatile
DVD specially
“projects in progress” so that future insertions and alteration may be possible.
Mini CD and Mini DVD - CDs and DVDs in a smaller format also known as the “3inch CDs or DVDs” function
just like the
standard CDs and DVDs but of smaller capacity but have the advantage of being small.
Higher Capacity Optical Media - Blu-Ray Disc (BD) in a new generation optical disc, with the same
dimension and look as a DVD or CD but has a high capacity. Blu-Ray still uses laser technology but of a
different wavelength than the one used for CDs and DVDs which is called blue laser (violet colored).
SOFTWARE
Software is the other name for computer program. Basically, software is the step-by-step instructions that tell the
computer what to do to process the data into the desire format. The two kinds of software are systems software and
application software:
A. Systems Software - are those programs that are being used by the computer hardware. These are the
operating systems, device drivers and utilities that manage the internal resources of the computer. Examples
are Windows XP, Windows Vista, Linux and Macintosh Operating System. Device drivers are programs
that allow the computer and the input or output devices to interact and communicate with the computer system.
Examples of device drivers are those programs that allow the printer to print and the speakers to create sounds.
Today, major operating systems such as Window XP and Vista have an internal library of device drivers that may be
connected into the computer. Utilities are those programs that manage and maximize computer resources. An
example of a Windows Utility is the disk cleanup which delete unnecessary files.
B. Application Software - Programs that are used by the end-user. These are the programs that process user’s
raw data encoded or placed into the computer. For connectivity or web browser application, one may use
programs such as Microsoft Internet Explorer, Mozilla Firefox, Opera or Safari to connect, surf or browse the
internet. Application software can be categorized into two, basic application software and specialized application
software.
a. Basic Application Software - Application software includes word processing application (Microsoft
Word), spreadsheet application (Microsoft Excel), presentation graphics (Microsoft Power Point), organizer
(Microsoft Outlook), database management program (Microsoft Access), desktop publishing, graphics, video,
multimedia animation.
Word Processor - There are many advantages of writing documents in the computer. You can easily modify
and correct the words, be able to change the size and character of the letter, fancy or ordinary types of
letters or fonts and it is easy to modify paragraph character, margins, paper size, etc. You can also organize
your letters or documents in a systematic way.
Word processors today have the capability to handle text, graphics and images with ease and even the
capabilities of lay- outing for desktop publishing. The most common and widely used computer word processing
program is the MS Word.
Spreadsheet - a computer application that displays rows and columns of cells and each cell may contain text
or numeric values or a combination of both. Spreadsheets are frequently used in financial and accounting
transactions and reports because of the cells whenever they are updated. Spreadsheet today are very
flexible and capable of handling various tasks and simple applications such as tables, list and even charts and
forms. The most popular spreadsheet today is the Microsoft Excel, but before Excel notable popular spreadsheet
was the Lotus 1-2-3 when the DOS operating system was the standard operating system. Other spreadsheet
program in the market includes the Quattro Pro by Corel, Numbers by Apple and OpenOffice.org Calc which is a
free software, open source program modeled after Microsoft Excel. Calc can both open and save in Excel
(XLS) file format.
Presentation - programs that allow you to communicate or convey your messages more effectively, to
educate, to sell or to present related information. Presentation graphics have paved the way for better
information presentation in all aspects in business, education and other applications. A presentation program
is a software application designed to display information in a form of a slide show. It has the capability to edit
text as well as to insert and format them. The program also allows the insertion of graphics, images, sound and
video to complete a slide show multimedia presentation. Today’s presentation programs have a variety of
options and templates to start a presentation easily and an array of presentation styles to choose from. The
most common program for presentation is the Microsoft PowerPoint, other alternatives are OpenOffice.org
Impress and Apple’s Keynote.
b. Specialized Application Programs - programs that focus on specific environment and application.
Some of the most common specialized programs are graphic, drawing, video, multimedia and animation, desktop
publishing.
Graphics Program - Graphics programs like Adobe Photoshop are tools to create, modify, combine and
optimize digital photos and images on your computer. These programs excel in digital photograph enhancement
and use them to perform subtle changes such as adjusting brightness and contrast of the image you uploaded.
Drawing Programs - Drawing programs include Adobe Illustrator and CorelDraw. They are design programs
used to create and edit artwork for print, web or mobile devices and videos. These programs allow creation
of art in digital form, starting from sketches, coloring, shading, rendering and final drawing.
Desktop Publishing - Adobe InDesign is a design application program that allows users to integrate texts,
graphics and images to produce professional quality documents for print, for the web and other
applications. InDesign however, is primarily used today in desktop publication applications including book
layout, newsletter, brochures and magazines.
Portable Document Format (PDF) - PDF is a fixed layout document that represents two-dimensional image
representation of a file independent of the program software and hardware. This format encapsulates all the
files’ text, fonts, images and photos that compose the document. Adobe Acrobat is the program that creates
Computer/System Fan is any fan inside, or attached to, a computer case used for active cooling, and may
refer to fans that draw cooler air into the case from the outside, expel warm air from inside, or move air
across a heat sink to cool a particular component.
Heat Sink heat sinks are used to cool central processing units or graphics processor.
Floppy disk, also called a diskette, is a disk storage medium composed of a disk of thin and flexible
magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles.
Floppy disks are read and written by a floppy disk drive (FDD).
Hard Disk Drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and
retrieving digital information using one or more rigid ("hard") rapidly rotating disks (platters) coated with
magnetic material.
Optical Disc Drive (ODD) is a disk drive that uses laser light or electromagnetic waves within or near
the visible light spectrum as part of the process of reading or writing data to or from optical discs.
Random-access memory (RAM) is a form of computer data storage. A random-access memory device allows
data items to be read and written in approximately the same amount of time, regardless of the order in which
data items are accessed.
Processors (CPU) is the electronic circuitry within a computer that carries out the instructions of a
computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations
specified by the instructions.
Power Supply is an electronic device that supplies electric energy to an electrical load.
Motherboard (sometimes known as the main board, system board, logic board, or colloquially, a mobo) is the
main printed circuit board (PCB) found in computers and other expandable systems. It holds and allows
communication between many of
the crucial electronic components of a system, such as the central processing unit (CPU) and memory,
and provides connectors for other peripherals.
Lesson 5.
MOTHERBOARD
CMOS Battery (Complementary Metal-Oxide Semiconductor) maintains the time, date, hard disk and
other configuration settings in the CMOS memory. CMOS batteries are small and are attached directly to the
motherboard. Standard lifetime of a CMOS battery is around 10 years.
Southbridge is one of the two chips in the core logic chipset on a personal computer (PC) motherboard. It
handles all of a computer's I/O functions, such as USB, audio, serial, the system BIOS, the ISA bus, the interrupt
controller and the IDE channels.
Northbridge typically handles communications among the CPU, in some cases RAM, and PCI Express (or AGP)
video cards, and the southbridge. Some northbridges also contain integrated video controllers, also known as a
Graphics and Memory Controller Hub (GMCH) in Intel systems.
IDE Connectors originally AT Attachment, is an interface standard for the connection of storage devices
such as hard disk drives, floppy disk drives, and optical disc drives in computers.
Accelerated Graphics Port (AGP) is a high-speed point-to-point channel for attaching a video card to a
computer system, primarily to assist in the acceleration of 3D computer graphics.
CPU socket or CPU slot is a mechanical component(s) that provides mechanical and electrical connections
between a microprocessor and a printed circuit board (PCB). This allows the CPU to be placed and replaced
without soldering.
ATX Power Connector specification defines the key mechanical dimensions, mounting point, I/O panel,
power and connector interfaces between a computer case, a motherboard and a power supply.
PCI Slots (Peripheral Component Interconnect) is an interconnection system between a microprocessor
and attached devices in which expansion slots are spaced closely for high speed operation.
Network Card referred to as an Ethernet card and network adapter.
It is an expansion card that enables a computer to connect to a
network; such as a home network, or the Internet using an
Ethernet cable with
an RJ-45 connector.
Sound card is an expansion card or IC for producing sound on a
computer that can be heard through speakers or headphones.
Video card is an IC or internal board that creates a picture on a display
You can understand and analyze the importance of computers by seeing a revolution in offline and online business,
online education, online business, online communication, and internet banking. To store, access, manipulate,
calculate, analyze data, and information we use hardware devices and software applications. All our daily life
activities are based on such online services and products. The computer changed our life 2 decades ago and now it
is a necessity to use a computer in daily life to live
The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to
convert raw facts and data into meaningful information and knowledge. Computer science is explored and
challenged by humans daily. The computer is like an electronic magical device for our life. According to Google
Keyword Planner 100 – 1K people searching monthly on Google about the “best laptop for business and personal
use” and 100-1K for the best desktop computer for small businesses in the last 1 year. This is one of the proofs
that the use of the computer in our life and business is really effective. That’s why more and more people are
buying and using a computer. If the uses of the computer are for good purposes then it is a boon for humans. From the
government to the private sector everyone is using the computer. Users of the computer are constantly growing.
