Professional Documents
Culture Documents
IM IT Tools 2023 PDF
IM IT Tools 2023 PDF
IM IT Tools 2023 PDF
TOPICS
1. Hardware
1.1 Components of a Hardware in a Computer System
1.2 Understanding Binary
1.3 Tour of a PC
1.4 Integrated Computing and Internet of Things (IoT)
2. Software
2.1 Types of Software
2.2 Components of Software in a Computer System
2.3 Utility Software and Programming Software
2.4 Customer Relationship Management
2.5 Cloud Computing
LEARNING OUTCOMES
At the end of the lesson, the student will be able to:
7. Define the phrase cloud computing and its benefits for usage in a
company; and
Study Questions
• desktop computers
• laptop computers
• mobile phones
• tablet computers
• e-readers
• storage devices, such as flash drives
• input devices, such as keyboards, mice, and scanners
• output devices such as printers and speakers.
Digital Devices
A digital device converts electrical impulses into discrete values, which
can range from two through multiples of two. Analog signals, on the other hand,
are continuous and may be shown as a smooth wave pattern. You may consider
digital (discrete) to be the polar opposite of analog.
Many electrical equipment converts signals into binary values, which are
two discrete values. A one (“on”) or a zero (“off”) is used to denote these values.
The existence of an electrical signal is usually referred to as being in the "on"
state. As a result, the lack of an electrical signal is used to represent the off
state. Note: In technical terms, a system's voltages are assessed by converting
high voltages to a one or on state and low voltages to a zero or off state.
The real, tangible elements that humans can see and touch are known as hardware
components. The illustration is an example of modern computer accessories.
• Input device (3, 6,7)
• Output device (1, 11, 12)
• Processing Units (5, 13)
• Storage - Temporary (4) and Permanent (2, 8, 9, 10)
▪ Components of a Computer
▪ Types of Computers
• Special purpose computer embedded in tools or appliances, e.g., smart card, set top box
• Desktop Computer (PC) / Workstation
• Notebook / laptop
• Tablet
• Smartphone / Personal Digital Assistant (PDA)
• Server
• Mainframe / supercomputer
▪ Speed of computers
Source: Google.com
Computer cables and connectors
• Many various cable connectors are required for communication with a computer, such as
power, keyboard, monitor, mouse, internet, and so on.
• To avoid making a connection error:
• Each cable connection has a unique form.
• Connectors can only be connected in one direction, resulting in a "fool-proof" architecture
within the computer.
Tour of a PC
A Central Processing Unit (CPU), memory, circuit board, storage, and
input/output devices are the same fundamental components found in all
personal computers. Because almost every digital device employs the same
set of components, studying the structure of a personal computer can help
you understand the construction of other digital devices. A personal
computer is shown in this "tour."
Random-Access Memory
When a computer starts up, it loads data from
its storage into its working memory. RAM
(Random-Access Memory) is a type of working
memory that can transport data considerably
quicker than a hard drive. Any application you
execute on your computer is loaded into RAM
and processed there. A computer must have a
minimum quantity of RAM installed in order to
function properly. Adding additional RAM to a
computer will usually make it run quicker. The
fact that RAM is "volatile" is another feature.
This implies it can keep data for as long as it
Source: Canva.com
has electricity. Any data saved in RAM is lost
(Edited by the author)
when the machine is switched off.
A Double Data Rate (DDR) memory module is typically used in the installation
of RAM in a personal computer. The DDR memory type that a machine will take.
DDR Memoy is determined by the motherboard DDR has been divided into four
generations: DDR1, DDR2, DDR3, and DDR4. Each generation is quicker than
the one before it, with DDR4 being twice as fast as DDR3 while using half the
voltage.
Motherboard
Scanners are another type of input device that allows users to enter
documents into a computer as images or text. Microphones are useful for
recording sounds and giving voice instructions. Webcams and other video
cameras can be used to record video or join a video chat conversation.
Output Devices
In addition, output devices are necessary. A display or monitor is the
most visible output device, graphically showing the condition of the
computer. A personal computer can handle numerous screens or be linked
to larger-format displays like a projector or large-screen television in some
circumstances. Speakers for audio output and printers for hardcopy output
are among the other output devices.
The CPU, motherboard, RAM, and hard drive are the physical
components that contribute to the speed of a personal computer. These
things may usually be replaced with newer, quicker components. The table
below demonstrates how each of these factors affects a computer's speed.
Aside from changing hardware, there are several modifications that can be
done to a computer's software to make it run quicker.
Smartphones
Smartphones have just been present for the past 20 years, despite the fact
that mobile phones were first launched in the 1970s. Cell phones have grown to
include a wider range of functions and programs. Phone, email, location, and
calendar services, to mention a few, are all available on today's smartphones.
They work as a very portable computer that can connect to the Internet using
cellular or Wi-Fi technologies. Smartphones have transformed computing,
bringing with them the one thing that PCs and laptops lacked: mobility. Take a
look at the following information on mobile computing:
▪ As of January 2018, there were 3.7 billion mobile Internet users worldwide.
▪ In 2016, mobile devices affected more than $1.4 trillion in sales.
▪ In 2018, mobile commerce revenue in the United States is expected to reach
$459.38 billion, rising to $693.36 billion by 2019.
▪ By the end of 2018, mobile devices will account for over $1 trillion in ecommerce
sales in China, accounting for 75% of total sales.
▪ In the first quarter of 2018, the average order value for online orders placed on
Smartphones was $84.55, while the average order value for purchases conducted
on Tablets was $94.91.
▪ 2.55 billion of the world's 2.79 billion active social media users utilize their mobile
devices for social media activity.
▪ Apps account for 90% of the time spent on mobile devices.
▪ In 2018, mobile traffic accounted for 52.2 percent of total Internet traffic, up from
50.3 percent in 2017.
o While mobile traffic accounts for a greater percentage of overall traffic than
desktop, desktop engagement is higher. Desktop users spend 55.9% of their time
on websites, while mobile users spend 40.1 percent of their time on websites.
o Mobile commerce will account for 45 percent of total e-commerce activity by 2020,
up from 20.6 percent in 2016.
o The Apple iPhone debuted in January 2007 and was released in June of that year.
It was an instant hit thanks to its simplicity of use and simple UI, and it cemented
the future of cellphones. In 2008, the first Android phone with iPhone-like features
was introduced.
Tablet Computers
iPad Air
A tablet computer is a computer that employs a
touch screen as its primary input and is tiny and light
enough to be carried about. They usually don't have a
keyboard and are enclosed in a rectangular casing.
With the release of the iPad in 2010, Apple established
the standard for tablet computing by utilizing iOS, the Source: Canva.com
iPhone's operating system. Following the breakthrough of the iPad, computer
manufacturers began to build new tablets that ran on mobile-friendly operating
systems like Android.
Since the early days of Apple's supremacy, the global market share for tablets
has shifted. The iPad now has around 25% of the worldwide market, while the
Amazon Fire has 15% and the Samsung Galaxy has 14%. Tablets, on the other
hand, have seen a dramatic decrease in popularity in recent years.
Integrated Computing and Internet of Things (IoT)
The processors inside everything from a basic light bulb to a FitBit fitness
band to a driverless vehicle are all part of the Internet of Things. Each of these
devices, as well as others such as electric garage door openers (for those who
can't remember if the door was closed), kitchen appliances (“Buy milk after
work today.”), Nest thermostats, home security, audio speakers, and pet
feeding, can be controlled and/or communicated with via a smartphone app.
Here are three of the most recent examples of computing technology being
incorporated into ordinary items via the Internet of Things:
Over the last four decades, the personal computer has evolved from a
technological marvel to an essential component of daily life. There is little
difference between computer models and manufacturers, and the most important
factor in determining whether or not they are purchased is price. Hundreds of
manufacturers now supply parts for personal computers that can be purchased
and built anywhere in the world. The computers produced by these companies
are nearly identical as commodities. Personal computers have low profit margins,
forcing manufacturers to seek the most cost-effective manufacturing methods.
This is not true of Apple computers. Because Apple does not use the same
open standards as other manufacturers, they can create and build a unique
product that no one can easily replicate. Apple can charge more for their laptops
than other manufacturers because they provide a superior product, according to
many. To avoid commoditization, Apple has used differentiation in products such
as the iPad and iPhone.
Summary
The physical components of digital technology are referred to as hardware in
information systems. This chapter discussed the components that make up a
personal computer, with the assumption that the configuration of a personal
computer is fairly similar to that of any other type of digital computing
equipment. A personal computer is made up of many components, the most
important of which are the CPU, motherboard, RAM, hard drive, portable
media, and input/output devices. Personal computer variations, such as
smartphones, were also investigated. Finally, the commoditization of the
personal computer was discussed.
Exercises
1) What components would you buy if you could construct your own personal
computer? Make a list of the components you'll need to build it, such as a
computer case, motherboard, CPU, hard drive, RAM, and DVD drive. How do you
know they're all compatible with one another? How much would it set you back?
How does this compare to a comparable PC from a company like Dell or HP?
2) Go back through the section on IoT and identify at least two scientific papers
on the topic. Prepare at least three slides that cover IoT-related concerns.
Make sure your sources are properly credited.
3) How do solid-state drives compare to hard disk drives today? Price, capacity,
speed, and durability may all be compared online. Make sure your sources are
properly credited once more.
➢ SOFTWARE
Types of Software
The two main types of software are operating systems and application
software. Operating systems manage hardware and provide a user interface
between the hardware and the user. Application software includes word
processing, accounting, database administration, video gaming, and online
browsing.
