GT101 - Meetings 1 To 6

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

AOU - GT101 ( Learning and Information Technology)

Meeting #1
Chapter #1 (INFORMATION TECHNOLOGY, THE INTERNET, AND YOU)
INFORMATION SYSTEMS
•Parts of the information system: People - Procedures - Software - Hardware - Data – Internet.
1. PEOPLE
• People are the most important part of an information system. • Our lives are touched everyday by computers direct and indirect.
–Direct: such as creating documents using a word processing program or when connecting to the internet.
– Indirect: such as using computers in medicine, entertainment, education and business.

2. PROCEDURES
• Procedures are the rules or guidelines for people to follow when using software, hardware and data.
• They are typically documented in printed or electronic manuals written by computer specialists.

3. SOFTWARE
• Programs (Software)* are the instructions that tell the computer how to do its work. • The purpose of software is to
convert data (unprocessed facts) into information (processed facts)
• Two major kinds of software: ₋ Application Software (think of it as the kind of programs you use; e.g. Word processors)
₋ System Software (think of it as the kind of programs the computer uses; e.g. Operating Systems)
*Actually, there is a difference between the two terms but it is beyond the scope of this course.

4. HARDWARE
• Computers are electronic devices that can follow instructions to accept input, process it and produce information.
• There are four types of computers :

• Supercomputers: special, high-capacity computers used by very large corporations. They are used to process massive
amount of data; e.g. used to analyze and predict worldwide weather patterns.
• Mainframe computers: occupy specially wired, air-conditioned rooms; e.g. used by insurance companies to process
information about millions of policyholders.
• Midrange computers (Servers): used by medium-size companies or departments of large companies; e.g. used for
retrieving data from a database.
• Personal computers (PCs): The most widely used and fastest-growing type of computers.
Types of PCs include: • Desktops • Laptops (Notebooks) • Tablets • Smartphones • Wearables
❖ Hardware is the equipment that processes the data to create information. It is controlled by software.
❖ Hardware for a PC system falls into four basic categories: – System unit – Input/output – Secondary storage – Communication.

5. Data
• Data is raw, unprocessed facts including text, numbers, images and sounds.
• Processed data becomes information. • Digital data is stored electronically in files.
• Four common types of files are: – Document files – Worksheet files – Database files – Presentation files.
1. Document files: created by word processors to save documents such as letters and memos.
2. Worksheet files: created by spreadsheets to analyze things like budgets and to predict sales.
3. Database files: created by database management programs to contain highly structures and organized data
such as the information stored about students of a university.
4. Presentation files: created by presentation graphics programs to save presentation materials.
CONNECTIVITY
• Almost all information systems provide a way to connect to other people and computers, typically using the Internet.
• Connectivity is the capability of your personal computer to share information with other computers.
• Central to the concept of connectivity is the network.
• A network is a communications system connecting two or more computers.
• The largest network in the world is the Internet.
• The web provides a multimedia interface to the numerous resources available on the Internet.

Chapter #2 (THE INTERNET, THE WEB, AND E-COMMERCE)


THE INTERNET AND THE WEB
• The Internet is a large network that connects smaller networks all over the globe.
• It was launched in 1969 when the US developed a national computer network called ARPANET.
• At the beginning, the Internet was all text (no graphics, animation, sound or video).
• The World Wide Web or WWW (introduced in 1991) made it possible to include these elements.
• The web is not the Internet. – The Internet is the physical network (made up of wires, cables, etc.). – Being "online"
refers to being connected to this network. – The Web is the multimedia interface to the resources available on the Internet.

THE INTERNET AND THE WEB


The most common uses of the Internet and the Web:
• Communicating – Exchange e-mail, photos and videos. – Discussion groups (forums).
• Searching (for information) – Access some of the world’s largest libraries directly from home computer (virtual libraries).
• Education or e-learning – You can take classes on almost any subject.
• Entertainment – Find music, movies, magazines and computer games. • Shopping

INTERNET ACCESS: PROVIDERS


• Common way to access the Internet is through an Internet Service Provider (ISP).
• The providers are already connected to the Internet and provide a path or connection for individuals to access the Internet.
• The most widely used commercial Internet service providers use telephone lines, cable, and wireless connections.

INTERNET ACCESS: BROWSERS


• Browsers are programs that provide access to web resources.
• A browser connects you to remote computers, opens and transfers files, displays text, images, and multimedia.
• Four well-known browsers: – Apple Safari – Google Chrome – Microsoft Edge – Mozilla Firefox
• For browsers to connect to resources, the location or the address of the resource must be specified.
• This address is called Uniform Resource Locator (URL).
• All URLs have at least two parts
1. Protocol: rules for exchanging data between computers (e.g. http, used for web traffic)
2. Domain name: indicates the specific address where the resource is located. – Each domain name ends with a
Top-level domain (TLD) which tells what kind of organization hosts an email account, such as .com ( for
Commercial) - edu (for education ) – .ORG ( Charitable/Non-profit) – .MIL (Military) - .GOV (Government) .

WEB UTILITIES
• Utilities are programs that make computing easier.
• Web Utilities are specialized utility programs that make using the Internet and the web easier and safer.
• Some utilities are browser-related programs.
• Others are designed to protect children from dangerous and inappropriate websites materials.
• Examples: – Plug-Ins – Filters – File Transfer Utilities – Internet Security Suites.
1. PLUG-INS
• Plug-ins are programs that are automatically started and operate as a part of your browser.
• Some of these plug-ins are included in many today’s browsers and operating systems.
Others must be installed.
• Some widely used plug-ins are shown in the table.
2. FILTERS
• Filters are programs that allow parents and organizations to block
access to selected sites.
• These programs can monitor use and generate reports about total
time spent on the Internet and the time spent at individual websites.
• List of the best-known filters is shown in the table.

3. FILE TRANSFER UTILITIES


File Transfer Utilities help you upload and download files to and from the Internet.
• Three popular types of file transfer are:
– File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP) – Web-based file transfer services (E.g. Dropbox.com) – BitTorrent

4. INTERNET SECURITY SUITES


• An Internet Security Suite is a collection of utility programs designed to maintain your security and privacy
while you are on the Web. • These programs control spam, protect against computer viruses, provide filters and
much more. • You could buy each program separately; however, the cost of the suit is typically much less.
• Three of the known Internet security suites are: – Kaspersky – McAfee – Norton

COMMUNICATION
• Communication is the most popular Internet activity. • Some Popular types of Internet communication are:
– Electronic mail (e-mail) – Messaging – Social networking – Blogs, microblogs, webcasts, podcasts and wikis

COMMUNICATION: E-MAIL
• E-mail or electronic mail is the transmission of electronic messages over the Internet.
• An email message has three basic parts:
1. Header , include; Addresses (To, Cc and Bcc) - Subject - Attachments – 2. Message 3. Signature

• E-mail can be a valuable asset in your life. However, like many other valuable technologies, there are drawbacks too.
• Spam is junk, unwanted or unsolicited e-mail.
• Computer viruses or destructive programs are often attached to spams.
• To control spams: – Spam blockers (Spam filters) – Antispam laws (E.g. In USA, CAN-SPAM requires that every
marketing related e-mail provide an opt-out option).

