GEED 20133 Living in the IT Era Module 8 PDF
Document Details
Uploaded by HilariousLaboradite
Polytechnic University of the Philippines
Tags
Related
- ICT in Our Everyday Lives: A Presentation PDF
- Information and Communication Technology Essentials PDF
- Introduction to Information and Communication Technology PDF
- Introduction to Information and Communication Technology PDF
- Information and Communication Technology Lesson 1 PDF
- Chapter 1 - Emerging Technology in ICT 2024 PDF
Summary
This module provides an overview of information and communication technology (ICT). It explores the history of ICT, its various uses in daily life, and the positive and negative impacts of ICT in society. The module also analyzes opportunities and disruptions across various industries. It's designed as an introduction.
Full Transcript
Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Overview The quickening pace of evolution in technology is very evident in this era. It seems that it is progressing f...
Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Overview The quickening pace of evolution in technology is very evident in this era. It seems that it is progressing faster than ever. From year to year, the evolution of technology is one of staggering promise and opportunity--as well as uncertainty. Basically, technology has been around before, and as long as there are people, information technology will be there also because there were always ways of communicating through technology available at that point in time. The future may be unknown, but digital advancement continues to reshape our world in ways that encourage people to form new habits, find new ways to work together, and become better human beings. And, in most cases, these changes translate into a range of opportunities and disruptions across every industry. Humans have always been quick to adapt technologies for better and faster communication. Objectives After successful completion of this module, the student can be able to; Demonstrate a sense of readiness for the upcoming semester; Identify their learning outcomes and expectations for the course; Recognize their capacity to create new understandings from reflecting on the course; Know the role and importance of ICT. Lesson 1: Information and Communication Technology History of ICT ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing. Although there is no single, universal definition of ICT, the term is generally accepted to mean all devices, networking components, applications and systems that combined allow people and organizations (i.e., businesses, nonprofit agencies, governments and criminal enterprises) to interact in the digital world. GEED 20133 – Living in the IT Era PAGE | 1 1 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Uses of ICT In Our Daily Lives Communication We all know that ICT take a major role for us by means of communicating, way back in the past our parents use to make letter and send it via post mail. But now with the help of ICT it is easier to communicate with our love ones. We can use cellular phones that design for communicating with other people even they are miles away far from you. Nowadays people are in touch with the help of ICT. Through chatting, E-mail, voice mail and social networking people communicate with each other. It is the cheapest means of communication. ICT allows students to monitor and manage their own learning, think critically and creatively, solve simulated real-world problems, work collaboratively, engage in ethical decision-making, and adopt a global perspective towards issues and ideas. It also provides students from remote areas access to expert teachers and learning resources, and gives administrators and policy makers the data and expertise they need to work more efficiently. Job Opportunities In the employment sector, ICT enables organizations to operate more efficiently, so employing staff with ICT skills is vital to the smooth running of any business. Being able to use ICT systems effectively allows employees more time to concentrate on areas of their job role that require soft skills. For example, many pharmacies use robot technology to assist with picking prescribed drugs. This allows highly trained pharmaceutical staff to focus on jobs requiring human intelligence and interaction, such as dispensing and checking medication. Nowadays, employers expect their staff to have basic ICT skills. This expectation even applies to job roles where ICT skills may not have been an essential requirement in the past. Nowadays, finding a job is different, you can just use your smart phone, laptop, desktop or any gadgets that is available in the comfort of your home. Education Information and Communications Technology (ICT) can impact student learning when teachers are digitally literate and understand how to integrate it into curriculum. Schools use a diverse set of ICT tools to communicate, create, disseminate, store, and manage information.(6) In some contexts, ICT has also become integral to the teaching- learning interaction, through such approaches as replacing chalkboards with interactive digital whiteboards, using students’ own smartphones or other devices for learning during class time, and the “flipped classroom” model where students watch lectures at home on the computer and use classroom time for more interactive exercises. GEED 20133 – Living in the IT Era PAGE | 2 2 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES When teachers are digitally literate and trained to use ICT, these approaches can lead to higher order thinking skills, provide creative and individualized options for students to express their understandings, and leave students better prepared to deal with ongoing technological change in society and the workplace. Socializing Social media has changed the world. The rapid and vast adoption of these technologies is changing how we find partners, how we access information from the news, and how we organize to demand political change. The internet and social media provide young people with a range of benefits, and opportunities to empower themselves in a variety of ways. Young people can maintain social connections and support networks that otherwise wouldn't be possible and can access more information than ever before. The communities and social interactions young people form online can be invaluable for bolstering and developing young people's self-confidence and social skills. As the ICT has become ubiquitous, faster and increasingly accessible to non-technical communities, social networking and collaborative services have grown rapidly enabling people to communicate and share interest in many more ways, sites like Facebook, Twitter LinkedIn You tube, Flicker, second life delicious blogs wiki’s and many more let people of all ages rapidly share their interest of the movement without others everywhere. But Facebook seems to be the leading areas of where people communicate and share their opinions. What a change! “Nothing is permanent, but change” (As Heraditus in the 4thcentury BC). Internet can be seen as the international networks of interconnection of computer networks, the main purpose for the institution of internet are quest for information i.e. browsing, electronic mail, knew groups fill transfer and access and use of other computer. Socialization can be seen as a process by which a child adapts a behavior to be an effective member of the society, which can only be achieved through learning or education. Impact of ICT in The Society Positive impacts of Information and Communication Technology Access to information: Increase in access to information and services that has accompanied the growth of the Internet. Some of the positive aspects of this increased access are better, and often cheaper, communications, such as VoIP phone and Instant Messaging. Improved access to education, e.g. distance learning and online tutorials. New ways of learning, e.g. interactive multi-media and virtual reality. New tools, new opportunities: ICT gives access to new tools that did not previously exist: digital cameras, photo-editing software and high quality printers, screen magnification or screen reading software enables partially sighted or blind people to work with ordinary text rather than Braille. Communication: Cost savings