wordproc homework

8
Assignment # 1 An Introduction to Information Technology Information Technology Issues and Opportunities Computer System Aila Arielle S. Tolosa 11156678 May 25, 2011

Upload: riellest

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 1/8

Page 2: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 2/8

Page 3: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 3/8

information technology will produce benefits for many and costs for others. Ethical

issues in information systems have been given new urgency by the rise of the

Internet and electronic commerce. Internet and digital firm technologies make it

easier than ever to assemble, integrate, and distribute information, unleashing new

concerns about the appropriate use of customer information, the protection of 

personal privacy, and the protection of intellectual property. Insiders with special

knowledge can “fool” information systems by submitting phony records, and

diverting cash, on a scale unimaginable in the pre-computer era.

http://www.prenhall.com/behindthebook/0132304619/pdf/laudon%20MIS10_CH-

04%20FINAL.pdf  

Ethics is referred as the principles of right and wrong that individuals, acting as free

moral agents, use to make choices to guide their behaviors. In Technology, not every

gadget or new thing invented can achieve our necessary needs and satisfaction in life but

these things can also lead us to harm or others to harm us for they want these certain new

things from us. Not all new and modernize things can make life satisfying because there

are really things that have these limitations and capabilities to this and that so not

everything is safe especially now that everything is high-tech. So Information

Technology as we all know helps us to improve the certain liabilities or disadvantages of 

the newly equip materials by producing again something like protection on privacy and

the protection of intellectual property.

C. Intellectual Property Law

As a type of property, Intellectual Property (IP) refers to the intangible. In contrast

to real property and personal property, it refers to what the minds of men and

women have created, usually expressed or translated into a tangible form that is

assigned certain rights of property.

Intellectual property laws include patent, copyright, trademark, and trade secret

laws, which typically protect IP rights. Patents, copyrights, and trademarks are

Page 4: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 4/8

creations of statute, where the government recognizes and enforces the public

expression of an original idea for a limited period of time. Trade secrets, established

by common law, can protect IP through contractual and tort remedies. Copyright

laws generally protect creative and artistic works such as books, movies, music,

paintings, photographs, and software. Patents, trademarks and trade secret laws are

used more often to protect industrial properties, as they are generally created and

used for industrial or commercial purposes. 

http://www.hg.org/intell.html

Intellectual Property helps a person to be mindful of what they created. Intellectual

Property includes musical, literary, and artistic works; inventions; software, symbols and

many others that are used in different works.

D. Computer Crimes and Threats

There are no precise, reliable statistics on the amount of computer crime and the

economic loss to victims, partly because many of these crimes are apparently not

detected by victims, many of these crimes are never reported to authorities, and

partly because the losses are often difficult to calculate.

There are three major classes of criminal activity with computers:

1. unauthorized use of a computer, which might involve stealing a username

and password, or might involve accessing the victim's computer via the

Internet through a backdoor operated by a Trojan Horse program.

2. creating or releasing a malicious computer program

3. harassment and stalking in cyberspace.

Page 5: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 5/8

In old crimes, When lay people hear the words "computer crime", they often think 

of obscene pictures available on the Internet, or solicitation of children for

sex by pedophiles via chat rooms on the Internet. The legal problem of 

obscenity on the Internet is mostly the same as the legal problem of 

obscenity in books and magazines, except for some technical issues of 

personal jurisdiction on the Internet. I have discussed obscenity on the

Internet in my May 1997 essay on law & technology and I have nothing

further to say about obscenity in this essay on computer crime.

http://www.rbs2.com/ccrime.htm

Computer Crimes are currently revolving around the country or world but we

doesn’t even know it because maybe there are some who wants to report

something to the authority about it but due to the lack of power that they taught

that even they report it nothing would change and they have been hesitant ever-

since. Because being in s country where everyone has already know more about

the internet life than reality, people nowadays won’t realize that they had

committed crimes already even just browsing their friends profile everyday

when they log-on and by finding out anything that has to do with him. In old

crimes, older people when they thought about crimes, the very first thing that

 pop into their heads are obscene pictures that encourage young people into the

adult life like that.

COMPUTER SYSTEM:

1. Software

Software is a generic term for organized collections of computer data and

instructions, often broken into two major categories: system software that provides

the basic non-task-specific functions of the computer, and application software

which is used by users to accomplish specific tasks.

Page 6: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 6/8

System software is responsible for controlling, integrating, and managing the

individual hardware components of a computer system so that other software and

the users of the system see it as a functional unit without having to be concerned

with the low-level details such as transferring data from memory to disk, or

rendering text onto a display. 

Application software, on the other hand, is used to accomplish specific tasks other

than just running the computer system. Application software may consist of a single

program, such as an image viewer; a small collection of programs (often called a

software package) that work closely together to accomplish a task, such as a

spreadsheet or text processing system; a larger collection (often called a software

suite) of related but independent programs and packages that have a common userinterface or shared data format, such as Microsoft Office. 

http://www.openprojects.org/software-definition.htm

Software is responsible for all the things we see and work on the monitor or screen, from

computer applications to creating a document, viewing small programs of huge programs.

It is the collection of the things we see starting on the desktop on the monitor.

2. Hardware

Computer system hardware includes the CPU and its associated input and output

devices. Input and output devices, separate from the CPU itself, are called

peripheral equipment. The CPU communicates with each peripheral device through

input and output channels. To operate an electronic-imaging workstation, you

must have a general understanding of CPU primary and secondary storage,

peripheral devices, input and output channels, and modems.

http://www.tpub.com/content/photography/14208/css/14208_79.htm

Page 7: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 7/8

Hardware is responsible for the devices we use to manipulate when we use the computer 

especially the CPU. All devices is connected to the CPU through their input and output

outlets. The CPU will be the “head” of all hardware devices.

3. Peopleware

The term "peopleware" represents the personnel involved in systems analysis,

programming, computer operations, system maintenance, and the like. Systems

analysis and design are the jobs of the system analyst. Program development is the

specialty of the programmer. System development is carried out by a computer

operations, input data preparation staff, and output preparation clerks. Output

preparation involves collating, bursting, and binding the reports before they are

delivered to the user. Commonly, Analysts do some programming in addition to

analysis.

http://computer-concepts-tutorial.blogspot.com/2008/02/peopleware.html 

Peopleware is responsible for people who has abilities and who are specialized in

computers like programmers, operators and analysts. These people are the one whom

someone can come to in case of problems and difficulties in a certain device / computer.

4. Dataware

A database designed to support decision making in an organization. Data from the

production databases are copied to the data warehouse so that queries can be

performed without disturbing the performance or the stability of the production

systems.

Operational Data Stores - The data warehouse is structured to support a variety of 

analyses, including elaborate queries on large amounts of data that can require

extensive searching. When databases are set up for queries on daily transactions,

Page 8: Wordproc Homework

8/6/2019 Wordproc Homework.

http://slidepdf.com/reader/full/wordproc-homework 8/8

they are often called "operational data stores" rather than data warehouses (see

ODS). See OLAP, DSS, EIS and BI software.

Dataware is responsible for the large amount of data to be collected from the warehouse

wherein while it is collecting it doesn’t disturb the performance of the systems. It

supports various analyses and it can require more time for searching or collecting on data

depending on the amount.

5. Communication / Networking

Communication networks and computer systems research is entering a new phase inwhich many of the established models and techniques of the last twenty years are

being challenged. The research community is continuing to free itself from past

intellectual constraints so that it may fully exploit the convergence of computing and

communications. Evaluating the performance of emerging communications and

computer systems constitutes a huge challenge. Thus, current research provides a

set of heterogeneous tools and techniques embracing the uncertainties of time and

space varying environments when the requests for diverse services are made in real

time, and with very different quality of service expectations.

http://www.worldscibooks.com/engineering/p451.html 

Communication / Networking is responsible for linking together the computer of having

connection with each other. The communication on computers requires diverse services

for the service and for it to work.