1ST Sem 21 22 IM Living in The IT Era
1ST Sem 21 22 IM Living in The IT Era
1ST Sem 21 22 IM Living in The IT Era
Living in the
Information Technology Era
Chapter 1
Introduction to Information and Communication Technology
Learning Objectives
Learning Contents
Information technology (IT) is the use of computers to store, retrieve, transmit, and
manipulate data or information. IT is typically used within the context of business operations as
opposed to personal or entertainment technologies. IT is considered to be a subset of information
and communications technology (ICT). An information technology system (IT system) is generally
an information system, a communications system or, more specifically speaking, a computer
system – including all hardware, software and peripheral equipment – operated by a limited
group of users.
The term is commonly used as a synonym for computers and computer networks, but it
also encompasses other information distribution technologies such as television and telephones.
Several products or services within an economy are associated with information technology,
including computer hardware, software, electronics, semiconductors, internet, telecom
equipment, and ecommerce.[5][a]
The term ICT is also used to refer to the convergence of audiovisual and telephone
networks with computer networks through a single cabling or link system. There are large
economic incentives to merge the telephone network with the computer network system using a
ICT is a broad subject and the concepts are evolving. It covers any product that will store,
retrieve, manipulate, transmit, or receive information electronically in a digital form (e.g., personal
computers, digital television, email, or robots). Theoretical differences between interpersonal
communication technologies and mass-communication technologies have been identified by the
philosopher Piyush Mathur. Skills Framework for the Information Age is one of many models for
describing and managing competencies for ICT professionals for the 21st century.
Computers are used as control systems for a wide variety of industrial and consumer
devices. This includes simple special purpose devices like microwave ovens and remote controls,
factory devices such as industrial robots and computer-aided design, and also general purpose
devices like personal computers and mobile devices such as smartphones. The Internet is run on
computers and it connects hundreds of millions of other computers and their users.
Early computers were only conceived as calculating devices. Since ancient times, simple
manual devices like the abacus aided people in doing calculations. Early in the Industrial Revolution,
some mechanical devices were built to automate long tedious tasks, such as guiding patterns for
looms. More sophisticated electrical machines did specialized analog calculations in the early 20th
century. The first digital electronic calculating machines were developed during World War II. The first
semiconductor transistors in the late 1940s were followed by the silicon-based MOSFET (MOS
transistor) and monolithic integrated circuit (IC) chip technologies in the late 1950s, leading to the
microprocessor and the microcomputer revolution in the 1970s. The speed, power and versatility of
computers have been increasing dramatically ever since then, with MOS transistor counts increasing
at a rapid pace (as predicted by Moore's law), leading to the Digital Revolution during the late 20th to
early 21st centuries.
1. Keyboard
Keyboards are the most common type of input device. Before keyboards, interaction with
computers was generally carried out using punch cards and paper tape. Most English language
keyboards use the QWERTY layout for the alphabetic keys, which are surrounded by number,
symbol, function, and other key types. By pressing the relevant keys, a user can feed data and
instructions to the computer.
2. Mouse
A mouse interacts with a computer through a process known as "point and click." Essentially, when
a user moves the mouse on the mouse pad, the pointer moves in a corresponding direction on the
computer's monitor screen. The concept of a computer mouse has its roots in the trackball, a
related pointing device invented in 1946 that used a "roller ball" to control a pointer. Most modern
computer mice have two buttons for clicking and a wheel in the middle for scrolling up and down
documents and web pages.
3. Touchpad
Also known as a trackpad, a touchpad is a common substitute for a computer mouse. It is
essentially a specialized surface that can detect the movement of a user's finger and use that
4. Scanner
The word "scanner" can be used in a number of different ways in the computer world, but here I
am using it to refer to a desktop image scanner. Essentially, a scanner is an input device that uses
optical technology to transfer images (or sometimes text) into a computer, where the signal is
converted into a digital image. The digital image can then be viewed on a monitor screen, saved,
edited, emailed, or printed.
5. Digital Camera
Digital cameras are used to capture photographs and videos independently. Later, these photo and
video files can be transferred to a computer by connecting the camera directly with a cable,
removing the memory card and slotting it into the computer, or through wireless data transfer
methods such as Bluetooth. Once the photos are on the computer, they can be saved, edited,
emailed, or printed.
6. Microphone
A microphone captures audio and sends it to a computer where it is converted to a digital format.
Once the audio has been digitized, it can be played back, copied, edited, uploaded, or emailed.
Microphones can also be used to record audio or to relay sounds live as part of a video chat or
audio stream.
7. Joystick
Joysticks are commonly used to control characters and vehicles in computer video games.
Essentially, a joystick is a handle that pivots on a base and sends its angle or direction to the
computer as data. Many video gaming joysticks feature triggers and buttons that can be pressed
to use weapons or projectiles in games.
8. Graphic Tablet
Also known as digitizers, graphic tablets are input devices used for converting hand-drawn artwork
into digital images. The user draws with a stylus on a special flat surface as if they were drawing
on a piece of paper. The drawing appears on the computer screen and can be saved, edited, or
printed. While scanners can only create digital images from drawings, graphic tablets offer greater
control and versatility for artists by allowing them to see their drawing appear live on their monitor
as they create it.
9. Touch Screen
Many devices nowadays use a touch screen rather than a mouse as a way for users to point, drag,
or select options on a screen. As the name suggests, a touch screen is a touch-sensitive monitor
screen that reacts to fingers moving across it. Touch screens are particularly common in portable
devices, such as tablets, palmtops, laptops, and smartphones.
