0% found this document useful (0 votes)
12 views

GEE3-PRELIM

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

GEE3-PRELIM

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 48

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

National Highway, Crossing Rubber, Tupi, South Cotabato

GENERAL EDUCATION DEPARTMENT


___________________________________________________

LEARNING MODULE FOR GEE3: Living in the IT Era


_____________________________________________________

Week 1
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 1 of 48
COURSE OUTLINE

COURSE CODE : GEE3


TITLE : Living in the IT Era
TARGET POPULATION : All students
INSTRUCTOR : Nemia M. Labuayan, LPT
Overview:

The quickening pace of evolution in technology is very evident in this era. It seems that
it is progressing faster than ever. From year to year, the evolution of technology is one
of staggering promise and opportunity--as well as uncertainty. Basically, technology has
been around before, and as long as there are people, information technology will be
there also because there were always ways of communicating through technology
available at that point in time. The future may be unknown, but digital advancement
continues to reshape our world in ways that encourage people to form new habits, find
new ways to work together, and become better human beings. And, in most cases,
these changes translate into a range of opportunities and disruptions across every
industry. Humans have always been quick to adapt technologies for better and faster
communication.

Objective:
After successful completion of this module, the student can be able to;
• Demonstrate a sense of readiness for the upcoming semester;
• Identify their learning outcomes and expectations for the course;
• Recognize their capacity to create new understandings from reflecting on the
course;
• Assess the role and importance of ICT.

The following are the topics to be discussed

Week 1 INTRODUCTIONOFTHECLASS and The


INTRODUCTION TO INFORMATION
COMMUNICATION AND TECHNOLOGY
Week 2 EVOLUTION OF TECHNOLOGY
Week 3 CLASSIFYING COMPUTERS
Week 4 APPLICATION OF ICT IN OUR DAILY LIVES
Week 5 THE NETIQUETTE AND THE COMPUTER ETHICS
Week 6 PRELIM EXAMINATION

Instruction to the Learners

Each chapter in this module contains a major lesson involving the Importance of ICT in our
daily lives, The Internet and the Web, Information, Control, and Privacy, and so on and so forth.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 2 of 48
The lesson are characterized by continuity, and are arranged in such a manner that the present
unit is related to the next unit. For this reason, you are advised to read this module. After each
unit, there are exercises to be given. Submission of task will be given during your scheduled
class hour.

WEEK 1
INTRODUCTION OFTHECLASS
And
THE INTRODUCTION OF COMMUNICATION TO ICT

VISION
A premier institution that provides quality education and globally empowered
individuals.

MISSION
To produce competent, community-oriented and globally competitive individuals
through holistic education.

CORE VALUES
 Service
 Excellence
 Accountability
 Innovation
 Teamwork

ACADEMIC POLICIES
A. Academic Rights: Every students has the right to receive competent instruction
and relevant quality education.
B. General Enrolment Procedures: All prospective students with their necessary
credentials must enrol during the prescribed registration period. To facilitate
registration, students should read guidelines posted online via SEAIT official
page or on the bulletin board and be guided by the registration procedures.
C. Class Attendance: Every student is required prompt and regular attendance.
Tardiness and absences are recorded from the first day of classes. There is a
corresponding sanction with a multiple absences or tardiness.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 3 of 48
D. Examination and Grading System: There are 3 major examination
administered every semester, namely Prelim, Midterm, and Final Examination.
The registrar determines the schedule of the major examination. Grading
System: 40% Quizzes; 20% Class Standing; 40% Examination.
E. Graduating with Latin Honors: The office of the Registrar in close coordination
with the Office of the Vice President for Academics shall determine and
recommend to the administrator a student who completes his baccalaureate
degree with honors provided with standard qualifications.
F. Student Fees: Includes the registration and other fees.
G. Scholarship Programs: The school recognizes excellence in academic
achievement. This is manifested in its scholarship programs given to deserving
students. Other scholarships funded by the Government and private benefactors
are acknowledged provided that a Memorandum of Agreement has been duly
processed and approved by the School President.

NON-ACADEMIC POLICIES
A. Code of Discipline for Students: The rules and regulations of the institution are
intended to maintain the order necessary for an academic environment and to
ensure an atmosphere conducive to the formation of values for men and women
and for others.
B. School Identification Card (SID): SID cards will be issued and validated by the
SAO upon enrolment. Student is required to wear his SID card at all times while
he is within the school premises.
C. Uniforms/Dress Code: The school uniform must be worn with respect and
dignity. Only students wearing the prescribed uniform will be allowed to enter the
school premises and the classroom.
D. Prescribed haircut for Criminology students: Female- 2/3 (hairnet shall be
used to those who don’t want to cut their hair; Male- 2/0

CLASS POLICIES
1. Awareness of intended audience
(e.g. classes are meant for students currently enrolled in the course and you
must not enter or share a class meeting with someone unauthorized)
2. General etiquette
(e.g. mute microphones when not speaking, raise hand virtually to ask question,
turn off camera if you're stepping away)
3. Discussion

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 4 of 48
(e.g. you can disagree with others but should do so respectfully and
constructively)
4. Privacy
(e.g. students should consult with the instructor to receive permission to record
the class)
5. Communicate instances of disruptive behaviors to the proper instructor, faculty
member, or escalate the complaint when necessary.

Introduction to Information and Communications Technology (ICT)

Meaning and Significance

The concept of technology has evolved throughout the years. As the rate of
human progress continues to increase, society has adapted in such a way that
technology no longer appeals to mechanical or electrical systems alone. The term
technology presently includes advancements in communication and how information is
handled, thus enabling governments, organization, industries, and ordinary individuals
to improve on their decision making, business process, and everyday living. The term
Information and communications technology or ICT was defined in a study conducted
by Zuppo (2021) as “related to technologies that facilitate the transfer of information and
various types of electronically mediated communication.” However, this definition was
considered too broad that Zuppo created an ICT hierarchy to identify the key aspects
such as ICT in education, business, and the economic sector. These classifications,
however contain some degree of commonality.

The need for devices, such as mobile phones, laptops, and tablets, is identified in all
instances. This fact is perhaps due to the human need to “belong.” According to
Baumeister and Learry (1995), the “belongingness hypothesis” states that people have
a basic psychological need to feel closely connected to others, and that caring,
affectionate bonds from close relationships are a major part of human behaviour. This
need can be fulfilled through the different modes of communication, be it face- to –face,
online, through voice, or simply through a text message, manifested in the number of
people with mobile devices such as smartphones, tablets, and the latest technologies
such as “wearable devices. “

Nowadays, it is no longer surprising to find a person owning several of these gadgets,


which may not necessarily be for different purposes. ICT is ubiquitous and access to it
relatively affordable and somewhat effortless. This makes the demand much higher as
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 5 of 48
different
sectors,
industries,
and

organizations now also incorporate ICT in their daily business process.

Figure1.1 ICT Hierarchy by Colrain Zuppo Figure 1.2 Global changes in the levels
of ICT

The International Telecommunication Union (ITU) conducts an annual study on the


prevalence of ICT around the world.
The report, called the ICT Development Index (IDI), includes quantitative indicators
regarding ICT access, usage, and skills in different regions and countries. Figure 1.2
denotes the upward trend of people needing ICTs, with the estimate that mobile
subscriptions now outnumber world populations.

IT versus ICT
When do we use the term ICT and how does it differ from IT? ICT, or information and
communications technology, is often used in a more general sense, and is described as
using computers and other digital technologies to assist individuals or institutions in
handling or using information. ICT is technology that supports activities involving
information such as gathering, processing, storing, and presenting data. Increasingly,
these activities also involve collaboration and communication.

IT, or information technology, pertains to the industry that involves computers, software,
networking, and other IT infrastructure to help relay or manage information important in
modern-day living as seen primarily in large companies or corporations. Simply put, IT
is a subset of ICT as the technology used in the field of IT aids in the use of ICT (Wang,
2016).

Breakdown of ICT
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 6 of 48
ICT is made up of three words, namely information, communications, and technology.

Information
Information refers to the knowledge obtained from reading, investigation, study, or
research. Some of the tools that transmit information are the telephone, television, and
radio.
Not to be confused with data, information is regarded as processed data. Computers
normally process data that are later understood as information. For example, while
typing on your laptop, you usually punch in random letters on the keyboard to make up
words and sentences. The typing on the keyboard is considered as input data while the
words and sentences you see on your computer monitor is considered as output
information.

Information is needed to make decisions and to foresee the future. For example,
scientists can detect the formation of a tsunami using the latest technology and warn
the public to avoid disasters in the affected areas.

Processed information is called knowledge. Knowledge helps fulfil daily tasks. For
example, knowledge is used to predict tomorrow’s weather and decide if there is a need
to bring an umbrella. Knowledge is also used to analyse the stock market and check
which company is worth investing in.

Communication
Communication is an act of transmitting messages. .

In the prehistoric days, humans communicated through signs or symbols as evidenced


by cave paintings and drawings, rock art, stone carvings, and the like. Forms of
communication have evolved through time as communicating technology,
communication is faster, more convenient, and more efficient. When face- to- face
meeting is not possible, a long distance communication or virtual communication is now
common and easy with the use of smartphones and computers with internet access.

Technology

Technology has evolved in ways that improved people’s daily activities. As


mentioned above, technology has made communication much easier and faster through
telephones, fax machines, mobile devices, and the internet. It has also made
broadcasting information, such as news or weather reports, more effective. Radio,

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 7 of 48
television, satellites, and the World Wide Web are powerful tools that can be used by
individuals to gather needed information to aid them in their office, school or house
work, or in simple day-to-day activities.

ACTIVITY #1
(To be submitted next week)

Activity 1.1 Written Exercises

Direction: Answer the following questions. Each question is (20 Points) write your answers in a
1whole sheet of paper.
1. What is the relevance of ICT in your chosen course?
2. Illustrate the importance of ICT in today’s generation.
3. Differentiate ICT and IT using Venn diagram.

Rubrics:

FOCUS(20) CONTENT(30) ORGANIZATIO(25) CONVENTION(25)


The single controlling The presence of ideas The order developed and Grammar, mechanics,
point made with an developed through facts, sustained within and spelling, usage and
awareness of the task examples, anecdotes, across paragraph using sentence formation.
about a specific topic. details, opinions, transitional devices and
statistics, reasons, and or including introduction and
explanations. conclusion.

Sharps, distinct, Substantial, specific, Sophisticated Evident control of


controlling point made and/or illustrative content arrangement of content grammar, mechanics,
about a single topic with demonstrating strong with evident and/or subtle spelling, usage and
evident awareness of development and transitions. sentence formation.
task. sophisticated ideas.

Apparent point made Sufficiently developed Functional arrangement of Sufficient control of


about a single topic with content with adequate content that sustains a grammar, mechanics,
sufficient awareness of elaboration or explanation. logical order with some spelling, usage and
task. evidence of transitions. sentence formation.

End of first week


---------------------------------------------Nothing Follows--------------------------------------

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 8 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato

GENERAL EDUCATION DEPARTMENT


___________________________________________________

LEARNING MODULE
FOR
GEE3: Living in the IT Era
_____________________________________________________

Week2

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 9 of 48
Week2

Evolution of Technology

The evolution of technology has always depended on one thing: the human rationale.
Humans tend to think of ways on how to discharge tasks or workload, or do daily
activities easily.

The concept of technology always starts with the basic tool. In order to build a house,
one cannot simply use his or her own two hands to cut wood and attach the wooden
pieces together. A hacksaw, hammer, and set of nails are needed to accomplish the
task. The concept of a wheel has also made transportation much easier, and enabled
people to move several objects from one place to another with ease.
By combining a set of tools. People have come up with machines that can do tasks
faster and more efficiently. A single-wheel transportation tool has inspired the creation of
a machine capable of transporting, not just objects, but also passengers. Thus, vehicles
have

nowadays become more of a necessity rather than a form of luxury.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 10 of 48
Figure 1.4 Private car vs. public transport

Another type of machine that is considered a necessity is the computer. A computer is


an electronic device, operating under the control of instructions stored in its own
memory that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use. However, as technology evolves, so do
machines. Computers today are no longer the same computers your parents must have
first used. Most machines, including computers, have evolved through the process of
automation.

Figure 1.5 Computer basic usage Figure 1.6 Touch screen technology

Automation is defined as “the technique of making an apparatus, a process, or a system


operate automatically.” Automation includes a broad range of technologies normally
connecting computer systems, and systems integration, among others. The integration
is made in such a way that these interconnected systems are capable of self- acting or
self-regulation.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 11 of 48
Figure 1.7 Toyota’s automated production

Figure 1.8 The intelligent car in the future- with a sense- able dashboard

Automated system can reduce the instances of errors, which are usually caused by
human-based decision and comprehension. Production companies often use automated
systems as part of their business process as automation increases productivity and
lessens the time to market.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 12 of 48
However, an automated system is not the same as an intelligent system. Intelligent
systems are far more complex and are capable of learning. This is where the concepts
of artificial intelligence comes in. One of the latest inventions in the automotive industry
is the intelligent car which is capable of driving and parking itself.

The history of computer technology is often used to refer to the origin of all the
different generations of computers. From first to fifth each computer generation is
characterized by significant technological development in their components, memory,
and elements which essentially changed the way these devices work.

Several periods of generation from over the years advanced the technological evolution
leads to the creation of today’s modern computer with more complex, more powerful,
and increased capability and functionality.

First generation Computer (1945-1959)


(Vacuum Tubes)

Figure 1.9 Vacuum Tubes


The first generation of computers refers to the early stages of computer development.
This generation is the beginning of computer technology that gained further progress to
make computers more powerful and smaller.

Function of the Vacuum Tubes


 Helped provide circuit for the central processing unit.
 Punch-cards, paper tape, and magnetic tape were used.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 13 of 48
The example of the first generation is the Electronic Numeric Integrator and
Calculator (ENIAC) is considered to be the first- generation computer. ENIAC was a
modular computer, composed of several panels capable of performing different
functions. However, it could store only. It was the first electronic computer developed in
1946. Designed by J. Presper Eckert and Jhon W. Mauchly from the University of
Pennsylvania and financed by theUnited States Army.

Figure 1.12 ENIAC showing the vacuum tubes

Second- generation Computer (1959-1965)


(Transistors)

The second generation of computers replaced the vacuum tubes with a reliable
component called transistors for manufacturing of computers which invented by
William Shockley in 1947.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 14 of 48
Figure 1.10 the Transistor

The transistors were the revolution in the computer field because this
component advantaged the 2nd generation computer by increasing the performance,
operating speed (hundreds of thousands of operations per second), as well as
decreasing the electricity consumption of the computers.

Transistors were far superior to the vacuum tube, allowing computers to get faster,
cheaper, more energy-efficient made and possible to reduce the size of computing
equipment and ultimately heat reduced and reliability improved

Characteristics of the 2nd Generation Computer:

 Computers based on transistors instead of vacuum tubes.


 Magnetic Tape was used to store data.
 Relatively small in size and reduced weight.
 Low energy consumption than 1st gen computers.
 Faster, reliable, and less expensive than the first generation.
 Use of storage devices, printers, and operating systems, etc.

3rd Generation Computer (1964-1971)


The third generation appeared in the form of integrated circuits (invented by Jack
Kilby from 1958 to 1964). An IC (integrated circuit) is consists of many small transistors
mounted on chips, which are called semiconductors.

Figure 1.11 Integrated Circuit

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 15 of 48
This synchronized chip became an important foundation for the third generation
computers when scientists combined hundreds of transistors fit in this circuit result in a
more powerful electronic segment called an integrated circuit. Multiprogramming was
implemented (this is when there are several executable programs in memory) at the
same time that it diminished their manufacturing costs. In the mid-60s. International
Business Machine Corporation (IBM) improved the term “computer architecture”. By the
end of the 60s. Mini-computers appeared. This revolutionary innovation allowed to
expansion of the processing capacity and memory of the machines. Instead of punch
cards and prints, users interacted via keyboards and monitors, and interacted with an
operating system, allowing the device to run various applications at once with a central
program that monitored the memory.

Figure 1.12 IBM

As you can see, the first appearance of computer monitors fell on the second
generation of computers. The invention belongs to the company IBM, which in 1964
released the commercial display station IBM-2250.

It was used in the system/360 series. The model had a vector monochrome display
measuring 12×12 inches, with a resolution of 1024×1024 pixels and a refresh rate of 40
Hz. This invention revolutionized today’s different types of monitors including LCD, LED,
OLED, and Curved Shaped monitors.

The invention of IC incredibly decreased the size of computers and made it easy for
transportation from one place to another. The working speed and efficiency of this
generation of computers were much faster than the previous generation and even
cheaper.

High-end languages such as PASCAL, BASIC, FORTRAN – II TO IV, COBOL, and


ALGOL developed in this generation.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 16 of 48
For the first time, they got access to a mass audience allowed computers to penetrate
into different spheres of human activity since they were smaller and cheaper. Along
these, they turned out to be more specialized (i.e., there were different computers for
different tasks).

Characteristics of the 3rd Generation of Computer:

 In this generation, computers based on Integrated Circuit was more powerful


than the transistor.
 The size of the computers was likewise little because the size of the IC being
more modest than the circuit size of the transistors.
 More reliable, inexpensive, faster, energy-efficient, as well as very light in weight
than 2nd gen computers.
 The first Computer Mouse and Keyboard were appeared and used in the 3rd
generation of computers
 Use of new versions of high-level languages like BASIC, COBOL, FORTRAN,
PASCAL, and ALGOL
 Available for a mass audience and made it possible for general purpose usage.
4th Generation Computer (1971-2010)
(Microprocessor)

The microprocessor brought the fourth generation of computers, as thousands of


integrated circuits equivalent to about millions of transistors were assembled and

Figure 1.13 Microprocessor

Brought the whole central processing unit and other fundamental elements of the
machine into a small chip called a microprocessor fitted on the socket. These
computers used Very Large Scale Integrated circuit’s technology also called VLSI
technology. After the invention, the microprocessor began to use in computing
machines in the fourth and fifth generations of computers.

Within the framework of the considered generation in 1971, the first microprocessor
appeared as an unexpected result of Intel’s work on calculator circuits and further
development of minicomputers (PDP-11).

The first personal computer and a microcomputer was “ALTAIR” developed by the
company MITS in 1974. Also, the first microprocessor was the Intel 4004, manufactured
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 17 of 48
in 1971, initially for an electronic calculator. Whereas the computers of the first
generation filled an entire room, while now the 4th generation ‘microprocessors’ fit in the
palm of the hand.

This generation of computers used an operating system based on the graphical user
interface (GUI), which means these numbers were very easy to perform mathematical
and logical tasks.

The computers started to utilize high-speed memory systems on integrated circuits with
a capacity of several megabytes. Computer performance has increased significantly
(hundreds of millions of operations per second).

The high-level language like C, C ++, Java, PHP, Python, Visual Basic, was utilized to
compose programs in the computers of the fourth generation.

The advent of the first personal computers in the mid-70s gave every common user the
same computing resources that enormous computers had during the 60s. These
computers were made more modest, faster, and less expensive can undoubtedly be put
on a table or desk. Which marked the so-called era of personal computers.

Peripheral devices examples, such as mice, joysticks, handheld devices, etc., were
developed during this 4th generation. Computers could be connected together in
a network to share information with each other, this has played an important role in the
birth and development of LAN, Ethernet, and the Internet.

The most popular companies in the world like Intel and AMD were rising. Then again,
companies like Microsoft and Apple introduced their operating systems ‘Windows’ and
‘Macintosh’ in the generation of this computer. Because of which the act of multimedia
started.

This is the era where personal computers were born, an idea that actually persists
today. Also, these were the generation of DEC’s (Digital Equipment Corporation)
minicomputers.

Characteristics of the 4th Generation of Computer:

 Computers based on microprocessors and VLSI technology.


 The computers of 4th gen were small in size, lightweight, and almost portable
computers.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 18 of 48
The integrating of multi cores in processors like Dual core, Octa core, etc has
begun.
 The processing speed of this computer generation was much faster and reliable
than the previous three generations.
 The size and cost of power supply units has reduced.
 Use of languages like C, C ++, .Net, Java, PHP, Python, Visual Basic.
 Use of GUI Based OS with more memory capacity.
 Accessible to the Internet.
 Due to the low cost of these computers, they were available to every common
man.
Examples

Desktops, Laptops, Workstations, Tablets, Chrome books, and Smartphones, are


examples of the fourth generation of computers.

Good to know~ Alan Turing is the father of modern computers born in England in 1912.

Fifth-generation Computer (1980- onwards)


(Artificial Intelligence)

Artificial intelligence is the name of the fifth as well as the latest generation of
computers based on ULSI (Ultra Large Scale Integration) technology is the process
of integrating or embedding millions of transistors on a single silicon microchip.

Figure 1.14 AI
The main objective of the latest fifth-generation computing and effort made by
computer researchers is to make them smart by incorporating Artificial Intelligence
so as to develop devices that respond to the input of natural language and are
capable of learning and self-organizing even in 2022 it is under development. This
new information technology has greatly increased the size and working ability of the
microprocessor, which has prompted the use of computers in the various fields of
Entertainment, Accounting, Educational institutes, Film-making, Traffic-
control, Business applications, and Hospitals, Engineering, Researches, Defense,
etc.

That’s why a computer of the 5th generation is also known as the AI (Artificial
Intelligence) generation of computers.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 19 of 48
Some computers are being intended to do all the work themselves as a human act,
behave, and communicate. The best example of this is an Artificial Intelligence (AI)
based computing machine in the 5th generation of computers “Sophia” a robot.

Characteristics of 5th Generation Computer:

 The main focus on AI-based computers.


 Computers made of microprocessors based on ULSI (Ultra Large Scale
Integration) technology.
 The processing speed is quite high can perform billions of calculations in a
second.
 Computers are portable, cheap, reliable, fast, and available in various forms and
sizes like a Desktop, Laptop, Smartphone, Smartwatches, etc.
 Invention of the operating system such as Windows, Macintosh and ChromeOS
of Chromebooks.
 Multimedia has evolved in this generation by combining Sound, Graphics, or
Picture and Text.
 Development of Internet of Things.

Activity 1.2 Written Exercises

Direction: Answer the following questions. Each question is (20 Points) write your
answers in a clean 1whole yellow paper.
1. Why do we need to know the history of Computer?
2. What are your insight about the history of computer from First generation to Fifth
generation?

Rubrics:

FOCUS(20) CONTENT(30) ORGANIZATIO(25) CONVENTION(25)


The single controlling The presence of ideas The order developed Grammar, mechanics,
point made with an developed through and sustained within spelling, usage and
awareness of the task facts, examples, and across paragraph sentence formation.
about a specific topic. anecdotes, details, using transitional
opinions, statistics, devices and including
reasons, and or introduction and
explanations. conclusion.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 20 of 48
Sharps, distinct, Substantial, specific, Sophisticated Evident control of
controlling point made and/or illustrative arrangement of content grammar, mechanics,
about a single topic with content demonstrating with evident and/or spelling, usage and
evident awareness of strong development and subtle transitions. sentence formation.
task. sophisticated ideas.

Apparent point made Sufficiently developed Functional arrangement Sufficient control of


about a single topic with content with adequate of content that sustains grammar, mechanics,
sufficient awareness of elaboration or a logical order with spelling, usage and
task. explanation. some evidence of sentence formation.
transitions.

End of Second week


---------------------------------------------Nothing Follows------------------------------------

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 21 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato

GENERAL EDUCATION DEPARTMENT


___________________________________________________

LEARNING MODULE FOR GEE3: Living in the IT Era


_____________________________________________________

Week 3

Week 3
Classifying Computers

The general classifications of computers are as follow:

 Personal computer- is a small, single-user computer based on a


microprocessor. In addition to the microprocessor, a personal computer has a
keyboard for entering data, a monitor for displaying information, and a storage
device for saving data.
 Workstation- is a powerful, single-user computer. A workstation is like a
personal computer, but it has a more powerful microprocessor and a higher-
quality monitor.
 Minicomputer- is a multi-user computer capable of supporting from 10 to
hundreds of users simultaneously.
 Mainframe- is a powerful multi-user computer capable of supporting hundreds or
thousands of users simultaneously.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 22 of 48
 Supercomputer- is an extremely fast computer that can perform millions of
instructions per second. Below is a picture of NSASA’s Pleiades supercomputer
that has 245,536 CPU cores and total memory of 935 TB.

Figure 1.19 NASA’s Pleiades supercomputers

To compare, a computer with an Intel Core i3 processor, has only two cores for running its
programs and applications. Core i5 and i7 models usually have only four cores; however, most
applications cannot use all the cores to full advantage. Thus, they do not operate at full capacity.
Imagine having more than 245,000 cores. How many applications and programs can your
computer run in a second?

Computers are also categorized into several types due to the introduction of mobile devices and
the proliferation of internet capable devices. Specialized computers are now classified according
to specific uses. The different types of computers are as follows:

 Desktop computers- are computers designed to be placed on a desk, and are


normally made up of a few different parts, including the computer case, central
processing unit (CPU), monitor, keyboard, and mouse.
 Laptop computers- are battery-powered computer devices whose probability make
them possible to use almost anytime, anywhere.
 Tablet computers- are hand-held computers with touch-sensitive screen for typing and
navigation.
 Smartphones- are hand-held telephones which can do things that computers can do,
including browsing and searching the internet and even playing console games.
 Wearables- include fitness trackers and smartwatches that can be worn throughout the
day.
 Smart TVs- are the latest television sets that include applications present in computers.
For example, videos can be streamed from the internet directly onto the TV. The TV can
also use as a computer monitor and gaming monitor.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 23 of 48
Components of a Computer
What makes a computer work? By definition, a computer is an electronic device that
manipulates information or data. It has the ability to store, retrieve, and process data. It
contains both hardware components and software applications. The hardware pertains
to the computer’s physical devices.

Input Devices
Working with a computer would be ineffective if one does not intermingle with it because
the machine cannot accept and receive instructions and/or deliver an output on its own.
Input devices enter or send data and instructions from the user or from another
computer system on the internet while output devices send back the administered data
to the user or to another computer system.

The following are some of the most common and important input devices of a
computer:

Keyboard- is the common input device that accepts letters, numbers, and commands
from the user.
Mouse- lets one select options from on-screen menus. A mouse is used by moving it on
a flat surface, pressing its two buttons (left and right), and scrolling the wheel that is
located between the buttons.
There are also alternatives to using a mouse. A trackball has a ball that can rotate
using a finer or the palm of a hand to move the pointer. A touchpad also called a
trackpad is touch-sensitive pad that lets the user move the pointer by touching and
dragging his or her finger on the pad. Touchpads are commonly built-in on laptop
computers.
Microphones- allows a user to speak into the computer to input data and instructions.
While there are available stand-alone microphones for computers, most of the time,
users by a headset-a combination of microphone and earphones-for the sake of
practicality.
Scanner- converts printed materials (such as text and pictures) into a form the
computer can use. There are different types of scanners available; the most common is
the flatbed scanner. Scanners look like miniature printers with a flip-up cover
protecting the glass platen. They are often built into multi-function printers (MFPs).
Another type becoming common nowadays is that hand-held or portable scanners.
Portable scanners are just a bit a document line by line. They do not give high-
resolution scans and are more expensive than flatbed scanners.
Digital camera- allows one to take pictures then transfer the photographed images to
the computer or printer instead of storing the images on a traditional film.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 24 of 48
PC video camera- is a digital video camera that enables users to create a movie or
take still photographs electronically. With the PC video camera attached to the
computer, users can see each other as they communicate via the computer.

Outputs Devices
An output device is any hardware component that transmits information to one or more
people. The three commonly used output devices are as follows:
Printer- produces text and graphics on a physical medium such as paper. The two
types of printers are the Impact printer and the non-impact printer. An impact printer
makes contact with the paper by pressing an inked ribbon against the paper using a
hammer or pins. An example of an impact printer is the dot-matrix printer. A non-impact
printer does not use a striking device to produce characters on the paper, and because
it does not hammer against the paper, the printer produces less noise.

Monitor- display text, graphics, and videos on a screen. Many monitors look similar to a
television. The three types of monitor available in the market are the following.

A. Cathode ray tube (CRT) is a vacuum tube containing an electron gun at one
end and a fluorescent screen at another end. From this electron gun, a process
called thermionic emission generates = strong beam of electrons. These
electrons travel through a narrow path within the tube with high speed using
various electromagnetic devices and finally strike the phosphor points present on
the fluorescent screen, thus creating an image. Monitors employ the CRT
technology used most commonly in the manufacturing of television screens. A
stream of intense high-energy electrons is used to form images on a fluorescent
screen.
B. Liquid crystal display (LCD) is a flat-panel display that consists of a layer of
color or monochrome pixels arranged chemically between a couple of
transparent electrodes and two polarizing the light in
Varied amounts and making it pass through the liquid crystal layer.

C. Figure 1.17

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 25 of 48
Different types of monitor

A. CRT Monitor.
B. Liquid crystal display C. light-emitting

D. Light-emitting diode (LED) is a flat-panel display that uses light-emitting diodes


for backlighting. The display is of LCD only but the backlighting is done by LEDs.
LED monitors are said to use much lesser power than CRT and LCD. Thus, they
are also considered environment-friendly.

 Speaker- allows one to hear music, voice, and other sounds. The signal
used to produce the sound that comes from a computer speakers is
created by the computer’s sound card.

System Unit

The system units is the enclosure composed of the main elements of a computer that
are used to administer data. This can be referred to as a computer case or tower. The
circuitry of the system unit containing the primary components of a computer with
connectors into other circuit boards can be positioned is recognized as motherboard.

Storage Devices
A computer can be utilized with only processing, memory, input, and output devices. To
make it very valuable, however, a computer also needs a place to hold program files
and all related files when they are not in use. The goal of using a storage is to keep data
permanently.
There are many types of storage devices which include the flash disk drive, a small

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 26 of 48
portable storage device often referred to as a pen drives, thumb drives, or jump drives.
It has a memory capacity of 2GB, 4GB, 8GB, 16GB, 32GB, 64GB,1 28GB, 1TB, and
now up to 2TB. Another type of storage is the hard disk drive. Most personal
computers have at least one non-removable hard disk that is regarded as a non-volatile
memory which permanently, stores and retrieves data.

Another storage device is the compact disc. It is a flat, round and portable metal disc.
One type of compact disc is a CD-ROM, which can be accessed using most CD and
DVD drives. Another type of compact disc is a DVD-ROM, which has enough storage
capacity to store a full-length movie.

Figure 1.17 Storage devices-


flash drive, hard drive, and compact discs

Why Computers are Powerful?


Computers are powerful for a variety of reasons. They work with remarkable speed,
reliability, and accuracy. Computers can store large amounts of data and information.
Also, computers allow users to communicate with other users or computers. A user is
anyone who communicates and interacts with a computer or makes use of the
information it generates.
Speed
In the system unit, operations get done through electronic circuits. When data,
instructions, and information drift along these circuits, the travel at incredibly fast
speeds. Most computers bring out billions of operations in a single second. The world’s
fastest computer can perform trillions of operations in one second.

Reliability and consistency


The electronic components in modern computers are dependable because they
have a low rate. The high reliability of components enables the computer to produced
consistent results
Accuracy
Computers process large amounts of data and generate error-free results, provide
the data is inputted correctly and the instructions work properly. If data is inaccurate, the
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 27 of 48
resulting output is also incorrect. A computing phrase known as garbage in, garbage out
points out the accuracy of a computer’s output depends on the accuracy of the input.

Communication
It is unbearable to go through a day without communication. Communication
happens between two or more people sending and receiving messages from one
another. The one sending the message is referred to as the sender while the one
receiving the information is known as the receiver. The message being transmitted can
contain facts, thoughts, perceptions, judgements
Beliefs, attitudes, commands, and even reactions. For example, two computers
connected by a communications device, such as a modem, can share stored data,
instructions, and information. These two computers can be located in the same room or
thousands of miles away from each in two different countries.

Impact of ICT on Individuals, Organizations, and Society

ICT brings both positive and negative effects of individuals, organizations, and society. It
improves education, access to information, and security. However, it limits personal
interaction and physical activity and poses problems in employment and security.

Positive Effecs

 Improved access to education

There were new ways of learning such as the use of learning


management system (LMS) which implements educational enhancements
such as distance learning and online tutorials, virtual reality, and
interactive multimedia.

 Access to information and communication

The internet is widely used in communication. Access to it is getting better


as it has become available in almost all places such as commercial
establishments and public spaces. New tools have been promoted such
as VoIP phone, Instant Messaging (IM), chat (e.g., FB Messenger, Google
Hangouts, Yahoo! Messenger, etc.),

 Security

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 28 of 48
With the advancement that ICT brings, individuals and organization can
solve any security problems. Examples of security measures on
applications are: (1) the use of encryption methods to keep and protect
data from any malicious software; (2) the use of password/s for personal
information protection; and (3) the development of physical security
system such as biometrics in a form of fingerprint, facial recognition, and
voice recognition.

Negative Effects

 Reduce personal interaction and physical activity

Because of virtual communication, ironically, people are less likely to talk


to or meet each other in person. And because of the comfort of working
from home and the entertainment that the internet offers (i.e., streaming
movies, playing online games, etc.), physical activity is reduced leading to
health issues such as obesity and heart disease

 Job loss or increase in unemployment

This can be considered as one of the worst effects of ICT.


 Multiple workers being replaced and reduced by a smaller number
of employees capable of doing the same volume of task.
 Shipping or freight services in which a certain amount added to the
operating costs for the physical process of transporting
commodities or good.

 Automation through robots or machine replacing the people in the


assembly line.

 Security

ICT brings not only improvement but also threat to security. Data or files
must always be kept secure and safe. The internet connection must
always be safeguard from different attacks such as data modification,
identity/IP address spoofing, password-based attacks, denial-of-service,
etc.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 29 of 48
Ethical Issues in ICT

1. Plagiarism
It is an act of theft in which a person copies another person’s ideas, words, or
writings, etc. and pass them off as his or her own. Those who committed such
action may lead to serious legal and ethical defilements
2. Exploitation
It is an action in which one deals with a person dishonestly, unethically, and
dishonourably, in order to take advantage of the latter’s works and/or resources.
This leads to unlawful actions.
3. Libel
It can be either be an insult, slur, or slander. Either written or spoken or even
through actions, it may lead to libel if the accusation is not true and without any
piece of evidence.

ACTIVITY #3
(To be submitted next week)

Discussion Points and Exercise Questions

Activity: Reflection Paper


Direction: Give your insight on the impact of ICT in Individuals, Organizations, and Society
(Positive and negative effect) as well as the Ethical Issues in ICT (Plagiarism, Exploitation,
Libel). Write your answer on a clean sheet of paper. (Yellow Paper)

Rubric:

FOCUS(20) CONTENT(30) ORGANIZATIO(25) CONVENTION(25)


The single controlling The presence of ideas The order developed Grammar, mechanics,
point made with an developed through facts, and sustained within and spelling, usage and
awareness of the task examples, anecdotes, across paragraph using sentence formation.
about a specific topic. details, opinions, transitional devices and
statistics, reasons, and including introduction
or explanations. and conclusion.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 30 of 48
Sharps, distinct, Substantial, specific, Sophisticated Evident control of
controlling point made and/or illustrative arrangement of content grammar, mechanics,
about a single topic with content demonstrating with evident and/or spelling, usage and
evident awareness of strong development and subtle transitions. sentence formation.
task. sophisticated ideas.

Apparent point made Sufficiently developed Functional arrangement Sufficient control of


about a single topic with content with adequate of content that sustains grammar, mechanics,
sufficient awareness of elaboration or a logical order with spelling, usage and
task. explanation. some evidence of sentence formation.
transitions.

End of Third week


---------------------------------------------Nothing Follows--------------------------------------

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 31 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato

GENERAL EDUCATION DEPARTMENT


___________________________________________________

LEARNING MODULE
FOR`
GEE3: Living In the IT Era
_____________________________________________________

Week 4

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 32 of 48
Week 4

Applications of ICT (Computers) in Our Daily Lives


1. Business
Almost every business uses computers nowadays. They can be employed to store and
maintain accounts, personnel records, manage projects, track inventory, create
presentations and reports. They enable communication with people both within and
outside the business, using various technologies, including e-mail. They can be used to
promote the business and enable direct interaction with customers.

2. Education
Computers can be used to give learners audio-visual packages, interactive exercises,
and remote learning, including tutoring over the internet. They can be used to access
educational information from intranet and internet sources, or via e-books. They can be
used to maintain and monitor student performance, including through the use of online
examinations, as well as to create projects and assignments.

3. Healthcare
Healthcare continues to be revolutionized by computers. As well as digitized medical
information making it easier to store and access patient data, complex information can
also SCIENCES be analyzed by software to aid discovery of diagnoses, as well as
search for risks of diseases. Computers control lab equipment, heart rate monitors, and
blood pressure monitors. They enable doctors to have greater access to information on
the latest drugs, as well as the ability to share information on diseases with other
medical specialists.

4. Retail and Trade


Computers can be used to buy and sell products online - this enables sellers to reach a
wider market with low overheads, and buyers to compare prices, read reviews, and
choose delivery preferences. They can be used for direct trading and advertising too,
using sites such as eBay, Craigslist, or local listings on social media or independent
websites.

5. Government
Various government departments use computers to improve the quality and efficiency of
their services. Examples include city planning, law enforcement, traffic, and tourism.
Computers can be used to store information, promote services, and communicate
internally and externally, as well as for routine administrative purposes.

6. Marketing
Computers enable marketing campaigns to be more precise through the analysis and
manipulation of data. They facilitate the creation of websites and promotional materials.
They can be used to generate social media campaigns. They enable direct
communication with customers through email and online chat.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 33 of 48
7. Science
Scientists were one of the first groups to adopt computers as a work tool. In science,
computers can be used for research, sharing information with other specialists both
locally and internationally, as well as collecting, categorizing, analyzing, and storing
data. Computers also play a vital role in launching, controlling, and maintaining space
craft, as well as operating other advanced technology.

8. Publishing
Computers can be used to design pretty much any type of publication. These might
include newsletters, marketing materials, fashion magazines, novels, or newspapers.
Computers are used in the publishing of both hard-copy and e-books. They are also
used to market publications and track sales.

9. Arts and Entertainment


Computers are now used in virtually every branch of the arts, as well as in the wider
entertainment industry. Computers can be used to create drawings, graphic designs,
and paintings. They can be used to edit, copy, send, and print photographs. They can
be used by writers to create and edit. They can be used to make, record, edit, play, and
listen to music. They can be used to capture, edit and watch videos. They can be used
for playing games.

10. Communication
Computers have made real-time communication over the internet easy, thanks to
software and videoconferencing services such as Skype. Families can connect with
audio and video, businesses can hold meetings between remote participants, and news
organizations can interview people without the need for a film crew. Modern computers
usually have microphones and webcams built-in nowadays to facilitate software like
Skype. Older communications technologies such as email are also still used widely.

11. Banking and Finance


Most banking in advanced countries now takes place online. You can use computers to
check your account balance, transfer money, or pay off credit cards. You can also use
computer technology to access information on stock markets, trade stocks, and manage
investments. Banks store customer account data, as well as detailed information on
customer behavior which is used to streamline marketing.
12. Transport
Road vehicles, trains, planes, and boats are increasingly automated with computers
being used to maintain safety and navigation systems, and increasingly to drive, fly, or
steer. They can also highlight problems that require attention, such as low fuel levels, oil
changes, or a failing mechanical part. Computers can be used to customize settings for
individuals, for example, seat setup, air-conditioning temperatures.

13. Navigation
Navigation has become increasingly computerized, especially since computer
technology has been combined with GPS technology. Computers combined with
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 34 of 48
satellites mean that it's now easy to pinpoint your exact location, know which way that
you are moving on a map, and have a good idea of amenities and places of interest
around you.

14. Working From Home


Computers have made working from home and other forms of remote working
increasingly common. Workers can access necessary data, communicate, and share
information without commuting to a traditional office. Managers are able to monitor
workers' productivity remotely.

15. Military
Computers are used extensively by the military. They are used for training purposes.
They are used for analyzing intelligence data. They are used to control smart
technology, such as guided missiles and drones, as well as for tracking incoming
missiles and destroying them. They work with other technologies such as satellites to
provide geospatial information and analysis. They aid communications. They help tanks
and planes to target enemy forces.
16. Social and Romance
Computers have opened up many ways of socializing that didn't previously exist. Social
media enables people to chat in text or audio in real time across large distances, as well
as exchange photographs, videos, and memes. Dating sites and apps help people to
find romance. Online groups help people to connect with others who have similar
interests. Blogs enable people to post a variety of views, updates, and experiences.
Online forums enable discussions between people on specialist or general topics.

17. Booking Vacations


Computers can be used by travelers to study timetables, examine route options, and
buy plane, train, or bus tickets. They can be used to explore and book accommodation,
whether traditional hotels, or through newer services, such as Air BnB. Guided tours,
excursions, events, and trips can also be explored and booked online using computers.

18. Security and Surveillance


Computers are increasingly being combined with other technologies to monitor people
and goods. Computers combined with biometric passports make it harder for people to
fraudulently enter a country or gain access to a passenger airplane. Face-recognition
SCIENCES
technology makes it easier to identify terrorists or criminal is in public places.
Driver plates can be auto scanned by speed cameras or police cars. Private security
systems have also become much more sophisticated with the introduction of computer
technology and internet technology.

19. Weather Forecasting

The world's weather is complex and depends upon a multitude of factors that are
constantly changing. It's impossible for human beings to monitor and process all the
information coming in from satellite and other technologies, never mind perform the
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 35 of 48
complex calculations that are needed to predict what is likely to happen in the future.
Computers can process the large amounts of meteorological information.

20. Robotics
Robotics is an expanding area of technology which combines computers with science
and engineering to produce machines that can either replace humans, or do specific
jobs that humans are unable to do. One of the first use of robotics was in manufacturing
to build cars. Since then, robots have been developed to explore areas where
conditions are too harsh for humans, to help law enforcement, to help the military, and
to assist healthcare professionals.

Basic Computing Periods - Ages


a. Premechanical

The pre-mechanical age is the earliest age of information technology. It can be


defined as the time between 3000B.C. and 1450A.D. We are talking about a long
time ago. When humans first started communicating they would try to use
language or simple picture drawings known as petroglyphs which were usually
carved in rock.

Figure 2.1 Petroglyph


As alphabets became more popular and more people were writing information down,
pens and paper began to be developed. . It started off as just marks in wet clay, but later
paper was created out of papyrus plant. The most popular kind of paper made was
probably by the Chinese who made paper from rags.
This is where the first books and libraries are developed. You’ve probably heard of
Egyptian scrolls which were popular ways of writing down information to save. Some
groups of people were actually binding paper together into a book-like form.

Also, during this period were the first numbering systems. Around 100A.D. was when
the first 1-9 system was created by people from India. However, it wasn’t until 875A.D.
(775 years later) that the number 0 was invented. And yes, now that numbers were
created, people wanted stuff to do with them, so they created calculators. A calculator
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 36 of 48
was the very first sign of an information processor. The popular model of that time was
the abacus.

b. Mechanical
The mechanical age is when we first start to see connections between our current
technology and its ancestors. The mechanical age can be defined as the time between
1450 and 1840. A lot of new technologies are developed in this era as there is a large
explosion in interest with this area. Technologies like the slide rule (an analog computer
used for multiplying and dividing) were invented. Blaise Pascal invented the Pascaline
which was a very popular mechanical computer. Charles Babbage developed the
difference engine which tabulated polynomial equations using the method of finite
differences.

Figure 2.2 Difference Engine


There were lots of different machines created during this era and while we have not yet
gotten to a machine that can do more than one type of calculation in one, like our
modern-day calculators, we are still learning about how all of our all-in-one machines
started. Also, if you look at the size of the machines invented in this time compared to
the power behind them it seems (to us) absolutely ridiculous to understand why
anybody would want to use them, but to the people living in that time ALL of these
inventions were HUGE.
c. Electromechanical

Now we are finally getting close to some technologies that resemble our modern-day
technology. The electromechanical age can be defined as the time between 1840 and
1940. These are the beginnings of telecommunication. The telegraph was created in the
early 1800s. Morse code was created by Samuel Morse in 1835. The telephone (one of
the most popular forms of communication ever) was created by Alexander Graham Bell
in 1876. The first radio developed by Guglielmo Marconi in 1894. All of these were
extremely crucial emerging technologies that led to big advances in the information
technology field.

The first large-scale automatic digital computer in the United States was the Mark 1
created by Harvard University around 1940. This computer was 8ft high, 50ft long, 2ft
wide, and weighed 5 tons - HUGE. It was programmed using punch cards. How does
your PC match up to this hunk of metal? It was from huge machines like this that people
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 37 of 48
began to look at downsizing all the parts to first make them usable by businesses and
eventually in your own home.

Figure 2.3 Harvard Mark 1


d. Electronic
The electronic age is what we currently live in. It can be defined as the time between
1940 and right now. The ENIAC was the first high-speed, digital computer capable of
being reprogrammed to solve a full range of computing problems. This computer was
designed to be used by the U.S. Army for artillery firing tables. This machine was even
bigger than the Mark 1 taking up 680 square feet and weighing 30 tons - HUGE. It
mainly used vacuum tubes to do its calculations.
There are 4 main sections of digital computing. The first was the era of vacuum tubes
and punch cards like the ENIAC and Mark 1. Rotating magnetic drums were used for
internal storage. The second generation replaced vacuum tubes with transistors, punch
cards were replaced with magnetic tape, and rotating magnetic drums were replaced by
magnetic cores for internal storage. Also during this time high-level programming
languages were created such as FORTRAN and COBOL. The third generation replaced
transistors with integrated circuits, magnetic tape was used throughout all computers,
and magnetic core turned into metal oxide semiconductors. An actual operating system
showed up around this time along science with the advanced programming language
BASIC. The fourth and latest generation brought in CPUs (central processing units)
which contained memory, logic, and control circuits all on a single chip. The personal
computer was developed (Apple II). The graphical user interface (GUI) was developed.

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 38 of 48
ACTIVITY #4
(To be submitted next week)

Discussion Points and Exercise Questions


Direction: Answer the following questions cogently but honestly. Write it on a clean
sheet of paper.
1. What are the importance of computer in our daily life?
2. Choose 3 topics in the application of ICT (Computer) in our daily life and explain it in
your own words or understanding.

Rubric:

FOCUS(20) CONTENT(30) ORGANIZATIO(25) CONVENTION(25)


The single controlling The presence of ideas The order developed Grammar, mechanics,
point made with an developed through facts, and sustained within and spelling, usage and
awareness of the task examples, anecdotes, across paragraph using sentence formation.
about a specific topic. details, opinions, transitional devices and
statistics, reasons, and including introduction
or explanations. and conclusion.

Sharps, distinct, Substantial, specific, Sophisticated Evident control of


controlling point made and/or illustrative arrangement of content grammar, mechanics,
about a single topic with content demonstrating with evident and/or spelling, usage and
evident awareness of strong development and subtle transitions. sentence formation.
task. sophisticated ideas.

Apparent point made Sufficiently developed Functional arrangement Sufficient control of


about a single topic with content with adequate of content that sustains grammar, mechanics,
sufficient awareness of elaboration or a logical order with spelling, usage and
task. explanation. some evidence of sentence formation.
transitions.

End of Fourth week


---------------------------------------------Nothing Follows--------------------------------------

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 39 of 48
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.
National Highway, Crossing Rubber, Tupi, South Cotabato

GENERAL EDUCATION DEPARTMENT


___________________________________________________

LEARNING MODULE
FOR
GEE3: Living in the IT Era
_____________________________________________________

Week 5

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 40 of 48
Week 5

THE NETIQUETTE AND THE COMPUTER ETHICS

What is Netiquette?

What is Netiquette? Simple stated, its network etiquette – that is the etiquette of
cyberspace and “etiquette” means the forms of required by good breeding or prescribed
by authority to be required in social or official life. In other words, netiquette is a set of
rules for behaving properly online.

Netiquette, or network etiquette, is concerned with the "proper" way to communicate in


an online environment. Consider the following "rules," adapted from Virginia Shea's the
Core Rules of Netiquette, whenever you communicate in the virtual world.

When you use e-mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of professional online
communications known as netiquette. These rules will help you communicate with
instructors, classmates, and potential employers more effectively and will help prevent
misunderstandings.

REMEMBER THE GOLDEN RULE – Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to your
message. Make a good impression - treat others with the same respect that you would
like to receive and avoid confrontational or offensive language.

To help convey meaning when creating messages, it is sometimes acceptable to include


appropriate emoticon symbols, such as a smiley face :) However, for professional
communications these would be inappropriate.
SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and
business environments requires the use of correct terminology, spelling, and
grammar that can easily be understood. For example, use “your” instead of “ur”.

AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all


capital letters is known as “screaming”. It is distracting and generally frowned upon in
professional environments. It is better to draw emphasis to selected words or phrases
by: using italic or bold text; using a different color for text or background color; or
denoting emphasis using special characters (Example: **important**).

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your


messages before you send them is a best practice for effective and efficient
communication. Strive to make your communications concise and free of any: • Spelling
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 41 of 48
and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information

EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH


OTHERS
ONLINE – E-mail and chat messages that you send or receive are considered private
and should not be forwarded or copied to others without gaining the consent of all
involved participants. In general, messages posted to discussion boards and social
media sites can be read by the public. You may never know who might read or share
what you post. It is a good practice to always ask a post’s author for permission before
sharing a post with other parties.

• To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the
Internet

• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder.
Copying someone else's work and passing it off as your own is plagiarism. It
damages your reputation and could subject you to serious academic and legal
consequences.

RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing


opinions, beliefs, and criticisms, or responding to those of others in the conversation.

When sharing a viewpoint that differs from someone else’s, it is a best practice to
first acknowledge the other person by briefly restating what he or she said, but in
your own words. This lets the person know that you are listening and trying to
understand them.

• When presenting an opinion or criticism, it is helpful to use phrases that


identify to whose point of view you are referring. If the opinion is yours, you
can begin with the phrase “In my experience” or “In my opinion”. If it is a
viewpoint of someone else, make sure you identify that in your message
(Example: “According to Eric Ericson,” or “The president believes”).

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 42 of 48
Ten Commandments of Computer Ethics

a) Rule 1: Remember the Human When communicating electronically, whether


through email, instant message, discussion post, text, or some other method,
practice the Golden Rule: Do unto others as you would have others do unto you.
Remember, your written words are read by real people, all deserving of
respectful communication. Before you press "send" or "submit," ask yourself,
"Would I be okay with this if someone else had written it?"

b) Rule 2: Adhere to the same standards of behavior online that you follow in real
life while it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to act
within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual world.
c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to
domain." (Shea, 1994) Depending on where you are in the virtual world, the
same written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be
appropriate in an email to a classmate or colleague. Can you think of another
example?

a) Rule 4: Respect other people's time and bandwidth Electronic communication


takes time: time to read and time in which to respond. Most people today lead
busy lives, just like you do, and don't have time to read or respond to frivolous
emails or discussion posts. As a virtual world communicator, it is your
responsibility to make sure that the time spent reading your words isn't wasted.
Make your written communication meaningful and to the point, without
extraneous text or superfluous graphics or attachments that may take forever to
download.

b) Rule 5: Make yourself look good online writing.colostate.edu One of the best
things about the virtual world is the lack of judgment associated with your
physical appearance, sound of your voice, or the clothes you wear (unless you
post a video of yourself singing Karaoke in a clown outfit.) You will, however, be
judged by the quality of your writing, so keep the following tips in mind: Always
check for spelling and grammar errors Know what you're talking about and state
it clearly Be pleasant and polite

a) Rule 6: Share expert knowledge The Internet offers its users many benefits; one
is the ease in which information can be shared or accessed and in fact, this
"information sharing" capability is one of the reasons the Internet was founded.
So, in the spirit of the Internet's "founding fathers," share what you know! When
you post a question and receive intelligent answers, share the results with others.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 43 of 48
Are you an expert at something? Post resources and references about your
subject matter. Recently expanded your knowledge about a subject that might be
of interest to others? Share that as well.

b) Rule 7: Help keep flame wars under control what is meant by "flaming" and
"flame wars?" "Flaming is what people do when they express a strongly held
opinion without holding back any emotion." (Shea, 1994). As an example, think of
the kinds of passionate comments you might read on a sports blog. While
"flaming" is not necessarily forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts between one another, must be
controlled or the camaraderie of the group could be compromised. Don't feed the
flames; extinguish them by guiding the discussion back to a more productive
direction.

h) Rule 8: Respect other people's privacy Depending on what you are reading in the
virtual world, be it an online class discussion forum, Facebook page, or an email,
you may be exposed to some private or personal information that needs to be
handled with care. Perhaps someone is sharing some medical news about a
loved one or discussing a situation at work. What do you think would happen if
this information "got into the wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect your privacy, so should you
respect the privacy of others? Be sure to err on the side of caution when deciding
to discuss or not to discuss virtual communication.
i) Rule 9: Don't abuse your power just like in face-to-face situations, there are
people in cyberspace who have more "power" than others. They have more
expertise in technology or they have years of experience in a particular skill or
subject matter. Maybe it's you who possesses all of this knowledge and power!
Just remember: knowing more than others do or having more power than others
may have does not give you the right to take advantage of anyone. Think of Rule
1: Remember the human.
j) Rule 10: Be forgiving of other people's mistakes not everyone has the same
amount of experience working in the virtual world. And not everyone knows the
rules of netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you
had committed the same offense. If it's a minor "offense," you might want to let it
slide. If you feel compelled to respond to a mistake, do so in a private email
rather than a public forum.

Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual
reality.
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 44 of 48
Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming and child pornography) is used as a tool to commit an
offense.

Cybercriminals may use computer technology to access personal information,


business trade secrets or use the internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the
Philippines approved on September 12, 2012 which aims to address legal issues
concerning online interactions and internet.

Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual
personal information.

COMMON FORMS OF CYBERCRIMES:

a. Copyright
The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize others
to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive
rights through the unauthorized use of a copyrighted material or work.

b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another
author without authorization.

c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior,
which can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general
from scientific research than offline computer addiction, mainly because most
cases of computer addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself virtually.

CRIMINAL ACTIVITIES

a. Hacking
• Unauthorized access of or interference with computer systems, servers, or
other information and communication systems
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 45 of 48
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using
computers or other information and communication systems without the
computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration,
theft, or loss of such data.
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the, penalty is between 12-20 years reclusion
temporal
• Six years up to twelve years of imprisonment also known as prison mayor.

b. Computer-related forgery, fraud and/or identity theft


• An attempt to obtain sensitive information such as usernames, passwords,
and credit card details and (indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer
software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor

d. Cyberbullying
• The use of electronic communication to bully a person, typically by sending a
message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of
any lascivious exhibition of sexual organs or sexual activity with the aid of a
computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
GEE3: Living in the IT Era
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 46 of 48
f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775
or the AntiChild Pornography Act of 2009, committed through a computer
system.
• Penalty of 12-20 years of imprisonment or reclusion temporal

g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation
of a person or company.
• Penalty of 6-12 years of imprisonment or prison

ACTIVITY #5
(To be submitted next week)

Discussion Points and Exercise Questions

Activity 1.1 Written Exercises

Direction: answering the following questions. Write your answers in the space provided. Each
number answer corresponds 20 points.

1. Have you, or has anyone you know, have been experience cyberbullying?

2. What were the steps you, or that person, took to stop the incident?

3. What are the other ways that you think can combat cyberbullying?

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 47 of 48
4. What did you, or that person, learn from the experience?

Rubric:

Features Expert Accomplished Capable Beginner


(20pts) (15pts) (10pts) (5pts)

Quality of  Piece was  Piece was  Piece  Piece


Writing written in written in had little had no
extraordin an style style
ary style interesting  Give  Gives no
 Very style some new new
informative  Somewhat informatio informati
and well informativ n but on and
organized e and poorly very
organized organized poorly
organize
d
Grammar  Virtually no  Few  A number  So many
, Usage spelling, spelling of spelling,
& punctuatio and spelling, punctuati
Mechanic n or punctuatio punctuatio on and
grammatic ns errors, n or very
s
al errors minor grammati poorly
grammatic cal errors organize
al errors d

End of fifth week


---------------------------------------------Nothing Follows--------------------------------------

GEE3: Living in the IT Era


SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 48 of 48

You might also like