GEE3-PRELIM
GEE3-PRELIM
Week 1
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 1 of 48
COURSE OUTLINE
The quickening pace of evolution in technology is very evident in this era. It seems that
it is progressing faster than ever. From year to year, the evolution of technology is one
of staggering promise and opportunity--as well as uncertainty. Basically, technology has
been around before, and as long as there are people, information technology will be
there also because there were always ways of communicating through technology
available at that point in time. The future may be unknown, but digital advancement
continues to reshape our world in ways that encourage people to form new habits, find
new ways to work together, and become better human beings. And, in most cases,
these changes translate into a range of opportunities and disruptions across every
industry. Humans have always been quick to adapt technologies for better and faster
communication.
Objective:
After successful completion of this module, the student can be able to;
• Demonstrate a sense of readiness for the upcoming semester;
• Identify their learning outcomes and expectations for the course;
• Recognize their capacity to create new understandings from reflecting on the
course;
• Assess the role and importance of ICT.
Each chapter in this module contains a major lesson involving the Importance of ICT in our
daily lives, The Internet and the Web, Information, Control, and Privacy, and so on and so forth.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 2 of 48
The lesson are characterized by continuity, and are arranged in such a manner that the present
unit is related to the next unit. For this reason, you are advised to read this module. After each
unit, there are exercises to be given. Submission of task will be given during your scheduled
class hour.
WEEK 1
INTRODUCTION OFTHECLASS
And
THE INTRODUCTION OF COMMUNICATION TO ICT
VISION
A premier institution that provides quality education and globally empowered
individuals.
MISSION
To produce competent, community-oriented and globally competitive individuals
through holistic education.
CORE VALUES
Service
Excellence
Accountability
Innovation
Teamwork
ACADEMIC POLICIES
A. Academic Rights: Every students has the right to receive competent instruction
and relevant quality education.
B. General Enrolment Procedures: All prospective students with their necessary
credentials must enrol during the prescribed registration period. To facilitate
registration, students should read guidelines posted online via SEAIT official
page or on the bulletin board and be guided by the registration procedures.
C. Class Attendance: Every student is required prompt and regular attendance.
Tardiness and absences are recorded from the first day of classes. There is a
corresponding sanction with a multiple absences or tardiness.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 3 of 48
D. Examination and Grading System: There are 3 major examination
administered every semester, namely Prelim, Midterm, and Final Examination.
The registrar determines the schedule of the major examination. Grading
System: 40% Quizzes; 20% Class Standing; 40% Examination.
E. Graduating with Latin Honors: The office of the Registrar in close coordination
with the Office of the Vice President for Academics shall determine and
recommend to the administrator a student who completes his baccalaureate
degree with honors provided with standard qualifications.
F. Student Fees: Includes the registration and other fees.
G. Scholarship Programs: The school recognizes excellence in academic
achievement. This is manifested in its scholarship programs given to deserving
students. Other scholarships funded by the Government and private benefactors
are acknowledged provided that a Memorandum of Agreement has been duly
processed and approved by the School President.
NON-ACADEMIC POLICIES
A. Code of Discipline for Students: The rules and regulations of the institution are
intended to maintain the order necessary for an academic environment and to
ensure an atmosphere conducive to the formation of values for men and women
and for others.
B. School Identification Card (SID): SID cards will be issued and validated by the
SAO upon enrolment. Student is required to wear his SID card at all times while
he is within the school premises.
C. Uniforms/Dress Code: The school uniform must be worn with respect and
dignity. Only students wearing the prescribed uniform will be allowed to enter the
school premises and the classroom.
D. Prescribed haircut for Criminology students: Female- 2/3 (hairnet shall be
used to those who don’t want to cut their hair; Male- 2/0
CLASS POLICIES
1. Awareness of intended audience
(e.g. classes are meant for students currently enrolled in the course and you
must not enter or share a class meeting with someone unauthorized)
2. General etiquette
(e.g. mute microphones when not speaking, raise hand virtually to ask question,
turn off camera if you're stepping away)
3. Discussion
Page 4 of 48
(e.g. you can disagree with others but should do so respectfully and
constructively)
4. Privacy
(e.g. students should consult with the instructor to receive permission to record
the class)
5. Communicate instances of disruptive behaviors to the proper instructor, faculty
member, or escalate the complaint when necessary.
