0% found this document useful (0 votes)
34 views

Unit Iv: Peopleware: Considered As The Backbone of The Internet and E-Commerce Technologies

This document discusses careers in information and communications technology (ICT). It identifies 10 broad career areas in ICT: business analysis, computer engineering, database administration, ICT education, internet and e-commerce, multimedia, software development, project management, systems analysis and design, and systems management and administration. For each career area, it provides examples of specific job roles and brief descriptions of what each role entails. It also discusses system software and operating systems as important types of software that enable hardware functionality.

Uploaded by

Leicaken Salazar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Unit Iv: Peopleware: Considered As The Backbone of The Internet and E-Commerce Technologies

This document discusses careers in information and communications technology (ICT). It identifies 10 broad career areas in ICT: business analysis, computer engineering, database administration, ICT education, internet and e-commerce, multimedia, software development, project management, systems analysis and design, and systems management and administration. For each career area, it provides examples of specific job roles and brief descriptions of what each role entails. It also discusses system software and operating systems as important types of software that enable hardware functionality.

Uploaded by

Leicaken Salazar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

UNIT IV: PEOPLEWARE 3.

Database Administration Career – monitor system performance, managing data,


sharing of data.
- People or users are considered as one of the most important elements in the *this is where the administration of data or records and transactions of a particular
computer and communication system. organization comes in
- Without these users, it is impossible for computers to do their intended functions.
- With the advent of technology and with the increasing technologies that’s happening o Database Administrator
around us, we’ve seen the significant increase of people working in the ICT industry. *is in charged or the overall head in the management of data.
Ex. In a bank, considering it is connected through multiple channels – the database
administrator needs to ensure that all the transactions are intact, correct and will not
disappear.
PEOPLE IN ICT
Most professional ICT work can be classified into 3 broad areas: 4. ICT Education Career – teaching, trainings
*responsible for providing lectures, discussions for the courses in the program
1. Information Systems/Information Technology
2. Computer System Engineering o IT Lecturer
3. Computer Science o Training Officer
o Education Manager
PROFESSIONAL JOBS IN THE 3 BROAD AREAS:
5. Internet and E-commerce Career – special instances of other ICT careers.
1. Business Analysis Career – evaluating customer business needs, and provides *this particular career has the possibility to crossover with other careers for the reason that
business solutions. most of the companies are into internet connectivity; if you are in this career, you can create
*if there is a need from a company or a business that needs to expand that is either programs or systems regardless of what industry there is.
computerization or improvement of service
o Web Architect
o Business Analyst o Web Designer
o Business Systems Analyst o Web Programmer
o Web Administrator
*inaaral yung takbo ng company, particularly on an identified operation.
- *considered as the backbone of the internet and e-commerce technologies
Ex. the payroll system in the company

