wordproc homework
TRANSCRIPT
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 1/8
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 2/8
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 3/8
information technology will produce benefits for many and costs for others. Ethical
issues in information systems have been given new urgency by the rise of the
Internet and electronic commerce. Internet and digital firm technologies make it
easier than ever to assemble, integrate, and distribute information, unleashing new
concerns about the appropriate use of customer information, the protection of
personal privacy, and the protection of intellectual property. Insiders with special
knowledge can “fool” information systems by submitting phony records, and
diverting cash, on a scale unimaginable in the pre-computer era.
http://www.prenhall.com/behindthebook/0132304619/pdf/laudon%20MIS10_CH-
04%20FINAL.pdf
Ethics is referred as the principles of right and wrong that individuals, acting as free
moral agents, use to make choices to guide their behaviors. In Technology, not every
gadget or new thing invented can achieve our necessary needs and satisfaction in life but
these things can also lead us to harm or others to harm us for they want these certain new
things from us. Not all new and modernize things can make life satisfying because there
are really things that have these limitations and capabilities to this and that so not
everything is safe especially now that everything is high-tech. So Information
Technology as we all know helps us to improve the certain liabilities or disadvantages of
the newly equip materials by producing again something like protection on privacy and
the protection of intellectual property.
C. Intellectual Property Law
As a type of property, Intellectual Property (IP) refers to the intangible. In contrast
to real property and personal property, it refers to what the minds of men and
women have created, usually expressed or translated into a tangible form that is
assigned certain rights of property.
Intellectual property laws include patent, copyright, trademark, and trade secret
laws, which typically protect IP rights. Patents, copyrights, and trademarks are
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 4/8
creations of statute, where the government recognizes and enforces the public
expression of an original idea for a limited period of time. Trade secrets, established
by common law, can protect IP through contractual and tort remedies. Copyright
laws generally protect creative and artistic works such as books, movies, music,
paintings, photographs, and software. Patents, trademarks and trade secret laws are
used more often to protect industrial properties, as they are generally created and
used for industrial or commercial purposes.
http://www.hg.org/intell.html
Intellectual Property helps a person to be mindful of what they created. Intellectual
Property includes musical, literary, and artistic works; inventions; software, symbols and
many others that are used in different works.
D. Computer Crimes and Threats
There are no precise, reliable statistics on the amount of computer crime and the
economic loss to victims, partly because many of these crimes are apparently not
detected by victims, many of these crimes are never reported to authorities, and
partly because the losses are often difficult to calculate.
There are three major classes of criminal activity with computers:
1. unauthorized use of a computer, which might involve stealing a username
and password, or might involve accessing the victim's computer via the
Internet through a backdoor operated by a Trojan Horse program.
2. creating or releasing a malicious computer program
3. harassment and stalking in cyberspace.
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 5/8
In old crimes, When lay people hear the words "computer crime", they often think
of obscene pictures available on the Internet, or solicitation of children for
sex by pedophiles via chat rooms on the Internet. The legal problem of
obscenity on the Internet is mostly the same as the legal problem of
obscenity in books and magazines, except for some technical issues of
personal jurisdiction on the Internet. I have discussed obscenity on the
Internet in my May 1997 essay on law & technology and I have nothing
further to say about obscenity in this essay on computer crime.
http://www.rbs2.com/ccrime.htm
Computer Crimes are currently revolving around the country or world but we
doesn’t even know it because maybe there are some who wants to report
something to the authority about it but due to the lack of power that they taught
that even they report it nothing would change and they have been hesitant ever-
since. Because being in s country where everyone has already know more about
the internet life than reality, people nowadays won’t realize that they had
committed crimes already even just browsing their friends profile everyday
when they log-on and by finding out anything that has to do with him. In old
crimes, older people when they thought about crimes, the very first thing that
pop into their heads are obscene pictures that encourage young people into the
adult life like that.
COMPUTER SYSTEM:
1. Software
Software is a generic term for organized collections of computer data and
instructions, often broken into two major categories: system software that provides
the basic non-task-specific functions of the computer, and application software
which is used by users to accomplish specific tasks.
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 6/8
System software is responsible for controlling, integrating, and managing the
individual hardware components of a computer system so that other software and
the users of the system see it as a functional unit without having to be concerned
with the low-level details such as transferring data from memory to disk, or
rendering text onto a display.
Application software, on the other hand, is used to accomplish specific tasks other
than just running the computer system. Application software may consist of a single
program, such as an image viewer; a small collection of programs (often called a
software package) that work closely together to accomplish a task, such as a
spreadsheet or text processing system; a larger collection (often called a software
suite) of related but independent programs and packages that have a common userinterface or shared data format, such as Microsoft Office.
http://www.openprojects.org/software-definition.htm
Software is responsible for all the things we see and work on the monitor or screen, from
computer applications to creating a document, viewing small programs of huge programs.
It is the collection of the things we see starting on the desktop on the monitor.
2. Hardware
Computer system hardware includes the CPU and its associated input and output
devices. Input and output devices, separate from the CPU itself, are called
peripheral equipment. The CPU communicates with each peripheral device through
input and output channels. To operate an electronic-imaging workstation, you
must have a general understanding of CPU primary and secondary storage,
peripheral devices, input and output channels, and modems.
http://www.tpub.com/content/photography/14208/css/14208_79.htm
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 7/8
Hardware is responsible for the devices we use to manipulate when we use the computer
especially the CPU. All devices is connected to the CPU through their input and output
outlets. The CPU will be the “head” of all hardware devices.
3. Peopleware
The term "peopleware" represents the personnel involved in systems analysis,
programming, computer operations, system maintenance, and the like. Systems
analysis and design are the jobs of the system analyst. Program development is the
specialty of the programmer. System development is carried out by a computer
operations, input data preparation staff, and output preparation clerks. Output
preparation involves collating, bursting, and binding the reports before they are
delivered to the user. Commonly, Analysts do some programming in addition to
analysis.
http://computer-concepts-tutorial.blogspot.com/2008/02/peopleware.html
Peopleware is responsible for people who has abilities and who are specialized in
computers like programmers, operators and analysts. These people are the one whom
someone can come to in case of problems and difficulties in a certain device / computer.
4. Dataware
A database designed to support decision making in an organization. Data from the
production databases are copied to the data warehouse so that queries can be
performed without disturbing the performance or the stability of the production
systems.
Operational Data Stores - The data warehouse is structured to support a variety of
analyses, including elaborate queries on large amounts of data that can require
extensive searching. When databases are set up for queries on daily transactions,
8/6/2019 Wordproc Homework.
http://slidepdf.com/reader/full/wordproc-homework 8/8
they are often called "operational data stores" rather than data warehouses (see
ODS). See OLAP, DSS, EIS and BI software.
Dataware is responsible for the large amount of data to be collected from the warehouse
wherein while it is collecting it doesn’t disturb the performance of the systems. It
supports various analyses and it can require more time for searching or collecting on data
depending on the amount.
5. Communication / Networking
Communication networks and computer systems research is entering a new phase inwhich many of the established models and techniques of the last twenty years are
being challenged. The research community is continuing to free itself from past
intellectual constraints so that it may fully exploit the convergence of computing and
communications. Evaluating the performance of emerging communications and
computer systems constitutes a huge challenge. Thus, current research provides a
set of heterogeneous tools and techniques embracing the uncertainties of time and
space varying environments when the requests for diverse services are made in real
time, and with very different quality of service expectations.
http://www.worldscibooks.com/engineering/p451.html
Communication / Networking is responsible for linking together the computer of having
connection with each other. The communication on computers requires diverse services
for the service and for it to work.