Operating Systems
If you've ever worked in an office, you've probably noticed that almost every
computer there runs a version of Microsoft Windows. However, Macs and PCs
are almost equally distributed in schools from elementary to college level. Why
hasn't this spread to the business world?
Microsoft quickly rose to become the most popular corporate computer operating
system. Microsoft developed a network operating system and a suite of business-
oriented applications as networked PCs began to supplant mainframe computers.
Microsoft Office currently controls 85 percent of the market in all of its forms.
All devices require the operating system of a computer. The most popular
operating systems for personal computers are Microsoft Windows, Apple's Mac
OS, and various flavors of Linux. Smartphones and tablets can run iOS (Apple),
Android (Google), Windows Mobile (Microsoft), and Blackberry operating
systems.
Microsoft released the first operating system for the IBM-PC in 1981. They made
their first foray into a graphical user interface (GUI) operating system, dubbed
Windows, in 1985. Intel 64-bit processors are now supported by Windows 10.
Keep in mind that the term "64-bit" refers to the largest amount of data that can
be transferred within a computer.
✓ Apple introduced the Macintosh computer in 1984, which featured the first commercially viable
graphical user interface. The operating system for Apple's Macintosh computers is known as
"Mac OS," and it runs on an Intel CPU that supports 64-bit computing. Mac OS versions
named after mountains include El Capitan, Sierra, and High Sierra. Multitasking, virtual
memory, and voice input are now standard features in both operating systems.
The Linux operating system is open source, which means that independent
programmers can make changes to the code. Linux is a Unix-based operating
system. Unix is only available on huge, costly minicomputers. Linux is growing in
popularity. Linus Torvalds, a Finnish academic and the developer of Linux,
intended to make Unix work on less priced personal computers. Linux comes in
a variety of flavors and currently powers a substantial majority of the world's web
servers.
Application Software
The second most important type of software is
application software. Today, application software
is used directly to accomplish a specific goal, such
as word processing, spreadsheet computations, or
browsing the Internet with your preferred browser.
The “Killer” App
The first spreadsheet was invented by a Harvard MBA student who was
weary of repeating computations to find the best solution to a problem and wanted
to design a tool that allowed users to modify variables and recalculate formulae
quickly. The spreadsheet was produced as a consequence of this process.
Microsoft Excel is today's most used spreadsheet, and it preserves the initial
spreadsheet's fundamental capabilities.
Productivity Software
Word processing
This type of software allows users to generate and modify documents. Text
may be typed and edited, typefaces and paragraphs can be formatted, and
text can be added, moved, and deleted throughout the page. It is possible to
enter tables and pictures. Documents may be stored in a variety of electronic
file formats, the most prevalent of which being Microsoft Word's DOCX.
Documents can also be converted to other formats like Adobe's PDF (Portable
Document Format) or a text file (.TXT).
Spreadsheet
This type of software allows you to do numerical computations and analyses,
with the results shown in charts and graphs. Users can input numbers, text, or
formulae into the working area, which is split into rows and columns. A
spreadsheet's strength comes from its formulas, which allow the user to create
complicated computations that vary depending on the data entered. Microsoft
Excel is the most common spreadsheet program, and it stores files in the XLSX
format.
Presentation
This type of software allows users to make slideshow presentations. The
slides can be shown, printed, or distributed to anybody who is interested. The
slides can include text, photos, audio, and video. Right present, the most common
program is Microsoft PowerPoint, which saves files in the PPTX format. Other
sorts of software are included in certain office suites. Microsoft Office, for
example, comprises Outlook, an e-mail program, and OneNote, a data-
gathering collaborative application. Microsoft Access, a database program, is
included in the professional edition of Office. (In the next lesson, we'll go
through databases in further detail.)
With the debut of the Microsoft Office Suite, Microsoft popularized the
concept of an office-software productivity bundle. This package continues to
dominate the market, and most employers want their employees to be familiar
with it. However, there are numerous alternatives to Microsoft Office that are
compatible with Microsoft's file formats (see table below). Microsoft Office 365,
a cloud-based version of their office suite, is also available. This suite, similar
to Google Drive, lets users to edit and share documents online using cloud
computing.
Utility Software and Programming Software
Utility software is a kind of software that allows you to repair or alter your
computer in some way. Anti-malware software and applications that
completely eliminate unwanted software are two examples. These kinds of
software were developed to address flaws in operating systems. These utility
functions are frequently included as part of a future release of an operating
system.
Is it true that you own the software you buy and install on your computer?
You aren't, technically! You are just granted a license to use software when it
is installed. When you first install a package, you'll be prompted to accept the
terms of service or license agreement. Your rights to use the program are
restricted by the terms of that agreement. The following phrase may be found
in the conditions of the Microsoft Office software license: “This product is
licensed, not sold.” This agreement only grants you limited rights to utilize the
features of the software package you purchased.”
These limitations are, for the most part, what you'd anticipate. You may not
create unauthorized copies of the program or use it for any illegal purposes.
However, some software agreements contain additional, more surprising
conditions. Many software agreements, for example, require you to agree to a
liability limit. “Limitation on and exclusion of damages,” says Microsoft once more.
Only direct damages up to the price you paid for the program can be recovered
from Microsoft and its vendors. Other damages, such as consequential, lost
profits, special, indirect, or incidental damages, are not recoverable.” This means
you can't sue Microsoft or the program's provider liable for damages if a bug in
the software hurts your business.
Applications for the Enterprise
Control over the information
created by the company began
to split as personal computers
were more widely used within
organizations. For example, the
customer service department
develops a customer database
to keep track of calls and issue
reports, and the sales
Source: Google.com department does the same.
Which of these should be the primary client list? Perhaps a
salesperson develops a spreadsheet to compute sales income, while a finance
person writes a distinct revenue document that suits their department's needs but
calculates revenue differently. The revenue totals in the two spreadsheets will
differ. Which is the right answer? Who is in charge of keeping track of all of this
data?
A software application.
ERP is a software program that is utilized by a large number of employees in a
company.
Utilizes a central database.
The same data source is used by all ERP users to change and store their
information. This implies, for example, that the database only has one client table,
one sale (revenue) table, and so on.
Implemented organization-wide.
ERP systems come with features that cover all of a company's important
elements. Order entry, production, and planning are just a few examples of ERP
modules that may be purchased for a company's ERP system.
So, what's the point of implementing an ERP system? An ERP system, when
implemented effectively, may provide a strong return on investment for a
company. Most businesses experience an overall benefit after deploying an ERP
by integrating information systems across the enterprise and utilizing the software
to enforce best practices.
distributors are added, the total number of linkages to monitor rises to 32. (4 x 2
x 4). Also, observe how all of the arrows in the accompanying diagram have two
heads, suggesting that data travels in both ways. A company's supply chain
includes suppliers. They offer the firm with information such as pricing, size,
quantity, and so on. In turn, the company gives the supplier with information such
as the quantity of inventory on hand at each location. The information system is
crucial to efficient supply chain management.
Cloud Computing
The term "cloud" refers to online
applications, operations, and data storage.
Cloud service companies rely on Internet-
connected server farms and large storage
devices.
• You must have Internet connection to utilize it since your information is kept on someone
else's computer.
• You're enlisting the help of a third-party to deliver these services.
• Cloud computing has the potential to have a significant influence on how businesses manage
their technology. For example, why do you need an IT department to buy, setup, and maintain
machines and software when all you actually need is an Internet connection?
Using a Private Cloud
Many businesses are naturally wary about handing over control of their data and
part of their applications to the cloud. However, they see the benefit of eliminating
the requirement for local PCs to install software and expand disk storage. The
notion of a private cloud offers a solution to this dilemma. While private clouds
come in a variety of shapes and sizes, the basic concept is for a cloud service
provider to set aside web server space for a single business. The company retains
complete control over the server space while benefiting from some of the
advantages of cloud computing.
Virtualization
Virtualization is a technique for simulating a computer or other device using software.
Virtualization, for example, allows a single physical computer to execute the duties of
many virtual computers, also known as Virtual Machines (VMs). Virtual machines are
used by organizations to decrease the number of real servers required to provide
customers with the services they require. The need for power to run and cool the physical
servers is likewise reduced when the number of physical servers is reduced. Visit
VMWare's information website to learn more about virtualization.
Software Creation
Programming languages like Java, Visual C, C++, Python, and others are used to create
modern software applications. A programming language is made up of a collection of
instructions and syntax that may be logically structured to do certain tasks. A programmer
develops a program (known as source code) in this language that may subsequently be
converted into machine-readable form, which contains the ones and zeroes needed to be
executed by the CPU. Web pages are written in languages like HTML and JavaScript.
Because the source code is freely available, anyone can copy and use
open-source software. Because it is difficult to change existing computer
code, having access to a software's source code is useless for most
people. In contrast, open-source software can be downloaded and
installed in a built-in manner. Some of the world's most popular software
has come from the open-source movement, including the Firefox
browser, Linux, and the Apache web server.
Source: Google.com
Summary
The software provides the instructions that tell the hardware what
to do. The two most common types of software are operating systems
and applications. Operating systems interact with computer hardware
and allow users to access system resources. Application software
allows users to complete tasks such as word processing,
presentations, and database management. This category is also
known as productivity software. Using an ERP system, all data is
stored in a centralized database that is accessible to all programs and
departments within the business. Cloud computing allows users to
access software and information via the Internet using a web browser.
Programmers use a variety of programming languages to create
software.
Exercises
❖ Create a document with Apache Open Office after downloading it. Note:
If you don't already have Java Runtime Environment (JRE) 32-bit (x86)
installed on your computer, you'll need to do so first. Only the 32-bit (x86)
version of Open Office is available. The Open Office Getting Started
documentation may be found here. What does it have in common with
Microsoft Office? Is it less value since it was given to you for free?
Source: Coursera.com
Lesson 2. Computers and Office Productivity Software
TOPICS
LEARNING OUTCOMES
Programming Software
• Assists programmers in the development of new software, i.e.
• Creates and develops sets of instructions (software) for specific objectives,
• Using a programming software package called "Integrated Development
Environment" to convert or "compile" human-understandable "languages" into
machine codes (IDE)
Application Software
• Enables you to use the computer for the purpose for which it was purchased. Social
networking • Playing games • Surfing the internet • Working on schoolwork •
Listening to music • Organizing your photographs are just a few examples.
Document Preparation
• Often referred to as a "Word Processor,"
• Allows you to modify and preview a document using a “What You See Is What You
Get” (WYSIWYG) interface.
• Styles - fonts, size, color, etc. • Allows “automatic” formatting of a document, e.g.
• Inserting headers, footers, and page numbers; creating tables of contents,
footnotes, and bibliographies, among other things
• Facilitates document collaboration by allowing document tracking.
• Microsoft Word, LibreOffice Writer, and Google Docs are among examples.
Spreadsheet Software
• A grid of cells is used to mimic a paper accounting worksheet.
• Enables “automatic” operations.
• Data filters for simple viewing and sorting
• Various chart types
• Examples: Microsoft Excel, LibreOffice Calc, Google Docs/ Google Forms
Presentation Software
• Allows for the development of a slide show for presentation, generally using an
overhead LCD projector
• Slide editing with visual aids is simple.
• • Tables or charts
• Animations and transitions
• Examples: Microsoft PowerPoint, LibreOffice Impress, Google Docs
•
Document / File Formats
• Distinct software suites create different file formats, which are generally
incompatible between suites or versions. • Microsoft Office, for example, has two
incompatible versions in use.
• Office 2003 and previous versions (e.g. .doc, .xls, .ppt)
• Microsoft Office 2007 and after (e.g. .docx, .xlsx, .pptx)
• Confusion may develop in document sharing due to the incompatibility of multiple
file formats.
• Alternative ----> Portable Document Format (PDF) (PDF)
Internet Software
• There are numerous tools available to enjoy various aspects of the Internet:
• Internet Explorer, Mozilla Firefox, and Google Chrome are some of the most
popular web browsers.
• Instant messengers (Skype, Facebook Messenger, WeChat) • Email clients
(Outlook Express, Mozilla Thunderbird)
Multimedia Software
• With today's abundance of multimedia assets, tools for organizing and sharing are
accessible, such as:
• Picasa, Instagram – Photo "management"
• Windows Media Player – Music and Video
• iTunes - This is a music shop.
• Tools for advanced multimedia production are also available, such as
• Adobe Photoshop, Adobe Illustrator, and GIMP for graphics; Adobe Flash, Adobe
Premiere Pro, and Moviemaker for animation and video; Apple GarageBand and
Audacity for music
Application software allows you to accomplish the goal for which you purchased the
computer. We started calling these programs "apps" because they fit into your mobile devices and
are divided into smaller components that work for more specialized purposes. Applications perform
a variety of functions, such as assisting in the development of your social network, playing games,
accessing the internet, working on papers, listening to music, and so on. They all require the
installation of separate application software on your computer.
Productivity software is a broad category of software that includes a variety of applications.
These programs, as their name implies, help you be more productive at work. Documents,
spreadsheets, and presentations are all frequent chores. Productivity software is frequently
packaged as a set of apps to help with a variety of activities.
Source: Google.com
This set of icons comes from Apple's iWork program. Keynote has been a standout in the
suite for producing gorgeous slideshows with breathtaking cinematic transitions, and the entire
suite is available for free on Apple devices. You'll recognize the distinctive astonishment on the
numerous slideshows or promotional movies (produced using iMovie) that you'll see at various
events once you start using it.
Productivity Suite
Document Preparation
The term "Word Processor" refers to software that aids in document preparation. It allows
you to modify and examine a document using a "What You See Is What You Get" (WYSIWYG)
interface. For font styles, font sizes, color schemes, and other aspects of a document, "automatic"
formatting is available. The header, footer, and page numbers must all be included in a professional
document. For bigger publications, the creation of a table of contents, footnotes, and bibliography
is standard. In the numerous passes of the editing process, document tracking and editing history
will be quite beneficial.
Spreadsheet software
It looks just like a paper accounting spreadsheet, down to the grid of cells. It permits
"automatic" complicated calculations such as summation, average, max, min, standard deviation,
and many more to replace paper accounting spreadsheets. Data filters are useful for focusing on
certain data for study. The first, second, and third places in the class are determined by sorting.
Spreadsheet software also includes capabilities for creating many types of charts.
Presentation Preparation
It allows you to make a presentation slideshow that is generally built for an overhead
projector's resolution. It's simple to organize material into bullet points with visual assistance thanks
to decent software. For a dynamic presentation, you may usually incorporate clip arts, photos, and
videos. Your audience will be more engaged if you use animations and transitions.
Other software
Other productivity applications that may or may not be used in your workflow include:
• Equation editor
• Database manager
• Desktop publisher
• Project manager
• Diagram or flowchart creator
• E-mail and information manager
Office Online
Office 365
In terms of subscriptions, Office 365 is a
brand name that was first introduced in
2011 and covers a more comprehensive
collection of productivity tools and
services than Office online. You may sign
up for Microsoft's 1-month free trial by
visiting https://products.office.com/en/try or heading to "Try Office 365 Home for
free" as seen in the picture above. To "buy" a trial copy, simply sign in or establish
a new Microsoft account.
To proceed with the "buy" procedure, you will need to enter payment options. You
would definitely get counsel from your parents about this. You may have one, two,
or three payment options to select from, according on your region.
Let us talk about PowerPoint, Word, and Excel in the following lessons.
Microsoft PowerPoint
The presentation file may be organized in several locations depending on how you
generated it. In our view, it is preferable to create a new file from OneDrive. Within OneDrive, the
file will always be where you are now exploring. You should be able to organize your files into
categories such as "school," "chemistry," and "Mary's birthday." When you create a new file in
PowerPoint Online, it will be saved in the "Documents" folder, which may or may not be the best
location for all of your files.
The file will be immediately stored on the web interface. In the offline installation, however,
auto-save is not accessible. To avoid losing your work, you'll need to save the file periodically. A
PowerPoint presentation's file format is.pptx, as you'll notice. If you don't see the file format while
saving to your PC, the files should be identified by the icon.
Basic Skills!
We'll proceed with the module using the web interface. You should make every effort to
connect it to your own Microsoft Office version.
It's also conceivable to modify the backdrop even further. As the backdrop, you may use
whatever image you like. It can be used to display your school's logo, other affiliations, or your
personal information.
In order to captivate your audience for the remainder of the presentation, the Title Slide
should be clever, concise, and eye-catching. You should add additional "Content" to the remaining
slides to make the presentation more engaging.
If you go to the HOME tab and click on Layout, you can alter the layout of a previously
created slide. A new section is introduced using the Section Header layout. The Title Slide
arrangement is usually not reused. The Two Content layout is a sophisticated technique to compare
two pictures. A caption space for a brief description has been added to the Comparison layout. The
Title Only design allows you to doodle freely.
You'll see that the backdrop you chose earlier did not appear on the second slide. It's OK,
because the first slide is really noteworthy. If you intend it to show on following slides as well, return
to the first slide, choose the DESIGN tab, and select Format Background > Apply to All.
Inserting Other Elements
Type "Types of Application Software" in the title box for slide #2. Make a list of the kinds
you recall. Review the reading if you don't recall any. To make your presentation appear better,
use the standard Font and Paragraph typesetting tools.
To be readable in most
presenting settings, you need
increase the font size to at least
24. If there is extra room,
increasing the title to 32, or even 44, will be beneficial. It's especially essential now because more
and more people, including you, are watching presentations on their mobile devices.
Transitions
It's time to think about the transition between slides once you've added a few more. It serves
as a visual cue to the viewers that we're about to move on to the next slide. You may choose
between a quicker transition that is more thrilling or a longer transition that is more restful.
Animations
While transitions cover the entire screen with fresh material, animations are little moving
elements on the screen that draw the audience's attention to specific places.
Slide Show
The presentation may now be viewed in Slide Show
mode. The button is in the lower right corner.
By clicking on the file's name in the top bar, you may change its name. Say more than "Document"
and "Introduction"!
Basic Skills!
We'll proceed with the module using the web interface. You should make every effort to connect it
to your own Microsoft
Office version.
Let's get a lengthier piece of text so we may experiment with other Word features. In the
example below, we'll choose a blog article from https://blogs.office.com. You may extend your
understanding by reading a variety of resources, such as a Wikipedia page about Microsoft Word.
We'll use the default theme as an example. If you're using Microsoft Word on a desktop
computer, you'll be able to change the themes at any moment. This function, however, is not
accessible in Word Online. It should be set while the file is being created. For additional details,
see the preceding reading.
Common Typesetting
We should establish a few items before editing in Word, much as we should pick a theme
early in the presentation design. We should prepare the manuscript for printing since Word is a
What-you-see-is-what-you-get (WYSIWYG) editor. The PAGE LAYOUT tab is where you set it. It
will have an impact on how many pages your paper will be. People will modify these settings again
at the conclusion of the editing process in order to reduce the number of pages in the manuscript.
When you paste text into Word Online, it retains the source's formatting, which can be a
pain to work with. We should begin with basic writing that is clear and uncluttered. Try selecting the
copied text and clearing the formatting.
There will be more sophisticated
settings for the category if you
see a little "expand" arrow icon,
as seen above. Let's have a look at the options for paragraphs.
When you paste text into Word Online, it retains the source's formatting, which can be a pain to
work with. We should begin with basic writing that is clear and uncluttered. Try selecting the copied
text and clearing the formatting.
There will be more sophisticated settings for the category if you see a little "expand" arrow
icon, as seen above. Let's have a look at the options for paragraphs.
The document's appearance will be strongly influenced by text alignment. The default
setting is Left alignment, however for a more professional appearance, justified alignment is
preferred since it eliminates ragged edges caused by uneven line length. If you're writing a brief
message or a poster with large letters, you'll generally want to choose the center alignment. Adding
spacing before each paragraph will make it easier for the reader to distinguish between the
paragraphs. Indentation before text will also improve readability.
When you go to the Navigation Pane, you'll see that headings are organized like a table of contents
for quick access.
Inserting Tables
You may insert a variety of items into your document using the
INSERT tab. A table is a crucial component since it is used to show data in
a report. You must first select a table's size before inserting it. It is
dependent on the number of goods you have. And you'll generally use the
top to define the data columns as a header.
You don't have to be concerned about building a table with the wrong amount of rows or
columns. The TABLE TOOLS are accessible when you click on the table. You can add or subtract
rows or columns as needed from the LAYOUT tab below.
Inserting Footnotes
After mentioning a keyword or
important notion, footnotes are used to explain
or provide more information. Insert a footnote
from the INSERT tab by placing your mouse after the keyword or last word in the string of text
describing the notion.
Creating a Survey
There are several free solutions for creating online survey questionnaires. None, however,
is as well-known as Google Form. It's fair to argue that it fueled the trend of non-technical people
creating online survey forms and soliciting feedback from their peers. You don't need any
experience with site editing or database management to complete this task. The data is also
immediately connected to a Google Sheet for simple viewing and analysis.
Microsoft Office will take a piece of this pie when it goes online.
Survey in Excel
You may utilize the Survey tool in the Office Online
productivity package with a Microsoft account.
Because Excel is a "data table" program, the replies
from the Survey will logically be linked to it. Add a new
Excel survey to your OneDrive at
https://onedrive.live.com.
The survey tool is accessible through Excel Online. If you see this interface, don't be shocked.
You should also include further description after placing the main goal of the survey as the
headline of your survey. It'll be an excellent opportunity to explain the context and how the data will
be utilized to your audience. Whether it's for academic purposes or whether you'll hold a fortunate
draw among the participants. If you click on a question, an edit box will appear on the side.
Required Questions
There is a checkbox to indicate whether the question is required or not underneath the
Response Type choice. You may assure data integrity by making questions obligatory. If you're
creating an RSVP form, make the name, arrival time, contact phone number, and other information
needed all at once so you can match the arrival times to the individuals. Otherwise, folks may just
fill out the name or the arrival time on forms. It will be difficult for you to solve the puzzle.
Microsoft Excel
Microsoft Excel was designed to be used as an
accounting program as part of the Microsoft Office productivity package. Because accounting is
also known as bookkeeping, you'll be working with "books" or "workbooks" in Excel, albeit it won't
appear like a regular book. Add a new Excel worksheet to your OneDrive account at
https://onedrive.live.com.
The files should be recognized by the icon when you save them to your PC.
Data Rows
When you ask your friends to fill out the form, all of their responses will be grouped together
in a single row. It's easy to believe that each row represents a distinct individual. However, as we
saw in the example above, a single individual may respond to your survey many times, and there
may be other common values across the replies.
Each row should be a one-of-a-kind combination of the various values found under each
header. This is how most people record data on a spreadsheet. When the survey collects replies
from various persons, it functions similarly to your class name list recording attendance on various
days. Each row is distinct, despite the fact that the values of the other columns may be similar.
When respondents are asked to report combinations of values that will be repeated in a survey,
there is generally a field to save time during submission, which becomes the unique column.
Regrettably, the online survey tool in Excel does not keep track of submittal times. Nonetheless,
it's a fun game to play with for the first time.
Table Header
I'm hoping you've seen
that your queries are on the first
page. They are attractively
colored in a unification with the
incoming response rows. Excel
assisted you in organizing the
data into a table. Other ranges in
the spreadsheet can also be
formatted as tables using the
HOME tab. Indicate that your table contains headers in the dialog, so that the header row is handled
differently.
The table header will remain visible as you scroll down when you format ranges into tables.
When you enter more rows of data, the table's size (the colored region) expands automatically.
Editing Cells
A cell is the term for the "boxes" on the spreadsheet. Row
number and column letter will be highlighted in the presently selected
cell. Additionally, the cell will have bold borders in the Excel-specific
green color. The choose cell is "A1" in the example below. This is the
cell's address, starting with the letter and ending with the number.
You may start typing right now to modify the cell. Your new text will completely replace the existing
information. You may use the formula bar directly above the main spreadsheet body to change
current material without completely changing it. The cell's current content will be mirrored in the
formula bar.
The four fundamental mathematical operations are not written exactly as '+', '-', ", or ". The
first two, at least, are acceptable. However, I'm guessing you won't be able to locate the latter two
on your keyboard. The asterisk '*' and slash '/' symbols are used to represent the multiplication and
division operators, respectively. These symbols may be found on your keyboard near the number
pad. This rule applies to computer programming languages as well. As a result, "one plus two minus
three times four divided by five" should be the formula. Excel also allows you to use the standard
arithmetic sequence of operations. As a result, the formula below should provide a positive number
less than one. Try it out and see what you come up with.
You'll most likely be using cell references to calculate. When your cursor reaches that
portion of the calculation, you may either input the cell address or click it. Just make sure the
formula you end up with is appealing.
Text must be enclosed in quote marks to be included in a cell's formula ("). Not the plus symbol,
but the ampersand '&' is used to join pieces of text together.
Inserting Functions
With functions, Excel is more powerful. The functions simplify
your computations, no matter how complex they are. To use a
function, go to the INSERT tab and select Insert a Function from
the drop-down menu.
The functions that are most often utilized are mentioned first. You might begin with
one of these.
• = SUM( range ) — It calculates the total amount from the provided range of numeric
cells.
• = AVERAGE( range ) — It calculates the range's average, often known as the mean.
It has a lot of stats applications.
• = COUNT ( range ) — Numeric numbers aren't the only way to count the number of
cells in a range.
• = MAX ( range ) — It allows you to get the most out of the range without having to
go through an extra step of categorizing.
You may apply the formula to neighboring rows once you set up the formula of a cell
using one function or a mix of functions. Drag down the handle in the bottom right
corner of the chosen cell, which is circled below, to auto-fill formulae to adjacent
rows.
IF Condition
Excel may appear to be a piece of bookkeeping software at first glance, but it offers plenty
of opportunities to hone your reasoning skills. Make an attempt to implement the MAX() function
on your own. First, enter in some random values in columns A and B's first few rows. Then, in cell
C1, enter the formula below.
= IF ( A1 > B1, A1, B1 )
On IF, go to the official Office Support website. The functionalities of Excel Online are
completely functioning, despite the fact that it is a reduced version. Use the samples on the help
page to get started.
This basic IF function can only give you the largest difference between two numbers, but
it's an excellent way to improve your logical thinking skills.
Charts
In any industry that deals with data, data visualization is a hot topic. You may tell people
you were 137 cm tall (when you were... ten?) and your brother was 10 cm taller, but a photo of the
two of you standing side by side tells a greater narrative. This is the power of pictures, particularly
computer graphics for information delivery. Excel has a variety of charts to help you view your data.
The 2-D Column chart is a popular choice for comparing monthly income and spending. Consider
using the Line chart to assess performance ratings over time. A pie chart will be perfect for
displaying the percentage of different alternatives that add up to 100% of the population, such as
the number of adults and teens in a comic club.
You'll have more options after placing the chart, such as selecting or adding a new data
range, changing the chart type, and formatting the chart title, legend, and so on.
Plotting an Equation
The graphics we'll use to explain what we're talking about will be related to your math
lesson. Many arithmetic problems need abstract reasoning. The images offered by charts will be
beneficial to you.
The simple first order equation is a form of equation that connects x and y values. The linear
equation is what it's called. More information is available on the WolframMathWorld website. It
takes the shape of:
So, how does it seem on graph paper? We can set some x values and figure out the y
values that go with them. The solution to that question may be found by plotting the pairings on the
graph. Of course, arbitrary values for m and b must also be set.
Type arbitrary x values in a number of adjacent cells in the same column. We'll use a formula
to calculate the y values after we've determined the x values. You can use any m and b values you
like. After that, choose both the x and y values and use one of the Scatter charts to insert them.
The chart types that contain a smooth line will appear better. If you change the m and b values and
re-distribute the formula to the y value cells, the chart will update as a whole.
In fact, you may specify alternative m and b values in fixed cells to see how they affect the
results. Instead of manually inputting a number in the formula, you'll refer to the cells. You must
use caution in this situation. The reference to the m and b values will also move as you drag and
auto-fill the formula to produce new y values. To avoid this, use absolute cell references, such as
the ones shown below. It's done by putting a dollar sign '$' in front of the value to lock it in. If you're
not sure whether you want to lock the column letter or the row number, you may lock both the
address letter and the address number—just about everywhere.
Simply modify the numbers in cells A2 and B2 to watch the chart instantly update. For more
visible differences, try making extreme adjustments, such as shifting to negative values.
You'll find more difficult equation types waiting for you.
Resolutions
The number of pixels in a two-dimensional image is referred to as resolution. Examples of
display resolutions include 800600, 1024768, 12801024, 1366768, and more. The number of
columns and rows are the first two integers in the pair. People would develop desktop wallpapers
for a few typical computer display resolutions. Standard HD = 1280x720 pixels, full HD =
1920x1080 pixels, and 4k = 3840x2160 pixels are the most often used resolutions currently.
Other representations take resolutions into account as well. A digital camera's resolution
refers to the total number of pixels that may be recorded. For example, we may state that I have a
9-Megapixel camera or that my smartphone has an 8-Megapixel camera. The number of pixels—
or "dots" per inch—defines the resolution of printed content. In brief, the unit is dpi, as in 600 dpi.
Our "retina display" is roughly 326 pixels per inch for the human eye.
CMYK is another
color representation. It's a
color representation used in
the publishing of periodicals
and books on a white
backdrop. Cyan, Magenta,
and Yellow are the three
primary colors. In paintings, they are the complementary hues to the primary colors. CMYK
stands for Cyan, Magenta, Yellow, and Black. In principle, combining maximum C,
maximum M, and maximum Y results in complete black. In fact, you'll generally end up with
a muddy black that isn't quite "black, black." So there's "black" ink in the printing business,
which provides a darker black tone on paper. Also, since most text is written in black, using
a specialized paint rather than blending from other colors saves paint. Ink or toner
cartridges for color printers, whether inkjet or laser, are typically labeled CMYK.
In reality, the tool's sequence indicates the best way to modify your shot. From left to right,
you should have used the functions. So, once you've finished with the filters and changes, trim your
shot and expand it to the appropriate size. You may not require more pixels than you would
otherwise exhibit when you upload your photographs online or subscribe to your web site. You may
conserve space and improve transmission speed by compressing your picture.
Lastly, select the large green Download button to save all the snapshot in PNG format to
your PC.
GIMP Installation
GIMP (GNU Image Manipulation
Application) is an unrestricted and open
photo editing software created by Peter
Mattis, Spencer Kimball, and others. It also
had a slew of era of advanced technology. It's
sometimes referred to as the "free" version of
Adobe Photoshop. The most recent version may be found at https://www.gimp.org/.
GIMP necessitates installations for improved functionality, and since it merely significantly
reduces permission, you won't have to seek your guardians for permission to download it on your
home computer provided with your brothers and sisters. You'll also come up with a workaround if
you desire to use it really everywhere, even public computers. Others have turned the fully
accessible GIMP into a compact program that can be downloaded on a USB flash drive. For a
Windows installation, go to PortableApps.com!
Project Files
GIMP publishes to a file format that might exclusively be
read by GIMP. It's utilized to keep track of the altering
information so you may keep working on the modification.
It's also how the well-known Photoshop program works.
They possess their respective data files as well. You may
also export to standard graphics file formats for browsing in
any browser or picture program.
Look for the File option in the program to access, edit, or transfer documents.
GIMP
GIMP's standard user functionality
appears such as this one:
Toolbox
The toolbox panel shows you
which actions you should perform with
your mouse. Of course, you can move
the settings with your mouse in Canva
and Befunky, but those actions are
limited to altering values within a limit. If
you understand how to use hot keys and
keyboard input, you might be able to beat them. There are several procedures in photo processing
that need accurate targeting and selecting, making the mouse vital. In computer images, choosing
an image region is significantly more complex than selecting words in a data file. A compilation of
similar operations may be found in the toolbox.
The items in the toolbox may be loosely divided into the categories listed above. Skill sets,
as you can see, have their own family. For the greatest selection outcome, you must use a distinct
tool to suit the scenario. Transform utilities may be used to do everything from shifting to
compressing a specific region. The text tool enables you to add information to any location, such
as the red text we used to illustrate the various tools above. Colors are added with brush tools. To
remove imperfections, touchup tools are employed. All tools use the same forefront and underlying
colors.
When you're trying out new tools and procedures, undo and redo are essential activities. With
practice, you'll be able to use it with the hotkeys, such as Ctrl+Z and Ctrl+Y.
Saturation
In GIMP, saturation is changed in conjunction with other variables, rather than as a
standalone modification. Return to Colors and locate the Hue-Saturation procedure. The Master
color is selected initially, which means that the modification will be performed to any and all color
pixels in the photograph. The proportions of one of the primary colors or their counterparts can be
changed. It may be used to brighten up the green meadows or the clear blue skies.
GIMP Layers
Layers
In computer visuals, layering is a crucial method. Because you want to relocate the text
independently from the picture so that you may create a better position for it, inserting text will
obviously entail a new layer above the photo. Paints that have been drawn on the input image will
not be changed or deleted afterwards. Adding a blank layer above it and drawing there could be a
better option. Performing an effect on a duplicated layer of an image rather from the "real" picture
layer is a popular approach. The information about the layers will be preserved in the project file.
You are free to make changes as you see appropriate.
Insert a new picture into the picture that is currently visible in GIMP. The new picture
will be inserted as a new layer in the very
same file. With the Layers-Brushes dock in
GIMP, the layers are visible. If you don't see
it, look for it in the Windows menu. By
selecting the eye symbol, you may conceal a
layer and concentrate on the other levels. To
render the layer visible again, simply select the eye icon.
❖ Hands-on Activities:
Bring your friends and family to some exotic attraction places using your own
pictures like what you have seen in a tutorial videos using Canva Photo Editor
or GIMP Application.
Lesson 3. INFORMATION SYSTEM BEYOND THE ORGANIZATION:
Globalization and the Digital Divide
TOPICS
LEARNING OUTCOMES
4. Describe Nielsen's three stages of the digital divide and define the
digital divide.
Study Questions
The Internet has linked the entire world. Nowadays, communicating with
someone on the other side of the world is as simple as conversing with someone
next door. However, keep in mind that many businesses have attempted to
outsource various technological needs only to discover that near-sourcing
(outsourcing to countries with which your country shares a geographical border)
provides a better deal. This chapter investigates the consequences of globalization
and their impact on the world.
What Is Globalization?
Globalization is the process of bringing together products, services, and
cultures from all over the world. Globalization is not always a recent occurrence.
Since the days of European colonialism, various forms of globalization have
existed. Advances in telecommunications and transportation technology hastened
globalization. All nations have become virtual neighbors since the advent of the
global Internet.
Source: Google.com
https://www.broadbandsearch.net/blog/internet-statistics
o “Globalization 2.0′′ lasted from 1800 to 2000, with the exception of two World Wars.
Multinational corporations were the dynamic force pushing development in this age. The
planet decreased from a medium to a tiny size.
o “Our contemporary age, which began in the year 2000, is known as “Globalization
3.0.” The desktop computer, fiber-optic Internet access, and software have converged
to create a "flat-world framework" that allows small organizations and even consumers
to go worldwide. The globe has gone from a “small” size to a “tiny” size.
In many ways, information technology, according to Friedman, has ushered in this third
era of globalization. The following are a few examples of unique technologies:
▪ In the late 1980s, a graphical user functionality for personal computers became
widespread. Using a computer first before graphical interface was challenging since
users had to write commands rather than click a mouse. By rendering the personal
computer accessible to everyone, the computer had become a tool for almost
everyone, not just technology enthusiasts. According to Friedman, the personal
computer increased productivity and, as the Internet grew, made it easier to share
information globally.
▪ During the late-1990s dot-com boom, the communications infrastructure was being
built out. Telecommunications firms installed hundreds of kilometers of fiber cable
throughout the world in the late 1990s, making network communications a
commodity. Simultaneously, Internet technologies such as SMTP (e-mail), TCP/IP
(network communications), and HTML (web pages) became open specifications that
anybody could use through their email’s applications and web computers.
Knowledge and labor can be found anywhere on the planet. Businesses can now
hire people from all over the world, rather than just the local area. This also allows
businesses to pay a lower labor cost for comparable tasks based on the local rate.
The ability to operate 24 hours a day, seven days a week . With employees in multiple
time zones around the world, a company can effectively operate around the clock,
transferring project activities from one location to another when the typical business day
ends in one and begins in the other. A few years ago, three guys decided to start a
hosting services company. They purposefully migrated to three locations around the
world, each eight hours apart, in order to provide 24-hour coverage while allowing each
to operate during business hours. The company's operating costs were kept low, and
clients from all over the world were served 24 hours a day, seven days a week.
Their products will have a wider market. When a product is marketed online, it is
available to customers all over the world. Even if a company's products do not have a
global appeal, being online has increased the product's visibility among domestic
consumers.
Companies must recognize that interacting with employees and customers from
various cultures presents challenges in order to effectively use these new skills. Among
the challenges are the following:
Labor laws and regulations are in effect. Different nations, as well as different states
in the United States, have different rules and regulations. A company that wants to hire
employees from other countries must be aware of the various rules and issues.
There are several legal limitations.
Many countries have laws that govern what can be sold and how a product can be
promoted. It is critical for a business to understand what is permitted. It is illegal in
Germany, for example, to sell Nazi-related items.
How fast is your Internet connection in comparison to the rest of the world? The
graph below compares Internet speeds in various countries. This article contains a
complete list of nations. You can also use this tool to compare the evolution of
Internet speeds across countries.
The ACM Code of Ethics and Professional Conduct, which was eventually
implemented by the ACM Council in 1992, focuses on issues related to the Digital Divide,
which could help prevent predefined groups of individuals — low-income homeowners,
elderly people, single-parent children, the uneducated, minority communities, and
residents of rural areas — from having adequate access to the vast array of samples
made available by compute. In this Code of Ethics, the use of computers is a critical
ethical concern: "In a fair society, all persons, regardless of faith, gender, nationality,
height, handicap, country of origin, or other similar considerations, would have an equal
chance to participate in, or profit from, the use of computer resources." This article
investigates the causes of the increasing disparity in people's access to Internet services
and summarizes the digital divide in its various manifestations. It also explains how
society can bridge the digital divide, which is a significant societal divide between those
who have and do not have access to information. There could be a digital divide between
governments, provinces, or even communities. Many US cities have patches of low or
no Internet connectivity, whereas high-speed bandwidth is ubiquitous just a few
kilometers away.
Various approaches to cultural literacy have had varying degrees of success over
the years. Providing an Internet connection and/or computer equipment is not always
enough to provide genuine Internet access to a country, region, or community.
A New Understanding of the Digital Divide
o Jakob Nielsen, a web-usability expert, summarized our list of challenges in a 2006
article. He categorizes the digital divide into three stages in his article: socioeconomic
divide, accessibility divide, and empowerment divide.
o The socioeconomic divide. The "digital divide" is a term used by many to describe this
situation. The concept of the economic gap is that some people can afford to buy a
computer and an Internet connection while others cannot. Moore's Law has managed to
drive down the cost of technology, and we can now afford digital devices such as
cellphones. According to Nielsen, the economic disparity is meaningless for all practical
purposes, and we should not focus our efforts on bridging it.
o Disparity in accessibility. The term "usability" refers to the fact that "technology
continues to be so difficult that many people would be unable to operate a computer,
even if they were given one for free." Even for those who can use a computer, reaping
the full benefits of owning one is beyond their comprehension. This category includes
those with limited literacy as well as the elderly. According to Nielsen, we know how to
assist users, but we don't because it's too expensive.
Addressing the digital divide in these three parts gives us a more complete
picture of how we can work to close it. Additional effort must be made to resolve the
second and third segments of internet usage for a more holistic approach.
You may find the article of Jakob Nielsen’s in the site below:
https://www.nngroup.com/articles/digital-divide-the-three-stages/
In 2018, the "Miniwatts" Marketing Group, the creators of Internet World Stats,
attempted to further define the digital divide by recognizing that it is about more than
whether or not someone has access to the Internet. In addition to Nielsen's
socioeconomic, accessibility, and empowerment divisions, this group faces the following
issues.
Social mobility. Children from lower social classes suffer from a lack of computer
literacy.
The European Union has created an effort called as The European 2020 Strategy in
response to the growing digital divide. Research & development, climatic conditions,
training, community cohesion, and reducing poverty are the five primary sectors being
tackled.
Summary
On a global scale, information technology has sparked change. Because of
technological advancements, we can now use digital tools to communicate with people
all over the world. Because of these technologies, businesses have been able to expand
their labor pools, marketplaces, and even operational hours. They have, however,
created a slew of new challenges for organizations, which must now understand rules,
customs, and cultures from a variety of countries. As a result of this new globalization,
the technological gap has widened. Nielsen divides the digital divide into three stages:
monetary, accessibility, and engagement, with the economic stage being addressed
practically.
Exercises
Hands-on Activities
❖ To find out how fast your Internet is, go to speedtest.net. Evaluate your Internet
connection at home to the speed at two other sites, such as school, work, or a nearby
coffee shop. Analyze and contrast these sites in a one-page overview.
❖ Summary and make reflection paper in the article you will find in this site:
https://www.internetsociety.org/impact
Lesson 4. The Ethical and Legal Implication of Information Systems and
Trends in Information System
TOPICS
LEARNING OUTCOMES
Information systems have had a far-reaching influence outside of the corporate sector.
New technologies create situations that did not previously exist. One issue is
determining how to deal with the additional capabilities that these devices bring. What
new laws will be needed to protect emerging technology from misuse? The impact of
information systems on user behavior or ethics is discussed at the beginning of this
chapter. New legal frameworks will then be implemented, with an emphasis on
intellectual property and confidentiality.
Thanks to digital technology, we can now create person profiles from data gathered
from various sources. What used to take weeks of work can now be completed in
seconds, providing private companies and governments with more information on
individuals than ever before. This knowledge is valuable, but it jeopardizes the privacy
of customers and citizens.
Facebook logo
In early 2018, Facebook announced a data leak affecting 87
million monthly active users. The app "thisisyourdigitallife" by
Global Science Research informed users that they might
participate in a psychological research study. Approximately
270,000 people agreed to participate in the study, but the app
failed to notify stakeholders that their information, along with
that of all of their Facebook friends, would be permanently
collected. All of these security breaches occurred prior to 2014, but they were not made
public for another four years.
In 2015, Facebook became aware of Global Science Research's collection of
information on millions of the study's participants' acquaintances. Despite the fact that
Global Science Research promised to destroy the data, it was already purchased by
Cambridge Analytica, which used it in the 2016 presidential election. As a result of the
subsequent uproar, Facebook CEO Mark Zuckerberg testified before Congress in 2018
about what happened and what Facebook will do in the long run to secure users'
information. Congress is currently negotiating future regulations to secure user
information, demonstrating how technology advances faster than the regulations
required to protect consumers. Both Facebook and Cambridge Analytica have additional
information on this data privacy lawsuit.
Code of Ethics
A code of ethics can help you navigate uncharted ethical waters. The code of ethics
of a business or social group establishes a set of permissible actions. On the whole, the
members of the group agree. The paper outlines which behaviors are and are not
acceptable.
The Code of Ethics and Professional Conduct of the Association for Computing
Machinery, a community of computational experts that comprises professors,
entrepreneurs, and professionals, is an excellent representation of a code of ethics.
One of the most important advantages of creating an ethics code is that it specifies
the appropriate standards of conduct for a professional body. Members of a g roup's
diverse origins and experiences result in a wide range of opinions about what constitutes
acceptable behavior. While the principles may appear obvious, having them articulated
ensures clarity and consistency. Declaring standards expresses the shared norms to
everyone in a clear and understandable manner.
A code of ethics may have some drawbacks. To begin with, an ethical code has
no legal standing. Violation of an ethical code is not a crime in and of itself. What
happens if one of the rules is violated? Many codes of ethics include a section that
explains how to handle such situations. Repeated violations of the code frequently result
in expulsion from the group.
Finally, a code of ethics may not represent the ethics or morals of all group
members, which could be a disadvantage. Internal disagreements about what behavior
is acceptable are common in organizations with a diverse membership. For example,
there may be disagreements about whether alcoholic beverages should be served at
business gatherings. In such cases, the company must decide whether it is important to
fix a specific behavior in the code.
Copyright
Copyright protects music, software programs, novels, and other works. Copyright
can be applied to any work with a "author." Under the provisions of copyright, the creator
of a work has complete control over what can be performed with it, including:
• Who has permission to produce copies of the work; and who has permission to
create derivative works based on the original work.
• Who is allowed to perform the work in public.
• Who has the right to exhibit the art in public.
A work is often held by a publisher with whom the original source has an
agreement. The publishers will advertise and distribute the work in exchange for the
license, with a portion of the profits going to the original author.
The copyright of the original author is protected for seventy years after his or her
death. A publisher's or another third party's copyrighted material is protected for 95
years from the date of production. The protections for works created prior to 1978
differ slightly. For more information on copyright restrictions, consult the Copyright
Basics paper available on the US Copyright Office's website.
Fair Use
Fair use is also an important concept in copyright law. In certain circumstances,
fair use is a copyright restriction that allows the use of copyrighted works without
prior authorization. For example, if a teacher wanted to bring up a recent incident in
class, he or she could distribute copies of the copyrighted new piece without first
obtaining permission. Fair use allows a student to cite a limited amount of
copyrighted material in a research paper.
Regrettably, there are no clear criteria for what constitutes fair usage and what
constitutes a copyright violation. Fair use is a well-understood and recognized
concept that will only be challenged if copyright holders believe the integrity or
market value of their work is being jeopardized. When determining whether
something is fair use, the four following factors are considered:
✓ The goal and scope of the usage, particularly whether it is corporate or
instructional; A description of the copyrighted work;
✓ The size and significance of the fraction used in proportion to the entire
copyrighted work;
✓ The impact of the usage on the business opportunity or worth of the
copyrighted work.
If you want to incorporate a copyrighted work into a project, you may be able to
do so under fair use. However, it's always a good idea to double-check with the
copyright holder to ensure you're not infringing on theirs.
As previously stated, current copyright law protects works made for hire for
seventy years after the author's death or 95 years from the date of production. But it
wasn't always this way.
In the United States, the initial copyright legislation only covered books, maps,
and charts for 14 years, with a 14-year renewal period. Over time, copyright laws have
evolved to include safeguards for various forms of artistic expression, such as
photography and motion pictures. Congress also decided to extend the duration of the
safeguards, as shown in the figure below. Today, copyright is a multibillion-dollar
industry, with many businesses relying on revenue from copyrighted works to survive.
Many people now believe that the safeguards are ineffective because they have
been ineffective for an extended period of time. The Sonny Bono Copyright Term
Extension Act has been dubbed the "Mickey Mouse Protection Act" because it was
enacted just in time to protect the Walt Disney Company's copyright on Mickey Mouse.
Many works from the 1920s and 1930s that would otherwise be in the public domain are
now restricted as a result of this term extension.
Evolution of Copyright: https://commons.wikimedia.org/wiki/File:Copyright-Chart.
As digital technologies have altered what it means to create, duplicate, and distribute
material, a policy vacuum has emerged. The US Congress passed the Digital Millennium
Copyright Act (DMCA) in 1998, which expanded copyright law to include digital
technology. Two of the most well-known DMCA sections are the anti-circumvention
provision and the "safe harbor" provision.
When someone using an internet service violates a copyright, the "safe harbor"
clause limits the active internet connection's liability. This is the provision that allows
YouTube, for example, to avoid liability when someone publishes a clip from a
copyrighted film. The provision requires internet service providers to take action when
they are notified of a violation (referred to as a "takedown" notice). As an example of
how takedowns work, here's how YouTube handles these petitions: Copyright Violation
Notification on YouTube.
Many people believe that the DMCA goes beyond that and limits our freedom of
expression. The Electronic Frontier Foundation (EFF) is at the forefront of this fight.
The EFF asserts the following about the anti-circumvention requirement:
Despite this, the DMCA has become a major threat to fair use, competitiveness, and
innovation, while also chilling free expression, science, and research, and interfering
with computer intrusion regulations. If you overcome DRM [digital rights
management] restrictions for non-infringing fair uses or build the means to do so,
you may face legal action.
Creative Commons
Using a Creative Commons license, authors can control how their work is us ed
while still making it publicly available. By applying a Creative Commons license to
their work, they create a legally enforceable license. Here are some examples of
these licenses:
CC-BY. This license is the most permissive. It allows others to share and expand
upon on the works, even for a profit, as long as the creator is credited for the author's
artwork.
CC-BY-SA. The "share-alike" provision of this license prohibits the work's
dissemination. Someone else can completely reproduce and expand upon the work
as long as they give credit to the author and distribute it under the same Creative
Commons license.
CC-BY-NC. This license is similar to CC-BY, except it includes the limitation that no
one can profit from this work. The letter NC indicates for "non-commercial."
CC-BY-NC-ND. This license is similar to CC-BY-NC, except it additionally includes
the ND limitation, which prohibits the creation of derivative works based on the original.
These are just a handful of the relatively frequent licenses that may be made with
the Creative Commons tools. Visit Creative Commons' website for a complete range of
licenses as well as a wealth of information.
Patent
Some other significant type of intellectual property protection is patents. A patent
gives somebody who discovers a new product or method legal protection. The term
"innovation" has a broad meaning that encompasses a wide range of topics. Here are a
few examples of objects that have been granted patents:
Patent protection, like copyright, is only valid for a specified duration before the
idea or technique is released into the public domain. A patent in the United States is
valid for twenty years. And that is why, after twenty years, generic medicines are
accessible to replace brand-name medicines.
1) Must be original. It should therefore be the first time the innovation has been submitted.
2) Must be non-obvious. You can't patent an idea that anyone might have come up with.
You couldn't place a pencil on a chair and attempt to patent a pencil-holding chair, for
obvious reasons.
3) Must be useful. The innovation that is being presented must serve a useful function or
have a desirable application.
The patent office's role is to check patent applications for compliance with these standards. It's
not going to be easy. The United States Patent and Trademark Office awarded 318,849 patents in
2017, up 5.2 percent from 2016. Patent clearance is now 15.6 months behind schedule. Each year,
a large number of patents are filed by information technology companies. The top five technology
companies in terms of patent applications submitted since 2009 are shown below. Since 2009, the
percentage represents the total number of I.T. patents filed. It's worth noting that these five companies
account for over half of all patent filings.
You may have noted that Apple does not appear in the top five. Microsoft has the most
patents in the field of artificial intelligence (AI).
What Is a Patent Troll?
Trademark
Apple logo
A trademark is a term, expression, emblem, form, or audio that
distinguishes one product or service supplier from another. Nike's
"Swoosh," Facebook's "f," and Apple's apple (with a bite bitten out
of it) are all trademarked. The goal of trademarks is to protect
consumers. Remember going to a local shopping mall to buy
something from a specific retailer only to discover that there are many businesses with
similar names?
Common law trademarks and registered trademarks are the two types of
trademarks. If a term, expression, or symbol is used in the ordinary course of business,
a corporation will obtain a trademark immediately (subject to some restrictions,
discussed below). The addition of the letters "TM" to the end of a trademark denotes a
common law trademark. A registered trademark is one that has been inspected,
authorized, and recognized by a trademark office, such as the US Patent and Trademark
Office. A circle-R (®) next to the trademark indicates that it is a registered trademark.
Although almost any term, phrase, symbol, form, or sound can be trademarked,
there are certain restrictions. If one or more of the aforementioned requirements are
met, a trademark will be invalidated constitutionally:
1. The trademark is probably to be confused with a mark that has already been
registered or applied for.
2. The trademark only serves as a description of the products or activities. Attempting
to establish the trademark "blue" for a blue product you're selling, for instance, will fail.
3. The trademark is a place name.
4. A surname is used as a brand. “Smith's Bookstore” will not be permitted to be
trademarked.
5. When applied to the goods, the trademark is decorative. A repeating floral pattern
used as a plate design, for illustration, cannot be copyrighted.
The trademark security afforded by however this does not lapse as long as an
institution utilizes it and protects something against violation. As a result, many
businesses protect their trademarks against firms whose logo even remotely resembles
their own. Chick-fil-A, for example, owns a trademark on the term "Eat Mor Chikin,"
which it fiercely fought against a tiny firm that used the slogan "Eat More Kale." Coca -
Cola has copyrighted its bottle's contour form and therefore will sue any firm that uses
a bottle design that is identical to theirs. “Aspirin” (previously trademarked by Bayer),
“escalator” (originally trademarked by Otis), and “yo-yo” are instances of trademarks that
have already been weakened but have now ended up losing their protections in the
United States (originally trademarked by Duncan).
Privacy
Although the term "privacy" has various interpretations, it will be used here to refer
to the capacity to manage knowledge about oneself. Because of information
technologies, our capacity to protect our privacy has deteriorated dramatically in recent
years.
Businesses that collect PII are responsible for keeping it secure. "Organizations should limit the
use, acquisition, and preservation of PII to what is absolutely necessary to fulfill their commercial
mission and objectives," the Department of Commerce advises. They go on to say that "reducing the
amount of PII an organization uses, gathers, and keeps significantly reduces the chance of harm
caused by a PII breach." Organizations that fail to secure personally identifiable information risk fines,
litigation, and company loss. Currently, most states in the United States, as well as the European
Union, have legislation requiring companies that have experienced security breaches involving PII to
notify potential victims.
Corporations are not prohibited from disclosing your data just since they are
obligated to safeguard it. Businesses can disclose your data without your explicit
agreement in the United States (see the next sidebar), although not all do. The FTC
advises companies who collect PII to develop a privacy policy and disclose it on their
website. Any website that conducts business with a California citizen is required to
have a privacy policy (see http://www.privacy.ca.gov/lawenforcement/laws.htm).
While privacy regulations in the United States aim to strike a balance between
protecting consumers and encouraging trade, in the European Union, privacy is seen as
a basic value that takes precedence over commercial interests. This has resulted in
considerably tighter privacy protection in the EU, but it also makes trade between the
US and the EU more difficult.
While most of the information gathered had previously been accessible, gathering and
integrating it took time and energy. Comprehensive information about an individual may
now be purchased from a variety of firms. Although information that isn't classified as
PII might be combined in a way that allows a person to be recognized.
Non-Obvious Relationship Awareness, or NORA, is the technique of gathering vast
amounts of a plethora of perspectives and then integrating it to build individual profiles.
NORA is utilized by both government agencies and private companies, and it is huge
business. It was first popularized by big casinos seeking for cheats.
Non-obvious relationship
awareness (NORA) Sometimes in
situations, such as law enforcement,
NORA may be quite beneficial.
Crimes can be investigated faster or
even avoided before they happen if
potential offenders can be identified
more rapidly. However, these
benefits come at a cost: our
confidentiality.
Restrictions on Data
Collecting
The government of the United States has stringent limits as to how much
knowledge about its residents can be gathered. Over time, regulations have limited
some types of information, and the development of digital technologies has rendered
these limitations more vital than ever.
Personal data protection is dealt with differently in EU and non-EU countries. The
emphasis in the United States has been on protecting data privacy without jeopardizing
business interests.
The GDPR statement has clearly reached every corner of the globe. However, the
United States Congress is expected to enact additional data protection rules.
Do Not Track
The US and the EU use various ways to obtaining authorization to exchange
personal details. The “opt-out” concept is widely used in the United States. The default
arrangement in this model indicates that you have consented to disclose your data with
the institution and that you should expressly specify that you never want your data
collected. Aside from some specific types of data, such as medical information, there
are no regulations banning the sharing of personal data. The “opt-in” paradigm must be
the standard in the European Union. Until an organization may disclose your data, you
must express your specific consent in this situation.
The Do Not Track project was developed to counteract this data sharing. As the
developers put it:
- Do Not Track is a technological and policy concept that would let option to switch
out of being tracked by websites they don't visit, such as analytics firms, targeted ads,
and social media platforms. Few of these third parties currently provide a viable opt -out
from tracking, and filtering solutions are neither user-friendly nor thorough. Do Not
Track, like the famous Do Not Call registry, gives customers a single, easy, and
permanent way to opt from out third-party online monitoring.
Summary
Governments, companies, and people alike have gained a broad range of new skills
and capacities as a result of fast advances in information technology during the last
several generations. These new powers necessitated careful consideration and the
development of new standards, rules, and laws. This section has looked at how new
information systems capacities have impacted intellectual property and privacy, as well
as how the legislative framework has altered to meet these issues.
Exercises
1. Offer an overview of how information technology has produced an ethical problem that
didn't really exist prior to the introduction of I.T.
2. Locate an illustration of an information systems code of ethics or acceptable usage
policy and emphasize five aspects that you believe are significant.
3. Conduct novel research on the fight against patent trolls. Create a two-page paper in
which you discuss the law.
4. Describe how NORA may be used to define a particular person.
5. What are the differences in intellectual property rights throughout the world? Choose
two nations and do research work before comparing the patent and copyright safeguards
provided in those nations to those provided in the United States. Describe the contrasts
in a two- or three-page paper.
6. Given the GDPR's May 25, 2018 deadline, include a report on the progress of non-
European companies' GDPR adherence.
Hands-on Activities
❖ Communicate directly with somebody who has developed a mobile app, produced
music, authored a book, or generated any other form of intellectual property. Inquire
about the time and effort it takes to create their work, as well as how they think about
someone being able to preserve it. Your conclusions should be summarized in a one -
or two-page document.
❖ On a favorite computer application, look up the intellectual property section of the End
User License Agreement (EULA). Describe what the EULA says regarding this work's
copyright.
Study Questions
1. Which nations have the highest Internet usage? What is social media?
Mobile?
2. In the previous five years, which country has had the most Internet growth
(in percent)?
3. How will the majority of people access the Internet in the future?
4. What are two different wearable technology applications?
5. What are two different collaborative technology applications?
6. What are the capabilities of printing technologies?
7. How will wireless technology and sensors help to make items "findable"?
8. What does it mean to have better situational awareness?
9. What is a nanobot, exactly?
10. What is an Unmanned Aerial Vehicle (UAV)?
Since its inception in the 1950s, information systems had already progressed at
a breakneck speed. Today’s modern smartphones are much more sophisticated
than the computers that helped put a man on the moon in 1969. The Internet has
given you accessibility to the whole globe, permitting you to connect and collaborate
in ways you never could before. This chapter will look at present patterns and
predicts what will happen next. Consider how you may obtain a competitive edge in
the future by implementing some of these gadgets as you learn about technological
developments in this chapter.
Global
The very first tendency to notice is globalization's continued spread. The usage of
the Internet, as well as the use of electronic media, is increasing all over the world. In
the industrialized world, penetration levels, or the percentage of people who uses the
Internet, are still high, but some countries are catching up.
In conjunction to
increased Internet
availability
internationally, the
number of mobile
phones being used
started to climb. At the
end of 2017, the
world's population of
individuals above the
age of ten (those old
enough just to
potentially possess a
mobile phone) was expected to be over 5.7 billion, with 4.77 billion smartphone users.
This corresponds to approximately 80% of the world's population.
Personal
By visiting the Bond Capital archive, you can see her past year's slide decks.
Mobile
The emergence of mobile technology has been probably the most significant shift in
digital technologies in the previous decade. The rise of mobile has been phenomenal,
starting with the modest telephone in the 1990s and progressing to todays modern
smartphones. Some significant markers of this tendency are as follows:
o Mobile vs. Desktop. The amount of minutes devoted on a mobile phone each day is
2.5 times that of a personal computer.
o Daytime vs. Evening. The daytime hours are dominated by desktop use, whereas
the nighttime hours are dominated by mobile devices, with peak usage about 8:00
pm.
o Device usage. Mobile phones are much more widely utilized than any other type of
technology. Laptops come in second, followed by tablets, which have a small
advantage over desktop computers.
o Smartphone sales decline. Global smartphone revenue decreased in the fourth quarter
of 2016, thus according Gartner Group. Since Gartner started monitoring smartphone
purchases in 2004, this is the first drop in worldwide market share.
o The rise and fall of tablets. In the first 12 months of 2012, the iPad previously sold
upwards of three times the number of iPhones. However, during the fourth quarters of
2015 and 2016, tablet sales fell by 20%. Tablet sales were down 8.5 percent in the first
quarter of 2017, to their lowest level since the third quarter of 2012, when they were
initially launched. In 2017, PC sales fell 1.7 percent, while tablet revenue dropped 10%.
Wearable
With technology like hearing devices and, subsequently, Bluetooth earpieces, gadgets have
been available for some time. The Smartwatch, body cams, fitness tracker, and different fitness
monitors are now part of the product range. The Gartner Group's table below shows both historical
and anticipated earnings.
Collaborative
It'll be easier than ever before to exchange data for collective gain as more and more
consumers utilize smartphones and smartwatches. Some of this cooperation can be
done invisibly, such as notifying your position so that traffic metrics can be updated.
Other information, including such your restaurant ratings on a review site, can be
provided voluntarily. (Waze Screen Shot)
Printable
The 3-D printer is among the most remarkable new inventions in recent years. A 3 -
D printer permits you to create almost any 3-D item based on a computer-generated
model of the thing. 3-D printers operate by building the model layer by layer with pliable
elements like glass, alloys, and even wax. 3-D printing is very beneficial for developing
product concepts to see if they are feasible and marketable. Functioning prosthetic legs
and an ear which can hear far beyond spectrum of human hearing have also been
created using 3-D printers. On airplanes like the F-18, the US military increasingly
employs 3-D printed components.
▪ Buildings. In 2017, MIT researchers presented the 3D printing robots capable of creating a structure. It has
two arms, one of which is big and one of which is little. The big arm travels from around building's border,
while the tiny arm sprinkles cement and insulator. A skyscraper structure takes only 14 hours to erect in full.
▪ Musical Instruments. 3D printing is being used to make flutes, tinkers, and electric guitars out of both plastic
and metal. You may see an example of how to make a violin by clicking here.
▪ Medical Models. In the fields of orthopedics, transplantation, and cancer, healthcare simulations are
being utilized to assist clinicians in their training. Surgeons were able to rescue a patient from an
intracranial aneurysms by using a 3-d - printed brains similar simulation to the one seen here.
▪ Clothing. Wouldn't it be nice to have clothing that blend seamlessly? After using special technique to
monitor a person, 3D printing is utilized to create clothing that is tailored to their specific proportion
The end result is well-fitting clothing that uses fewer resources. The initial problem
was to locate non-breakable materials. More information about 3D printing of
clothing and shoes may be found here.
The "maker" revolution embraces a variety of techniques, including 3d printe rs. The
editor of Wired magazine, Chris Anderson, explains it this way:
In a summary, the word "Maker" belongs to a particular breed of builders who are
bringing production out of the workplace and into the domain of the home computer by
employing open-source methodologies and cutting-edge technology. Until previously,
the capacity to manufacture was only available to factory owners. Over the last 5 years,
we've successfully used the Web's democratizing potential to manufacturing. You may
now produce with the touch of a button.
Findable
In recent years, processors have shrunk in size and cost, allowing them to be
integrated into more devices. Consider how far technology has advanced in your
automobiles. Nowadays, your car can track how fast and efficiently you drive, where you
go, what radio stations you listen to, and how you drive, including braking power.
Insurance companies will give you a discount if you allow them to track your driving
habits. Consider the convenience of being notified quickly of impending traffic delays
whenever you change your morning commute route.
Expect IoT to be devices that were not previously thought to be done online. Human
interference has no effect on the link. So, while a computer is not an IoT, a fitness
wristband could be. When considering the Internet of Things, one term that comes to
mind is "independent," as in not directly or on a regular basis replacing human activity.
Some other phrase to remember is "interconnected," which refers to how IoTs are
linked to other IoTs as well as data collecting sites and computers. This data sharing or
interconnection is nearly automated.
IoTs are also referred to as "ubiquitous." "Embeddedness" is also frowned upon. It's
reasonable to assume that devices connected to the Internet of Things (IoTs) are
sending data about situations and events that aren't on our radar, at least not on a
regular basis. IoTs are being used to monitor traffic, air quality, moisture levels, bridge
situations, consumer devices, self-driving cars, and so on. "How many IoTs are there
now?" may be the first question that comes to mind.
The advantages of IoTs may be found almost everywhere. Here's a brief rundown.
Secure
As new platforms advance at a breakneck pace, so does the need for greater
security. Any use of cryptography is among the most essential security advancements.
Summary
As the world of knowledge technology progresses, we will be confronted with
innovative features and breakthroughs that will both fascinate and disappoint us. As we
saw in this session, the new skills and capabilities that come with this new technology
will frequently put us to the test and require us to learn new things. Both businesses and
individuals must be aware of and prepared for these upcoming changes.
Exercises
1. If you were starting a new technology company, which of the developing trends
would you consider the most promising? To determine the market size, conduct
some unique research.
2. What privacy problems may collaborative systems like Waze raise?
3. Conduct study on the first pistol created with a 3-D printer and report on some of the
issues that have been highlighted.
4. Provide an example of how IoT may help a company gain a competitive edge.
5. How do you believe wearable technology can help to enhance overall healthcare?
6. What difficulties do you envision with an increase in the number of self-driving cars?
Conduct independent research and produce a two-page report describing where
autonomous vehicles are legal and potential issues.
Hands-on Activities
• Look for Mary Meeker's most recent discussion on "Internet Trends" (if you cannot find
it, the video from 2018 is available at Mary Meeker). Write a one-page report outlining,
in your perspective, the top three developments.
• Choose a commercial enterprise that interests you, then pick one or more of the
technologies covered in this course, and write a one- or two-page paper explaining
how you may use that technology to achieve a competitive edge.
SUGGESTED LEARNING RESOURCES: