Professional Documents
Culture Documents
Module 6 - STS
Module 6 - STS
Objectives
People are now living in a society where the internet, computers and
smartphones have become essential parts of their everyday lives for
immediate accessing and sharing of information. People are now in the
Information Age, also known as Computer Age, Digital Age, or New Media
Age. According to Merriam-Webster Online Dictionary, Information Age is
the modern age regarded as a time in which information has become a
commodity that is quickly and widely disseminated and easily available
especially through the use of computer technology.
History
Information Technology
Petroglyph
Courtesy of sites.harvard.edu
Harvard Mark 1
ENIAC
Courtesy of oldcomputers.net
Apple 2
Computer
Types of Computer
Since the advent of the first computer different types and sizes of computers
are offering different services. Computers can be as big as occupying a large
building and as small as a laptop or a microcontroller in mobile and embedded
systems. The byte-notes.com enumerates the four basic types of computers:
1) Supercomputer -
The most powerful computers in terms of performance and data
processing are the Supercomputers. These are specialized and task
specific computers used by large organizations. These computers are
used for research and exploration purposes, like NASA uses
supercomputers for launching space shuttles, controlling them and for
space exploration purpose. The supercomputers are very expensive
and very large in size. It can be accommodated in large air-conditioned
rooms; some super computers can span an entire building.
Uses of Supercomputers:
• Space Exploration
o Supercomputers are used to study the origin of the universe,
the dark-matters. For these studies scientist use IBM’s
powerful supercomputer “Roadrunner” at National Laboratory
Los Alamos.
• Earthquake Studies
o Supercomputers are used to study the Earthquakes
phenomenon. Besides that supercomputers are used for
natural resources exploration, like natural gas, petroleum,
coal, etc.
• Weather Forecasting
o Supercomputers are used for weather forecasting, and to
study the nature and extent of Hurricanes, Rainfalls,
windstorms, etc.
• Nuclear Weapons Testing
o Supercomputers are used to run weapon simulation that can
test the Range, accuracy & impact of Nuclear weapons.
2) Mainframe Computer-
Mainframes are not as powerful as supercomputers, but many large
firms & government organizations use this type of computer to run their
business operations. Because of size, the mainfram computers can be
accommodated in large air-conditioned rooms. They can process and
store large amount of data. Banks, big educational institutions and
insurance companies use mainframe computers to store data about
their customers, students & insurance policy holders.
3) Minicomputer –
Minicomputers are used by small businesses & firms. They are also
called “Midrange Computers”. These are small machines and can be
accommodated on a disk with not as processing and data storage
capabilities as super-computers & Mainframes. These computers are
not designed for a single user. Individual departments of a large
company or organizations use Mini-computers for specific purposes.
For example, a production department can use Mini-computers for
monitoring certain production process.
4) Microcomputer –
Desktop computers, personal computers (PCs), laptops, personal
digital assistant (PDA), tablets, and smartphones are all types of
microcomputers. The micro-computers are widely used and the fastest
growing computers. These computers are the cheapest among the
other three types of computers. They are specially designed for general
usage like entertainment, education and work purposes. Well known
manufacturers of Micro-computer are Dell, Apple, Samsung, Sony, and
Toshiba.
The past has greatly influenced the Information Age. The Renaissance
Age created the idea inventions, while too advanced for the time, the basic
idea was used to develop modern inventions. The Renaissance also changed
literature. At first, only books that told stories of religion and religious heroes
were written. During the Renaissance, people began to write realistic books
and not just religious stories. People’s mindset about themselves changed. It
was no longer about what humans could do for God, but what humans could
do for themselves. This way of thinking is called humanism.
Internet Technology
In 1960, the first practical prototype of the Internet came about through
the creation of ARPANET, or the Advanced Research Projects Agency
Network. Originally funded by the U.S. Department of Defense, ARPANET
used packet switching to allow multiple computers to communicate on a single
network. The technology continued to grow in the 1970s after scientists
Robert Kahn and Vinton Cerf developed Transmission Control Protocol and
Internet Protocol, or TCP/IP, a communications model that set standards for
how data could be transmitted between multiple networks. In 1971, Ray
Tomlinson invented and developed what is called electronic mail or email
today, by creating ARPANET’s networked email system. The concept of
nearly instantaneous communication between machines within an
organization proved to be so beneficial and practical that the concept soon
began to spread. In 1983, ARPANET adopted TCP/IP, through which
researchers assembled the “network of networks” that became the modern
Internet. Over the next few years, America Online (AOL), Echomail, Hotmail
and Yahoo shaped the Internet and email landscape. The online world then
took on a more recognizable form in 1990, when computer scientist Tim
Berners-Lee invented the World Wide Web. While it’s often confused with the
Internet itself, the web is actually just the most common means of accessing
data online in the form of websites and hyperlinks. The web helped popularize
the Internet among the public, and served as a crucial step in developing the
vast trove of information that most of us now access on a daily basis.