Output Devices
The key distinction between an input device and an output device is that an input device sends
data to the computer, whereas an output device receives data from the computer.
For example, using a microphone to record a podcast is an example of using an input device.
Listening to the recorded podcast through a connected speaker is an example of using an output
device. Both output and input devices are examples of auxiliary or peripheral devices.
Popular Brands: Acer, Alienware, Apple, Asus, Dell, HP, LG, Lenovo, Samsung
Origin Story: The first monitors used the same technology as early televisions, relying on a
cathode ray tube and a fluorescent screen. This technology was first utilized for computer monitors
in 1965 in the Uniscope 300 machine, which had a built-in CRT display. CRT display lights up a series
of dots with a beam on an active part of the screen. This resulted in a maximum resolution of 1600
by 1200 pixels. LCD (liquid crystal display) entered the market in 2000 and outsold CRT monitors in
2007. Nowadays, monitors incorporate flat display technology. Plasma monitors are brighter than
both CRT and LCD and function by illuminating tiny charged gas bubbles, or plasma, in the screen.
3. Headphones
Mode: Sound
Function: Headphones output audio from a computer through two individual headphones for a
single listener. Also known as earphones, headphones allow you to listen to audio without
disrupting other people in the vicinity.
4. Computer Speakers
Mode: Sound
Function: Computer speakers are hardware devices that transform the signal from the computer's
sound card into audio. Speakers create sound using internal amplifiers that vibrate at different
frequencies according to data from the computer. This produces sound.
Function: GPS is a radio-based navigation system that’s composed of a sender computer and a
receiver. The sender broadcasts signals to 24 satellites that ping to the sender the exact location
of the sender computer in the form of latitude and longitude coordinates. The satellites use
microwave signals to “talk” to the GPS, giving information on location, vehicle speed, and a number
of other pieces of data.
Function: The sound card controls the output of sound signals, enabling devices like speakers and
headphones to work. The sound card is known as an expansion card, which means it can be added
to the motherboard. Although a sound card is not essential to a computer's basic functionality, you
need one if you wish to play games, watch movies, listen to music, and use audio and video
conferencing.
Function: As with the sound card, the video card is an expansion card that slots into the
motherboard. The video card processes images and video, enabling visuals to be seen on a display.
Most computers have basic video and graphics capabilities built into the computer's motherboard,
but for faster, more detailed graphics, a video card is required.
Function: A braille reader is a peripheral device that enables a blind person to read text displayed
on a computer monitor. The text is sent by the computer to the device, where it is translated into
a braille format and made readable by pushing rounded pins up through a flat surface. Braille
readers are also called braille displays and come in various sizes. Braille readers come in the form
of separate devices from a keyboard or as part of a keyboard. Most use piezoelectric technology,
or electricity generated by mechanical stress, to create a single line of text at a time in the form of
raised bumps.
Digital data storage devices have many uses. For example, computers usually depend upon
information storage to function. Storage media can also be used to back up important information
(storing digital data can involve durability and reliability issues, so making independent copies of
the information is normally a wise precaution). Some storage devices are also portable, meaning
that they can be used to transfer information from one computer to another.
Digital data storage media generally fall into one of five categories: magnetic storage devices,
optical storage devices, flash memory devices, online/cloud storage, and paper storage. I will give
one or more examples of each category below.
2. Floppy Disk
Also know as a diskette, floppy, or FD, the floppy disk is another type of storage medium that uses
magnetic storage technology to store information. Floppy disks were once a common storage
device for computers and lasted from the mid-1970's through to the start of the 21st century. The
earliest floppies were 8-inch (203 mm) in size, but these were replaced by 5 1⁄4-inch (133 mm)
disk drives, and finally a 3 1⁄2 inch (90 mm) version.
3. Tape
In the past, magnetic tape was often used for digital data storage, because of its low cost and ability
to store large amounts of data. The technology essentially consisted of a magnetically thin coated
piece of plastic wrapped around wheels. Its relative slowness and unreliability compared to other
data storage solutions has resulted in it now being largely abandoned as a media.
9. Cloud Storage
With users increasingly operating multiple devices in multiple places, many are turning to online
and cloud computing solutions. Cloud computing basically involves accessing services over a
network via a collection of remote servers. Although the idea of a "cloud of computers" may sound
abstract to those unfamiliar with this metaphorical concept, in practice it can provide tremendous
storage solutions for devices that are connected to the internet.
GENERATIONS OF COMPUTERS
SECOND GENERATION
• 1959 marked the invention of transistors
• Faster input-output devices were also developed
• IBM Competitors: Burroughs, UNIVAC, NCR, CDC, and Honeywell, collectively known as BUNCH
• 1963 marked the successful introduction to the market of minicomputers via Digital Equipment
Corporation’s PDP-8
FOURTH GENERATION
• 4004 chip the First Microprocessor introduce by Intel Corporation • A four bit processor with
2,200 transistors
• 1971 the fourth generation of computers.
