Week 4
Week 4
College of Education
GE ELECT 1: Living in the IT Era
2nd Semester of A.Y: 2020-2021
1
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
D. Identify and discuss ethical issues that arise in the media and in personal everyday professional
practice.
Discussion
System Software
System software is often divided into two classifications: Operating Systems (often referred to as
Operating System
The operating system
Android, iOS, and Linux), allows the components of a computer to work together.
2
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
Multi-Tasking Systems
usually very inefficient. The first computer using a multitasking system was the British Leo III
owned by J. Lyons and Co. (First completed in 1961.) During batch processing, several different
programs would be loaded in the computer memory, and the first one would begin to run. When the
first program came to an instruction that required waiting for response from a peripheral, the context
of this program was stored away, and another program in memory was given a chance to run. This
process of running until required to wait, and, passing control to another program, rather than
stopping and waiting, would continue until all programs finished running. Personal Computer
computer expert or technician. The computer time-sharing models that were typically used with
larger, more expensive minicomputer and mainframe systems, were not appropriate for the earliest
3
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
personal computers. Personal computers DO, however, require some kind of operating system to
allow their users to execute programs, store files, and, in general USE their computers. The earliest
personal computers generally featured operating systems with rather primitive command line
interfaces.
interpret the command and execute it. Then the computer would wait for the user to enter another
command. Some of the more widely used operating systems with command line interfaces were:
In the early 1980’s an alternative means for users to communicate with and
interface (GUI), is a type of user interface that allows users to interact with
perceived steep learning curve of command-line interfaces Alan Kay used a GUI as the main
interface for the Xerox Alto computer, released in 1973. Most modern general-purpose GUIs are
4
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
derived from this system, although it never reached commercial production. The first commercially
available computer with a GUI was the 1979 PERQ workstation, manufactured by Three Rivers
Computer Corporation. In 1981, Xerox eventually commercialized the Alto in the form of a new and
enhanced system – the Xerox 8010 Information System – more commonly known as the Xerox Star.
These early systems spurred many other GUI efforts, including the Apple Lisa in 1983, the
Apple Macintosh 128K in 1984, and the Atari ST with Digital Research's GEM, and Commodore
Amiga in 1985. Of these, the Apple Macintosh was probably the most influential.
MacOS The "classic" Mac OS is the original Macintosh operating
system that was introduced in 1984 along with the first Macintosh
rebranded it as
It was noted as being easy to use, but was criticized for its limited memory management, lack of
memory protection and access controls, and for its propensity for conflicts among extensions.
Microsoft Windows
Microsoft introduced an operating environment named
5
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
operating system, but achieved little success. Windows 2.0 was released in December 1987, and was
more popular than its predecessor. It resulted in Apple Computer filing a suit against Microsoft
1993). Windows 3.0, released in 1990 is the first Microsoft Windows version to achieve broad
commercial success. Microsoft Windows came to dominate the world's personal computer (PC)
90% market share. On PCs, Windows is still the most popular operating system. However, in 2014,
Microsoft admitted losing the majority of the overall operating system market to Android, because
of the massive growth in sales of Android smartphones. In 2014, the number of Windows devices
sold was less than 25% that of Android devices sold. Of course, the two operating systems are for
Linux Systems
Linux is an open source computer operating system
since been ported to more platforms than any other operating system.
Because of the dominance of Android (a version of Linux) on smartphones, Linux has the largest
installed base of all general-purpose operating systems. Linux is also the leading operating system
on servers and other big iron systems such as mainframe computers, and is used on 99.6% of the
TOP500 supercomputers. It is used by around 2.3% of desktop computers. The Chromebook, which
6
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
runs on Chrome OS (another Linux derivative), dominates the US K–12 education market and
represents nearly 20% of the sub-$300 notebook sales in the US. Desktop Linux distributions include
Smart Phones
A smartphone is a mobile phone with an
operating system that normally combines
features of a personal computer operating
system with other features useful for mobile or
handheld use. Smartphones are generally about
pocket-sized and typically have the features of
a
mobile phone (they can make and receive voice calls and they can send and receive text messages.)
They also have the features of other mobile devices/utilities. Features such as event calendars; media
players; video games; GPS navigation; digital cameras; and video cameras. Smartphones can access
the Internet and can run a variety of third-party software components. These components are called
"apps" and can be obtained from places like Google Play Store or Apple App Store. A smartphone
typically has a color display with a graphical user interface that covers more than 75% of the front
surface. The display is almost always a touchscreen, and sometimes also has a touch-enabled
keyboard. The user can press onscreen icons to activate "app" features, or he/she can use the virtual
keyboard to type words and numbers. The vast majority of modern smartphones use one of two
7
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
Android
Android is a mobile operating system developed by Android Inc. (starting in 2003)
actions, such as swiping, tapping and pinching These are used to manipulate
on-screen objects (icons). Android typically includes a virtual keyboard for text input. In
addition to touchscreen devices, Google has further expanded the system to include Android
TV for televisions, Android Auto for cars, and Android Wear for wrist watches, each with a
specialized user interface. Variants of Android are also used on notebooks, game consoles,
digital cameras, and other electronics. In September 2015, Android had 1.4 billion monthly
active users, and it has the largest installed base of any operating system.
iOS iOS is a mobile operating system created and developed by Apple Inc. exclusively for its
company's mobile devices, including the iPhone, iPad, and iPod Touch. It is
the second most popular mobile operating system globally after Android. iPad
tablets are also the second most popular, by sales (second to Android) since
2013. The iOS user interface is based on direct manipulation, using multitouch
and buttons. Interaction with the system includes gestures such as swipe, tap, pinch, and reverse
pinch, all of which have specific definitions within the context of the iOS operating system and
8
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
its multi-touch interface. Internal accelerometers are used by some applications to respond to
Utility Programs
Utility programs help system administrators analyze, configure, optimize and maintain the computer.
They include programs for things like virus protection, access control, file system administration,
display control, system restore and backup, and system security. The term system software can also
be used for software development tools (like compilers, linkers and debuggers)
Device Drivers
As computers became more and more
common, manufacturers began
producing devices and equipment to
work with the computers (printers,
modems, scanners,
projectors, disk drives, ...) Of
course, the different companies did not
produce equipment that worked in exactly the same way, and of course the computer
manufacturers (and software designers) could hardly be expected to know all of the details of how
every one of the different kinds of equipment would operate, so the equipment manufacturers
began designing
“drivers” to go with their equipment. A device driver is a computer program that operates or controls
a particular kind of device that might be attached to a computer. A driver provides an interface for a
device. Drivers enable operating systems, and other computer programs, to access functions without
needing to know precise details of the hardware. When a device is installed on a computer, its drivers
must also be installed. For early personal computer users, the process of installing drivers was often
9
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
computers became more common and an automated system for driver installation and configuration
became more and more important. Early systems for software configuration of devices included the
MSX standard, NuBus, Amiga Autoconfig, and IBM Microchannel. Initially all expansion cards for
the IBM PC required configuration by physical selection on the board with jumper straps or DIP
switches, but increasingly ISA bus devices were arranged for software configuration. By 1995,
Microsoft
Windows included a comprehensive method of enumerating hardware at boot time and allocating
resources. The system was called the "Plug and Play" standard. Now, there are several completely
automated computer interfaces, none of which requires any device configuration by the computer
user. The only task of the user is to load software. The devices are self-configuring.
Application Software
An application is any program, (or group of programs), that is designed to be used by regular users
(end users) as opposed to systems administrators. Application software (also called end-user programs)
includes such things as database programs, word processors, Web browsers and spreadsheets. The
collective noun application software refers to all applications collectively. This distinguishes it from
system software, which is mainly involved with running the computer. Applications may be bundled
with the computer and its system software or published separately, and may be coded as proprietary,
open-source or university projects. Apps built for mobile platforms are called mobile apps.
10
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
➢ An application suite (or software suite) consists of multiple applications bundled together. They
usually have related functions, features and similar user interfaces. They are often able to
◆ Business applications often come in suites, e.g. Microsoft Office, LibreOffice and
iWork, which bundle together a word processor, a spreadsheet, etc.; but suites exist
➢ Enterprise software addresses the needs of an entire organization's processes and data flows,
◆ Word processors, spreadsheets, email and blog clients, personal information system,
and individual media editors may aid in multiple information worker tasks.
11
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
➢ Content access software is used primarily to access content without editing, but may include
software that allows for content editing. Such software addresses the needs of individuals and
➢ Educational software is related to content access software, but has the content or features
◆ For example, it may deliver evaluations (tests), track progress through material, or
➢ Simulation software simulates physical or abstract systems for either research, training or
entertainment purposes.
➢ Media development software generates print and electronic media for others to consume, most
➢ Product engineering software is used in developing hardware and software products. This
language editing and compiling tools, integrated development environments, and application
programmer interfaces.
➢ Entertainment Software can refer to video games, screen savers, programs to display motion
pictures or play recorded music, and other forms of entertainment which can be experienced
12
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
Piracy is Ethical
Some think that there is nothing wrong with
software piracy. They believe in the freedom
of information and expression
(ie.
software because they have a right to the information contained in the software. They also
hold the idea of that reproduction and distribution of software a part of fair use within
copyright law. Some pirates have cited their first amendment rights as an excuse for piracy.
They claim that since posting information in electronic form is protected by the first
and should not be infringed upon. Some think that software piracy doesn't hurt anyone, that
it is a victimless crime. They believe that, with the rising prices of software, software
manufacturers are really not hurt by pirates making illegal copies of their programs. They
13
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
think since they are not going to pay for the software anyway, it is OK to get it free. Another
common excuse runs along the lines of "the software is really not worth the money they're
charging anyway." The argument continues that since the software is buggy, it's really not
a crime to distribute faulty products. Finally, some claim that they're simply "testing" the
software. "If I really like it, I'll pay for it," runs the common excuse,
"but this program just sits on my hard drive and I almost never use it."
Piracy is Unethical
This view holds that piracy is really not a victimless crime. Due to software piracy, the
industry has seen some 12 billion dollars and over 100,000 jobs lost. The attraction of
piracy is due to its anonymity and the ease with which illegal copies of software can be
made and distributed. However, every person who makes illegal copies is contributing to
the monetary losses caused by piracy. Information really does not "want to be free." People
who write the software have rights to profit from it, just as people who write books have
the sole right to sell them. Copying software is depriving the rightful owners of software
of hard-earned wages. Software piracy cannot be protected by the first amendment, because
the first amendment does not cover illegal activities. Just as yelling "Fire!" in a crowded
theater is not protected by the first amendment, neither is the distribution of illegal
software. The claim that pirates have a right to make illegal copies of software because the
software is buggy, or too expensive, or not frequently used by the pirate, is also flawed.
Someone might think a Rolls-Royce is too expensive and not worth the money, but this
doesn't give him the right to steal it. Or, the fact that you almost never watch television
14
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
doesn't give you the right to steal a TV. Pirating software costs everyone. Since not as many
copies of software are sold, the software manufacturers have to raise prices. This means
that the legitimate users are incurring higher costs due to piracy. In short, piracy is not as
"victimless" a crime as it may seem. Software developers, distributors, and, ultimately, end
users, are all hurt by piracy. Under the RA 10175 - Cybercrime Prevention Act of 2012
(Cybercrime Law) Philippines, acquiring any digital copy of any copyrighted material is
20 years in prison.
Ethical and Unethical Uses of Computers and Computer Programs
The widespread use of computers has introduced a new level of insecurity into all of our
lives, and provided most of us with new opportunities to engage in new behaviors, many of
which have the potential of being unethical.
Unethical Behavior
The computers in our lives give us the opportunity to
access to
private information spreading of viruses, and monitoring the computer activities of others.
Given the widespread use of computers (and especially smartphones) by children, the
15
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
situation has evolved to where parents now have responsibilities (for which they are for the
most part woefully unprepared) to prevent their children from engaging in unethical
behaviors.
Piracy
The issue of software piracy is dealt with at great length in
another section, but there is no question that accepting
unauthorized copies of software, and/or allowing friends and
associates to make copies of software you have purchased
would be illegal, in addition to being, at the very best, questionable, ethically speaking.
Cyberbullying
Although bullying has always been a part of
life, the emergence of social networking has
given enormously greater powers to would be
bullies. (A number of widely publicized
incidents in which the victims were driven to
suicide can attest to this.) Clearly the parents
of would be victims have a
responsibility to protect their children from these online predators, but the parents of
potential bullies also have a moral/ethical responsibility to monitor their children, and to
prevent them from engaging in such behavior. Under the House Bill 5718, or the proposed
“Anti Cyber-Bullying Act of 2015” Philippines, cyber-bullies shall face a penalty of fines
(6) months and six (6) years, or both, at the discretion of the court.
16
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
Plagiarism
Documents with all kinds of information are widely
(and legal) duty to attribute the source of what we are using. There is also a booming
cottage industry of people who will write papers and do homework assignments for high
school and college students. Needless to say, submitting someone else’s work as one’s own
the Intellectual Property Code, the act of plagiarism when it amounts to copyright
₱150,000.00. Under the Cybercrime Prevention Act 2012, however, the penalty is a degree
higher.
Unauthorized Access
Computer ethics also involve avoiding
unauthorized access to computer
systems and preserving the
confidentiality and privacy of data in
computers. In addition, it gives us all
the responsibility of respecting system
policies, such as not sharing passwords
and not trying to access unauthorized sites. This becomes somewhat controversial in the case
of a parent accessing the memory and browser history of their child’s computer or
17
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
smartphone. Under the R.A 10173 - Data Privacy Act of 2012, the unauthorized processing
of personal information shall be penalized by imprisonment ranging from one (1) year to
three (3) years and a fine of not less than five hundred thousand pesos (₱500,000) but not
more than Two million pesos (₱2,000,000.00) shall be imposed on persons who process
personal information without the consent of the data subject, or without being authorized
have an ethical responsibility to make sure that what we share is virus free.
Activity Monitoring
In the area of the ethics of activity monitoring, there are many questions, but few clear
work, even to the point of recording all of their email accesses. Many people argue that this
is an invasion of privacy. Others argue that the employer is paying for the employees’ time,
and, usually, for the computers they are using and for the Internet access, as well. One
might argue, then. That this would give the employer the right to ensure that the employees
are using the computers (and Internet access) for work related activities.
Insecurities
The simple fact that we have and use a computer puts us at risk of a number of possible
dangers, any or all of which can and should worry us.
18
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
Identity Theft
One of the things we must be aware of is the
possibility of identity theft. Identity theft is the
deliberate use of someone else identity. The
person whose identity has been assumed may
suffer adverse consequences if they are held
responsible for the perpetrator's actions.
Identity theft occurs when someone uses another identifying information, (like their name,
ID number, credit card number), without their permission, usually to commit fraud or other
crimes. The majority of identity theft victims do not realize that they are victims until their
lives have been negatively impacted. Many people do not find out that their identities have
been stolen until they are contacted by financial institutions or discover suspicious
activities on their bank accounts.
Being Hacked
Many people get hacked and do not even have a clue about it, till it is too late. If you do
not want to have your computer hacked, you really have to be on alert and remain vigilant
for strange behavior in e-mail messages, credit card statements and unusual computer
behavior.
Infection by Viruses
Computer viruses currently cause billions of dollars' worth of economic damage each year.
The damage is due to system failure, waste of computer resources, data corruption,
increased maintenance costs, etc. In response, an industry of antivirus software has cropped
up, selling or freely distributing virus protection to users of various operating systems. No
currently existing antivirus software is able to detect all computer viruses (especially new
19
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
ones), but computer security researchers are actively searching for new ways to enable
antivirus solutions to more effectively detect emerging viruses, before they have already
people.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
10.Thou shalt always use a computer in ways that ensure consideration and respect for your
fellow humans.
Exercise
Exercise will be posted in Google Classroom
Assessment
Assessment will be posted in Google Classroom
Reflection
20
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla
MODULE WEEK NO.4
https://bit.ly/2FCDoEy
21
Credit to: Lyjieme Barro Revised by: Jane A. Pardenilla