0% found this document useful (0 votes)
371 views34 pages

Module 1 Living in The IT Era

This is all about information technology

Uploaded by

Marian Tabios
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
371 views34 pages

Module 1 Living in The IT Era

This is all about information technology

Uploaded by

Marian Tabios
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
Living in IT ERA GEEC 104 TH Diana Rose M. Badua 1 Semester 2020-2021 : College of Information Systems ‘Don Mariano Marcos Memorial State Bo win ae Course Outline Living in IT ERA GECC 104 College of Information Systems DMWSU - NLUC Outline} 3. | Colo] 0] SCRIPTION This course introduces the different discoveries and inventions in all ages and generations of conputer, understanding the history of the intemet, and working with teams or individual to experience to live in this IT era. © OBJECTIVES At the end of the course, the students would be able to: 1. Familiarize with the basic concepts of Information and Communication Technology Understand the different functions of Intemet in today’s era Gain familiarity with the different discoveries and inventions of technologies in different ages Apply the basic functions of browser Apply the basic protocols in network etiquettes (Netiquette) Make use of intemet in making a video blogging (viog) Appreciate the 2ower of Information Technology in the modern age. Recognize the role of internet in different areas of today's era en PNRAE iets ce @ REQUIREMENTS Regularly attend the class (online and face-to-face) Have active class participation Take the quizzes and laboratory activities Take and pass the required periodical examination; and Submit the required final project before the end of the term 2S ae. College of Information Systems DMWSU - NLUC Outline} 4 @ GRADING SYSTEM IBTERM 60% _| Cs (Recitation, Quizzes, Seatworks, Assignments) 40% | MIDTERM EXAM FINAL GRADE | 62% |S (Recitation, Quizzes, Seatworks, Assignments) 40% FINAL GRADE Midterm Grade = CS + Midterm Exam Final Term Grade = CS + Final Exam Final Grade = 40% of Midterm Grade + 60% of Final Term Grade @ COURSE CONTENT Module | Fundamentals of IT Lesson1 Information Technology Lesson 2 Elements of Computer System Lesson 3. History of Computer Lesson 4 Input and Output Devices Lesson 5 Apps in Our Day-to-day Activities Module It The modern communication Lesson1 Basic Computer Network Lesson2 The Internet Lesson 3. The World Wide Web Lesson 4 HTML Information as resource with control, privacy and computer ethics Lesson 1 Information, control and privacy Module III College of Information Systems DMWSU - NLUC se Be eee we fe FE Outline} 5 Online security and privacy threats and Lesson 2 practices oe Lesson 3 tee Soha arent of the Philippines and Lesson 4 Computer Ethics Module IV IT, Culture and the Society Lesson 1 Netiquette Lesson 2 Social Media practices Lesson 3 The Internet of Things and Automation Lesson 4 IT trends, Issues and Challenges REFERENCES Skrba, A. (2019). What is a Blog?. Retrieved on Scotember 10, 2019 from [Link]: https: / /[Link]/what-is-blog! [Link], (n.d.). Internet Basics. Retrieved on November 13, 2017 from [Link]: https: //[Link]/en/internetbasics/ Kohan, B. (2011). Internet History. Retrieved on August 8, 2019 fram Camentum: https: //[Link]/[Link] Merchant, S. (20C5). Internet and the World Wide Web. Retrieved on November 12,2017fromhttps: / /[Link]/indiv/m/merchants/13b_internet&web. ppt https: / /[Link]/beginnerguide/domainnames/8/1/What-is-a- domain-name?.ws Mitchell, B. (2019a). Ethernet Cables and How They Work. Retrieved on September 5, 2019 from Lifewire: https: //[Link]/what-is-an- ethernet-cable-817548 Mitchell, B. (2019). Introduction to LANs, WANs, and Other Kinds ot Area Networks. Retrieved on September 5, 2919 from _Lifewire: https: / /[Link]/lans-wans-and-other-area-networks-817376 https: //[Link]/basics-computer-networking/ http:/ /[Link]/technology/difference-between-client- and-server-2/ [Link] [Link] College of Information Systems DMWSU - NLUC RE HE tee RE Outline https: //[Link]/the-difference-between-a-modem-and-a-router [Link] between-hub-swi:ch-router-b74c2e8a8143 https: / /en. wikipedia. org/wiki/Wireless_router [Link]/html/htm_basic.asp Stair, Ralph M. and Reynolds, George W., Principles of information Systems, &th Edition. (2011). Cengage Learning. [Link] https: //[Link]/computerbasics https: //[Link]/as_as_computing/ocr/H047/F451/311/a_ ‘components_system/miniweb/[Link] https: //[Link]/What-are-the-types-of-application-software https: //searchcic. [Link]/definition/software-license https:/ / www. [Link]/open-source-freeware-and-shareware- softwares/ College of Information Systems 6 DMWSU - NLUC Contents| 7 Table of Contents Course Outline 2 Module 1: Fundamentals of IT 7 Information Technology 9 Elements of Computer B History of Computer 16 Input and Output Devices 20 Apps in Our Day-to-day Activities 7 College of Information Systems DMWSU - NLUC Module 1: Fundamentals of IT Living in IT Era GECC 104 Lesson 1 Lesson 2 Lesson 3 Lesson 4 Lesson 5 Information Technology Elements of Computer System History of Computer Input and Output Devices Apps in Our Day-to-day Activities College of Information Systems DMWSU - NLUC INTRODUCTION This module presents the fundamentals of information technology. It talks about the basic concepts of information. You will be exploring the elements involved in the operation of computer systems and learn to appreciate what it can bring to this information age. © OBJECTIVES After studying the module, you should be able to: discuss the concepts of information. identify the elements of computer system. categorize different types of applications software. DIRECTIONS/MODULE ORGANIZER There are five lessons in the module. Read each lesson carefully then answer the exercises/learning activities to find out how much you have benefited from it. Work on these exercises carefully and submit your output to your instructor. 1 2 3 Good luck and happy reading!!! College of Information Systems DMWSU - NLUC Lesson 1 Information Technology Lesson 1: Information Technology College of Information Systems DMWASU » NLUC Data and Information The words “data’ and “information” are often used as if they are synonyms. Nevertheless, they have different meanings. Data are raw facts from which you can draw conclusions or from which you can deduce new tacts. On the other hand, information is a set of tacts organized in such a way that it provides additional value beyond that of the facts themselves. It is derived from data or raw facts, such as an employee number, numter of hours worked in a week, inventory part numbers, or sales orders. Information is often the result of combining, comparing, and performing calculations on data or simply called data Processing. Data processing is the process involved in converting data into usable information. The process may be automated and run on a computer. To put it simply, data are the building blocks of information. For example, think about scores gathered from students. These scores are raw facts or data. These are just pieces of facts which cannot determine how well a student performs in the class. The scores (data) must undergo in a data process such as categorizing, computing, and organizing. After the data process, the output are the grades of the students, This is now the information, Compared to the grades (information), we can sze that the scores (data) is not used to determine whether a student passed or failed the course. Let’s take it further. Information at times can also serve as data for a larger information. In the example, the grades are already an information. Let’s say we want to get the grade point average or GPA of the students. To do this, the grades from the students’ subjects will be collectively computed to get the GPA. In this case, the grades serve as data for the larger information which is the GPA. Forms of Data We will now look at the forms of data which we will see on the table below. These forms of data come from or stored into computers. Data Represented by Alphanumeric Cata Letters, Numbers, and otrer characters Image Data Graphic images and pictures Audio Data’ Sound, Noise or Tones Video Data Moving images or pictures Lesson 1: Information Technology College of Information Systems DMMMSU - NLUC Characteristics of Valuable Information Valuable information can be characterized with the following. + Accessible. Information should be easily accessible by authorized users so they can obtain it in the right format and at the right time to meet their needs. + Accurate. Intormation should be tree trom error. 4 Complete, Complete information contains all the important facts % Cost effective. The cost to produce the information should be less than the actual cost of the information. It should be economical + Flexible. It means that information can be used for a variety of purposes. For example, a birth certificate can be used in different purposes. 4 Relevant. Should be directly related to the needs and requirements of the user. Unnecessary information must be eliminated. 4 Secure. Informat‘on should be secure from access by unauthorized users. It must also be secure fram unwanted events such as corruption of data. 4 Timely. Information must have an age suited to its use. It should be kept up to date. + Verifiable. User can conform and verify the information. This means that you can check it to make sure it is correct, perhaps by checking many sources for the same information. The Information Age The information age (also known as the computer age, digital age, or new media age) is a period that shifted from a traditional industry to an economy driven by information technology. The use of computer technology has become is prevalent in processing, producing, and communicating information. This the modern era where valuable information plays a major rote in political, social, and economic activities, and have become dependent on information and communication technology. What is Information Technology? Information Technology (IT) refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. Since we live in the information age, information technology has become a part of our everyday lives. Information and Communications Technology (ICT) is another term used which you may have encountered. ICT is the same as IT but focuses on the use of communication medium such as computer networks, smartphones, and the internet. Lesson 1: formation Technology College of Information Systems DMMMSU - NLUC @ eee Essa REVIEW QUESTIONS Direction: Please answer what is being asked. 1. Write an example where a data is transformed in:o an information. 2. Discuss the things that you do daily that involves the use of information technology. 3. Tell a short story of your best experience on how information technology helped you in solving a problem. Lesson 1: Information Technology College of Information Systems DMMMSU - NLUC Lesson 2 Elements of Computer System Lesson 2: Elements of Computer College of Information Systems DMMMSU - NLUC What is a Computer? ‘A computer is ani electronic device that manipulates information, or “data.” It has the ability to store, retrieve, and process data. You can use a computer to type documents, send email, and browse the internet. You can also use it to handle spreadsheets, accounting, database management, presentations, games, and more. Computers come in different shapes, forms, and sizes. Personal computers are maybe the first thing that comes to your mind when you hear about computer, like desktop or laptop computers. But aside from those, there are also mobile devices such as smartphones and tablets; supercomputers which are sophisticated computers that do complex tasks such 2s predicting the weather or artificial intelligence; embedded systems like the ones you find on self-driving cars or those that control other mechanical devices. Elements of Computer System A computer system is a system that consists of hardware, software and people that are configured to collect, manipulate, store, and process data into information. Hardware Hardware are the physical computer equipment used in computer systems. They can be categorized as input device, central processing unit, storage device, and output device. ‘An input device is a piece of hardware that is used to enter data into a computer or a similar processing device such as a smartphone. Examples are keyboard, mouse, touchpad, joystick, touchscreen, scanner, microphone, and digital camera. The central processing unit (CPU) is the brain or heart of the computer. It does all the processing, manipulating, or conversion of data. It is also known as the microprocessor. A storage device is any media which is used to store data. Examples of storage devices include hard disk, DVDs, CDs, magnetic tape, Flash drive/thumb drive/Flash memory (USB memory sticks). ‘An output device is a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device. In computing terms, an output device is a piece of hardware that obeys a computer command to do something in the real world. For example, a printer is an output device that will produce ‘a page of information when the correct commands are sent to it from a computer. Some examples include monitor, printer, plotter, projector, speaker, headphones, light / LED. Lesson 2: Elements of Computer College of Information Systems DMMMSU - NLUC Software ‘A computer needs to be told what to do, otherwise it will just sit on your desk collecting dust and taking up space. Software are the applications and programming instructions that tell your computer what to do. Software enables you to use a computer for things such as playing games, writing an essay or listening to music. There are two main types of software. They are system software and applicat‘on software. The system software controls the way the computer works and tells it what to do. This software is Vital to the operation of the computer. Without it, the computer simply would not work. Examples include operating system, utilities, user interface. Ihe other type of Software 1s called application software. It 1s this type of software that you use to do your work, keep in touch with friends and for entertainment. Some examples include, word processors, e-spreadsheets, databases, games, web browser and more. Unlike system software, the application software is rot vital to the operation of the computer. For example, a game is an application software that even without it the computer will still work. Peopleware Peopleware can ‘efer to anything that has to do with the role of people in the development or use of computer software and hardware systems. Some of these roles are computer operators, system administrators, and computer programmers. Computer operators monitor the operation of computers. They start the computer up and close it down. They use the computers for specific tasks like creating documents and spreadsheets. They are sometimes called the end users. Simply, these are anyone who use a computer. System administrator installs new software and maintains the operating system. In most businesses the system administrator is the one you call if you cannot get your desktop computer to work. Computer programmers are those who create software. They encode the @ eee tesla REVIEW QUESTIONS Direction: Please answer what is being asked. 1. Identify all the computers that you can find in your household. 2. Identify the input, output and storage devices of these computers Lesson 2: Elements of Computer College of Information Systems DMMMSU - NLUC Lesson 3 History of Computer Lesson 3: History of Computer College of Information Systems DMMMSU - NLUC Brief History The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into five generations. Each generation lasted for a certain period of time, and each gave us either a new and improved computer or an improvement to the existing computer. First Generation - Vacuum Tubes + From 1942 to 1955 4 Invented by Thomas Edison a i a g alt a 4 It can perform 2,000 to 16,000 additions per second ae eee 4 Had main memory 100 bytes to 2 kilobytes SER ae nore 4 Used vacuum tubes Heeatii 4 Very large machines © special rooms to house them with air conditioning ©. specially trained technicians to run & maintain Characteristic features of first generation 4 They were the fastest calculating devices of their time. + They were too bulky in size, requiring large rooms for installation. + Ihey used thousends of vacuum tubes that produce large amount of heat and burnt out frequently. 4 Each vacuum tube consumed about half a watt of power. Second Generation - Transistors & From 1955 to around 1964 o John Bard2en, Willian Shockley and Walter Brattain invented a new electronic switching device called transistors. + Smaller, faster, and more reliable © used transistors © 6,000 to 300,000 operations/s © main memory 6 kilobytes to 1.3 megabytes 4 one-tenth the price of a 1 Generation 4 become common in larger businesses and universities Characteristic features of second generation 4 They were more rugged and easier to handle than tubes since they were made of germanium semiconductor materials rather than glass. & They consumed almost one-tenth the power consumed by tube. 4 They were much smaller than a tube. 4 They were less expensive to produce Lesson 3: History of Computer College of Information Systems DMMMSU - NLUC Third Generation - Integrated Circuits + Form 1964 to around 1975 © Jack Clair and Robert Noyce invented the first integrated circuit. 4 Used integrated circuits - many transistors on one piece of silicon + Smaller, faster, more reliable, and lower in price © Size of a stove or refrigerator, some can fit on desktops © Can do 10C,000 to 400,000,000 operations per second © Cost about one-tenth the amount of second generation computers 4 These Computers become very common in medium to large businesses Characteristic features of third generation + They were more powerful than second-generation computers. + They were capable of performing about 1 million instructions per second. 4 They consumed less power and dissipated less heat than second generation computers. 4 They had faster and larger primary and secondary storage as compared to second-generatior. Fourth Generation - Microprocessors + From 1975-1989 + Used large scale to very large scale integrated (VLSI) circuits © Put more than one IC on a silicon chip © Can do move than one function + smaller, faster, more reliable, and lower in price ©. Size of a television or much smaller © Can do 50C,000 to 1,000,000,000 operations/secona © Cost one-tenth, or less, the amount of third generation + very common in Fomes and business Characteristic features of fourth generation + PCs were smaller and cheaper than mainframes or minicomputers of third generation. 4 They consumed less power than third-generation computers. & Use of standard tigh-level programming languages allowed program written for ‘one computer to be easily ported to and executed on another computer. 4 They had faster and larger primary and secondary storage as compared to third- generation computers. Fifth Generation of Computer + The period ot tittn generation is 1989-till date. 4 In the fifth gereration, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. Lesson 3: History of Computer College of Information Systems DMMMSU - NLUC 4 This generation is based on parallel processing hardware and Al (Artificial Intelligence) software. Al is an emerging branch in computer science, which interprets the means and method of making computers think like human beings. @ eee REVIEW QUESTIONS 1. Describe cach computer generation. 2. Give at least 3 advantages and of each computer generation. Lesson 3: History of Computer College of Information Systems DMMMSU - NLUC Lesson 4 Input and Output Devices Lesson 4: Input and Output Device College of Information Systems DMMMSU - NLUC Input Is any data or instructions that are used by a computer. They can come directly from you or from other sources. You provide input whenever you use system or application programs. Input devices Are hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process. For example, when using a word processor, you typically use a keyboard to enter text and a mouse to issue commands. In addition to keyboards and mice, there are a wide variety of other input devices. These include pointing, scanning, image capturing, and audio-input devices. Keyboard Entry One of the most common ways to input data is by keyboard. As mentioned, keyboards convert numbers, letters, and special characters that people understand into electrical signals. These signals are sent to, and processed by, the system unit. Most keyboards use an arrangement of keys given the name QWERTY. This name reflects the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys displaying letters. Keyboards There are a wide variety of different keyboard designs. They -ange from the full-sized to miniature and can even be virtual. There are four basic categories of key-boards: traditional, notebook, virtual, and thumb. Traditional keyboards—these keyboards are widely used on desktops and larger computers. The standard U.S. traditional keyboard has 101 keys. Some traditional keyboards include a few additional special keys. For example, the Windows keyboard includes a key to directly access the Start menu. Traditional keyboards provide function keys, navigation keys, and a numeric keypad. Some keys, such as the Caps Lock key, are Loygle keys. These keys Lurid feature unt ur off. Oller, suct as Une Cuil key, are combination keys, which perform a action when held down in combination with another key. Notebook keyboards—these keyboards are widely used on notebook computers including netbooks. While the precise location and number of keys may differ among manufactures, notebook keyboards typically have fewer keys, do not include a numeric keypad, and do not have a standard location for the function and navigation keys. Virtual keyboards—these keyboards are widely used on tablets and an selected by touching their image on the screen, Lesson 4: Input and Output Device College of Information Systems DMMMSU - NLUC Thumb keyboards—these keyboards are widely used on smart phones and other small portable devices. Designed primarily for communicating via texting and connecting to the web, these keyboards are very small. Pointing Devices Pointing devices provide an intuitive interface with the system unit by accepting pointing gestures and converting them into machine-readable input. There are a wide variety of different pointing devices, including the mouse, joystick, touch screen, and stylus. Mice ‘A mouse controls a pointer that is displayed on the monitor. Tie mouse pointer usually appears in the shape of an arrow. It frequently changes shape, however, depending on the application. Some mice have a wheel button that can be rotated to scroll through information that is displayed on the monitor. Although there are several different designs, the optical mouse is the most widely used. It emits and senses light to detect mouse movement. Traditionally, the detected movements are communicated to the system unit through a cord. Alternatively, the cordless or wireless mouse uses radio waves or infrared light waves to communicate with the system unit. Three devices similar to a mouse are trackballs, touch pads, and pointing sticks. 4 Trackballs control the pointer by rotating a ball with your thumb. 4 Touch pads control the pointer by moving and tapping your finger on the surface of a pad. + Pointing sticks, located in the middle of the keyboard, control the pointer by directing the stick with one finger. Touch Screens A touch sercen allows users to select actions or commands by touching the screen with a finger or pen like device. Multitouch screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. Multitouch screens are commonly used with tablets and smartphones, as well as some notebook computers and desktop nonitors. Game Controllers ‘A Game controller is a device that provides input to computer games. While keyboards and mice can be used as game controllers, the four most popular and specialized game controllers are joysticks, dance pads, gamepads, and motion sensing devices. stylus A stylus is a pen like device commonly used with tablet PCs and PDAs. A stylus uses pressure to draw images on a screen. Often, a stylus interacts with the computer through handwriting recognition software. Handwriting recognition software translates handwritten notes into a form that the system unit can process. Lesson 4: Input and Output Device College of Information Systems DMMMSU - NLUC Joysticks control game actions by users varying the pressure, speed, and 4 Dance pads provide input for dance games. Users move (dance) on a pressure. 4 Gamepads are designed to be held by two hands and direction of a control stick sensitive that provides input to the game provide a wide array of inputs including motion, turning, stopping, and firing. 4 Motion-sensing devices control games by user mcvements. For example, Microsoft's Kinect motion-sensing device accepts user movements and spoken commands to control games on the Xbox 360. Scanner devices Scanners move across text and images. Scanning devices convert scanned text and images into a form that the system unit can process. There are five types of scanning devices: optical scanners, card readers, RFID readers, bar code readers, and character and mark recognition devices. Optical Scanners ‘An optical scanner, also known simply as a scanner, accepts documents consisting of text and/or images and converts them to machine-readable form. These devices do not recognize individual letters or images. Typically, scanned documents are saved in files that can be further processed, displayed, and printed stored for later use. There are three basic types of opt'cal scanners: flatbed, document, and portable. 4 Flatbed scanner is much like a copy machine. The image to be scanned is placed ona glass surface, and the scanner records the image from below. ‘& Document scanner is similar to a flatbed scanner except that it can quickly scan multipage document. It automatically feeds one page of a document at a time through a scanning surface. + Portable scanner is typically a handheld device that slides across the image, making direct contact. Card Readers Nearly everyone uses a credit card, debit card, access (parkingor building) card, and/or some type of identificaton card. These cards typically have the user's name, some type of identification number, and signature on the card. Card readers interpret this encoded information. Although there are several different types, by far the most common is the magnetic card reader. The encoded information is stored on a thin magnetic strip located on the back of the card. When the card is swiped through the magnetic card reader, the information is read. Bar Code Readers You are probably familiar with bar code readers or scanners from grocery stores. These devices are either handheld wand readers or platform scanners. They contain photoelectric cells that scan or read bar codes, or the vertical zebra-striped marks printed on product containers. Lesson 4: Input and Output Device College of Information Systems DMMMSU - NLUC

You might also like