GT101 - Meetings 1 To 6
GT101 - Meetings 1 To 6
GT101 - Meetings 1 To 6
Meeting #1
Chapter #1 (INFORMATION TECHNOLOGY, THE INTERNET, AND YOU)
INFORMATION SYSTEMS
•Parts of the information system: People - Procedures - Software - Hardware - Data – Internet.
1. PEOPLE
• People are the most important part of an information system. • Our lives are touched everyday by computers direct and indirect.
–Direct: such as creating documents using a word processing program or when connecting to the internet.
– Indirect: such as using computers in medicine, entertainment, education and business.
2. PROCEDURES
• Procedures are the rules or guidelines for people to follow when using software, hardware and data.
• They are typically documented in printed or electronic manuals written by computer specialists.
3. SOFTWARE
• Programs (Software)* are the instructions that tell the computer how to do its work. • The purpose of software is to
convert data (unprocessed facts) into information (processed facts)
• Two major kinds of software: ₋ Application Software (think of it as the kind of programs you use; e.g. Word processors)
₋ System Software (think of it as the kind of programs the computer uses; e.g. Operating Systems)
*Actually, there is a difference between the two terms but it is beyond the scope of this course.
4. HARDWARE
• Computers are electronic devices that can follow instructions to accept input, process it and produce information.
• There are four types of computers :
• Supercomputers: special, high-capacity computers used by very large corporations. They are used to process massive
amount of data; e.g. used to analyze and predict worldwide weather patterns.
• Mainframe computers: occupy specially wired, air-conditioned rooms; e.g. used by insurance companies to process
information about millions of policyholders.
• Midrange computers (Servers): used by medium-size companies or departments of large companies; e.g. used for
retrieving data from a database.
• Personal computers (PCs): The most widely used and fastest-growing type of computers.
Types of PCs include: • Desktops • Laptops (Notebooks) • Tablets • Smartphones • Wearables
❖ Hardware is the equipment that processes the data to create information. It is controlled by software.
❖ Hardware for a PC system falls into four basic categories: – System unit – Input/output – Secondary storage – Communication.
5. Data
• Data is raw, unprocessed facts including text, numbers, images and sounds.
• Processed data becomes information. • Digital data is stored electronically in files.
• Four common types of files are: – Document files – Worksheet files – Database files – Presentation files.
1. Document files: created by word processors to save documents such as letters and memos.
2. Worksheet files: created by spreadsheets to analyze things like budgets and to predict sales.
3. Database files: created by database management programs to contain highly structures and organized data
such as the information stored about students of a university.
4. Presentation files: created by presentation graphics programs to save presentation materials.
CONNECTIVITY
• Almost all information systems provide a way to connect to other people and computers, typically using the Internet.
• Connectivity is the capability of your personal computer to share information with other computers.
• Central to the concept of connectivity is the network.
• A network is a communications system connecting two or more computers.
• The largest network in the world is the Internet.
• The web provides a multimedia interface to the numerous resources available on the Internet.
WEB UTILITIES
• Utilities are programs that make computing easier.
• Web Utilities are specialized utility programs that make using the Internet and the web easier and safer.
• Some utilities are browser-related programs.
• Others are designed to protect children from dangerous and inappropriate websites materials.
• Examples: – Plug-Ins – Filters – File Transfer Utilities – Internet Security Suites.
1. PLUG-INS
• Plug-ins are programs that are automatically started and operate as a part of your browser.
• Some of these plug-ins are included in many today’s browsers and operating systems.
Others must be installed.
• Some widely used plug-ins are shown in the table.
2. FILTERS
• Filters are programs that allow parents and organizations to block
access to selected sites.
• These programs can monitor use and generate reports about total
time spent on the Internet and the time spent at individual websites.
• List of the best-known filters is shown in the table.
COMMUNICATION
• Communication is the most popular Internet activity. • Some Popular types of Internet communication are:
– Electronic mail (e-mail) – Messaging – Social networking – Blogs, microblogs, webcasts, podcasts and wikis
COMMUNICATION: E-MAIL
• E-mail or electronic mail is the transmission of electronic messages over the Internet.
• An email message has three basic parts:
1. Header , include; Addresses (To, Cc and Bcc) - Subject - Attachments – 2. Message 3. Signature
• E-mail can be a valuable asset in your life. However, like many other valuable technologies, there are drawbacks too.
• Spam is junk, unwanted or unsolicited e-mail.
• Computer viruses or destructive programs are often attached to spams.
• To control spams: – Spam blockers (Spam filters) – Antispam laws (E.g. In USA, CAN-SPAM requires that every
marketing related e-mail provide an opt-out option).
COMMUNICATION: MESSAGING
There are two main types of messaging:
• Text messaging (known as texting or SMS) – It is the process of sending a short electronic message (typically less than
160 characters). – It was originally limited to characters but now you can send images, video, and sound using a variation
of SMS known as MMS (Multimedia Messaging Service).
• Instant Messaging (IM) – It allows two or more people to contact each other via direct, live communication. – Most IM
programs also include video conferencing features, file sharing, and remote assistance. – Most widely used instant
messaging services: Facebook Messenger and Google Hangouts.
SEARCH TOOLS
• The Web provides a huge source of information that requires tools to help locate information.
• Search services are organizations operate websites that can help you locate the information you need. – They provide
special programs called spiders that continually look for new information and update the search services' databases. –
They also provide special programs called search engines to locate specific information on the web.
– Search engines are specialized programs that assist you in locating information on the web.
– Examples on search engines are: Google, Bing and Yahoo.
• Not all the information you find on the web is accurate.
• To evaluate the accuracy of web information, consider the following:
– Authority: Is the author an expert in the subject area? Is the site an official site for the information presented, or is the site an individual's personal website?
– Accuracy: Has the information been critically reviewed for correctness prior to posting on the web?
– Objectivity: Is the information factually reported or does the author have a bias?
– Currency: Is the information up to date? Does the site specify the date when the site was updated?
CLOUD COMPUTING
• Cloud computing uses the Internet and the Web to shift many computer activities from the user’s computers and
other computers on the Internet. •It frees end-users from owning, maintaining, and storing software programs and data.
•It provides access to these services from anywhere through an Internet connection.
The basic components to cloud computing: • Clients (end-users). • The Internet. • Service providers: Such as Google
Drive Apps, which provides free access to programs with capabilities similar to Microsoft’s Word, Excel and PowerPoint.
CLASSROOM NETIQUETTE
• Turn off your cell phone in formal settings, such as class or work. • Don’t send texts or make calls while someone
else is speaking. • Stay on task (not on Facebook) when taking notes during class. • Never use headphones
connected to your computer. • It’s still cheating, and therefore wrong, to text or receive answers to problems
during class or exams.
DISTANCE LEARNING
• Distance learning is a form of education in which students participate via the web or other kinds of technology such as
teleconferencing.
• Rather than meeting in a traditional classrooms where the instructor and students are physically present, distance
learning classes are virtual.
Distance learning classes offers many advantages including: – You can take a distance learning course anywhere that you
have access to the web (at home, library, on vacation). – They are more flexible than traditional classes (no specific time).
– Contact with instructor may be greater. – Shy students may find writing their responses easier than speaking them in
front of a class. – You can become a better writer.
Distance learning classes have disadvantages/challenges including: – You are a prisoner of technology. – You won’t have
face-to-face contact with your instructor or classmates. – You won’t get immediate feedback. – You need to have
discipline, personal responsibility, and time management skills.
P.O.W.E.R. PLAN
• Despite the potential challenges of distance learning courses, they are becoming increasingly popular.
• Many colleges are offering MOOC (Massive Online Open Courses) which are free and attracting many
students.
• If you are considering taking a distance learning course, you need to follow the steps of the P.O.W.E.R. plan.
IDENTIFY FOR DISTANCE-LEARNING COURSE POSSIBILITIES
•How to find and prepare for an online course? – Check your college. –Do an internet search. – Make sure your
college/work will give you credit for the course. – Consider whether or not the course requirements will fit in your
schedule. –Get feedback from others who have taken the course, if possible.
OBTAIN ACCESS TO TECHNOLOGY
• You don’t have to be a computer expert, but you have to: – Have an e-mail account. – have a computer with Internet
connection. – have the basic computer skills – familiarize yourself with the Learning Management System (LMS) before
the course starts.
• LMS is a software that delivers distance learning course to your computer. It provides the course content including:
material to read, course syllabus, calendar, exercises and grades.
PARTICIPATE IN DISTANCE LEARNING PLAN
• The skills needed online courses is very different from that of traditional courses, including: – Manage your time
carefully. – Check in the LMS and your email frequently. – Find an online partner to help you share study strategies, form
a study group and share notes. – Have a technology backup plan. ▪ Use a cloud storage such as Dropbox or Google Drive.
Even if your computer crashes you’ll be able to access your files from any computer.
CONSIDER YOUR “CLASSROOM” PERFORMANCE
• As with any class, students get feedback from instructors. – Make sure to get the best of your instructor's comments
to improve you understanding and performance in the course.
• In distance learning classes, comments may come from fellow students. They may respond to your comments on
online discussion forums with their comments. – Consider what you can learn from their comments. – Ensure that your
feedback to your classmates is polite.
TYPES OF COMMUNICATION
• Oral communication is the use of spoken words to exchange ideas and information. – Examples: one-to-one
conversation, meetings, voice messages and teleconferencing. – Can be sent instantly and provides immediate feedback.
– Disadvantages: there is little time to reflect and there is no written record.
• Written communication is the exchange of information through the use of written words and sentences. – Examples:
letters, faxes, text messages, emails, reports, tables, diagrams, charts and graphs. – Proves information was exchanged.
– Disadvantage: no immediate feedback.
• Nonverbal communication is communication without words. – Examples: body language gestures, facial expressions
and body movements or positions. – Sometimes stronger than verbal messages – Effective communicators combine oral
and nonverbal techniques.
PURPOSES OF COMMUNICATION
There are four main purposes of communication:
1. To inquire—”Which cell phone did you choose?”
2. To inform—”I chose the cell phone with the most free apps.”
3. To persuade—”You should buy this cell phone today before we run out of stock.”
4. To develop goodwill—”Thank you for buying your new cell phone from our company.”
COMPONENTS OF COMMUNICATION
The six basic components of communication:
1. Message sender—composes the intended message.
2. Actual message—may or may not be the intended message.
3. Message transmission—determined by the specific situation.
4. Message receiver—takes delivery of the message.
5. Message interpretation—is done by the receiver.
6. Feedback—is provided by both sender and receiver
3. Assess the needs of the receiver. - By helping the receiver satisfy the higher
two levels of needs the sender can improve communication. - The higher two levels
are esteem and self-actualizing.
4. Apply Interpersonal Skills: - Interpersonal skills is the ability to understand and deal with people in a way that
maintains a favorable relationship and goodwill.
▪ Use the you-attitude which puts the reader or listener first. • Example of the you-attitude: “For your convenience, we
are extending our clinic hours to 9 p.m.”. • The I-attitude is the opposite, putting the senders’ interests first. • Example
of the I-attitude: “Because it fits my schedule better, I have decided to extend the clinic hours to 9 p.m.”
▪ Be a good listener by listening carefully, asking questions, taking notes and letting the speaker know you are
interested.
▪ Maintain confidentiality by releasing information to authorized personnel at the appropriate time, not early and not
▪ Be considerate. • Treat others as you would like to be treated. • A good communicator is courteous, honest, patient
and respect the opinions of others.
Meeting #3
Gt101 - Chapter #5
Some common errors in judgment that interfere with effective critical thinking:
• Stereotypes: judgments held by a person or group about members of another group.
• All-or-nothing thinking: seeing events or people in black or white.
• Snap judgments: decisions made before gathering all necessary information.
• Projection: to attribute to others some of your traits to justify your faulty judgments or actions.
• Sweeping generalizations: apply one experience to a whole group or issue.
• Halo effect: to label a person good based on one or two qualities or actions.
• Negative labeling: is focusing on and identifying with shortcoming, e.g. instead of saying “I made a mistake” you say, “I
am looser”.
MATH AND SCIENCE APPLICATIONS -- Problem-Solving Strategies for Math and Science include:
─ Make a model or diagram: it helps in organizing and visualizing the problem.
─ Draw, illustrate, and make tables, charts, or lists: it helps in organizing and therefore look for patterns.
─ Look for patterns and connections: a pattern is regular, systematic repletion that helps you in predictions.
─ Act out the problem: physically act out the problem sometimes it help in finding the solution.
─ Simplify: solve related easier cases.
─ Translate words into equations: write an equation that model the problem.
─ Estimate, make a reasonable guess, check the guess, and revise: e.g. if we say Sami is older than Sarah (9yrs Old) but
younger than Ali (11yrs Old) then you can guess that Sami is about 10yrs Old.
─ Summarize in a group: working in group can help you learn.
─ Take a quick break: it help in refreshing.
- Violates your integrity. - Brings high risks . - Creates academic problems. - Erodes confidence. - Increases stress.
PLAGIARISM
Plagiarism is when you use someone else’s ideas in your writing without acknowledging your source.
• Plagiarism has many forms:
– Copying in part or full from anyone, including friends, classmates, and internet sources.
– Copying word-for-word without using quotation marks and not citing the source.
– Paraphrasing by replacing few words or rearranging sentences and not citing the source.
2. When paraphrasing:
• Paraphrasing should not include the words of the original text nor follow the same sentence structure.
• To avoid plagiarism: use your own words to produce the ideas that you read and avoid using statements in the original
form without putting them in quotes.
• Paraphrased information should be accompanied by citation in the text after the paraphrased section, otherwise it will
be interpreted as plagiarism even if the source is in your bibliography.
PENALTIES OF PLAGIARISM
• Plagiarism is an act of theft of intellectual property and academic institutions are applying severe penalties to students
whose works are plagiarized.
• Penalties can range from discounting the work to failing the course.
*********
Meeting #4
Chapter #7 (APPLICATION SOFTWARE)
INTRODUCTION
• Not long ago, trained specialists were required to perform many operations such as market analysis, calculation of
project sales or designing graphic.
• Now you can do all these tasks—and many others—with a personal computer and the appropriate application
software.
• Application software can be described as end user software and is used to accomplish a variety of tasks.
• Three categories of application software: ₋ General-Purpose Applications ₋ Specialized applications ₋ Mobile apps.
General-Purpose Applications
- Word processors allow you to create, edit, save and print text-based documents (e.g. Microsoft Word )
- Spreadsheets are programs that organize, analyze and graph numeric data such as budgets and financial reports (e.g.
Microsoft Excel)
- Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting
presentations (e.g. Microsoft Power-Point)
- Database management systems are programs that sets up, or structures, a database (e.g. Microsoft Access)
Specialized applications
• Specialized applications are widely used within specific professions.
• These programs include graphics programs. Graphics programs types: -
Desktop publishing programs (e.g. Adobe InDesign) - Image editing programs (e.g. Adobe Photoshop) - Illustration
programs (e.g. Adobe Illustrator) - Video editors (e.g. Windows Live Movie Maker).
OPERATING SYSTEM
• An operating system is a collection of programs that handle technical tasks related to using a computer.
• An operating system is the most important type of computer program.
• Without a functioning operating system, your computer would be useless.
• Examples: Windows 10 or Mac OS X.
• Operating systems store data and programs in a system of files and folders. • Files are used to store data and
programs. • Folders are used to store related files. • A folder can contain other folders or subfolders.
• The most widely used output devices are: - Monitors - Printers - Audio-output devices.
1.Types of monitors: - Flat-panel monitors - Curved monitors - E-books readers - Digital or interactive whiteboards -
Ultra-high-definition television (UHDTV) - Digital projectors.
2. Types of printers: Inkjet Printers - Laser Printers - 3D Printers.
3. Types of Audio-Output Devices: Speakers – Headphones
COMPONENTS
• Personal computers come in a variety of different sizes, shapes, and capabilities. However, they share similar
components: - System boards - Microprocessors – Memory.
3. OPTICAL DISCS
• A laser beam alters the surface of a plastic or metallic disc to represent data.
• Examples:
- CDs: store 700 MB (megabytes).
- DVDs: Store 4.7 GB (gigabytes).
- Blu-ray discs:
▪ The newest form of optical storage.
▪ Store 50 GB.
Meeting #5
Chapter #12 (COMMUNICATIONS AND NETWORKS)
• Communication networks are the backbone of nearly every aspect of modern digital life.
• In the future, telepresence will be commonplace.
– Telepresence ) )التواجد عن بعدis the ability to fully experience the reality of a different place without actually being there.
– For Example; Doctors will routinely perform surgery on patients located halfway around the world!
•We live in a truly connected society. As the power and flexibility of our communication systems have expanded, the
sophistication of the networks that support them has become increasingly complex.
• We need to understand the concept of connectivity, wireless networking and the elements that make up network and
communications systems.
• Computer communication is the process of sharing data, programs and information between two or more computers.
• There are many applications that depend on communication systems such as E-mail, Texting, videoconferencing and
electronic commerce.
• Connectivity is a concept related to using computer networks to link people and resources.
• The wireless revolution: mobile devices like smartphones and tablets with wireless Internet connectivity have brought
dramatic changes in connectivity and communications.
• Communication systems are electronic systems (wired or wireless) that transmit data from one location to another.
❖ Communication system has four basic elements:
1. Sending and receiving devices: the computers (devices) that send and receive messages in the form of data
and information.
2. Communication channel: the actual connecting medium that carries the messages. This medium can be a
physical or wireless.
3. Connection devices: act as an interface between the sending and receiving devices and the communication
channels.
4. Data transmission specifications: rules and procedures that coordinate the sending and receiving devices by
precisely defining how the message will be sent across the communication channel.
