ICT unit 1 and 2 (week 3). For first quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

2. Relational Databases, relation definition and types

Operates by organizing data into various tables based on logical groupings • Most commonly used type of database. Relationship: A link between tables that defines how the data is related. Relationships types: • One to many relationship: A record appearing only once in one table while having the capability of appearing many times in a related table. employees to one department manger • One to one relationship: For each record in a table, there is only one corresponding record in a related table. civil id or passport • Many to many relationship: Multiple records in one table being related to multiple records in a second table and vice versa courses to students - siblings

Processing Devices

Processing takes place between the input and output using: 1. Central Processing Unit (CPU) • Brain of the computer which contains billions of circuits 2. Memory • RAM (Volatile): Stores programs and data that the computer is currently using • ROM (Non-volatile): Holds all the instructions needed to start up the device when powered on Motherboard • Connects all the hardware in the computer • The CPU and the memory are mounted on top of the motherboard

5. Censorship

Various countries have different answers to the question of what information their people should be allowed to see. India: Ranked as first country whose government most often cuts off access to the Internet for its citizens. ▪ The government has argued at times that it is needed to stop cheating on exams or because there is political upheaval China: Chinese government has demanded search engine providers like Google self-censor their search engines, restricting access to foreign websites that express different views than the Chinese government and limiting information on sensitive topic.

Social Media Tools enable people to

Websites or apps that allow users to create and share content and/or participate in social networking with others. enable people to: ▪ Connect and exchange ideas. ▪ Bring together people facing similar problems to fight for social change. • Bot accounts, automated programs retweeting news, stories and quotes, have been used to create discord around controversial topics in many countries. • Knowing how to use and critically evaluate social media is an important skill needed by all.

Database

What?) A collection of related data that can be stored, sorted, organized, and queried • If a database isn't set up correctly, you may end up not getting the type of information you are seeking. (Why?) • Manages large amounts of data efficiently. • Enables information sharing. • Promotes data integrity.

3. Social Justice

(Example 1) Predictive policing • Gathering data from different sources, analysing it, and then using the results to prevent future crime. (Example 2) Military and government secrets • With Web 2.0 tools, everyone can now create and publish content on the Internet. • WikiLeaks (wikileaks.org) makes private and secret documents available for viewing on its site.

Database administrator:

An IT professional who is responsible for designing, constructing, and maintaining databases.

7-Automated Robotic Machinery

Automobiles now contain sophisticated AI systems to exercise control over the vehicle and respond faster than humans can. (Example) self-driving cars by Google

Computer Language

Binary language: ▪ The language computers use to process data into information. ▪ Consists of two digits (0 and 1) Each number, character and symbol (@, ?, %) consists of a unique combination of eight bits. Example: K is represented as 01001011 • Byte: 8 bits • Binary language also represents the quantity of data and information that the computer inputs and output (Ex: Word files, digital pictures, and software)

(CPU)

Central Processing Unit • Brain of the computer which contains billions of circuits

Data Processing

Data: Raw unorganized collection of facts Information: Data that has been organized or presented in a meaningful fashion (Data and information can be in different forms like numbers, words, pictures, sound.)

How do programmers create problem statements? • How do programmers handle bad inputs?

Data: The raw input that users have at the start of the job . • Information: The result, or output, that the users require at the end of the job. • Method: The process of how the program converts the inputs into the correct outputs. How do programmers handle bad inputs? • Error handling: Describing what the program should do if the input data is invalid. • Testing plan: lists specific input numbers that the programmers would typically expect the user to enter.

Cloud Computing

Delivery of computing services over the internet. Features: • Storing and retrieving data from internet-based spaces. • Backing up and sharing data. • Running programs that are not installed locally.

Ethical Considerations and Responsibilities in IT

Ethical Computing Technology has brought a new set of ethical challenges. • Technology often moves faster than rules can be formulated to govern it. • How technology is used is often left up to the individual and the guidance of their personal ethics. • Ethical considerations are complex, and reasonable people can have different, yet valid, views.

