Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

THE GREAT PLEBEIAN COLLEGE

City of Alaminos, Pangasinan


First Semester A.Y 2020-2021
College of Teacher’s Education

AE 21 IT APPLICATION TOOLS IN BUSINESS


Module 1
(Week 1-4)

Student’s Name

Instructor:
Patrick Dave Consay
1|Page
Overview:

This module is designed to provide you with a background of knowledge in the fundamental aspects
of application and tools used in business.

It focuses on the following: Computer Hardware and Software: (1) a. File Management b. Transferring Data
c. Security d. Networked System (2) e. Hardware and Software functions f. Maintenance (3) g. Evaluate
careers in commerce and information technology h. Commerce and Information Technology Terminology (4) i.
Consequences of unsafe, illegal, and unethical use of technology systems and digital content j. Copyright
Laws

This module primarily aims to cover all these important topics for the next four weeks. Discussion 1 discuss
the process of file management and transferring data. It also includes security and networked systems.

Discussion 2 discuss the different functions of computer Hardware and Software. Discuss the proper way of
maintaining a PC

Discussion 3 focuses on the process of evaluating careers in commerce and information technology including
terms and terminologies for commerce and information technology

Discussion 4 details the consequences of unsafe ,illegal, and unethical use of technology systems and digital
contents and defining the different copyright laws that they may encounter

This module aims that the presentation and discussion of the lessons were clear and will help you learn all
the topics well.

Learning Objectives

After completing this Module, students will be able to:

• Differentiate computer hardware and software;


• Utilize advanced technology utilities, including compressing files, converting
files, importing files, exporting files, and transferring data among applications;
• Diagnose problems related to technology systems, including advanced network
systems, hardware, and software;
• Utilize digital tools to deliver commerce and information technology curriculum-
related content to an audience.and;
• describe cloud computing and its advantages and disadvantages for use in an
• organization.

Introduction

2|Page
One fundamental component in today’s business environment is information
technology (IT). This important feature of business management can include both
computerized data systems and communication functions. Order entry,
information storage and retrieval, interdepartmental connectivity, and customer
relationship features are the key requirements of this business function. Sharing
data across separate disciplines is fundamental to success; so is automating time-
consuming or repetitive activities. Managers must control and streamline the flow
of information throughout an organization.

Technology is a body of knowledge devoted to creating tools, processing actions


and extracting of materials. The term technology is wide and everyone has their
own way of understanding the meaning of technology. We apply technology in
almost everything we do in our lives, we use technology at work, we use it to
extract materials, we use technology for communications, transportation, learning,
manufacturing, creating artifacts, securing data, scaling businesses and so much
more. Technology is human knowledge which involves tools, materials and

systems. The application of technology results in artifacts or products. If


technology is well applied, it can benefit humans but if it is wrongly applied, it can
cause harm to human beings. Many businesses are using technology to stay
competitive, they create new products and services using technology, and they
also use technology to deliver those products and services to their customers on
time. A good example is, mobile phones companies like Apple & Samsung,
and these two electronics companies use high technology to create new
smartphones and other electronic devices to stay competitive. This competitive
edge is gained through employing advanced technology.

Contents
3|Page
Discussion 1 Introduction
File Management 5
Transferring Data 11
Security 14
Networked System 18

Discussion 2
Hardware and Software 21
functions
Maintenance 23

Discussion 3
Evaluate careers in 26
commerce and
information technology

Discussion 4
Consequences of unsafe, 28
illegal, and unethical use
of technology systems
and digital content
Copyright Laws 29

Discussion 1

4|Page
FILE MANAGEMENT

We will begin this lesson by defining several terms associated with file management. It is
important to understand these terms in order to successfully organize and find the files
you work with on your computer.

1. File Management: The process and act of creating an organized structure in which
you store information for easy retrieval.

2. Drive: A drive is a computer storage device that holds information. It is the top-level
location (or "Root" directory) for file storage. Drives are usually designated with a
letter such as C:\ (which is typically the hard drive of the computer you are working
on). Other examples of drives would be the network drive on campus (which is the
Z:\ drive) and external USB drives that you may use such as a Flash or Thumb
Drive. The letters of these drives vary depending on the computer that you are
using.

3. Folder: A folder is a storage location within a drive. Another term for a folder is a
"directory", however
the term "folder" has
become the term of
choice for most. A
folder can consist of
files or additional
folders (called
"Subfolders").
Users can create
folders that
accommodate their
method of
organization. For
example, you may
want to store all of your work for your English course in a particular area of your
computer to make it easier for you to find.

To do this you might create a folder on your C:\ drive named "English" and then
within the "English" folder create two additional subfolders -- One for Papers and
one for Journals. The folder structure would look like the example to the right.

4. File: A file can be a document, spreadsheet, image, or other type of item that is
stored on a computer. Files are typically associated with a program or software
application that is needed in order to open the item.

5. File Extension: The file extension appears after the period in the filename and is
used to indicate the type of format the file is in. For example the file extension
".docx" indicates that the file is a Microsoft Word document. A complete filename
using this extension may look like this: "Letter to Mom.docx"

6. Path: The path refers to the exact location of the file and indicates to the computer
user the entire sequence that must be followed to find the file. The path begins with
the drive and then includes any folders or subfolders that house the file. In the
screenshot above, a Microsoft Word document named "paper1.docx" that is stored
in the "Papers" folder would have the path: C:\English\Papers\paper1.docx.
5|Page
7. File Management Utility: A File Management Utility is a computer program that
provides a user with a graphical interface in which he/she can organize files and
folders on a computer's storage device.