• Altair 8800 1975 introduce computing to individuals and small companies
• 1981 IBM grab the lead in microcomputer industry through IBM PC (Personal Computer)
Chapter Quiz 1
Multiple Choice
1. High-speed electronic device with the capability to process entered data;
correspondingly, it produces some form of processing output.
a. Computer b. Machine c. Mobile Phone d. Laptop
2. Which of the following is not considered as Characteristics of computer system?
a. Electronic b. Correct it Self c. Storage capability d. Retrieval
Capability
3. Which of the following is considered as Characteristics of computer system?
a. Electronic b. Storage Capacity c. Programmable d. All of the above
4. All computers are able to store data intended for later use. This characteristic
makes them comparable to electronic filing cabinets.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
5. All computers are able to process data; that is, useful information can be gleaned
after the computer has performed the necessary operational instruction on the
raw data it is fed.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
6. All computers are able to follow a set of instructions, called a program, from which
a user may derive the specific that information he wants.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
7. Which of the following items below are considered as advantages of computer system?
Chapter Quiz 2
Identification (Acronyms)
Direction: Supply the exact name of the following acronyms below. Strictly No erasures!
1 CPU
2 ABS
2. Personal Computing
Small and medium-size businesses as well as individuals form the bulk of personal computing
practitioners. Personal computing means the use of stand-alone computers equipped with all the
system, utility, and application software and I/O devices that an individual needs to perform one
or more tasks.
4. Education
Although computers will never replace books and teachers, the can enhance learning in a way no
other medium can. Through its interactive capability, computers have added a new dimension to
the learning process.
5. Artificial Intelligence
Artificial intelligence is an area of computer research which aims to endow the computer with
certain forms of human intelligence such as the capability to understand natural language or to
reasons under uncertain condition.
1. Knowledge-based and expert system refers to man’s knowledge based on his judgment
algorithmic sense about a specific application area.
3. Hybrid Computers
• Combines the features of both analog and digital computers.
• Limited to a small number of engineering and scientific applications.
2. Special-purpose computers
• Use to perform specific functions, such as navigational control, thermal control in large
buildings, or control in large buildings. Or video games.
• Their functions are limited to the particular purposed for the they were created
SOFTWARE
• A program is a set of instructions that a computer follows in order to perform a specific
function.
• It is used to refer to programs written to control and direct hardware operations.
1. Application Software – is designed and written to perform a specific task for computer users.
• Enrollment System
• Transaction Processing System
• Point of Sale Systems
• Payroll System
• Inventory System
2. General-purpose software – provides the framework for a great number of business and
personal applications.
a. Word processor – permits users to enter, store, manipulate, and print text
• Microsoft Word
• WordStar
• Word Perfect
• Note Pad
• Word Pad
b. Spreadsheets – permits user to work with rows, and columns of a matrix (or spreadsheet) of
data.
• Excel
d. Desktop Publishing (DTP) – allows users to produce near typeset-quality copy from the
confines of a desktop.
• Publisher
• Photo Shop
• Print Artist
• Print Master
• News Master
e. Utility Software – are service routines that eliminate the need for users to writes a program
every time we need to perform certain computer operations.
• Norton Utilities
• Defragmenter
• Backup files
• Scandisk
• Formatting and Partitioning
f. Data Base Management System – is a type of software that allows user with a wide variety
of application needs to create, access modify and maintain databases.
• Access
• Visual FoxPro
• Visual FoxBase
• Dbase III+
• Dbase IV
3. System software – includes all programs designed to help control the computer system. This is
usually independent of any general-purpose software package or any specific application
area.
a. Operating System – is a set of control program that govern the operation of a computer.
• LINUX
• UNIX
• WINDOWS
• DOS
• Oracle
• Assembly Language
• Debug
• Visual Basic
• Visual C++
• Pascal
• Cobol
• Java
c. Translators – interprets, compilers and assemblers all have one objective to translate
instructions into machine readable command in order to allow the computer to execute the
instructions.
• Clipper
• C++ Compiler
• Data Base Compilers
• JAVA Compilers
• Visual Basic Compiler
4. Rogue Software - Software is any program that runs on the computer without the user’s
knowledge and consent. More often than not, it does damage to the user’s file.
Examples:
• Back Doors
• Chameleon
• Logic Bombs
• Trojan Horses
• ANSI Bombs
• Worm
Chapter Quiz 3
Identification.
Direction: Identify each item below and write WS for Word Processor; SS for Spreadsheet
Software; GS for Graphics Software; DP for Desktop Publishing; DB for Database System, and US
for Utility Software. Write your answer to the space provided before each number. Strictly NO
erasures!
http://14.139.186.108/jspui/bitstream/123456789/31552/1/Thinking%20Machine.pdf
Chapter 2:
Computer and Network Technology
Learning Objectives
Learning Contents
What is a Network?
Local Area Network (LAN)
Wide Area Network (WAN)
Local Area Network
Wide Area Network
Advantages of Installing a School Network
Disadvantages of Installing a School Network
Wired and Wireless connections
Types of Wireless Networks
Wireless Networking
Wireless Basic
What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or
a Wireless WAN (WWAN).
A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally
limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations. Servers are
generally not used by humans directly, but rather run continuously to provide "services" to the
other computers (and their human users) on the network. Services provided can include printing
and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval,
complete access control (security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which interacts with the
network through them. Workstations were traditionally considered a desktop, consisting of a
computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and
touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and
iPhone, our definition of workstation is quickly evolving to include those devices, because of their
ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are guided by needs.
