1ST Sem 21 22 IM Living in The IT Era

Download as pdf or txt
Download as pdf or txt
You are on page 1of 63

Living in the
Information Technology Era

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 1


Chapter 1
Introduction to Information and Communication Technology

Learning Objectives

At the end of this chapter the students should be able to:


1. Define and explain IT and ICT
2. Explain the concepts of ICT
3. Identify parts of the computer systems and their functions
4. Differentiate categories of computer peripherals
5. Explain why computers are considered powerful thinking machines

Learning Contents

 Concepts of ICT and IT


 What is Information Technology?
 What is Information and Communication Technology?
The Computer System and its Parts and Categories
What is a Computer System?
 Input Devices
 Output Devices
 Digital Data Storage Generations of Computers
- First Generation of Computers
- Second Generation
- Third Generation of Computers
- Fourth generation
 Uses of Computers In Modern Times
 Types of Computers According to Size Types of
Computer According to Data Handled What is Software?
 Software Classifications

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 2



Concepts of ICT and IT
What is Information Technology?

Information technology (IT) is the use of computers to store, retrieve, transmit, and
manipulate data or information. IT is typically used within the context of business operations as
opposed to personal or entertainment technologies. IT is considered to be a subset of information
and communications technology (ICT). An information technology system (IT system) is generally
an information system, a communications system or, more specifically speaking, a computer
system – including all hardware, software and peripheral equipment – operated by a limited
group of users.

Humans have been storing, retrieving, manipulating, and communicating information


since the Sumerians in Mesopotamia developed writing in about 3000 BC, but the term information
technology in its modern sense first appeared in a 1958 article published in the Harvard Business
Review; authors Harold J. Leavitt and Thomas L. Whisler commented that "the new technology
does not yet have a single established name. We shall call it information technology (IT)." Their
definition consists of three categories: techniques for processing, the application of statistical and
mathematical methods to decision-making, and the simulation of higher-order thinking through
computer programs.

The term is commonly used as a synonym for computers and computer networks, but it
also encompasses other information distribution technologies such as television and telephones.
Several products or services within an economy are associated with information technology,
including computer hardware, software, electronics, semiconductors, internet, telecom
equipment, and ecommerce.[5][a]

Based on the storage and processing technologies employed, it is possible to distinguish


four distinct phases of IT development: pre-mechanical (3000 BC – 1450 AD), mechanical (1450–
1840), electromechanical (1840–1940), and electronic (1940–present).[3] This article focuses on
the most recent period (electronic).

What is Information and Communication Technology?


Information and communications technology (ICT) is an extensional term for information
technology (IT) that stresses the role of unified communications and the integration of
telecommunications (telephone lines and wireless signals) and computers, as well as necessary
enterprise software, middleware, storage, and audiovisual systems, that enable users to access,
store, transmit, and manipulate information.

The term ICT is also used to refer to the convergence of audiovisual and telephone
networks with computer networks through a single cabling or link system. There are large
economic incentives to merge the telephone network with the computer network system using a

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 3



single unified system of cabling, signal distribution, and management. ICT is an umbrella term that
includes any communication device, encompassing radio, television, cell phones, computer and
network hardware, satellite systems and so on, as well as the various services and appliance with
them such as video conferencing and distance learning. [citation needed]

ICT is a broad subject and the concepts are evolving. It covers any product that will store,
retrieve, manipulate, transmit, or receive information electronically in a digital form (e.g., personal
computers, digital television, email, or robots). Theoretical differences between interpersonal
communication technologies and mass-communication technologies have been identified by the
philosopher Piyush Mathur. Skills Framework for the Information Age is one of many models for
describing and managing competencies for ICT professionals for the 21st century.

The Computer System and its Parts and Categories

What is a Computer System?


A computer is a machine that can be instructed to carry out sequences of arithmetic or
logical operations automatically via computer programming. Modern computers have the ability
to follow generalized sets of operations, called programs. These programs enable computers to
perform an extremely wide range of tasks. A "complete" computer including the hardware, the
operating system (main software), and peripheral equipment required and used for "full"
operation can be referred to as a computer system. This term may as well be used for a group of
computers that are connected and work together, in particular a computer network or computer
cluster.

Computers are used as control systems for a wide variety of industrial and consumer
devices. This includes simple special purpose devices like microwave ovens and remote controls,
factory devices such as industrial robots and computer-aided design, and also general purpose
devices like personal computers and mobile devices such as smartphones. The Internet is run on
computers and it connects hundreds of millions of other computers and their users.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 4


Early computers were only conceived as calculating devices. Since ancient times, simple
manual devices like the abacus aided people in doing calculations. Early in the Industrial Revolution,
some mechanical devices were built to automate long tedious tasks, such as guiding patterns for
looms. More sophisticated electrical machines did specialized analog calculations in the early 20th
century. The first digital electronic calculating machines were developed during World War II. The first
semiconductor transistors in the late 1940s were followed by the silicon-based MOSFET (MOS
transistor) and monolithic integrated circuit (IC) chip technologies in the late 1950s, leading to the
microprocessor and the microcomputer revolution in the 1970s. The speed, power and versatility of
computers have been increasing dramatically ever since then, with MOS transistor counts increasing
at a rapid pace (as predicted by Moore's law), leading to the Digital Revolution during the late 20th to
early 21st centuries.

Conventionally, a modern computer consists of at least one processing element, typically


a central processing unit (CPU) in the form of a metal-oxide-semiconductor (MOS) microprocessor,
along with some type of computer memory, typically MOS semiconductor memory chips. The
processing element carries out arithmetic and logical operations, and a sequencing and control
unit can change the order of operations in response to stored information. Peripheral devices
include input devices (keyboards, mice, joystick, etc.), output devices (monitor screens, printers,
etc.), and input/output devices that perform both functions (e.g., the 2000s-era touchscreen).
Peripheral devices allow information to be retrieved from an external source and they enable the
result of operations to be saved and retrieved.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 5



Input Devices
An input device is essentially a piece of hardware that sends data to a computer. Most
input devices either interact with or control the computer in some way. The most common input
devices are the mouse and the keyboard, but there are many others. The key distinction between
an input device and an output device is that the former sends data to the computer, whereas the
latter receives data from the computer. Input and output devices that provide computers with
additional functionality are also called peripheral or auxiliary devices.

1. Keyboard
Keyboards are the most common type of input device. Before keyboards, interaction with
computers was generally carried out using punch cards and paper tape. Most English language
keyboards use the QWERTY layout for the alphabetic keys, which are surrounded by number,
symbol, function, and other key types. By pressing the relevant keys, a user can feed data and
instructions to the computer.

2. Mouse
A mouse interacts with a computer through a process known as "point and click." Essentially, when
a user moves the mouse on the mouse pad, the pointer moves in a corresponding direction on the
computer's monitor screen. The concept of a computer mouse has its roots in the trackball, a
related pointing device invented in 1946 that used a "roller ball" to control a pointer. Most modern
computer mice have two buttons for clicking and a wheel in the middle for scrolling up and down
documents and web pages.

3. Touchpad
Also known as a trackpad, a touchpad is a common substitute for a computer mouse. It is
essentially a specialized surface that can detect the movement of a user's finger and use that

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 6



information to direct a pointer and control a computer. Touchpads were first introduced for
laptops in the 1990s, and it's now rare to find a laptop without one.

4. Scanner
The word "scanner" can be used in a number of different ways in the computer world, but here I
am using it to refer to a desktop image scanner. Essentially, a scanner is an input device that uses
optical technology to transfer images (or sometimes text) into a computer, where the signal is
converted into a digital image. The digital image can then be viewed on a monitor screen, saved,
edited, emailed, or printed.

5. Digital Camera
Digital cameras are used to capture photographs and videos independently. Later, these photo and
video files can be transferred to a computer by connecting the camera directly with a cable,
removing the memory card and slotting it into the computer, or through wireless data transfer
methods such as Bluetooth. Once the photos are on the computer, they can be saved, edited,
emailed, or printed.

6. Microphone
A microphone captures audio and sends it to a computer where it is converted to a digital format.
Once the audio has been digitized, it can be played back, copied, edited, uploaded, or emailed.
Microphones can also be used to record audio or to relay sounds live as part of a video chat or
audio stream.

7. Joystick
Joysticks are commonly used to control characters and vehicles in computer video games.
Essentially, a joystick is a handle that pivots on a base and sends its angle or direction to the
computer as data. Many video gaming joysticks feature triggers and buttons that can be pressed
to use weapons or projectiles in games.

8. Graphic Tablet
Also known as digitizers, graphic tablets are input devices used for converting hand-drawn artwork
into digital images. The user draws with a stylus on a special flat surface as if they were drawing
on a piece of paper. The drawing appears on the computer screen and can be saved, edited, or
printed. While scanners can only create digital images from drawings, graphic tablets offer greater
control and versatility for artists by allowing them to see their drawing appear live on their monitor
as they create it.

9. Touch Screen
Many devices nowadays use a touch screen rather than a mouse as a way for users to point, drag,
or select options on a screen. As the name suggests, a touch screen is a touch-sensitive monitor
screen that reacts to fingers moving across it. Touch screens are particularly common in portable
devices, such as tablets, palmtops, laptops, and smartphones.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 7



10. Webcam
Webcams are different from digital cameras in two ways. Firstly, they cannot operate
independently from a computer, and second, they have no inbuilt memory. Although webcams
can capture photographs and videos, they are more often used to live-stream videos or facilitate
video chats.

Output Devices

What Is an Output Device?


An output device is a piece of computer hardware that receives data from a computer and then
translates that data into another form. That form may be audio, visual, textual, or hard copy such
as a printed document.

The key distinction between an input device and an output device is that an input device sends
data to the computer, whereas an output device receives data from the computer.

For example, using a microphone to record a podcast is an example of using an input device.
Listening to the recorded podcast through a connected speaker is an example of using an output
device. Both output and input devices are examples of auxiliary or peripheral devices.

Analyzing the Functionality of a Device


There are four different categories of output device: visual, data, print, and sound. Each output
device example has a specific history, so here I cover specifically how each device works, when it

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 8



became a part of technology history, popular brands on the market selling the device, and a fun
fact.

1. Monitor Mode: Visual


Function: A monitor consists of a screen, circuitry, a power supply, buttons to adjust screen
settings, and a casing that contains all of these components. A monitor displays data from a
computer onto a screen so the user can interact with the data via a digital interface.

Popular Brands: Acer, Alienware, Apple, Asus, Dell, HP, LG, Lenovo, Samsung

Origin Story: The first monitors used the same technology as early televisions, relying on a
cathode ray tube and a fluorescent screen. This technology was first utilized for computer monitors
in 1965 in the Uniscope 300 machine, which had a built-in CRT display. CRT display lights up a series
of dots with a beam on an active part of the screen. This resulted in a maximum resolution of 1600
by 1200 pixels. LCD (liquid crystal display) entered the market in 2000 and outsold CRT monitors in
2007. Nowadays, monitors incorporate flat display technology. Plasma monitors are brighter than
both CRT and LCD and function by illuminating tiny charged gas bubbles, or plasma, in the screen.

