Unit Iv: Peopleware: Considered As The Backbone of The Internet and E-Commerce Technologies
Unit Iv: Peopleware: Considered As The Backbone of The Internet and E-Commerce Technologies
6. Multimedia – create and manipulate graphic images, animation, sound, text and
2. Computer Engineering Career – design, installation, repair and service of video.
computers *if you wanted to pursue a career that is related to games, designs, graphics and other
*if you wanted to explore more of a specific profession relative to computer hardware / multimedias
networks
o Computer Engineering o Multimedia Graphics Designer
o Hardware Design Engineer o Multimedia Content Author
o Technical Support Engineer o Animator
o Computer Systems Engineer o Writer
7. Software Development Career – translation of requirements into set of instructions. UNIT V: SOFTWARE
*mainly focus on the translation of business requirements into actual system through coding
*these are enablers for the hardware to work
o Programmer – does the creation of a particular program through coding; only *Hardware - the mechanical device; to work efficiently, software is needed
limited to the actual coding itself
o Software Engineer – from coding, to testing, sometimes getting involved in - It is a generic term or organized collections of code representing instructions
design executed by a computer.
*from a simple instruction and as long as the program is written correctly and it executes a
particular output that should also be correct
8. Project Management Career – problem solving process involving planning,
implementation of project.
- 2 General Types:
*takes a considerable amount of experience to become a Project Manager; must first have an
extensive experience in handling a project, in managing a team; there is an international o System Software
certification for project managers o Application Software
SYSTEM SOFTWARE
o Project Leader
o Project Manager - It provides the basic non-task-specific functions of the computer
*by simply turning on the computer
9. Systems Analysis and Design Career – partner of project managers and system
developers - It is responsible for controlling, integrating, and managing the individual hardware
*specifically study the system and also provide evaluation and assessment on how that components of the computer system.
particular system can be improved through computerization *allows the hardware to communicate (Ex. using keyboard); there is communication of
processes because of the system software
o System Analyst - Kinds: Operating System and Utility Program
o Systems Architect
OPERATING SYSTEM
10. Systems Management and Administration – connections, communications of IT *system software that integrates the operation of all the hardware and other installed
infrastructure programs
*more of managerial careers; manages the operation of the systems, network o Basic Functions of OS:
▪ Memory Management – provides memory management for
o Systems Administrator instructions that are executed
o Network Administrator ▪ Resource Allocation and Sharing – allows a provision for attached
o Data Communication Consultant – to recommend a new technology that this hardware for it to operate on a multi-tasking basis
company can use; short term work in the company ▪ Backing Store Management – allows to store back-ups in your
computer
▪ Interrupt handling – provides a signal to the users if there are certain
interrupts in the system
▪ Allowing users communicate with the computer – helps us do this
kind of communication with the help of OS through the Internet
Communication using various platforms
OPERATING SYSTEMS THAT ARE DEVELOPED SINCE THE CREATION OF
SOFTWARE
Examples of Application Software
UNIX
- Word Processing (Microsoft, Mac)
- A networked computer system designed to allow users to share software and to have - Spreadsheet (Excel)
controlled access to other user’s files. - Databases (Access, Oracle)
- It was developed by Ken Thompson, Dennis Ritchie, and Douglas Mcllroy. - Email (Yahoo, Google mail)
- Presentation Graphics (PowerPoint)
Macintosh OS (MacOS)
- Desktop Publishing
- An operating system developed by Apple Computer. - Web Browsers (Safari, Google Chrome)
Disadvantage: uses a lot of cable; if a connection was cut = it is already impossible 1. File Server – most powerful computer in the network; holds the central
for a connector to communicate. communication and data for that particular network connection.
*Multiple stars connected; communicated by its own concentrator but still connected 6. Bridges – device that segments a large network; data link layer; connects
to a network different LANs
Basic Functions: *monitor the usage of network; determines how frequent you use apps or sites
1. Data Sharing
2. Printing Sharing
INTERNET
3. Security Management
- Global computer network providing variety of ICT facilities
- Interconnected network
Data Communications and Networking – because we wanted to share information and - INTERNET PROTOCOL SERVICE = World Wide Web (WWW) = standard used in
other resources. connecting to the internet
o Email, FTP – File Transfer Protocol
- HTTP – Hyper Text Transfer Protocol (Interlink Communication)
NETWORK MANAGEMENT - URL – Uniform Resource Locator (similar to website)
- IP ADDRESS (numeric address)
- The responsibilities of a network administrator. o YAHOO = 192.168.255.25 (IP Address)
- DNS – Domain Name System = assuring there is no repetition of website that is
Configuration Management – collection and management of information on current
registered and the assignment of particular IP Address for the websites that are
network resources as well as on changes in network configuration.
found on the internet
*Ensuring that all hardware that connects to the network are configured properly to o www.pup.edu.ph
ensure effective communications.
Fault Management – monitoring system errors to perform automated recovery processes. Tim Berners Lee
*if there are failures in the network, network operating system could determine what - Invented the INTERNET
the source of error is and how it could be resolve later on and at the same time it
triggers an automatic back-up or recovery if those information are very crucial in the o www – server name
operation. o pup – name of organization
o Edu – type of organization
Security Management – monitoring the state of access on the network. o Ph – country specifier
*if multiple users – there should be different accessibility option, it is not possible that
each user has the same access; there must be restrictions to certain operations to
other persons and limitations to the use of processes in the network.
DOMAIN SUFFIXES INTERNET OF THINGS (IoT)
Websites have a registration-costs that depends. - Refers to the billions of physical devices that are now connected to the internet, all
collecting and sharing data.
- .gov = government organization *for the convenience of the consumer
- .org = non-profit organization - It integrates the interconnection of human culture – our ‘things’ – with the
- .mil = military organization interconnection of our digital information system – ‘the internet’
- .edu = educational institution
- .com = commercial organization; profit oriented
- .biz = for business; initially was used on the early days of domain name system if
MOBILE APPLICATION
you weren’t able to have the .com suffix
- .net = networking organizations; provide internet connections - It is a type of application software designed to run on a mobile device, such as
smartphone or tablet computer, that serves to provide users with similar services to
those accessed on PCs.
- Several Types: Gaming Apps, Productivity Apps, Lifestyle and Entertainment Apps
UNIT VII: TRENDS AND ISSUES & SPECIAL INTEREST TOPICS IN ICT HUMAN COMPUTER INTERACTION (HCI)
CLOUD COMPUTING - Is the study of how people interact with computers and to what extent computers are
or are not developed for successful interaction with human beings.
- It is a delivery of computing services – including servers, storage, databases, *focuses on user interaction – between humans and computers
networking, software, analytics, and intelligence – over the internet to offer faster
innovation, flexible resources and economies of scale. *traces its technological improvement through various knowledge such as: Computer
- Benefits: Cost, Speed, Global Scale, Productivity, Performance, Reliability, Security Science, Ergonomics and Human Factors, Engineering, Design, Sociology and Social
- Types: Public (operated by Cloud Service Providers), Private (a particular Psychology, Ethnography, Cognitive Science, Psychology, Information Security, and Speech
Language Pathology
company/organization exclusively uses a particular Cloud Service), Hybrid (a
combination of Public and Private Cloud; allows data or applications to be shared)
*these three avail Cloud Computing Resources through a provider ARTIFICIAL INTELLIGENCE (AI)
- It is a branch of Science which deals with helping machines find solutions to complex
- Types of Cloud Services: IaaS (Infrastructure as a Service – renting an IT
problems in a more human-like fashion
infrastructure), PaaS (Platform as a Service – on demand environment for *AI technology was developed in order to collect and to find an improvement in technology
development), Serverless (focuses on functionality wherein the users don’t have to that was patterned to the human behavior
buy his server), SaaS (Software as a Service – delivering software applications - It is concerned with guiding computers to tasks that require human intelligence.
over the internet and on a subscription basis) *there’s a need as well for computers to reason out, to think, to do physical activities that is
similar or replicating human activities
AI TECHNIQUES APPLICATIONS OF AI
- Expert System – is a software-based system that attempts to capture human
- Knowledge Representation knowledge or expertise in a limited domain area.