For example, a group of servers might be located in a secure area, away from humans, and only
accessed through the network. In such cases, it would be common for the servers to operate
without a dedicated display or keyboard. However, the size and speed of the server's processor(s),
hard drive, and main memory might add dramatically to the cost of the system. On the other hand,
a workstation might not need as much storage or working memory, but might require an expensive
display to accommodate the needs of its user. Every computer on a network should be
appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access
to a wired network is made possible by wireless access points (WAPs). These WAP devices provide
a bridge between computers and networks. A typical WAP might have the theoretical capacity to
connect hundreds or even thousands of wireless users to a network, although practical capacity
might be far less.
Nearly always servers will be connected by cables to the network, because the cable connections
remain the fastest. Workstations which are stationary (desktops) are also usually connected by a
cable to the network, although the cost of wireless adapters has dropped to the point that, when
Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to
connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds,
without paying enormous phone bills. Two users a half-world apart with workstations equipped
with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses
multiplexers, bridges, and routers to connect local and metropolitan networks to global
communications networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
Connections.
Administrators, instructors, and even students and guests can be connected using the campus
network.
Services.
The school can provide services, such as registration, school directories, course schedules, access
to research, and email accounts, and many others. (Remember, network services are generally
provided by servers).
Internet.
The school can provide network users with access to the internet, via an internet gateway.
Computing resources.
Flexible Access.
School networks allow students to access their information from connected devices throughout
the school. Students can begin an assignment in their classroom, save part of it on a public access
area of the network, then go to the media center after school to finish their work. Students can
also work cooperatively through the network.
Workgroup Computing.
Collaborative software allows many users to work on a document or project concurrently. For
example, educators located at various schools within a county could simultaneously contribute
their ideas about new curriculum standards to the same document, spreadsheets, or website.
Expensive to Install.
Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges,
firewalls, wireless access points, and software can get expensive, and the installation would
certainly require the services of technicians. But, with the ease of setup of home networks, a simple
network with internet access can be setup for a small campus in an afternoon.
Although a network server is no more susceptible to failure than any other computer, when the
files server "goes down" the entire network may come to a halt. Good network design practices
say that critical network services (provided by servers) should be redundant on the network
whenever possible.
A wireless network enables people to communicate and access applications and information
without wires. This provides freedom of movement and the ability to extend applications to
different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people
to interact with email or browse the Internet from a location that they prefer.
Many types of wireless communication systems exist, but a distinguishing attribute of a wireless
network is that communication takes place between computer devices. These devices include
personal digital assistants (PDAs), laptops, personal computers (PCs), servers, and printers.
Computer devices have processors, memory, and a means of interfacing with a particular type of
network. Traditional cell phones don't fall within the definition of a computer device; however,
newer phones and even audio headsets are beginning to incorporate computing power and
network adapters. Eventually, most electronics will offer wireless network connections.
As with networks based on wire, or optical fiber, wireless networks convey information between
computer devices. The information can take the form of e-mail messages, web pages, database
records, streaming video or voice. In most cases, wireless networks transfer data, such as e-mail
messages and files, but advancements in the performance of wireless networks is enabling support
for video and voice communications as well.
Wireless Networking
Wireless networking is the new face of networking. Wireless networking have been around for
many years. Cell phones are also a type of wireless communication and are popular today for
people talking to each other worldwide.
Wireless networking are not only less expensive than more traditional wired networking but also
much easier to install. An important goal of this site is to provide you adequate knowledge for
installing a wireless network and get certified in wireless networks as well as.
Wireless Basic
Radio Frequency Transmission Factors
Radio frequencies (RF) are generated by antennas that propagate the waves into the air.
Antennas fall under two different categories:
• IEEE defines the mechanical process of how WLANs are implemented in the 802.11
standards so that vendors can create compatible products.
• The Wi-Fi Alliance basically certifies companies by ensuring that their products follow the
802.11 standards, thus allowing customers to buy WLAN products from different vendors
without having to be concerned about any compatibility issues.
Frequencies bands:
WLANs use three unlicensed bands:
• 900 MHz Used by older cordless phones
• 2.4 GHz Used by newer cordless phones, WLANs, Bluetooth, microwaves, and other
devices
• 5 GHz Used by the newest models of cordless phones and WLAN devices
• 900 MHz and 2.4 GHz frequencies are referred to as the Industrial, Scientific, and Medical
(ISM) bands.
• 5 GHz frequency the Unlicensed National Information Infrastructure (UNII) band.
• Unlicensed bands are still regulated by governments, which might define restrictions in
their usage.
A hertz (Hz) is a unit of frequency that measures the change in a state or cycle in a wave (sound
or radio) or alternating current (electricity) during 1 second.
OFDM (Orthogonal Frequency Division Multiplexing) increases data rates by using a spread
spectrum: modulation. 802.11a and 802.11g support this transmission method.
MIMO (Multiple Input Multiple Output) transmission, which uses DSSS and/or OFDM by spreading
its signal across 14 overlapping channels at 5 MHz intervals. 802.11n uses it. Use of 802.11n
requires multiple antennas.
WLAN Standards
Standards 802.11a 802.11b 802.11g 802.11n
Data Rate 54 11 Mbps 54 Mbps 248 Mbps (with 2×2
Mbps antennas)
Throughput 23 4.3 Mbps 19 Mbps 74 Mbps
Mbps
Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 and/or 5 GHz
Compatibility None With 802.11g and the original With 802.11a, b, and g
802.11 802.11b
Range (meters) 35–120 38–140 38–140 70–250
Number of 3 Up to 23 3 14
Channels
Transmission OFDM DSSS DSSS/OFDM MIMO
Chapter 3
Internet and the World Wide Web
Learning Objectives
Learning Contents
• The internet is the physical network of computers all over the world.