2. Printer Mode: Print


Function: The function of a printer is to create a copy of whatever is sent from the computer to the
printer. Printers take electronic data sent from a computer and generate a hard copy.

Popular Brands: Brother, Canon, Epson

3. Headphones
Mode: Sound

Function: Headphones output audio from a computer through two individual headphones for a
single listener. Also known as earphones, headphones allow you to listen to audio without
disrupting other people in the vicinity.

Popular Brands: Sennheiser, JBL, Bose, Sony, Skullcandy

4. Computer Speakers
Mode: Sound

Function: Computer speakers are hardware devices that transform the signal from the computer's
sound card into audio. Speakers create sound using internal amplifiers that vibrate at different
frequencies according to data from the computer. This produces sound.

5. Projector Mode: Visual

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 9



Function: As its name suggests, this output device "projects" computer images or video onto a wall
or screen.

6. GPS (Global Positioning System) Mode: Data

Function: GPS is a radio-based navigation system that’s composed of a sender computer and a
receiver. The sender broadcasts signals to 24 satellites that ping to the sender the exact location
of the sender computer in the form of latitude and longitude coordinates. The satellites use
microwave signals to “talk” to the GPS, giving information on location, vehicle speed, and a number
of other pieces of data.

7. Sound Card Mode: Sound

Function: The sound card controls the output of sound signals, enabling devices like speakers and
headphones to work. The sound card is known as an expansion card, which means it can be added
to the motherboard. Although a sound card is not essential to a computer's basic functionality, you
need one if you wish to play games, watch movies, listen to music, and use audio and video
conferencing.

Popular Brands: Audigy, ASUS, Creative, EVGA

8. Video Card Mode: Visual

Function: As with the sound card, the video card is an expansion card that slots into the
motherboard. The video card processes images and video, enabling visuals to be seen on a display.
Most computers have basic video and graphics capabilities built into the computer's motherboard,
but for faster, more detailed graphics, a video card is required.

Popular Brands: NIVIDIA, ASUS, MSI, EVGA

9. Braille Reader Mode: Print

Function: A braille reader is a peripheral device that enables a blind person to read text displayed
on a computer monitor. The text is sent by the computer to the device, where it is translated into
a braille format and made readable by pushing rounded pins up through a flat surface. Braille
readers are also called braille displays and come in various sizes. Braille readers come in the form
of separate devices from a keyboard or as part of a keyboard. Most use piezoelectric technology,
or electricity generated by mechanical stress, to create a single line of text at a time in the form of
raised bumps.

10. Speech-Generating Device (SGD) Mode: Sound

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 10



Function: SGDs, also known as voice output communication aids, generate text to speech. A user
types something and when the command is sent, the SGD reads the sentence out loud.

What is Digital Data Storage?


Digital data storage is essentially the recording of digital information in a storage medium,
typically by electronic means. The storage device usually enables a user to store large amounts of
data in a relatively small physical space, and makes sharing that information with others easy. The
device may be capable of holding the data either temporarily or permanently.

Digital data storage devices have many uses. For example, computers usually depend upon
information storage to function. Storage media can also be used to back up important information
(storing digital data can involve durability and reliability issues, so making independent copies of
the information is normally a wise precaution). Some storage devices are also portable, meaning
that they can be used to transfer information from one computer to another.

Digital data storage media generally fall into one of five categories: magnetic storage devices,
optical storage devices, flash memory devices, online/cloud storage, and paper storage. I will give
one or more examples of each category below.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 11



1. Hard Disk Drive
A hard disk drive (also known as a hard drive, HD, or HDD) can be found installed in almost every
desktop computer and laptop. It stores files for the operating system and software programs, as
well as user documents, such as photographs, text files, and audio. The hard drive uses magnetic
storage to record and retrieve digital information to and from one or more fast-spinning disks.

2. Floppy Disk
Also know as a diskette, floppy, or FD, the floppy disk is another type of storage medium that uses
magnetic storage technology to store information. Floppy disks were once a common storage
device for computers and lasted from the mid-1970's through to the start of the 21st century. The
earliest floppies were 8-inch (203 mm) in size, but these were replaced by 5 1⁄4-inch (133 mm)
disk drives, and finally a 3 1⁄2 inch (90 mm) version.

3. Tape
In the past, magnetic tape was often used for digital data storage, because of its low cost and ability
to store large amounts of data. The technology essentially consisted of a magnetically thin coated
piece of plastic wrapped around wheels. Its relative slowness and unreliability compared to other
data storage solutions has resulted in it now being largely abandoned as a media.

4. Compact Disc (CD)


The compact disc, known for short as a CD, is a form of optical storage, a technology which employs
lasers and lights to read and write data. Initially compact discs were used purely for music audio,
but in the late 1980's they began to be also used for computer data storage. Initially, the compact
discs that were introduced were CD-ROM's (read only), but this was followed by CD-R's (writable
compact discs) and CD-RW's (re-writable compact discs).

5. DVD and Blu-ray Discs


The DVD (digital versatile disc) and Blu-ray disc (BD) are formats of digital optical disc data storage
which have superseded compact discs, mainly because of their much greater storage capacity. A
Blu-ray disc, for example, can store 25 GB (gigabytes) of data on a single-layer disc and 50 GB on a
dual layer disc. In comparison, a standard CD is the same physical size, but only holds 700 MB
(megabytes) of digital data.

6. USB Flash Drive


Also known as a thumb drive, pen drive, flash-drive, memory stick, jump drive, and USB stick, the
USB flash drive is a flash memory data storage device that incorporates an integrated USB
interface. Flash memory is generally more efficient and reliable than optical media, being smaller,
faster, and possessing much greater storage capacity, as well as being more durable due to a lack
of moving parts.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 12



7. Secure Digital Card (SD Card)
A common type of memory card, SD cards are used in multiple electronic devices, including digital
cameras and mobile phones. Although there are different sizes, classes, and capacities available,
they all use a rectangular design with one side "chipped off" to prevent the card from being
inserted into the camera or other device the wrong way.

8. Solid State Drive (SSD)


A solid state drive uses flash memory to store data and is sometimes used in devices such as
netbooks, laptop, and desktop computers instead of a traditional hard disk drive. The advantages
of an SSD over a HDD include a faster read/write speed, noiseless operation, greater reliability, and
lower power consumption. The biggest downside is cost, with an SSD offering lower capacity than
an equivalently priced HDD.

9. Cloud Storage
With users increasingly operating multiple devices in multiple places, many are turning to online
and cloud computing solutions. Cloud computing basically involves accessing services over a
network via a collection of remote servers. Although the idea of a "cloud of computers" may sound
abstract to those unfamiliar with this metaphorical concept, in practice it can provide tremendous
storage solutions for devices that are connected to the internet.

10. Punch Card


Punch cards (or punched cards) were a common method of data storage used in the early
computers. Basically, they consisted of a paper card with punched or perforated holes that have
been created by hand or machine. The cards were entered into the computer to enable the storage
and accessing of information. This form of data storage media pretty much disappeared as new
and better technologies were developed.

GENERATIONS OF COMPUTERS

FIRST GENERATION OF COMPUTERS


• Characterized by vacuum tubes started in 1951.
• UNIVAC I (Universal Integrated Automatic Computer)
• UNIVAC first commercially viable electronic digital computer
• It handled alphabetic characters instead of just numbers.
• IBM 701 marked the company’s initial foray into the market
• IBM 650 it was designed as a logical upgrade to the existing punched card machines.

SECOND GENERATION
• 1959 marked the invention of transistors
• Faster input-output devices were also developed
• IBM Competitors: Burroughs, UNIVAC, NCR, CDC, and Honeywell, collectively known as BUNCH
• 1963 marked the successful introduction to the market of minicomputers via Digital Equipment
Corporation’s PDP-8

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 13



THIRD GENERATION OF COMPUTERS
• 1967 arose the third generation of computer the invention of smaller electronic circuits called
integrated circuits
• IBM’s System 360 the first used computer in this generation
• Integrated circuit was composed of numerous transistors manufactured as a single unit

FOURTH GENERATION
• 4004 chip the First Microprocessor introduce by Intel Corporation • A four bit processor with
2,200 transistors
• 1971 the fourth generation of computers.
• Altair 8800 1975 introduce computing to individuals and small companies
• 1981 IBM grab the lead in microcomputer industry through IBM PC (Personal Computer)

Chapter Quiz 1

Multiple Choice
1. High-speed electronic device with the capability to process entered data;
correspondingly, it produces some form of processing output.
a. Computer b. Machine c. Mobile Phone d. Laptop
2. Which of the following is not considered as Characteristics of computer system?
a. Electronic b. Correct it Self c. Storage capability d. Retrieval
Capability
3. Which of the following is considered as Characteristics of computer system?
a. Electronic b. Storage Capacity c. Programmable d. All of the above
4. All computers are able to store data intended for later use. This characteristic
makes them comparable to electronic filing cabinets.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
5. All computers are able to process data; that is, useful information can be gleaned
after the computer has performed the necessary operational instruction on the
raw data it is fed.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
6. All computers are able to follow a set of instructions, called a program, from which
a user may derive the specific that information he wants.
a. Programmable b. Electronic c. Storage Capacity d. Retrieval
Capability
7. Which of the following items below are considered as advantages of computer system?

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 14



a. Speed b. Accuracy c. Repeatability d. All of the
above
8. Which of the following items below is not considered as advantage of Computer System?
a. Electronic b. Accuracy c. Programmable d. All of the above
9. It was developed around 500 B.C. when man created the first mechanical counter.
a. Calculator b. Abacus c. Computer d. None of the above
10. First mechanical adding machines. Invented by Blaise Pascal a French Philosopher
and Mathematician in 1642.
a. Abacus b. UNIVAC c. Pascaline d. EDVAC
11. Invented by Joseph-Marie Jacquard, used punched card technology.
a. Analytical Engine b. Difference Engine c. Weaving Loom d. Punch Card
12. It was considered as the first general-purpose computer.
a. Difference Engine b. Micro-computer c. Supper Computer d. Analytical Engine
13. Invented by Charles Babbage during the mid-1800s and capable of computing
mathematical tables.
a. Supper Computer b. Mobile Computer c. Difference Engine d. Mobile Phone
14. First fully functional electronic digital computer.
a. ENIAC b. EDVAC c. Mark I d. ABC
15. Generation of computer characterized by vacuum tubes started in 1951.
a. First Gen. b. Second Gen. c. Third Gen. d. Fourth Gen.
16. Generation of computer which marked as the development of transistors in year
1959.
a. First Gen. b. Second Gen. c. Third Gen. d. Fourth
Gen.
17. Generation of computer marked the invention of smaller electronic circuits called
integrated circuits.
a. First Gen. b. Second Gen. c. Third Gen. d. Fourth Gen.
18. Generation of Computer that marks the development of first Microprocessor
introduce by Intel Corporation.
a. First Gen. b. Second Gen. c. Third Gen. d. Fourth Gen.
19. Microcomputers appeared in the year 1970s.
a. Micro-computer b. Mini-computer c. Mainframe d. Super Computer
20. The smallest computer designed for the multiuser environment.
a. Micro-computer b. Mini-computer c. Mainframe d. Super Computer
21. The largest, fastest and most expensive computers in commercial used today.
a. Micro-computer b. Mini-computer c. Mainframe d. Super Computer

