Introduction To Computing Pointers 1
Introduction To Computing Pointers 1
LESSON 1
*What is COMPUTING
- is the foundation of modern technology and plays a pivotal role in our interconnected digital world
• store
• manipulate data
*What is SOFTWARE
SOFTWARE
-refers to a set of instructions which enable the hardware to perform a specific set of tasks.
SOFTWARE use to perform operations, automate processes, and facilitate communication in various domains, including science,
engineering, business, entertainment, and daily life.
*What is HARDWARE
HARDWARE
-refers to the physical and visible components of the system such as a monitor, CPU, keyboard and mouse.
Personal computer
individual use
Servers
-means having a current knowledge and understanding of computers, mobile devices, the web, and related technology.
BACKBONE OF DIGITAL LITERACY
• Computer
• Memory
• Internet
• Network
• Wi-Fi
• Server
• Big Data
A digital citizen
-is a person familiar with how to use technology to become an educated and productive member of the digital world.
Aspects of being a digital citizen include the ethical, legal, and productive use of technology.
*The HISTORY of COMPUTERS (first ancient tools they used, in 20th cen.)
As technology advanced, computers became smaller and more powerful, giving rise to embedded systems used in various
devices today,
such as smartphones
IoT devices
facilitating automation and connectivity in modern life.
Definition: involves searching through discarded materials (like trash bins or dumpsters) to find information that could be used for
malicious purposes.
Example: A cyber attacker rummaging through a company's garbage to find sensitive documents or discarded devices containing
important data.
Phishing:
Definition: a type of cyber-attack where malicious actors impersonates legitimate entities to trick individuals into revealing sensitive
information, such as passwords or credit card details.
Example: Sending an email that appears to be from a bank, asking the recipient to click a link to update their account information.
Definition: A change of address form in computing can refer to a fraudulent request to change personal information associated with
an account, aiming to redirect communications or gain unauthorized access.
Example: Filling out a fake change of address form for an online account to gain access to someone else's account and steal their
information.
Pretexting:
Definition: Pretexting involves creating a fabricated scenario or pretext to manipulate individuals into revealing sensitive information
or performing certain actions.
Example: Posing as a customer service representative to trick someone into sharing their account credentials under the guise of
helping them resolve an issue.
Stealing:
Definition: Stealing in computing refers to unauthorized acquisition of data, identities, or access rights with malicious intent.
Example: Illegally obtaining credit card information from an unsecured database to make fraudulent transactions.
Data Mining:
Definition: Data mining involves the process of extracting valuable patterns and insights from large sets of data to support decision-
making and business strategies.
Example: Analyzing customer purchase histories to identify trends and tailor marketing strategies for a business.
TECHNOLOGY IN EDUCATION:
• Interactive Whiteboards
• Educational Apps
• Telemedicine
TECHNOLOGY IN MANUFACTURING:
• Nanotechnology
• Blockchain for Supply Chain Transparency
• Supply Chain Management Software
•
The computing industry is diverse, including software development, hardware manufacturing, networking, cybersecurity,
and more.
It drives innovation, shapes economies, and transforms industries globally.
The computing profession offers various roles and specializations, such as software development, data science,
cybersecurity, and project management.
Professionals in this field contribute to technology advancement, problem-solving, and innovation.
-Design, develop, and test software applications, websites, and systems. Collaborate with stakeholders to define requirements and
ensure software meets user needs.
SYSTEM ADMINISTRATOR
-Manage and maintain an organization's IT infrastructure, including servers, networks, and databases. Ensure system reliabilit y,
security, and performance.
NETWORK ENGINEER
-Design, implement, and manage computer networks. Optimize network performance, troubleshoot issues, and ensure data
security.
DATA SCIENTIST
-Analyze large datasets to extract valuable insights. Develop machine learning models, data visualizations, and predictive analytics
to inform decision-making.
-Protect computer systems and networks from cyber threats. Monitor for security breaches, implement security measures, and
conduct penetration testing.
DATABASE ADMINISTRATOR
-Manage databases, including data storage, organization, and access control. Ensure data integrity, backup, and recovery.
CLOUD ARCHITECT
-Design and implement cloud-based solutions using platforms like AWS, Azure, or Google Cloud. Optimize cloud infrastructure for
scalability and cost-effectiveness.
UX/ UI DESIGNER
-Create user-friendly and visually appealing interfaces for websites and applications. Conduct user research, wireframing, and
usability testing.
DevOps ENGINEER
-Bridge the gap between development and IT operations. Automate deployment, monitoring, and scaling of applications for
continuous integration and delivery.
IT PROJECT MANAGER
-Lead and coordinate IT projects, ensuring they are delivered on time and within budget. Manage teams, resources, and project
stakeholders.
DATA ENGINEER
-Develop and maintain data pipelines and ETL (Extract, Transform, Load) processes. Prepare data for analysis and reporting.
Mobile devices
MORALITY
a set of rules of right conduct; a system used to modify and regulate our behavior
a quality system by which we judge human acts right or wrong
MORAL THEORIES
Morality needs to be justified, especially to people who are not members of the society in which the set of moral codes are
accepted.
For one to be morally good, one must practice the qualities of being good.
These guidelines are moral codes.
MORAL CODES
rules or norms within a group for what is proper behavior for that group
IT SHOULD BE FREEDOM WITH RESTRAINT, in a world where there is absolute freedom, ANARCHY exists.
ETHICS
Ethics in computing is a branch of applied ethics that deals with the moral and ethical issues arising from the use of comput er
technology, information systems, and the digital realm.
ETHICAL FRAMEWORKS
A software company is developing a new product that will greatly benefit a large number of users worldwide. However, to meet a
tight deadline and ensure profitability, the development team decides to cut corners on security, potentially leading to vulnerabilities
that could be exploited by malicious hackers.
Iinvolve evaluating the consequences of the actions and determining the course of action that maximizes overall utility or happiness
for the greatest number of people. In this case, we have to weigh the benefits of the new product against the potential harm caused
by cutting corners on security.
A software engineer working for a government agency is instructed to create a program that would allow the agency to access
citizens' private emails without their knowledge or consent, citing national security concerns.
1. Identify the Action: The action is creating a program to access citizens' private emails without their knowledge or consent.
2. Examine the Moral Duty: Consider whether there are ethical duties or principles that apply to this action. For example,
respecting privacy, honoring consent, and upholding individual rights are key moral duties.
3. Apply the Golden Rule: Reflect on how you would feel if your own privacy were violated in this manner. Would you want your
emails accessed without consent?
4. Evaluate Alignment with Moral Principles: Determine whether creating the program aligns with the moral duties and the
Golden Rule. In this case, creating a program that violates privacy and consent is likely to contradict these moral principles.
In a deontological approach, the focus is on the action's inherent rightness or wrongness based on moral principles. Creating a
program to invade citizens' privacy without consent is likely to be viewed as ethically wrong, as it violates fundamental principles of
respect for privacy, consent, and individual rights.
A senior software developer witnesses a junior colleague plagiarizing code from an online community to meet project deadlines. The
junior colleague argues that it's common practice in the industry to save time.
We would consider the ethical character and virtues of the senior software developer. Virtue ethics focuses on the moral character of
an individual and the virtues they embody.
1.Identify Relevant Virtues: Virtues like honesty, integrity, responsibility, and professionalism are relevant in this scenario.
2. Deliberation and Reflection: The senior developer should reflect on what virtues are essential in this situation and how they can
best uphold those virtues.
3. Consider the Consequences: Reflect on the potential outcomes of different courses of action. Upholding virtues often leads to
positive consequences in the long run.
4. Decision and Action: Based on a virtuous approach, the senior developer should choose a course of action that aligns with
virtues such as honesty and integrity.
Possible Actions:
a. Confront the Junior Colleague: Engage in a respectful conversation with the junior colleague, expressing concern about
plagiarism and emphasizing the importance of honesty and integrity in the profession. Offer assistance and guidance to help t he
junior developer learn and grow.
b. Report to Higher Authority: If the issue persists, consider reporting the situation to a supervisor or appropriate authority within
the organization, maintaining the focus on upholding ethical standards.
5. Reflect on the Action: After taking action, reflect on whether the decision aligned with virtuous behavior and brought about a
positive impact on the work environment and the junior colleague. In this approach, the emphasis is on fostering moral charac ter
and virtues, promoting ethical behavior, and contributing to a culture of honesty and integrity within the workplace.
IMPORTANCE OF ACM
Professional Networking - global platform for professionals, researchers, educators, and students in the computing field to connect
and collaborate
Research Advancement - publishes a vast array of high-impact journals, magazines, and conference proceedings, making it a
valuable resource for researchers and academics
Education and Outreach - offers educational resources, curriculum recommendations, and support for computing educators at all
levels
Ethical Guidelines - provides ethical guidelines and a code of ethics for computing professionals, emphasizing the importance of
responsible and ethical computing practices.
Conference and Events - organizes numerous conferences, including some of the most prestigious in the field, where professionals
can present research, share knowledge, and stay updated on the latest trends and technologies.
Advocacy - advocates for policies and initiatives that promote the interests of the computing community.
Awards and Recognition - awards prestigious honors, such as the ACM Turing Award, often referred to as the "Nobel Prize of
Computing," to individuals who have made outstanding contributions to the field.
• Accessibility
• Ethical Decision-Making
• Ethics in AI Research