COMMUNICATION CHANNELS
• Communication channels carry data from one computer to another.
• There are two categories of communication channels:
1. Physical connections: use a solid medium (wire or cable) to connect sending and receiving devices.
2. Wireless connections: do not use a solid substance to connect sending and receiving devices. They move data through the air.
* In line of sight communications waves can only travel in a straight line, sending and receiving devices must be in clear view of each other
without any obstructions blocking that view.
CONNECTION DEVICES
• Telephones send and receive analogue signals, which are continuous electronic waves.
• Computers send and receive digital signals.
• To convert the digital signals to analog signals and vice versa, you need a modem.
• The modem is the most widely used connection device that modifies audio, video, and other type of data into a form
that can be transmitted across the Internet.
• The modem enables digital PCs to communicate across different media including telephone wires, cable lines and
radio waves.
NETWORK
• A computer network is a communication system that connects two or more computers.
• In a network, computers can exchange information and share resources.
Network Types:-
• Though these programs are usually smarter than humans could be, they aren't perfect. Sometimes, like humans, they
fail.
Chapter #14 (WHOLENESS OF BIG DATA)
• Big Data is an all-inclusive term that refers to extremely large, very fast, highly diverse, and complex data that cannot
be managed with traditional data management tools.
• Big Data includes all kinds of data, and helps deliver the right information, to the right person, in the right quantity, at
the right time, to help make the right decisions.
• This makes; the business grow bigger and generate more data.
DATABASE
• Database is a modelled collection of data that is accessible in many ways.
• In database, data is organized in tables.
• Many database Management Systems (DBMSs) are available to help store and manage data.
– Example of a commercial DBMS is Oracle.
– Example of open source, free, DBMS is MySQL.
DATA VISUALIZING
• Data visualizing helps decision makers to understand data easily.
•It can be done using graphs, dashboards, animations, ...
******
Meeting #6
Chapter #16 (PRIVACY, SECURITY AND ETHICS)
PEOPLE
• As we have discussed, information systems consist of people, procedures, software, hardware, data, and the Internet.
• This chapter focuses on people. While most everyone agrees that technology has had a very positive impact on people,
it is important to recognize the negative, or potentially negative, impacts as well.
• Effective implementation of computer technology involves maximizing positive effects while minimizing negative effects.
• The most significant concerns are privacy, security and ethics.
• Privacy – What are the threats to personal privacy and how can we protect our selves?
• Security – How can access to sensitive information be controlled and how can we secure hardware and software?
• Ethics – How do the actions of individual users and companies affect society?
PRIVACY
• Technology makes it possible to collect and use data of all kinds, including information about people.
• The Web sites you visit, the stores where you shop ….
• Privacy concerns the collection and use of data about individuals.
• Three primary privacy issues:
- Accuracy: relates to the responsibility of those who collect data to ensure that the data is correct.
- Property: relates to who owns data.
- Access: relates to the responsibility of those who have data to control and able to use that data.
SECURITY
• We are all concerned with our personal security (e.g. lock our doors). What about computer security?
• Computer hackers are the persons who try to gain unauthorized access to our computers or other computers that
contain information about us.
• Security involves protecting individuals and organizations from theft and danger.
• Computer security specifically focuses on protecting information, hardware, and software from unauthorized use, as
well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
SECURITY: CYBERCRIMES
• Cybercrime or computer crime is any criminal offense that involves a computer and a network.
• Malicious Programs (malware) are specifically designed to damage or disrupt a computer system.
• A cracker is a computer criminal who creates and distributes malicious programs.
• The three most common types of malware are:
1. Viruses are destructive programs attach themselves to programs and databases that can alter or delete files.
2. Worms are programs that replicate themselves causing computers and networks operations slowed or stopped. Worms
can carry a virus.
3. Trojan horses are programs that appear to be harmless; however, they contain malicious programs like viruses. Trojan
horses usually appear as free computer programs that can be downloaded from the Internet.
• Viruses and worms can find their way into PCs through e-mail attachments and programs downloaded from the Internet.
• Zombie is a computer infected by a malware that allows it to be remotely controlled for malicious purposes.
• A collection of zombie computers is known as a botnet, or robot network.
• Antivirus programs such as Symantec and McAfee provide services that keep track and alert users about virus threats.
ETHICS
• The essential element that controls how computers are used is ethics.
• Ethics are standards of moral conduct.
• Computer ethics are guidelines for the morally acceptable use of computers in our society.
Focus on the positives and how you’ll feel when you pass your exam.
Block out the negatives and visualize that success – then go and get it!