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 15



22. They are for engineering and scientific problem analysis as well as for computerized
graphics and special effects seen in films.
a. Hybrid Computer b. Analog Computer c. Digital Computer d. Super
Computer
23. Data in this computers are expressed by the on or off state of its electrical
components.
a. Hybrid Computer b. Analog Computer c. Digital Computer d. Super
Computer
24. Combines the features of both analog and digital computers.
a. Hybrid Computer b. Analog Computer c. Digital Computer d. Super
Computer
25. Designed and written to perform a specific task for computer users.
a. Rough Software b. Application Software c. System Software d. Utility
Software
26. Service routines software that eliminate the need for users to writes a program
every time they need to perform certain computer operations.
a. Rough Software b. Application Software c. System Software d. Utility Software
27. Software is any program that runs on the computer without the user’s knowledge
and consent. More often than not, it does damage to the user’s file.
a. Rough Software b. Application Software c. System Software d. Utility Software
28. Software designed and written to perform a specific task for computer users.
a. Rough Software b. Application Software c. System Software d. Utility
Software
29. Provides the framework for a great number of business and personal applications
a. Rough Software b. General Purpose Software c. System Software d. Utility
Software
30. Set of instructions that a computer follows in order to perform a specific function.
a. System b. Software c. Program d. Codes

Chapter Quiz 2

Identification (Acronyms)
Direction: Supply the exact name of the following acronyms below. Strictly No erasures!
1 CPU
2 ABS

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 16



3 UNIVAC
4 ENIAC
5 IBM
6 ALU
7 CU
8 PC
9 TPS
10 EDVAC

USES OF COMPUTERS IN MODERN TIMES

1. Information Systems/Data Processing


Information System or Data Processing refers to a category of computer use that enables
organization to utilize to the fullest the data they possess.

2. Personal Computing
Small and medium-size businesses as well as individuals form the bulk of personal computing
practitioners. Personal computing means the use of stand-alone computers equipped with all the
system, utility, and application software and I/O devices that an individual needs to perform one
or more tasks.

3. Science and Research


Result of scientific endeavors would take a long time to realize if it were not for the use of
computers in this specialty area.

4. Education
Although computers will never replace books and teachers, the can enhance learning in a way no
other medium can. Through its interactive capability, computers have added a new dimension to
the learning process.

5. Artificial Intelligence
Artificial intelligence is an area of computer research which aims to endow the computer with
certain forms of human intelligence such as the capability to understand natural language or to
reasons under uncertain condition.

Field of Artificial Intelligence is divided into four categories:

1. Knowledge-based and expert system refers to man’s knowledge based on his judgment
algorithmic sense about a specific application area.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 17



2. Natural languages refer to software that enables computer systems to accept, interpret
and execute instructions written in the native or natural language or the end user.
3. Simulation of human sensory capabilities in computer system, such as seeing, hearing and
touching, has been made possible, although in varying report,” the computer will
obligingly follow.
4. Robotics refers to the use of computerized robots in the manufacturing sector. Industrial
robots, which are usually equipped with an arm and a hand, can be instructed to do
repetitive tasks such as screwing on the bolts or painting cars.

TYPES OF COMPUTERS ACCORDING TO SIZE


1. Microcomputer
• Microcomputers appeared in the year 1970s
• Single User, Single Task
• Processor is capable to handle one task at a time
• Flexibility
• Low Cost
• Rapid Technological Advances
2. Minicomputers
• The smallest computer designed for the multiuser environment
• Provide specialized and well-defined services;
• Dedicated to specific application such as controlling and assembly line or recording data in
a research laboratory
• Storage capacity are smaller
• They service fewer terminal compared to a mainframe computer
3. Mainframe
• ENIAC AND UNIVAC were mainframe computers
• The largest, fastest and most expensive computers in commercial used today.
• Requires huge storage capacity and massive processing ability
• Multi-user environment
• Mainframe can serve more than 100 terminals
• EDVAC (Electronic Discrete Variable Automatic Computer) was one of the earliest
electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal,
and was designed to be a stored-program computer.
4. Supercomputer
• More oriented towards exhaustive processing of data
• They are for engineering and scientific problem analysis as well as for computerized
graphics and special effects seen in films
• Use for weather and climate predications

TYPES OF COMPUTER ACCORDING TO DATA HANDLED


1. Analog Computers
• Analog computers operate on data of continuous values
• Used for a few engineering and scientific application, but not for business purposes.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 18



2. Digital Computer
• Represent data as discrete or whole value.
• Data in digital computers are expressed by the on or off state of its electrical components.

3. Hybrid Computers
• Combines the features of both analog and digital computers.
• Limited to a small number of engineering and scientific applications.

TYPES OF DIGITAL COMPUTERS ACCORDING OT PURPOSE


1. General-Purpose Computers
• General purpose computers are used for a rainbow of application
• Business, scientific and engineering purposes
• The most common type of digital computer in used today

2. Special-purpose computers
• Use to perform specific functions, such as navigational control, thermal control in large
buildings, or control in large buildings. Or video games.
• Their functions are limited to the particular purposed for the they were created

SOFTWARE
• A program is a set of instructions that a computer follows in order to perform a specific
function.
• It is used to refer to programs written to control and direct hardware operations.
1. Application Software – is designed and written to perform a specific task for computer users.

• Enrollment System
• Transaction Processing System
• Point of Sale Systems
• Payroll System
• Inventory System
2. General-purpose software – provides the framework for a great number of business and
personal applications.

a. Word processor – permits users to enter, store, manipulate, and print text
• Microsoft Word
• WordStar
• Word Perfect
• Note Pad
• Word Pad
b. Spreadsheets – permits user to work with rows, and columns of a matrix (or spreadsheet) of
data.
• Excel

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 19



• SPSS
• Lotus 123
• Accounting 102
• Solaris

c. Graphics – allows creating images.


• Adobe
• Flash Macro Media
• Photo Editor
• Dream weaver
• 3D Software

d. Desktop Publishing (DTP) – allows users to produce near typeset-quality copy from the
confines of a desktop.

• Publisher
• Photo Shop
• Print Artist
• Print Master
• News Master

e. Utility Software – are service routines that eliminate the need for users to writes a program
every time we need to perform certain computer operations.

• Norton Utilities
• Defragmenter
• Backup files
• Scandisk
• Formatting and Partitioning

f. Data Base Management System – is a type of software that allows user with a wide variety
of application needs to create, access modify and maintain databases.
• Access
• Visual FoxPro
• Visual FoxBase
• Dbase III+
• Dbase IV

3. System software – includes all programs designed to help control the computer system. This is
usually independent of any general-purpose software package or any specific application
area.
a. Operating System – is a set of control program that govern the operation of a computer.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 20


• LINUX
• UNIX
• WINDOWS
• DOS
• Oracle

b. Programming Languages refers to several languages programmers use to give instructions to


the computer, and these are divided into different types:

1. Low-Level Programming Languages - the native language of computer.

• Assembly Language
• Debug

2. Middle-Level Programming Languages – combination of Low and High Level

3. High Level Programming Languages – English like statements

• Visual Basic
• Visual C++
• Pascal
• Cobol
• Java
c. Translators – interprets, compilers and assemblers all have one objective to translate
instructions into machine readable command in order to allow the computer to execute the
instructions.
• Clipper
• C++ Compiler
• Data Base Compilers
• JAVA Compilers
• Visual Basic Compiler

4. Rogue Software - Software is any program that runs on the computer without the user’s
knowledge and consent. More often than not, it does damage to the user’s file.

Examples:
• Back Doors
• Chameleon
• Logic Bombs
• Trojan Horses
• ANSI Bombs
• Worm

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 21



• Virus

Chapter Quiz 3

Identification.
Direction: Identify each item below and write WS for Word Processor; SS for Spreadsheet
Software; GS for Graphics Software; DP for Desktop Publishing; DB for Database System, and US
for Utility Software. Write your answer to the space provided before each number. Strictly NO
erasures!

_________1. WordPad ___________11. Defragmenter


_________ 2. Access ___________ 12. SPSS
_________ 3. Excel ___________13.NotePad
_________ 4. Print Master ___________ 14. Nod
_________ 5. Adobe Photoshop ___________ 15. Scandisk
_________ 6. MS Word ___________ 16. 3D Animation
_________ 7. MySQL ___________ 17. Visual Foxpro
_________ 8. Lotus 123 ___________ 18. Print Artist
_________ 9. Print Artist ___________ 19. WPS
_________ 10. Norton ___________ 20. Publisher

• Why computers are considered as powerful thinking machines

http://14.139.186.108/jspui/bitstream/123456789/31552/1/Thinking%20Machine.pdf

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 22


Chapter 2:
Computer and Network Technology

Learning Objectives

At the end of this chapter the students should be able to:


 Identify types of network
 Assess the difference between wire and wireless connections
 Evaluate the difference desktop and mobile applications used in our daily life

Learning Contents

What is a Network?
Local Area Network (LAN)
Wide Area Network (WAN)
Local Area Network
Wide Area Network
Advantages of Installing a School Network
Disadvantages of Installing a School Network
Wired and Wireless connections
Types of Wireless Networks
Wireless Networking
Wireless Basic

What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 23



Two very common types of networks include:

• Local Area Network (LAN) • Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or
a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally
limited to a geographic area such as a writing lab, school, or building.

Computers connected to a network are broadly categorized as servers or workstations. Servers are
generally not used by humans directly, but rather run continuously to provide "services" to the
other computers (and their human users) on the network. Services provided can include printing
and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval,
complete access control (security) for the network's resources, and many others.

Workstations are called such because they typically do have a human user which interacts with the
network through them. Workstations were traditionally considered a desktop, consisting of a
computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and
touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and
iPhone, our definition of workstation is quickly evolving to include those devices, because of their
ability to interact with the network and utilize network services.

Servers tend to be more powerful than workstations, although configurations are guided by needs.
For example, a group of servers might be located in a secure area, away from humans, and only
accessed through the network. In such cases, it would be common for the servers to operate
without a dedicated display or keyboard. However, the size and speed of the server's processor(s),
hard drive, and main memory might add dramatically to the cost of the system. On the other hand,
a workstation might not need as much storage or working memory, but might require an expensive
display to accommodate the needs of its user. Every computer on a network should be
appropriately configured for its use.

On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access
to a wired network is made possible by wireless access points (WAPs). These WAP devices provide
a bridge between computers and networks. A typical WAP might have the theoretical capacity to
connect hundreds or even thousands of wireless users to a network, although practical capacity
might be far less.

Nearly always servers will be connected by cables to the network, because the cable connections
remain the fastest. Workstations which are stationary (desktops) are also usually connected by a
cable to the network, although the cost of wireless adapters has dropped to the point that, when

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 24



installing workstations in an existing facility with inadequate wiring, it can be easier and less
expensive to use wireless for a desktop.

Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to
connect this type of global network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds,
without paying enormous phone bills. Two users a half-world apart with workstations equipped
with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses
multiplexers, bridges, and routers to connect local and metropolitan networks to global
communications networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.

Advantages of Installing a School Network

User access control.


Modern networks almost always have one or more servers which allows centralized management
for users and for network resources to which they have access. User credentials on a privately-
owned and operated network may be as simple as a user name and password, but with ever-
increasing attention to computing security issues, these servers are critical to ensuring that
sensitive information is only available to authorized users. Information storing and sharing.
Computers allow users to create and manipulate information. Information takes on a life of its own
on a network. The network provides both a place to store the information and mechanisms to
share that information with other network users.

Connections.
Administrators, instructors, and even students and guests can be connected using the campus
network.

Services.
The school can provide services, such as registration, school directories, course schedules, access
to research, and email accounts, and many others. (Remember, network services are generally
provided by servers).

Internet.
The school can provide network users with access to the internet, via an internet gateway.

Computing resources.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 25



The school can provide access to special purpose computing devices which individual users would
not normally own. For example, a school network might have high-speed high quality printers
strategically located around a campus for instructor or student use.

Flexible Access.
School networks allow students to access their information from connected devices throughout
the school. Students can begin an assignment in their classroom, save part of it on a public access
area of the network, then go to the media center after school to finish their work. Students can
also work cooperatively through the network.

Workgroup Computing.
Collaborative software allows many users to work on a document or project concurrently. For
example, educators located at various schools within a county could simultaneously contribute
their ideas about new curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network

Expensive to Install.
Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges,
firewalls, wireless access points, and software can get expensive, and the installation would
certainly require the services of technicians. But, with the ease of setup of home networks, a simple
network with internet access can be setup for a small campus in an afternoon.

Requires Administrative Time.


Proper maintenance of a network requires considerable time and expertise. Many schools have
installed a network, only to find that they did not budget for the necessary administrative support.
Servers Fail.

Although a network server is no more susceptible to failure than any other computer, when the
files server "goes down" the entire network may come to a halt. Good network design practices
say that critical network services (provided by servers) should be redundant on the network
whenever possible.

Cables May Break.


The Topology chapter presents information about the various configurations of cables. Some of
the configurations are designed to minimize the inconvenience of a broken cable; with other
configurations, one broken cable can stop the entire network.

Security and compliance.


Network security is expensive. It is also very important. A school network would possibly be subject
to more stringent security requirements than a similarly-sized corporate network, because of its

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 26



likelihood of storing personal and confidential information of network users, the danger of which
can be compounded if any network users are minors. A great deal of attention must be paid to
network services to ensure all network content is appropriate for the network community it serves.

Wired and Wireless connections

A wireless network enables people to communicate and access applications and information
without wires. This provides freedom of movement and the ability to extend applications to
different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people
to interact with email or browse the Internet from a location that they prefer.

Many types of wireless communication systems exist, but a distinguishing attribute of a wireless
network is that communication takes place between computer devices. These devices include
personal digital assistants (PDAs), laptops, personal computers (PCs), servers, and printers.
Computer devices have processors, memory, and a means of interfacing with a particular type of
network. Traditional cell phones don't fall within the definition of a computer device; however,
newer phones and even audio headsets are beginning to incorporate computing power and
network adapters. Eventually, most electronics will offer wireless network connections.

As with networks based on wire, or optical fiber, wireless networks convey information between
computer devices. The information can take the form of e-mail messages, web pages, database
records, streaming video or voice. In most cases, wireless networks transfer data, such as e-mail
messages and files, but advancements in the performance of wireless networks is enabling support
for video and voice communications as well.

Types of Wireless Networks

WLANS: Wireless Local Area Networks


WLANS allow users in a local area, such as a university campus or library, to form a network or gain
access to the internet. A temporary network can be formed by a small number of users without
the need of an access point; given that they do not need access to network resources.

WPANS: Wireless Personal Area Networks


The two current technologies for wireless personal area networks are Infra Red (IR) and Bluetooth
(IEEE 802.15). These will allow the connectivity of personal devices within an area of about 30 feet.
However, IR requires a direct line of site and the range is less.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 27



WMANS: Wireless Metropolitan Area Networks
This technology allows the connection of multiple networks in a metropolitan area such as
different buildings in a city, which can be an alternative or backup to laying copper or fiber cabling.

WWANS: Wireless Wide Area Networks


These types of networks can be maintained over large areas, such as cities or countries, via multiple
satellite systems or antenna sites looked after by an ISP. These types of systems are referred to as
2G (2nd Generation) systems.

Type Coverage Performance Standards Applications


Wireless Within Moderate Wireless PAN Within reach of a Cable replacement
PAN reach of a person Moderate Bluetooth, IEEE for peripherals
person 802.15, and IrDa Cable replacement
for peripherals
Wireless Within a High IEEE 802.11, Wi-Fi, and HiperLAN Mobile extension of
LAN building or wired networks
campus
Wireless Within a High Proprietary, IEEE 802.16, and Fixed wireless
MAN city WIMAX between homes
and businesses and
the Internet
Wireless Worldwide Low CDPD and Cellular 2G, 2.5G, and 3G Mobile access to
WAN the Internet from
outdoor areas

Wireless Networking
Wireless networking is the new face of networking. Wireless networking have been around for
many years. Cell phones are also a type of wireless communication and are popular today for
people talking to each other worldwide.

Wireless networking are not only less expensive than more traditional wired networking but also
much easier to install. An important goal of this site is to provide you adequate knowledge for
installing a wireless network and get certified in wireless networks as well as.

Wireless Basic
Radio Frequency Transmission Factors
Radio frequencies (RF) are generated by antennas that propagate the waves into the air.
Antennas fall under two different categories:

Directional and Omni-directional.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 28



Directional antennas are commonly used in point-to-point configurations (connecting two distant
buildings), and sometimes point-to-multipoint (connecting two WLANs). An
example of a directional antenna is a Yagi antenna: this antenna allows you to adjust the direction
and focus of the signal to intensify your range/reach.

Omni-directional antennas are used in point-to-multipoint configurations, where they distribute


the wireless signal to other computers or devices in your WLAN. An access point would use an
omnidirectional antenna. These antennas can also be used for point-to-point connections, but they
lack the distance that directional antennas supply

Three main factors influence signal distortion:


• Absorption Objects that absorb the RF waves, such as walls, ceilings, and floors
• Scattering Objects that disperse the RF waves, such as rough plaster on a wall, carpet on
the floor, or drop-down ceiling tiles
• Reflection Objects that reflect the RF waves, such as metal and glass
Responsible body
The International Telecommunication Union-Radio Communication Sector (ITU-R) is responsible
for managing the radio frequency (RF) spectrum and satellite orbits for wireless communications:
its main purpose is to provide for cooperation and coexistence of standards and implementations
across country boundaries.

Two standards bodies are primarily responsible for implementing WLANs:

• IEEE defines the mechanical process of how WLANs are implemented in the 802.11
standards so that vendors can create compatible products.
• The Wi-Fi Alliance basically certifies companies by ensuring that their products follow the
802.11 standards, thus allowing customers to buy WLAN products from different vendors
without having to be concerned about any compatibility issues.

Frequencies bands:
WLANs use three unlicensed bands:
• 900 MHz Used by older cordless phones
• 2.4 GHz Used by newer cordless phones, WLANs, Bluetooth, microwaves, and other
devices
• 5 GHz Used by the newest models of cordless phones and WLAN devices
• 900 MHz and 2.4 GHz frequencies are referred to as the Industrial, Scientific, and Medical
(ISM) bands.
• 5 GHz frequency the Unlicensed National Information Infrastructure (UNII) band.
• Unlicensed bands are still regulated by governments, which might define restrictions in
their usage.

A hertz (Hz) is a unit of frequency that measures the change in a state or cycle in a wave (sound
or radio) or alternating current (electricity) during 1 second.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 29



Transmission Method
Direct Sequence Spread Spectrum (DSSS) uses one channel to send data across all frequencies
within that channel. Complementary Code Keying (CCK) is a method for encoding transmissions for
higher data rates, such as 5.5 and 11 Mbps, but it still allows backward compatibility with the
original 802.11 standard, which supports only 1 and 2 Mbps speeds. 802.11b and 802.11g support
this transmission method.

OFDM (Orthogonal Frequency Division Multiplexing) increases data rates by using a spread
spectrum: modulation. 802.11a and 802.11g support this transmission method.

MIMO (Multiple Input Multiple Output) transmission, which uses DSSS and/or OFDM by spreading
its signal across 14 overlapping channels at 5 MHz intervals. 802.11n uses it. Use of 802.11n
requires multiple antennas.

WLAN Standards
Standards 802.11a 802.11b 802.11g 802.11n
Data Rate 54 11 Mbps 54 Mbps 248 Mbps (with 2×2
Mbps antennas)
Throughput 23 4.3 Mbps 19 Mbps 74 Mbps
Mbps
Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 and/or 5 GHz
Compatibility None With 802.11g and the original With 802.11a, b, and g
802.11 802.11b
Range (meters) 35–120 38–140 38–140 70–250
Number of 3 Up to 23 3 14
Channels
Transmission OFDM DSSS DSSS/OFDM MIMO

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 30


Chapter 3
Internet and the World Wide Web

Learning Objectives

At the end of this chapter the students should be able to:


1. Define internet
2. Differentiate internet with worldwide web
3. Explain the evolution of internet
4. Assess the importance of internet to hospitality management
5. Identify the fundamental concept of world wide web
6. Discuss the use of internet service providers

Learning Contents

What is the Internet?


The internet is the largest computer network in the world, connecting millions of computers. A
network is a group of two or more computer systems linked together.

The World Wide Web (WWW)


When most people think of the internet, the first thing they think about is the World Wide Web.
Nowadays, the terms "internet" and "World Wide Web" are often used interchangeably— but
they're actually not the same thing.

• The internet is the physical network of computers all over the world.
• The World Wide Web is a virtual network of web sites connected by hyperlinks (or
"links"). Web sites are stored on servers on the internet, so the World Wide Web is a part
of the internet.
HTML
The backbone of the World Wide Web is made of HTML files, which are specially-formatted
documents that can contain links, as well as images and other media. All web browsers can read
HTML files. In addition to HTML, it's also very common for websites to use technologies like CSS
(Cascading Style Sheets) and JavaScript to do more advanced things.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 31



URL
To get to a web page, you can type the URL (Uniform Resource Locator) in a browser. The URL,
also known as the web address, tells the browser exactly where to find the page. However, most
of the time, people get to a web page by following a link from a different page or by searching for
the page with a search engine.

The World Wide Web was created in 1989 by Tim Berners-Lee, a software engineer. Before
then, computers could communicate over the internet, but there were no web pages.