• The World Wide Web is a virtual network of web sites connected by hyperlinks (or
"links"). Web sites are stored on servers on the internet, so the World Wide Web is a part
of the internet.
HTML
The backbone of the World Wide Web is made of HTML files, which are specially-formatted
documents that can contain links, as well as images and other media. All web browsers can read
HTML files. In addition to HTML, it's also very common for websites to use technologies like CSS
(Cascading Style Sheets) and JavaScript to do more advanced things.
The World Wide Web was created in 1989 by Tim Berners-Lee, a software engineer. Before
then, computers could communicate over the internet, but there were no web pages.
The abbreviation “www” stands for World Wide Web. Many people think the World Wide
Web is the same thing as the Internet. It isn’t. While the Internet is a large connection of
networks (hardware), the World Wide Web is a way to access the information on the
Internet. It’s like the software you need to run programs on the hardware of your
computer. So, the Internet is broader than the World Wide Web.
The Web uses common communication protocols (sets of rules) and special languages.
One of these is called HyperText Markup Language (HTML). These special languages act
as a bridge, allowing computers to communicate that don’t use compatible operating
systems. This means that you don’t have to use a specific type of computer in order to
access a website. Besides the Web, there are other ways to disseminate information, such
as email, File Transfer Protocol (FTP), and Telnet.
o Broadband: Broadband is a high-speed connection method which can utilize cable, DSL,
or satellite. Each of these methods requires different types of hardware.
Internet Service Provider (ISP): Internet Service Providers are companies that connect you to the
Internet – for a fee, of course. ISPs are available on a local, state, and national level. Large
communication companies control access to the main lines of the Internet structure. They, in turn,
supply Internet access to the smaller ISPs, who pass this along to the consumer. Not all ISPs offer
all methods of connection to the Internet. Make sure the ISP you select offers service that
corresponds to your connection method and hardware.
Web Browser: You’ll need to have a web browser installed on your computer. This is a software
program that allows you to view web pages and navigate the Internet. Microsoft’s Internet
Explorer is probably the most commonly used web browser. It often comes pre-installed when you
purchase a computer that has a Microsoft Windows operating system. There are other free web
browsers available, including Mozilla’s very popular Firefox web browser and Apple’s Safari. You
can have more than one browser installed on your computer.
A homepage is the first or front page of a website. If you were to type “www.indianhills.edu” into
your web browser, the first web page that came up would be the website’s homepage. For
example: The Indian Hills website contains many web pages, including the homepage.
Protocol: A protocol is a set of rules, used to retrieve a specific document. The “http” in our URL
refers to HyperText Transfer Protocol. The “http” is followed by a colon and two forward slashes,
then “www,” which refers to the World Wide Web.
Domain Name: The domain name consists of two parts. In our example, “indianhills.edu” is the
domain name. where “indianhills” is the host and “.edu” is the top-level domain. This suffix
indicates the type of organization to which the host belongs. As you can probably guess, “.edu”
indicates that the host, “indianhills,” is an educational institution.
Directory/Page: The next part of the URL tells the web browser where to find the specific web
page on the website. In our example, the “/bookstore/” tells us that the web page we are looking
for lives in the directory/folder entitled “bookstore.” The next part, “index.html,” is the name of
the actual web page. The “.html” refers to the programming language used to create the page (in
this case, HyperText Markup Language or HTML).
A Search Engine is a website that searches the World Wide Web for specific keywords, which you
enter into a search field. The search engine then displays a list of web pages that are somehow
related to the keywords you entered. You can then click the links to any of these web pages that
interest you. Search results are not perfect. You may be looking for a specific website that does
not appear right away. Most search engines have advanced options that allow you to narrow your
search. For example, you may want to find information about jaguars (the animal not the
automobile). If so, you could use the advanced features of your chosen search engine to exclude
search results that include the words “car” and “automobile.” Each search engine does this
differently. So, you will have to explore the website of your selected search engine for more.
Google (www.google.com) and Yahoo! (www.yahoo.com) are two popular search engines.
A Subject Directory is a listing of websites organized by topic. As mentioned earlier, not every web
page that comes up in your search results may have the most relevant or the most reliable
information related to your topic. Subject directories are usually more selective in what they
include than are search engines. To use a subject directory, select a main subject from the
directory, which then displays subdirectories or folders. Continue to drill down, narrowing your
Internet Communication
• Email is an extremely popular means of communication. In fact, it has become so integrated
with the flow of our work and personal lives that it may be difficult to remember a time
when we could not communicate this way. However, there are also many other ways to
communicate via the Internet. We’re going to describe some of them, now, but we
encourage you to find out more about each of these options on your own and consider
how they might be useful to you.
o Instant Messaging (IM) and Chat Rooms: These tools allow you to communicate
with others who are online at the same time as you. The key difference between
this and email is that with email there is a delay, as you wait for the other person
to receive the email, read it, and reply, whenever they are next online, while with
Instant Messaging or Chat Rooms, all participants are online at the same time,
interacting “live. Podcasts: Podcasts are audio or video recordings available for
download from the Internet. TV shows, newscasts, and instructor lectures are
some examples of content that can be delivered via a podcast. While some audio
and video recordings are streamed over the Internet, meaning you watch them in
your web browser, podcasts are different in that they are downloaded for offline
listening or viewing.
o Podcasts can also be subscribed to via RSS feeds. An RSS feed allows your
computer to automatically download a new podcast whenever it is created,
without your having to visit its website directly.
o Blogs: A blog (short for “web log”) is a public journal posted on the Internet. The
word blog can be used as both a noun and a verb. You may have a personal blog
or you may blog about your career field. People blog about a wide variety of topics.