The concept of technology has evolved throughout the years. As the rate of
human progress continues to increase, society has adapted in such a way that
technology no longer appeals to mechanical or electrical systems alone. The term
technology presently includes advancements in communication and how information is
handled, thus enabling governments, organization, industries, and ordinary individuals
to improve on their decision making, business process, and everyday living. The term
Information and communications technology or ICT was defined in a study conducted
by Zuppo (2021) as “related to technologies that facilitate the transfer of information and
various types of electronically mediated communication.” However, this definition was
considered too broad that Zuppo created an ICT hierarchy to identify the key aspects
such as ICT in education, business, and the economic sector. These classifications,
however contain some degree of commonality.
The need for devices, such as mobile phones, laptops, and tablets, is identified in all
instances. This fact is perhaps due to the human need to “belong.” According to
Baumeister and Learry (1995), the “belongingness hypothesis” states that people have
a basic psychological need to feel closely connected to others, and that caring,
affectionate bonds from close relationships are a major part of human behaviour. This
need can be fulfilled through the different modes of communication, be it face- to –face,
online, through voice, or simply through a text message, manifested in the number of
people with mobile devices such as smartphones, tablets, and the latest technologies
such as “wearable devices. “
Page 5 of 48
different
sectors,
industries,
and
Figure1.1 ICT Hierarchy by Colrain Zuppo Figure 1.2 Global changes in the levels
of ICT
IT versus ICT
When do we use the term ICT and how does it differ from IT? ICT, or information and
communications technology, is often used in a more general sense, and is described as
using computers and other digital technologies to assist individuals or institutions in
handling or using information. ICT is technology that supports activities involving
information such as gathering, processing, storing, and presenting data. Increasingly,
these activities also involve collaboration and communication.
IT, or information technology, pertains to the industry that involves computers, software,
networking, and other IT infrastructure to help relay or manage information important in
modern-day living as seen primarily in large companies or corporations. Simply put, IT
is a subset of ICT as the technology used in the field of IT aids in the use of ICT (Wang,
2016).
Breakdown of ICT
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 6 of 48
ICT is made up of three words, namely information, communications, and technology.
Information
Information refers to the knowledge obtained from reading, investigation, study, or
research. Some of the tools that transmit information are the telephone, television, and
radio.
Not to be confused with data, information is regarded as processed data. Computers
normally process data that are later understood as information. For example, while
typing on your laptop, you usually punch in random letters on the keyboard to make up
words and sentences. The typing on the keyboard is considered as input data while the
words and sentences you see on your computer monitor is considered as output
information.
Information is needed to make decisions and to foresee the future. For example,
scientists can detect the formation of a tsunami using the latest technology and warn
the public to avoid disasters in the affected areas.
Processed information is called knowledge. Knowledge helps fulfil daily tasks. For
example, knowledge is used to predict tomorrow’s weather and decide if there is a need
to bring an umbrella. Knowledge is also used to analyse the stock market and check
which company is worth investing in.
Communication
Communication is an act of transmitting messages. .
Technology
Page 7 of 48
television, satellites, and the World Wide Web are powerful tools that can be used by
individuals to gather needed information to aid them in their office, school or house
work, or in simple day-to-day activities.
ACTIVITY #1
(To be submitted next week)
Direction: Answer the following questions. Each question is (20 Points) write your answers in a
1whole sheet of paper.
1. What is the relevance of ICT in your chosen course?
2. Illustrate the importance of ICT in today’s generation.
3. Differentiate ICT and IT using Venn diagram.
Rubrics:
Page 8 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato
LEARNING MODULE
FOR
GEE3: Living in the IT Era
_____________________________________________________
Week2
Page 9 of 48
Week2
Evolution of Technology
The evolution of technology has always depended on one thing: the human rationale.
Humans tend to think of ways on how to discharge tasks or workload, or do daily
activities easily.
The concept of technology always starts with the basic tool. In order to build a house,
one cannot simply use his or her own two hands to cut wood and attach the wooden
pieces together. A hacksaw, hammer, and set of nails are needed to accomplish the
task. The concept of a wheel has also made transportation much easier, and enabled
people to move several objects from one place to another with ease.
