Professional Documents
Culture Documents
Module 1 Lesson Information Technology Fundamentals Revised 1
Module 1 Lesson Information Technology Fundamentals Revised 1
Lecture
OUTLINE
I.T. Issues and Opportunities
• Computer ethics
- Study of ethical problems “aggravated, transformed or
created by computer technology”
– Walter Maner
Application of Ethics:
Professional Responsibility
Globalization
Ethical Issues In Information Technology
Privacy
Information protection
Accuracy
Correctness of information
Responsibilities
Property
User of Information
Accessibility
Reliability of Information
Privacy
• Value of information
Competition
Intellectual Property Law
Established to protect creations / inventions of the
human mind.
Literary and artistic works
Product names, slogans, logos and
packaging;
Symbols, names, images and designs used
in commerce;
Trade secrets
Computer Crimes/Intrusion
- Illegal activities conducted via computer
http://www.research.olemiss.edu/UMQuest/2007/Winter/WeaponsOfChoice.html
Cybercrimes
• System penetration
• Sabotage
• Abuse of Internet Usage
• Financial Fraud
• Theft of Information
• Denial of Service
• Unauthorized Access
• Viruses
Report from the cooperating Units:
National Center for Justice and the Rule of Law
National Association of Attorneys General
University of Mississippi
* in 2005
Half are between the ages of 30 and 50
http://www.research.olemiss.edu/UMQuest/2007/Winter/WeaponsOfChoice.html
Report from the Anti-Phishing Working Group
Lecture
Outline http://news.cnet.com/security/?keyword=SQL+injection
Computer
• Input
• Processing
• Output
• Storing
Input Devices
Input Devices
Output Devices
Output Devices
Processing
Hardware
Software
Data
People
Communication
Hardware
• Tangible objects that can be touch
• Disks, disk drives, display screens, keyboards, printers,
boards, and chips.
Basic Parts of
Computer
http://windows.microsoft.com/en-US/windows-vista/Parts-of-a-computer
Software
Systems software
Operate the computer hardware
Provide and maintain a platform
Two kinds of Systems Software
Operating system
Utilities software
Applications software
Perform singular or multiple specific tasks
Information
• Converted data after applying process
People
• Size
Designs is by their scope or scale
Local and Wide Area
• Design
Designs is by their purpose
Client-Server and Peer-to-peer
• Structure
Designs is by the view of data flow.
Star, Mesh, and Ring
Lecture
Outline
Local Area Network
In close proximity.
In a building, school and offices.
Sharing resources like files, printers, games or other
applications.
Wide Area Network
Collection of LANs.
Router connects LAN to a WAN.
Notowned by any one organization
ATM and Frame Relay Technologies
Network
Categories
Client-server
Shows the relationship between two computer programs
• The client, makes a service request
• The server, which fulfills the request
E.g.,
To check your bank account from your computer
Peer-to-peer
Direct access from one another's hard drives
Communication node have both server and client capabilities
Run the same networking protocols and software.
Network
Categories
Bus
Connected in a single segment trunk
It uses a multi-drop transmission medium
Messages travel from one end of the bus to another
Star
• Central server to route data between clients
• Data flow between the server and the nodes
• Mainframe computers.
Ring
A circle of point-to-point connections
Signal is transferred sequentially via a "token”
Each handles its own applications
Shares resources over the entire network
No central server
Network
Categories
Internet
1972 - Steve
Wozniak’s Blue Box
1963
1963 –– SYNCOM
SYNCOM
the
the first
first synchronous
synchronous
communication
communication satellite
satellite
1992 - MOSAIC,
the predecessor of Netscape
Tim Berners-Lee
1989 - HTML
CHROME FLOCK
By Claudine Beaumont
Published: 1:39PM GMT 16 Dec 2008
http://www.telegraph.co.uk/technology/3794213/Web-browsers-five-alternatives-to-Internet-Explorer.html
Functions of Internet
• Newsgroups
• FTP
• Telnet
• E-mail
• Internet Relay Chat (IRC)
• Social Networking
• Research
Exercise
http://jobsearchtech.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=jobsearcht
ech&zu=http%3A%2F%2Fwww.pbs.org%2Fnerds%2F
http://jobsearchtech.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=jobsearcht
ech&zu=http%3A%2F%2Fwww.pbs.org%2Fnerds%2F
http://jobsearchtech.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=jobsearcht
ech&zu=http%3A%2F%2Fwww.pbs.org%2Fnerds%2F
http://oreilly.com/catalog/crime/chapter/cri_02.html
http://legalcareers.about.com/od/legalpracticeareas/a/Intellectualproperty.htm
http://plato.stanford.edu/entries/ethics-computer/
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211796,00.html
http://fcit.usf.edu/network