If you have a hobby or topic which you enjoy, you can probably find any number
of blogs related to the subject. One distinguishing characteristic of blogs is that
they usually allow readers to post comments responding to the original blogger’s
post. In this way, large interactive communities can develop around popular blogs.
o Voice over Internet Protocol (“Voice over IP” or “VoIP”): This is a voice-based
Internet communication solution that uses a standard Internet connection to
place phone calls. Skype is an example of a software program that allows you to
place calls over the Internet. Skype users can call one another over the Internet
for free, while calls from Skype to traditional landline phones may be made for a
fee.
o Do not reply to spam emails, even just to request that they remove you from their
mailing list. Doing so confirms to the spammer that your email address is valid and
ensures they will continue to use it and, likely, sell it to other spammers, resulting
in more spam. Identity Theft and Online Predators: Providing too much personal
information on social networking sites, in chat rooms, or in emails can cause you
problems. Some criminals collect personal information and use it to “steal” a
person’s identity, accessing their bank accounts, setting up credit card accounts,
and worse. Identity theft can have devastating results. Also, dangerous online
predators are known to seek the “real world” addresses of people they encounter
online, which can lead to physical assaults. Further, homes have been robbed
simply because someone shared on a social networking site that they would be
gone on vacation during a specific time. Be wise about what you share online.
• Phishing is another way criminals can attempt to get your personal information. Phishers
send spam emails that appear to be from legitimate companies, such as banks, online
stores, and the like. They usually ask you to verify your account information, such as your
user name, password, social security number, credit card number, or other items. If you
receive such emails, do not reply. No legitimate bank or store will ever ask you to supply
your account information over email. Remember, the legitimate company would already
have your information. Beware of web pages that look like well-known online companies,
as well. This is another way phishers can trick unsuspecting web surfers. Be sure the URL
is correct, before you attempt to log into your online accounts.
• Shopping Online: Before you enter personal information on a website, be sure the site is
secure. Look at the URL in your web browser’s address bar. You should see “https” at the
beginning of the URL. The “s” refers to “secure.” Secure pages make it more difficult for
hackers to intercept your information as it is submitted to the website.
Link: http://www.just.edu.jo/~mqais/cis99/PDF/Internet.pdf
Chapter 4
Information, Control, and Privacy
Learning Objectives
Learning Contents
1. RESPONSIBILITY
This means that you accept the potential costs, duties and obligations for the decisions
you make.
2. ACCOUNTABILITY
It means mechanisms are in place for identifying who took responsible actions and who
are the responsible parties.
3. LIABILITY
Liability is a feature of the political systems in which a body of laws permits individuals and
firms to recover damages to them by other actors, systems or organizations.
E-Commerce Law
R.A. 8792 "An Act Providing For The Recognition And Use of Electronic Commercial And
Non-Commercial Transactions, Penalties For Unlawful Use Thereof, And Other Purposes,
also known as the "Electronic Commerce Act."
The State recognizes the vital role of information and communications technology
(ICT) in nation-building; the need to create an information-friendly environment which
supports and ensures the availability, diversity and affordability of ICT products and
services; the primary responsibility of the private sector in contributing investments and
services in telecommunications and information technology; the need to develop, with
appropriate training programs and institutional policy changes, human resources for the
information technology age, a labor force skilled in the use of ICT and a population capable
of operating and utilizing electronic appliances and computers; its obligation to facilitate
the transfer and promotion of technology; to ensure network security, connectivity and
neutrality of technology for the national benefit; and the need to marshal, organize and
deploy national information infrastructures, comprising in both telecommunications
network and strategic information services, including their interconnection to the global
information networks, with the necessary and appropriate legal, financial, diplomatic and
technical framework, systems and facilities.
The most widely used information security frameworks and standards include:
• The National Institute of Standards and Technology (NIST) Special Publication 800-53,
Security and Privacy Controls for Federal Information Systems and Organizations
• The International Organization for Standardization (ISO) standard ISO 27001,
Information Security Management
• The Payment Card Industry Data Security Standard (PCI DSS)
• The Health Insurance Portability and Accountability Act (HIPAA)
A wide body of federal and state laws protects creative property such as writing, music,
drawings, paintings, photography, and films. Collectively, this body of law is called “intellectual
property” law, which includes copyright, trademark, and patent laws, each applicable in various
situations and each with its own set of technical rules. When obtaining permission to use creative
works, you’re concerned primarily with copyright law. However, trademarks, trade secrets, and
publicity and privacy rights sometimes come into play when permission to use certain types of
works is sought.
Below is a summary of the various types of intellectual property laws that are relevant to
the permissions process:
• Copyright. Federal copyright law protects original creative works such as paintings,
writing, architecture, movies, software, photos, dance, and music. A work must meet
You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen
subscription credentials, hacked Netflix accounts and software that helps you break into other
people’s computers. Buy login credentials to a $50,000 Bank of America account for $500. Get
$3,000 in counterfeit $20 bills for $600. Buy seven prepaid debit cards, each with a $2,500
balance, for $500 (express shipping included). A “lifetime” Netflix premium account goes for $6.