8. Zipping (Compressing): Zipping is the process of packaging a folder that contains


multiple files into a single file (called a "Compressed" or "Zipped" folder). In addition
to combining multiple files into one, the resulting zipped folder typically takes up less
storage space. Knowing how to zip files is especially useful when you need to send
multiple files to someone either (example: through email or an online course). A Zip
folder has a ".zip" file extension and the icon for the zip folder typically looks like a
folder with a zipper. In order for the recipient to view the files, they would first need
to unzip (or Extract) the zipped folder to be able to access the individual items
inside.

What is File Management All


About?

We learned that File
Management refers to the process
and act of creating an organized
structure in which you store
information for easy retrieval.
Basically, it means you store your
work in a location where you know
that you can find it again at a later
date if needed. Effective electronic file
management skills are essential to
becoming computer competent.

The two key components of File


Management that must be mastered
are:

1. Having an Understanding of the


"Big Picture" of File
Management and...

2. Mastering the specific "how-to's"


of carrying out the Management
of Your Files

This Lesson will focus on the first of


these components. The specific How-
to's are discussed in great length in
the next document: "Strategies, How-
To's and Tips".

6|Page
How Do I Determine
the Structure of My
File Management
System?

Planning out and


thinking about how you
want to organize your
files is probably the
most important step of
File Management and is
really no different than
the planning process
that is used when
setting up a physical file
cabinet. If you think
about a file cabinet, the
typical components you
might find are:

1. The Cabinet
2. Hanging File
Folders
3. Manilla Folders

The Cabinet is the main


housing structure for
everything you are filing.
The Hanging File
Folders group items in
the cabinet based on
broad categories.
Finally, the Manilla
Folders are used and
kept within the Hanging
file folders to house
items of an even more
specific nature.

For example, you may


want to organize your
pile of paperwork at
home into a logical
structure within a file
cabinet. One category
of paper that you have
are your bills. Another
category you need to
file are your bank
statements.

7|Page
To the left is a graphical
representation of how
you could organize
these items. The
structure contains two
hanging file folders --
one for bills and one for
bank statements. To
further organize your
bills, you have chosen
to insert two manilla
folders, one for each
type of bill that you pay.
Doing this will make it
easier to find a
particular bill in the
future.

How Does This Apply to Files on My Computer?

The same file management principles apply to the electronic


files stored on your computer. In the previous document, we
learned the terms drive, folder and file. Here, we will use our
previous illustration regarding the file cabinet and our
paperwork and see what the same management structure
would look like electronically. In other words, we are going to
be "filing" our e-bills, and e-statements on our computer rather
than in a physical file cabinet.

Where Do I Manage My Electronic Files?

Files can be managed in a couple of different ways. One is


through a File Management Utility (such as "My Computer"
also called "Computer", or "Windows Explorer") and the
second is through the application that is used to create the file
(such as "Microsoft Word"). Both methods utilize the drive,
folder and file structure that we will talk about and for the
purposes of this lesson we will focus on using the File
Managemant Utility that is built into the Windows Operating
System ("My Computer", "Computer" or "Windows Explorer"
depending on the version of Windows you are using). For the
remainder of this tutorial, we will refer to the utility as
"Windows Explorer" . The benefit on focussing on this utility is
that the tasks that you will learn apply to all files on your
computer regardless of the application used to create them.

The next document will give you an overview of the Windows


Explorer as well as links to tutorials where you can find
additional information if needed.

8|Page
What is a File Management Utility?

A File Management Utility is a computer program that provides a user with a graphical
interface in which he/she can organize files and folders on a computer's storage device.
This lesson will focus on the built in File Management Utility that is packaged with
Microsoft Windows ("My Computer", "Computer" or "Windows Explorer" depending on the
version of Windows you are using). As we stated in the last lesson, we will be referring to
the utility as "Windows Explorer" for consistency. Please note that "Windows Explorer" is a
file management utility and should not be confused with "Internet Explorer" which is a web
browser.

Windows Explorer can usually be found by clicking on the Windows Start Button. On most
computers it will be displayed in the column of Windows programs on the right side of the
menu that pops up.

The screenshot to the right demonstrates how you could access Windows Explorer by
clicking on the "Computer" option in the menu

What Will the Utility Tell Me?

When you click on "Computer" in the file


menu, the Windows Explorer will open. We
learned earlier in the lesson the differences
between a drive, folder and file. The main
window below will display all of the drives
that your computer has access to and will
also give you an area in which you can
navigate with the drive through your folder
structure to locate files. Once a folder or file
is located, it can be moved, copied,
renamed, zipped or deleted. Our next
document will cover each of these
processes.

The computer depicted In the screenshot


below has access to several drives (also
called "disk drives") on which information
can be stored. There are three types of disk
drives represented in the picture: Hard
Disks, Removable Storage and Network
Locations. We will go into additional detail
regarding the typical storage locations
available to you at Broome Community

9|Page
College, but for now we will just quickly look at what is meant by each type of drive.

Hard Disk Drive: This type of drive typically can not easily be removed from the computer
and transported from place to place. A common letter designator for the main hard disk
drive of a computer is C:\. The C:\ drive is typically the computer's main internal storage
unit. It is also possible to add additional hard disks to your computer, such as an external
hard drive which is typically used for backup. At BCC, if you are working in a computer
lab, you want to make sure that you don't save your work to the C:\ drive as it will only
exist locally on the individual computer in the lab.