6. Multimedia – create and manipulate graphic images, animation, sound, text and
2. Computer Engineering Career – design, installation, repair and service of video.
computers *if you wanted to pursue a career that is related to games, designs, graphics and other
*if you wanted to explore more of a specific profession relative to computer hardware / multimedias
networks
o Computer Engineering o Multimedia Graphics Designer
o Hardware Design Engineer o Multimedia Content Author
o Technical Support Engineer o Animator
o Computer Systems Engineer o Writer
7. Software Development Career – translation of requirements into set of instructions. UNIT V: SOFTWARE
*mainly focus on the translation of business requirements into actual system through coding
*these are enablers for the hardware to work
o Programmer – does the creation of a particular program through coding; only *Hardware - the mechanical device; to work efficiently, software is needed
limited to the actual coding itself
o Software Engineer – from coding, to testing, sometimes getting involved in - It is a generic term or organized collections of code representing instructions
design executed by a computer.
*from a simple instruction and as long as the program is written correctly and it executes a
particular output that should also be correct
8. Project Management Career – problem solving process involving planning,
implementation of project.
- 2 General Types:
*takes a considerable amount of experience to become a Project Manager; must first have an
extensive experience in handling a project, in managing a team; there is an international o System Software
certification for project managers o Application Software
SYSTEM SOFTWARE
o Project Leader
o Project Manager - It provides the basic non-task-specific functions of the computer
*by simply turning on the computer
9. Systems Analysis and Design Career – partner of project managers and system
developers - It is responsible for controlling, integrating, and managing the individual hardware
*specifically study the system and also provide evaluation and assessment on how that components of the computer system.
particular system can be improved through computerization *allows the hardware to communicate (Ex. using keyboard); there is communication of
processes because of the system software
o System Analyst - Kinds: Operating System and Utility Program
o Systems Architect
OPERATING SYSTEM
10. Systems Management and Administration – connections, communications of IT *system software that integrates the operation of all the hardware and other installed
infrastructure programs
*more of managerial careers; manages the operation of the systems, network o Basic Functions of OS:
▪ Memory Management – provides memory management for
o Systems Administrator instructions that are executed
o Network Administrator ▪ Resource Allocation and Sharing – allows a provision for attached
o Data Communication Consultant – to recommend a new technology that this hardware for it to operate on a multi-tasking basis
company can use; short term work in the company ▪ Backing Store Management – allows to store back-ups in your
computer
▪ Interrupt handling – provides a signal to the users if there are certain
interrupts in the system
▪ Allowing users communicate with the computer – helps us do this
kind of communication with the help of OS through the Internet
Communication using various platforms
OPERATING SYSTEMS THAT ARE DEVELOPED SINCE THE CREATION OF
SOFTWARE
Examples of Application Software
UNIX
- Word Processing (Microsoft, Mac)
- A networked computer system designed to allow users to share software and to have - Spreadsheet (Excel)
controlled access to other user’s files. - Databases (Access, Oracle)
- It was developed by Ken Thompson, Dennis Ritchie, and Douglas Mcllroy. - Email (Yahoo, Google mail)
- Presentation Graphics (PowerPoint)
Macintosh OS (MacOS)
- Desktop Publishing
- An operating system developed by Apple Computer. - Web Browsers (Safari, Google Chrome)

MS-DOS (MicroSoft Disk Operating System)


- An operating system commercialized by Microsoft Corporation LICENSING SOFTWARE
- It was initially called QDOS (Quick and Dirty Operating System) developed by Tim *softwares has certain limitations
Paterson.
- Microsoft Windows Operating System Propriety Software
- Network OS (MS NOS)
- Can be purchased off-the-shelf which is manufactured by a particular company
Linux Operating System
Shareware
- An open-source operating system developed by Linus Torvalds
- Available but with limited use
*originally based in UNIX; users could improve it
Freeware
- Can be downloaded somewhere that could be use for instructional purpose,
APPLICATION SOFTWARE educational purpose
- It is used to accomplish specific user-oriented tasks It is important for us to know that not all software can be shared with anyone or with our friends
- Categories of Application Software: that is free
o Bespoke – “tailor-made” to meet the requirements of a specific
Ex. An application is only for 3 users – it could lead to software piracy if it exceeds to the
organization; customized limited users
o Off-the-shelf – can be purchased by anyone
o General Purpose – it does a variety of jobs Academic Alliance – a broader use since it is used in the computer laboratories
o Integrated Packages/Software Suites – packages of common same with the Corporate Licensing
productivity tools that are bundled together
We should know EULA = End User Licensing Agreement; when violated it is
o Generic – can be used to perform a number of tasks, not necessarily for
punishable by law
which the application was originally designed; can also be purchased but not
customized – making adjustments later on in the organization
o Specific – software that only has one/few application; has limited
applications
UNIT VI: NETWORK, INTERNET, AND INTERNET PROTOCOLS COMPUTER NETWORK
DATA COMMUNICATIONS AND NETWORKING - Is a group of computers that use a set of common communication protocols over
digital interconnections for the purpose of sharing resources.
- How computers communicate, works, and how it allows us to use other applications
such as the internet Protocols – standards of interconnectivity (Open System Interconnection, ISO Layer =
set of protocol for Data Communications; 7 layers for the OSI from the physical and
application layer)
DATA COMMUNICATIONS
- Referring to the process CLASSIFICATION OF COMPUTER NETWORKS
NETWORKING
Local Area Network (LAN) – group of computers linked electronically to form a
- Pertains to the connection of computer resources common work environment. It facilitates sharing of application and data.

Ex. Wifi connection at home – there were 2-3 gadgets connected


DATA COMMUNICATION
Wide Area Network (WAN) – geographically dispersed telecommunication network
- Refers to the exchange of data between a source and a receiver via a transmission covering multiple buildings, often across the world.
medium.
Ex. The Internet – LAN can be connected to WAN
*in order for computers to communicate, there is a need for a process coming from a source
and a recipient.
Metropolitan Area Network (MAN) – intermediate form of network in terms of
Ex. sending an email to a particular recipient but in order for the communication to be sent, geography.
there must be an interface between the two users – there is a Data Communications
Equipment (DCE) or there is also a medium (something that works in a middle of a DCE in *could be in a bigger area than a local area
order for the transition to be successful). Ex. LAN in a school and you wanted to subscribe on the internet, there is an Internet
Service Provider – a MAN (LAN can be connected to the high-speed connectivity)
*before, when there is a need for you to connect on the internet there is what we call Data
Communications Equipment that translates the sending of the information from the sender
– the message is converted by the DCE.
NETWORK TOPOLOGIES
Computers work in digital way, there is a need for it to be converted into Analog Signal –
- Connection of networks: Physical or Electrical Configuration of cabling and
varying fluctuating signals; could be a high signal of low signal but both vary that’s why its
connections comprising a network – the shape of the system.
referred as Analog.
Information – Converted to Digital to Analog – Medium – Data Communications Equipment –
Computer System (allowing the recipient to receive and see the message)
TYPES OF NETWORK TOPOLOGIES Hybrid – consists of a combination from two or more topologies to form a complex network.
Bus – devices are connected to a common cable. *Present in World Wide Web since a lot of organizations can connect to it and each
organizations have their own kind of network topology.
*Devices are connected to a common cable; single connectivity
NETWORK HARDWARE
Ring – devices are connected to a common cable which loops from machine to machine.
Some that are used in Data connectivity.
- Includes all computers, peripherals and other equipment needed to perform
*Computer laboratories wherein a common cable connects these computers – they
are connected around a circle – the connectivity is unidirectional communication and processing within the network.

Disadvantage: uses a lot of cable; if a connection was cut = it is already impossible 1. File Server – most powerful computer in the network; holds the central
for a connector to communicate. communication and data for that particular network connection.

2. Workstations – computers connected to the network which uses the resources


Star – device has its own cable run connecting the device to a common hub or concentrator. in the file server; every computer that communicates in that server.
*Uses centralize networking device; fast transfer of speed of the data; each computer
3. Network Interface Card (NIC) -provides physical connection between the
has its own separate cable; Uses a lot of cables.
network and the computer workstations.
Ex. in a computer shop has this kind of set-up; if the central device fails = whole
communication fails 4. Hub or Concentrator – device that provides a central connection point for
cables in the network; physical layer; connects a network of personal computers
together; used in a LAN
Tree – star of stars network. Each device is connected to its own port on a concentrator in
the same manner as in a star. 5. Repeater – physical layer; can used to extend a LAN

*Multiple stars connected; communicated by its own concentrator but still connected 6. Bridges – device that segments a large network; data link layer; connects
to a network different LANs

7. Routers – translates information from one network to another; networking layer;


Mesh – consists of a network where every device on the network is physically connected to directs data to the network; used in LAN, WAN and MAN.
every other device on the network.
*Multiple path is possible amongst devices that are connected
Performance Management – monitoring response time and traffic load to manage and
maintain the performance of the network.
*if there is a bottleneck in the network/system, the performance management tracks
NETWORK OPERATING SYSTEM
where the traffic occurs
Basic software that contains basic functionalities required for building effective network.
Service Charge Management – monitoring and analyzing of information indicating the use
of network resources.

Basic Functions: *monitor the usage of network; determines how frequent you use apps or sites

1. Data Sharing
2. Printing Sharing
INTERNET
3. Security Management
- Global computer network providing variety of ICT facilities
- Interconnected network
Data Communications and Networking – because we wanted to share information and - INTERNET PROTOCOL SERVICE = World Wide Web (WWW) = standard used in
other resources. connecting to the internet
o Email, FTP – File Transfer Protocol
- HTTP – Hyper Text Transfer Protocol (Interlink Communication)
NETWORK MANAGEMENT - URL – Uniform Resource Locator (similar to website)
- IP ADDRESS (numeric address)
- The responsibilities of a network administrator. o YAHOO = 192.168.255.25 (IP Address)
- DNS – Domain Name System = assuring there is no repetition of website that is
Configuration Management – collection and management of information on current
registered and the assignment of particular IP Address for the websites that are
network resources as well as on changes in network configuration.
found on the internet
*Ensuring that all hardware that connects to the network are configured properly to o www.pup.edu.ph
ensure effective communications.
Fault Management – monitoring system errors to perform automated recovery processes. Tim Berners Lee

*if there are failures in the network, network operating system could determine what - Invented the INTERNET
the source of error is and how it could be resolve later on and at the same time it
triggers an automatic back-up or recovery if those information are very crucial in the o www – server name
operation. o pup – name of organization
o Edu – type of organization
Security Management – monitoring the state of access on the network. o Ph – country specifier
*if multiple users – there should be different accessibility option, it is not possible that
each user has the same access; there must be restrictions to certain operations to
other persons and limitations to the use of processes in the network.
DOMAIN SUFFIXES INTERNET OF THINGS (IoT)
Websites have a registration-costs that depends. - Refers to the billions of physical devices that are now connected to the internet, all
collecting and sharing data.
- .gov = government organization *for the convenience of the consumer
- .org = non-profit organization - It integrates the interconnection of human culture – our ‘things’ – with the
- .mil = military organization interconnection of our digital information system – ‘the internet’
- .edu = educational institution
- .com = commercial organization; profit oriented
- .biz = for business; initially was used on the early days of domain name system if
MOBILE APPLICATION
you weren’t able to have the .com suffix
- .net = networking organizations; provide internet connections - It is a type of application software designed to run on a mobile device, such as
smartphone or tablet computer, that serves to provide users with similar services to
those accessed on PCs.
- Several Types: Gaming Apps, Productivity Apps, Lifestyle and Entertainment Apps

UNIT VII: TRENDS AND ISSUES & SPECIAL INTEREST TOPICS IN ICT HUMAN COMPUTER INTERACTION (HCI)

CLOUD COMPUTING - Is the study of how people interact with computers and to what extent computers are
or are not developed for successful interaction with human beings.
- It is a delivery of computing services – including servers, storage, databases, *focuses on user interaction – between humans and computers
networking, software, analytics, and intelligence – over the internet to offer faster
innovation, flexible resources and economies of scale. *traces its technological improvement through various knowledge such as: Computer
- Benefits: Cost, Speed, Global Scale, Productivity, Performance, Reliability, Security Science, Ergonomics and Human Factors, Engineering, Design, Sociology and Social
- Types: Public (operated by Cloud Service Providers), Private (a particular Psychology, Ethnography, Cognitive Science, Psychology, Information Security, and Speech
Language Pathology
company/organization exclusively uses a particular Cloud Service), Hybrid (a
combination of Public and Private Cloud; allows data or applications to be shared)

*these three avail Cloud Computing Resources through a provider ARTIFICIAL INTELLIGENCE (AI)
- It is a branch of Science which deals with helping machines find solutions to complex
- Types of Cloud Services: IaaS (Infrastructure as a Service – renting an IT
problems in a more human-like fashion
infrastructure), PaaS (Platform as a Service – on demand environment for *AI technology was developed in order to collect and to find an improvement in technology
development), Serverless (focuses on functionality wherein the users don’t have to that was patterned to the human behavior
buy his server), SaaS (Software as a Service – delivering software applications - It is concerned with guiding computers to tasks that require human intelligence.
over the internet and on a subscription basis) *there’s a need as well for computers to reason out, to think, to do physical activities that is
similar or replicating human activities
AI TECHNIQUES APPLICATIONS OF AI
- Expert System – is a software-based system that attempts to capture human
- Knowledge Representation knowledge or expertise in a limited domain area.
*little by little captures what’s happening around; studies reasoning, representation of objects *typically used in companies/organizations that relies on too much data; there is a need to
around the device, communications like languages; as the computer encounters such use this data for information processing/decision making by administrators that helps in the
objects, events, communication languages – it will be stored in the system little-by-little performance of the organization
- Search - Neural Networks – a computer system that can simulate the functioning of the
*when the objects encountered an interaction, it will search it in its system/database so that human brain.
the object could interact correctly; when a task is assigned for the machine to perform, it will *also called as Artificial Neural Networks – modeled based on the nervous system of humans
have an intelligent or correct performance particularly the human brain; the neuron collect and identify various data that is presented
- Fuzzy Logic * artificial neurons are provided with various inputs and then the computer machine will
*reaction and interpretation of the machine on certain things generate certain outputs
- Intelligent Computer Aided Instruction (ICAI) – refers to the work of machines that - Natural Language Processing (NLP) – branch of AI which is concerned with
can tutor humans. understanding natural languages.
*used for educational purposes Examples:
▪ Speech recognition
Uses of ICAI:
▪ Speech synthesis
- Problem Solving
- Simulation - Robotics – it attempts to develop physical machines that can perform useful work
- Discovery normally done by humans.
- Drill and practice *more of physical performance; usually used in manufactured companies
- Games Ex. ASIMO – developed by Honda; Advanced Step in Innovative Mobility
- Testing

- Computer Vision/Vision Systems – it permits computers to capture, store, and DATA ANALYTICS
manipulate visual images and pictures. - Is the process of analyzing raw data to find trends and answer questions
- Intersection of information technology, statistics and business
*Ex. Retina scan – compare to the database to match the person’s identification; Biometrics
*represent trends; has a projection when it will reach the peak or when will there be an
- Machine Learning – refers to a set of methods that attempt to teach computers to improvement, etc.
solve a problem *analyzes raw data in order to provide a more comprehensive and detailed solutions to
questions that needs further interpretation
- Handwriting Recognizers
- Types:
o Descriptive (answers the question what happened; requires the collection of data
then eventually be processed, will have an analysis and then a visualization)
o Diagnostic (answers the question why it happened?; improves the result of the
descriptive analytics by digging deeper to find the cause)
o Predictive (helps answer questions about what will happen in the future?; will
have a reference on historical data)
o Prescriptive (answers the question what should be done?)
DATA SECURITY *these are all punishable by existing laws

- Refers to protecting data against unauthorized access or use that could result in
exposure, deletion, or corruption of data MALWARE
*concerns on such protection be it from accidental or intentional modification (could be - Malicious software
unauthorized) - It is a software that cybercriminals or hackers create to disrupt or damage a
legitimate user’s computer.
*concerns the safeguard of accessibility; we talk about various ways such as… *could be unsolicited emails/picture files
data encryption wherein you convert data into a code that can’t be easily read without
using a key; - Types:
o Virus (self-replicating program that is once in the system, it will infect the file
data masking where it hides the certain parts of data so that unauthorized persons by malicious code; could destroy apps or the hardware itself)
won’t see the data o Trojans (disguised as a legitimate software; as it enters the system, it can
data erasure – completely removing the data so that the unauthorized person won’t cause damage), Spyware (secretly records what the user does)
totally see it o Ransomware (locks down a user’s file or organization system and needs to
pay a ransom)
data back-up – whenever there is loss of data such as original copies, there is a o Adware (advertising software that seems legitimate but might be the cause of
possibility to create back-ups spreading of malware)
o Botnets (networks or malware that infects computers; once in the system, it
can manipulate the system)
DATA PRIVACY o Phishing (targets the victims; gets the information about the person and use
it to victimize other persons)
- Refers to the concerns regarding how data is handled – regulatory concerns, o Man-in-the-middle attack (intercept to the communication between two
notification, and consent of use. individuals)
- Example of data privacy is gaining consent to collect data from website visitors by o Denial-of-service attack (prevent a successful processing)
using cookies
*also concern with proper handling, processing, storage in use of personal information
*the Philippines has a Data Privacy Act that was signed in 2012 or R.A. 10173
CYBER SAFETY TIPS
- Update your software and operating system
CYBERSECURITY - Use anti-virus software
- Use strong passwords
- It is the practice of defending computers, servers, mobile devices, electronic
- Do not open email attachments from unknown senders
systems, networks, and data from malicious attacks.
- Do not click on links in emails from unfamiliar senders or websites
*wider scope; the system that is working around the data
*the ability to protect the data in the cyberspace from cyber-attacks - Avoid using unsecure WiFi networks in public places

- Types of cyber threats: Cybercrime (user groups targeting systems to rob by


hacking), Cyber-attack (could be politically motivated; trolls; spread of
misinformation), Cyberterrorism (spread panicking or fear)

You might also like