You can hire hackers to attack computers for you. You can buy usernames and passwords.
The dark web is a subset of the deep web that is intentionally hidden, requiring a specific
browser—Tor—to access, as explained below. No one really knows the size of the dark web, but
most estimates put it at around 5% of the total internet. Again, not all the dark web is used for
illicit purposes despite its ominous-sounding name.
Chapter 5
IT, Culture, and the Society, the Internet of Things
Learning Objectives
Learning Contents
An Industry automation
Industrial Revolution 4.0
The influence of IT on culture and social behavior
Netiquette and code of conduct for IT professionals
The negative practices in social media such as cyberbullying
Case studies
The above figure shows the power plant automation provided by Siemens for
achieving sustainable, safe and economic operations. It provides the total integrated
automation (TIA) by automating every section of power plant with efficient control
devices, field sensors and actuating devices. In this automation, SIMATIC modules (PLCs)
are used as control devices while WinCC provides an effective graphical interface.
To increase productivity
Automation of factory or manufacturing or process plant improves production rate
through a better control of production. It helps to produce mass production by drastically
reducing assembly time per product with a greater production quality. Therefore, for a
given labor input it produces a large amount of output.
Field Level
It is the lowest level of the automation hierarchy which includes the field devices
like sensors and actuators. The main task of these field devices is to transfer the data of
processes and machines to the next higher level for monitoring and analysis. And also it
includes the controlling of process parameter through actuators. For instance, we can
describe this level as eyes and arms of a particular process.
Sensors convert the real time parameters like temperature, pressure, flow, level, etc. into
electrical signals. This sensor data further transferred to the controller so as to monitor
and analyze the real time parameters. Some of the sensors include thermocouple,
proximity sensors, RTDs, flow meters, etc.
On other hand actuators converts the electrical signals (from the controllers) into
mechanical means to control the processes. Flow control valves, solenoid valves,
pneumatic actuators, relays, DC motors and servo motors are the examples of actuators.
Control Level
This level consists of various automation devices like CNC machines, PLCs, etc.,
which acquires the process parameters from various sensors. The automatic controllers
drive the actuators based on the processed sensor signals and program or control
technique.
Programmable Logic Controllers (PLCs) are most widely used robust industrial controllers
which are capable of delivering automatic control functions based on input from sensors.
It consists of various modules like CPU, analog I/O, digital I/O and communication modules.
Mostly, either Distribution Control System (DCS) or Supervisory Control and Data Acquisition
(SCADA) HMIs are popularly used in this level.
From the above hierarchy we can conclude that there is continuous information
flow from high level to low level and vice-versa. If we assume this graphical way, it is like a
pyramid in which as we go up, the information gets aggregated and while going down, we
get detailed information about the process.ut it produces a large amount of output.
Some of these automated systems are distilled process, paint shops and conveyors.
2. Programmable Automation
In this automation, a specific class of product changes and also assembling or
processing operations can be changed with the modification of control program in the
automated equipment.
This automation is best suited for batch production process where product volume
is medium to high. But in this, it is hard to change and reconfigure the system for a new
product or sequence of operations. Therefore, new product or reconfigure of sequence of
operations requires a long setup.
Some of the examples of this automation system are automatic guided vehicles,
automobiles, and multipurpose CNC machines.
Industry 4.0 is used interchangeably with the fourth industrial revolution and
represents a new stage in the organization and control of the industrial value chain.
Cyber-physical systems form the basis of Industry 4.0 (e.g., ‘smart machines’). They
use modern control systems, have embedded software systems and dispose of an Internet
address to connect and be addressed via IoT (the Internet of Things). This way, products
and means of production get networked and can ‘communicate’, enabling new ways of
production, value creation, and real-time optimization. Cyber-physical systems create the
capabilities needed for smart factories. These are the same capabilities we know from the
Industrial Internet of Things like remote monitoring or track and trace, to mention two.
Industry 4.0 is often used interchangeably with the notion of the fourth industrial
revolution. It is characterized by, among others:
• Even more automation than in the third industrial revolution,
• The bridging of the physical and digital world through cyber-physical systems,
enabled by Industrial IoT,
• A shift from a central industrial control system to one where smart products
define the production steps,
• Closed-loop data models and control systems and
Optimize logistics and supply chains: A connected supply chain can adjust and
accommodate when new information is presented. If a weather delay ties up a shipment,
a connected system can proactively adjust to that reality and modify manufacturing
priorities.
Autonomous equipment and vehicles: There are shipping yards that are leveraging
autonomous cranes and trucks to streamline operations as they accept shipping containers
from the ships.
Robots: Once only possible for large enterprises with equally large budgets,
robotics are now more affordable and available to organizations of every size. From picking
products at a warehouse to getting them ready to ship, autonomous robots can quickly
and safely support manufacturers. Robots move goods around Amazon warehouses and
also reduce costs and allow better use of floor space for the online retailer.
Internet of Things and the cloud: A key component of Industry 4.0 is the Internet of Things
that is characterized by connected devices. Not only does this help internal operations, but
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. This includes
several aspects of the Internet, such as email, social media, online chat, web forums,
website comments, multiplayer gaming, and other types of online communication.