COMMUNICATION: MESSAGING
There are two main types of messaging:
• Text messaging (known as texting or SMS) – It is the process of sending a short electronic message (typically less than
160 characters). – It was originally limited to characters but now you can send images, video, and sound using a variation
of SMS known as MMS (Multimedia Messaging Service).
• Instant Messaging (IM) – It allows two or more people to contact each other via direct, live communication. – Most IM
programs also include video conferencing features, file sharing, and remote assistance. – Most widely used instant
messaging services: Facebook Messenger and Google Hangouts.

COMMUNICATION: SOCIAL NETWORKING


• Social networking sites focus on connecting people and organizations that share a common interest or activity. •
These sites provide many tools that facilitate meeting, communicating, and sharing.
• Some of the best known sites are:
– Facebook – Instagram – LinkedIn (Currently, it is the premier business-oriented social networking site).
COMMUNICATION: BLOGS AND MICROBLOGS
• Blogs or web logs
– They are personal web sites where articles are regularly posted. – Postings are time-stamped with the newest items
first. – Readers of these sites are allowed to comment. – Some blogs are like online diaries with personal information;
others focus on information, hobby or theme (good books, electronic devices,…). – Several sites provide tools to create
blogs like Blogger and WordPress.
• Microblogs – Publish short sentences that only take a few seconds to write, rather than long stories like traditional
blogs. – Designed to keep friends and other contacts up-to-date on your interest and activities. – The most popular
microblogging site is Twitter.
COMMUNICATION: WEBCASTS AND PODCASTS
• Both webcasts and podcasts deliver media content (such as music and movies) over the Internet to your computer.
• Webcasts use streaming technology in which audio and video files are continuously downloaded to your computer
while you are listening to or viewing the file content. After a webcast has been completed, there are no files remaining
on your computer. (e.g. YouTube.com)
• Podcasts do not use streaming technology. Before a podcast can be run, the media files have to be downloaded and
saved to your computer.
COMMUNICATION: WIKIS
• A wiki is a website specially designed to allow visitors to use their browser to add, edit, or delete the site’s content. •
Wikis support collaborative writing.
• The most common example is Wikipedia.
• Wikipedia is an online encyclopedia written and edited by anyone who wants to contribute.
• Creating blogs and wikis are examples of web authoring.

SEARCH TOOLS
• The Web provides a huge source of information that requires tools to help locate information.
• Search services are organizations operate websites that can help you locate the information you need. – They provide
special programs called spiders that continually look for new information and update the search services' databases. –
They also provide special programs called search engines to locate specific information on the web.
– Search engines are specialized programs that assist you in locating information on the web.
– Examples on search engines are: Google, Bing and Yahoo.
• Not all the information you find on the web is accurate.
• To evaluate the accuracy of web information, consider the following:
– Authority: Is the author an expert in the subject area? Is the site an official site for the information presented, or is the site an individual's personal website?
– Accuracy: Has the information been critically reviewed for correctness prior to posting on the web?
– Objectivity: Is the information factually reported or does the author have a bias?
– Currency: Is the information up to date? Does the site specify the date when the site was updated?

CLOUD COMPUTING
• Cloud computing uses the Internet and the Web to shift many computer activities from the user’s computers and
other computers on the Internet. •It frees end-users from owning, maintaining, and storing software programs and data.
•It provides access to these services from anywhere through an Internet connection.
The basic components to cloud computing: • Clients (end-users). • The Internet. • Service providers: Such as Google
Drive Apps, which provides free access to programs with capabilities similar to Microsoft’s Word, Excel and PowerPoint.

THE INTERNET OF THINGS


• The Internet is becoming more and more a part of our lives. • The Internet of things (IoT) is the continuing
development of the Internet that allows everyday objects embedded with electronic devices to send and receive data
over the Internet. • These everyday objects include smartphones and wearable devices. • For example, Fitbit is a
bracelet that measures health data (such as the number of steps walked, heart rate, quality of sleep, steps climbed, ... )
and sends that data to your smartphone or personal webpage.
Meeting #2
Chapter #3
Technology has developed academic life. Here are some of the ways how you may use technology in your classes:
Course websites: contain basic information about the course such as syllabus, exercises, inline quizzes, grades and announcements.
Textbook companion websites: a website tied to a book that includes summaries, flashcards and practice tests.
Podcasts: video or audio recordings of the class material.
Blogs: kind of web-based public diary in which the writer offers ideas and thoughts.
Classroom presentation programs such as PowerPoint and Apple’s Keynote.
E-MAILS
Emails enable us to communicate with instructors and colleagues.
• Email is to send a message in electronic way.
• There are two basic types of e-mail systems:
1. Client-based e-mail systems : Require a special program known as an e-mail client to be installed on your computer. –
Examples are Apple’s Mail and Microsoft’s Outlook.
2. Web-based e-mail systems : Do not require an e-mail program to be installed on your computer. – Examples of webmail
service providers are Google’s Gmail, Microsoft’s Hotmail, and Yahoo.

• Every email address contains three basic elements:


1. Mailbox name (user name): the name assigned to an account on an email system.
2. @: the “at” sign.
3. Domain name: the name of the organization that hosts the emails to which the users subscribe. Often an institution
(e.g. aou.edu) or an Internet Service Provider (e.g. gmail.com).

An email message has three basic parts:


1. Header, which includes: - Addresses (To, Cc and Bcc) - Subject - Attachments
2. Message
3. Signature, which indicates: - sender’s name - Title - contact numbers, …

SPAM MANAGEMENT AND SAFETY


• Spam is junk, unwanted or unsolicited e-mail.
• Tips for dealing with e-mail spam:
– Consider using two e-mail addresses (one for personal e-mail and another one for newsgroups and chat rooms). – Never
give out your password. – Change your password frequently. – Never respond to e-mails that ask for personal information.
– Do not click on any links in an e-mail until you are sure the e-mail is from a legitimate source. – Never open an e-mail
attachment from someone you don’t know. – Be cautious with social networking sites.
• To control spams you can use spam blockers (Spam filters).