Basic Terms and Concepts

Let’s start with some basic terms and concepts:


Internet: It might be helpful to think of the Internet as a vast system of roads all connecting
to each other. You may have heard the term “information superhighway.” It’s a vast
infrastructure of pathways allowing computers to “talk” to each other, even though the
computers may use different operating systems. They do this through unique
identification numbers called Internet Protocol Addresses (IP addresses).

The abbreviation “www” stands for World Wide Web. Many people think the World Wide
Web is the same thing as the Internet. It isn’t. While the Internet is a large connection of
networks (hardware), the World Wide Web is a way to access the information on the
Internet. It’s like the software you need to run programs on the hardware of your
computer. So, the Internet is broader than the World Wide Web.

The Web uses common communication protocols (sets of rules) and special languages.
One of these is called HyperText Markup Language (HTML). These special languages act
as a bridge, allowing computers to communicate that don’t use compatible operating
systems. This means that you don’t have to use a specific type of computer in order to
access a website. Besides the Web, there are other ways to disseminate information, such
as email, File Transfer Protocol (FTP), and Telnet.

Connecting to the Internet


Now, let’s look at how one goes about connecting to the Internet. Before you can start
using the Internet, you need to have a way to connect to it. This requires you to have the
necessary hardware to make a connection on your end, as well as an Internet Service
Provider (ISP) which provides the Internet service to which your computer will connect.
Then, you’ll need a web browser to begin exploring the World Wide Web.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 32



Internet Connection Methods. Dial-up: Dial-up is a method that uses a telephone line, which
you connect to a phone jack, just as you would connect your telephone to the wall. Dial-up is
the slowest connection method and it requires your computer to have a dial-up modem.

o Broadband: Broadband is a high-speed connection method which can utilize cable, DSL,
or satellite. Each of these methods requires different types of hardware.

o Fiber-optic: Fiber-optic communication transmits data by sending pulses of light through


ultrathin optical fiber. Because light travels so quickly, this technology can transmit
Internet data at super-fast speeds.

Internet Service Provider (ISP): Internet Service Providers are companies that connect you to the
Internet – for a fee, of course. ISPs are available on a local, state, and national level. Large
communication companies control access to the main lines of the Internet structure. They, in turn,
supply Internet access to the smaller ISPs, who pass this along to the consumer. Not all ISPs offer
all methods of connection to the Internet. Make sure the ISP you select offers service that
corresponds to your connection method and hardware.

Web Browser: You’ll need to have a web browser installed on your computer. This is a software
program that allows you to view web pages and navigate the Internet. Microsoft’s Internet
Explorer is probably the most commonly used web browser. It often comes pre-installed when you
purchase a computer that has a Microsoft Windows operating system. There are other free web
browsers available, including Mozilla’s very popular Firefox web browser and Apple’s Safari. You
can have more than one browser installed on your computer.

In summary, you need three basic things to connect to the Internet:


o A connection method o An Internet Service Provider (ISP) o A web browser

Surfing the Web


“Surfing the Web” or “Web Surfing” refers to browsing the World Wide Web by going from
website to website in search of something that interests you. Before we talk about how to surf
the web, it may be helpful to explain a few key terms. Take note of how they are spelled and
used.

A web page is a single page of information on the World Wide Web.


A website refers to a group of web pages identified by a single domain. For example, all of the web
pages on the Indian Hills website begin with www.indianhills.edu.

A homepage is the first or front page of a website. If you were to type “www.indianhills.edu” into
your web browser, the first web page that came up would be the website’s homepage. For
example: The Indian Hills website contains many web pages, including the homepage.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 33



A URL or “Uniform Resource Locator” is the unique address of each web page. For example, the
URL for the Indian Hills Bookstore is: http://www.indianhills.edu/bookstore/index.html Each URL
has several parts that appear in a specific order. Let’s look at each part by using the URL for the
Indian Hills Bookstore as an example: http://www.indianhills.edu/bookstore/index.html

Protocol: A protocol is a set of rules, used to retrieve a specific document. The “http” in our URL
refers to HyperText Transfer Protocol. The “http” is followed by a colon and two forward slashes,
then “www,” which refers to the World Wide Web.

Domain Name: The domain name consists of two parts. In our example, “indianhills.edu” is the
domain name. where “indianhills” is the host and “.edu” is the top-level domain. This suffix
indicates the type of organization to which the host belongs. As you can probably guess, “.edu”
indicates that the host, “indianhills,” is an educational institution.

Common Top-Level Domains


• .com Commercial or business websites, however anyone may use this now
• .gov United States Government websites
• .mil United States Military websites
• .org Organizational websites (often non-profit organizations)

Directory/Page: The next part of the URL tells the web browser where to find the specific web
page on the website. In our example, the “/bookstore/” tells us that the web page we are looking
for lives in the directory/folder entitled “bookstore.” The next part, “index.html,” is the name of
the actual web page. The “.html” refers to the programming language used to create the page (in
this case, HyperText Markup Language or HTML).

A Search Engine is a website that searches the World Wide Web for specific keywords, which you
enter into a search field. The search engine then displays a list of web pages that are somehow
related to the keywords you entered. You can then click the links to any of these web pages that
interest you. Search results are not perfect. You may be looking for a specific website that does
not appear right away. Most search engines have advanced options that allow you to narrow your
search. For example, you may want to find information about jaguars (the animal not the
automobile). If so, you could use the advanced features of your chosen search engine to exclude
search results that include the words “car” and “automobile.” Each search engine does this
differently. So, you will have to explore the website of your selected search engine for more.

Google (www.google.com) and Yahoo! (www.yahoo.com) are two popular search engines.

A Subject Directory is a listing of websites organized by topic. As mentioned earlier, not every web
page that comes up in your search results may have the most relevant or the most reliable
information related to your topic. Subject directories are usually more selective in what they
include than are search engines. To use a subject directory, select a main subject from the
directory, which then displays subdirectories or folders. Continue to drill down, narrowing your

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 34



topic, until you find a web page that interests you. Some search engines include subject directories
in their list of features and some academic and professional websites include subject directories
related to their specific areas of interest.

In summary, there are three basic ways to begin to surf the


web:

o Enter the URL of a website you want to visit


o Use a Search Engine
o Find your topic in a Subject Directory

Internet Communication
• Email is an extremely popular means of communication. In fact, it has become so integrated
with the flow of our work and personal lives that it may be difficult to remember a time
when we could not communicate this way. However, there are also many other ways to
communicate via the Internet. We’re going to describe some of them, now, but we
encourage you to find out more about each of these options on your own and consider
how they might be useful to you.
o Instant Messaging (IM) and Chat Rooms: These tools allow you to communicate
with others who are online at the same time as you. The key difference between
this and email is that with email there is a delay, as you wait for the other person
to receive the email, read it, and reply, whenever they are next online, while with
Instant Messaging or Chat Rooms, all participants are online at the same time,
interacting “live. Podcasts: Podcasts are audio or video recordings available for
download from the Internet. TV shows, newscasts, and instructor lectures are
some examples of content that can be delivered via a podcast. While some audio
and video recordings are streamed over the Internet, meaning you watch them in
your web browser, podcasts are different in that they are downloaded for offline
listening or viewing.
o Podcasts can also be subscribed to via RSS feeds. An RSS feed allows your
computer to automatically download a new podcast whenever it is created,
without your having to visit its website directly.
o Blogs: A blog (short for “web log”) is a public journal posted on the Internet. The
word blog can be used as both a noun and a verb. You may have a personal blog
or you may blog about your career field. People blog about a wide variety of topics.
If you have a hobby or topic which you enjoy, you can probably find any number
of blogs related to the subject. One distinguishing characteristic of blogs is that
they usually allow readers to post comments responding to the original blogger’s
post. In this way, large interactive communities can develop around popular blogs.

o Social Networking: Social networking sites, such as Facebook, LinkedIn, Twitter,


Flickr, and YouTube are convenient ways to meet new people, share photos and
videos, connect with friends, and more. These are typically easy to use and include
free services.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 35


o Voice over Internet Protocol (“Voice over IP” or “VoIP”): This is a voice-based
Internet communication solution that uses a standard Internet connection to
place phone calls. Skype is an example of a software program that allows you to
place calls over the Internet. Skype users can call one another over the Internet
for free, while calls from Skype to traditional landline phones may be made for a
fee.

Tips For a Better Internet Experience


While there are great benefits to using the Internet, there are also downsides of which you should
be aware that range from simple annoyances to serious risks.
• Spam refers to unsolicited, junk email. If you use your email at all, chances are good that
your email address will eventually be discovered by spammers (those who send junk email)
and be added to their mailing lists. The good news is there are some ways you can minimize
spam.
o 1. Create a free webmail account. Webmail or “web email” refers to an email
account accessed through a website. Keep this secondary webmail account
separate from your primary email account and have it forward to your primary
account. Use this secondary webmail account whenever you fill out forms on the
web or perform similar tasks, rather than your primary email account. If the
webmail account gets overwhelmed with spam, you can always create another
one and delete the old one. Just be sure to update your email address on any
important websites you use, before you delete the old one. Gmail, Google’s free
webmail service, is one popular option for creating a webmail account.

o A spam filter is a feature provided by most computer-based email programs and


webmail service providers. Spam filters identify junk emails and move them
automatically to a separate folder for you to examine or delete later. This keeps
them from cluttering your Inbox. Be sure to check your spam or junk email folder
regularly to make sure a legitimate email hasn’t been placed there by mistake.

o Do not reply to spam emails, even just to request that they remove you from their
mailing list. Doing so confirms to the spammer that your email address is valid and
ensures they will continue to use it and, likely, sell it to other spammers, resulting
in more spam. Identity Theft and Online Predators: Providing too much personal
information on social networking sites, in chat rooms, or in emails can cause you
problems. Some criminals collect personal information and use it to “steal” a
person’s identity, accessing their bank accounts, setting up credit card accounts,
and worse. Identity theft can have devastating results. Also, dangerous online
predators are known to seek the “real world” addresses of people they encounter
online, which can lead to physical assaults. Further, homes have been robbed
simply because someone shared on a social networking site that they would be
gone on vacation during a specific time. Be wise about what you share online.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 36



Remember that what you share with one person can easily be shared with others
and that a person you meet online may not be who they say they are.

• Phishing is another way criminals can attempt to get your personal information. Phishers
send spam emails that appear to be from legitimate companies, such as banks, online
stores, and the like. They usually ask you to verify your account information, such as your
user name, password, social security number, credit card number, or other items. If you
receive such emails, do not reply. No legitimate bank or store will ever ask you to supply
your account information over email. Remember, the legitimate company would already
have your information. Beware of web pages that look like well-known online companies,
as well. This is another way phishers can trick unsuspecting web surfers. Be sure the URL
is correct, before you attempt to log into your online accounts.

• Shopping Online: Before you enter personal information on a website, be sure the site is
secure. Look at the URL in your web browser’s address bar. You should see “https” at the
beginning of the URL. The “s” refers to “secure.” Secure pages make it more difficult for
hackers to intercept your information as it is submitted to the website.