Historical evolution of IT

Giant Computers, Personal Computers, Networked Computers, Cloud Computing

Define IT and give examples

Information technology: : The set of techniques used in processing data and retrieving information. Examples: social media tools, crisis mapping tools, health care tools

3. Object-oriented database

It handles unstructured data, such as audio clips, video clips, pictures, and extremely large documents better. • Due to the greater variety of data used in businesses, object-oriented databases are becoming more popular. • Data needs to undergo a costly conversion process

Networked Computers

Network is a group of two or more computers (or nodes) that are configured to share information and resources such as printers, files, and databases. • Invented when computers became user friendly. • Computer network became interconnected. • Both business and public had access to the network. • This phase evolved due to the invention of the Internet, World Wide Web and mobile devices.

6. Social Activism

(Example) Hacktivism • Using computers and computer networks in a subversive (troublemaking) way to promote an agenda. • Using computer hacking to affect some sort of social change. • Computer security has grown more sophisticated. ▪ Nowadays, attacks are usually carried out by groups of hackers or computer scientists funded by nation states. Forms of Hacktivism Denial-of-service attack ▪ Websites are bombarded with requests for information until they are overwhelmed, and legitimate users can't access the site • Cyberterrorism ▪ Objective: To embarrass or harass a company by penetrating its computer networks and stealing (and often publishing) sensitive information

Software Engineering

(What?) An engineering discipline that is concerned with all aspects of software production. • Software engineering is concerned with the practicalities of developing and delivering useful software. Why is it important? • To produce reliable and trustworthy systems economically and quickly.

Programming

(What?) The process of translating a task into a series of commands that a computer will use to perform that task. Program development life cycle (PDLC): 1. Describing the problem 2. Making a plan 3. Coding 4. Debugging 5. Testing and documentation.

application software

(What?) The software you use to do tasks at home, school, and work. (Examples) • Web browsers • Virus protection software • Backup and recovery software

1. Intellectual Property

(What?) Work that is the result of someone's creativity and knowledge that is protected by copyright law and documented by copyrights, patents, and trademarks. (Why?) With increased use of electronic media, challenges to enforcing copyright laws have increased. • Businesses and individuals that use such illegal software potentially gain an advantage in the international marketplace (Piracy). • Piracy challenges have also placed significant pressures on existing business models for creative arts industries such as film and music.

What are the advantages of using a cloud computing technology?

- It can be accessed from any device connected to the internet. - Ease of implementation as no installation or update on computer/device is required. - Subscription based so no need for large up-front payment.

How do databases ensure that data is accurate?

Data integrity ( accurate and reliable) Data integrity checks would prevent a duplicate entry. • Large and complex databases can be time-consuming and expensive to set up and administer.

(Types of Computers) Portable Computers

1. Cell Phone ▪ Internet access ▪ Personal information management (PIM) features ▪ Voice recording features ▪ The ability to play and organize music files ▪ GPS services ▪ Digital image and video capture ▪ Computing power to run programs like word processors and video-editing software ▪ Control of other devices in your "smart" home 2. Tablets Features compared to cell phones: ▪ Similar operating systems( Android, iOS or Windows) ▪ Similar processors ▪ Touch-screen interfaces ▪ Long battery life: Run at least 10 hours on a single charge. ▪ Similar software applications ▪ Similar Internet connectivity ▪ Bluetooth 3. Laptops Laptops variants: ▪ 2-in-1 PCs: laptop computer that can convert into a tablet-like device. ▪ Ultrabooks: Full-featured computers that focus on offering a very thin, lightweight computing solution. ▪ Chromebook: Uses the Google Chrome OS and is designed to be connected to the Internet always. Documents and apps are stored primarily in the cloud as opposed to locally.

Technology impacts how we consume

A. Marketing • There are billions of views of videos each month on YouTube, and marketers are taking note. Influencers: Social media personalities with huge followings and high levels of interaction with their followers. Crowdsourcing: Obtaining information for a project from the opinion of many different people. B. Sharing Economy Items like cars and bikes can now be subscriptions instead of purchases. Collaborative consumption: Implies that we are joining together as a group to use a specific product more efficiently.

Stationary Computers

1. Desktop Computers ▪ Intended for use at a single location. ▪ Consist of a system unit. ▪ Peripheral devices are attached to the. system unit ( Ex: Monitor, keyboard). 2. All-in-one Computers ▪ Computers house the computer's processor and memory in the monitor. Super Computers • Fastest computers. • Analyse significant amount of data and numbers. • Used usually by scientists and engineers. Mainframes • Process and store business transaction ( i.e.. scheduling airlines reservations). Embedded Computers • Computer chip that resides in another device, such as your car, a drone, or the electronic thermostat in your home. • They typically don't receive input from you or interact with other systems

Types of database

1. Flat Databases:

1. Technology connects us with others

A. Collaborating for the Benefit of Others Web 2.0: Allows users to contribute content and connect with one another easily. • Web 2.0 has fostered a dramatic shift for technology users across the world, from simply consuming to having the ability to volunteer and collaborate on projects. Cognitive surplus: Combination of leisure time and the tools to be creative B. Connecting Through Business Crowdfunding: Asking for small donation from a large number of people, often using the internet (Starting business via social media). (Example) • Someone with an idea can build a first attempt at an area makerspace. • Then, by posting a launch video on a site that person can reach people who believe in the idea. • Donors agree to put money forward, knowing the product may not come to fruition, in exchange for special rewards such as a discounts

How are data organized in a relational database?

A. Fields: ▪ Displayed in columns. ▪ Each field is identified by a field name. B. Records: A group of related fields (rows) C. Tables: A group of related records

Ethical Challenges

1. Intellectual Property 2. Privacy 3. Social Justice 4. Liability 5. Censorship 6. Social Activism 7-Automated Robotic Machinery

(Storage Devices) Smartphone Storage Devices:

1. Memory chips 2. Micro SD flash cards (external) (not in all phone models) Allow adding additional memory to the phone. • Installed inside a phone In some phones, external slots for an SD card are provided. 3. Cloud Storage • Using a service that keeps your files on the cloud rather than on your device. • Requires installation of a software or an app on your device • Examples: Google Drive, Microsoft OneDrive, and Dropbox

memory (ram-rom)

2. Memory • RAM (Volatile): Stores programs and data that the computer is currently using • ROM (Non-volatile): Holds all the instructions needed to start up the device when powered on

Software process models

A simplified representation of a software process Waterfall model: A plan driven process that includes cascaded phases. • The result of each phase is one or more documents that are approved. • The following phase should not start until the previous phase has finished.

Database management system (DBMS):

A software that allows a computer to perform database functions. DBMS Operations: 1. Storing and defining data. 2. Viewing, adding, deleting, and modifying data. 3. Querying (extracting) data 4. Outputting data.

• Byte:

8 bits A computer system can be viewed as an enormous collection of on/off switches. • Electrical switches: Devices inside the computer that are flipped between the two states of 1 and 0 (on and off)

Crisis-Mapping Tools Health care tools

A tool that collects information from e-mails, text messages, blog posts, and tweets and then maps them, instantly making the information publicly available. HCT: such as simulators to know the effect of a certain prucurment or drug

Software Licenses

: An agreement between the user, and the software company which outlines the acceptable uses of the program. • Software don't belong to users. • Users purchase a license. • Single license vs multiuser licenses. • Open-source software requires Public License. Can you use a Software on your device when you don't own the license? • No, it is considered a participation in software piracy.

Computer Functions

A Computer is a data processing device that converts data into information 1. Processing: Manipulates, calculates, or organizes that data into information 2. Input: Gathers data or allows users to enter data 3. Output: Displays data and information in a form suitable for the user 4. Storage: Saves data and information

Hardware, software and OS

A computer processes data into information using both hardware and software. Hardware: is any part of the computer you can physically touch. Software: is the set of computer programs that enables the hardware to perform different tasks, such as processing data into information. Operating system (OS): The program that controls how your computer functions (common type of software) Examples of OS: Microsoft Windows, Apple macOS.

PC (personal computers)

A computer that can run programs by itself. • First PCs were only capable of displaying one colour on the screen monitor. • Some applications it ran: Games , word processing, business spreadsheet programs. Internet became available to public at the end of the second phase of the digital revolution. • World Wide Web (WWW) was not available.

Output Devices

A device that sends processed data and information out of a computer in the form of text, pictures (graphics), sounds (audio), or video Examples: ▪ Display screen, monitor ▪ Speakers ▪ Printers (Inkjet and laser printers) ▪ Headphones ▪ Projectors

Input Devices

A device used to enter, or input, data (text, images, and sounds) and instructions (user responses and commands) into a computer. Examples: ▪ Keyboard ▪ Mouse ▪ Touch pad, used in laptops ▪ Joysticks and steering wheels in gamming ▪ Flatbed scanner ▪ Digital camera ▪ Webcam ▪ Microphone ▪ Fingerprint sensor ▪ Touch screens

Giant computers

A large computer made up from individual parts to perform different functions. • Located in special facilities. • Needed highly skilled technicians to run them. • Programs run on giant computers had to be small in size • Terminals could be connected to the main computer.

Software process:

A sequence of activities that leads to the production of a software product

Software

A set of instructions that tells the computer what to do • An instruction set (program) helps users to interact with and use the computer. How is software created? 1. Proprietary (or commercial) software: Created by companies for profit and then sold to you. 2. Open-source software: Available free of charge and with few licensing and copyright restriction. Types of software: - Application software - System software

Computer Literacy

Computer Literacy Understanding computer terminology and staying updated with technological advancement computer: -software (application software, system software) - hardware (internal (processor) external (keyboard) Why should you be computer literate? • Understand the capabilities and limitations of computers. • Know how to use computers safely and efficiently. • Avoid hackers and viruses. • Protect your privacy.

How do databases make information sharing possible?

Data Centralization • A centralized source ensures that everyone can access the same data. • Many databases control who has access to the data ( data security)

1. Flat Databases:

Represented as a list or simple table. • Most word processing and spreadsheet applications have tools to help you create a flat database. Disadvantages of flat databases: • Duplication • Inconsistency • Inappropriate data • Incomplete data

Syntax: Statement Syntax error:

Syntax: an agreed-upon set of rules defining how a language must be structured Statement: Sentence in a code Syntax error: Violations of the strict, precise set of rules that define the programming language

Ethics and morals

The study of the general nature of morals and of the specific moral choices individuals make. • Ethics provide a general set of unwritten guidelines for people to follow. • Morals involve conforming to established or accepted ideas of right and wrong ▪ Usually viewed as being black or white • Unethical behaviour is not conforming to a set of approved standards of behaviour. Example of an unethical behaviour: Cheating on an exam. There is no universal agreement on which system of ethics is the best.

2. Software as a service (SaaS):

• A vendor hosts the software online. • The software is accessed over the Internet(no installation required on HDD). • The program can only be used when connected to the Internet. • Often free of charge. • Not as full-featured as locally installed versions. Examples: Google Docs and Microsoft Office Online

Why is it important to learn about IT?

• Computers are everywhere (Digital Society). • A thorough understanding of key concepts in technology can future-proof people to easily and quickly react to the next round of new technologies. • Technology is a tool that enables individuals to make an impact beyond their own lives by participating in state-of-the-art projects.

Storing data, input forms

• Data can be manually entered into a database (inefficient) (Why?) • Most databases import data from other files (web-based data, spreadsheets, data from other database) Input forms: Used to control how new data is entered into a database

Integrated circuits

• Early computers used transistors. • Later, integrated circuits were developed due to technological advancement. • Integrated circuits (or chips) are tiny regions of semiconductor material that support a huge number of transistors. ▪ Enables computer designers to create small yet powerful microprocessors

(Storage Devices) Portable Storage Options:

• Flash drive: Up to 4TB storage capacity • Flash memory card: Transfer data between computers and digital cameras, smartphones, tablets, video cameras, and printers.

(Storage Devices) Local Storage Devices:

• Hard drive (HDD): Non-volatile Permanent storage of software and data. ▪ Internal hard drive: Resides within the desktop or laptop system unit. ▪ External hard drives: reside outside the system unit and connect to the computer via a port. • Solid-state drive (SSD): run with no noise, emit little heat, and require little power Portable Storage Options:

Outputting data

• Information is derived by querying, sorting, and filtering the data. • We use reports to represent information (output).

2. Privacy

• Intelligent personal agents are constantly listening to their users and combing through your data to help determine your needs. • Social media sites: User's privacy settings will allow these sites to have information they are not legally allowed to have. • Facebook and Twitter generate information about you based on your behaviour on their sites.

Standard format for a problem statement

• Most companies have their own format for documenting a problem statement. • All problem statements include the same basic components: ▪ Input ▪ Output ▪ Processing ▪ Error handling

1. Local installation:

• Paying a one-time fee for either an electronic download or a disc of the software. • Software can be run anytime ( no internet connection required). • Given the option to upgrade to a new version by repaying for a repurchase or an upgrade.

Programming, Macros

• People face a wide array of tasks on a daily basis. • Some tasks are complex and require creative thought and a human touch. • Repetitive tasks which follow a series of clear steps are candidates for automation with computers. • Automation is achieved through programming. • knowing the basics of programming is important to help people use computers productively. • Basic programming knowledge enables users to add features that support their personal needs • Macros: A small program that groups a series of commands to run as a single command

3. Subscription:

• Requires monthly or annual fee to use the software. • After the fees are paid, the software will become available for download and installation on the computer. • Software can be used without an internet connection. Examples: Adobe Creative Cloud, Microsoft Office 365

Most common way for buying a software

• Software is purchased online and downloaded to the computer. • If the used machine has an optical drive (a DVD or Blu-ray reader), the software can be purchased in disc form (Gaming consoles software). • Mobile devices software are sold electronically through online sites. Examples: App Store (Apples), Microsoft Store (Microsoft), Google Play (Google ) • If you are a student, you can buy substantially discounted software that is not different from regularly priced software). • Microsoft and Adobe, often offer their products to students at a discount. • Some software developers offer beta versions of their software free of charge. • Beta version: An application that is still under development. Why do Beta version exist? To help developers find errors, or bugs reported by their program users. • Users are advised to upgrade software periodically. • Software developers improve the functionality of their software by releasing a software upgrade. • Subscription or using the cloud-based SaaS model are upgraded automatically. • In between upgrades, developers will make available software updates (software patches).

Structured Query Language (SQL)

• To extract records from a database, you use a query language. • Oracle, Microsoft SQL Server, Microsoft Access, IBM DB2, and MySQL are examples of popular databases that use SQL

4. Liability

• Traditional manufacturing makes it relatively easy to enforce safety laws. (Example ) A person uses 3D scanner to scan an existing object. Then, the person uses design software to create their own plan for how to print the object. ▪ If the object is patented, this would be a violation of the law. • Products are subjected to safety testing prior to being sold to the public and must conform to legal safety guidelines.

What kind of problems can computer programs solve? not?

▪ Repetitive tasks. ▪ Tasks that work with electronic information. ▪ Tasks that follow a series of clear steps are good candidates for computerization. What kinds of problems can computers not solve? ▪ Problems requiring intuition or spontaneous creativity. • Computers don't think as humans do. They can only follow instructions and algorithms.

• All programming languages have four common elements:

▪ Rules of syntax ▪ Keywords set ▪ A group of supported data types ▪ A set of allowed operators


Kaugnay na mga set ng pag-aaral

Workplace violence and threatening behavior

View Set

Life and Health Insurance Missouri

View Set

FR 3 - Consolidation Less than 100% Ownership

View Set

WEEK 1: Chapter 1: Modern Network Security Threats

View Set