By combining a set of tools. People have come up with machines that can do tasks
faster and more efficiently. A single-wheel transportation tool has inspired the creation of
a machine capable of transporting, not just objects, but also passengers. Thus, vehicles
have
Page 10 of 48
Figure 1.4 Private car vs. public transport
Figure 1.5 Computer basic usage Figure 1.6 Touch screen technology
Page 11 of 48
Figure 1.7 Toyota’s automated production
Figure 1.8 The intelligent car in the future- with a sense- able dashboard
Automated system can reduce the instances of errors, which are usually caused by
human-based decision and comprehension. Production companies often use automated
systems as part of their business process as automation increases productivity and
lessens the time to market.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 12 of 48
However, an automated system is not the same as an intelligent system. Intelligent
systems are far more complex and are capable of learning. This is where the concepts
of artificial intelligence comes in. One of the latest inventions in the automotive industry
is the intelligent car which is capable of driving and parking itself.
The history of computer technology is often used to refer to the origin of all the
different generations of computers. From first to fifth each computer generation is
characterized by significant technological development in their components, memory,
and elements which essentially changed the way these devices work.
Several periods of generation from over the years advanced the technological evolution
leads to the creation of today’s modern computer with more complex, more powerful,
and increased capability and functionality.
Page 13 of 48
The example of the first generation is the Electronic Numeric Integrator and
Calculator (ENIAC) is considered to be the first- generation computer. ENIAC was a
modular computer, composed of several panels capable of performing different
functions. However, it could store only. It was the first electronic computer developed in
1946. Designed by J. Presper Eckert and Jhon W. Mauchly from the University of
Pennsylvania and financed by theUnited States Army.
The second generation of computers replaced the vacuum tubes with a reliable
component called transistors for manufacturing of computers which invented by
William Shockley in 1947.
Page 14 of 48
Figure 1.10 the Transistor
The transistors were the revolution in the computer field because this
component advantaged the 2nd generation computer by increasing the performance,
operating speed (hundreds of thousands of operations per second), as well as
decreasing the electricity consumption of the computers.
Transistors were far superior to the vacuum tube, allowing computers to get faster,
cheaper, more energy-efficient made and possible to reduce the size of computing
equipment and ultimately heat reduced and reliability improved
Page 15 of 48
This synchronized chip became an important foundation for the third generation
computers when scientists combined hundreds of transistors fit in this circuit result in a
more powerful electronic segment called an integrated circuit. Multiprogramming was
implemented (this is when there are several executable programs in memory) at the
same time that it diminished their manufacturing costs. In the mid-60s. International
Business Machine Corporation (IBM) improved the term “computer architecture”. By the
end of the 60s. Mini-computers appeared. This revolutionary innovation allowed to
expansion of the processing capacity and memory of the machines. Instead of punch
cards and prints, users interacted via keyboards and monitors, and interacted with an
operating system, allowing the device to run various applications at once with a central
program that monitored the memory.
As you can see, the first appearance of computer monitors fell on the second
generation of computers. The invention belongs to the company IBM, which in 1964
released the commercial display station IBM-2250.
It was used in the system/360 series. The model had a vector monochrome display
measuring 12×12 inches, with a resolution of 1024×1024 pixels and a refresh rate of 40
Hz. This invention revolutionized today’s different types of monitors including LCD, LED,
OLED, and Curved Shaped monitors.
The invention of IC incredibly decreased the size of computers and made it easy for
transportation from one place to another. The working speed and efficiency of this
generation of computers were much faster than the previous generation and even
cheaper.
Page 16 of 48
For the first time, they got access to a mass audience allowed computers to penetrate
into different spheres of human activity since they were smaller and cheaper. Along
these, they turned out to be more specialized (i.e., there were different computers for
different tasks).
Brought the whole central processing unit and other fundamental elements of the
machine into a small chip called a microprocessor fitted on the socket. These
computers used Very Large Scale Integrated circuit’s technology also called VLSI
technology. After the invention, the microprocessor began to use in computing
machines in the fourth and fifth generations of computers.
Within the framework of the considered generation in 1971, the first microprocessor
appeared as an unexpected result of Intel’s work on calculator circuits and further
development of minicomputers (PDP-11).
The first personal computer and a microcomputer was “ALTAIR” developed by the
company MITS in 1974. Also, the first microprocessor was the Intel 4004, manufactured
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 17 of 48
in 1971, initially for an electronic calculator. Whereas the computers of the first
generation filled an entire room, while now the 4th generation ‘microprocessors’ fit in the
palm of the hand.
This generation of computers used an operating system based on the graphical user
interface (GUI), which means these numbers were very easy to perform mathematical
and logical tasks.
The computers started to utilize high-speed memory systems on integrated circuits with
a capacity of several megabytes. Computer performance has increased significantly
(hundreds of millions of operations per second).