*little by little captures what’s happening around; studies reasoning, representation of objects *typically used in companies/organizations that relies on too much data; there is a need to
around the device, communications like languages; as the computer encounters such use this data for information processing/decision making by administrators that helps in the
objects, events, communication languages – it will be stored in the system little-by-little performance of the organization
- Search - Neural Networks – a computer system that can simulate the functioning of the
*when the objects encountered an interaction, it will search it in its system/database so that human brain.
the object could interact correctly; when a task is assigned for the machine to perform, it will *also called as Artificial Neural Networks – modeled based on the nervous system of humans
have an intelligent or correct performance particularly the human brain; the neuron collect and identify various data that is presented
- Fuzzy Logic * artificial neurons are provided with various inputs and then the computer machine will
*reaction and interpretation of the machine on certain things generate certain outputs
- Intelligent Computer Aided Instruction (ICAI) – refers to the work of machines that - Natural Language Processing (NLP) – branch of AI which is concerned with
can tutor humans. understanding natural languages.
*used for educational purposes Examples:
▪ Speech recognition
Uses of ICAI:
▪ Speech synthesis
- Problem Solving
- Simulation - Robotics – it attempts to develop physical machines that can perform useful work
- Discovery normally done by humans.
- Drill and practice *more of physical performance; usually used in manufactured companies
- Games Ex. ASIMO – developed by Honda; Advanced Step in Innovative Mobility
- Testing
- Computer Vision/Vision Systems – it permits computers to capture, store, and DATA ANALYTICS
manipulate visual images and pictures. - Is the process of analyzing raw data to find trends and answer questions
- Intersection of information technology, statistics and business
*Ex. Retina scan – compare to the database to match the person’s identification; Biometrics
*represent trends; has a projection when it will reach the peak or when will there be an
- Machine Learning – refers to a set of methods that attempt to teach computers to improvement, etc.
solve a problem *analyzes raw data in order to provide a more comprehensive and detailed solutions to
questions that needs further interpretation
- Handwriting Recognizers
- Types:
o Descriptive (answers the question what happened; requires the collection of data
then eventually be processed, will have an analysis and then a visualization)
o Diagnostic (answers the question why it happened?; improves the result of the
descriptive analytics by digging deeper to find the cause)
o Predictive (helps answer questions about what will happen in the future?; will
have a reference on historical data)
o Prescriptive (answers the question what should be done?)
DATA SECURITY *these are all punishable by existing laws
- Refers to protecting data against unauthorized access or use that could result in
exposure, deletion, or corruption of data MALWARE
*concerns on such protection be it from accidental or intentional modification (could be - Malicious software
unauthorized) - It is a software that cybercriminals or hackers create to disrupt or damage a
legitimate user’s computer.
*concerns the safeguard of accessibility; we talk about various ways such as… *could be unsolicited emails/picture files
data encryption wherein you convert data into a code that can’t be easily read without
using a key; - Types:
o Virus (self-replicating program that is once in the system, it will infect the file
data masking where it hides the certain parts of data so that unauthorized persons by malicious code; could destroy apps or the hardware itself)
won’t see the data o Trojans (disguised as a legitimate software; as it enters the system, it can
data erasure – completely removing the data so that the unauthorized person won’t cause damage), Spyware (secretly records what the user does)
totally see it o Ransomware (locks down a user’s file or organization system and needs to
pay a ransom)
data back-up – whenever there is loss of data such as original copies, there is a o Adware (advertising software that seems legitimate but might be the cause of
possibility to create back-ups spreading of malware)
o Botnets (networks or malware that infects computers; once in the system, it
can manipulate the system)
DATA PRIVACY o Phishing (targets the victims; gets the information about the person and use
it to victimize other persons)
- Refers to the concerns regarding how data is handled – regulatory concerns, o Man-in-the-middle attack (intercept to the communication between two
notification, and consent of use. individuals)
- Example of data privacy is gaining consent to collect data from website visitors by o Denial-of-service attack (prevent a successful processing)
using cookies
*also concern with proper handling, processing, storage in use of personal information
*the Philippines has a Data Privacy Act that was signed in 2012 or R.A. 10173
CYBER SAFETY TIPS
- Update your software and operating system
CYBERSECURITY - Use anti-virus software
- Use strong passwords
- It is the practice of defending computers, servers, mobile devices, electronic
- Do not open email attachments from unknown senders
systems, networks, and data from malicious attacks.
- Do not click on links in emails from unfamiliar senders or websites
*wider scope; the system that is working around the data
*the ability to protect the data in the cyberspace from cyber-attacks - Avoid using unsecure WiFi networks in public places