Removable Storage: There are several different types of removable storage that can be
used for saving and transporting files from one computer to another. For our purposes, we
will focus on the Flash Drive (also known as the "Thumb Drive"). The Flash Drive is a
small device with storage capabilities that vary depending on the device and is accessed
by the computer through a USB port.

Network Locations: If your computer is connected to a computer network (as the PCs at
BCC are) you will most likely have access to network drives in addition to those available
locally on the computer that you are using. The computer that contains the network drive
will be physically located in another location on a special computer known as a server.
The benefit of using the network drive on campus is that it can be accessed from any
computer on campus that allows you to log on to the network. At BCC, your network drive
is the Z:\ drive.

10 | P a g e
How Do I Use Windows Explorer (the File Management Utility) to See My Folders
and Files?

The image above focused on the main window that appears when opening the Windows
Explorer File Management Utility. We will now look at how folder and file structure is
displayed in the program and how you can open drives and folders to see the files
contained within them. We will focus on the C:\ drive for demonstration purposes. Please
note that the principles and skills that we learn for the C:\ drive can be applied to other
drives on your computer such
as a flash drive or your network
Z:\ drive.

First, we will look at how to


expand the folder listing on the
left side of the Explorer
window. By default, all drives
are collapsed when the window
first opens. To see the items
saved to a particular drive, you
hover your mouse over the
drive letter until a triangle
appears. If you click the
triangle, the drive will expand
to show the folders that are
saved within it. If the folder contains a subfolder, you can expand that as well using the
same method. The image to the right shows the C:\ drive and the English Folder
expanded. You can see in the folder list that the English folder contains two subfolders --
"Journals" and "Papers". If you wanted to see what was in the Papers folder, you would
click on it.

Doing this will change the right pane of the screen to display the contents of the folder. In
this case, we have expanded the C:\ drive, the English folder and have clicked on the
Papers folder to display the one file that is contained within it. In this example, the file is a
Microsoft Word Document named "Paper 1". If you were to double click on the filename,
the Microsoft Word program would launch on your computer (assuming that you have it
installed) and the file would open.

11 | P a g e
TRANSFERRING DATA

How to Transfer Files?

Nothing is more exciting than getting a brand new PC. Typically, a new computer
means receiving a host of new features, more power, better graphics, and more
storage. However, some of that excitement might be tempered if you need to transfer
files from your old computer to your new one. Wondering how to transfer files from PC
to PC? We’ll help you determine the best way to do it.

There are a few factors that will influence the process such as how many files you
need to transfer, the size of the files, and the operating systems of the two computers.

Transferring files isn’t an overly complex process but it may take up to several hours
depending on the amount of data you need to transfer. There are several ways to
transfer your old files from PC to PC. Here are the five most common methods you can
try for yourself.

1. Cloud storage or web data transfers

There are several cloud storage providers such as Google Drive or OneDrive you may
utilize to send and download files. Whichever storage provider you use depends on
your individual preference. Why are cloud drives so useful when it comes to file
transfers? Because these cloud-based services allow you to download and transfer
files of virtually unlimited sizes, storage space permitting.

If you don’t have cloud storage or would rather not use it, you can also use web
software to upload bigger files. PlusTransfer, for example, is free and you can upload
files as big as 5GB in one fell swoop. Hate signing up for services? Don’t worry, you
don’t even need to register for an account and there’s no software to download. It’s a
streamlined answer to file sharing needs.

If you want a downloadable software option, BitTorrent Sync is another easy way to


share large files without depending on cloud services. You can also use FilePizza,
which is a peer-to-peer file-sharing app. As one computer uploads the file, the other
can download it immediately, so you won’t be waiting around. In addition, because
FilePizza is browser-based, you don’t need both computers linked to the same cloud
drive.

2. SSD and HDD drives via SATA cables

Trying to transfer data from an old laptop to a new one? If your old computer isn’t
working, you might think you’re out of options as far as recovering your data goes, but
thankfully you’re wrong. Both solid-state drives and hard disk drives use SATA cables
to link them to the main circuit board, also known as the motherboard.

You can connect your old hard drive to a SATA SSD or eSATA (an external SATA)
port in your new computer. After you install the old drive, the operating system in your
new PC will read the drive and begin transferring the data over .
12 | P a g e
One issue you may run into with this method is finding an extra SATA port. To get
around this problem, you may want to use a SATA to USB converter.

Once you get all the files off your old hard drive, you have the option to use it as an
external storage device. This is a great tool to use if you want to back up any important
files.

3. Basic cable transfer

Instead of relying on a cloud-based service or an external hard drive, you can also use
a variety of cables to transfer data. This method is typically speedier than using drives
because files are being copied and pasted in tandem, PC to PC.

As soon as you connect your devices via USB ports, the transfer software included
with the cable will guide you through the migration of your files and settings. If both
PCs have USB 3.0 ports, you’ll be able to transfer data a lot faster so keep that in mind
as you begin the file migration process .

If you need any cables or accessories to start your data transfer, HP offers a variety of
cables to enable you to optimize the experience.

4. Use software to speed up your data transfer

If you’re looking for a simple solution to transfer files from PC to PC, the LapLink
PCmover v.11.0 Ultimate with Ethernet cable might be what you’ve been searching for.
This software makes it effortless to move files from your old PC to your new Windows
10 computer.

To use the PCmover software, you simply start by installing the software on both your
new and old PC. Most of the applications and files will be installed so they’re
immediately functioning on the new PC without needing to dig out license numbers or
installation discs. Microsoft's Windows Easy Transfer was scrapped so PCmover is the
lightning-fast, necessary solution that saves you from data transfer frustration.

PCmover benefits:

Allows you to choose exactly which files, settings, applications, and users to transfer to
your new PC

Only transfers certain files and applications to specific users if the device is used by
multiple individuals

The security information regarding each file and access controls are specific to each
user

The only data transfer system recommended by Microsoft

With Laplink’s PCmover, you can transfer your PC’s data in a variety of
ways. PCmover’s auto connection technology will pick the fastest and most efficient
migration method for you:

13 | P a g e
 Over WiFi or over a wired network
 Via a Laplink Ethernet cable
 Via a Laplink USB 2.0 cable
 Laplink SuperSpeed USB 3.0 cable
 Direct transfer from an old hard drive or an external device

5. Transfer your data over WiFi or LAN

If both your computers are on the same network and within range, you can set up a
local area network (LAN) so you can use one PC to search through the other PC’s hard
drives to choose which files you want to be transferred over.

Windows 10 and other operating systems have a built-in setting that allows users to set
up a home network so devices on that same network can recognize each other. What
does that mean for the user? Well, each time you transfer files PC to PC, you won’t
need to go through the process of setting up a new connection. The connection will
always be accessible as long as both devices are powered on.

6. Using an external storage device or flash drives

This is probably the most popular way to transfer files PC to PC, besides sending files
over email which has fairly severe file size limits of up to around 25MB . For this data
sharing method, you only have to complete a few steps:

1. Plug in USB flash drive to the old computer

2. Once the flash drive is recognized, copy desired files and applications to it

3. Unplug the flash drive using appropriate procedures (do not remove until files have
finishing copying)

4. Plug in the flash drive to your new computer and transfer data

This copy-and-paste method is user-friendly, but it is limited by the storage capacity of


the external device . If both computers that you’re transferring data between have USB
3.0 ports, you may want to invest in a USB 3.0 flash drive, which has a very speedy
data transfer rate.

The more data you have to migrate over to a new device, the more important the
speed of the transfer rate will become. Even small differences in speed can make a
difference of hours if you plan to move a high volume of files.

Because flash drives usually have more limited storage availability, many users may
want to consider upgrading to an external hard drive to move files.

After you’re done transferring files

Wipe the old drive before disposing of it

Finally done transferring all those files? Your first plan of action should be to wipe your
old drive and computer if you plan on selling, giving away, or throwing away your old
14 | P a g e
PC. Transferring your personal files doesn’t protect you alone because your old emails
and other sensitive information can still fall into the wrong hands.

Back up your new drive

The next step is to protect the files you transferred to your new device from possible
catastrophe. After the file migration is complete, you should back up all important files.

If you’ve ever lost an important work assignment before a deadline or seen the blue
screen of death take over as you’re trying to submit an essay, you know that familiar
panic.
SECURITY

What is computer security?


Computer security basically is the protection of computer systems and information from
harm, theft, and unauthorized use. It is the process of preventing and detecting
unauthorized use of your computer system.

There are various types of computer security which is widely used to protect the
valuable information of an organization.

What is Computer Security and its types?

One way to ascertain the similarities and differences among Computer Security is by
asking what is being secured. For example,

 Information security is securing information from unauthorized access,


modification & deletion
 Application Security is securing an application by building security features to
prevent from Cyber Threats such as SQL injection, DoS attacks, data breaches
and etc.
 Computer Security means securing a standalone machine by keeping it updated
and patched
 Network Security is by securing both the software and hardware technologies
 Cybersecurity is defined as protecting computer systems, which communicate
over the computer networks

So, Computer security can be defined as controls that are put in place to provide


confidentiality, integrity, and availability for all components of computer systems. Let’s
elaborate the definition.

Components of computer system

The components of a computer system that needs to be protected are:

 Hardware, the physical part of the computer, like the system memory and disk
drive
 Firmware, permanent software that is etched into a hardware device’s nonvolatile
memory and is mostly invisible to the user
 Software, the programming that offers services, like operating system, word
processor, internet browser to the user 
15 | P a g e
The CIA Triad

Computer security is mainly concerned with three main areas:

 Confidentiality is ensuring that information is available only to the intended


audience
 Integrity is protecting information from being modified by unauthorized parties
 Availability is protecting information from being modified by unauthorized parties

In simple language, computer security is making sure information and computer


components are usable but still protected from people or software that shouldn’t
access it or modify it.

Now moving forward with this ‘What is Computer Security?” article let’s look at the
most common security threats.

Computer security threats


Computer security threats are possible dangers that can possibly hamper the normal
functioning of your computer. In the present age, cyber threats are constantly
increasing as the world is going digital. The most harmful types of computer security
are:

Viruses

A computer virus is a malicious program which is loaded into the user’s


computer without user’s knowledge. It replicates itself and infects the files and
programs on the user’s PC. The ultimate goal of a virus is to ensure that the victim’s
computer will never be able to operate properly or even at all. 

Computer Worm

16 | P a g e
A computer worm is a software program that can copy itself from one
computer to another, without human interaction. The potential risk here is that it will
use up your computer hard disk space because a worm can replicate in greate volume
and with great speed.

Phishing

Disguising as a trustworthy person or business, phishers attempt to steal sensitive


financial or personal information through fraudulent email or instant
messages. Phishing in unfortunately very easy to execute. You are deluded into
thinking it’s the legitimate mail and you may enter your personal information.

Botnet

A botnet is a group of computers connected to the internet, that have


been compromised by a hacker using a computer virus. An individual computer is
called ‘zombie computer’. The result of this threat is the victim’s computer, which is the
bot will be used for malicious activities and for a larger scale attack like DDoS.