The high-level language like C, C ++, Java, PHP, Python, Visual Basic, was utilized to
compose programs in the computers of the fourth generation.
The advent of the first personal computers in the mid-70s gave every common user the
same computing resources that enormous computers had during the 60s. These
computers were made more modest, faster, and less expensive can undoubtedly be put
on a table or desk. Which marked the so-called era of personal computers.
Peripheral devices examples, such as mice, joysticks, handheld devices, etc., were
developed during this 4th generation. Computers could be connected together in
a network to share information with each other, this has played an important role in the
birth and development of LAN, Ethernet, and the Internet.
The most popular companies in the world like Intel and AMD were rising. Then again,
companies like Microsoft and Apple introduced their operating systems ‘Windows’ and
‘Macintosh’ in the generation of this computer. Because of which the act of multimedia
started.
This is the era where personal computers were born, an idea that actually persists
today. Also, these were the generation of DEC’s (Digital Equipment Corporation)
minicomputers.
Page 18 of 48
The integrating of multi cores in processors like Dual core, Octa core, etc has
begun.
The processing speed of this computer generation was much faster and reliable
than the previous three generations.
The size and cost of power supply units has reduced.
Use of languages like C, C ++, .Net, Java, PHP, Python, Visual Basic.
Use of GUI Based OS with more memory capacity.
Accessible to the Internet.
Due to the low cost of these computers, they were available to every common
man.
Examples
Good to know~ Alan Turing is the father of modern computers born in England in 1912.
Artificial intelligence is the name of the fifth as well as the latest generation of
computers based on ULSI (Ultra Large Scale Integration) technology is the process
of integrating or embedding millions of transistors on a single silicon microchip.
Figure 1.14 AI
The main objective of the latest fifth-generation computing and effort made by
computer researchers is to make them smart by incorporating Artificial Intelligence
so as to develop devices that respond to the input of natural language and are
capable of learning and self-organizing even in 2022 it is under development. This
new information technology has greatly increased the size and working ability of the
microprocessor, which has prompted the use of computers in the various fields of
Entertainment, Accounting, Educational institutes, Film-making, Traffic-
control, Business applications, and Hospitals, Engineering, Researches, Defense,
etc.
That’s why a computer of the 5th generation is also known as the AI (Artificial
Intelligence) generation of computers.
Page 19 of 48
Some computers are being intended to do all the work themselves as a human act,
behave, and communicate. The best example of this is an Artificial Intelligence (AI)
based computing machine in the 5th generation of computers “Sophia” a robot.
Direction: Answer the following questions. Each question is (20 Points) write your
answers in a clean 1whole yellow paper.
1. Why do we need to know the history of Computer?
2. What are your insight about the history of computer from First generation to Fifth
generation?
Rubrics:
Page 20 of 48
Sharps, distinct, Substantial, specific, Sophisticated Evident control of
controlling point made and/or illustrative arrangement of content grammar, mechanics,
about a single topic with content demonstrating with evident and/or spelling, usage and
evident awareness of strong development and subtle transitions. sentence formation.
task. sophisticated ideas.
Page 21 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato
Week 3
Week 3
Classifying Computers
Page 22 of 48
Supercomputer- is an extremely fast computer that can perform millions of
instructions per second. Below is a picture of NSASA’s Pleiades supercomputer
that has 245,536 CPU cores and total memory of 935 TB.
To compare, a computer with an Intel Core i3 processor, has only two cores for running its
programs and applications. Core i5 and i7 models usually have only four cores; however, most
applications cannot use all the cores to full advantage. Thus, they do not operate at full capacity.
Imagine having more than 245,000 cores. How many applications and programs can your
computer run in a second?
Computers are also categorized into several types due to the introduction of mobile devices and
the proliferation of internet capable devices. Specialized computers are now classified according
to specific uses. The different types of computers are as follows:
Page 23 of 48
Components of a Computer
What makes a computer work? By definition, a computer is an electronic device that
manipulates information or data. It has the ability to store, retrieve, and process data. It
contains both hardware components and software applications. The hardware pertains
to the computer’s physical devices.
Input Devices
Working with a computer would be ineffective if one does not intermingle with it because
the machine cannot accept and receive instructions and/or deliver an output on its own.
Input devices enter or send data and instructions from the user or from another
computer system on the internet while output devices send back the administered data
to the user or to another computer system.
The following are some of the most common and important input devices of a
computer:
Keyboard- is the common input device that accepts letters, numbers, and commands
from the user.
Mouse- lets one select options from on-screen menus. A mouse is used by moving it on
a flat surface, pressing its two buttons (left and right), and scrolling the wheel that is
located between the buttons.
There are also alternatives to using a mouse. A trackball has a ball that can rotate
using a finer or the palm of a hand to move the pointer. A touchpad also called a
trackpad is touch-sensitive pad that lets the user move the pointer by touching and
dragging his or her finger on the pad. Touchpads are commonly built-in on laptop
computers.
Microphones- allows a user to speak into the computer to input data and instructions.
While there are available stand-alone microphones for computers, most of the time,
users by a headset-a combination of microphone and earphones-for the sake of
practicality.
Scanner- converts printed materials (such as text and pictures) into a form the
computer can use. There are different types of scanners available; the most common is
the flatbed scanner. Scanners look like miniature printers with a flip-up cover
protecting the glass platen. They are often built into multi-function printers (MFPs).
Another type becoming common nowadays is that hand-held or portable scanners.
Portable scanners are just a bit a document line by line. They do not give high-
resolution scans and are more expensive than flatbed scanners.
Digital camera- allows one to take pictures then transfer the photographed images to
the computer or printer instead of storing the images on a traditional film.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 24 of 48
PC video camera- is a digital video camera that enables users to create a movie or
take still photographs electronically. With the PC video camera attached to the
computer, users can see each other as they communicate via the computer.
Outputs Devices
An output device is any hardware component that transmits information to one or more
people. The three commonly used output devices are as follows:
Printer- produces text and graphics on a physical medium such as paper. The two
types of printers are the Impact printer and the non-impact printer. An impact printer
makes contact with the paper by pressing an inked ribbon against the paper using a
hammer or pins. An example of an impact printer is the dot-matrix printer. A non-impact
printer does not use a striking device to produce characters on the paper, and because
it does not hammer against the paper, the printer produces less noise.
Monitor- display text, graphics, and videos on a screen. Many monitors look similar to a
television. The three types of monitor available in the market are the following.
A. Cathode ray tube (CRT) is a vacuum tube containing an electron gun at one
end and a fluorescent screen at another end. From this electron gun, a process
called thermionic emission generates = strong beam of electrons. These
electrons travel through a narrow path within the tube with high speed using
various electromagnetic devices and finally strike the phosphor points present on
the fluorescent screen, thus creating an image. Monitors employ the CRT
technology used most commonly in the manufacturing of television screens. A
stream of intense high-energy electrons is used to form images on a fluorescent
screen.
B. Liquid crystal display (LCD) is a flat-panel display that consists of a layer of
color or monochrome pixels arranged chemically between a couple of
transparent electrodes and two polarizing the light in
Varied amounts and making it pass through the liquid crystal layer.
C. Figure 1.17
Page 25 of 48
Different types of monitor
A. CRT Monitor.
B. Liquid crystal display C. light-emitting
Speaker- allows one to hear music, voice, and other sounds. The signal
used to produce the sound that comes from a computer speakers is
created by the computer’s sound card.
System Unit
The system units is the enclosure composed of the main elements of a computer that
are used to administer data. This can be referred to as a computer case or tower. The
circuitry of the system unit containing the primary components of a computer with
connectors into other circuit boards can be positioned is recognized as motherboard.
Storage Devices
A computer can be utilized with only processing, memory, input, and output devices. To
make it very valuable, however, a computer also needs a place to hold program files
and all related files when they are not in use. The goal of using a storage is to keep data
permanently.
There are many types of storage devices which include the flash disk drive, a small
Page 26 of 48
portable storage device often referred to as a pen drives, thumb drives, or jump drives.
It has a memory capacity of 2GB, 4GB, 8GB, 16GB, 32GB, 64GB,1 28GB, 1TB, and
now up to 2TB. Another type of storage is the hard disk drive. Most personal
computers have at least one non-removable hard disk that is regarded as a non-volatile
memory which permanently, stores and retrieves data.
Another storage device is the compact disc. It is a flat, round and portable metal disc.
One type of compact disc is a CD-ROM, which can be accessed using most CD and
DVD drives. Another type of compact disc is a DVD-ROM, which has enough storage
capacity to store a full-length movie.
Page 27 of 48
resulting output is also incorrect. A computing phrase known as garbage in, garbage out
points out the accuracy of a computer’s output depends on the accuracy of the input.
Communication
It is unbearable to go through a day without communication. Communication
happens between two or more people sending and receiving messages from one
another. The one sending the message is referred to as the sender while the one
receiving the information is known as the receiver. The message being transmitted can
contain facts, thoughts, perceptions, judgements
Beliefs, attitudes, commands, and even reactions. For example, two computers
connected by a communications device, such as a modem, can share stored data,
instructions, and information. These two computers can be located in the same room or
thousands of miles away from each in two different countries.
ICT brings both positive and negative effects of individuals, organizations, and society. It
improves education, access to information, and security. However, it limits personal
interaction and physical activity and poses problems in employment and security.
Positive Effecs
Security
Page 28 of 48
With the advancement that ICT brings, individuals and organization can
solve any security problems. Examples of security measures on
applications are: (1) the use of encryption methods to keep and protect
data from any malicious software; (2) the use of password/s for personal
information protection; and (3) the development of physical security
system such as biometrics in a form of fingerprint, facial recognition, and
voice recognition.
Negative Effects
Security
ICT brings not only improvement but also threat to security. Data or files
must always be kept secure and safe. The internet connection must
always be safeguard from different attacks such as data modification,
identity/IP address spoofing, password-based attacks, denial-of-service,
etc.
Page 29 of 48
Ethical Issues in ICT
1. Plagiarism
It is an act of theft in which a person copies another person’s ideas, words, or
writings, etc. and pass them off as his or her own. Those who committed such
action may lead to serious legal and ethical defilements
2. Exploitation
It is an action in which one deals with a person dishonestly, unethically, and
dishonourably, in order to take advantage of the latter’s works and/or resources.
This leads to unlawful actions.
3. Libel
It can be either be an insult, slur, or slander. Either written or spoken or even
through actions, it may lead to libel if the accusation is not true and without any
piece of evidence.
ACTIVITY #3
(To be submitted next week)
Rubric:
Page 30 of 48
Sharps, distinct, Substantial, specific, Sophisticated Evident control of
controlling point made and/or illustrative arrangement of content grammar, mechanics,
about a single topic with content demonstrating with evident and/or spelling, usage and
evident awareness of strong development and subtle transitions. sentence formation.
task. sophisticated ideas.
Page 31 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato
LEARNING MODULE
FOR`
GEE3: Living In the IT Era
_____________________________________________________
Week 4
Page 32 of 48
Week 4
2. Education
Computers can be used to give learners audio-visual packages, interactive exercises,
and remote learning, including tutoring over the internet. They can be used to access
educational information from intranet and internet sources, or via e-books. They can be
used to maintain and monitor student performance, including through the use of online
examinations, as well as to create projects and assignments.
3. Healthcare
Healthcare continues to be revolutionized by computers. As well as digitized medical
information making it easier to store and access patient data, complex information can
also SCIENCES be analyzed by software to aid discovery of diagnoses, as well as
search for risks of diseases. Computers control lab equipment, heart rate monitors, and
blood pressure monitors. They enable doctors to have greater access to information on
the latest drugs, as well as the ability to share information on diseases with other
medical specialists.
5. Government
Various government departments use computers to improve the quality and efficiency of
their services. Examples include city planning, law enforcement, traffic, and tourism.
Computers can be used to store information, promote services, and communicate
internally and externally, as well as for routine administrative purposes.
6. Marketing
Computers enable marketing campaigns to be more precise through the analysis and
manipulation of data. They facilitate the creation of websites and promotional materials.
They can be used to generate social media campaigns. They enable direct
communication with customers through email and online chat.
Page 33 of 48
7. Science
Scientists were one of the first groups to adopt computers as a work tool. In science,
computers can be used for research, sharing information with other specialists both
locally and internationally, as well as collecting, categorizing, analyzing, and storing
data. Computers also play a vital role in launching, controlling, and maintaining space
craft, as well as operating other advanced technology.
8. Publishing
Computers can be used to design pretty much any type of publication. These might
include newsletters, marketing materials, fashion magazines, novels, or newspapers.
Computers are used in the publishing of both hard-copy and e-books. They are also
used to market publications and track sales.
10. Communication
Computers have made real-time communication over the internet easy, thanks to
software and videoconferencing services such as Skype. Families can connect with
audio and video, businesses can hold meetings between remote participants, and news
organizations can interview people without the need for a film crew. Modern computers
usually have microphones and webcams built-in nowadays to facilitate software like
Skype. Older communications technologies such as email are also still used widely.
13. Navigation
Navigation has become increasingly computerized, especially since computer
technology has been combined with GPS technology. Computers combined with
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 34 of 48
satellites mean that it's now easy to pinpoint your exact location, know which way that
you are moving on a map, and have a good idea of amenities and places of interest
around you.
15. Military
Computers are used extensively by the military. They are used for training purposes.
They are used for analyzing intelligence data. They are used to control smart
technology, such as guided missiles and drones, as well as for tracking incoming
missiles and destroying them. They work with other technologies such as satellites to
provide geospatial information and analysis. They aid communications. They help tanks
and planes to target enemy forces.
16. Social and Romance
Computers have opened up many ways of socializing that didn't previously exist. Social
media enables people to chat in text or audio in real time across large distances, as well
as exchange photographs, videos, and memes. Dating sites and apps help people to
find romance. Online groups help people to connect with others who have similar
interests. Blogs enable people to post a variety of views, updates, and experiences.
Online forums enable discussions between people on specialist or general topics.
The world's weather is complex and depends upon a multitude of factors that are
constantly changing. It's impossible for human beings to monitor and process all the
information coming in from satellite and other technologies, never mind perform the
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 35 of 48
complex calculations that are needed to predict what is likely to happen in the future.
Computers can process the large amounts of meteorological information.
20. Robotics
Robotics is an expanding area of technology which combines computers with science
and engineering to produce machines that can either replace humans, or do specific
jobs that humans are unable to do. One of the first use of robotics was in manufacturing
to build cars. Since then, robots have been developed to explore areas where
conditions are too harsh for humans, to help law enforcement, to help the military, and
to assist healthcare professionals.
Also, during this period were the first numbering systems. Around 100A.D. was when
the first 1-9 system was created by people from India. However, it wasn’t until 875A.D.
(775 years later) that the number 0 was invented. And yes, now that numbers were
created, people wanted stuff to do with them, so they created calculators. A calculator
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 36 of 48
was the very first sign of an information processor. The popular model of that time was
the abacus.
b. Mechanical
The mechanical age is when we first start to see connections between our current
technology and its ancestors. The mechanical age can be defined as the time between
1450 and 1840. A lot of new technologies are developed in this era as there is a large
explosion in interest with this area. Technologies like the slide rule (an analog computer
used for multiplying and dividing) were invented. Blaise Pascal invented the Pascaline
which was a very popular mechanical computer. Charles Babbage developed the
difference engine which tabulated polynomial equations using the method of finite
differences.
Now we are finally getting close to some technologies that resemble our modern-day
technology. The electromechanical age can be defined as the time between 1840 and
1940. These are the beginnings of telecommunication. The telegraph was created in the
early 1800s. Morse code was created by Samuel Morse in 1835. The telephone (one of
the most popular forms of communication ever) was created by Alexander Graham Bell
in 1876. The first radio developed by Guglielmo Marconi in 1894. All of these were
extremely crucial emerging technologies that led to big advances in the information
technology field.
The first large-scale automatic digital computer in the United States was the Mark 1
created by Harvard University around 1940. This computer was 8ft high, 50ft long, 2ft
wide, and weighed 5 tons - HUGE. It was programmed using punch cards. How does
your PC match up to this hunk of metal? It was from huge machines like this that people
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 37 of 48
began to look at downsizing all the parts to first make them usable by businesses and
eventually in your own home.
Page 38 of 48
ACTIVITY #4
(To be submitted next week)
Rubric:
Page 39 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato
LEARNING MODULE
FOR
GEE3: Living in the IT Era
_____________________________________________________
Week 5
Page 40 of 48
Week 5
What is Netiquette?
What is Netiquette? Simple stated, its network etiquette – that is the etiquette of
cyberspace and “etiquette” means the forms of required by good breeding or prescribed
by authority to be required in social or official life. In other words, netiquette is a set of
rules for behaving properly online.
When you use e-mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of professional online
communications known as netiquette. These rules will help you communicate with
instructors, classmates, and potential employers more effectively and will help prevent
misunderstandings.
REMEMBER THE GOLDEN RULE – Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to your
message. Make a good impression - treat others with the same respect that you would
like to receive and avoid confrontational or offensive language.
Page 41 of 48
and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information
• To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the
Internet
• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder.
Copying someone else's work and passing it off as your own is plagiarism. It
damages your reputation and could subject you to serious academic and legal
consequences.
When sharing a viewpoint that differs from someone else’s, it is a best practice to
first acknowledge the other person by briefly restating what he or she said, but in
your own words. This lets the person know that you are listening and trying to
understand them.
Page 42 of 48
Ten Commandments of Computer Ethics
b) Rule 2: Adhere to the same standards of behavior online that you follow in real
life while it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to act
within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual world.
c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to
domain." (Shea, 1994) Depending on where you are in the virtual world, the
same written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be
appropriate in an email to a classmate or colleague. Can you think of another
example?
b) Rule 5: Make yourself look good online writing.colostate.edu One of the best
things about the virtual world is the lack of judgment associated with your
physical appearance, sound of your voice, or the clothes you wear (unless you
post a video of yourself singing Karaoke in a clown outfit.) You will, however, be
judged by the quality of your writing, so keep the following tips in mind: Always
check for spelling and grammar errors Know what you're talking about and state
it clearly Be pleasant and polite
a) Rule 6: Share expert knowledge The Internet offers its users many benefits; one
is the ease in which information can be shared or accessed and in fact, this
"information sharing" capability is one of the reasons the Internet was founded.
So, in the spirit of the Internet's "founding fathers," share what you know! When
you post a question and receive intelligent answers, share the results with others.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 43 of 48
Are you an expert at something? Post resources and references about your
subject matter. Recently expanded your knowledge about a subject that might be
of interest to others? Share that as well.
b) Rule 7: Help keep flame wars under control what is meant by "flaming" and
"flame wars?" "Flaming is what people do when they express a strongly held
opinion without holding back any emotion." (Shea, 1994). As an example, think of
the kinds of passionate comments you might read on a sports blog. While
"flaming" is not necessarily forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts between one another, must be
controlled or the camaraderie of the group could be compromised. Don't feed the
flames; extinguish them by guiding the discussion back to a more productive
direction.
h) Rule 8: Respect other people's privacy Depending on what you are reading in the
virtual world, be it an online class discussion forum, Facebook page, or an email,
you may be exposed to some private or personal information that needs to be
handled with care. Perhaps someone is sharing some medical news about a
loved one or discussing a situation at work. What do you think would happen if
this information "got into the wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect your privacy, so should you
respect the privacy of others? Be sure to err on the side of caution when deciding
to discuss or not to discuss virtual communication.
i) Rule 9: Don't abuse your power just like in face-to-face situations, there are
people in cyberspace who have more "power" than others. They have more
expertise in technology or they have years of experience in a particular skill or
subject matter. Maybe it's you who possesses all of this knowledge and power!
Just remember: knowing more than others do or having more power than others
may have does not give you the right to take advantage of anyone. Think of Rule
1: Remember the human.
j) Rule 10: Be forgiving of other people's mistakes not everyone has the same
amount of experience working in the virtual world. And not everyone knows the
rules of netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you
had committed the same offense. If it's a minor "offense," you might want to let it
slide. If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.
Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual
reality.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 44 of 48
Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming and child pornography) is used as a tool to commit an
offense.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the
Philippines approved on September 12, 2012 which aims to address legal issues
concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual
personal information.
a. Copyright
The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize others
to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive
rights through the unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another
author without authorization.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior,
which can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general
from scientific research than offline computer addiction, mainly because most
cases of computer addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or
other information and communication systems
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 45 of 48
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using
computers or other information and communication systems without the
computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration,
theft, or loss of such data.
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the, penalty is between 12-20 years reclusion
temporal
• Six years up to twelve years of imprisonment also known as prison mayor.
d. Cyberbullying
• The use of electronic communication to bully a person, typically by sending a
message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of
any lascivious exhibition of sexual organs or sexual activity with the aid of a
computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
Page 46 of 48
f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775
or the AntiChild Pornography Act of 2009, committed through a computer
system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation
of a person or company.
• Penalty of 6-12 years of imprisonment or prison
ACTIVITY #5
(To be submitted next week)
Direction: answering the following questions. Write your answers in the space provided. Each
number answer corresponds 20 points.
1. Have you, or has anyone you know, have been experience cyberbullying?
2. What were the steps you, or that person, took to stop the incident?
3. What are the other ways that you think can combat cyberbullying?
Page 47 of 48
4. What did you, or that person, learn from the experience?
Rubric:
Page 48 of 48