While there is no official list of netiquette rules or guidelines, the general idea is to
respect others online. Below are ten examples of rules to follow for good netiquette:
The Internet provides a sense of anonymity since you often do not see or hear the
people with whom you are communicating online. But that is not an excuse for having poor
manners or posting incendiary comments. While some users may feel like they can hide
behind their keyboard or smartphone when posting online, the fact is they are still the
ones publishing the content. Remember – if you post offensive remarks online and the veil
of anonymity is lifted, you will have to answer for the comments you made.
In summary, good netiquette benefits both you and others on the Internet. Posting
a positive comment rather than a negative one just might make someone's day.
Chapter 6
IT Trends, Issues, and Challenges
Learning Objectives
Learning Contents
IT and the issued and challenges surrounding its application in various fields such as
Banking, Education, health, and business, among others.
Initially, the size of the computer was large as room size, but simultaneously it turns to smaller as
an embedded computer.
A computer controls other devices automatically like micro ovens, Industrial Robots, children’s
toys, digital cameras, and other devices.
A modern computer is based on integrated Circuits technology and stores data and records.
Therefore, it is distinguished from other calculating devices like a calculator.
Infect computer is used in a wide range in every field. Let us discuss the importance/uses of
computer and, how it can work better for us?
• One of the most importance of computer is to keep a record of blood groups of the persons
and their contact numbers on the computer.
The internet is also playing a vital role in the health department. We can send and receive
patient reports in a short time.
• Storing of data is very important in hospitality because the computer is used to keep the staff,
patients, medicines and budget record.
• A doctor diagnoses various types of hazardous diseases, e.g. heart diseases, eye and sight
defects, kidney stone, etc. by the help of special types of software and computerized
diagnostic tools such as ECG, Ultrasounds, MRI, and CT scan. Corrective solution and medicine
arrange to the patients accordingly. Doctors use the computer to keep the patient’s record,
e.g. symptom of the patients and their treatment record can help the doctor in research.
• A gynecologist can trace the position and condition of the newborn child.
• Now it is the time of information technology. Anyone, who wants to do a job in the office, he
may familiar with a computer and its software. It allows us to quickly respond to the services.
Therefore, we may use an internet connection which plays a crucial role in this regard. Any
office can move and share their essential documents through email immediately without loss
• ATM (Automatic Teller Machine) is used in bank to withdrawal amount any time. This all could
be controlled by the computer. This machine helped the clients and avoided them from long
queues.
• Internet banking provides online facility to the clients to get full information about its account.
A client can transfer the amount to another account and pay their bills online. Customer can
also check all transactions of account.
Bank cheques have special characters and numbers of magnetized ink reads by MICR and data
send to the computer. MICR checks the validity and accuracy of the cheques.
• CCT’s cameras are installed in the bank, which captures and stores potages of the bank
circumstances. These cameras are controlled by the computer which helps security agencies
to identify criminal persons.
• All manufacturing process can also be monitored and controlled by a computer, e.g. computer
shows and control temperature of the manufacturing process. Some industries use robots (a
programmable machine which automatically handles hard tasks) where human access is not
possible.
• A computer is also used for administrative purpose of the industry. Keeping of employee’s
data, appointments, salaries, pensions, etc. all are prepared by a computer.
• Auto CAD (automatic computer aided design) is the computer software which is used by the
engineers, designers, and architectures for designing of vehicles, mapping of buildings, roads,
bridges, and industries, etc.
• Engineers draw the sketch of each point of the object. We can define a complete sample of
the object with the help of a 3D image by the help of Auto CAD.
• By using this software you can better understand the project, data consistency, and make
responsive edition.
• All activities of the market are controlled by the computer that identified the current status
of the market.
Now the online business is growing. There are online stores available on the internet. We can
quote order for any product, and the company ships their products at the home address. Most
of the companies are selling their digital products online, e.g. computer software, video
tutorials, ebooks, etc. these companies are doing very successful business.
• It is the time of social media where we give advertisement regarding our online and offline
business products.
• The market is an organization or place where different types of goods, items are lying to sell
or buy it and the process is known as Marketing. Each product has own UPC (Universal Product
Code) in the form of black and white strips. These bar codes are read by (BRC) Bar Code Reader
device and data is direct goes to the computer.
A computer is also used to control space flight, its communication and to keep a constant check on all
the equipment. When a fault occurs, the computer is used to find out the cause and eliminate the
fault. The computer also plays a great role in the launching of the satellite and controls all the system.
A computer is a good communicating and networking machine. All other communication devices like,
telephone, mobile, television and radio are also controlled by the computer. Now all information is
exchanged through a computer. A computer can work as a telephone and mobile and we can make
and receive calls and messages through a computer.
A student can make their research, reading books, viewing tutorials videos, etc. Students can also
prepare their own academic notes. Online dictionaries are also available and it is very useful to
increase vocabulary.
We can run own online business from home, e.g. blogging, freelancing, digital marketing, and store,
etc.
A computer is also a toy of entertainments and we can use a computer at home for playing games,
drawing pictures, playing music, viewing movies and dramas, etc. Uses/Importance of Computer for
Online Earning:
Online earning has now become a trend where the computer takes place like a root tool. Most
businesses are now converting to online business. Computer Professional is earning hundreds &
thousand dollars online from blogging, freelancing, create tutorials, writing ebooks, etc.
References: