Professional Documents
Culture Documents
Reviewer in IT FINALS
Reviewer in IT FINALS
Reviewer in IT FINALS
1. Decimal Number
use by humans to count, measure and compute
Base: 10
it has ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
2. Binary Number
with the prefix bi, which means 2
Base: 2
it has 2 digits: 0 (OFF), 1 (ON)
3. Octal Number
with the prefix octa, which means 8
Base: 8
it has 8 digits: 0, 1, 2, 3, 4, 5, 6, 7
Binary digits grouped into 3 bits
4. HexaDecimal Number
hexa means 6; deci means 10
Base: 16
Decimal: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Hexa: A, B, C, D, E, F
Decimal to Base N:
1. Divide (integer) the decimal number by the base.
2. Take note of the remainder and divide the quotient again by the base.
3. Repeat the process until the quotient becomes zero (0)
4. Then write the remainders (the last remainder will be the left most
digit and the first remainder will the right most digit)
Base N to Decimal:
1. Multiply the digit with BasePosition#
2. Eventually add all the multiplication becomes the Decimal number.
Binary to Octal:
1. An easy way to convert from binary to octal is to group binary digits
into sets of three, starting with the least significant (rightmost) digits.
Octal to Binary:
1. Converting from octal to binary is as easy as converting from binary
to octal.
2. Simply look up each octal digit to obtain the equivalent group of
three binary digits.
Types of Networks:
1. Personal Area Network (PAN)
is a type of connection which is often limited to an individual
person and his or her personal devices
devices must be within the range of 10 meters with each other
2. Local Area Network (LAN)
is a connection in which a group of computers and other
devices, such as network printers, share a common
communications line within a certain area such as building or a
small campus
are often found in schools and offices to secure the
organization’s information
3. Wide Area Network (WAN)
may be less restrictive than LAN as rules and policies may be
differ within its coverage
There are many different types of connection media that are used in
contemporary society to connect computer networks to one another.
Methods of Communication is Generally Categorized into Two:
1. Wired Communication
Computer system have different connections which usually
depend on the motherboard’s form factor.
USB
FireWire
Ethernet cable
HDMI
2. Wireless Communication
include microwave transmission, satellite communication, cellular
transmission, and radio transmission such as WiFi connectivity
Wireless technology differ hugely from one another, but the
most popular types are Bluetooth and WiFi.
The following areas show how computers have made such an impact:
1. Education
Most elementary and secondary schools (public and private) and
higher education institutions (HEIs) have computers in their
classrooms.
ICT has made teaching and learning more convenient and efficient
for teachers, students, researchers, and school administrators.
Teachers use computers for research and enhancing teaching
materials. They can participate in online forums and
conferences to gain new ideas and stay updated on the
latest research trends.
Students use computers with internet access as an essential
tool for communication and collaboration, even from their
homes.
School administrators utilize computers for administrative
tasks, ensuring smooth school operations with easy access to
all documents through a server.
Electronic learning (e-learning)
is a modern teaching methodology, facilitating online
discussions of lessons, activities, and examinations through
platforms like Blackboard, Edmodo, Moodle, etc
2. Banking
Computers have revolutionized banking worldwide, making
transactions easier and more secure.
The 24-hour electronic banking services include:
Automated teller machines (ATM)
Cheque deposits
Electronic fund transfers
Direct deposits
Pay-by-phone systems
Personal computer banking/internet banking
3. Workforce Industry
ICT benefits workers, researchers, and administrators in the
industrial sector.
Computers expedite production planning and control systems,
support chain management, and aid in product design. Fully
computer-operated machines are now used in manufacturing.
Researchers use computers to gather and analyze data, while
administrators manage plant operations efficiently.
Some large industrial companies employing ICT include Toyota
Philippines, Honda Philippines, and San Miguel Corporation.
However, the increased use of ICT may be seen as a threat to
assembly-line and factory workers as automation takes over some
jobs.
4. Electronic Commerce
Electronic commerce (e-commerce or C-commerce)
boosts the economy by streamlining buying and selling
activities
ICT tools such as computers, the internet, and shared software
make transactions easier, efficient, and faster. Customers, sellers,
and suppliers benefit from ICT capabilities.
Well-known e-commerce markets include Zalora, Lazada, Shopee,
Metrodeal, Takatack, Amazon, OLX.ph, AirBnB, Booking.com,
Agoda.com, and others.
Customers use computers to communicate with sellers, saving time
and costs by avoiding physical visits to stores.
Suppliers use computers to monitor transactions, including inventory
management.
5. Hospitals
Computers play a crucial role in hospitals, benefiting both doctors
and patients.
Hospitals maintain patient databases containing health records,
treatment histories, and medical records.
Doctors use computers and medical applications for research and
rapid diagnosis of illnesses.
Various medical tests, such as blood tests, urine tests, brain scans,
ultrasound, echocardiography, CBC, mammography, bone density
studies, MRI, X-rays, and body scans, are facilitated through
computing and monitoring technologies.
ICT development, including databases, reduces medical errors and
enhances the overall efficiency of the healthcare system.
Resources
Information
VALUABLE INFORMATION
INFORMATION ECONOMICS
INFORMATION OVERLOAD
The abundance of mobile devices has greatly changed the way people
manage their day-to-day activities.
In business, for example, having a shop where customers can easily go to
use to be enough. However, with the introduction of the internet, market
shifted from a brick-and–mortar set-up to an online operation more
commonly known as e-commerce.
Mobile Social Media
is the accessing of social media sites, such as Facebook and
Snapchat, using a mobile device
The device may have an app installed to open Instagram, for example, or
it can use a browser installed in the mobile device to open Twitter.
M-Commerce or mobile commerce
was a term used during the 1997 Global Mobile Commerce Forum
by Kevin Duffey
the delivery of electronic commerce capabilities directly into the
consumer’s hand, anywhere, via wireless technology
Companies are now using digital platforms to market their products and
services.
Industries that are now embracing m-commerce include:
1. Financial Services – banks have introduces online banking a few years
back.
2. Mobile ticketing – as payments can be done online, receipts or
transactions can also be sent on mobile devices.
3. Service/retail – as consumers are now able to place and pay for
orders using their mobile devices, the e – commerce trend has shifted
from desktop computers to mobile devices.
4. Information services – these includes the delivery of news, stock
quotes, sports figures, emergency reports, and weather and traffic
updates to a single mobile device.
SOFTWARE PIRACY
Software piracy
is “the unauthorized copying or distribution or copyrighted software
can be done through copying, downloading, sharing, selling or
installing multiple copies of software onto personal or work
computers.”
Examples of software piracy as identified by The Software Alliance
(2018) include:
a. Distributing software or mobile apps form the internet in a
manner that violates the license terms.
b. Buying a single copy of a software program and installing it
on multiple devices without authorization.
c. Making and /or sharing copies of installation CDs
d. Sharing the login credentials (without authorizations) used to
access a web-based software application
Adam Thierer in 2011 identified four issues which further complicate the
problem on information control:
1. Convergence
technological advancements and social media have paved the
way for media content such as music and movies to be
distributed from their “traditional” distribution platforms
What consumers used to buy in the form of CDs or DVDs,
media content can now be searched, accessed, and
consumed using multiple devices and even through different
distribution networks.
One such example is Spotify. Consumers before would buy
physical albums in the form of CDs, then later transitioned to
digital copies typically bought via iTunes Store for Apple.
As a result, it is now possible to disseminate, find, or
consume the same content/information via multiple devices
or distribution networks.
This convergence of devices and networks has created issues
instead of maintaining an effective information control policy.
2. Scale
for those who like to watch Japanese anime and Korean
dramas, English subtitles are a must
Before, fans would wait days or weeks before the subtitles
become available for viewing.
This is because the subtitles are actually translated, edited,
and embedded by fans of the show, most of whom are not
professionals. Majority of them are students and young adults
who simply like watching the series.
With technology and fast internet connectivity viewers no
longer need to wait days to watch the foreign shows with
English subtitles.
Technology such as Google Translate has also helped make
translation of these shows much faster.
3. Volume
news and media outlets abound in print and online
News agencies such as Manila Bulletin, or The Philippine Star
have not only print copies of their news (i.e., newspapers) but
also digital copies which can be accessed through their
websites mb.com.ph. and www.philstar.com, respectively.
4. Unprecedented Individual Empowerment
the popularity of social media such as Facebook, Twitter, and
Instagram has made it possible for individuals to post
anything they want
This is also includes the creation of blogs which have
become the mainstream media for individuals to showcase
their talents, skills and hobbies.
Copyright
is a set of exclusive rights granted by a state to the creator of an
original work or their assignee for a limited period of time in
exchange for public disclosure of the work, and includes the right
to copy, distribute and adapt the work
Copyright owners can license or permanently transfer or assign
their exclusive rights to others.
Digital rights
is the permission granted to individuals to legitimately perform
actions involving the use of a computer, any electronic device, or a
communications network
It is particularly related to the protection and realization of existing
rights in the context of new digital technologies, especially the
internet.
Digital rights management (DRM)
is used to describe the processes by which the author or publisher
of a work exerts his or her rights to control what the purchaser of
the work is entitled to do
represents the control by which one can prevent a person or an
organization from copying, printing, editing, or otherwise making the
privileged information available to other people
Companies and organizations have come up with possible solutions to
this digital dilemma.
The following are techniques designed to control access and reproduction
of online information:
1. Encryption
is the process of converting data or information in such a way
that only authorized parties can understand
Its primary purpose is to protect the confidentiality of digital
data stored on computer systems or transmitted via the internet
or other computer networks
2. Serial keys
also known as a product key or a software key, it is a series of
alphanumeric characters acting as a key to denote that the
product or software is original
In some cases, product keys are used for product activation.
Online activation helps maintain software authenticity by making
sure no one else has used the same product key.
3. Scrambling
data scrambling is done to hide sensitive information from
unauthorized users
4. Tag embedding
similar to how pictures can include watermarks to denote
information on the owner of the picture, tag embedding does
the same to information content
In terms of data embedded into the actual content, the use of
metadata is included to identify the owner’s name, author, and
data of purchase, among other pertinent information.
PATENT
Patent
is a set of exclusive rights granted by a state to an inventor for a
limited period of time in exchange for the public disclosure of an
invention
The exclusive right granted to a patentee in most countries is the right
to prevent others from making, using, selling, or distributing the patented
invention without permission.
One example of a patented design is that of Apple’s iPod.
TRADEMARK
Trademark
is a distinctive sign used by an individual, business organization, or
other legal entity to identify the products or services to consumers
The mark comes from a unique source, and it distinguishes its product
(trademark) or services (service mark) from the others.
INFORMATION PRIVACY
IP Address
knowing a person’s IP address can help identify that person’s
physical location anywhere in the world
Cookie
A small file that is stored in computer’s directory, often a
temporary folder
It contains addresses of websites visited, login credentials, and
even credit card information.
Trusted Website
Yahoo is considered as one, that will never compromise their
privacy.
With all of these pieces of information made available online and the
possible problems such situation may create, countries have come up
with ways to protect their data from malicious individuals who might use
them for illegal purposes.
The Philippines, with its booming IT industry, is no exception.
Republic Act No. 10173
also known as the Data Privacy Act of 2012
signed and approved by then President Benigno Aquino III on
August 15, 2012
to protect the privacy of Filipino citizens
The law defines sensitive personal information as being:
a. About an individual’s race, ethnic origin, marital status, age, color,
and religious, philosophical, or political affiliations;
b. About an individual’s health, education, genetic or sexual life of a
person, or to any proceeding or any offense committed or alleged
to have committed;
c. Issued by government agencies “peculiar” (unique) to an individual,
such as social security number; and
d. Marked as classified by an Executive Order or an act of Congress.
All processing of sensitive and personal information is prohibited except
in certain circumstances. The exceptions are:
a. Consent of the data subject;
b. Pursuant to law that does not require consent;
c. Necessity to protect the life and health of a person;
d. Necessity for medical treatment; and
e. Necessity to protect the lawful rights of data subjects in court
proceedings, legal proceedings, or regulation
As previously discussed, the seven major trends for 2017 are as follows:
1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
Majority of organizations and companies nowadays have taken these
trends into account, shifting manual business processes to automated
ones and using ICT to improve their products and services.
Among these seven trends, the Internet of Things (IoT) and Automation
seem to have greatly influenced present-day culture and society; thus, it
is imperative to discuss these thrusts in detail.
CAPABILITIES of IoT
APPLICATIONS of IoT
CHALLENGES of IoT
But while things may look good using IoT, there are issues raised in
adopting it fully. Texas Instruments, Inc. (2016) has identified six
challenges in its implementation:
1. System Requirements
Industries normally identify different requirements, especially
depending on the type of industry they belong to.
Those in the food industry may require monitoring of
perishable goods, from production and packaging to shipping.
An automobile manufacturer may have the same process, but
since products are different, requirements may also change.
Food will require data regarding temperature levels, whereas
cars will require mechanical precision.
2. Connectivity
With the varying connections — wired and wireless, as well
as the different protocols governing each connection, it will
be a challenge to come up with an IoT project concerning
such protocols.
3. Power requirements
IoT devices need to run on batteries as majority of these
devices are mobile.
The challenge, therefore, is how to extend the battery life on
such devices, especially those used in critical procedures,
such as health, disaster management, and safety.
4. Security
One of the most highlighted issues in the application of IoT
is data security.
Confidential information such as patients’ records or
employees’ profiles are considered at risk.
Security also includes system integrity, with malicious acts
such as hacking and viruses proliferating online.
5. Development
One of the challenges identified is how to expand the
capabilities of developers, and not just experts, in order to
create more “smart things.”
6. Services
With data collected from IoT, it is important as well to
determine where all this will go and to identify the platform
in which these IoT applications will be placed.
Lesson 3- AUTOMATION
INFLUENCE on CULTURE
Online Reviews
this trend of having other people do the task first for others is an
example of how technology affects the basic human behavior of
decision-making
With the proliferation of online information, it is easy to find details
on a certain movie or a book. However, with sites such as Rotten
Tomatoes, one can actually make a decision on what movie to
watch simply by reading the “reviews” of other people.
Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants
along with a food review.
This trend created a culture of people dining with friends or family
without actually interacting with them.
YouTube Learners
YouTube is one of the most popular social media sites.
People can watch videos, comment on them, and upload their own
videos, among others.
Thus, YouTube serves as a source of videos with people searching
for almost about anything online – from trivial topics to more
serious subject matter.
Instead of reading books or listening to their teacher’s class
lecture, students would rather watch YouTube to learn the lesson.
Cyberbullying
Behavioral choices especially for teenagers or adolescents are
influenced by technologies.
is a serious phenomenon brought about by social media
is an unwanted, hostile behavior done by individuals to other
people in the hope of gaining control over them
Internet Profile
also called an internet identity, online identity, or internet persona,
is a profile created by internet users to establish their social
identity in online communities, social media sites, and other
websites
Facebook requires its users to be at least 13 years of age before they
can create an account.
Cyberbullying comes in the form of messages or images, such as memes.
Since messages or images can be posted anonymously, it is hard and
oftentimes, difficult to trace the source.
NETIQUETTE
Netiquette
is a combination of the words internet and etiquette
it describes how one should act online
Netiquette brings in policies for all the features and qualities of the
internet, including the use of the World Wide Web (WWW), email services,
File Transfer Protocol (FTP), chart rooms, and instant messaging.
The Personalize IT Rule
Make sure to put restrictions in accepting friends or followers on
your social media
The Off-limits Rule
Know your limitations when voicing out your opinions on different
subjects or topics concerning your school, religion, personal
information, workplace, and even some controversial subjects such
as politics.
The Tag - You’re It Rule
Be careful in tagging someone either in your status post or photos.
You may also restrict someone from tagging you in their posts and
photos
PROFESSIONAL ETHICS
Lesson 1 – TRENDS
INDUSTRY
ONLINE BANKING
Online banking
also known as “internet banking” or “web banking”
allows a user to execute financial transactions via the internet
An online bank offers customers just about every service traditionally
available through a local branch, including deposits, money transfers, and
bill payments.
EDUCATION
BUSINESS
HEALTH
INDUSTRY
With the introduction of computer systems at work, one main issue raise
is maintaining the computer system’s security and integrity.
Malicious software, or malware,
is a general term used to describe any type of software that can
cause harm to a computer system
Examples of malware include the following:
1. Virus – it is a computer program usually hidden within
another program that inserts itself into other programs or
files.
2. Worm – is a stand – alone malware that replicates itself in
order to spread to other computers.
3. Trojan – it refers to a malicious program which initially
appears to be useful, routine, or interesting in order to
persuade a victim to install it.
4. Spyware – is a software that aims to gather information
about an organization or a person without his or her
knowledge.
5. Ransomware – it is type of malware that can block access to
a victim’s data. The hacker uses his or her technical
knowledge or skills to gain unauthorized access to data or
systems.
BANKING
While online banking may be convenient, there are still skeptics to this
given the sensitive data being transacted online: money.
EDUCATION
With online learning being accepted into schools as part of the teaching
and learning methodology, one of the things that schools need to
consider is monitoring and management.
5 Common problems faced by students in e-learning and how to
overcome them
1. Adaptability Struggle
Switching from traditional classroom and face-to-face instructor
training to computer-based training in a virtual classroom makes
the learning experience entirely different for students.
How to overcome:
They need to accept the new learning circumstance with an open
mind and heart. Understanding the benefits of e-Learning and even
discussing them with their peers may change this mindset and
better prepare students for online classes.
2. Technical Issues
Many students are not provided with the high bandwidth or the
strong internet connection that online courses requires, and thus
fail to catch up with their virtual classmates
How to overcome:
Knowing exactly what kind of technological support they will need
for a certain course before enrolling in it, as well as properly
equipping themselves for the course’s successful completion.
3. Computer Literacy
Many of them cannot operate basic programs such as Microsoft
Word and PowerPoint and, therefore, are not able to handle their
files.
How to overcome:
How to overcome:
How to overcome:
BUSINESS
Freeware
are ad-supported programs, games, or utilities that are distributed
as adware
HEALTH