NETIQUETTES FOR WRITING EFFECTIVE E-MAILS


• Netiquette (short for ‘net etiquette’) refers to the rules of good online behavior.
• Some netiquettes for writing emails follow:
– Be respectful and polite specially when e-mailing instructors or work supervisors. – Never send an e-mail or text when
you are angry. – Use an informative subject heading. – Keep messages short and focused. – Make sure the recipient knows
who you are (by using a clear signature). – Avoid abbreviations and emoticons in formal e-mails. – Don’t use ALL CAPITAL
LETTERS (it looks like you’re shouting). – Check spelling and grammar before sending an e-mail.

CLASSROOM NETIQUETTE
• Turn off your cell phone in formal settings, such as class or work. • Don’t send texts or make calls while someone
else is speaking. • Stay on task (not on Facebook) when taking notes during class. • Never use headphones
connected to your computer. • It’s still cheating, and therefore wrong, to text or receive answers to problems
during class or exams.
DISTANCE LEARNING
• Distance learning is a form of education in which students participate via the web or other kinds of technology such as
teleconferencing.
• Rather than meeting in a traditional classrooms where the instructor and students are physically present, distance
learning classes are virtual.

Distance learning classes offers many advantages including: – You can take a distance learning course anywhere that you
have access to the web (at home, library, on vacation). – They are more flexible than traditional classes (no specific time).
– Contact with instructor may be greater. – Shy students may find writing their responses easier than speaking them in
front of a class. – You can become a better writer.
Distance learning classes have disadvantages/challenges including: – You are a prisoner of technology. – You won’t have
face-to-face contact with your instructor or classmates. – You won’t get immediate feedback. – You need to have
discipline, personal responsibility, and time management skills.

P.O.W.E.R. PLAN
• Despite the potential challenges of distance learning courses, they are becoming increasingly popular.
• Many colleges are offering MOOC (Massive Online Open Courses) which are free and attracting many
students.
• If you are considering taking a distance learning course, you need to follow the steps of the P.O.W.E.R. plan.
IDENTIFY FOR DISTANCE-LEARNING COURSE POSSIBILITIES
•How to find and prepare for an online course? – Check your college. –Do an internet search. – Make sure your
college/work will give you credit for the course. – Consider whether or not the course requirements will fit in your
schedule. –Get feedback from others who have taken the course, if possible.
OBTAIN ACCESS TO TECHNOLOGY
• You don’t have to be a computer expert, but you have to: – Have an e-mail account. – have a computer with Internet
connection. – have the basic computer skills – familiarize yourself with the Learning Management System (LMS) before
the course starts.
• LMS is a software that delivers distance learning course to your computer. It provides the course content including:
material to read, course syllabus, calendar, exercises and grades.
PARTICIPATE IN DISTANCE LEARNING PLAN
• The skills needed online courses is very different from that of traditional courses, including: – Manage your time
carefully. – Check in the LMS and your email frequently. – Find an online partner to help you share study strategies, form
a study group and share notes. – Have a technology backup plan. ▪ Use a cloud storage such as Dropbox or Google Drive.
Even if your computer crashes you’ll be able to access your files from any computer.
CONSIDER YOUR “CLASSROOM” PERFORMANCE
• As with any class, students get feedback from instructors. – Make sure to get the best of your instructor's comments
to improve you understanding and performance in the course.
• In distance learning classes, comments may come from fellow students. They may respond to your comments on
online discussion forums with their comments. – Consider what you can learn from their comments. – Ensure that your
feedback to your classmates is polite.

REFLECT ON WHAT AND HOW YOU HAVE LEARNED


• Distance learning is not for every one. As you reflect on your distance learning experience, think about the following:
– Is distance learning for you? – Have you learned the objectives of the course? – Have you learned as much as you think
you would have in a traditional course?
BLENDED LEARNING is another form of education in which studying is combination of both face-to-face and online
methods. • Students in blended courses may spend less time in face-to-face classroom settings and more time working
independently online. • They also may collaborate with fellow students outside of class on the web. • AOU provides
blended learning courses. • Blended learning overcomes most of distance learning system disadvantages.
Chapter #4
ESSENTIAL PRINCIPLES
There are many ways that individuals and groups communicate.
• Communication is the exchange of information. – The basic skills in the communication process are: speaking,
listening, reading, and writing.
• Social media are online communities that use technology to communicate among individuals or group members. –
Theses media have changed the way friends stay in touch. – Facebook, Instagram, Snapchat and Twitter are the most
popular social media websites. – Businesses and industry use these contact methods to market their products.
• Cell phones have become a necessity for people of all ages. – Text messaging (texting) delivers short messages,
photos, or videos. – Cellphone applications (apps) provide an endless list of resources such as books, games, GPS, music
and weather.

TYPES OF COMMUNICATION
• Oral communication is the use of spoken words to exchange ideas and information. – Examples: one-to-one
conversation, meetings, voice messages and teleconferencing. – Can be sent instantly and provides immediate feedback.
– Disadvantages: there is little time to reflect and there is no written record.
• Written communication is the exchange of information through the use of written words and sentences. – Examples:
letters, faxes, text messages, emails, reports, tables, diagrams, charts and graphs. – Proves information was exchanged.
– Disadvantage: no immediate feedback.
• Nonverbal communication is communication without words. – Examples: body language gestures, facial expressions
and body movements or positions. – Sometimes stronger than verbal messages – Effective communicators combine oral
and nonverbal techniques.

PURPOSES OF COMMUNICATION
There are four main purposes of communication:
1. To inquire—”Which cell phone did you choose?”
2. To inform—”I chose the cell phone with the most free apps.”
3. To persuade—”You should buy this cell phone today before we run out of stock.”
4. To develop goodwill—”Thank you for buying your new cell phone from our company.”

COMPONENTS OF COMMUNICATION
The six basic components of communication:
1. Message sender—composes the intended message.
2. Actual message—may or may not be the intended message.
3. Message transmission—determined by the specific situation.
4. Message receiver—takes delivery of the message.
5. Message interpretation—is done by the receiver.
6. Feedback—is provided by both sender and receiver

FACTORS THAT AFFECT COMMUNICATION


Four factors that affect the communication process: (both sender and receiver should know)
1. The background of the receiver. - The knowledge, personality, experiences, interest and motivation of the receiver.
2. The appearance of the sender or of the sender’s communication. - Sender’s appearance makes a difference. - Neat
and professional written communication makes positive impression.
3. Barriers that might negatively affect the intended message. - Barriers are factors that interfere with communication
such as: physical distractions (noise, heat, headache, illness,…), emotional distractions (anger, thinking about personal
matter), cultural barriers (language differences) and electronic distraction(cellphone texting, multitasking).
4. The language and communication skills of the sender and receiver.
─ Carefully choose words to express the intended meaning. ─ Be sensitive to cultural diversity when communicating. ─
Message senders must have a broad vocabulary and the ability to spell, pronounce, and select the correct words. ─ In
spoken communication, word choice, grammar and pronunciation are also factors. ─ In written communication, an
incorrect word choice may change the intended meaning of the message. ─ A message receiver must be able to read and
listen with understanding. ─ Both the sender and receiver share the responsibility for effective communication .
INTRAPERSONAL VS INTERPERSONAL COMMUNICATION
Effective communication requires the sender understand his own intrapersonal communication.
• Intrapersonal communication is the way each person views and interprets information based on previous life
experiences.
• Intrapersonal communication (or communicating with yourself) must take place before you can communicate with
another person.
• Interpersonal communication occurs between two people, such as a doctor and a patient.

RESPONSIBILITIES OF SENDER AND RECEIVER


1. Evaluate Each Communication Situation:
─ Avoid miscommunication
▪ Ideally, the intended message, the actual message, and the interpreted message will be the same.
▪ Miscommunication occurs when components of one or more of these three messages are different for either
the sender of the receiver.
─ Give and receive feedback
▪ which involves getting an oral, written, or nonverbal response from the receiver.
2. Understand Personal Needs: - Understand the needs of the receiver using Abraham Maslow’s five levels of
needs:
1) Physical needs: essential to life including: food, clothing and shelter.
2) Security needs: include the desire to be safe from physical harm and mental abuse.
3) Social needs: the desire to be in a group (family, social contacts, work
relationships).
4) Esteem needs: satisfied through a feeling of self-importance, self-respect, power
or recognition.
5) Self-actualizing needs: met by developing a sense of achievement, competence
and creativity and by helping others meet their own needs. People who reach the
top in their fields often want to use their abilities to benefit others and help them
achieve similar success.

3. Assess the needs of the receiver. - By helping the receiver satisfy the higher
two levels of needs the sender can improve communication. - The higher two levels
are esteem and self-actualizing.
4. Apply Interpersonal Skills: - Interpersonal skills is the ability to understand and deal with people in a way that
maintains a favorable relationship and goodwill.
▪ Use the you-attitude which puts the reader or listener first. • Example of the you-attitude: “For your convenience, we
are extending our clinic hours to 9 p.m.”. • The I-attitude is the opposite, putting the senders’ interests first. • Example
of the I-attitude: “Because it fits my schedule better, I have decided to extend the clinic hours to 9 p.m.”
▪ Be a good listener by listening carefully, asking questions, taking notes and letting the speaker know you are
interested.
▪ Maintain confidentiality by releasing information to authorized personnel at the appropriate time, not early and not
▪ Be considerate. • Treat others as you would like to be treated. • A good communicator is courteous, honest, patient
and respect the opinions of others.
Meeting #3
Gt101 - Chapter #5

What is critical thinking?


- Critical thinking is a logical, rational, systematic thought process.

• Why we need critical thinking?


- Critical thinking help us in understanding, analyzing, and
evaluating information to solve a problem.

• Problem solving is creating or identifying a solution to


a question or a problem.

• Decision making is determining or selecting the best or most

effective answer or solution .


BLOOM’S TAXONOMY

CRITICAL THINKING AND PROBLEM-SOLVING STRATEGIES


• Have a positive attitude - Your attitude influences how you solve a problem. (Check the figure, next slide) .
• Ask questions- It is difficult to solve a problem without knowing all the facts and opinions.
• Persistence pays off - Sometimes you’ll need a second or third try.
• Use creativity - Think in new and fresh ways.
• Pay attention - Pay attention to all details.
• See all sides of the issue - Listen to all opinions.
• Use reasoning - Do not jump to conclusions, explore all options. Two types of reasoning inductive and deductive
(discussed later)
• Be rested and healthy – Your health effects your decisions.
CHARACTERISTICS OF A CRITICAL THINKING - Attributes of a critical thinker
USE REASONING
• Inductive reasoning: generalizing from specific concepts to broad principle.
- e.g. generalizing an experience, having a bad experience with one math class, you might reason inductively that all
math classes are bad.
- Note: inductive reasoning can contain some errors, such as coming to conclusion too quickly.
• Deductive reasoning: drawing conclusions based on going from the general to the specific.
- e.g. all men are mortal, Sami is a man, therefore Sami is mortal.
- Note: don’t assume that the main premise is always true.

Some common errors in judgment that interfere with effective critical thinking:
• Stereotypes: judgments held by a person or group about members of another group.
• All-or-nothing thinking: seeing events or people in black or white.
• Snap judgments: decisions made before gathering all necessary information.
• Projection: to attribute to others some of your traits to justify your faulty judgments or actions.
• Sweeping generalizations: apply one experience to a whole group or issue.
• Halo effect: to label a person good based on one or two qualities or actions.
• Negative labeling: is focusing on and identifying with shortcoming, e.g. instead of saying “I made a mistake” you say, “I
am looser”.

CREATIVE PROBLEM SOLVING -- Strategies to unlock your mind’s natural creativity:


1. Expect to be creative (reinforce your creativity). 2. Challenge the rules (try new approach).
3. Use games, puzzles, and humor (have fun). 4. Brainstorm (be free to express ideas to your study group).
5. Be flexible, positive, and grateful. 6. Collect ideas.
7. Relax and trust. 8. Support, acknowledge, and reward creativity.
9. Allow failure. 10. Be disciplined and persistent (be hard worker).

MATH AND SCIENCE APPLICATIONS -- Problem-Solving Strategies for Math and Science include:
─ Make a model or diagram: it helps in organizing and visualizing the problem.
─ Draw, illustrate, and make tables, charts, or lists: it helps in organizing and therefore look for patterns.
─ Look for patterns and connections: a pattern is regular, systematic repletion that helps you in predictions.
─ Act out the problem: physically act out the problem sometimes it help in finding the solution.
─ Simplify: solve related easier cases.
─ Translate words into equations: write an equation that model the problem.
─ Estimate, make a reasonable guess, check the guess, and revise: e.g. if we say Sami is older than Sarah (9yrs Old) but
younger than Ali (11yrs Old) then you can guess that Sami is about 10yrs Old.
─ Summarize in a group: working in group can help you learn.
─ Take a quick break: it help in refreshing.

OVERCOME MATH AND SCIENCE ANXIETY


• Do your prep work: take prerequisites first. • Ask for help: ask your tutor, your group.
• Keep up and review often: night before exam is just for reviewing not learning.
• Discipline yourself: concentrate on your tasks. • Study in groups: choose supportive environment.
• Have a positive attitude: focus on positive feelings. • Dispute the myths: fears are caused by myths.

OVERCOMING OBSTACLES: BUILDING BETTER HABITS


Meeting #3
Gt101 - Chapter #6
INTRODUCTION
• Taking tests is a part of school, performance reviews are part of any job.
• In this chapter, we explore some test taking strategies that help you in both school and your career.
• We will concentrate on the test-taking strategies that you need to follow before, during and after the test.

TEST-TAKING STRATEGIES: BEFORE THE TEST


1. Start on day one: attend first class, setup review schedule.
2. Know expectations: a large part of fears come from unknown after attending first class you will know about what is
excepted (course syllabus, test format etc.).
3. Ask questions in class: if any point is unclear ask about clarification during or at the end of the class.
4. Keep up: keep up daily reading, setting up a schedule will help.
5. Review immediately: review before and after your classes (5 to 10 min is often enough)
6. Review weekly: spend about an hour weekly to review subject martial.
7. Do a final review: do a major review A week or before a test. Practice test questions.
8. Use memory techniques: remember key terms.
9. Create sample tests: predict questions (group work can be helpful)
10. Summarize: write key concepts on a note card.
11. Use your study team: use your study team to share questions and discuss answers.
12. Use all available resources: classes, learning centers etc..
13. Assemble what you will need: e.g. pen, calculator etc.
14. Use technology: e.g. smartphone, tablet etc.

TEST-TAKING STRATEGIES: DURING THE TEST


• In exams we have different types of questions (e.g. Multiple choice, true false, matching, essay and fill in blank).
• The followings are some strategies to consider when taking test:
1. Read and listen to all instructions. 6. Go from easy to difficult.
2. Write down key information. 7. Read each question carefully.
3. Scan the entire test. 8. In some type of questions you may eliminate some choices.
4. Check the weight of each question and allocate time accordingly. 9. Review before you submit the test.
5. Answer objective questions then essay questions.

TEST-TAKING STRATEGIES: AFTER THE TEST


You need to follow these strategies after the test when you receive the grade:
1. Analyze and assess.
- Confirm your grade.
- Determine common types of mistakes.
- Learn what to do differently next time.
2. Review with your instructor.
3. Review the test with your study team.

OVERCOME OBSTACLES: BUILD BETTER TEST HABITS


OVERCOME OBSTACLES: CHEATING
❖ There is no excuse for cheating, cheating only hurts you because it:

- Violates your integrity. - Brings high risks . - Creates academic problems. - Erodes confidence. - Increases stress.
PLAGIARISM
Plagiarism is when you use someone else’s ideas in your writing without acknowledging your source.
• Plagiarism has many forms:
– Copying in part or full from anyone, including friends, classmates, and internet sources.
– Copying word-for-word without using quotation marks and not citing the source.
– Paraphrasing by replacing few words or rearranging sentences and not citing the source.

HOW TO AVOID PLAGIARISM?

1. When quoting word-for-word:


• Quoting means copying parts of the text for the purpose of presenting the author’s actual words.
• To avoid plagiarism: use quotation marks “ ” to frame the quoted text and cite the source in the text after the quote,
using standard format of: author’s surname, initial. (date of publication). title of the work. Name and location of
publishers. Page numbers. of the material you are borrowing.
• Failure to provide citation will be interpreted as plagiarism, even if the source is in your bibliography.

2. When paraphrasing:
• Paraphrasing should not include the words of the original text nor follow the same sentence structure.
• To avoid plagiarism: use your own words to produce the ideas that you read and avoid using statements in the original
form without putting them in quotes.
• Paraphrased information should be accompanied by citation in the text after the paraphrased section, otherwise it will
be interpreted as plagiarism even if the source is in your bibliography.

3. When citing Websites:


• Use the following structure:
Website name, (Year published). Page title. [online] Available at: URL[Accessed Day Mo. Year].
• Example: Mms.com, (2019). M&M'S Official Website. [online] Available at: http://www.mms.com/ [Accessed 20 Apr.
2019].

PENALTIES OF PLAGIARISM
• Plagiarism is an act of theft of intellectual property and academic institutions are applying severe penalties to students
whose works are plagiarized.
• Penalties can range from discounting the work to failing the course.

*********
Meeting #4
Chapter #7 (APPLICATION SOFTWARE)

INTRODUCTION
• Not long ago, trained specialists were required to perform many operations such as market analysis, calculation of
project sales or designing graphic.
• Now you can do all these tasks—and many others—with a personal computer and the appropriate application
software.
• Application software can be described as end user software and is used to accomplish a variety of tasks.
• Three categories of application software: ₋ General-Purpose Applications ₋ Specialized applications ₋ Mobile apps.

General-Purpose Applications
- Word processors allow you to create, edit, save and print text-based documents (e.g. Microsoft Word )
- Spreadsheets are programs that organize, analyze and graph numeric data such as budgets and financial reports (e.g.
Microsoft Excel)
- Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting
presentations (e.g. Microsoft Power-Point)
- Database management systems are programs that sets up, or structures, a database (e.g. Microsoft Access)

Specialized applications
• Specialized applications are widely used within specific professions.
• These programs include graphics programs. Graphics programs types: -
Desktop publishing programs (e.g. Adobe InDesign) - Image editing programs (e.g. Adobe Photoshop) - Illustration
programs (e.g. Adobe Illustrator) - Video editors (e.g. Windows Live Movie Maker).

APPLICATION SOFTWARE: USER INTERFACE


• A user interface is the portion of the application that allows you to control and to interact with the program.
• Most general-purpose applications use a mouse and a graphical user interface (GUI).
• GUI displays graphical elements called icons to represent familiar objects.
• The mouse controls a pointer on the screen that is used to select items such as icons.
• A window is simply a rectangle area that can contain a document, program or message.
• More than one window can be opened and displayed on the computer screen at one time.

Chapter #8 (SYSTEM SOFTWARE)


• End users use application software to accomplish specific tasks. However, they also use system software.
• System software works with end users, application programs and computer hardware to handle the majority of
technical details.
• System software is not a single program but a collection of programs that handle hundreds of technical details with
little or no user intervention.

System software consists of four types of programs:


•Operating systems coordinate computer resources, provide an interface between users and the computer, and run
applications.
•Utilities perform specific tasks related to managing computer resources.
•Device drivers allow particular input or output devices to communicate with the rest of the computer system.
•Language translators convert the programming instructions written by programmers into a language that computers
understand and process.

OPERATING SYSTEM
• An operating system is a collection of programs that handle technical tasks related to using a computer.
• An operating system is the most important type of computer program.
• Without a functioning operating system, your computer would be useless.
• Examples: Windows 10 or Mac OS X.
• Operating systems store data and programs in a system of files and folders. • Files are used to store data and
programs. • Folders are used to store related files. • A folder can contain other folders or subfolders.

Three categories of operating systems:


1. Embedded operating systems, also known as real-time operating systems and RTOS, are entirely stored within
(i.e. embedded in) a device. - They control smartwatches, smartphones, video game systems, and thousands of
other small electronic devices.
2. Stand-alone operating systems, also called desktop operating systems: control a single desktop or laptop
computer. - These operating systems are located on the computer’s hard disk. - Examples: Windows 10 and Mac
OS X.
3. Network operating systems (NOS): are used to control and coordinate computers that are networked or linked
together. - Examples: Linux, Windows Server, and UNIX.

Chapter #9 (INPUT AND OUTPUT)


WHAT IS INPUT?
• Input is any data or instructions used by a computer. • Input devices are hardware used to translate words, numbers,
sounds, images, and gestures that people understand into a form that the system unit can process.
• The most widely used input devices are: - Keyboards such as traditional and laptop keyboard - Pointing devices such
as mouse and touch screen - Scanning devices such as optical scanners and card readers - Image capturing devices such
as Digital cameras and webcams - Audio-input devices such as microphone.
WHAT IS OUTPUT?
• Output is processed data or information. • Output takes the form of text, graphics, photos, audio and video. • Output
devices translate information that has been processed by the system unit into a form that humans can understand.

• The most widely used output devices are: - Monitors - Printers - Audio-output devices.
1.Types of monitors: - Flat-panel monitors - Curved monitors - E-books readers - Digital or interactive whiteboards -
Ultra-high-definition television (UHDTV) - Digital projectors.
2. Types of printers: Inkjet Printers - Laser Printers - 3D Printers.
3. Types of Audio-Output Devices: Speakers – Headphones

Chapter #10 (THE SYSTEM UNIT)


• The system unit (system chassis) is a container that houses most of the electronic components that make up a
computer system.
• There are five types of personal computers: - Desktop - Laptop - Tablet - Smartphones - Wearable computers. Each
has a unique type of system unit).
1. Desktop computer is the most powerful type of personal computer. • Most desktops have their system unit in a
separate case that contains the system’s electronic components and selected secondary storage devices.
• Input and output devices, such as a mouse, keyboard, and monitor, are located outside the system unit.
• This type of system unit is designed to be placed either horizontally or vertically. • Desktop system units that
are placed vertically are sometimes referred to as a tower unit or tower computer. • Some desktop computers,
like Apple’s iMac, have their monitor and system unit housed together in the same case, These computers are
known as an all-in-one.
2. Laptops are not as powerful as desktops. • Laptops are portable and much smaller than desktops. • Their
system units are housed with selected secondary storage devices and input devices (keyboard and pointing
device). • There are several specialized laptops: - Two-in-one laptops - Gaming laptops - Ultrabook’s (mini
notebooks)
3. Tablets (tablet computers), are the newest and one of the most popular types of computer. • They are
effectively a thin slab that is almost all monitor with the system unit located behind the monitor. • Tablets are
smaller, lighter, and generally less powerful than laptop computers. • Tablets do not have a standard keyboard.
Instead, most tablets use a virtual keyboard that appears on the screen and is touch-sensitive
• Mini tablets are a type of tablet with a smaller screen. • They do not have all the functionality of the bigger
……………..tablets, but they are easier to transport in pockets and purses.
4. Smartphones are by far the most popular mobile device. • They greatly extend the capabilities of a cell phone by
providing computing power. • They capture and send audio and video, run apps, and connect to the Internet.
• Their system unit is located behind the display screen.
5. Wearable computers (wearable devices), are one of the first evolutionary steps to the IoT. • These devices
contain an embedded computer on a chip that is typically much smaller and less powerful than a smartphone’s.
• The most common wearable computers are : smartwatches and activity trackers.

COMPONENTS
• Personal computers come in a variety of different sizes, shapes, and capabilities. However, they share similar
components: - System boards - Microprocessors – Memory.

Chapter #11 (SECONDARY STORAGE)


• Memory is a holding area for data, instructions and information.
• RAM and ROM are two examples of memory chips. • RAM holds data and programs that the CPU is presently
processing. • Before data can be processed or a program can run, it must be in RAM. For this reason, RAM is referred to
as primary memory. • RAM is temporary or volatile memory. • RAM loses all of its contents as soon as the computer is
turned off.
• Other than primary memory, we have different type of storage is called secondary storage.
• Secondary storage provides permanent or nonvolatile storage. • In secondary storage, data and programs can be
retained after the computer has been shut off.
• Secondary storage devices include: - Hard disks - solid–state storage - Optical Discs
1. HARD DISKS
• Hard disks save files by altering the magnetic charges of the disk’s surface.
• Two basic types of hard disks:-
A. Internal Hard Disks:
▪ Located inside the system unit.
▪ Store and retrieve large quantities of information quickly.
▪ Have a fixed amount of storage
B. External Hard Disks
▪ Located outside the system unit.
▪ Typically connected to a USB port on the system unit.
▪ Provide slower access than internal hard disks
▪ Have a fixed amount of storage. ▪ It is removable.

2. SOLID STATE STORAGE


• Unlike hard disks, which rotate and have read/write heads that move in and out, solid–state storage devices
have no moving parts. • Data and information are stored and retrieved electronically from these devices.
• Examples:
- Solid-state drives (SSDs)
- Flash memory cards
- USB drives (Flash drives)

3. OPTICAL DISCS
• A laser beam alters the surface of a plastic or metallic disc to represent data.
• Examples:
- CDs: store 700 MB (megabytes).
- DVDs: Store 4.7 GB (gigabytes).
- Blu-ray discs:
▪ The newest form of optical storage.
▪ Store 50 GB.
Meeting #5
Chapter #12 (COMMUNICATIONS AND NETWORKS)
• Communication networks are the backbone of nearly every aspect of modern digital life.
• In the future, telepresence will be commonplace.
– Telepresence )‫ )التواجد عن بعد‬is the ability to fully experience the reality of a different place without actually being there.
– For Example; Doctors will routinely perform surgery on patients located halfway around the world!
•We live in a truly connected society. As the power and flexibility of our communication systems have expanded, the
sophistication of the networks that support them has become increasingly complex.
• We need to understand the concept of connectivity, wireless networking and the elements that make up network and
communications systems.
• Computer communication is the process of sharing data, programs and information between two or more computers.
• There are many applications that depend on communication systems such as E-mail, Texting, videoconferencing and
electronic commerce.
• Connectivity is a concept related to using computer networks to link people and resources.
• The wireless revolution: mobile devices like smartphones and tablets with wireless Internet connectivity have brought
dramatic changes in connectivity and communications.
• Communication systems are electronic systems (wired or wireless) that transmit data from one location to another.
❖ Communication system has four basic elements:
1. Sending and receiving devices: the computers (devices) that send and receive messages in the form of data
and information.
2. Communication channel: the actual connecting medium that carries the messages. This medium can be a
physical or wireless.
3. Connection devices: act as an interface between the sending and receiving devices and the communication
channels.
4. Data transmission specifications: rules and procedures that coordinate the sending and receiving devices by
precisely defining how the message will be sent across the communication channel.

COMMUNICATION CHANNELS
• Communication channels carry data from one computer to another.
• There are two categories of communication channels:
1. Physical connections: use a solid medium (wire or cable) to connect sending and receiving devices.
2. Wireless connections: do not use a solid substance to connect sending and receiving devices. They move data through the air.

Physical connections include:


- Twisted-pair cable: Used in telephone lines and Ethernet cables.
- Coaxial cable: Used to deliver television signals and to connect computers in a network.
- Fiber-optic cable: ▪ Transmits data as pulses of light through tiny tubes of glass. ▪ Lighter, faster, and more reliable than
coaxial cable.

Wirless connection include:-

* In line of sight communications waves can only travel in a straight line, sending and receiving devices must be in clear view of each other
without any obstructions blocking that view.
CONNECTION DEVICES
• Telephones send and receive analogue signals, which are continuous electronic waves.
• Computers send and receive digital signals.
• To convert the digital signals to analog signals and vice versa, you need a modem.
• The modem is the most widely used connection device that modifies audio, video, and other type of data into a form
that can be transmitted across the Internet.
• The modem enables digital PCs to communicate across different media including telephone wires, cable lines and
radio waves.

NETWORK
• A computer network is a communication system that connects two or more computers.
• In a network, computers can exchange information and share resources.

Specialized terms in a network:


• Node: any device connected to a network such as a computer, printer or storage device.
• Client: a node that requests and uses resources available from other nodes.
• Server: a node that share resources with other nodes.
• Host: any computer system connected to a network that provides access to its resources.
• Router: a node that forwards or routes data packets from one network to their destination in another network.
• Switch: Central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.

Network Types:-

Chapter #13 (ARTIFICIAL INTELLIGENCE)


Definitions:-
• Intelligence is a collection different kinds of skills working together.
• We call programs intelligent if they exhibit behaviors that would be regarded intelligent if they were exhibited by
human beings.
• Artificial Intelligence (AI) is the study of techniques for solving hard problems in polynomial time by using knowledge
about the problem domain.

• The followings are some EXAMPLES (applications) of AI:


- Search engines like Google.
- Automated voice instructions from our GPS devices to help us drive to our destinations.
- Voice recognition system in smartphones.
- Robotic surgery.

• Though these programs are usually smarter than humans could be, they aren't perfect. Sometimes, like humans, they
fail.
Chapter #14 (WHOLENESS OF BIG DATA)
• Big Data is an all-inclusive term that refers to extremely large, very fast, highly diverse, and complex data that cannot
be managed with traditional data management tools.
• Big Data includes all kinds of data, and helps deliver the right information, to the right person, in the right quantity, at
the right time, to help make the right decisions.
• This makes; the business grow bigger and generate more data.

Big Data is different from traditional data in many ways including:


• Volume of data: traditional data is measured in Gigabytes, Terabytes but Big Data is measured in Petabytes, Exabytes
(1 Exabytes = 1 Million Terabyte).
• Velocity of data: Big Data is generated by billions of devices and communicated at the speed light through the Internet.
• Variety of data: Big Data is inclusive of all forms of data, from all kinds of functions from all sources and devices. This
includes text, graph, map, audio, video, and others.
• Veracity of data:
– Veracity of data relates to the truthfulness, believability and quality of data.
– This poor quality of data can be from human error, technical errors or malicious Internet
– Big Data is messy and need to be sifted and organized to be put for any great use.

Three major TYPES of Big Data applications:


➢ Monitoring and tracking (e.g. monitor machine performance and track inventory).
➢ Analysis and Insight (e.g. predict and prevent crime and better diagnose diseases).
➢ New product development (e.g. use Big Data to design new products such as reality TV entertainment ).

Chapter #15 (WHOLENESS OF DATA ANALYTICS)


• Business is the act of doing something productive to serve someone’s needs, and thus earn a living and make the
world a better place.
• Business activities are recorded on paper or using electronic media. – These records become data.
• All this data can be analyzed and mined using special tools and techniques to generate patterns and intelligence,
which reflect how the business is functioning.
• These ideas can then be fed back into the business to develop it and make it more effective and efficient in serving
customer needs.
• The cycle continues on.

DATA ANALYTICS – BIDM CYCLE


➢ Business generates data
➢ Data is Mined to produce Insights and Intelligence
➢ Intelligence is fed back into business
➢ Business performance improves
➢ More data is generated
➢ ….
BUSINESS INTELLIGENCE
• Any business organization needs to monitor its environment and performance to adjust its future plans.
– This includes monitoring the industry, competitors, suppliers and customers.
• Business Intelligence is a set of information technology (IT) solutions to inform the business about things it should know.
• Business Intelligence includes tools for gathering, analyzing and presenting data.

DATA PROCESSING CHAIN


• There is a sequence of steps to be followed to benefit from the data in a systematic way:
– Data is modeled and stored in a database.
– Relevant data can be extracted according to certain analyzing purposes and stored in a data warehouse.
– Data from the warehouse can be combined with other sources of data and mined to generate new insights.
– The insights need to be visualized and communicated to the right audience.
DATA
• Everything that is recorded is data
• Data can be of different types such as:
➢ Nominal (unordered values): e.g. shirts colors like red, green, blue.
➢ Ordinal (ordered values): e.g. shirt sizes like XS, S ,M ,L, XL
➢ Interval: e.g. Customer satisfaction in a 1-10 scale
➢ Unstructured data, e.g. video, audio, images, text

DATABASE
• Database is a modelled collection of data that is accessible in many ways.
• In database, data is organized in tables.
• Many database Management Systems (DBMSs) are available to help store and manage data.
– Example of a commercial DBMS is Oracle.
– Example of open source, free, DBMS is MySQL.

DATA WAREHOUSING AND DATA MINING


• A data warehouse is an organized store of data from all over the organization specially designed to help make management
decisions.
• Data is extracted from many sources, rolled up and transformed to meet business needs, and then loaded into data warehouse.
• The data in a warehouse is at much less details than the transaction database.
• Once the data in a warehouse, it can be mined in many different ways and discover meaningful patterns.
• Data Mining is the art and science of discovering useful novel patterns from data which help in solving problems and decision
making.

DATA VISUALIZING
• Data visualizing helps decision makers to understand data easily.
•It can be done using graphs, dashboards, animations, ...

******
Meeting #6
Chapter #16 (PRIVACY, SECURITY AND ETHICS)
PEOPLE
• As we have discussed, information systems consist of people, procedures, software, hardware, data, and the Internet.
• This chapter focuses on people. While most everyone agrees that technology has had a very positive impact on people,
it is important to recognize the negative, or potentially negative, impacts as well.
• Effective implementation of computer technology involves maximizing positive effects while minimizing negative effects.
• The most significant concerns are privacy, security and ethics.
• Privacy – What are the threats to personal privacy and how can we protect our selves?
• Security – How can access to sensitive information be controlled and how can we secure hardware and software?
• Ethics – How do the actions of individual users and companies affect society?

PRIVACY
• Technology makes it possible to collect and use data of all kinds, including information about people.
• The Web sites you visit, the stores where you shop ….
• Privacy concerns the collection and use of data about individuals.
• Three primary privacy issues:
- Accuracy: relates to the responsibility of those who collect data to ensure that the data is correct.
- Property: relates to who owns data.
- Access: relates to the responsibility of those who have data to control and able to use that data.

PRIVACY: LARGE DATABASES


• Large organizations are constantly compiling information about us. Everyday, data is gathered about us and stored in
large databases. This ever-growing volume of data is often called big data.
• A vast industry of data gatherers known as information resellers or information brokers now exists that collects,
analyzes, and sells such personal data.
• Information resellers create electronic profiles, or highly detailed and personalized descriptions of individuals.
• These profiles can reveal more than you might wish and this can raise many important issues, including:
▪ Collecting public, but personally identifying information
▪ Spreading information without personal consent
▪ Spreading inaccurate information

PRIVACY: PRIVATE NETWORKS


• Many organizations monitor employee email and computer files using special software called employee-monitoring software.
• These programs record everything you do on the computer.

PRIVACY: INTERNET & WEB


• Most people do not concern about privacy when sending e-mail on the Internet or browse the web.
• As long as they use their own computers and have the choice to reveal their personal information, they think that little
can be done to invade their personal privacy.
• Experts call this the illusion of anonymity.
• When you browse the web, your browser stores critical information onto your hard disk.
This information, which contains records about your Internet activities, includes:
- History files, which include the locations, or addresses, of sites that you have recently visited.
- Temporary Internet files, also known as the browser cache, contain web page content and instructions for displaying this content.
• Another way your web activity can be monitored is with cookies.
• Cookies are small data files that are deposited on your hard disk from websites you have visited.
• Cookies are harmless in themselves, but they can store information about you, your preferences, and your browsing habits.
• Types of cookies:
▪ First-party: generated (and then read) only by the website you are currently visiting.
▪ A third-party cookie (tracking cookie): is usually generated by an advertising company that is affiliated with the website
you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you
move from one site to the next.
Several other threats could potentially violate your privacy such as:
1. Web bugs, which are invisible images or HTML code hidden within a web page or e-mail message, can be used to
transmit information without your knowledge.
2. Spyware are programs designed to secretly record and report an individual’s activities on the Internet.
- They run in the background and are invisible to the average user.
- Computer monitoring software is the most invasive and dangerous type of spyware.
- Keystroke logger is a type of computer monitoring software that records every activity and keystroke made on your
computer system, including credit card numbers, passwords, and e-mail messages.

• Best defenses against spyware are:


- exercise caution when visiting new websites
- be careful when downloading software from an unknown source.
- use antispyware or spy removal programs, which are designed to detect and remove various types of privacy threats
(e.g. Ad-Aware).

PRIVACY: ONLINE IDENTITY


• Another aspect of Internet privacy comes from online identity, the information that people voluntarily post about
themselves online.
• There is a number of cases of people who have lost their jobs on the basis of posts on social networking sites.

SECURITY
• We are all concerned with our personal security (e.g. lock our doors). What about computer security?
• Computer hackers are the persons who try to gain unauthorized access to our computers or other computers that
contain information about us.
• Security involves protecting individuals and organizations from theft and danger.
• Computer security specifically focuses on protecting information, hardware, and software from unauthorized use, as
well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

SECURITY: CYBERCRIMES
• Cybercrime or computer crime is any criminal offense that involves a computer and a network.

• Malicious Programs (malware) are specifically designed to damage or disrupt a computer system.
• A cracker is a computer criminal who creates and distributes malicious programs.
• The three most common types of malware are:
1. Viruses are destructive programs attach themselves to programs and databases that can alter or delete files.
2. Worms are programs that replicate themselves causing computers and networks operations slowed or stopped. Worms
can carry a virus.
3. Trojan horses are programs that appear to be harmless; however, they contain malicious programs like viruses. Trojan
horses usually appear as free computer programs that can be downloaded from the Internet.
• Viruses and worms can find their way into PCs through e-mail attachments and programs downloaded from the Internet.
• Zombie is a computer infected by a malware that allows it to be remotely controlled for malicious purposes.
• A collection of zombie computers is known as a botnet, or robot network.
• Antivirus programs such as Symantec and McAfee provide services that keep track and alert users about virus threats.

ETHICS
• The essential element that controls how computers are used is ethics.
• Ethics are standards of moral conduct.
• Computer ethics are guidelines for the morally acceptable use of computers in our society.

ETHICS: COPYRIGHT & DRM


• Copyright is a legal concept that gives content creators the right to control use and distribution of their work.
• Material that can be copyrighted include paintings, books, music, films and video games.
• Some users choose to make unauthorized copies of digital media which violates copyright.
• Software piracy is an unauthorized copying or distribution of software.
• To prevent copyright violations, corporations often use digital rights management (DRM).

Focus on the positives and how you’ll feel when you pass your exam.
Block out the negatives and visualize that success – then go and get it!

Source: GT101 meetings tutorials slides (1 to 6)

First semester: 2020-2021

Prepared by: Saeed Al Haj

You might also like