by using e.g. VoIP instead of normal telephone, email / messaging instead of post, video conferencing instead of traveling to meetings, e-commerce web sites instead of sales catalogues. Access to larger, even worldwide, markets. Information management: Data mining of customer information to produce lists for targeted advertising. Improved stock control, resulting in less wastage, better cash flow, etc. GEED 20133 – Living in the IT Era PAGE | 3 3 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Security: ICT solves or reduces some security problems, e.g. Encryption methods can keep data safe from unauthorized people, both while it is being stored or while it is being sent electronically. ICT allows people to participate in a wider, even worldwide, society. Distance learning: students can access teaching materials from all over the world. ICT facilitates the ability to perform ‘impossible’ experiments’ by using simulations. Creation of new more interesting jobs. Examples would be systems analysts, programmers and software engineers, as well as help desk operators and trainers. Negative impacts of Information and Communication Technology Job loss: Manual operations being replaced by automation. e.g. robots replacing people on an assembly line. Job export. e.g. Data processing work being sent to other countries where operating costs are lower. Multiple workers being replaced by a smaller number who are able to do the same amount of work. e.g. A worker on a supermarket checkout can serve more customers per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the worker having to enter the item and price manually Reduced personal interaction: Most people need some form of social interaction in their daily lives and if they do not get the chance to meet and talk with other people they may feel isolated and unhappy. Reduced physical activity: This can lead to health problems such as obesity, heart disease, and diabetes. Cost: A lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT system usually requires specialist staff to run it and there is also the challenge of keeping up with ever-changing technology. Competition: this is usually thought of as being a good thing, but for some organizations being exposed to greater competition can be a problem. If the organization is competing for customers, donations, or other means of funding nationally or even internationally, they may lose out to other organizations that can offer the same service for less money. References W. Samuel, S. G. Ajumo, E. C. Anderson and S. Worgu (2016). ICT As A Change Angent For Socialization and Social Engineering. IOSR Journal of Computer Engineering (IOSR- JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. II https://www.digitalistmag.com/cio-knowledge/2019/02/26/evolution-of-technology- continues-what-is-next-in-2019-06196611/ https://bit.ly/30IZ4FO https://ailynvlla.home.blog/2019/03/04/how-ict-affect-our-daily-life/ https://bit.ly/32Vlpm6 https://www.wikijob.co.uk/content/application-advice/job-applications/what-are-ict-skills https://bit.ly/2BuODwV Assessment Instruction: Answer the following questions. 1. What is the relevance of ICT in your chosen course? 2. Name at least 4 uses of ICT in our daily lives and explain. 3. Give 5 positive impacts and 5 negative impacts of ICT in the society. GEED 20133 – Living in the IT Era PAGE | 4 4 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES MODULE 2: HISTORY OF COMPUTER: BASIC COMPUTING PERIODS Objectives At the end of the chapter, students must be able to: Gain familiarity of the different discoveries during the different periods. Learn different inventions and discoveries during electro-mechanical age that lead to the inventions of today’s technology. Identify different technologies and their improvements during the different generations. Definition of Computer Computer is a programmable machine. Computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. Computer is a machine that manipulates data according to a list of instructions (program). Computer is any device which aids humans in performing various kinds of computations or calculations. Three principal characteristics of computer: It responds to a specific set of instructions in a well-defined manner. It can execute a pre-recorded list of instructions. It can quickly store and retrieve large amounts of data. Applications of ICT (Computers) in Our Daily Lives 1. Business Almost every business uses computers nowadays. They can be employed to store and maintain accounts, personnel records, manage projects, track inventory, create presentations and reports. They enable communication with people both within and outside the business, using various technologies, including e-mail. They can be used to promote the business and enable direct interaction with customers. 2. Education Computers can be used to give learners audio-visual packages, interactive exercises, and remote learning, including tutoring over the internet. They can be used to access educational information from intranet and internet sources, or via e-books. They can be used to maintain and monitor student performance, including through the use of online examinations, as well as to create projects and assignments. 3. Healthcare Healthcare continues to be revolutionized by computers. As well as digitized medical information making it easier to store and access patient data, complex information can also GEED 20133 – Living in the IT Era PAGE | 5 5 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES be analyzed by software to aid discovery of diagnoses, as well as search for risks of diseases. Computers control lab equipment, heart rate monitors, and blood pressure monitors. They enable doctors to have greater access to information on the latest drugs, as well as the ability to share information on diseases with other medical specialists. 4. Retail and Trade Computers can be used to buy and sell products online - this enables sellers to reach a wider market with low overheads, and buyers to compare prices, read reviews, and choose delivery preferences. They can be used for direct trading and advertising too, using sites such as eBay, Craigslist, or local listings on social media or independent websites. 5. Government Various government departments use computers to improve the quality and efficiency of their services. Examples include city planning, law enforcement, traffic, and tourism. Computers can be used to store information, promote services, communicate internally and externally, as well as for routine administrative purposes. 6. Marketing Computers enable marketing campaigns to be more precise through the analysis and manipulation of data. They facilitate the creation of websites and promotional materials. They can be used to generate social media campaigns. They enable direct communication with customers through email and online chat. 7. Science Scientists were one of the first groups to adopt computers as a work tool. In science, computers can be used for research, sharing information with other specialists both locally and internationally, as well as collecting, categorizing, analyzing, and storing data. Computers also play a vital role in launching, controlling, and maintaining space craft, as well as operating other advanced technology. 8. Publishing Computers can be used to design pretty much any type of publication. These might include newsletters, marketing materials, fashion magazines, novels, or newspapers. Computers are used in the publishing of both hard-copy and e-books. They are also used to market publications and track sales. 9. Arts and Entertainment Computers are now used in virtually every branch of the arts, as well as in the wider entertainment industry. Computers can be used to create drawings, graphic designs, and paintings. They can be used to edit, copy, send, and print photographs. They can be used by writers to create and edit. They can be used to make, record, edit, play, and listen to music. They can be used to capture, edit and watch videos. They can be used for playing games. 10. Communication Computers have made real-time communication over the internet easy, thanks to software and videoconferencing services such as Skype. Families can connect with audio and video, businesses can hold meetings between remote participants, and news organizations can interview people without the need for a film crew. Modern computers usually have microphones and webcams built-in nowadays to facilitate software like Skype. Older communications technologies such as email are also still used widely. GEED 20133 – Living in the IT Era PAGE | 6 6 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES 11. Banking and Finance Most banking in advanced countries now takes place online. You can use computers to check your account balance, transfer money, or pay off credit cards. You can also use computer technology to access information on stock markets, trade stocks, and manage investments. Banks store customer account data, as well as detailed information on customer behavior which is used to streamline marketing. 12. Transport Road vehicles, trains, planes, and boats are increasingly automated with computers being used to maintain safety and navigation systems, and increasingly to drive, fly, or steer. They can also highlight problems that require attention, such as low fuel levels, oil changes, or a failing mechanical part. Computers can be used to customize settings for individuals, for example, seat setup, air-conditioning temperatures. 13. Navigation Navigation has become increasingly computerized, especially since computer technology has been combined with GPS technology. Computers combined with satellites mean that it's now easy to pinpoint your exact location, know which way that you are moving on a map, and have a good idea of amenities and places of interest around you. 14. Working From Home Computers have made working from home and other forms of remote working increasingly common. Workers can access necessary data, communicate, and share information without commuting to a traditional office. Managers are able to monitor workers' productivity remotely. 15. Military Computers are used extensively by the military. They are use for training purposes. They are used for analyzing intelligence data. They are used to control smart technology, such as guided missiles and drones, as well as for tracking incoming missiles and destroying them. They work with other technologies such as satellites to provide geospatial information and analysis. They aid communications. They help tanks and planes to target enemy forces. 16. Social and Romance Computers have opened up many ways of socializing that didn't previously exist. Social media enables people to chat in text or audio in real time across large distances, as well as exchange photographs, videos, and memes. Dating sites and apps help people to find romance. Online groups help people to connect with others who have similar interests. Blogs enable people to post a variety of views, updates, and experiences. Online forums enable discussions between people on specialist or general topics. 17. Booking Vacations Computers can be used by travelers to study timetables, examine route options, and buy plane, train, or bus tickets. They can be used to explore and book accommodation, whether traditional hotels, or through newer services, such as Air BnB. Guided tours, excursions, events, and trips can also be explored and booked online using computers. 18. Security and Surveillance Computers are increasingly being combined with other technologies to monitor people and goods. Computers combined with biometric passports make it harder for people to fraudulently enter a country or gain access to a passenger airplane. Face-recognition GEED 20133 – Living in the IT Era PAGE | 7 7 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES technology makes it easier to identify terrorists or criminals in public places. Driver plates can be auto scanned by speed cameras or police cars. Private security systems have also become much more sophisticated with the introduction of computer technology and internet technology. 19. Weather Forecasting The world's weather is complex and depends upon a multitude of factors that are constantly changing. It's impossible for human beings to monitor and process all the information coming in from satellite and other technologies, never mind perform the complex calculations that are needed to predict what is likely to happen in the future. Computers can process the large amounts of meteorological information. 20. Robotics Robotics is an expanding area of technology which combines computers with science and engineering to produce machines that can either replace humans, or do specific jobs that humans are unable to do. One of the first use of robotics was in manufacturing to build cars. Since then, robots have been developed to explore areas where conditions are too harsh for humans, to help law enforcement, to help the military, and to assist healthcare professionals. History of Computer: Basic Computing Periods Earliest Computers originally calculations were computed by humans, whose job title was computers. These human computers were typically engaged in the calculation of a mathematical expression. The calculations of this period were specialized and expensive, requiring years of training in mathematics. The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. a) Tally sticks A tally stick was an ancient memory aid device to record and document numbers, quantities, or even messages. Figure 1.1 Tally Sticks b) Abacus GEED 20133 – Living in the IT Era PAGE | 8 8 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES An abacus is a mechanical device used to aid an individual in performing mathematical calculations. The abacus was invented in Babylonia in 2400 B.C. The abacus in the form we are most familiar with was first used in China in around 500 B.C. It used to perform basic arithmetic operations. Figure 1.2 Abacus c) Napier’s Bones Invented by John Napier in 1614. Allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around and placing them in specially constructed boards. Figure 1.3 Napie’s Bones d) Slide Rule Invented by William Oughtred in 1622. Is based on Napier's ideas about logarithms. Used primarily for – multiplication – division – roots – logarithms – Trigonometry Not normally used for addition or subtraction. Figure 1.4 Slide Rule e) Pascaline Invented by Blaise Pascal in 1642. It was its limitation to addition and subtraction. It is too expensive. GEED 20133 – Living in the IT Era PAGE | 9 9 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Figure 1.5 Pascaline f) Stepped Reckoner Invented by Gottfried Wilhelm Leibniz in 1672. The machine that can add, subtract, multiply and divide automatically. Figure 1.6 Stepped Reckoner g) Jacquard Loom The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. It is an automatic loom controlled by punched cards. Figure 1.7 Jacquard Loom h) Arithmometer A mechanical calculator invented by Thomas de Colmar in 1820, The first reliable, useful and commercially successful calculating machine. The machine could perform the four basic mathematic functions. The first mass-produced calculating machine. GEED 20133 – Living in the IT Era PAGE | 10 10 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Figure 1.8 Arithmometer i) Difference Engine and Analytical Engine It an automatic, mechanical calculator designed to tabulate polynomial functions. Invented by Charles Babbage in 1822 and 1834 It is the first mechanical computer. Figure 1.9 Difference Engine & Analytical Engine j. First Computer Programmer In 1840, Augusta Ada Byron suggests to Babbage that he use the binary system. She writes programs for the Analytical Engine. Figure 1.10 Augusta Ada Byron k. Scheutzian Calculation Engine Invented by Per Georg Scheutz in 1843. Based on Charles Babbage's difference engine. GEED 20133 – Living in the IT Era PAGE | 11 11 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES The first printing calculator. Figure 1.11 Scheutzian Calculation Engine l. Tabulating Machine Invented by Herman Hollerith in 1890. To assist in summarizing information and accounting. Figure 1.12 Tabulating Machine m. Harvard Mark 1 Also known as IBM Automatic Sequence Controlled Calculator (ASCC). Invented by Howard H. Aiken in 1943 The first electro-mechanical computer. Figure 1.13 Harvard Mark 1 n. Z1 The first programmable computer. Created by Konrad Zuse in Germany from 1936 to 1938. To program the Z1 required that the user insert punch tape into a punch tape reader and all output was also generated through punch tape. GEED 20133 – Living in the IT Era PAGE | 12 12 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Figure 1.14 Z1 o. Atanasoff-Berry Computer (ABC) It was the first electronic digital computing device. Invented by Professor John Atanasoff and graduate student Clifford Berry at Iowa State University between 1939 and 1942. Figure 1.15 Atanasoff-Berry Computer (ABC) p. ENIAC ENIAC stands for Electronic Numerical Integrator and Computer. It was the first electronic general-purpose computer. Completed in 1946. Developed by John Presper Eckert and John Mauchly. Figure 1.16 ENIAC q. UNIVAC 1 GEED 20133 – Living in the IT Era PAGE | 13 13 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES The UNIVAC I (UNIVersal Automatic Computer 1) was the first commercial computer. Designed by John Presper Eckert and John Mauchly. Figure 1.17 UNIVAC 1 r. EDVAC EDVAC stands for Electronic Discrete Variable Automatic Computer The First Stored Program Computer Designed by Von Neumann in 1952. It has a memory to hold both a stored program as well as data. Figure 1.18 EDVAC s. The First Portable Computer Osborne 1 – the first portable computer. Released in 1981 by the Osborne Computer Corporation. GEED 20133 – Living in the IT Era PAGE | 14 14 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Figure 1.19 The First Portable Computer t. The First Computer Company The first computer company was the Electronic Controls Company. Founded in 1949 by John Presper Eckert and John Mauchly. Basic Computing Periods - Ages a. Premechanical The premechanical age is the earliest age of information technology. It can be defined as the time between 3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started communicating they would try to use language or simple picture drawings known as petroglyths which were usually carved in rock. Early alphabets were developed such as the Phoenician alphabet. Figure 2.1 Petroglyph As alphabets became more popular and more people were writing information down, pens and paper began to be developed. It started off as just marks in wet clay, but later paper was created out of papyrus plant. The most popular kind of paper made was probably by the Chinese who made paper from rags. Now that people were writing a lot of information down, they needed ways to keep it all in GEED 20133 – Living in the IT Era PAGE | 15 15 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES permanent storage. This is where the first books and libraries are developed. You’ve probably heard of Egyptian scrolls which were popular ways of writing down information to save. Some groups of people were actually binding paper together into a book-like form. Also, during this period were the first numbering systems. Around 100A.D. was when the first 1-9 system was created by people from India. However, it wasn’t until 875A.D. (775 years later) that the number 0 was invented. And yes, now that numbers were created, people wanted stuff to do with them, so they created calculators. A calculator was the very first sign of an information processor. The popular model of that time was the abacus. b. Mechanical The mechanical age is when we first start to see connections between our current technology and its ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot of new technologies are developed in this era as there is a large explosion in interest with this area. Technologies like the slide rule (an analog computer used for multiplying and dividing) were invented. Blaise Pascal invented the Pascaline which was a very popular mechanical computer. Charles Babbage developed the difference engine which tabulated polynomial equations using the method of finite differences. Figure 2.2 Difference Engine There were lots of different machines created during this era and while we have not yet gotten to a machine that can do more than one type of calculation in one, like our modern-day calculators, we are still learning about how all of our all-in-one machines started. Also, if you look at the size of the machines invented in this time compared to the power behind them it seems (to us) absolutely ridiculous to understand why anybody would want to use them, but to the people living in that time ALL of these inventions were HUGE. GEED 20133 – Living in the IT Era PAGE | 16 16 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES c. Electromechanical Now we are finally getting close to some technologies that resemble our modern-day technology. The electromechanical age can be defined as the time between 1840 and 1940. These are the beginnings of telecommunication. The telegraph was created in the early 1800s. Morse code was created by Samuel Morse in 1835. The telephone (one of the most popular forms of communication ever) was created by Alexander Graham Bell in 1876. The first radio developed by Guglielmo Marconi in 1894. All of these were extremely crucial emerging technologies that led to big advances in the information technology field. The first large-scale automatic digital computer in the United States was the Mark 1 created by Harvard University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5 tons - HUGE. It was programmed using punch cards. How does your PC match up to this hunk of metal? It was from huge machines like this that people began to look at downsizing all the parts to first make them usable by businesses and eventually in your own home. Figure 2.3 Harvard Mark 1 d. Electronic The electronic age is what we currently live in. It can be defined as the time between 1940 and right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed to solve a full range of computing problems. This computer was designed to be used by the U.S. Army for artillery firing tables. This machine was even bigger than the Mark 1 taking up 680 square feet and weighing 30 tons - HUGE. It mainly used vacuum tubes to do its calculations. There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The second generation replaced vacuum tubes with transistors, punch cards were replaced with magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal storage. Also during this time high-level programming languages were created such as FORTRAN and COBOL. The third generation replaced transistors with integrated circuits, magnetic tape was used throughout all computers, and magnetic core turned into metal oxide semiconductors. An actual operating system showed up around this time along GEED 20133 – Living in the IT Era PAGE | 17 17 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES with the advanced programming language BASIC. The fourth and latest generation brought in CPUs (central processing units) which contained memory, logic, and control circuits all on a single chip. The personal computer was developed (Apple II). The graphical user interface (GUI) was developed. Figure 2.4 Apple 2 History of Computer: Generations of Computer There are five generations of computer: First generation – 1946 to 1958 Second generation – 1959 to 1964 Third generation – 1965 to 1970 Fourth generation – 1971 to Today Fifth generation – Today to future a. The First Generation The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. They were very expensive to operate and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions. First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. Input was based on punched cards and paper tape, and output was displayed on printouts. GEED 20133 – Living in the IT Era PAGE | 18 18 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Examples: – ENIAC – EDSAC – UNIVAC I, UNIVAC II, UNIVAC 1101 b. The Second Generation Transistors replaced vacuum tubes and ushered in the second generation of computers. One transistor replaced the equivalent of 40 vacuum tubes. Allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable. Still generated a great deal of heat that can damage the computer. Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. Second- generation computers still relied on punched cards for input and printouts for output. These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology. Examples: UNIVAC III, RCA 501, Philco Transact S-2000, NCR 300 series, IBM 7030 Stretch, IBM 7070, 7080, 7090 series c. The Third Generation The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers. It could carry out instructions in billionths of a second. Much smaller and cheaper compare to the second-generation computers. d. The Fourth Generation The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse and handheld devices. e. The Fifth Generation Based on Artificial Intelligence (AI). Still in development. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. The goal is to develop devices that respond to natural language input and are capable of learning and self-organization. There are some applications, such as voice recognition, that are being used today. GEED 20133 – Living in the IT Era PAGE | 19 19 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES References https://ftms.edu.my/v2/wp-content/uploads/2019/02/csca0201_ch01.pdf https://www.sutori.com/story/history-of-ict-information-and-communications-technology-- N7J51bQqSU7vLWcVfdn5M9qa https://www.livescience.com/20718-computer-history.html https://www.explainthatstuff.com/historyofcomputers.html Assessment Instruction: Encircle the letter that corresponds to the right answer. 1) What was the name of first computer designed by Charles Babbage? Analytical Engine Difference Engine Colossus ENIAC 2) Which was the first electronics digital programmable computing device? Analytical Engine Difference Engine Colossus ENIAC 3) EDVAC stands for __________. Electronic Discrete Variable Automatic Calculator Electronic Discrete Variable Automatic Computer Electronic Data Variable Automatic Calculator Electronic Data Variable Automatic Computer 4) Which was the first commercial computer? Mark 1 Analytical Engine Difference Engine Colossus 5) UNIVAC stands for __________. Universal Automatic Calculator Universal Native Input Automatic computer Universal Native Input Automatic calculator Universal Automatic Computer 6) ENIAC stands for __________. Electronic Numerical Integrator And Computer Electronic Numerical Integrator And Calculator Electronic Numerical Integrator Automatic Computer Electronic Numerical Integrator Automatic Calculator 7) John Mauchly and J. Presper Eckert are the inventors of __________ computer. UNIAC ENIAC GEED 20133 – Living in the IT Era PAGE | 20 20 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES EDSAC Mark 1 8) Who invented the punch card? Charles Babbage Semen Korsakov Herman Hollerith Joseph Marie Jacquard 9) In the late __________, Herman Hollerith invented data storage on punched cards that could then be read by a machine. 1860 1900 1890 1880 10) Which electronic components are used in First Generation Computers? Transistors Integrated Circuits Vacuum Tubes Microprocessor 11) Which electronic components are used in Second Generation Computers? Transistors Integrated Circuits Vacuum Tubes Microprocessor 12) Which electronic components are used in Third Generation Computers? Transistors Integrated Circuits Vacuum Tubes Microprocessor 13) Which electronic components are used in Fourth Generation Computers? Transistors Integrated Circuits Vacuum Tubes Microprocessor 14) Which electronic components are used in Fifth Generation Computers? Transistors Integrated Circuits Vacuum Tubes Microprocessor 15) ENIAC Computer belongs to __________. First Generation Computers Second Generation Computers Third Generation Computers Fourth Generation Computers GEED 20133 – Living in the IT Era PAGE | 21 21 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES MODULE 3: THE WEB AND THE INTERNET Overview Internet is defined as an information superhighway, to access information over the web. However, it can be defined in many ways, internet is a world-wide global system of interconnected computer networks. Objectives At the end of this lesson, the student should be able to: Explore the current breakthrough technologies and disruptive innovations that have emerged over the past few years. Identify and analyze various emerging technologies. Explore the evolution of the internet. Identify and understand the different uses of internet in today’s generation. Discuss the fundamental terms and definitions used in the internet. Lesson 1: The Web The Web (World Wide Web) consists of information organized into Web pages containing text and graphic images. The world wide web is larger collection of interconnected documents or content. It contains hypertext links, or highlighted keywords and images that lead to related information. A collection of linked Web pages that has a common theme or focus is called a Web site. The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s home page. Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS, also known as TimBL, is an English engineer and computer scientist best known as the inventor of the World Wide Web. He is a Professorial Fellow of Computer Science at the University of Oxford and a professor at the Massachusetts Institute of Technology. A. Web 1.0 (Read Only Static Web) It is an old internet that only allows people to read from the internet. First stage worldwide linking web pages and hyperlink. Web is use as “information portal”. It uses table to positions and align elements on page. Most read only web. If focused on company’s home pages. Dividing the world wide web into usable directories It means web is use as “Information Portal” It started with the simple idea “put content together” GEED 20133 – Living in the IT Era PAGE | 22 22 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCESof Web 1.0 Example Mp3.com Home Page Directories Page Views HTML/Portals. Disadvantages Read only web Limited user interaction Lack of standards B. Web 2.0 (Read-write interactive web) A term used to describe a new generation of Web services and applications with an increasing emphasis on human collaboration. It is a platform that gives users the possibility (liberty) to control their data. This is about user-generated content and the read-write web. People are consuming as well as contributing information through blogs or sites. Allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading a page, the user may be able to comment or create a user account. Dynamic page refers to the web pages that are affected by user input or preference. Is focused on the ability for people to collaborate and share information online via social media, blogging and Web-based communities. Example of Web 2.0 are the following: A. Social Networking - is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Social networking can have a social purpose, a business purpose, or both, through sites such as: Example Facebook Pinterest Twitter Tumblr LinkedIn Instagram Google+ Page B. Blogs - is a discussion or informational website published on the world wide web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page. Example Wordpress Blogger Tumbler C. Wikis - is a hypertext publication collaboratively edited and managed by its own audience directly using a web browser. A typical wiki contains multiple pages for the subjects or scope of the project and may be either open to the public or limited to use within an organization for maintaining its internal knowledge base. Example: GEED 20133 – Living in the IT Era PAGE | 23 23 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Wikipedia Wikivoyage Wikibooks Wikidata Wikiversity Wikinews Commons Wikispecies Wiktionary MediaWiki Wikiquote D. Video Sharing Sites - a website that lets people upload and share their video clips with the public at large or to invited guests. Example: Youtube Photobucket Facebook Twitter LinkedIn Veoh Flickr Dailymotion Photobucket VimeoPRO LinkedIn Myspace.com Flickr Metacafe Key Features of Web 2.0: Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). Rich User Interface – content is dynamic and is responsive to user’s input. An example would be a website that shows local content. User Participation – the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation. Long Tail – services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used. C. Web 3.0: (Read-write intelligent web) Suggested name by John Markoff of the New York Times for the third generation of the web. In this generation, all the application on web or mobile will be upgraded with more features. It applies same principles as Web 2.0: two-way interaction. Web 3.0 will be more connected, open, and intelligent, with semantic web technologies, distributed databases, natural language processing, machine learning, machine reasoning and autonomous agents. Semantic Web - provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user. It is a web of data. Changing the web into a language that can be read and categorized by the system rather than humans. Types of websites: eCommerce Website is a website people can directly buy products from you’ve probably used a number of eCommerce websites before, most big brands and plenty of smaller ones GEED 20133 – Living in the IT Era PAGE | 24 24 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES have one. Any website that includes a shopping cart and a way for you to provide credit card information to make a purchase falls into this category. Business Website is any website that’s devoted to representing a specific business. It should be branded like the business (the same logo and positioning) and communicate the types of products and/or services the business offers. Entertainment Website If you think about your internet browsing habits, you can probably think of a few websites that you visit purely for entertainment purposes. Portfolio Website are sites devoted to showing examples of past work. Service providers who want to show potential clients the quality of the work they provide can use a portfolio website to collect some of the best samples of past work they’ve done. This type of website is simpler to build than a business website and more focused on a particular task: collecting work samples. Media Website collect news stories or other reporting. There’s some overlap here with entertainment websites, but media websites are more likely to include reported pieces in addition to or instead of content meant purely for entertainment. Brochure Website are a simplified form of business websites. For businesses that know they need an online presence, but don’t want to invest a lot into it (maybe you’re confident you’ll continue to get most of your business from other sources), a simple brochure site that includes just a few pages that lay out the basics of what you do and provide contact information may be enough for you. Nonprofit Website In the same way that businesses need websites to be their online presence, nonprofits do as well. A nonprofit website is the easiest way for many potential donors to make donations and will be the first place many people look to learn more about a nonprofit and determine if they want to support it. Educational Website The websites of educational institutions and those offering online courses fall into the category of educational websites. These websites have the primary goal of either providing educational materials to visitors or providing information on an educational institution to them. Infopreneur Website websites overlap a bit with business and eCommerce websites, but they represent a unique type of online business. Infopreneurs create and sell information products. That could be in the form of courses, tutorials, videos or eBooks. Personal Website Not all websites exist to make money in some way or another. Many people find value in creating personal websites to put their own thoughts out into the world. This category includes personal blogs, vlogs, and photo diaries people share with the world. GEED 20133 – Living in the IT Era PAGE | 25 25 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Web Portal are often websites designed for internal purposes at a business, organization, or institution. They collect information in different formats from different sources into one place to make all relevant information accessible to the people who need to see it. They often involve a login and personalized views for different users that ensure the information that’s accessible is most useful to their particular needs. Wiki or Community Forum Website Most people are familiar with wikis through the most famous example of one out there: Wikipedia. But wikis can be created on pretty much any subject you can imagine. A wiki is any website where various users are able to collaborate on content and all make their own tweaks and changes as they see fit. There are wikis for fan communities, for business resources, and for collecting valuable information sources. GEED 20133 – Living in the IT Era PAGE | 26 26 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Lesson 2: The Internet The Internet or “net” (network of network) is the largest computer network in the world that connects billions of computer user. The word internet comes from combination between “interconnection” and “network”. Network is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information). Generally, nobody owns the internet. A. Brief History of Internet ARPA – Advanced Research Project Agency January 2, 1969 – started an experimental computer network. Concept – No server, but equal importance/participation to every computer in the network. Even if, one or two node destroyed that will now affect the network. In 1982 the word internet started. 1986 – First “ free net” created in Case Western Reserve University 1991: US government allowed business agencies to connect to internet. Now all people can connect to the internet and improve their life and work quality. The internet support various aspects in our life. Vinton Gray Cerf ForMemRS is an American Internet pioneer and is recognized as one of "the fathers of the Internet", sharing this title with TCP/IP co-developer Bob Kahn. B. Major Components of the Internet 1. Servers – is a computer program that provides service to another computer program and it’s user. Types of Servers Application Server – a program in computer that provides the business logic for an application program. Web Server – a computer program that serves requested HTML pages or files. Proxy Server – is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting. Mail Server – is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery File Server – is a computer responsible for central storage and management of data files so that other computer on the same network can access them. Policy Server – is a security component of a policy – based network that provides authorization services and facilities tracking and control of files. 2. IP Address (Internet Protocol) – is a numerical label assigned to each device. This provides identity to a network device. 3. Browser – is an application program that provides a way to look information on GEED 20133 – Living in the IT Era PAGE | 27 27 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES the web. Example of browsers: Google chrome, safari, internet explorer, opera, Mozilla 4. Domain Name System (DNS) – is the phonebook of internet. We access information online through domain names. Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu Name Entity.com commercial.org organization.net network.edu education.gov National and State Government Agencies.ph Philippines.au Australia 5. Internet Service Provide (ISP) – is an organization that provides services for accessing, using or participating in the internet. Two types of ISP: National ISP – provided internet access to a specific geographic area. Regional ISP – business that provides internet access in cities and towns nationwide. Example of ISP: Sky Broadband, PLDT, Converge C. Uses of Internet Look for information School works, jobs, and home purposes Send and receive electronic mail Video teleconferencing (video call, video chat) Buy and sell product Social networking Watch & post videos Games Take college courses Monitor home while away Financial transactions Download music and movies D. Internet Terms and Definition Internet - A global network of thousands of computer networks linked by data lines and wireless systems. Web – a collection of billions of webpages that you can view with a web browser GEED 20133 – Living in the IT Era PAGE | 28 28 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Email – the most common method of sending and receiving messages online Social media – websites and apps that allow people to share comments, photos, and videos Online gaming – games that allow people to play with and against each other over the Internet Software updates – operating system and application updates can typically downloaded from the Internet HTML - Hypertext Markup Language is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. When a user clicks on a link within a web page, that link, which is coded with HTML, links the user to a specific linked web page. URL - Uniform Resource Locator is a web address used to connect to a remote resource on the world wide web. Bit - is a single digit in the binary numbering system (base 2). For example: 1 is a bit or 0 is a bit. Byte - generally consists of eight bits. Upload - To upload is to transfer data from your computer to another computer. Download - To download is to transfer data from another computer to your computer. HTTP - is the acronym for Hypertext Transfer Protocol, the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser. HTTPS - is the acronym for Hypertext Transfer Protocol Secure. This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others. Router or router-modem combination is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP. A router can be wired or wireless or both. Encryption - is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Web Bot - A term that applies to programs/applets (macros and intelligent agents) used on the Internet. Such bots perform a repetitive function, such as posting messages to multiple newsgroups or doing searches for information. Search Engine - specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords, phrases. Online Resources / Videos https://www.youtube.com/watch?v=J8hzJxb0rpc https://www.youtube.com/watch?v=x3c1ih2NJEg https://www.youtube.com/watch?v=Dxcc6ycZ73M https://www.youtube.com/watch?v=5o8CwafCxnU References Abraham, R., Jas, F., Russell, W. (2005) The Web Empowerment Book: An Introduction and Connection Guide to the Internet and the World-Wide Web. Springer-Verlag New York Evolution of the web retrieved from https://www.slideshare.net/sububasistha/web-10-to-web- 30-evolution-of-the-web-and-its-various-challenges Types of websites retrieved from https://www.hostgator.com/blog/popular-types-websites- create/ Subhash Basishtha Web 1.0 to Web 3.0 – Evolution of the Web and its Various Challenges. Retrieved from https://slideshare.net/sububasistha/web-10-to-web-30-evolution-of-the-web- GEED 20133 – Living in the IT Era PAGE | 29 29 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES and-its-various-challenges What is internet Retrieved from https://www.tutorialspoint.com/internet_technologies/internet_overview.htm Internet terms and definition Retrieved from https://techterms.com/definition/internet Internet terms and definition Retrieved from https://www.comentum.com/internet-terms.html Internet terms and definition Retrieved from https://www.lifewire.com/top-internet-terms-for- beginners-2483381 Assessment 1. What are the four examples of Web 2.0 2. Who are the inventor/father of the internet and www? 3. Give at least 6 uses of the internet. 4. Define web, web 1.0, 2.0 and 3.0 5. What are the different types of servers? 6. Give 5 types of website and its features. 7. What are the top-level domains? 8. What are the two types of ISP? 9. DNS stands for? And give some examples. 10. Give examples of browsers. GEED 20133 – Living in the IT Era PAGE | 30 30 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES MODULE 4: THE NETIQUETTE AND THE COMPUTER ETHICS Overview The Netiquette and The Computer ethics discusses about the ethical issues in the field of computer. May it be in online or practicing in professional. Objectives At the end of this module, you should be able to: Discuss the importance of being a responsible netizen by following the rules of common courtesy online and the informal “rules of the road” of cyberspace. Discuss the difference between privacy and security. Explain various risks to internet privacy. Lesson 1: Netiquette What is Netiquette? What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online. Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you communicate in the virtual world. When you use e-mail, instant messenger, video calls, or discussion boards to communicate with others online, please be sure to follow the rules of professional online communications known as netiquette. These rules will help you communicate with instructors, classmates, and potential employers more effectively and will help prevent misunderstandings. REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language. To help convey meaning when creating messages, it is sometimes acceptable to include appropriate emoticon symbols, such as a smiley face :) However, for professional communications these would be inappropriate. Photo Imaging and Post Processing PAGE | 31 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college SCIENCES and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead of “ur”. AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or background color; or denoting emphasis using special characters (Example: **Important**). PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your messages before you send them is a best practice for effective and efficient communication. Strive to make your communications concise and free of any: Spelling and grammar errors Confusing terms or phrases that could be misunderstood Errors of omission, such as missing content or recipients Errors in accuracy of information EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE – E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants. In general, messages posted to discussion boards and social media sites can be read by the public. You may never know who might read or share what you post. It is a good practice to always ask a post’s author for permission before sharing a post with other parties. To protect your privacy and safety, do not share online any sensitive personal information such as: - Your home address or phone number - Personal conversations - Social plans, such as vacations - Financial information - Usernames, passwords, or hints - Anything personal that you would not want shared by others over the Internet If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else's work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences. RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation. When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them. When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message (Example: “According to Eric Ericson,” or “The president believes”). Photo Imaging and Post Processing PAGE | 32 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Ten Commandments of Computer Ethics a) Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" b) Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to- face? On most occasions, no. Neither should you behave this way in the virtual world. c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriateq in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? d) Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. e) Rule 5: Make yourself look good online writing.colostate.edu One of the best things about the virtual world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind: Always check for spelling and grammar errors Know what you're talking about and state it clearly Be pleasant and polite f) Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So, in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well. g) Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Photo Imaging and Post Processing PAGE | 33 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION h) Rule 8: Respect other people's privacy SCIENCES Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. i) Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. j) Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Photo Imaging and Post Processing PAGE | 34 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Lesson 2: Cybercrimes What is Cyber? It is the Characteristics of the culture of computers, information, technology and virtual reality. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense. Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information. COMMON FORMS OF CYBERCRIMES: a. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. b. Plagiarism An act or instance of using or closely imitating the language and thoughts of another author without authorization. c. Computer Addiction Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet. *Virtual Self -The persona you create about yourself virtually. Photo Imaging and Post Processing PAGE | 35 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES CRIMINAL ACTIVITIES a. Hacking Unauthorized access of or interference with computer systems, servers, or other information and communication systems Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data Illegal Access Illegal Interception Data Interference System Interference Misuse of Devices Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal Six years up to twelve years of imprisonment also known as prison mayor. b. Computer-related forgery, fraud and/or identity theft An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. Phishing Pharming Spam Maximum of Php 200,000 fine or prison mayor c. Electronic theft Illegal Downloading Obtaining files that you do not have the right to use from the internet. Digital Piracy Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement Penalty of Php 50,000 – 500, 000 and or prison mayor d. Cyberbullying The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. The Anti-Bullying Act of 2013 (RA 10627) e. Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. Penalty at least Php 200,000 and or prison mayor f. Child Pornography Is a form of child sexual exploitation. Photo Imaging and Post Processing PAGE | 36 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION Unlawful or prohibited acts defined SCIENCES and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system. Penalty of 12-20 years of imprisonment or reclusion temporal g. Cyber Defamation Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. Penalty of 6-12 years of imprisonment or prison mayor. Photo Imaging and Post Processing PAGE | 37 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Lesson 3: Internet Threats Hacking Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. The process by which cyber criminals gain access to your computer. What it can do: Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. Install a Trojan horse, providing a back door for hackers to enter and search for your information. Malware Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What it can do: Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. Reformat the hard drive of your computer causing you to lose all your information. Alter or delete files. Steal sensitive information. Send emails on your behalf. Take control of your computer and all the software running on it. Pharming Pharming is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. What it can do: Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent. Photo Imaging and Post Processing PAGE | 38 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Phishing Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. What it does: Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers. Ransomware Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. What it can do: There are two common types of ransomware: Lockscreen ransomware: displays an image that prevents you from accessing your computer Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them Ransomware will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution. What you can do: Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency. Even if you submit payment, there is no guarantee that you will regain access to your system. If your computer has been infected (i.e. you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved. In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive. It's possible that your files might be irretrievable; having an up-to-date backup could be invaluable. Photo Imaging and Post Processing PAGE | 39 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Spam Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. What it can do: Annoy you with unwanted junk mail. Create a burden for communications service providers and businesses to filter electronic messages. Phish for your information by tricking you into following links or entering details with too-good- to-be-true offers and promotions. Provide a vehicle for malware, scams, fraud and threats to your privacy. Spyware (Spyware & Adware) Spyware and adware are often used by third parties to infiltrate your computer. What it is: Software that collects personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses. What it can do: Collect information about you without you knowing about it and give it to third parties. Send your usernames, passwords, surfing habits, list of applications you've downloaded, settings, and even the version of your operating system to third parties. Change the way your computer runs without your knowledge. Take you to unwanted sites or inundate you with uncontrollable pop-up ads. Trojan Horses A Trojan horse may not be a term you're familiar with, but there's a good chance you or someone you know has been affected by one. A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. What it can do: Delete your files. Use your computer to hack other computers. Watch you through your web cam. Log your keystrokes (such as a credit card number you entered in an online purchase). Record usernames, passwords and other personal information. Photo Imaging and Post Processing PAGE | 40 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION SCIENCES Viruses Most people have heard of computer viruses, but not many know exactly what they are or what they do. Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus. What they can do: Send spam. Provide criminals with access to your computer and contact lists. Scan and find personal information like passwords on your computer. Hijack your web browser. Disable your security settings. Display unwanted ads. When a program is running, the virus attached to it could infiltrate your hard drive and also spread to USB keys and external hard drives. Any attachment you create using this program and send to someone else could also infect them with the virus. How will you know if your computer is infected? Here are a few things to check for: It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at all. It takes a long time to launch a program. Files and data have disappeared. Your system and programs crash constantly. The homepage you set on your web browser is different (note that this could be caused by Adware that has been installed on your computer). Web pages are slow to load. Your computer screen looks distorted. Programs are running without your control. If you suspect a problem, make sure your security software is up to date and run it to check for infection. If nothing is found, or if you are unsure of what to do, seek technical help. Wi-Fi Eavesdropping WiFi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi network. What it can do: Potentially access your computer with the right equipment. Steal your personal information including logins and passwords. Worms Worms are a common threat to computers and the Internet as a whole. A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within Photo Imaging and Post Processing PAGE | 41 Polytechnic University of the Philippines COLLEGE OF COMPUTER AND INFORMATION a SCIENCES company or the Internet itself. What they can do: Spread to everyone in your contact list. Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies’ enormous amounts of lost revenue. References http://www.mccc.edu/~virtcoll/Netiquette http://ecampus.matc.edu/student_support/pdfs/7-essential-rules-of-netiquette.pdf https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx Assessment IDENTIFICATION: Read the questions carefully. Write your answer before the number. _______________1. Malware is a short term used for _________. _______________2. It displays an image that prevents you from accessing your computer. _______________3. _______ is a common type of online fraud. _______________4. Netiquette is a short term used for _______. _______________5. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the internet. _______________6. ______ and ______ are often used by third parties to infiltrate your computer. _______________7. It is an executable file that will install itself and run automatically once it’s downloaded. _______________8. Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer. _______________9. It is one of the more common methods of both sending information out and collecting it from unsuspecting people. _______________10. It is a set of rules for behaving properly on