Link: http://www.just.edu.jo/~mqais/cis99/PDF/Internet.pdf

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 37


Chapter 4
Information, Control, and Privacy

Learning Objectives

At the end of this chapter the students should be able to:


 Identify computer crimes
 Define security
 Explain concepts of Data Privacy Act of 2012
 Describe the different common internet privacy issues
 Enumerate and explain the 10 commandments of using computer
 Explain the different social issues of using Information Systems
 Explain concept of e-commerce law
 Differentiate cybercrime with cybersecurity
 Identify different information security controls
 Apply intellectual property law concept on their daily lives
 Compare deep web with dark web
 Evaluate cases related to Latest Privacy

Learning Contents

1. RESPONSIBILITY
This means that you accept the potential costs, duties and obligations for the decisions
you make.
2. ACCOUNTABILITY
It means mechanisms are in place for identifying who took responsible actions and who
are the responsible parties.
3. LIABILITY
Liability is a feature of the political systems in which a body of laws permits individuals and
firms to recover damages to them by other actors, systems or organizations.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 38



4. DUE PROCESS
This is a related feature of law-governed societies and is a process in which laws are well
known and understood and there is an ability to higher authorities.

E-Commerce Law
R.A. 8792 "An Act Providing For The Recognition And Use of Electronic Commercial And
Non-Commercial Transactions, Penalties For Unlawful Use Thereof, And Other Purposes,
also known as the "Electronic Commerce Act."

The State recognizes the vital role of information and communications technology
(ICT) in nation-building; the need to create an information-friendly environment which
supports and ensures the availability, diversity and affordability of ICT products and
services; the primary responsibility of the private sector in contributing investments and
services in telecommunications and information technology; the need to develop, with
appropriate training programs and institutional policy changes, human resources for the
information technology age, a labor force skilled in the use of ICT and a population capable
of operating and utilizing electronic appliances and computers; its obligation to facilitate
the transfer and promotion of technology; to ensure network security, connectivity and
neutrality of technology for the national benefit; and the need to marshal, organize and
deploy national information infrastructures, comprising in both telecommunications
network and strategic information services, including their interconnection to the global
information networks, with the necessary and appropriate legal, financial, diplomatic and
technical framework, systems and facilities.

Cybercrime and Cybersecurity


For businesses, cybercrime falls into two major areas. The first comes in the form of
attacks against computer hardware and software from threats such as viruses, malware,
botnets, and network intrusion. The second is financial, and can include fraud, theft of
financial information, and phishing.

• Anti-Malware—Software that prevents, detects and eliminates malicious


programs on computing devices.
• Antivirus—Software that prevents, detects and eliminates computer viruses.
• Backdoor Trojan—A virus that enables remote control of an infected device,
allowing virtually any command to be enacted by the attacker. Backdoor
Trojans are often used to create botnets for criminal purposes.
• Botnets—A group of Internet-connected devices configured to forward
transmissions (such as spam or viruses) to other devices, despite their owners
being unaware of it.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 39



• Cybercrime—Also known at computer crime or netcrime, cybercrime is loosely
defined as any criminal activity that involves a computer and a network,
whether in the commissioning of the crime or the target.
• DoS—An attempt to interrupt or suspend host services of an Internet-
connected machine causing network resources, servers, or websites to be
unavailable or unable to function.
• DDoS—Distributed denial of service attack. A DoS attack that occurs from
multiple sources.
• Malware—An overarching term describing hostile and/or intrusive software
including (but not limited to) viruses, worms, Trojans, ransomware, spyware,
adware, scareware, and other more, taking the form of executables, scripts,
and active content.
• Phishing—An attempt to acquire sensitive information like usernames,
passwords, and credit card details for malicious purposes by masquerading as
a trustworthy entity in a digital environment.
• Rootkit—Trojans that conceal objects or activities in a device’s system,
primarily to prevent other malicious programs from being detected and
removed
• Social Engineering—Non-technical malicious activity that exploits human
interaction to subvert technical security policy, procedures, and programs, in
order to gain access to secure devices and networks.
• Trojan—Malicious, non-replicating programs that hide on a device as benign
files and perform unauthorized actions on a device, such as deleting, blocking,
modifying, or copying data, hindering performance, and more.
• Zero-Day Vulnerability—a security gap in software that is unknown to its
creators, which is hurriedly exploited before the software creator or vendor
patches it.

Common information Security Control

What are the Types of Information Security Controls?

Types of information security controls, intended to strengthen cybersecurity, include:


• Security policies
• Procedures
• Plans
• Devices
• Software

They fall into three categories:

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 40



• Preventive controls, designed to prevent cybersecurity incidents
• Detective controls that detect a cybersecurity breach attempt (“event”) or successful
breach (“incident”) while it is in progress, and alert cybersecurity personnel
• Corrective controls, used after a cybersecurity incident to minimize data loss and
damage to information systems and restore systems as quickly as possible.

Security controls come in the form of:

• Access controls, including restrictions on physical access such as security guards at


building entrances, locks, and perimeter fences, and on virtual access, such as
privileged access authorization
• Procedural controls such as security awareness education, security framework
compliance training, and incident response plans and procedures
• Technical controls such as multi-factor user authentication at login (login), antivirus
software, and firewalls
• Compliance controls such as privacy laws and cybersecurity frameworks and standards
designed to minimize security risks. These typically require an information security risk
assessment, and impose information security requirements, with penalties for
noncompliance.

The most widely used information security frameworks and standards include:

• The National Institute of Standards and Technology (NIST) Special Publication 800-53,
Security and Privacy Controls for Federal Information Systems and Organizations
• The International Organization for Standardization (ISO) standard ISO 27001,
Information Security Management
• The Payment Card Industry Data Security Standard (PCI DSS)
• The Health Insurance Portability and Accountability Act (HIPAA)

Intellectual Property Law

A wide body of federal and state laws protects creative property such as writing, music,
drawings, paintings, photography, and films. Collectively, this body of law is called “intellectual
property” law, which includes copyright, trademark, and patent laws, each applicable in various
situations and each with its own set of technical rules. When obtaining permission to use creative
works, you’re concerned primarily with copyright law. However, trademarks, trade secrets, and
publicity and privacy rights sometimes come into play when permission to use certain types of
works is sought.
Below is a summary of the various types of intellectual property laws that are relevant to
the permissions process:

• Copyright. Federal copyright law protects original creative works such as paintings,
writing, architecture, movies, software, photos, dance, and music. A work must meet

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 41



certain minimum requirements to qualify for copyright protection. The length of
protection also varies depending on when the work was created or first published.
• Trademark. Brand names such as Nike and Apple, as well as logos, slogans, and other
devices that identify and distinguish products and services, are protected under
federal and state trademark laws. Unlike copyrighted works, trademarks receive
different degrees of protection depending on numerous variables, including the
consumer awareness of the trademark, the type of service and product it identifies,
and the geographic area in which the trademark is used.
• Right of Publicity. A patchwork of state laws known as the right of publicity protects
the image and name of a person. These laws protect against the unauthorized use of
a person’s name or image for commercial purposes—for example, the use of your
picture on a box of cereal. The extent of this protection varies from state to state.
• Trade Secrets. State and federal trade secret laws protect sensitive business
information. An example of a trade secret would be a confidential marketing plan for
the introduction of a new software product or the secret recipe for a brand of salsa.
The extent of trade secret protection depends on whether the information gives the
business an advantage over competitors, is kept a secret, and is not known by
competitors.
• Right of Privacy. Although not part of intellectual property laws, state privacy laws
preserve the right of all people to be left alone. Invasion of privacy occurs when
someone publishes or publicly exploits information about another person’s private
affairs. Invasion of privacy laws prevent you from intruding on, exposing private facts
about, or falsely portraying someone. The extent of this protection may vary if the
subject is a public figure—for example, a celebrity or politician.

Dark Web and Deep Web

Dark web definition


The dark web is a part of the internet that isn't indexed by search engines. You've no doubt
heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore
and Thomas Rid of King's College in London classified the contents of 2,723 live dark web sites over
a five-week period in 2015 and found that 57% host illicit material.
A 2019 study, Into the Web of Profit, conducted by Dr. Michael McGuires at the University
of Surrey, shows that things have become worse. The number of dark web listings that could harm
an enterprise has risen by 20% since 2016. Of all listings (excluding those selling drugs), 60% could
potentially harm enterprises.

You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen
subscription credentials, hacked Netflix accounts and software that helps you break into other
people’s computers. Buy login credentials to a $50,000 Bank of America account for $500. Get
$3,000 in counterfeit $20 bills for $600. Buy seven prepaid debit cards, each with a $2,500
balance, for $500 (express shipping included). A “lifetime” Netflix premium account goes for $6.
You can hire hackers to attack computers for you. You can buy usernames and passwords.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 42



But not everything is illegal, the dark web also has a legitimate side. For example, you can
join a chess club or BlackBook, a social network described as the “the Facebook of Tor.”

Deep web vs. dark web: What’s the difference?


The terms “deep web” and “dark web” are sometimes used interchangeably, but they are
not the same. Deep web refers to anything on the internet that is not indexed by and, therefore,
accessible via a search engine like Google. Deep web content includes anything behind a paywall
or requires sign-in credentials. It also includes any content that its owners have blocked web
crawlers from indexing.

Medical records, fee-based content, membership websites, and confidential corporate


web pages are just a few examples of what makes up the deep web. Estimates place the size of
the deep web at between 96% and 99% of the internet. Only a tiny portion of the internet is
accessible through a standard web browser—generally known as the “clear web”.

The dark web is a subset of the deep web that is intentionally hidden, requiring a specific
browser—Tor—to access, as explained below. No one really knows the size of the dark web, but
most estimates put it at around 5% of the total internet. Again, not all the dark web is used for
illicit purposes despite its ominous-sounding name.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 43


Chapter 5
IT, Culture, and the Society, the Internet of Things

Learning Objectives

At the end of this chapter the students should be able to:


 Describe the industry automation
 Evaluate the present status of the society based on concept of Industrial
Revolution 4.0
 Explain the influence of IT to culture and social behavior of the society
 Identify netiquette and code of conduct for IT Professionals
 Evaluate the negative practices in social media

Learning Contents

An Industry automation
Industrial Revolution 4.0
The influence of IT on culture and social behavior
Netiquette and code of conduct for IT professionals
The negative practices in social media such as cyberbullying
Case studies

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 44



An industry automation

Automation takes a step further mechanization that uses a particular machinery


mechanism aided human operators for performing a task. Mechanization is the manual
operation of a task using powered machinery that depends on human decision making.

Industrial automation is the use of control systems, such as computers or robots,


and information technologies for handling different processes and machineries in an
industry to replace a human being. It is the second step beyond mechanization in the scope
of industrialization.

In a brief, industrial automation can be defined as the use of set technologies


and automatic control devices that results the automatic operation and control of
industrial processes without significant human intervention and achieving superior
performance than manual control. These automation devices include PLCs, PCs,
PACs, etc. and technologies include various industrial communication systems.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 45


The above figure shows the power plant automation provided by Siemens for
achieving sustainable, safe and economic operations. It provides the total integrated
automation (TIA) by automating every section of power plant with efficient control
devices, field sensors and actuating devices. In this automation, SIMATIC modules (PLCs)
are used as control devices while WinCC provides an effective graphical interface.

Why Industrial Automation? (Advantages of Automation System)

To increase productivity
Automation of factory or manufacturing or process plant improves production rate
through a better control of production. It helps to produce mass production by drastically
reducing assembly time per product with a greater production quality. Therefore, for a
given labor input it produces a large amount of output.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 46



To provide optimum cost of operation
Integration of various processes in industry with automated machineries,
minimizes cycle times and effort and hence the need of human labor gets reduced. Thus
the investment on employees has been saved with automation.

To improve product quality


Since the automation reduces the human involvement, the possibility of human
errors also gets eliminated. Uniformity and product quality with a greater conformity can
be maintained with automation by adaptively controlling and monitoring the industrial
processes in all stages right from inception of a product to an end product.

To reduce routine checks


Automation completely reduces the need for manual checking of various process
parameters. By taking advantage of automation technologies, industrial processes
automatically adjusts process variables to set or desired values using closed loop control
techniques.

To raise the level of safety


Industrial automation increases the level of safety to personnel by substituting
them with automated machines in hazardous working conditions. Traditionally, industrial
robots and robotic devices are implemented in such risky and hazardous places.

Hierarchy of an Industrial Automation System


Industrial automation systems can be very complex in nature, having large number
of devices working in synchronization with automation technologies. The figure below
describes the hierarchical arrangement of the automation system consisting of different
hierarchical levels.

Field Level
It is the lowest level of the automation hierarchy which includes the field devices
like sensors and actuators. The main task of these field devices is to transfer the data of
processes and machines to the next higher level for monitoring and analysis. And also it
includes the controlling of process parameter through actuators. For instance, we can
describe this level as eyes and arms of a particular process.

Sensors convert the real time parameters like temperature, pressure, flow, level, etc. into
electrical signals. This sensor data further transferred to the controller so as to monitor
and analyze the real time parameters. Some of the sensors include thermocouple,
proximity sensors, RTDs, flow meters, etc.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 47


On other hand actuators converts the electrical signals (from the controllers) into
mechanical means to control the processes. Flow control valves, solenoid valves,
pneumatic actuators, relays, DC motors and servo motors are the examples of actuators.

Control Level
This level consists of various automation devices like CNC machines, PLCs, etc.,
which acquires the process parameters from various sensors. The automatic controllers
drive the actuators based on the processed sensor signals and program or control
technique.

Programmable Logic Controllers (PLCs) are most widely used robust industrial controllers
which are capable of delivering automatic control functions based on input from sensors.
It consists of various modules like CPU, analog I/O, digital I/O and communication modules.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 48



It allows the operator to program a control function or strategy to perform certain
automatic operation on process.

Supervising and Production Control Level


In this level, automatic devices and monitoring system facilitates the controlling
and intervening functions like Human Machine Interface (HMI), supervising various
parameters, setting production targets, historical archiving, setting machine start and
shutdown, etc.

Mostly, either Distribution Control System (DCS) or Supervisory Control and Data Acquisition
(SCADA) HMIs are popularly used in this level.

Information or Enterprise Level


This is the top level of the industrial automation which manages the whole
automation system. The tasks of this level include production planning, customer and
market analysis, orders and sales, etc. So it deals more with commercial activities and less
with technical aspects.

And also industrial communication networks are most prominent in industrial


automation systems which transfer the information from one level to the other. So these
are present in all the levels of automation system to provide continuous flow of
information. This communication network can be different one level to the other. Some of
these networks include RS485, CAN, DeviceNet, Foundation Field bus, Profibus, etc.

From the above hierarchy we can conclude that there is continuous information
flow from high level to low level and vice-versa. If we assume this graphical way, it is like a
pyramid in which as we go up, the information gets aggregated and while going down, we
get detailed information about the process.ut it produces a large amount of output.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 49



Types of Industrial Automation Systems

1. Fixed or Hard Automation


This type of automation is employed to perform fixed and repetitive operations in order
to achieve high production rates. It uses special purpose or dedicated equipment to
automate the fixed sequence assembling or processing operations. Once it is employed, it
is relatively hard to change or vary the product design. Therefore, it is inflexible in
providing product variety, but increases the efficiency with higher production rate and
reduces unit cost.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 50


Some of these automated systems are distilled process, paint shops and conveyors.

2. Programmable Automation
In this automation, a specific class of product changes and also assembling or
processing operations can be changed with the modification of control program in the
automated equipment.

This automation is best suited for batch production process where product volume
is medium to high. But in this, it is hard to change and reconfigure the system for a new
product or sequence of operations. Therefore, new product or reconfigure of sequence of
operations requires a long setup.

Examples of this automation system are numerically controlled machines, paper


mills, steel rolling mills, industrial robots, etc.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 51


3. Flexible or Soft Automation


This automation system provides the automatic control equipment that offers a
great flexibility for making changes in the product design. These changes can be performed
quickly through the commands given in the form of codes by the human operators.

This automation allows the manufacturers to produce multiple products with


different ranges as a combined combination process rather than separate.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 52


Some of the examples of this automation system are automatic guided vehicles,
automobiles, and multipurpose CNC machines.

Industrial Revolutions 4.0

Industry 4.0 is used interchangeably with the fourth industrial revolution and
represents a new stage in the organization and control of the industrial value chain.

Cyber-physical systems form the basis of Industry 4.0 (e.g., ‘smart machines’). They
use modern control systems, have embedded software systems and dispose of an Internet
address to connect and be addressed via IoT (the Internet of Things). This way, products
and means of production get networked and can ‘communicate’, enabling new ways of
production, value creation, and real-time optimization. Cyber-physical systems create the
capabilities needed for smart factories. These are the same capabilities we know from the
Industrial Internet of Things like remote monitoring or track and trace, to mention two.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 53


Industry 4.0 is often used interchangeably with the notion of the fourth industrial
revolution. It is characterized by, among others:
• Even more automation than in the third industrial revolution,
• The bridging of the physical and digital world through cyber-physical systems,
enabled by Industrial IoT,
• A shift from a central industrial control system to one where smart products
define the production steps,
• Closed-loop data models and control systems and

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 54



• Personalization/customization of products

Industry 4.0 applications today


While many organizations might still be in denial about how Industry 4.0 could
impact their business or struggling to find the talent or knowledge to know how to best
adopt it for their unique use cases, several others are implementing changes today and
preparing for a future where smart machines improve their business. Here are just a few
of the possible applications:

Identify opportunities: Since connected machines collect a tremendous volume of


data that can inform maintenance, performance and other issues, as well as analyze that
data to identify patterns and insights that would be impossible for a human to do in a
reasonable timeframe, Industry 4.0 offers the opportunity for manufacturers to optimize
their operations quickly and efficiently by knowing what needs attention. By using the data
from sensors in its equipment, an African gold mine identified a problem with the oxygen
levels during leaching. Once fixed, they were able to increase their yield by 3.7%, which
saved them $20 million annually.

Optimize logistics and supply chains: A connected supply chain can adjust and
accommodate when new information is presented. If a weather delay ties up a shipment,
a connected system can proactively adjust to that reality and modify manufacturing
priorities.

Autonomous equipment and vehicles: There are shipping yards that are leveraging
autonomous cranes and trucks to streamline operations as they accept shipping containers
from the ships.

Robots: Once only possible for large enterprises with equally large budgets,
robotics are now more affordable and available to organizations of every size. From picking
products at a warehouse to getting them ready to ship, autonomous robots can quickly
and safely support manufacturers. Robots move goods around Amazon warehouses and
also reduce costs and allow better use of floor space for the online retailer.

Additive manufacturing (3D printing): This technology has improved tremendously


in the last decade and has progressed from primarily being used for prototyping to actual
production. Advances in the use of metal additive manufacturing have opened up a lot of
possibilities for production.

Internet of Things and the cloud: A key component of Industry 4.0 is the Internet of Things
that is characterized by connected devices. Not only does this help internal operations, but

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 55



through the use of the cloud environment where data is stored, equipment and operations
can be optimized by leveraging the insights of others using the same equipment or to allow
smaller enterprises access to technology they wouldn’t be able to on their own.

Netiquettes and code of conduct for IT professionals

Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. This includes
several aspects of the Internet, such as email, social media, online chat, web forums,
website comments, multiplayer gaming, and other types of online communication.

While there is no official list of netiquette rules or guidelines, the general idea is to
respect others online. Below are ten examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).


2. Respect others' privacy by not sharing personal information, photos, or videos
that another person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or
lose.
5. Don't troll people in web forums or website comments by repeatedly nagging
or annoying them.
6. Stick to the topic when posting in online forums or when commenting on
photos or videos, such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead,
break the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.

The Internet provides a sense of anonymity since you often do not see or hear the
people with whom you are communicating online. But that is not an excuse for having poor
manners or posting incendiary comments. While some users may feel like they can hide
behind their keyboard or smartphone when posting online, the fact is they are still the
ones publishing the content. Remember – if you post offensive remarks online and the veil
of anonymity is lifted, you will have to answer for the comments you made.

In summary, good netiquette benefits both you and others on the Internet. Posting
a positive comment rather than a negative one just might make someone's day.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 56


Chapter 6
IT Trends, Issues, and Challenges

Learning Objectives

At the end of this chapter the students should be able to:


1. Describe and explain IT and the issues and challenges surroundings its application in various
fields

Learning Contents

Uses of Computers in different fields of:


• Education
• Art
• Healthcare
• Office
• Banks
• Industry
• Simulation Training
• Engineering
• Store (Markets)
• Law
• Air System
• Defense
• Communication & Networking
• Home

IT and the issued and challenges surrounding its application in various fields such as
Banking, Education, health, and business, among others.

Uses of Computers in different fields

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 57



The word & logic of the computer is very old. If we go back about 50-years, there was no awareness
about the computer and none of us known about the computer and its role in our daily work. But
its importance and role are gradually increased. Difficult tasks have been done by a computer. So,
it turns into an essential tool for our work.
Everyone has his own opinion about the computer. Somebody feels very happy when a
complicated task is done by them in a short period very quickly and accurately. However, feel very
bad when you are doing urgent work and the system suddenly gets stuck or power failed.

Initially, the size of the computer was large as room size, but simultaneously it turns to smaller as
an embedded computer.

A computer controls other devices automatically like micro ovens, Industrial Robots, children’s
toys, digital cameras, and other devices.

A modern computer is based on integrated Circuits technology and stores data and records.
Therefore, it is distinguished from other calculating devices like a calculator.

Infect computer is used in a wide range in every field. Let us discuss the importance/uses of
computer and, how it can work better for us?

Importance/Uses of Computer in Education:


No country can make progress without technical education. Computer plays a vital role in
education. It is used in schools and colleges for teaching purposes. Students learn about computer
technology and get a qualified degree in computer technology. Teachers use computers to teach
the student about, e.g.

• How to use a computer for research?


• How to use a computer in the office like (word processor, spreadsheet, database, and
presentation, etc.)?
• How to install windows and computer application program?
• How to remove errors of the computer?
• Internet is a popular network and students can make their research (a person’s activity based
on intellectual application in the study of the subject) in the selected subject. Students can
utilize internet services to learn more about their subject and improve their vocabulary. They
can get better information from the internet about the selected topic and subject. Each
system can be improved by computer, so the computer may consider as an essential part of
education.
• Now there are online academies who teach online. You can register online in these academies
as a teacher as well as a student. They also provide an online education degree to the students.

Importance/Uses of Computer in Art:

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 58



The uses of the computer are flexible and are not limited to the field of science and technology.
Art and gallery is also a part of education. Computer assists the people to write books, draw
cartoons, compose songs, design graphical pictures and create special effects in movies.

Importance/Uses of Computer in Healthcare:


Each country is responsible to procure advanced healthcare to the people. Providing good
healthcare is not possible without using a computer. The importance/uses of computer in
healthcare are necessary. The health department of each country is responsible to defend the
people from the diseases. Therefore, updated reports are available online regarding hygienic,
diseases, medicines and researches. People can get help from these updated reports publishing
from time to time.

• One of the most importance of computer is to keep a record of blood groups of the persons
and their contact numbers on the computer.

The internet is also playing a vital role in the health department. We can send and receive
patient reports in a short time.

• Storing of data is very important in hospitality because the computer is used to keep the staff,
patients, medicines and budget record.

• A doctor diagnoses various types of hazardous diseases, e.g. heart diseases, eye and sight
defects, kidney stone, etc. by the help of special types of software and computerized
diagnostic tools such as ECG, Ultrasounds, MRI, and CT scan. Corrective solution and medicine
arrange to the patients accordingly. Doctors use the computer to keep the patient’s record,
e.g. symptom of the patients and their treatment record can help the doctor in research.

• A gynecologist can trace the position and condition of the newborn child.

Importance/Uses of Computer in Office:


The office is a room or place where manage an organization or department works. Each and
every organization or department uses a computer in their office to managing the work, e.g. type
document, preparing of presentation, manages accounts matter, drawing maps, send emails and
browsing. We take print of all mandatory letters and documents of the concern organization or
department for keeping the official record. Earlier, this work was done by a type machine, but now
this job is done by the computer with a printer instead of a typewriter. A computer makes easy our
work in the office instead of typing machine. It saves our time because we can edit the files instead of
retyping which have already been saved in our computer.

• Now it is the time of information technology. Anyone, who wants to do a job in the office, he
may familiar with a computer and its software. It allows us to quickly respond to the services.
Therefore, we may use an internet connection which plays a crucial role in this regard. Any
office can move and share their essential documents through email immediately without loss

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 59



of time. Any organization/company can launch its own website to release updates related to
their department, organization, business.

• It is very important to keep information about employees in a computer of the organization.


Database software is used to make a complete database of the company. We can prepare any
type of report of the organization or company by analyzing this data.

Importance/Uses of Computer in Banks:


Banks deal with the customers for paying or depositing money. Computer plays vital roles in
the bank because each bank is working under a database network. In banks, this database is stored on
the computer server. It is possible with the computer to avoid account from duplication and control
the client’s record, e.g. depositing and withdrawal amount.

• ATM (Automatic Teller Machine) is used in bank to withdrawal amount any time. This all could
be controlled by the computer. This machine helped the clients and avoided them from long
queues.

• Internet banking provides online facility to the clients to get full information about its account.
A client can transfer the amount to another account and pay their bills online. Customer can
also check all transactions of account.
Bank cheques have special characters and numbers of magnetized ink reads by MICR and data
send to the computer. MICR checks the validity and accuracy of the cheques.

• CCT’s cameras are installed in the bank, which captures and stores potages of the bank
circumstances. These cameras are controlled by the computer which helps security agencies
to identify criminal persons.

Importance/Uses of Computer in Industry:


Industries are the main resource of the economy of the country. Enormous types of machinery
are used in the industry. These machineries are run and controlled by the computer. It also sets
objectives of monitoring and progress of the industry, e.g. business activities related productions,
profit, and loss, etc.

• All manufacturing process can also be monitored and controlled by a computer, e.g. computer
shows and control temperature of the manufacturing process. Some industries use robots (a
programmable machine which automatically handles hard tasks) where human access is not
possible.

• A computer is also used for administrative purpose of the industry. Keeping of employee’s
data, appointments, salaries, pensions, etc. all are prepared by a computer.

Importance/Uses of Computer for Simulation Training:

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 60



The computer can be used to train people such as Pilots. A working model of an aeroplane cockpit is
built with a large screen in front of it. On the screen, the computer shows a picture that a pilot sees
from a real cockpit. Simulation techniques are used to teach everything of piloting, learn safety
procedure in an oil company, bomb-making, temperature and pressure constraints in natural gas
pipelining, etc.

Importance/Uses of Computer in Engineering:


The role and importance of computer are very significant in each field of engineering, e.g. computer
engineering, civil engineering, electrical engineering, mechanical engineering, etc.

• Auto CAD (automatic computer aided design) is the computer software which is used by the
engineers, designers, and architectures for designing of vehicles, mapping of buildings, roads,
bridges, and industries, etc.

• Engineers draw the sketch of each point of the object. We can define a complete sample of
the object with the help of a 3D image by the help of Auto CAD.

• By using this software you can better understand the project, data consistency, and make
responsive edition.

Uses/Importance of Computer in Store (Markets):


The store is the place where different types of items are lying for selling or buying. All the data of the
items are fed to the computer to show the economic status of the store.

• All activities of the market are controlled by the computer that identified the current status
of the market.
Now the online business is growing. There are online stores available on the internet. We can
quote order for any product, and the company ships their products at the home address. Most
of the companies are selling their digital products online, e.g. computer software, video
tutorials, ebooks, etc. these companies are doing very successful business.

• It is the time of social media where we give advertisement regarding our online and offline
business products.

• The market is an organization or place where different types of goods, items are lying to sell
or buy it and the process is known as Marketing. Each product has own UPC (Universal Product
Code) in the form of black and white strips. These bar codes are read by (BRC) Bar Code Reader
device and data is direct goes to the computer.

Uses/Importance of Computer in Law:


The uses of computer in law chamber are very important for keeping the record of the cases. Lawyers
studies and take assistance from these cases which have been already decided.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 61



Importance/Uses of Computer in Police & Traffic Department:
The uses of computer in the police department are to catch criminals. For this purpose computerized
cameras and scanners are used to prevent any criminal activity. All the information about the crime
can be fed into the computer. Traffic lights are also controlled by the computer which is “ON” “OFF”
with the regular intervals. The traffic department has also a record of registered, non-registered and
stolen vehicles.

Importance/Uses of Computer in Air System:


The Uses of Computer in the air system is very significant. It provides all of the information about
flights and seat reservation. For example time of arrival and departure, seat information, cancellation
of flight, atmospheric condition, etc.

A computer is also used to control space flight, its communication and to keep a constant check on all
the equipment. When a fault occurs, the computer is used to find out the cause and eliminate the
fault. The computer also plays a great role in the launching of the satellite and controls all the system.

Importance/Uses of Computer in Defense:


Like another department computer also play a great role in the army and defense system. All the new
weapons and defense appliances are run and controlled by the computer. For example, atomic
technology, missiles technology, tanks, radars, and airforce is totally computerized. Coordinates
system is used to target the correct position of the enemy, which is online possible by the computer.

Uses/Importance of Computer in Communication & Networking:


Communication is the process through which we can exchange information from one computer to
another computer.

A computer is a good communicating and networking machine. All other communication devices like,
telephone, mobile, television and radio are also controlled by the computer. Now all information is
exchanged through a computer. A computer can work as a telephone and mobile and we can make
and receive calls and messages through a computer.

IRMA T. PLATA, DIT | DARIOS ALADO, DIT 62


The computer network is the group of computers and workstations connected together via cable or
wireless. Computer with internet line connects us to a global network. Now it became a need for
everyone. All information is exchanged through this network.

Uses/Importance of Computer in Home:


Computer plays a very significant role at our home. We can do every work by computer with an
internet connection from home.

A student can make their research, reading books, viewing tutorials videos, etc. Students can also
prepare their own academic notes. Online dictionaries are also available and it is very useful to
increase vocabulary.
We can run own online business from home, e.g. blogging, freelancing, digital marketing, and store,
etc.
A computer is also a toy of entertainments and we can use a computer at home for playing games,
drawing pictures, playing music, viewing movies and dramas, etc. Uses/Importance of Computer for
Online Earning:

Online earning has now become a trend where the computer takes place like a root tool. Most
businesses are now converting to online business. Computer Professional is earning hundreds &
thousand dollars online from blogging, freelancing, create tutorials, writing ebooks, etc.

References:

1. Alavudeen, A.; Venkateshwaran, N. (2010), Computer Integrated Manufacturing, PHI


Learning, ISBN 978-81-203-3345-1
2. Chaudhuri, P. Pal (2004), Computer Organization and Design, PHI Learning, ISBN 978-81-
2031254-8
3. Han, Jiawei; Kamber, Micheline; Pei, Jian (2011), Data Mining: Concepts and Techniques
(3rd ed.), Morgan Kaufmann, ISBN 978-0-12-381479-1
4. Lavington, Simon (1980), Early British Computers, Manchester University Press, ISBN 978-
07190-0810-8
5. Lavington, Simon (1998), A History of Manchester Computers (2nd ed.), The British
Computer Society, ISBN 978-1-902505-01-5
6. Pardede, Eric (2009), Open and Novel Issues in XML Database Applications, Information
Science Reference, ISBN 978-1-60566-308-1
7. Ralston, Anthony; Hemmendinger, David; Reilly, Edwin D., eds. (2000), Encyclopedia of
Computer Science (4th ed.), Nature Publishing Group, ISBN 978-1-56159-248-7
8. van der Aalst, Wil M. P. (2011), Process Mining: Discovery, Conformance and Enhancement
of Business Processes, Springer, ISBN 978-3-642-19344-6
9. Ward, Patricia; Dafoulas, George S. (2006), Database Management Systems, Cengage
Learning EMEA, ISBN 978-1-84480-452-8
10. Weik, Martin (2000), Computer Science and Communications Dictionary, 2, Springer, ISBN
978-0-7923-8425-0
11. Wright, Michael T. (2012), "The Front Dial of the Antikythera Mechanism", in Koetsier,
Teun; Ceccarelli, Marco (eds.), Explorations in the History of Machines and Mechanisms:
Proceedings of HMM2012, Springer, pp. 279–292, ISBN 978-94-007-4131-7

IRMA T. PLATA, DIT | ARIOS ALADO, DIT 63

You might also like