8. A computer used by various people around the world for different reasons and purposes
Kids: – Kids use the computer in their daily life to play games, to use drawing tools, and to watch funny (cartoon)
videos.
High school students: – Schools students can use a computer to learn Hindi English Typing. Students can
learn and use digital communication tools. They can learn about online safety and etiquette. They can use
drawing tools to explore creativity and inside artists in them such as by using paint programs in the
Windows computer. They can also learn to do photo editing and graphic designing. The uses of a computer for
school students should be to explore creativity and imagination. Online research can help school students to
collect and understand the data and information about a particular book and chapters. Students can use MS-
Office to create assignments, to do the mathematical calculation, presentation, etc. I am sure that many Indian
school students are doing these activities in schools and on home computers.
College students: – The use of a computer with the internet for college students is really important.
Information Technology education helps them in their study no matter what kind of degree they are doing. They
not only need to learn about Information Technology but they need to use technology for their career.
College students use Microsoft Word to create an assignment, notes, letters, and books. They use excel
spreadsheet to mathematical calculation, data visualization by using Charts, they solve and learn various logical
formulas. Many students are learning online etiquette skills and safety. They are using the computer and the
internet to create websites. But the biggest use of a computer for college students is that they can join
online degree programs. Many students are taking online classes from their homes. Students are
connecting with teachers by using video conferencing applications and devices. Students with the use of a
computer are getting faster information and knowledge from multiple sources. Such uses of computers in
student’s daily life are really important.
Job seekers: – Job seekers use the computer to learn computer skills that help them to get a job. They learn to
use MS- Office, English and Hindi Typing, Internet research, File management, printing, MS-Office, use of the
business application, and social media skills in their daily life. Job seekers who are IT literate or have
productive computer skills get a job quicker than people with only job-specific skills.
Business owners: – Business owners use computer-based on-demand and urgency. Commonly they use a
computer daily to watch YouTube videos, upload family and travel photos on social media, etc. They also use the
computer for business planning and team management. They use a computer for financial management.
Also, the use of a computer is depending on the nature of the business. But commonly project management,
financial planning, social networking, emails, letter writing, presentation, and Internet research are few uses of
computers in the daily life of business owners.
Computer Professional & IT people: – The real truth is that there are no other uses of anything other than
the computer in the daily life of IT people. There are more than 12 hours of average IT people spend their time on
a computer according to me. In which they learn on the computer, they work on the computer, they
communicate on a computer, they hire people on the computer, they order pizza on the computer, they transfer
and receive money on the computer, they watch movies on the
computer, and they are still trying to do everything on the computer. But the benefits and results you’re seeing
today on the computer and internet world are done by IT professionals around the world. Without IT
people in this world, nothing is possible that you’re seeing on the Internet and computer today.
10. Uses of the computer to change a life: Computer changed our lives in this way
A digital computer, analog computer, and now the use of hybrid computers are growing in our daily life. The problem
is that the computer is doing our work faster and accurately and save our time. But then why people do not
have any time today for their family. You can say the computer is changed our lives yes, the computer
changed our lives because today we want to use air purifiers inside the home rather than planting new trees
outside. Funny! Very Funny! So we can’t just sit and not keep watching the things that we don’t like. Instead, we
can change. We have the ability to change. And we will make the change by educating other people about various
things. And education is the method that aligns any developing individuals, professional, business, and country into
the growth and right direction. I know you have learned lots of things in this complete article. Now it’s your time to
use your knowledge and skill at a greater and bigger level. So, you need to understand and analyze what you
want to do today and what is important for to you accomplish today by using a computer. Once you will find out
it then start using the computer each day and it will make life easier, faster, and more importantly satisfy at the end
of the day.
LIVING IN THE IT
ERA
MODULE TWO
PRELIMINARIES
Module Title: Module Two - The Internet and the World Wide
Web; Information; Ergonomics; Security; and
Privacy
Course Title: Living in the IT
Living in the Information Technology Era was written specifically for K-12 graduates who are
transitioning from senior high school to higher education. It is one of the 3-unit elective courses offered
for general education under the Mathematics, Science, and Technology domain. Using the same title of
the course as described by the Commission on Higher Education, this textbook explores the science,
culture, and ethics of information technology, its various uses and applications, as well as its influence
on culture and society. It also aims to strike a balance between conceptual instruction and socially- and
culturally-oriented discussions as it not only explains the basic concepts or key terms in IT but also
features the major IT trends along with the issues and challenges these developments bring. Moreover,
it uses the outcomes-based approach with assessment tests and tasks to effectively measure student
learning. This volume is divided into four chapters.
Pre-requisites: N/A
OVERVIEW
Chapter 1 of this module, Introduction to Information and Communications Technology, orients
students to the concepts of ICT and IT. It also examines the different parts of the computer system, and
the categories of computer peripherals, and assesses why computers are considered powerful thinking
machines. Chapter 2, The Internet and the World Wide Web, traces the origin of the Internet and
its evolution, describes how it works, and illustrates how it is used (e.g., how to search on the web).
Information as a resource is also discussed in this chapter together with Ergonomics, Security,
Control, and Privacy that tackles the issues on information control and privacy with reference to the
Intellectual Property Code of the Philippines and the Data Privacy Act of 2012. Chapter 3 of this module
focus on the trends and issues in IT. IT, Culture, and the Society, the Internet of Things an
auto-motion are discussed in detail. The influence of IT on culture and social behavior is likewise
analyzed with emphasis on both the proper netiquette and code of conduct for IT professionals and the
negative practices in social media such as cyberbullying. Also in this chapter that IT Trends, Issues,
and Challenges features texts and articles that reinforce the use of IT and the issues and challenges
surrounding its application in various fields such as banking, education, health, and business, among
others is being discussed. Finally, Chapter 4, talks about Networking that basically highlights the
types of networks, wired and wireless connections used in a computer system, as well as the desktop
applications and mobile applications and their relevance to day-to-day activities. It is hoped that
through this module, more knowledgeable and responsible young netizens who are able to maximize
the benefits of information technology without compromising values and ethics will be developed.
LEARNING OUTCOMES
This course/module made a concerted effort to achieve the following learning outcomes;
DISSCUSSION
ERGONOMICS
Whether you’re an ergonomics pro or you’re new to the field, it’s helpful every once in a while to take a broad view
of what ergonomics is and how its fundamental principles can be applied. At the very least, you’ll be able to explain
what ergonomics is in a social setting. At the very best, you’ll start to see how deeply the field of ergonomics
impacts your world at work, at home and the places in between. Ergonomics (or human factors) is the scientific
discipline concerned with the understanding of interactions among humans and other elements of a system, and the
profession that applies theory, principles, data and methods to design in order to optimize human well-being and
overall system performance.
The word ergonomics comes from the Greek word “ergon” which means work and “nomos” which means laws. It’s
essentially the “laws of work” or “science of work”. Good ergonomic design removes incompatibilities between the
work and the worker and creates the optimal work environment. Ergonomics draws on many disciplines to optimize
the interaction between the work environment and
the worker.
Ergonomics Ergonomics can roughly be defined as the study of people in their working environment. More
specifically, an ergonomist (pronounced like economist) designs or modifies the work to fit the worker, not the
other way around. The goal is to eliminate discomfort and risk of injury due to work.
Ergonomics is the study of how humans interact with man made objects. For example, an ergonomic chair may
help support your lower back and prevent you from slouching. An ergonomic desk may adjust to the appropriate
height, so you can sit up straight and view your monitor at the right level.
We often hear the term ergonomics in the workplace and in the office. If you are wondering what ergonomic means
and how it may benefit you, we will do our best to explain why ergonomics is important for you. Ergonomics
comes from the Greek word ergon meaning work, and nomoi meaning natural laws. At the core, ergonomics
means the science of designing products to optimize them for human use. More simply, ergonomics is about
designing for humans or people use. The goal of ergonomics ranges from increasing productivity, maximizing
efficiency, and reducing discomfort. Ergonomics takes into account the need for movement throughout the day.
Oftentimes, office furniture is built traditionally to cause stiffness, poor posture, and little movement. When you
think about your office chair, think about the comfort of your lower back, and how it may sometimes cause you
pain. Think about the height of your desk and the angle of your computer screen, and look back at how both
your eyes and neck may be strained after a long day. Think about your keyboard and your mouse, and consider
your wrist being in discomfort after long hours of typing. This is why ergonomics is important for your long-term
health. In this post, we will share with you the best examples of ergonomics in the workplace, and how to setup an
ergonomic workstation. Understanding of ergonomics is the key to combat the negative effects of a sedentary
lifestyle in the workplace.
Disciplines of
Ergonomics
Industrial Kinesiolo
Anthropometry
engineering gy
Biomechanics
Industrial design Physiolog
Mechanical engineering
Information design y
Psycholog
Ergonomics Domains of y
Specialization
According to the International Ergonomics Association, there are three broad domains of ergonomics: physical,
cognitive, and organizational.
Physical Ergonomics
Physical ergonomics is concerned with human anatomical, anthropometric, physiological and biomechanical
characteristics as they relate to physical activity. This is the ergonomics domain we are most concerned with in the
workplace, and most of the content on this site is very much focused on workplace ergonomics.
Cognitive Ergonomics
Cognitive ergonomics is concerned with mental processes, such as perception, memory, reasoning, and motor
response, as they affect interactions among humans and other elements of a system.
Organizational Ergonomics
Organizational ergonomics is concerned with the optimization of sociotechnical systems, including their organizational
structures, policies, and processes.
INFORMATION
Information technology is the study, design, development, implementation, support or management of computer-
based information systems—particularly software applications and computer hardware. IT workers help ensure
that computers work well for people. Electronic and information technology includes computer hardware and
software, operating systems, web- based information and applications, telephones and other telecommunications
products, video equipment and multimedia products, information kiosks, and office products such as photocopiers
and fax machines.
Information technology studies ways to develop and create computer-based information systems like software
applications and computer hardware. Students who earn a degree in Information technology are prepared to
manage, distribute and process information through computers. Information technology plays a vital role in every
business type including small, medium and large (multinational). Information technology is used in companies to
implement communication. Network (intranet and internet) and email play a key role in the organizational
communication internally as well as externally.
Information technology facilitates storing and regaining huge information quickly with the help of hardware and
software networks and workstations at lesser costs. Information technology enables combination and
configuration of data to create distinctly new information which aids in making quick decisions. Communication –
with help of information technologies the instant messaging, emails, voice and video calls becomes quicker, cheaper
and much efficient. Globalization and cultural gap – by implementing information systems we can bring down the
linguistic, geographical and some cultural boundaries.
SECURITY
Security, in information technology (IT), is the defense of digital information and IT assets against internal
and external, malicious and accidental threats Weak security can result in compromised systems or data, either
by a malicious threat actor or
an unintentional internal threat. The fundamental principles (tenets) of information security are
confidentiality, integrity, and availability. Every element of an information security program (and every security
control put in place by an entity) should be designed to achieve one or more of these principles .
Ransomware
Spyware
Viruses
These threats make it even more important to have reliable security practices in place. Learn more about malware
to stay protected.
Types of IT Security
Network Security
Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures
that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker
from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access
or use the network. Network security has become increasingly challenging as businesses increase the number of
endpoints and migrate services to public cloud.
Internet Security
Internet security involves the protection of information that is sent and received in browsers, as well as network
security involving web-based applications. These protections are designed to monitor incoming internet traffic for
malware as well as unwanted traffic. This protection may come in the form of firewalls, antimalware, and
antispyware.
Endpoint Security
Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include
cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing
malicious networks that may be a threat to your organization. Advance malware protection and device
management software are examples of endpoint security.
Cloud Security
Applications, data, and identities are moving to the cloud, meaning users are connecting directly to the Internet and
are not protected by the traditional security stack. Cloud security can help secure the usage of software-as-a-service
(SaaS) applications and the public cloud. A cloud-access security broker (CASB), secure Internet gateway (SIG), and
cloud-based unified threat management (UTM) can be used for cloud security.
Application Security
With application security, applications are specifically coded at the time of their creation to be as secure as
possible, to help ensure they are not vulnerable to attacks. This added layer of security involves evaluating the code
of an app and identifying the vulnerabilities that may exist within the software.
InfoSec, or information security, is a set of tools and practices that you can use to protect your digital and analog
information. InfoSec covers a range of IT domains, including infrastructure and network security, auditing, and
testing. It uses tools like authentication and permissions to restrict unauthorized users from accessing private
information. These measures help you prevent harms related to information theft, modification, or loss.
Information security (InfoSec) enables organizations to protect digital and analog information. InfoSec provides
coverage for cryptography, mobile computing, social media, as well as infrastructure and networks containing
private, financial, and corporate information. Cybersecurity, on the other hand, protects both raw and meaningful
data, but only from internet-based threats.
Organizations implement information security for a wide range of reasons. The main objectives of InfoSec are
typically related to ensuring confidentiality, integrity, and availability of company information. Since InfoSec covers
many areas, it often involves the implementation of various types of security, including application security,
infrastructure security, cryptography, incident response, vulnerability management, and disaster recovery.
Although both security strategies, cybersecurity and information security cover different objectives and scopes
with some overlap. Information security is a broader category of protections, covering cryptography, mobile
computing, and social media. It is related to information assurance, used to protect information from non-person-
based threats, such as server failures or natural disasters. In comparison, cybersecurity only covers Internet-based
threats and digital data. Additionally, cybersecurity provides coverage for raw, unclassified data while information
security does not.
Availability—ensures that authorized users can reliably access information. Availability is maintained
through continuity of access procedures, backup or duplication of information, and maintenance of
hardware and network connections. Loss of availability can occur when networks are attacked due to
natural disasters, or when client devices fail.
Types of Information Security
When considering information security, there are many subtypes that you should know. These subtypes cover
specific types of information, tools used to protect information and domains where information needs protection.
Application Security
Application security strategies protect applications and application programming interfaces (APIs). You can
use these strategies to prevent, detect and correct bugs or other vulnerabilities in your applications. If not
secured, application and API vulnerabilities can provide a gateway to your broader systems, putting your
information at risk. Much of application security is based on specialized tools for application shielding,
scanning and testing. These tools can help you identify vulnerabilities in applications and surrounding
components. Once found, you can correct these vulnerabilities before applications are released or
vulnerabilities are exploited. Application security applies to both applications you are using and those you may
be developing since both need to be secured.
Infrastructure Security
Infrastructure security strategies protect infrastructure components, including networks, servers, client
devices, mobile devices, and data centers. The growing connectivity between these, and other infrastructure
components, puts information at risk without proper precautions. This risk is because connectivity extends
vulnerabilities across your systems. If one part of your infrastructure fails or is compromised, all dependent
components are also affected. Due to this, an important goal of infrastructure security is to minimize
dependencies and isolate components while still allowing intercommunications.
Cloud Security
Cloud security provides similar protections to application and infrastructure security but is focused on cloud or
cloud- connected components and information. Cloud security adds extra protections and tools to focus on the
vulnerabilities that come from Internet-facing services and shared environments, such as public clouds. It also
tends to include a focus on centralizing security management and tooling. This centralization enables security
teams to maintain visibility of information and information threats across distributed resources. Another
aspect of cloud security is a collaboration with your cloud provider or third-party services. When using cloud-
hosted resources and applications, you are often unable to fully control your environments since the
infrastructure is typically managed for you. This means that cloud security practices must account for
restricted control and put measures in place to limit accessibility and vulnerabilities stemming from
contractors or vendors.
Cryptography
Cryptography uses a practice called encryption to secure information by obscuring the contents. When
information is encrypted, it is only accessible to users who have the correct encryption key. If users do not
have this key, the information is unintelligible. Security teams can use encryption to protect information
confidentiality and integrity throughout its life, including in storage and during transfer. However, once a user
decrypts the data, it is vulnerable to theft, exposure, or modification. To encrypt information, security teams
use tools such as encryption algorithms or technologies like blockchain. Encryption algorithms, like the
advanced encryption standard (AES), are more common since there is more support for these tools and less
overhead for use
Incident response
Incident response is a set of procedures and tools that you can use to identify, investigate, and respond to
threats or damaging events. It eliminates or reduces damage caused to systems due to attacks, natural
disasters, system failures, or human error. This damage includes any harm caused to information, such as loss
or theft. A commonly used tool for incident response is an incident response plan (IRP). IRPs outline the roles
and responsibilities for responding to incidents. These plans also inform security policy, provide guidelines or
procedures for action, and help ensure that insight gained from incidents is used to improve protective
measures.
Vulnerability Management
Vulnerability management is a practice meant to reduce inherent risks in an application or system. The idea
behind this practice is to discover and patch vulnerabilities before issues are exposed or exploited. The fewer
vulnerabilities a component or system has, the more secure your information and resources are. Vulnerability
management practices rely on testing, auditing, and scanning to detect issues. These processes are often
automated to ensure that components are evaluated to a specific standard and to ensure vulnerabilities are
uncovered as quickly as possible. Another method that you can use is threat hunting, which involves
investigating systems in real-time to identify signs of threats or to locate potential vulnerabilities.
Disaster Recovery
Disaster recovery strategies protect your organization from loss or damage due to unforeseen events. For
example, ransomware, natural disasters, or single points of failure. Disaster recovery strategies typically
account for how you can recover information, how you can restore systems, and how you can resume
operations. These strategies are often part of a business continuity management (BCM) plan, designed to
enable organizations to maintain operations with minimal downtime.
Who are CISOs?
Chief information security officers (CISOs) are people responsible for managing and ensuring the protection of an
organization’s information. This role may be a stand-alone position or be included under the responsibilities of the
vice president (VP) of security or the chief security officer (CSO). The responsibilities of a CISO include managing:
Security Operations—includes real-time monitoring, analysis, and triage of threats.
Cyber risk and cyber intelligence—includes maintaining current knowledge of security threats and keeping
executive and board teams informed of the potential impacts of risks.
Data loss and fraud prevention—includes monitoring for and protecting against insider threats.
Security architecture—includes applying security best practices to the acquisition, integration, and operation
of hardware and software.
Identity and access management—includes ensuring proper use of authentication measures, authorization
measures, and privilege granting.
Program management—includes ensuring proactive maintenance of hardware and software through audits and
upgrades.
Investigations and forensics—includes collecting evidence, interacting with authorities, and ensuring that
postmortems are performed.
Governance—includes verifying at all security operations operate smoothly and serving as a mediator
between leadership and security operations.
A security operations center (SOC) is a collection of tools and team members that continuously monitor and ensure
an organization’s security. SOCs serve as a unified base from which teams can detect, investigate, respond to, and
recover from security threats or vulnerabilities. In particular, SOCs are designed to help organizations prevent and
manage cybersecurity threats. The main idea behind a SOC is that centralized operations enable teams to more
efficiently manage security by providing comprehensive visibility and control of systems and information. These
centers combine security solutions and human expertise to perform or direct any tasks associated with digital
security.
Internal SOC—composed of dedicated employees operating from inside an organization. These centers provide
the highest level of control but have high upfront costs and can be challenging to staff due to difficulty
recruiting staff with the right expertise. Internal SOCs are typically created by enterprise organizations with
mature IT and security strategies.
Virtual SOC—use managed, third-party services to provide coverage and expertise for operations. These
centers are easy to set up, highly scalable, and require fewer upfront costs. The downsides are that
organizations are reliant on vendors and have less visibility and control over their security. Virtual SOCs are
often adopted by small to medium organizations, including those without in-house IT teams.
Hybrid SOC—combine in-house teams with outsourced teams. These centers use managed services to
supplement gaps in coverage or expertise. For example, to ensure 24/7 monitoring without having to arrange
internal overnight shifts. Hybrid SOCs can enable organizations to maintain a higher level of control and
visibility without sacrificing security. The downside of these centers is that costs are often higher than virtual
SOCs and coordination can be challenging.
In your daily operations, many risks can affect your system and information security. Some common risks to be
aware of are included below.
Privacy is a well-known subject for quite a few years and yet very few have a better understanding fully. Privacy is
an essential element for maintaining humanity and social responsibilities and relationships. Humans value their
privacy and protection of personal data. Any individual does not want anyone to access their personal data at any
time, but recent developments in the technologies and competition among the corporate giants to expand the
market threaten the privacy of individuals than ever before. 21st century has seen the world of Big Data and
advanced information technology gave a new sphere to access data and processing them at a very convenient
phase. Many researchers stated the worries that threaten privacy and security are now real that we have the
capabilities to access, collect, analyses data in large quantities of internet search, telephone conversations,
electronic payments and personal information are been breached by varies government agencies and for business
firms having this data is a huge asset to expand their market. Apart from all this the privacy remains the
considerable point to be discussed and redefine the policies agreements and ethics for a better place to live
(Santanen, 2019).
Privacy and latest technologies almost go hand in hand ranging from high tech technologies such as genetics,
biometrics to social media, smart phones, cybersecurity programs, Big Data and search engines. There are two
receptions with wide spread of technology and the impact on the privacy and personal information. The first one is
all our data is somehow held by IT industry which resembles that we have no privacy in the world of technology
where digital age has taken over and there is no alternative to protect our privacy and get over it. The second one is
that our personal information and privacy is more important than ever (Hoven,2014). As technology has become a
part of our life and there is no secret that it got integrated to our lives. Privacy is an important element in the
society for the formation of the relationships by allowing us to know parts of our self to family and friends
withholding from the rest of the world. Varies study found that 91% of adult’s own mobile phone or laptop and our
personal information is stored in the devices is increasing and is been gathered constantly.
Social Media: As every day passes social media plays a major role in our lives and been integral part in our daily
activities. This made the privacy on social media has been more important than ever and may have huge impact on
our life on either way. Hacking a social media account such as Facebook, twitter, Instagram may impersonate us
and may share valuable information. Online hackers or criminals targeting to breach personal data to blackmail,
spread virus, scams and much worse is identity theft. Stalking and cyberbullying in the recent times has become a
threat, and social media provides easy ways for them to carry out. There is been a conflict serving the advertising
customers and the users of social media, and as a result we see privacy breach and collecting information for
marketing. Location-based services increase the threat on privacy and security. Well governed regulations need to
be put in place to secure users privacy (Jan 2016).
Design methods: providing a set of rules and regulations in the initial stage of the design process keeping in mind
certain ethics and values. ‘Privacy by Design’ approach which focus on privacy which has seven principles
guidelines for preserving the privacy of the users (Cavoukian, 2010). In this approach privacy has been a proactive
rather than aftermath. This approach has made privacy as a centered stage in all phases from initial design to final
product.
Privacy Enhancing Technologies: various tools are readily available for the users to provide privacy in some or
the other form. On such example is a Tor (Dingledine, Mathewson, 2004) which is a communication-anonymizing
tool. it allows users to browse and share content in the internet through unspecified means and number of
cryptographic techniques are used to provide the privacy and security for the user. Apart from this they also have
the other side where this Tor tool is suspicious to attack over the internet. Various tools such as Freenet are also
available but have the same downside as Tor which is suspicious to hacking.
Cryptography: It has been used as a means of protecting data for a very long time. Modern cryptography
techniques such as homomorphic encryption has become a potential technique to provide protection to data
(Gentry, 2009). Homomorphic encryption performs the calculations on the data that is already encrypted without
decrypting the data in the first place. by doing so this provides a way more secure computing in cloud computing. It
plays an important role in cloud computing companies providing a secure atmosphere for privacy and data.
Homomorphic Encryption
Identity Management: it is a means of authenticating and authorizing individuals or groups to have access to
their accounts or systems in an organization through network. Policies and ethics in identity management plays an
important role in this world of technology to minimize the fraud and misuse. Identity management in corporate
companies plays a key role in security plans and breach of data, as many organizations provide access to the
employees beyond their actual usage of the system. In that case hackers or attackers can take advantage and
threats like hacking, malware attacks could occur. It plays critical role in any organization or individual by protecting
assets and information from unauthorized users or attackers.
Many researchers have agreed on two broad conclusions regarding one’s privacy. Firstly, privacy is critical for
preservation of human self-respect and secondly privacy plays a key role in the society to maintain relationships
which are the stepping stones of a happy and well-functioning society. If there is no concept of privacy, social and
affectionate relationships among people would take down side and difference among relationships are hardly seen.
There should be always given importance to privacy and security for individuals and society should recognize it and
various actions need to be taken to protect it for the humanity to survive in the long run. Privacy is a nonrenewable
entity, once personal data is collected and exposed cannot be undone. They have been threats to privacy
throughout the existence of humanity but with the constant growth in the technologies which has been part of life
by now is the single largest threat that humanity has ever faced. With increasing Capabilities and Processing power
in technologies that keeps a close watch on every single move and processing and recording most of the data
details of our lives to rapidly growing data related marketing. This data is processed, analyzing the patterns and
then sharing this data to anyone who are willing pay for the data has been the greatest threat which has a potential
harm to forever change the human experience in the society. very little effort has been made to fill the vacuum in
policies related to privacy. we can argue that there is lot of potential and we should make serious considerations
how society address the loop holes in the policies by the technology to provide a better place to live without the fear
of insecurity (Santanen, 2019).
Lesson 1. INTERNET
In 1989, Tim Berners-Lee is also known as TimBL, an English engineer
and computer scientist, best known as the inventor of the World Wide Web,
an Internet-based hypermedia initiative for global information sharing. He is
Director of the World Wide Web Consortium (W3C), a Web standards organization
founded in 1994
that develops interoperable technologies (specifications, guidelines, software,
and tools) to lead the Web to its full potential.
Figure 1. Tim
Berners-Lee
The Internet is the biggest world-wide communication network of computers. The Internet has millions of smaller
domestic, academic, business, and government networks, which together carry many different kinds of
information. The short form of internet is the 'net'. It is used by billions of people all over the world. Internet
allows people to improve the quality of their
life. It opens access to the previously inaccessible things. With almost three million of users, internet has been
emerging as one of the most important tools of communication.
The Internet is the largest computer network in the world, connecting millions of computers. A network is a group
of two or more computer systems linked together. When most people think of the Internet, the first thing they think
about is the World Wide Web. Nowadays, the terms "Internet" and "World Wide Web" are often used
interchangeably—but they're actually not the same thing. The Internet is the physical network of computers all
over the world. The World Wide Web is a virtual network of websites connected by hyperlinks (or "links").
Websites are stored on servers on the Internet, so the World Wide Web is a part of the Internet.
HTML
The backbone of the World Wide Web is made of HTML files, which are specially
formatted documents that can contain links, as well as images and other media.
All web browsers can read HTML files. In addition to HTML, it's common for
websites to use technologies
like CSS (Cascading Style Sheets) and JavaScript to do more advanced things.
The Web works as per the Internet's basic client-server format as shown in the following image. The servers
store and transfer web pages or information to user's computers on the network when requested by the users. A
web server is a software program which serves the web pages requested by web users using a browser.
Benefits of the World Wide Web
It is accessible from anywhere around the globe with the availability of the internet.
You can get access to information or make information accessible to the world.
You can connect to people from anywhere by sitting in your home.
Features of World Wide Web
HyperText Information System
Cross-Platform
Distributed. Approximately 70 million active sites as of December 2007
Open Standards and Open Source. TCP/IP, HTTP, HTML, CSS
Web Browser: provides a single interface to many services
Dynamic, Interactive, Evolving.
Providers (ISP)
ISP – Internet Service Providers
o Providers or host computers are connected to Internet.
o It may be National, Regional or Wireless
Connection Technologies includes:
o Dial-ups, DSL, Cable and Wireless Modems
Users (Client), ISP (Server) forming Client/Server Network
Websites - It is a group of related Web Pages. a location connected to the Internet that
maintains one or more pages on the World Wide Web.
The three ingredients to browse, “surf” and use the internet are the following:
Internet Connection
Internet Browser Software Figure 4. The Internet Today
Internet Capable Computer
Web Browser
The most common Web Browser is the Microsoft Internet
Explorer; it is used to be Netscape Navigator. Other
browsers are available from the internet and most of
them are free.
Uses of Internet
1. Electronic Mail
2. Research
3. Downloading files
4. Discussion groups - These include public groups, such as those on Usenet, and the private mailing lists that ListServ
manages.
5. Interactive games
6. Education and self-improvement - On-line courses and workshops have found yet another outlet.
7. Friendship and dating - You may be surprised at the number of electronic “personals” that you can find on the
World Wide Web.
8. Electronic newspapers and magazines - This category includes late-breaking news, weather, and sports. We’re likely
to see this
category leap to the top five in the next several years.
9. Job-hunting - Classified ads are in abundance, but most are for technical positions.
10.Shopping - It’s difficult to believe that this category even ranks. It appears that “cybermalls” are more for curious
than serious
shoppers.
Internet Application
Figure 6. Search
If you already know exactly whatEngine
you're looking for, a search engine is the best way to find it. Search engines use
keywords or phrases you choose to determine which web pages have relevant information. Think of a search
engine as an index for the web. The most relevant results appear at the top of the screen.
How do you search information on Google?
Step 1: Go to Google (But Which
Google?) ... Step 2: Go to Google Via A
Toolbar. ...
Step 3: Enter Your Search Terms. ...
Step 4: Review Your Search Results.
... Step 5: Preview Your Answers. ...
Step 6: Refine Your Google Search.
... Step 7: Congratulate Yourself!
Microsoft – Cortana
Google – Google
Assistant Amazon –
Alexa
Samsung – Bixby
Apple – Siri
A virtual assistant is a technology based on artificial intelligence. The software uses a device’s microphone to
receive voice requests while the voice output takes place at the speaker. But the most exciting thing happens
between these two actions. It is a combination of several different technologies: voice recognition, voice analysis
and language processing. When a user asks a
personal assistant to perform a task, the natural language audio signal is converted into digital data that can be
analyzed by the software. Then this data is compared with a database of the software using an innovative algorithm
to find a suitable answer. This database is located on distributed servers in cloud networks. For this reason, most
personal assistants cannot work without a reliable Internet connection. With the increasing number of queries the
software’s database gets expanded and optimized, which improves voice recognition and increases the response
time of the system.
Amazon succeeded in taking an important step towards the development of an entire infrastructure for virtual
assistance in 2014 as the company introduced Echo, the first Smart Speaker. Later, Google and Microsoft created
their intelligent loudspeakers – Google Home and Harman Kardon. Apple entered the race with its Apple Homepod
only in 2018. Smart Speakers are stylish objects which are used in home environment and combine the
functionality of a music speaker and an intelligent assistant. Equipped with an innovative voice recognition system,
they are able to recognize the user’s voice from a distance of more than 5 meters. Such smart speakers differ from
other common gadgets, which are personal items that have to be taken along all the time. Smart speakers are
designed as stationary entertainment objects for the whole family and can be used by all family members. It is not
surprising that the voice recognition software, on which a smart speaker is based, feels most comfortable in its own
digital ecosystem. Google Assistant is at its best with Google Apps, Google Home and other Google devices. And
Alexa, the voice software from Amazon, behaves the same on gadgets from the Amazon family. Cortana, the
software of Microsoft, is an exception. With this product Microsoft wants to establish itself as a leading provider in
the area of virtual assistance for businesses. Cortana is therefore optimized for Microsoft business applications such
as Office or Dynamics, as well as for the LinkedIn platform. In addition, the American software giant succeeded in
convincing two automobile manufacturers to implement Cortana. Nissan and Volkswagen vehicles will be equipped
with Cortana voice recognition software.
The internet has also changed the way we communicate on a global scale. However, the internet has
allowed people to maintain relationships that are both local and long distance. Nowadays, with the increase
in smart phones and social media, we can now stay in touch with people wherever you are in the world.
The internet has made communication easier and faster it's allowed us to stay in contact with people
regardless of time and location. It's accelerated the pace of business and widened the possibilities within the
enterprise space.
Blogs
Today, the average user has the ability to shape the Web
by adding to it. If you have knowledge or interests that
you're passionate about, you can create your own blog
and share
your thoughts with the world. There are many sites like blogger.com and Figure 9. VoIP
wordpress.com that let you create a blog for free. You don't need any web design experience - most of the technical
stuff has already been created for you, and you can choose a predesigned template that has the look and feel that
you want.
Vlogs
A video blog or video log, sometimes shortened to vlog is a form of blog for which the medium is video, and is a
form of web television. Vlog entries often combine embedded video (or a video link) with supporting text, images,
and other metadata. Entries can be recorded in one take or cut into multiple parts. Vlog category is popular on the
video-sharing platform YouTube. In recent years, “vlogging” has spawned a large community on social media,
becoming one of the most popular forms of digital entertainment. It is popularly believed that, alongside being
entertaining, vlogs can deliver deep context through imagery as opposed to written blogs. Video logs (vlogs) also
often take advantage of web syndication to allow for the distribution of video over the Internet using either the RSS
or Atom syndication formats, for automatic aggregation and playback on mobile devices and personal computers
(see video podcast).
Email
Most of the mainframes, microcomputers, and computer networks come with an email system. Many email systems
are confined to a single network or computer, whereas some boast gateways to other computer systems. Hence,
you can send email anywhere in the world. You can also use email client software like Microsoft Outlook that lets
you compose an email and send it to another person, provided that you know the recipient’s email address. Every
Internet Service Provider and online service offers an email system and also supports gateways so that you can
communicate without any hassles. It also lets you broadcast data as well as share documents with a group.
Internet Relay Chat
More popularly known as IRC, it is a multi-user chat system that facilitates you to join channels or groups to
communicate privately or in groups. IRC works on a client-server model. That means you require an IRC client and
an active internet connection to join any IRC discussion. Once you join an IRC chat room, you will be able to send
messages to all the participants of the chat room or send a personal message to an individual. Some IRC clients
enable you to create your own channel, where you can invite others to join it. Further, you can even safeguard your
chat room with a password to make the discussion more private.
Videoconferencing
One more internet-based communication tool on our list is videoconferencing. It is a platform or medium where two
or more participants connect using their respective computer networks. It requires the participant to have a
microphone, video camera, and speakers connected to his system. Videoconferencing can be successful only when
both participants use the same software or client service. You will find many free and paid video conferencing tools
available online to download. Most of the web cameras come along with video conferencing software. It provides a
visual connection and interaction features that Instant Messaging and email systems cannot offer. Thus, it serves as
an excellent tool for long-distance learning, webinars, collaboration projects, and more.
Lesson 6. MEDIA
The term media, which is the plural of medium, refers to the communication channels through which we
disseminate news, music, movies, education, promotional messages and other data. ... We used to get all our news
and entertainment via TV, radio, newspapers and magazines. Media plays an important role for the whole society.
Gives us immense knowledge & transmits information – Media keeps us informed about various happening around
the world. It lets us know what is happening around us and all over the world. With the help of media, we get
immense knowledge on various subjects. Modern media comes in many different formats, including print media
(books, magazines, newspapers), television, movies, video games, music, cell phones, various kinds of software,
and the Internet. Each type of media involves both content and also a device or object through which that content is
delivered.
Streaming Media
TV and radio on the Internet are examples of streaming media,
which means the media downloads while it's playing so you
don't have to wait for it to download first. Not all media is
Figure 10. Radio Streaming
streaming. If you've ever
bought music via the iTunes Store, you probably had to wait for it to
download before you could listen to it.
While many of us enjoy staying connected on social media, excessive use can fuel feelings of anxiety, depression,
isolation, and FOMO. Here’s how to modify your habits and improve your mood. Human beings are social creatures.
We need the companionship of others to thrive in life, and the strength of our connections has a huge impact on our
mental health and happiness. Being socially connected to others can ease stress, anxiety, and depression, boost
self-worth, provide comfort and joy, prevent loneliness, and even add years to your life. On the flip side, lacking
strong social connections can pose a serious risk to your mental and emotional health. In today’s world, many of us
rely on social media platforms such as Facebook, Twitter, Snapchat, YouTube, and Instagram to find and connect
with each other. While each has its benefits, it’s important to remember that social media can never be a
replacement for real-world human connection. It requires in-person contact with others to trigger the hormones that
alleviate stress and make you feel happier, healthier, and more positive. Ironically for a technology that’s designed
to bring people closer together, spending too much time engaging with social media can actually make you feel
more lonely and isolated—and exacerbate mental health problems such as anxiety and depression. If you’re
spending an excessive amount of time on social media and feelings of sadness, dissatisfaction, frustration, or
loneliness are impacting your life, it may be time to re-examine your online habits and find a healthier balance.
These days, most of us access social media via our smartphones or tablets. While this makes it very convenient to
keep in touch, it also means that social media is always accessible. This round-the-clock, hyper connectivity can
trigger impulse control problems, the constant alerts and notifications affecting your concentration and focus,
disturbing your sleep, and making you a slave to your phone. Social media platforms are designed to snare your
attention, keep you online, and have you repeatedly checking your screen for updates. It’s how the companies
make money. But, much like a gambling compulsion or an addiction to nicotine, alcohol, or drugs, social media use
can create psychological cravings. When you receive a like, a share, or a favorable reaction to a post, it can trigger
the release of dopamine in the brain, the same “reward” chemical that follows winning on a slot machine, taking a
bite of chocolate, or lighting up a cigarette, for example. The more you’re rewarded, the more time you want to
spend on social media, even if it becomes detrimental to other aspects of your life.
Inadequacy about your life or appearance. Even if you know the images that you’re viewing on social
media are manipulated, they can still make you feel insecure about how you look or what’s going on in your
own life. Similarly, we’re all aware that other people tend to share just the highlights of their lives, rarely the
low points that everyone experiences. But that doesn’t lessen those feelings of envy and dissatisfaction when
you’re scrolling through a friend’s airbrushed photos of their tropical beach holiday or reading about their
exciting new promotion at work.
Fear of missing out (FOMO). While FOMO has been around far longer than social media, sites such as
Facebook and Instagram seem to exacerbate feelings that others are having more fun or living better lives
than you are. The idea that you’re missing out on certain things can impact your self-esteem, trigger anxiety,
and fuel even greater social media use. FOMO can compel you to pick up your phone every few minutes to
check for updates, or compulsively respond to each and
every alert—even if that means taking risks while you’re driving, missing out on sleep at night, or prioritizing
social media
interaction over real world relationships.
Isolation. A study at the University of Pennsylvania found that high usage of Facebook,
Snapchat, and Instagram increases rather decreases feelings of loneliness. Conversely, the study found that
reducing social media usage can actually make you feel less lonely and isolated and improve your overall well-
being.
Depression and Anxiety. Human beings need face-to-face contact to be mentally healthy. Nothing
reduces stress and boosts your mood faster or more effectively than eye-to-eye contact with someone who
cares about you. The more you prioritize social media interaction over in-person relationships, the more you’re
at risk for developing or exacerbating mood disorders such as anxiety and depression.
Cyberbullying. About 10 percent of teens report being bullied on social media and many other users are
subjected to offensive comments. Social media platforms such as Twitter can be hot spots for spreading
hurtful rumors, lies, and abuse that can leave lasting emotional scars.
Self-absorption. Sharing endless selfies and all your innermost thoughts on social media can create an
unhealthy self- centeredness and distance you from real-life connections.
A fear of missing out (FOMO) can keep you returning to social media over and over again. Even though there
are very few things that can’t wait or need an immediate response, FOMO will have you believing otherwise.
Perhaps you’re worried that you’ll be left out of the conversation at school or work if you miss the latest news
or gossip on social media? Or maybe you feel that your relationships will suffer if you don’t immediately like,
share, or respond to other people’s posts? Or you could be worried you’ll miss out on an invitation or that
other people are having a better time than you.
Many of us use social media as a “security blanket”. Whenever we’re in a social situation and feel anxious,
awkward, or lonely, we turn to our phones and log on to social media. Of course, interacting with social media
only denies you the face-to- face interaction that can help to ease anxiety.
Your heavy social media use could be masking other underlying problems, such as stress, depression, or
boredom. If you spend more time on social media when you’re feeling down, lonely, or bored, you may be
using it as a way to distract yourself from unpleasant feelings or self-soothe your moods. While it can be
difficult at first, allowing yourself to feel can open you up to finding healthier ways to manage your moods.
Everyone is different and there is no specific amount of time spent on social media, or the frequency you check for
updates, or the number of posts you make that indicates your use is becoming unhealthy. Rather, it has to do with
the impact time spent on social media has on your mood and other aspects of your life, along with your motivations
for using it. For example, your social media use may be problematic if it causes you to neglect face-to-face
relationships, distracts you from work or school, or leaves you feeling envious, angry, or depressed. Similarly, if
you’re motivated to use social media just because you’re bored or lonely, or want to post something to make others
jealous or upset, it may be time to reassess your social media habits. Indicators that social media may be adversely
affecting your mental health include:
Spending more time on social media than with real world friends. Using social media has become a
substitute for a lot of your offline social interaction. Even if you’re out with friends, you still feel the need to
constantly check social media, often driven by feelings that others may be having more fun than you.
Comparing yourself unfavorably with others on social media. You have low self-esteem or negative
body image. You may even have patterns of disordered eating.
Experiencing cyberbullying. Or you worry that you have no control over the things people post about you.
Being distracted at school or work. You feel pressure to post regular content about yourself, get
comments or likes on your posts, or respond quickly and enthusiastically to friends’ posts.
Having no time for self-reflection. Every spare moment is filled by engaging with social media, leaving
you little or no time for reflecting on who you are, what you think, or why you act the way that you do—the
things that allow you to grow as a person.
Engaging in risky behavior in order to gain likes, shares, or positive reactions on social media.
You play dangerous pranks, post embarrassing material, cyberbully others, or access your phone while driving
or in other unsafe situations.
Suffering from sleep problems. Do you check social media last thing at night, first thing in the morning, or
even when you wake up in the night? The light from phones and other devices can disrupt your sleep, which in
turn can have a serious impact on your mental health.
Worsening symptoms of anxiety or depression. Rather than helping to alleviate negative feelings and
boost your mood, you feel more anxious, depressed, or lonely after using social media.
Information system is an increment in knowledge: it contributes to the general framework of concepts and facts that
we know. Information relies on the context and the recipient's general knowledge for its significance. Data are only
the raw facts, the material for obtaining information. Information systems use data stored in computer databases to
provide needed information. A database is an organized collection of interrelated data reflecting a major aspect of a
firm's activities.
1. Information systems capture data from the organization (internal data) and its environment (external data).
2. They store the database items over an extensive period of time.
3. When specific information is needed, the appropriate data items are manipulated as necessary, and the
user receives the resulting information.
4. Depending on the type of information system, the information output may take the form a query response,
decision outcome, expert-system advice, transaction document, or a report.
Formal information systems rely on procedures (established and accepted by organizational practice) for collecting,
storing, manipulating, and accessing data in order to obtain information. Formal systems do not have to be
computerized, but today they usually are. Informal information systems also exist within an organization
(interpersonal networking, water cooler gossip, etc.).
An information system is a specific type of system in general. A system is a set of components (subsystems) that
operate together to achieve certain objectives. The objectives of a system are realized in its outputs. In particular,
the objective of an information system is to provide the appropriate outputs to the members of the organization.
An organization is an example of an artificial system: it is a formal social unit devoted to the attainment of specific
goals. It does not emerge naturally - it has to be organized. The quality of the system may be evaluated in terms of
its effectiveness and efficiency. Effectiveness measures the extent to which the system meets its objectives.
Efficiency is a measure of re sources consumed to produce given outputs. The fewer resources a system consumes
in producing given outputs, the more efficient it is. All organizations exist as part of a larger system. Information
systems are used to assist management by providing feedback on the firm's performance. Feedback refers to the
outputs of a system that are transformed back into inputs in order to control the system's operation. Information
systems are used to compare the data on the actual performance with the standards developed earlier. Based on
the information about the discrepancies, managers can formulate corrective actions, which are then fed back into
the firm's operations.
1. Timely Available when needed and not outdated when made available
2. Complete Includes all the user needs to know about the situation where the information will be used
3. Concise Does not include elements unneeded by the user
4. Relevant Has direct bearing on the situation
5. Precise Offers quantitative information with a degree of exactness appropriate to the underlying data
6. Form The level of detail, tabular versus graphic display, and quantitative versus qualitative form are selected in
accordance with the situation Internal and External Information
Most of the data captured by information systems relates to the operations of the organization itself, serving to
produce internal information. But in an increasingly competitive marketplace, a firm needs to access more and
more external information. Therefore, it is important to note that decision makers need both the internal
information about their organization and the external information about its environment. A firm can succeed only by
adapting itself to the demands of its external environment. The environment is represented by a number of groups
that affect the company's ability to achieve its objectives or that is affected by it. Such groups are called the
stakeholders of a firm, which includes both internal and external stakeholders.
Information Systems is an academic study of systems with a specific reference to information and the
complementary networks of hardware and software that people and organizations use to collect, filter, process,
create and also distribute data. Information systems help to control the performance of business processes.
Almost all programs in business require students to take a course in something called information systems. But what
exactly does
that term mean? Let’s take a look at some of the more popular definitions.
“Information systems (IS) is the study of complementary networks of hardware and software that
people and organizations use to collect, filter, process, create, and distribute data.”
“Information systems are combinations of hardware, software, and telecommunications networks that
people build and
use to collect, create, and distribute useful data, typically in organizational settings.”
“Information systems are interrelated components working together to collect, process, store, and
disseminate
information to support decision making, coordination, control, analysis, and visualization in an organization.”
As you can see, these definitions focus on two different ways of describing information systems: the components
that make up an information system and the role that those components play in an organization. Technology can be
thought of as the application of scientific knowledge for practical purposes. From the invention of the wheel to the
harnessing of electricity for artificial lighting, technology is a part of our lives in so many ways that we tend to take
it for granted. As discussed before, the first three components of information systems – hardware, software, and
data – all fall under the category of technology. Each of these will get its own chapter and a much lengthier
discussion, but we will take a moment here to introduce them so we can get a full understanding of what an
information system is.
In any given organization information system can be classified based on the usage of the information. Therefore, an
information system in an organization can be divided into operations support system and management support
system.
Managers require precise information in a specific format to undertake an organizational decision. A system which
facilitates an efficient decision-making process for managers is called management support system. Management
support systems are essentially categorized as management information system, decision support system, expert
system and accounting information system. Management information system provides information to manager
facilitating the routine decision-making process. Decision support system provides information to manager
facilitating specific issue related solution.
Expert systems are system that employs knowledge about its application domain and uses an inferencing (reason)
procedure to solve problems that would otherwise require human competence or expertise. The essential
component of the knowledge base is heuristics - informal, judgmental elements of knowledge within the expert
system's domain, such as oil exploration or stock valuation. The knowledge base is developed by working with
domain specialists. It is further enhanced as the system is used.
Supporting Managers with Information Systems:
A variety of information systems support managers as they play their interpersonal, informational, and decisional
roles. The three management-oriented types of systems (management reporting systems, decision support
systems, and executive information systems) provide different kinds of support to the three levels of management:
1. Strategic
2. Tactical
3. Operational
What Managers Do and How Information Systems Can Help
1. Planning establishing goals and selecting the actions needed to achieve them over a specific period of time.
2. Controlling measuring performance against the planned objectives and initiating corrective action, if needed.
3. Leadership including the people in the organization to contribute to its goals.
4. Organizing establishing and staffing an organizational structure for performing business activities.
Mintzberg classified all managerial activities into ten roles falling into three categories:
1. Interpersonal Role
2. Informational Role
3. Decisional Role
1. Operations Management: performed by supervisors of smaller work units concerned with planning and
control of short-term (typically, a week or six months) budgets and schedules.
2. Tactical Management: performed by middle managers responsible for acquisition and allocation of
resources for projects according to tactical plans, set out for one or two years.
3. Strategic Management: Carried out by top corporate executives and corporate boards responsible for setting
and monitoring long-term directions for the firm for three or more years into the future.
1. Hardware
2. Software
3. Databases
4. Human resources
5. Procedures
HARDWARE
Multiple computer systems: microcomputers, minicomputers, mainframes, together with their peripherals.
Computer system components are: a central processor(s), memory hierarchy, input and output devices. Computer
processor: The central processor carries out the instructions of a program, translated into a simple form.
Memories: Included in a computer system form a
hierarchy. They range from fast electronic units, such as the main memory, to the slower secondary storage devices
such as magnetic disks. Moore's Law The increases in the number of transistors on chips correspond to the increase
in the microprocessor speed and memory capacity, and thus the growth of the processing power. Downsizing In
information systems, transferring some or all of the organizations computing from centralized processing on
mainframes or minicomputers to systems built around networked microcomputers (often in a client/server
configuration).
SOFTWARE
Computer software falls into two classes: systems software and applications software. Systems Software: Manage
the resources of the computer system and simplifies programming. An operating system is the principal system
software. It manages all the resources of a computer system and provides an interface through which the system's
user can deploy these resources. Application Software: Are programs that directly assist end users in doing their
work. They are purchased as ready-to-use packages. Applications software directly assists end users in doing their
work.
DATABASES
Databases are organized collections of interrelated data used by applications software. Databases are managed by
systems software known as database management systems (DBMS) and shared by multiple applications.
TELECOMMUNICATIONS
Telecommunications are the means of electronic transmission of information over distances. Today, computer
systems are usually interconnected into telecommunications networks. Various network configurations are
possible, depending upon an organization's need. These include:
Professional information systems personnel include development and maintenance managers, systems analysts,
programmers, and operators, often with highly specialized skills. End users are the people who use information
systems or their information outputs, that is, the majority of people in today's organizations. The hallmark of the
present stage in organizational computing is the involvement of end users in the development of information
systems. End-user computing, or control of their information systems by end users and the development of systems
by end users, has become an important contributor to information systems in organizations.
PROCEDURES
Procedures are the policies and methods to be followed in using, operating, and maintaining an information system.
Specifications for the use, operation, and maintenance of information systems, collected in help facilities, user
manuals, operator manuals, and similar documents, frequently delivered in an electronic form.
From the late 1950s through the 1960s, computers were seen as a way to more efficiently do calculations. These
first business computers were room-sized monsters, with several refrigerator-sized machines linked together. The
primary work of these devices was to organize and store large volumes of information that were tedious to manage
by hand. Only large businesses, universities, and government agencies could afford them, and they took a crew of
specialized personnel and specialized facilities to maintain. These devices served dozens to hundreds of users at a
time through a process called time-sharing. Typical functions included scientific calculations and accounting, under
the broader umbrella of “data processing.”
In the late 1960s, the Manufacturing Resources Planning (MRP) systems
were introduced. This software, running on a mainframe computer, gave
companies the ability to manage the manufacturing process, making it
more efficient.
From tracking inventory to creating bills of materials to scheduling production,
the MRP systems (and later the MRP II systems) gave more businesses a reason
to want to
integrate computing into their processes. IBM became the dominant mainframe company. Nicknamed “Big Blue,”
the company became synonymous with business computing. Continued improvement in software and the
availability of cheaper hardware eventually brought mainframe computers (and their little sibling, the
minicomputer) into most large businesses.
In 1975, the first microcomputer was announced on the cover of Popular Mechanics: the Altair 8800. Its immediate
popularity sparked the imagination of entrepreneurs everywhere, and there were quickly dozens of companies
making these “personal computers.” Though at first just a niche product for computer hobbyists, improvements in
usability and the availability of practical software led to growing sales. The most prominent of these early personal
computer makers was a little company known as Apple Computer, headed by Steve Jobs and Steve Wozniak, with
the hugely successful “Apple II.” Not wanting to be left out of the revolution, in 1981 IBM (teaming with a little
company called Microsoft for their operating-system software) hurriedly released their own version of the personal
computer, simply called the “PC.” Businesses, who had used IBM mainframes for years to run their businesses,
finally had the permission they needed to bring personal computers into their companies, and the IBM PC took off.
The IBM PC was named Time magazine’s “Man of the Year” for 1982.
Because of the IBM PC’s open architecture, it was easy for other companies to copy, or “clone” it. During the 1980s,
many new computer companies sprang up, offering less expensive versions of the PC. This drove prices down and
spurred innovation. Microsoft developed its Windows operating system and made the PC even easier to use.
Common uses for the PC during this period included word processing, spreadsheets, and databases. These early
PCs were not connected to any sort of network; for the most part they stood alone as islands of innovation within
the larger organization.
Client-Server
In the mid-1980s, businesses began to see the need to connect their computers together as a way to collaborate
and share resources. This networking architecture was referred to as “client-server” because users would log in to
the local area network (LAN) from their PC (the “client”) by connecting to a powerful computer called a “server,”
which would then grant them rights to different resources on the network (such as shared file areas and a printer).
Software companies began developing applications that allowed multiple users to access the same data at the same
time. This evolved into software applications for communicating, with the first real popular use of electronic mail
appearing at this time.
In 1991, the National Science Foundation, which governed how the Internet was used, lifted restrictions on its
commercial use. The year 1994 saw the establishment of both eBay and Amazon.com, two true pioneers in the use
of the new digital marketplace. A mad rush of investment in Internet-based businesses led to the dot-com boom
through the late 1990s, and then the dot-com bust in 2000. While much can be learned from the speculation and
crazy economic theories espoused during that bubble, one important outcome for businesses was that thousands of
miles of Internet connections were laid around the world during that time. The world became truly “wired” heading
into the new millennium, ushering in the era of globalization, which we will discuss in chapter 11. As it became
more expected for companies to be connected to the Internet, the digital world also became a more dangerous
place. Computer viruses and worms, once slowly propagated through the sharing of computer disks, could now grow
with tremendous speed via the Internet. Software written for a disconnected world found it very difficult to defend
against these sorts of threats. A whole new industry of computer and Internet security arose. We will study
information security in chapter 6.
Web 2.0
As the world recovered from the dot-com bust, the use of technology in business continued to evolve at a frantic
pace. Websites became interactive; instead of just visiting a site to find out about a business and purchase its
products, customers wanted to be able to customize their experience and interact with the business. This new type
of interactive website, where you did not have to know how to create a web page or do any programming in order to
put information online, became known as web 2.0. Web 2.0 is exemplified by blogging, social networking, and
interactive comments being available on many websites. This new web-2.0 world, in which online interaction
became expected, had a big impact on many businesses and even whole industries. Some industries, such as
bookstores, found themselves relegated to a niche status. Others, such as video rental chains and travel agencies,
simply began going out of business as they were replaced by online technologies. This process of technology
replacing a middleman in a transaction is called disintermediation.
As the world became more connected, new questions arose. Should access to the Internet be considered a right?
Can I copy a song that I downloaded from the Internet? How can I keep information that I have put on a website
private? What information is acceptable to collect from children? Technology moved so fast that policymakers did
not have enough time to enact appropriate laws, making for a Wild West–type atmosphere. Ethical issues
surrounding information systems will be covered in chapter 12.
After thirty years as the primary computing device used in most businesses, sales of the PC are now beginning to
decline as sales of tablets and smartphones are taking off. Just as the mainframe before it, the PC will continue to
play a key role in business, but will no longer be the primary way that people interact and do business. The limited
storage and processing power of these devices is being offset by a move to “cloud” computing, which allows for
storage, sharing, and backup of information on a massive scale. This will require new rounds of thinking and
innovation on the part of businesses as technology continues to advance.
Do you agree that we are in a post-PC stage of the evolution of the information system? No, it's just the
beginning, it will get much better and advanced. Information are just spewed in 1 big mass, but split up in sport,
politics, general news, science, etc, but for smaller news media it's 1 huge blob.
The Post-PC era is a market trend observed during the late 2000s and early 2010s involving a decline in the sales
of personal computers (PCs) in favor of post-PC devices; which include mobile devices such as smartphones and
tablet computers as well as other mobile computers such as wearable and ubiquitous ones. These devices
emphasize portability and connectivity, including the use of cloud-based services, more focused "apps" to perform
tasks, and the ability to synchronize information between multiple devices seamlessly. The term was first coined by
MIT scientist David D. Clark. While both Microsoft's and Apple's former CEOs' Bill Gates and Steve Jobs also
predicted a shift towards mobile devices as the primary method of computing, as a complement to the PC, Jobs
popularized the term "post-PC" in 2007 (the launch of the first iPhone), and in 2011 launched iCloud, a service
enabling Apple's product line to synchronize data with PCs through cloud services, freeing their iOS devices from
dependency on a PC. Towards the middle of the 2010s, media sources began to question the existence of the post-
PC era, at least as conventionally defined, stating that the so-called post-PC devices are just other portable forms of
PCs joining traditional desktop PCs which still have their own operation areas and evolve. For example, gaming PCs
are often considered still popular for many users.
The term "post PC" was first used by David D. Clark in 1999; considering the future of computing to be "inevitably
heterogeneous" and a "network full of services". Clark described a world where "everything" would be able to
connect to the internet (including watches and toasters), computing would primarily be done through information
appliances, and data would be stored by centralized hosting services instead of on physical disks.
In a 1999 op-ed piece for Newsweek, Microsoft's CEO Bill Gates predicted a landscape he dubbed "PC Plus", where
personal computers would be used alongside devices which would seamlessly synchronize data (such as calendar
events, files, e-mails, etc.) from a PC for easier accessibility from where a user would need it. At Macworld
Expo in 2001, not long after the dot-com bubble burst and amidst industry-wide angst over the future of the PC,
Apple founder and CEO Steve Jobs announced a strategy seeing a PC (specifically, the Macintosh) serving as a
"digital hub" for future mobile devices (such as its iPod MP3 player). Jobs stated that "We don't think the PC is dying
at all. We don't think the PC is moving from the center at all. We think it's evolving. Just like it has since it was
invented in 1975 and '76."
At an interview alongside Bill Gates at the 5th All Things Digital conference in 2007, Steve Jobs further described a
concept similar to Gates' "PC Plus" known as a "post-PC device"; "a category of devices that aren't as general
purpose, that are really more focused on specific functions, whether they're phones or iPods or Zunes or what have
you. And I think that category of devices is going to continue to be very innovative and we're going to see lots of
them". Jobs felt that despite these developments, PCs would "continue to be with us and morph with us, whether
it's a tablet or a notebook or, you know, a big curved desktop that you have at your house or whatever it might be."
Gates suggested the prevalence of multiple form factors for such devices, including full- sized tablets, small phones,
and 10-foot experiences for the living room.
In June 2010, at the D8 conference, while being interviewed by Walt Mossberg and Kara Swisher, Jobs compared
tablets and PCs to cars and trucks, saying "[PCs are] still going to be around. They’re still going to have a lot of
value. But they’re going to be used by like one out of x people" while predicting that the vast majority of people will
eventually use tablets as a primary computing device, analogous to the majority of people who drive cars. Directly
conflicting Apple's previous "digital hub" strategy centered around the Macintosh PC, Steve Jobs unveiled Apple's
iCloud platform in 2011, which provides cloud storage for data that can be automatically synced between iOS
products and PCs. iOS 5, released concurrently with iCloud, also removed the platform's dependency on a PC for
first-time setup, syncing, and software updates. Jobs explained that iCloud would replace the PC as the "hub" for a
user's devices with online servers—all of a user's devices, including a PC, would be able to automatically
synchronize and access media and other files between platforms. Apple's current CEO Tim Cook continued to
elaborate on the concept that a PC would no longer have to be the center of one's digital life, considering them to
be a "device" on the same level as any portable device that a particular user owns. Cook also explained that mobile
devices such as tablets and smartphones would be "more portable, more personal and dramatically easier to use
than any PC has ever been".
Technologically, Jason Perlow compared post-PC devices to the centralized mainframe-based computer systems of
1970s—but enhanced by the use of cloud computing to provide a more flexible and heterogeneous infrastructure for
online services to run on, and the use of desktop virtualization to serve PC-only applications when needed as
businesses shift towards apps. Matt Baxter- Reynolds felt that the main selling point of post-PC devices are their
lack of functionality; believing that their more simplistic and secure design make them less intimidating to use for
consumers in comparison to a traditional PC, their lack of keyboard (unlike laptops) contribute to better portability,
and also noted their emphasis on connectivity as well.
In 2014, Sony had sold off its PC division and VAIO brand. This, along with a drop in sales, led many to speculate the
PC market was dying. However, the PC market did experience some periods of growth in the 2010s as well, leading
many to claim the exact opposite. PC gaming grew 8% in 2012 alone and is expected to continue growing. In the
second quarter of 2014, PC sales began to rise again. Growth of the PC compatible market was driven by strong
sales of portable PCs in 2014.
Consider the popular trend of letting the TV audience vote on some talent shows such as Dancing with the Stars.
The voting is managed by a sophisticated information system. The voters are the people involved with the system.
Voters can cast the votes by
phone, by text, or by online poll— three different information technologies. A central server at ABC records and
tallies the votes. The business processes include the phone, texting, and online procedures—how and when to cast
votes, and rules limiting the number of votes from each household. In November 2010, ABC had to defend the
legitimacy of its business processes when detractors claimed that Bristol Palin, daughter of political candidate,
Sarah Palin, received an inflated vote tally from Tea Party supporters. Some of these supporters bragged on blogs
about how they had circumvented the ABC business processes to record multiple votes for Bristol. ABC claims that it
has systems in place to spot and discount suspicious voting activity. They have publicly revealed some, but not all,
of these fraud detection systems. At this point we don’t know for sure if fraudulent votes got through. For more on
this story see for example: http://insidetv.ew.com/2010/11/19/dwts bristol-palin-tea-party-voting-conspiracy/.
ADDITIONAL READINGS
The Ultimate Chatbot Guide
The Conversational AI
Future Trends Concerning Intelligent Personal Assistants
The Impact of AI in the Digital Marketing Space
Voice Technology: Its Effects on Online Retail
Internet Communications: What Is It & Ways to Communicate Over The Internet
Why we study computer?
The Computer Age Generation
History of Computer Hardware Revolution
History of Computer Software Revolution
Input, Output and Storage Devices
REFERENCES
Living in the Information Technology ERA
Ronina R. Caoili Tayuan
Mia V. Eleazar
https://onlim.com/An Introduction To Intelligent Personal Assistants | Chatbot and Voice Assistant Solutions from Onlim.
Wikipedia entry on "Information Systems," as displayed on August 19, 2012. Wikipedia: The Free Encyclopedia. San
Francisco:
Excerpted from Information Systems Today - Managing in the Digital World, fourth edition. Prentice-Hall,
2010. Excerpted from Management Information Systems, twelfth edition, Prentice-Hall, 2012.
Cavoukian, A., 2009, Privacy by Design, Ottowa: Information and Privacy Commissioner of Ontario, Canada.
[Cavoukian 2009 available online (PDF)].
Prepared by: