Models and Frameworks
1. Graves and Corcoran’s Model
2.Schiwirian’s Model
3.Turley’s Model
4.Data Information Knowledge (D-I-K) Model
5.Benner’s Novice to Expert Model
Topologies
1. Ring Topology
2. Bus Topology
3. Star Topology
Definition Example 1 Example 2 Example 3
Computer hardware is the
term for the actual parts
that make up a computer
system. It covers every
aspect related to a
computer or laptop’s circuit
board. Motherboard acts as a brain of the computer. The hard drive is a
storage device responsible for storing permanent and temporary data.
Random Access Memory, or RAM, is hardware found in the memory slots
of the motherboard.
Instruction: Utilizing the internet, please define what computer software is
and attached 3
pictures as example to each box provided below.
Definition Example 1 Example 2 Example 3
Soft a A set of instructions known as software allows a user to conduct
activities or communicate with a computer's hardware. The majority of
computers would be unusable without software. Antivirus: AVG, McAfee,
Norton and etc. Presentation: Powerpoint Word processor: Microsoft word
Instruction: Utilizing the internet, please define open source software and
free software and
Open Source Software Free Software
Open source software is code that can been seen, modified, and distributed
by anyone. Open source software, on the other hand, is unique. Its creators
make the source code open to anyone who wants to look at, copy, learn
from, change, or distribute it. Open source software includes programs like
LibreOffice and the Free software is computer software that is distributed
under terms that allow users to use it for any purpose they like, as well as
study, modify, and distribute it and any modified versions. Some examples
are Linux kernel, Apache, and etc.
Instruction: Utilizing the internet, please define the 3 types of software listed
below.
System Software System software, which is primarily controlled by an
operating system, regulates the internal functioning of a computer as well as
peripherals such as monitors, printers, and storage devices.
Programming
Software Programming software is a program or collection of programs that
aid software developers in the creation, debugging, and maintenance of
other programs and applications.
Application Software This is a computer software package that performs a
specific job directly for an end user or, in certain situations, for another
application. It is also known as an application program or application
software. An application can be a single program or a collection of
programs.
4 Most Common Types of Computer Networks
Instruction: Utilizing the internet, please define and differentiate the 4 types
of software listed below and give 1 example each network.
Personal Area Network (PAN) A personal area network (PAN) is a
computer network that links electronic devices in a single person's
workspace. A PAN is a network that allows data to be sent between devices
such as computers, smartphones, tablets, and personal digital assistants.
Examples of wireless PAN, or WPAN, devices include cell phone headsets,
wireless keyboards, wireless mice, printers, bar code scanners and game
consoles.
Local Area Network (LAN) The term "local area network" refers to a
network that is limited to a single location. A LAN is a network that is
contained inside a small geographic area, usually within the same building,
and is made up of two or more connected computers. LANs include things
like home WiFi networks and small commercial networks.
Metropolitan Area Network (MAN) A MAN (metropolitan area network) is
a bigger network that covers the majority of a city's territory. MAN was
once used to connect multiple LANs in a single area. A MAN is exemplified
by the IUB network. A MAN could also be a television cable.
Wide Area Network (WAN) A wide area network (WAN) is a big computer
network that connects multiple computers over a long distance. A school
network, for example, could be connected to the Internet. The Internet,
leased lines, and satellite links can all be used to connect WANs.
A quiz will be given next class meeting.
Using the internet or any computer book you have, please list down as many
as you can keyboard short cut commands. (Ex.: CTRL+X means cut)
• CTRL+A. . . . . . . . . . . . . . . Select All
• CTRL+C. . . . . . . . . . . . . . . . Copy
• CTRL+X. . . . . . . . . . . . . . . . . Cut
• CTRL+V. . . . . . . . . . . . . . . . . Paste
CTRL+Z. . . . . . . . . . . . . . . . . Undo
• CTRL+B. . . . . . . . . . . . . . . . . Bold
• CTRL+U. . . . . . . . . . . . . . . . . Underline
• CTRL+I . . . . . . . . . . . . . . . . . Italic
• F1 . . . . . . . . . . . . . . . . . . . . . Help
• F2 . . . . . . . . . . . . . . . . . . . . . Rename selected object
• F3 . . . . . . . . . . . . . . . . . . . . . Find all files
• F4 . . . . . . . . . . . . . . . . . . . . . Opens file list drop-down in dialogs
• F5 . . . . . . . . . . . . . . . . . . . . . Refresh current window
• F6 . . . . . . . . . . . . . . . . . . . . . Shifts focus in Windows Explorer
• F10 . . . . . . . . . . . . . . . . . . . . Activates menu bar options
• ALT+TAB . . . . . . . . . . . . . . . .Cycles between open applications
• ALT+F4 . . . . . . . . . . . . . . . . . Quit program, close current window
• ALT+F6 . . . . . . . . . . . . . . . . . Switch between current program windows
• ALT+ENTER. . . . . . . . . . . . . .Opens properties dialog
• ALT+SPACE . . . . . . . . . . . . . System menu for current window
• ALT+¢ . . . . . . . . . . . . . . . . . . opens drop-down lists in dialog boxes
• BACKSPACE . . . . . . . . . . . . .Switch to parent folder
• CTRL+ESC . . . . . . . . . . . . . . Open Start menu
• CTRL+ALT+DEL . . . . . . . . . . Opens task manager, reboots the computer
• CTRL+TAB . . . . . . . . . . . . . . Move through property tabs
• CTRL+SHIFT+DRAG . . . . . . .Create shortcut (also right-click, drag)
• CTRL+DRAG . . . . . . . . . . . . .Copy File
• ESC . . . . . . . . . . . . . . . . . . . Cancel last function
• SHIFT . . . . . . . . . . . . . . . . . . Press/hold SHIFT, insert CD-ROM to
bypass auto-play
• SHIFT+DRAG . . . . . . . . . . . . Move file
• SHIFT+F10. . . . . . . . . . . . . . .Open context menu (same as right-click)
• SHIFT+DELETE . . . . . . . . . . .Full wipe delete (bypasses Recycle Bin)
• ALT+underlined letter . . . . Opens the corresponding menu
PC Keyboard Shortcuts:
Document Cursor Controls:
• HOME . . . . . . . . . . . . . . to beginning of line or far left of field or screen
• END . . . . . . . . . . . . . . . . to end of line, or far right of field or screen
• CTRL+HOME . . . . . . . . to the top
• CTRL+END . . . . . . . . . . to the bottom
• PAGE UP . . . . . . . . . . . . moves document or dialog box up one page
PAGE DOWN . . . . . . . . moves document or dialog down one page
ARROW KEYS . . . . . . . move focus in documents, dialogs, etc.
• CTRL+ > . . . . . . . . . . . . next word
• CTRL+SHIFT+ > . . . . . .selects word
Windows Explorer Tree Control:
• Numeric Keypad * . . . Expand all under current selection
• Numeric Keypad + . . . Expands current selection
Numeric Keypad – . . . Collapses current selection
• ¦ . . . . . . . . . . . . . . . . . . . Expand current selection or go to first child
• ‰ . . . . . . . . . . . . . . . . . . Collapse current selection or go to parent
Special Characters:
• ‘ Opening single quote . . . alt 0145
• ’ Closing single quote . . . . alt 0146
• “ Opening double quote . . . alt 0147
• “ Closing double quote. . . . alt 0148
• En dash. . . . . . . . . . . . . . . alt 0150 Em dash . . . . . . . . . . . . . . alt 0151
• … Ellipsis. . . . . . . . . . . . . . . . alt 0133
• Bullet . . . . . . . . . . . . . . . . alt 0149
• ®️Registration Mark . . . . . . . alt 0174
• ©️Copyright . . . . . . . . . . . . . alt 0169
• ™️Trademark . . . . . . . . . . . . alt 0153
• ° Degree symbol. . . . . . . . . alt 0176
• ¢ Cent sign . . . . . . . . . . . . . alt 0162
• 1⁄4 . . . . . . . . . . . . . . . . . . . . . alt 0188
• 1⁄2 . . . . . . . . . . . . . . . . . . . . . alt 0189
• 3⁄4 . . . . . . . . . . . . . . . . . . . . . alt 0190
PC Keyboard Shortcuts:
• Creating unique images in a uniform world! Creating unique images in a
uniform world!
• é . . . . . . . . . . . . . . . alt 0233 É . . . . . . . . . . . . . . . alt 0201
• ñ . . . . . . . . . . . . . . . alt 0241
• ÷ . . . . . . . . . . . . . . . alt 0247
• File menu options in current program
• Alt + E Edit options in current program
• F1 Universal help (for all programs)
• Ctrl + A Select all text
• Ctrl + X Cut selected item
• Shift + Del Cut selected item
• Ctrl + C Copy selected item
• Ctrl + Ins Copy selected item
• Ctrl + V Paste
• Shift + Ins Paste
• Home Go to beginning of current line
• Ctrl + Home Go to beginning of document
• End Go to end of current line
• Ctrl + End Go to end of document
• Shift + Home Highlight from current position to beginning of line
• Shift + End Highlight from current position to end of line
• Ctrl + f Move one word to the left at a time
Ctrl + g Move one word to the right at a time
MICROSOFT WINDOWS SHORTCUT KEYS
• Alt + Tab Switch between open applications
• Alt +
• Shift + Tab
• Switch backwards between open
• applications
• Alt + Print
• Screen
• Create screen shot for current program
Ctrl + Alt + Del Reboot/Windows®️task manager
• Ctrl + Esc Bring up start menu
• Alt + Esc Switch between applications on taskbar
• F2 Rename selected icon
• F3 Start find from desktop
• F4 Open the drive selection when browsing
• F5 Refresh contents
• Alt + F4 Close current open program
• Ctrl + F4 Close window in program
• Ctrl + Plus
• Key
• Automatically adjust widths of all columns
• in Windows Explorer
• Alt + Enter Open properties window of selected icon
• or program
• Shift + F10 Simulate right-click on selected item
• Shift + Del Delete programs/files permanent
A. Infusion Pump
The Infusion Pump is the first issue I would want to discuss above all the
videos included in the module. Hospital infusion pumps are medical
equipment used to give patients solutions and medications in hospitals and
other healthcare settings. There are various kinds of infusion pumps, as the
video mentions. These tools are extremely helpful to medical professionals
in many ways, such as ensuring patients receive the appropriate dosage of
painkillers and other medications. This is crucial since they can keep track
of your dosage and determine when it's time to stop pumping. The biggest
advantage of having this machine is that any patient who requires it can use
it because it is quite simple to use and does not require any specific training.
B. RxBox
The RxBox is the next topic. As shown in the video, having a RxBox in the
community is incredibly beneficial. It has several settings and everything
you need to monitor and take vital signs. This equipment greatly aids in cost
savings, particularly in situations where the community health center lacks
the funds to purchase the equipment required to offer patients medical care.
It is also incredibly user-friendly, navigable, and convenient. It can also
record the patient's vital signs, medical records, and other information. It can
save a great deal of money and lives for the community's members to
imagine that this equipment is available to everyone. It has the ability to
make all medical professionals' jobs easier.
C. New Telemedicine Device Improve Homecare
The telemedicine gadget is the final topic I would want to discuss. This is a
device that would be a smart investment for families who have a history of
disease, but it would also be beneficial for everyone to monitor and be
health conscious. Considering the ongoing pandemic, this will be especially
helpful in the event of an emergency since it may promptly notify the
hospital with whom it was connected, thereby reducing the risk of visiting
the hospital. Additionally, this would greatly benefit those medical
professionals and enhance in-home care for the public.
1.Types of Intellectual Lawa.A patentis an intellectual property right that, upon
patent issuance, the US government grants to an inventor in exchange for
public disclosure of the invention "to exclude others from making, using,
offering for sale, or selling the invention throughout the United States or
importing the invention into the United States" for a set period of time.
b.Atrademarkis a type of intellectual property protection that guards words,
titles, logos, sounds, or colors that identify the source of an item and set it
apart from products and services made or sold by others. Trademarks, if
used, can be renewed indefinitely, unlike patents.c.Copyrightis a type of
property right that safeguards original works of art, music, and writing. d.A
trade secretis a type of property right made ofinformation that businesses
maintain confidential to obtain a competitive edge.2.Is there a Philippine law
about intellectual property?On January 1, 1998, the Philippine Intellectual
Property Code became operative after being passed into law 22 years prior.
Passed in 1924, Act No. 3134, often known as "An Act to Protect Intellectual
Property," was in force until 1945, when the Philippinesgained independence
from the US. The United States served as the model for Act No. 3134. In
addition to the 1909 Copyright Law, the Philippines also passed Republic Acts
165 and 166 in 1947, which created a patent office and permitted the
registration andprotection of trade names, trademarks, and service marks,
respectively.Republic Act No. 8293, Section 2. State Policy Declaration: The
state recognizes that the expansion of domestic and creative activity, as well
as the transfer of technology, the drawing of foreign investment, and the
guarantee of market access for our products, depend on a well-functioning
intellectual and industrial property system. It shall protect and preserve the
exclusive rights of scientists, inventors, artists, and other talented persons to
their intellectual property and accomplishments for the times indicated in this
Act, especially where those contributions benefit the public.
Intellectual property is used for socially beneficial purposes. For the common
good as well as the advancement of the country, the government would
promote the dissemination of knowledge and information in order to achieve
this goal. The State also aims to enhance intellectual property enforcement in
the Philippines, liberalize technology transfer registration, and streamline
administrative processes for copyright, trademark, and patent
registration.3.What are the types of right under the law of copyrights?
a.Economic Rights –Permit the rightful owner to be paid a sum of money
when others use their work. Every property has an owner who has the right to
determine how it is used. If someone wants to use something legally, they can
do so by getting the owner's consent, which is typically given through a
license. b.Moral Rights –Enable writers and artists to take specific measures
to maintain and safeguard their connection to their creations. 4.What are the
works covered?a.Literary works(such as written speeches, books, periodicals,
trade journals, training materials, technical papers, catalogs, magazines, and
newsletters); b.Musical works (like musicals, operas, and songs);c.Dramatic
works (like theater, dance, and mime); d.Artistic works (include drawings,
cartoons, paintings, sculptures, computer and laser artwork, architectural
pieces, and blueprints); e.Photographic works (like pictures and
gravures);f.Computer programs, software, and original databases;g.Maps,
globes, charts, diagrams,and technical drawings; h.Advertisements,
commercial prints,and labels;i.Motion pictures (like TV commercials,
documentaries, and movies);j.Multimedia products (texts that are combined
with sound, visual graphics, and computer programs, like video
games);k.Works of applied art (like designer jewelry, rugs, and wallpaper).
Generally, works in printed, electronic, or digital versions are covered by
copyright. Works are protected whether they are downloaded from the
Internet, aired on radio or television, or kept on computer diskettes, hard
drives, CD ROMs, VCDs, or DVDs.5.Limitation of the copyright law.Copyright
does not apply to:a.IdeasCopyright law does not protect the underlying idea,
procedure, method of operation, mathematical concept, or system in question. Such
materials may be protected as trade secrets or under patent law if the right conditions
are met.b.FactsScientific, historical, biographical, or current event facts are not
protected by copyright; instead, it protects the expression, arrangement, or choice of
such facts. However, the protection afforded to news stories is subject to several
limitations and exemptions under copyright laws.c.Useful articlesFunctional things
like clothing, computer monitors, and sinks may not be protected by copyright in
some countries, but an article's design may be as long as it's an industrial design.
Copyright protection will still be in place for the object to the extentthat it has pictorial,
visual, or sculptural features that could be "recognized separately from the utilitarian
components" of the article. d.Names, tiles, slogans, and other short
phrasesShort phrases, names, headlines, slogans, titles, and single words are
typically not covered by copyright protection. Nonetheless, some nations offer highly
imaginative individuals protection. This implies that while the name of a product or an
advertisingslogan you employ for your business may be protected by trademark or
unfair competition laws, they are typically not covered by copyright. Conversely,
logos might be shielded by trademark law and copyright as artistic works, provided
that the necessary conditions are met. e.Official government worksOfficial
government publications, including copies of laws and court rulings, may not always
be covered by copyright in other nations.
Privacy of Personal and Public DomainsTheauthors of the research "Privacy
vs. Surveillance: A Comparative Study of Personal and Public Domains" look
at how various social media platforms handle user privacy and their privacy
rules. They also draw comparisons with the way governments handle the
privacy of their constituents. The authors contend that governments continue
to have the exclusive right to monitor us even as our private lives are
becoming increasinglypublic. They contend that there are two primary causes
for this imbalance: first, the majority of individuals believe they have no choice
but to share their personal information online since it enhances their capacity
to interact with others, which in turn enhances their life.Second, companies
are motivated to gather as much data on us as they can as it makes it easier
for them to sell us goods or services that we might find interesting based on
our online activity. In order to better comprehend and anticipate possible risks
from terrorists or criminals, government authorities are also motivated to
gather this data.There has always been debate over ethics regarding the
nature and appropriate use of personal health data. Since comprehensive
records have been maintained, it is likely that unauthorized and inappropriate
disclosures of sensitive health information have happened. The ethical
problems associated with maintaining the confidentiality and security of
individual health records have been made worse by developments in
information technology that facilitate the rapid gathering and exchange of
data. The likelihood of unethical disclosure of personal health information will
increase in lockstep with the progressive permeation of information networks
and databases throughout the health-care sector (Mullen & Lavery, 1998).
Protection of data privacy and confidentiality, security, and safety of hospital
and other health information systems are ensured by policies and procedures
set by the appropriate authorities. As part of these protocols, individual health
care personnel take actions, including nurses. Agency disclosure, deletion,
and unauthorized use of data must all be prevented. Health care providers are
in charge of managing client data, and they also have control over data input
and output.
10 NETIQUETTES
1. Make it a point to be kind and respectful when you speak. Entering text in all CAPS is
not helpful. Avoid calling people names. Say "thank you" and "please" to others when
you need their assistance.
2. Steer clear of sarcasm, particularly in lighthearted situations. Sarcasm has become
the standard approach to internet debate. It does not, however, diminish the importance
of the scholarly conversation. Remember that an online classroom is still a classroom;
the only thing that makes it worse is that it is permanently archived online as a digital
record.
3. Respects the opinions of others. A different view does not imply that it is incorrect.
Disagreement is acceptable without becoming combative.
4. Make an attempt to use proper language, spelling, and punctuation. Practice using
proper grammar. It's also important to refrain from using shorthand language. Keep in
mind that your fellow students may not communicate within the same cultural framework.
5. Remain focused and use it as a teaching tool rather than a diversion from the lesson.
Make sure your posts and questions relate to the lesson's topic and the discussions that
are taking place. Idle conversations can quickly escalate into pointless disputesif they are
not controlled. Don't post pointless links.
6. Before answering a comment that is older, make sure to check the most current ones.
Reacting to older communications that newer comments have already declared to be
outdated or irrelevant could backfire.
7. Answering should be succinct. People are unlikely to read a long, meandering
response in contrast to a clear, succinct one.
8. Start by reading. Make sure your question hasn't already been asked and answered
before posting it on the discussion board.
9. If there are a lot of responses, give a synopsis or compilation of them.
10.Make sure to quote a few sentences from your classmate's response if you plan to
expand on it or make references to it, as this will help readers understand your point of
view.