Rootkit

A rootkit is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence. Once a rootkit has
been installed, the controller of the rootkit will be able to remotely execute files and
change system configurations on the host machine.

Keylogger

17 | P a g e
Also known as a keystroke logger, keyloggers can track the real-time
activity of a user on his computer. It keeps a record of all the keystrokes made by user
keyboard. Keylogger is also a very powerful threat to steal people’s login credential
such as username and password.

These are perhaps the most common security threats that you’ll come across. Apart
from these, there are others like spyware, wabbits, scareware, bluesnarfing and
many more. Fortunately, there are ways to protect yourself against these attacks.

Why is Computer Security Important?


In this digital era, we all want to keep our computers and our personal information
secure and hence computer security is important to keep our personal information
protected. It is also important to maintain our computer security and its overall health
by preventing viruses and malware which would impact on the system performance.

Computer Security Practices


Computer security threats are becoming relentlessly inventive these days. There is
much need for one to arm oneself with information and resources to safeguard against
these complex and growing computer security threats and stay safe online. Some
preventive steps you can take include:

 Secure your computer physically by:


o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security guard between
the internet and your local area network 
 Stay up-to-date on the latest software and news surrounding your devices and
perform software updates as soon as they become available
 Avoid clicking on email attachments unless you know the source 
 Change passwords regularly, using a unique combination of numbers, letters and
case types
 Use the internet with caution and ignore pop-ups, drive-by downloads while
surfing
 Taking the time to research the basic aspects of computer security and educate
yourself on evolving cyber-threats
 Perform daily full system scans and create a periodic system backup schedule to
ensure your data is retrievable should something happen to your computer.

Apart from these, there are many ways you can protect your computer system. Aspects
such as encryption and computer cleaners can assist in protecting your computers and
its files.

NETWORK SYSTEM

Computer network system


18 | P a g e
Two or more computers that are connected with one another for the purpose of
communicating data electronically. Besides physically connecting computer and
communication devices, a network system serves the important function of establishing
a cohesive architecture that allows a variety of equipment types to transfer information
in a near-seamless fashion. Two popular architectures are ISO Open Systems
Interconnection (OSI) and IBM’s Systems Network Architecture (SNA).

Two basic network types are local-area networks (LANs) and wide-area networks


(WANs). LANs connect computers and peripheral devices in a limited physical area,
such as a business office, laboratory, or college campus, by means of links
(wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly. A
typical LAN consists of two or more personal computers, printers, and high-capacity
disk-storage devices called file servers, which enable each computer on the network to
access a common set of files. LAN operating system software, which interprets input
and instructs networked devices, allows users to communicate with each other; share
the printers and storage equipment; and simultaneously access centrally located
processors, data, or programs (instruction sets). LAN users may also access other
LANs or tap into WANs. LANs with similar architectures are linked by “bridges,” which
act as transfer points. LANs with different architectures are linked by “gateways,” which
convert data as it passes between systems.

WANs connect computers and smaller networks to larger networks over greater


geographic areas, including different continents. They may link the computers by
means of cables, optical fibres, or satellites, but their users commonly access the
networks via a modem (a device that allows computers to communicate
over telephone lines). The largest WAN is the Internet, a collection of networks and
gateways linking billions of computer users on every continent.

Summary

In this chapter, you have been introduced to the concept of information technology. We
have reviewed several definitions, with a focus on the components of information file
management, transferring data, security and networked systems. We have reviewed
how the business use of information systems has evolved over the years, from the use
of large mainframe computers for number crunching, through the introduction of the PC
and networks, all the way to the era of mobile computing. During each of these phases,
new innovations in software and technology allowed businesses to integrate
technology more deeply. We are now to a point where every company is using
information systems and asking the question: Does it bring a competitive advantage?
In the end, that is really what this book is about. Every businessperson should
understand what an information system is and how it can be used to bring a
competitive advantage. And that is the task we have before us.

19 | P a g e
ACTIVITY 1:

ESSAY: Write an essay about how file management will improve your work especially when you are having a
business (minimum of 100 words)

Features Expert Accomplished Capable Beginner


4 3 2 1
Quality of Piece was Piece was Piece had little Piece had no
Writing written in an written in an style or voice style or voice
extraordinary interesting style Gives some Gives no new
style and voice and voice new information information and
Very Somewhat but poorly very poorly
informative and informative and organized organized
well-organized organized
Grammar, Virtually no Few spelling A number of So many
Usage & spelling, and spelling, spelling,
Mechanics punctuation or punctuation punctuation or punctuation
grammatical errors, minor grammatical and
errors grammatical errors grammatical
errors errors that it
interferes with
the meaning

ACTIVITY 2:

20 | P a g e
ENUMERATE: State 5 instances where you could encounter dangers in the internet and explain how can you
avoid certain circumstances. (5 pts each)

Example: Playing unregistered online game using your PC – avoid playing illegally uploaded games and
ensuring background checking and reading feedbacks.

Discussion 2

Hardware and
Software Functions

WHAT PARTS ARE NEEDED FOR A COMPUTER TO WORK?

A computer does not require all the components mentioned above. However, a computer
cannot function without having at the very minimum the parts listed below.

Processor - Component that executes instructions from the software and hardware.

Memory - Temporary primary storage for data traveling between the storage and CPU.

Motherboard (with onboard video) - Component that connects all components.

Storage device (e.g., hard drive) - Slower secondary storage that permanently stores data.

However, if you had a computer with only the minimum parts above, you would be unable to
communicate with it until you connected at least one input device (e.g., keyboard). Also, for you to
see what is happening, you would need at least one output device (e.g., monitor).

TYPES OF COMPUTERS

21 | P a g e
When talking about a computer or a "PC," you are usually referring to a desktop computer
found in a home or office. Today, however, the lines of what makes a computer are blurring. Below
are all the different examples of what is considered a computer today.

HARDWARE

Physical structure that houses a computer's processor, memory, storage, communication ports and
peripheral devices. Each of these components (called devices) have a different purpose, which may
be either accepting inputs, storing data or sending outputs.

Processor (CPU)

The component that processes and executes inputs received from hardware and software.

Motherboard

A mainboard that provides basic connection between all the other hardware components and devices
(internal and external).

Memory (RAM)

A temporary data storage space that stores the information the CPU is actively using.

Storage device

A storage device where data is stored on a permanent basis. It’s slower but less volatile than the
RAM.

Power supply unit

It is where the power of the computer came from either the battery or a socket.

SOFTWARE

All parts of a computer that are not strictly physical, such as data, programs, applications, protocols,
etc., are broadly defined as “software.” Although software has no material form, it is no less critical to
receive information, encode, store and process it.

Computer software includes all executable and non-executable data, such as documents, digital
media, libraries, and online information. A computer’s operating system (OS) and all its applications
are software as well.

A computer works with software programs that are sent to its underlying hardware architecture for
reading, interpretation and execution.

22 | P a g e
Computers are classified according to computing power, capacity, size, mobility and other factors, as
personal computers (PC), desktop computers, laptop computers, minicomputers, handheld
computers and devices, mainframes or supercomputers.

DEFINITION - WHAT DOES OPERATING SYSTEM (OS) MEAN?

An operating system (OS), in its most general sense, is software that allows a user to run other
applications on a computing device.

The operating system manages a computer's software hardware resources, including:

Input devices such as a keyboard and mouse.

Output devices such as display monitors, printers and scanners.

Network devices such as modems, routers and network connections.

Storage devices such as internal and external drives

The OS also provides services to facilitate the efficient execution and management of, and memory
allocations for, any additional installed software application programs.

If several programs are running at the same time (such as an Internet browser, firewall, and
antivirus), the OS will allocate the computer’s resources (memory, CPU, and storage) to make sure
that each one of them receives what is needed to function.

While it is possible for a software application to interface directly with hardware, the vast majority of
applications are written for an OS, which allows them to take advantage of common libraries and not
worry about specific hardware details.

In this regard, the OS acts as a comprehensive framework with which all applications can interact in a
consistent way, vastly simplifying the whole development process.

Examples for OSs include:

Android

iOS

Mac OS X

Microsoft Windows

And Linux

THE USE OF COMPUTING IN OUR DAILY LIFE

Banks and financial Computers play a significant role in handling all of the world's money. Below are
examples of how computers are used in the financial market and places dealing with money.

ATM - When you make a withdraw from an ATM, you are using a computer.

Digital currency - When depositing money in a bank, it is stored as a digital record. A computer
keeps track of how much money is in your account.

Trading - Stocks and commodities are traded using computers. In fact, today there are even
thousands of computers using advanced algorithms that handle trading without needing humans.

Business

23 | P a g e
Business is another big sector for computers and most money earned and spent is done using a
computer. Below are some of the examples of how computers are used in business.

Register - If the business deals with selling goods to a consumer (e.g., a grocery store), a cash
register, which is a computer, is used to complete transactions.

Workers computer - Many businesses assign each employee a computer that allows them to
produce work and solve problems for the company.

Server - If the business uses computers, connects to the Internet, or handles e-mail and files, a
server is used to help manage everything.

Maintenance

Identifying Computer Problems/Issues

Hardware or Software Problem ?

Tips for Distinguishing Between Hardware Problems and Software Problems

Note: Make sure you reduce possible “external” problems before proceeding. This means unplug any
external devices (such as hard drives, scanners or printers), and remove any USB Flash disk, CD or
DVD disks from their drives.

 Were there any loud noises or smoke when the problem first appeared? Then it is probably a
hardware problem, with the most likely culprit being the SMPS(Switched Mode Power
Supply )unit.
 Is the computer entirely dead? Or the screen blank? Or the screen showing a poor/incomplete
picture? These faults are probably also due to hardware problems.
 Does the computer produce a series of beeps? This is a code that can be used to distinguish
some hardware problems.
 Does the system give any error codes or descriptions while booting? These can be due to
hardware or software problems. Take careful note of all information given in the error code.
 Does the computer produce error information after it has booted or only when you open
specific programs? These error codes are probably due to software problems.
 Have any recent changes been made to hardware or software (including BIOS settings)? If so,
these are likely culprits.
 Has the computer been exposed to viruses or other malware? This could be a cause of
software problems.

24 | P a g e
Computer Maintenance

 Check harmful materials e.g. dust , virus, out dated software, faulty electrical Power/ gadget
e.g. cables, sockets, extensions etc.
 Check any malfunc(ons of peripherals.
 Proper maintenance helps to keep the computer running smoothly for years.

Improving slow performance

 Dust Control.
 Dust is very harmful for computer parts.
 Excess dust can cause mechanical failures, par(cularly on computer components with moving
parts.
 Computers should be dusted regularly by using compressed air machines .

 Excess and unused files


 Deleting browsing history
 Startup folder
 Software Inventory
 Updating software
 Overheating
 Insufficient RAM

ACTIVITY 1:

SHOW: Show the specifications of a computer you would like to use for work and show the maintenance
routine that you would do to make your computer work well. (20 pts)

Specifications incudes;

Processor , OS , Office Suite , memory (RAM) , Storage , Video/Graphics , Monitor

ACTIVITY 2:

PASTE: Attach or Paste a picture of the computer/laptop that you are using right now, list its hardware
components. If you are using a phone state its; brand, ROM, RAM, Screen and, OS (picture) (20 pts)

25 | P a g e
Discussion 3
Evaluate careers in
commerce and
information technology

Introduction

In the past few decades there has been a revolution in computing and communications, and all
indications are that technological progress and use of information technology will continue at a rapid
pace. Accompanying and supporting the dramatic increases in the power and use of new information
technologies has been the declining cost of communications as a result of both technological
improvements and increased competition. According to Moore’s law the processing power of
microchips is doubling every 18 months. These advances present many significant opportunities but
also pose major challenges. Today, innovations in information technology are having wide-ranging
effects across numerous domains of society, and policy makers are acting on issues involving
economic productivity, intellectual property rights, privacy protection, and affordability of and access
to information. Choices made now will have longlasting consequences, and attention must be paid to
their social and economic impacts.

One of the most significant outcomes of the progress of information technology is probably electronic
commerce over the Internet, a new way of conducting business. Though only a few years old, it may
radically alter economic activities and the social environment.
26 | P a g e
Business Models, Commerce and Market Structure

One important way in which information technology is affecting work is by reducing the importance of
distance. In many industries, the geographic distribution of work is changing significantly. For
instance, some software firms have found that they can overcome the tight local market for software
engineers by sending projects to India or other nations where the wages are much lower.
Furthermore, such arrangements can take advantage of the time differences so that critical projects
can be worked on nearly around the clock. Firms can outsource their manufacturing to other nations
and rely on telecommunications to keep marketing, R&D, and distribution teams in close contact with
the manufacturing groups. Thus the technology can enable a finer division of labour among countries,
which in turn affects the relative demand for various skills in each nation. The technology enables
various types of work and employment to be decoupled from one another. Firms have greater
freedom to locate their economic activities, creating greater competition among regions in
infrastructure, labour, capital, and other resource markets. It also opens the door for regulatory
arbitrage : firms can increasingly choose which tax authority and other regulations apply.

Workplace and Labour Market

Computers and communication technologies allow individuals to communicate with one another in
ways complementary to traditional face-to-face, telephonic, and written modes. They enable
collaborative work involving distributed communities of actors who seldom, if ever, meet physically.
These technologies utilize communication infrastructures that are both global and always up, thus
enabling 24-hour activity and asynchronous as well as synchronous interactions among individuals,
groups, and organizations. Social interaction in organizations will be affected by use of computers
and communication technologies. Peer-to-peer relations across department lines will be enhanced
through sharing of information and coordination of activities. Interaction between superiors and
subordinates will become more tense because of social control issues raised by the use of
computerized monitoring systems, but on the other hand, the use of e-mail will lower the barriers to
communications across different status levels, resulting in more uninhibited communications between
supervisor and subordinates.

ACTIVITY 1:

ATTACH: Attach a newspaper clipping that talks about the involvement of technology in the development of
commerce in the Philippines (Date is not Necessary) you can print or cut from a new or old newspaper (20
pts)

27 | P a g e
Discussion 4
Consequences of unsafe, illegal, and unethical use of technology systems and digital content
 Illegal uses can result in both criminal and civil charges against you and will most likely result
in you getting fired if you do it at work or with company property.
 Unethical uses could potentially result in civil charges but the more likely the assassination of
your character. People may stop trusting you and if you did it at work potentially the loss of
your job or be put on “probation”.
 I’m not sure what you mean by social, but doing something outside of “social norms” may
result in people and/or companies distancing themselves from you and may result in you
getting fired if you do it at work or with company property.

Copyright Laws
Copyright law grants to the copyright holder exclusive control over the distribution and reproduction of
that material. Copyright Law attempts to balance the intellectual property interest of authors and
publishers with society’s need for the free exchange of ideas. The pertinent U.S. law reads as follows:

…lawful reproduction of protected materials requires the copyright owner’s permission, except for
copying which is authorized as “fair use” and for certain reproduction by qualified libraries.

“Fair use” copying has all of the following characteristics:

28 | P a g e
 The copy is made in lieu of taking manual notes.
 The copy is the reasonable portion of a given work. Reasonable portion is defined as nor more
than 10% of the total pages, or one chapter of a published work that is not <10 pages, and is
not an artistic work.
 The copy has a temporary use, primarily for study and use.

It is not fair use to:

 Make a copy to avoid purchasing an original


 Engage in systematic copying to avoid purchase or subscription
 Make multiple copies of material for distribution
 Use copies of copyrighted material in a company document, proposal, newsletter, manual, or
employee newsletter without copyright clearance

What is copyrightable?

When copyright law was initially devised in the United States it was intended to protect eight
categories: literary works, musical works including any accompanying words, dramatic works
including any accompanying music, visual artworks, sound recordings, architectural works,
audiovisual works, and pantomimes and choreographic works. These categories liberally encompass
many works that would not initially be interpreted within their scope. For instance, computer programs
are classified as literary works,whereas maps and architectural drawing are considered visual
artworks (Bielefield, 2007, p. 25).

 literary – song lyrics, manuscripts, manuals, computer programs, commercial


documents, leaflets, newsletters, articles etc.
 dramatic – plays and dances
 musical – recordings and scores
 artistic – photography, painting, sculptures, architecture, technical drawings/diagrams, maps,
logos
 typographical arrangement of published editions – magazines, periodicals, etc.
 sound recording – recordings of other copyright works, e.g. musical and literary
 films – video footage, films, broadcasts, and cable programs.

Why is copyright law important?

Copyright law has a dual role. It provides exclusive rights to authors in order to protect their work for a
limited period of time but it was also established to promote creativity and learning.

Punishment of copywriting

Copyright infringement takes on three forms namely administrative, civil or criminal. As an


administrative complaint, it can be brought before the Intellectual Property Office while it may be filed
in regular courts as a criminal or civil case. As a criminal offense, copyright infringement is punishable
by imprisonment ranging from one (1) year to nine (9) years and a fine ranging from Fifty Thousand
Pesos (P50,000.00) to One Million Five Hundred Thousand Pesos (P1,500,000.00) depending on the
value of the infringing materials, damage to the copyright owner and the number of offenses
committed.

Any person found guilty of copyright infringement shall be liable:

(a) To an injunction restraining such infringement. The court may also order the defendant to desist
from an infringement, among others, to prevent the entry into the channels of commerce of imported

29 | P a g e
goods that involve an infringement, immediately after customs clearance of such goods.
(b) To pay to the copyright proprietor actual damages, including legal costs and other expenses, as
he may have incurred due to the infringement as well as the profits the infringer may have made due
to such infringement, and in proving profits the plaintiff shall be required to prove sales only and the
defendant shall be required to prove every element of cost which he claims, or, in lieu of actual
damages and profits, such damages which to the court shall appear to be just and shall not be
regarded as penalty.
(c) To deliver under oath, for impounding during the pendency of the action, sales invoices and other
documents evidencing sales, all articles and their packaging alleged to infringe a copyright and
implements for making them.
(d) To deliver under oath for destruction without any compensation all infringing copies or devices, as
well as all plates, molds, or other means for making such infringing copies as the court may order.
(e) Such other terms and conditions, including the payment of moral and exemplary damages, which
the court may deem proper, wise and equitable and the destruction of infringing copies of the work
even in the event of acquittal in a criminal case.

In addition to punishing direct infringement, the IP Code also penalizes indirect infringement by
holding a person liable for aiding or abetting such infringement.

ACTIVITY 1:

ESSAY: How does copywriting affects businesses in the Philippines and what is the contribution of technology
to it.

The following essay will be graded using the following rubric

2 / NEEDS 1/
5 / EXCELLENT 4 / VERY GOOD 3 / AVERAGE
IMPROVEMENT UNACCEPTABLE
This paper is clear This paper is The writer is Topic is not well- As yet, the paper
and focused. It mostly focused, beginning to defined and/or has no clear
holds the reader's and has some define the topic, there are too sense of purpose
attention. good details and even though many topics. or central theme.
Relevant details quotes. development is To extract
Ideas and quotes enrich still basic or meaning from the
the central general. text, the reader
theme. must make
inferences based
on sketchy or
missing details.
Organization The organization Paper (and The Sentences within The writing lacks
enhances and paragraphs) are organizational paragraphs make a clear sense of
showcases the mostly organized, structure is sense, but the direction. Ideas,
central idea or in order, and strong enough to order of details, or events
theme. The makes sense to move the reader paragraphs does seem strung
order, structure the reader. through the text not. together in a

30 | P a g e
of information is without too much loose or random
compelling and confusion. fashion; there is
moves the reader no identifiable
through the text. internal
structure.
The writing has The writing The text hums The text seems The reader has to
an easy flow, mostly flows, and along with a choppy and is not practice quite a
rhythm, and usually invites steady beat, but easy to read bit in order to
cadence. oral reading. tends to be more orally. give this paper a
Sentences are businesslike than fair interpretive
Sentence Fluency
well built, with musical, more reading.
strong and varied mechanical than
structure that fluid.
invites expressive
oral reading.
The writer The write The writer shows The writer seems Errors in spelling,
demonstrates a understands good reasonable to have made punctuation,
good grasp of writing control over a little effort to use capitalization,
standard writing conventions and limited range of conventions: usage, and
conventions (e.g., usually uses them standard writing spelling, grammar and/or
spelling, correctly. Paper is conventions. punctuation, paragraphing
punctuation, easily read and Conventions are capitalization, repeatedly
capitalization, errors are rare; sometimes usage, grammar distract the
Conventions
grammar, usage, minor touch-ups handled well and and/or reader and make
paragraphing) would get this enhance paragraphing the text difficult
and uses piece ready to readability; at have multiple to read.
conventions publish. other times, errors.
effectively to errors are
enhance distracting and
readability. impair
readability.

References:
 http://w.sunybroome.edu/basic-computer-skills/functions/file_management/
5filemanagement_common_tasks.html
 https://www.hp.com/us-en/shop/tech-takes/how-to-transfer-files-from-pc-to-pc
 https://www.edureka.co/blog/what-is-computer-security/
 https://www.britannica.com/technology/computer-network
 http://en.univ-batna2.dz/sites/default/files/ang/files/introduction_to_computing.pdf
 http://nji.gov.ng/images/Workshop_Papers/2017/IT_Workshop/s3.pdf
 https://www.zurich.ibm.com/pdf/news/Konsbruck.pdf
 https://www.quora.com/What-are-the-consequences-of-illegal-social-and-unethical-uses-of-
information-and-technologies
 https://ndvlaw.com/copyright-infringement/#:~:text=As%20a%20criminal%20offense%2C
%20copyright,damage%20to%20the%20copyright%20owner

31 | P a g e

You might also like