Social Media
Cyberbullying
With the rapid increase in internet and social media usage, cyberbullying
has become a major concern in many countries, including the Philippines.
Cyberbullying refers to the use of electronic communication to harass,
intimidate, or humiliate someone, often anonymously.
1. Be nice.
The first rule of internet etiquette is to be kind and courteous.
Remember that whatever you send from your keyboard or your phone is
still an extension of you, even though you're not with others in person.
Never flame or rant in public forum. Avoid gossiping and cyber bullying.
2. Learn Internet acronyms.
As communication on the Internet explodes, so does the use of
acronyms (i.e. BTW, TTYL, LOL, ROTFL, POV, B4N, … etc.)
Learn what they mean so you won’t misunderstand messages and
comments.
3. Keep messages and posts brief.
Most people use the Internet to save time, so honor that and keep
all messages as brief as possible
4. Don’t shout.
Avoid using all caps in any email or post. It comes across as
shouting, which is rude.
5. Use discretion.
Whether you are sending email, instant messaging, commenting
on Facebook, adding images to Snapchat, or posting a message to your
blog, you need to remember that anything you put on the Internet can be
there forever. Even if you remove the material, someone may have
made a screen shot, copied, or saved it. One rule of thumb many people
use is to never post anything you wouldn’t want your parents or boss to
see.
6. Protect personal information.
Since anything you post on the Internet is out there for all to see,
avoid adding anything personal. This includes your address, phone
number, social security number, and driver’s license information. You
don’t want to make things easy for identity thieves, burglars, and
predators.
7. Obey copyright laws.
Never copy someone else’s work and post it as your own. It is
against copyright law because it is considered stealing. It is always a
good idea to ask permission before quoting anyone, but that isn’t always
possible. To quote someone, keep the quote short, cite the source, and
put a link to the complete written work.
8. Protect children
If you allow children to access the Internet, make sure you know
what sites they visit and who their “friends” are.
9. Before you click “Send”,
It is always a good idea to reread anything you type before
clicking the “send” button. If you have time, step away for a few minutes
and come back to it with fresh eyes. For those times when you need to
post quickly, at least check your spelling, grammar, and tone of the
message. If it is late at night, and you are extremely tired, it’s probably
best to wait until the next morning. You can save most messages and
posts in draft mode.
10. Help others
If someone appears to be new to the internet, offer your
assistance. Share information on proper etiquette, send them a link to a
list of the most common acronyms and emoticons, and offer to answer
any questions until they get the hang of it. After you see that someone
has posted something inappropriate, let him or her know privately. Never
do anything to publicly embarrass anyone you know online.
11. Internet trolls
Keep in mind that there are internet trolls out there, looking for
their next victim. If you become the subject of their bad behavior, don't
respond. Most of the time, these people like to stir things up while hiding
behind their keyboards. When they don't get a reaction, they move on to
someone else.
However, if it continues and you feel as though you are being
threatened, contact the authorities. You need to make sure you protect
yourself and your family.
Name: Jullana Ashley A. Aguba
Course: BSA 1-5
Activity No. 6
Reflection Paper:
4.
a. What are your insights or understandings on cyber
bullying?
- Cyber bullying is a form of bullying that is done through the
use of social media/internet. This has been a persuasive
issue up until today. It involves the repetitive and intentional
targeting of individual or groups to harass, humiliate, or
threaten.
b. Have you experienced it, or do you know someone being
threatened through an online post?
- I haven’t experience it but I know someone that was a victim
of cyber bullying. Some people post her picture without her
consent and made fun of her in one of the social media
platforms.
c. Enumerate ways or give suggestions in order to prevent or
minimize cases of cyber bullying.
- We could prevent or minimize cases of cyber bullying by
having seminars that educate and helps people be aware
about cyber bullying. We should promote on how to be
responsible and respectful in using social media platforms.