Information Systems/Collection
Information Systems
editLearning Guide
editThis learning guide supports the Wikiversity course Information Systems, available at https://en.wikiversity.org/wiki/Information_Systems.
Overview
editInformation Systems/Collection/Sidebar
Information Systems is an introductory computer systems and applications course that includes hardware, peripherals, operating systems, applications, networking, Internet, security, information systems, system development, programming, databases, and social issues.
This course comprises 13 lessons on information systems and computer applications. Each lesson includes a combination of Wikipedia readings, YouTube videos, and hands-on learning activities. The course also assists learners in preparing for the CLEP Information Systems exam.
Preparation
editThis is an introductory college-level information systems course. Learners should already have basic computer skills.
Lessons
editSee Also
editBibliography
edit- CLEP: Information Systems
- CLEP Information Systems 2015 Examination Guide
- Beekman George, et al. (2012). Digital Planet: Tomorrow's Technology and You, Complete, 10th Edition. Pearson. ISBN 9780132091534
- Bourgeois, David T. (2014). Information Systems for Business and Beyond. Saylor.org
- Morley, Deborah, and Parker, Charles S. (2013). Understanding Computers: Today and Tomorrow, Comprehensive, 14th Edition. Cengage. ISBN 9781133190240
- Wikibooks: Introduction to Computer Information Systems
Lesson 1 - Introduction
editThis lesson introduces computers applications, computer networking, information systems, and computer impacts on society.
Objectives and Skills
editObjectives and skills for the CLEP Information Systems exam are covered in other lessons. This lesson helps you:
- Identify resources that may be used to study information systems
- Understand basic computer and application concepts
- Describe the sphere of influence of computers in our personal and work environment
Readings
edit- Wikibooks: Introduction to Computer Information Systems/What is a Computer?
- Wikibooks: Introduction to Computer Information Systems/Computers in Your Life
- Wikibooks: Introduction to Computer Information Systems/Computers to Fit Every Need
- Wikibooks: Introduction to Computer Information Systems/Computer Networks and the Internet
- Wikibooks: Introduction to Computer Information Systems/Computers and Society
Multimedia
edit- YouTube: What is a computer?
- YouTube: The History of Computers
- YouTube: Claude Shannon - Father of the Information Age
- YouTube: Moore's Law
- YouTube: The World Wide Web in Plain English
- YouTube: How to Follow Proper Netiquette Rules
- YouTube: Internet of Things Explained Simply
- YouTube: What is a Smartphone
- YouTube: What is a tablet?
- YouTube: What is an Information System?
Activities
edit- Review Wikipedia: Moore's law. In 2005, Gordon Moore stated that this projection cannot be sustained indefinitely. Research current projections for the technical limits of Moore's law and any potential alternatives to sustain this growth in processing performance.
- Review After Moore's Law- The Future of Computing [7] to learn about future of computing- possible end of Moore’s law which will be disguised by the shift to cloud computing.
- Search the Internet for the top business computer vendors by market share. For one of the top three vendors, compare prices and capabilities for their tablets, laptops, desktops, workstations, servers, and thin clients. Consider how each of these devices might be a cost-effective solution in your school or business.
- Review Wikipedia: Internet of Things. Consider your own home, school, or work environment. Which devices in this environment would be more useful if they were connected to the network? Are there any associated security risks in connecting these devices? Would there be any privacy concerns if others were able to monitor your use of these devices?
- Review related online study materials using a textbook website such as Digital Planet: Exploring Our Digital Planet.
- Review Bureau of Labor Statistics: Computer and Information Technology Occupations to learn about information systems careers. Select one or more of the listed occupations and identify median pay, education requirements, and job outlook for that occupation.
- Review CLEP: Information Systems to learn about this exam and consider whether completing this exam would be beneficial for you. Practice using the sample questions and find out about the study resources available for this exam, including this Wikiversity learning project
- Review http://www.blurb.com/blog/how-to-choose-the-right-ebook/ to learn how to choose the right eBook or Tablet for you. In today's technologically savvy world, choosing the right handheld device that will fit your every day needs is not only essential, but required for work and educational purposes. Before spending what seems like a good chunk of change for an ebook or tablet, make sure you've chosen the right one for you.
Research and Discussion
edit- Identify computers and information systems in your work and personal environments. How many different computer systems do you interact with on a daily basis?
- Research and compare different information systems. How do information systems and sources influence our personal and work environments? Is there an information system that could benefit you to increase your productivity?
- How are information technologies changing the way we interact with others in the workplace and in our personal lives? Describe the advantages and disadvantages.
- Describe digital tools that make you more productive at work or home. Identify digital tools that make you less productive.
Lesson Summary
edit- Computers and mobile devices have become an almost every-day use for individuals of every age. Having one at home or in the business environment will allow you to access the Internet, and be more knowledgeable, more efficient, and more productive.
- Portable computers are compact and fully functioning versions of a regular desktop computer that are designed to be mobile. They allow freedom to move around while still being productive. Their mobility alongside their ability to operate similar to a desktop make them powerful tools for businessmen, students, and common individuals alike.[1]
- Mainframe computers are much larger computers that consolidate the needs of large organizations like universities, hospitals, banks, government offices, etc.[2]
- Data is essentially the raw (unorganized) facts that are usually typed into a computer.[3]
- Information is the output. The computer processes the data and spits out the information.[4]
- The term hardware refers to the components used to build a computer. Breaking down the components into categories, you will find five main groups: input, output, memory, CPU, and communications hardware.[5]
- Communications hardware is important when it comes to letting computer users access information from the Internet, put information onto the Internet, or interact with other computer users on a network.[6]
- Most personal computers are made up of a central processing unit, control circuitry on an integrated circuit, and various input/output devices.[7]
- A URL uniquely identifies a specific Web page. The URL is composed of a communication protocol, (typically HTTP or HTTPS,) a domain name, and a page.[8]
- Domain names are like fingerprints; two of the same cannot exist.[9]
- Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by processing keywords that are typed into the search bar and display a large list of webpages matching the keywords.[10]
- Netiquette describes the do's and don'ts of online communicating. Basic courtesy and common sense are generally the rule of the day when communicating, whether it is face-to-face or through the Internet.[11]
- Integrity is the quality of being honest and having strong moral principles; moral uprightness. It is generally a personal choice to uphold oneself to consistent moral and ethical standards.[12]
- Advantages of computer use include improved efficiency, quality, communication, and collective knowledge.[13]
- Disadvantages of computer use include excessive use, security and privacy concerns.[14]
- Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor.[15]
- The term "app" is a shortening of the term "application software".[16]
- Native mobile apps often stand in contrast to software applications that run on desktop computers, and with web applications which run in mobile web browsers rather than directly on the mobile device.[17]
- Apps that are not pre installed are usually available through distribution platforms called app stores. They began appearing in 2008 and are typically operated by the owner of the mobile operating system, such as the Apple App Store, Google Play, Windows Phone Store, and BlackBerry App World.[18]
- Computers at home are no longer limited to just desktops and laptops. Now many home appliances, such as thermostats, home entertainment systems and home security systems are controlled by computer resulting it what is called a smart home.[19]
- Portable computers are not just laptops, they also include, but are not limited to, smart phones, smart watches and tablets.[20]
- Children as young as kindergarten are using computers at school. This helps develop fundamental skills needed later in life.[21]
- Tablets provide an instantaneous connection between parents, students, and teachers. It may be easy to lose a handwritten note or assignment, but as the tablet goes back and forth between home and school, parents can monitor their student’s assignments, teachers can notify parents, and all around connections can be sustained.
Key Terms
edit- application software
- A set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities.[22]
- cell phone
- See smartphone
- computer programming
- The process of developing and implementing various sets of instructions to enable a computer to do a certain task.[23]
- data (raw data)
- A collection of numbers or characters used as input to a system.[24]
- data processing
- The collection and manipulation of items of data (input) to produce meaningful information (output).[25]
- desktop computer
- A personal computer in a form intended for regular use at a single location due to its size and power requirements.[26]
- digital divide
- An economic and social inequality with regard to access to, use of, or impact of information and communication technologies.[27]
- electronic mail (email or e-mail)
- A method of exchanging digital messages from an author to one or more recipients.[28]
- embedded system
- A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.[29]
- hardware
- Physical parts or components of a computer. It includes all the parts inside a computer and is tangible.[30]
- industrial age
- A period characterized by an economy organized for the purpose of manufacturing.[31]
- Industrial Revolution
- The transition to new manufacturing processes that included going from hand production methods to factories and machines.[32]
- information age
- A period characterized by an economy based on computerization.[33]
- information
- Output from a system that gives the answer to a question of some kind.[34]
- information system (IS)
- A set of components for collecting, creating, storing, processing and distributing information.[35]
- integrated circuit (aka Silicon Chip)
- A set of electronic circuits on a small plate or "chip" of semiconductor material, normally silicon.[36]
- Internet
- A global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.[37]
- laptop computer
- A portable personal computer with a clamshell form factor, suitable for mobile use.[38]
- mainframe computer
- Computers used primarily by large organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning and transaction processing.[39]
- microprocessor
- A computer processor that incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC), or at most a few integrated circuits.[40]
- mobile app
- A computer program designed to run on mobile devices such as smartphones and tablet computers.[41]
- Moore's Law
- The observation that the number of transistors in a dense integrated circuit has doubled approximately every two years.[42]
- netbook
- A generic name given to a category of small, lightweight, legacy-free, and inexpensive computers.[43]
- netiquette (Internet or network etiquette)
- A set of social conventions that facilitate interaction over networks.[44]
- network
- A telecommunications network which allows computers to exchange data.[45]
- notebook computer
- A generic name given to a category of small, lightweight, legacy-free, and inexpensive computers that were introduced in 2007.[46]
- operating systems (OS)
- Collection of software that directs a computer's execution of other programs, manages storage, input/output, and communication resources.[47]
- paradigm shift
- A fundamental change in the basic concepts and experimental practices of a scientific discipline.[48]
- peripheral
- An auxiliary device that connects to and works with the computer in some way.[49]
- personal computer
- A general-purpose computer whose size, capabilities and original sale price make it useful for individuals, and is intended to be operated directly by an end-user operated by a microprocessor.[50]
- server
- A computer that provides other network-connected computers with access to data and programs.[51]
- Silicon Valley
- A nickname for the southern portion of the San Francisco Bay Area, which is home to many of the world's largest high-tech corporations, as well as thousands of tech startup companies.[52]
- smart phone
- A mobile phone with an advanced operating system which combines features of a personal computer operating system with other features useful for mobile or handheld use.[53]
- supercomputer
- A computer with a high-level computational capacity used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling and physical simulations.[54]
- system software
- Computer software designed to provide services to other software such as operating systems.[55]
- tablet computer
- A type of portable PC that de-emphasizes the use of traditional input devices (such as a mouse or keyboard) by using a touchscreen display, which can be controlled using either a stylus pen or finger.[56]
- terminal
- An electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer or a computing system.[57]
- thin client
- A computer or computer program that depends heavily on another computer to fulfill its computational roles.[58]
- timesharing
- The sharing of a computing resource among many users by means of multiprogramming and multi-tasking.[59]
- transistor
- A semiconductor device used to amplify and switch electronic signals and electrical power. It is the fundamental building block of modern electronic devices.[60]
- web browser
- A software application for retrieving, presenting, and traversing information resources on the World Wide Web.[61]
- workstation
- A special computer designed for technical or scientific applications and intended primarily to be used by one person at a time.[62]
- World Wide Web
- An information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.[63]
Review Questions
edit-
Today's world runs on computers. Computers are _____. Having one at home allows you to _____.Today's world runs on computers. Computers are efficient. Having one at home allows you to access the most informative tool known to mankind.
-
Computers are used _____.Computers are used at home, in education, and in work environments.
-
Computer types include _____.Computer types include embedded computers, mobile devices, personal computers, midrange servers, mainframe computers, and supercomputers.
-
An embedded computer is _____.An embedded computer is a mini computer with a specific function within a product that completes detailed tasks or jobs for that product.
-
Portable computers are _____.Portable computers are compact and fully functioning versions of a regular desktop computer that are designed to be mobile. They allow freedom to move around while still being productive. Their mobility alongside their ability to operate similar to a desktop make them powerful tools for businessmen, students, and common individuals alike.
-
Mainframe computers are _____.Mainframe computers are much larger computers that consolidate the needs of large organizations like universities, hospitals, banks, government offices, etc.
-
Data are essentially _____.Data are essentially the raw facts that are usually typed into a computer.
-
Information is _____.Information is the output. The computer calculates the data and spits out the information.
-
The term hardware refers to _____.The term hardware refers to the components used to build a computer. Breaking down the components into categories, you will find five main groups: input, output, memory, CPU, and communications hardware.
-
Communications hardware is important when _____.Communications hardware is important when it comes to letting computer users access information from the Internet, put information onto the Internet, or interact with other computer users on a network.
-
Most personal computers are made up of _____.Most personal computers are made up of a central processing unit, control circuitry on an integrated circuit, and various input/output devices.
-
A URL uniquely identifies _____. The URL is composed of _____.A URL uniquely identifies a specific Web page. The URL is composed of a communication protocol, (typically HTTP or HTTPS,) a domain name, and a page.
-
Domain names are like _____.Domain names are like fingerprints; two of the same cannot exist.
-
Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by _____.Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by processing keywords that are typed into the search bar and display a large list of webpages matching the keywords.
-
When communicating online, it is important to remember _____, and to follow _____.When communicating online, it is important to remember you are interacting with a human being, and to follow netiquette guidelines.
-
The integrity factor is important when _____.The integrity factor is important when searching the Internet. Always verify the credibility of the information given.
-
Advantages of computer use include _____.Advantages of computer use include improved efficiency, quality, communication, and collective knowledge.
-
Disadvantages of computer use include _____.Disadvantages of computer use include excessive use, security and privacy concerns.
-
Some examples of home computers, besides desktops and laptops are _____, _____ and _____.Computers at home are no longer limited to just desktops and laptops. Now many home appliances, such as thermostats, home entertainment systems and home security systems are controlled by computer resulting it what is called a smart home.
-
Portable computers include _____, _____ and _____.Portable computers are not just laptops, they also include, but are not limited to, smart phones, smart watches and tablets.
-
School age children are using computers to help _____.Children as young as kindergarten are using computers at school. This helps develop fundamental skills needed later in life.
-
A tablet is a _____.A tablet is a small portable computer that accepts input directly onto its screen rather than via a keyboard or mouse.
Assessments
editSee Also
editReferences
edit- ↑ Wikibooks: Introduction to Computer Information Systems/Computers in Your Life
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers to Fit Every Need
- ↑ Wikibooks: Introduction to Computer Information Systems/What is a Computer?
- ↑ Wikibooks: Introduction to Computer Information Systems/What is a Computer?
- ↑ Wikibooks: Introduction to Computer Information Systems/What is a Computer?
- ↑ Wikibooks: Introduction to Computer Information Systems/What is a Computer?
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers to Fit Every Need
- ↑ Wikibooks: Introduction to Computer Information Systems/Computer Networks and the Internet
- ↑ Wikibooks: Introduction to Computer Information Systems/Computer Networks and the Internet
- ↑ Wikibooks: Introduction to Computer Information Systems/Computer Networks and the Internet
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers and Society
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers and Society
- ↑ Wikibooks:Introduction to Computer Information Systems/Computers and Society
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers and Society
- ↑ Wikipedia: Application software
- ↑ Wikipedia: Mobile App
- ↑ Wikipedia: Mobile App
- ↑ Wikipedia: Mobile App
- ↑ Wikibooks:Introduction to Computer Information Systems/Computers in Your Life
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers in Your Life
- ↑ Wikibooks: Introduction to Computer Information Systems/Computers in Your Life
- ↑ Wikipedia: Application software
- ↑ http://www.businessdictionary.com/definition/computer-programming.html
- ↑ Wikipedia: Data
- ↑ Wikipedia: Data processing
- ↑ Wikipedia: Desktop computer
- ↑ Wikipedia: Digital divide
- ↑ Wikipedia: Email
- ↑ Wikipedia:Embedded system
- ↑ http://study.com/academy/lesson/what-is-computer-hardware-components-definition-examples.html
- ↑ Wikipedia: Industrialization
- ↑ Wikipedia: Industrial Revolution
- ↑ Wikipedia: Information Age
- ↑ Wikipedia: Information
- ↑ http://www.dictionary.com/browse/information-system
- ↑ Wikipedia: Integrated Circuit
- ↑ Wikipedia: Internet
- ↑ wikipedia: Laptop
- ↑ Wikipedia: Mainframe computer
- ↑ Wikipedia: Microprocessor
- ↑ Wikipedia: Mobile app
- ↑ Wikipedia: Moore's Law
- ↑ Wikipedia: Netbook
- ↑ Wikipedia: Etiquette in technology
- ↑ Wikipedia: Computer_network
- ↑ Wikipedia: Laptop
- ↑ http://www.dictionary.com/browse/operating-system?s=t
- ↑ Wikipedia: Paradigm shift
- ↑ Wikipedia: Peripheral
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Server (computing)
- ↑ Wikipedia: Silicon Valley
- ↑ Wikipedia: Smartphone
- ↑ Wikipedia: Supercomputer
- ↑ Wikipedia: System software
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Computer terminal
- ↑ Wikipedia: Thin client
- ↑ Wikipedia: Time-sharing
- ↑ Wikipedia: Transistor
- ↑ Wikipedia: Web browser
- ↑ Wikipedia: Workstation
- ↑ Wikipedia: World Wide Web
Lesson 2 - Hardware
editHardware refers to the physical parts or components of a computer. System hardware includes components such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc.[1] This lesson covers internal system components. Peripherals, such as keyboards, displays, pointing devices, and printers, are covered in the next lesson.
Objectives and Skills
editObjectives and skills for the hardware portion of CLEP Information Systems include:[2]
- Concepts of computer architectures (mainframe, client/server, operating systems)
- Devices (processing, storage, input and output, telecommunications, networking)
- Functions (computer, telecommunications, network hardware)
Readings
editMultimedia
edit- YouTube: Basic breakdown to build your own machine!
- HowStuffWorks: Computer hardware pictures.
- YouTube: Tour of the parts inside a computer.
- YouTube: Computer basics - Hardware.
- YouTube: Intro to binary numbers.
- YouTube: Inside your computer.
- YouTube: How a CPU works.
- YouTube: Binary numbers.
- YouTube: Conversion of decimal number to Binary/Hexadecimal/Octal number and vice versa using a calculator.
- YouTube: What kind of computer should I get?
- YouTube: How to swap hard drives.
- YouTube: Input, Processing, Output & Feedback - Information system components.
- YouTube: How to build a PC.
- YouTube: Air vs Liquid cooling.
- YouTube: How to upgrade your PC with a new graphics card.
- YouTube: How does RAM Work?
- YouTube: Hardware Basics
Activities
edit- Use Quia: Computer Basics to play an interactive game where you match key computer hardware terms with definitions.
- Review edc.org: Identify Computer Components. Identify computer components in your system.
- Run the System Information or List Hardware utility for your operating system:
- Windows: Review Microsoft: What is System Information?. Run System Information on Windows and observe the System Summary, Hardware Resources, Components, and Software Environment available on the system.
- macOS: Review Apple: macOS: About System Information. Run System Information on macOS and observe the hardware available on the system.
- Linux: Review LinOxide: 6 Examples to get Linux Hardware Information. Run
lshw
ordmidecode
from the command line interface to identify the system's hardware components.
- Create an inventory list of all internal hardware components in your system. Using your preferred hardware vendor, check the hardware specifications for a new system. How recent is your hardware? Is the same technology still in use on current systems?
- Review the Consumer Reports "Computer Buying Guide". Visit your favorite computer retailer's website and go "shopping" for a new computer or familiarize yourself with the hardware of a computer at PCPartPicker and build your own system.
- To understand how a CPU works, review MathsIsFun: Binary, Decimal and Hexadecimal Numbers and MathsIsFun: Binary to Decimal to Hexadecimal Converter. Experiment with converting decimal values to hexadecimal and binary, and then back to decimal again. Then use your operating system's calculator and change the view to programmer mode. Perform simple math calculations in binary and hexadecimal. Convert the values to decimal to check your work.
Research and Discussion
edit- Research computer hardware market share. Which companies are the top three vendors for business computers, personal computers, laptops, tablets, and smartphones? Are hardware companies successful in all markets, or do they specialize and target specific opportunities?
- Research the average lifespan of computer hardware. Compare performance and costs for current high-end, middle-of-the-pack, and entry-level systems. Which systems provide the best return on investment when considering performance and expected lifespan?
- Moore's law theory has suggested that the speed of computer processors would double every two years. How do you predict the future of computer processors?
- After you created an inventory list of the internal hardware components in your system, what components would you upgrade on your computer? Research, identify and support your reasons for upgrading these different hardware components.
Lesson Summary
edit- System hardware is a general term for various physical components of a computer system. It includes all the parts inside the computer case such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc. Computer hardware is what you can physically touch.[1]
- The central processing unit, or CPU, is that part of a computer which executes software program instructions.[3]
- The power supply unit, or PSU, converts general purpose electric current from the mains to direct current for the other components of the computer. Appropriate PSU capacity is dependent on power required to run system hardware [4]
- A PC's main memory is a fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data. PCs use semiconductor random access memory (RAM) of various kinds such as DRAM, SDRAM or SRAM as their main memory.[5]
- Mass storage devices such as hard drives store programs and data even when the power is off; they do require power to perform read and write functions during usage.[6]
- Optical drives, including CD, DVD, and Blu-ray Disc, are data storage devices using rapidly rotating discs coated with reflective material and read using a laser diode.[7][8]
- Hard disk drives (HDD) are data storage devices used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.[9]
- Solid state drives (SSD) are data storage devices using integrated circuit assemblies as memory to store data persistently.[10]
- Video cards—otherwise called graphics cards, graphics adapters or video adapters—process the graphics output from the motherboard and transmit it to the display. Dedicated video cards are components that are entirely separate from the CPU, while integrated graphics are graphics processes that are handled within the CPU[11]
- A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, and by similar terms) is a computer hardware component that connects a computer to a computer network.[12]
- The motherboard, also referred to as system board or main board, is the primary circuit board within a personal computer, and other major system components plug directly onto or cable into the motherboard.[13]
- Computer architecture consists of different computer designs used for specific tasks, including, but not limited to: smartphones, tablets, laptops, desktop computers, super computers, and mainframe computers.[14]
- The Unified Extensible Firmware Interface (UEFI) is the latest successor to the Basic Input/Output System (BIOS) to build on and address any technical shortcomings.[15]
- The cooling systems help dissipate the heat generated by the hardware to provide optimal operating temperatures and therefore performance.[16]
Key Terms
edit- architecture
- A set of rules and methods that describe the functionality, organization and implementation of computer systems.[17]
- ASCII (American Standard Code for Information Interchange)
- An eight-bit character encoding scheme used on personal computing devices.[18]
- backward compatible
- Products designed for a new standard that can also receive, read, view or play older standards or formats.[19]
- bay
- A standard-sized area for adding hardware to a computer.[20]
- binary
- A system of representing letters, numbers or other characters using the digits 0 and 1.[21]
- bit
- The basic unit of information in computing and digital communications which can have only one of two values, most commonly represented as either a 0 or 1.[22]
- bus
- A communication system that transfers data between components inside a computer, or between computers.[23]
- byte
- A unit of digital information in computing and telecommunications that consists of eight bits, permitting the values 0 through 255 and used to encode a single character of text.[24]
- cache
- A component that stores data so future requests for that data can be served faster.[25]
- cluster
- A set of loosely or tightly connected computers that work together so that, in many respects, they may be viewed as a single system.[26]
- cooling system
- A passive or active system in a computer that helps regulate and dissipate the heat generated to maintain optimal temperature and thereby performance.[27]
- computer
- A general-purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically.[28]
- CPU (Central Processing Unit)
- The electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.[29]
- data
- A set of values of qualitative or quantitative variables identified as individual pieces of information.[30]
- digital
- Data that is represented using discrete (discontinuous) values.[31]
- EB (Exabyte)
- A unit of digital information equal to 1018 (1 quintillion) bytes.[32]
- EBCDIC (Extended Binary Coded Decimal Interchange Code)
- An 8-bit character encoding scheme used mainly on IBM mainframe and IBM midrange computer operating systems.[33]
- expansion card
- A printed circuit board that can be inserted into an electrical connector, or expansion slot on a computer motherboard, backplane or riser card to add functionality to a computer system.[34]
- file
- A resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[35]
- FireWire
- An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.[36]
- firmware
- The combination of a hardware device, e.g. an integrated circuit, and computer instructions and data that reside as read-only software on that device.[37]
- GB (Gigabyte)
- A unit of digital information equal to 109 (1 billion) bytes.[38]
- GHz (Gigahertz)
- A unit of frequency defined as 109 (1 billion) cycles per second.[39]
- GPU (Graphics Processor Unit)
- A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display.[40]
- hardware
- The collection of physical elements that constitutes a computer system.[41]
- heat sink
- A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium, often air or a liquid coolant, where it is dissipated away from the device, thereby allowing regulation of the device's temperature at optimal levels.[42]
- Hertz (Hz)
- A unit of frequency defined as one cycle per second.[43]
- information
- That which may be derived from data and knowledge.[44]
- input
- Signals or data received by a computing system.[45]
- KB (Kilobyte)
- A unit of digital information equal to 103 (1 thousand) bytes.[46]
- MB (Megabyte)
- A unit of digital information equal to 106 (1 million) bytes.[47]
- memory
- Primary storage devices used to store information for immediate use in a computer.[48]
- MHz (Megahertz)
- A unit of frequency defined as 106 (1 million) cycles per second.[49]
- microprocessor
- A multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output[50]
- motherboard
- The main printed circuit board (PCB) found in computers and other expandable systems.[51]
- multicore processor
- A single computing component with two or more independent processing units.[52]
- multiprocessing
- The use of two or more central processing units (CPUs) within a single computer system.[53]
- multitasking
- A concept of performing multiple processes by executing them concurrently.[54]
- nanotechnology
- The manipulation of matter on an atomic, molecular, and supramolecular scale.[55]
- optical computer
- A computing device that uses photons rather than electrons for computation.[56]
- output
- Signals or data sent from a computing system.[57]
- parallel processing
- The simultaneous use of more than one CPU or processor core to execute a program or multiple computational threads.[58]
- PB (Petabyte)
- A unit of digital information equal to 1015 (1 quadrillion) bytes.[59]
- PC Card
- A parallel communication peripheral interface designed for laptop computers in 1990.[60]
- port
- An interface between the computer and other computers or peripheral devices.[61]
- power supply unit (PSU)
- Converts main AC to low-voltage regulated DC power for the internal components of a computer.[62]
- quantum computer
- A computing device that uses subatomic particles rather than electrons for computation.[63]
- RAM (Random-Access Memory)
- Volatile data storage directly accessible by the processor.[64]
- ROM (Read-Only Memory)
- A class of non-volatile computer data storage which cannot be modified.[65]
- secondary storage (auxiliary memory)
- Non-volatile data storage not directly accessible by the processor.[66]
- sound card
- an internal expansion card that provides input and output of audio signals to and from a computer under program controls.[67]
- TB (Terabyte)
- A unit of digital information equal to 1012 (1 trillion) bytes.[68]
- Unicode
- An encoding scheme that uses 8, 16, or 32 bits to represent text expressed in most of the world's writing systems.[69]
- video card (display card, graphics card, display adapter, or graphics adapter)
- An expansion card which generates a feed of output images to a display (such as a computer monitor).[70]
Review Questions
edit-
Computer hardware is _____.Computer hardware is a collection of physical elements that make up a computer system.
-
System hardware consists of _____.System hardware consists of the physical parts of a computer such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc.
-
The central processing unit, or CPU, is that part of a computer which _____.The central processing unit, or CPU, is that part of a computer which executes software program instructions.
-
The power supply unit, or PSU, converts _____ to _____.The power supply unit, or PSU, converts general purpose mains Alternating Current to low voltage regulated Direct Current for the internal components of the computer.
-
A PC's main memory is _____, and is used to _____.A PC's main memory is a fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data.
-
Mass storage devices such as _____ store _____.Mass storage devices such as hard drives store programs and data even when the power is off; they do require power to perform read and write functions during usage.
-
Optical drives, including _____, are _____.Optical drives, including CD, DVD, and Blu-ray Disc, are data storage devices using rapidly rotating discs coated with reflective material and read using a laser diode.
-
Hard disk drives (HDD) are _____.Hard disk drives (HDD) are data storage devices used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.
-
Solid state drives (SSD) are _____.Solid state drives (SSD) are data storage devices using integrated circuit assemblies as memory to store data persistently.
-
Video cards—otherwise called _____—process _____ and transmit it to _____.Video cards—otherwise called graphics cards, graphics adapters or video adapters—process the graphics output from the motherboard and transmit it to the display.
-
A network interface controller (NIC, also known as _____) is a _____.A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, and by similar terms) is a computer hardware component that connects a computer to a computer network.
-
The motherboard, also referred to as _____ is the _____.The motherboard, also referred to as the main printed circuit board (PCB), is the primary circuit board within a personal computer. Other major system components plug directly into the motherboard.
-
What role does the Basic Input Output System (BIOS) play in the systems hardware?The BIOS is used to assist in configuring and identifying hardware such as hard drives, CPU, and memory in a computer.
Assessments
edit- Flashcards: Quizlet: Information Systems - Hardware
- Quiz: Quizlet: Information Systems - Hardware
- Flashcards: Quizlet: Basic Computer Concepts
- Quizlet: Hardware Assessment
- Practice Tests: Quizplus: Information Systems
- Flashcards: Quizplus: Basic Computer Principles
See Also
editAdditional Resources
edit- Crucial: How to install an SSD in your desktop
- Gookin, Dan. (2011). Troubleshooting and Maintaining Your PC All-in-One For Dummies. ISBN 9780470878675
- HowStuffWorks.com: What's inside my computer?
- PC World: How to Build a PC
- White, Ron. (2014). How Computers Work: The Evolution of Technology, 10th Edition. ISBN 9780789749840
References
edit- ↑ 1.0 1.1 Wikipedia: Computer hardware
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Optical disc
- ↑ Wikipedia: Hard disk drive
- ↑ Wikipedia: Solid-state drive
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Personal computer
- ↑ Wikipedia: Computer architecture
- ↑ Wikipedia: Unified_Extensible_Firmware_Interface
- ↑ Computer cooling system
- ↑ Wikipedia: Computer architecture
- ↑ Wikipedia: ASCII
- ↑ Wikipedia: Backward compatibility
- ↑ Wikipedia: Drive bay
- ↑ Wikipedia: Computer hardware
- ↑ Wikipedia: Bit
- ↑ Wikipedia: Bus(computing)
- ↑ Wikipedia: Byte
- ↑ Wikipedia: Cache (computing)
- ↑ Wikipedia: Computer cluster
- ↑ Computer cooling system
- ↑ Wikipedia: Computer
- ↑ Wikipedia: Central processing unit
- ↑ Wikipedia: Data
- ↑ Wikipedia: Digital
- ↑ Wikipedia: Exabyte
- ↑ Wikipedia: EBCDIC
- ↑ Wikipedia: Expansion card
- ↑ Wikipedia: Computer file
- ↑ Wikipedia: Firewire
- ↑ Wikipedia:Firmware
- ↑ Wikipedia: Gigabyte
- ↑ Wikipedia: Hertz
- ↑ Wikipedia: Graphics processing unit
- ↑ Wikipedia: Computer hardware
- ↑ Wikipedia: Heat Sink
- ↑ Wikipedia: Hertz
- ↑ Wikipedia: Information
- ↑ Wikipedia: Input/output
- ↑ Wikipedia: Kilobyte
- ↑ Wikipedia: Megabyte
- ↑ Wikipedia: Computer memory
- ↑ Wikipedia: Hertz
- ↑ Wikipedia: Microprocessor
- ↑ Wikipedia: Motherboard
- ↑ Wikipedia:Multi-core processor
- ↑ Wikipedia:Multiprocessing
- ↑ Wikipedia: Computer multitasking
- ↑ Wikipedia: Nanotechnology
- ↑ Wikipedia: Optical computing
- ↑ Wikipedia: Input/output
- ↑ Wikipedia: Parallel processing
- ↑ Wikipedia: Petabyte
- ↑ Wikipedia: PC Card
- ↑ Wikipedia: Computer port (hardware)
- ↑ https://en.wikipedia.org/wiki/Power_supply_unit_(computer)
- ↑ Wikipedia: Quantum computing
- ↑ Wikipedia: Random-access memory
- ↑ Wikipedia: Read-only memory
- ↑ Wikipedia: Computer data storage
- ↑ https://en.wikipedia.org/wiki/Sound_card
- ↑ Wikipedia: Terabyte
- ↑ Wikipedia: Unicode
- ↑ Wikipedia: Video card
Lesson 3 - Peripherals
editPeripherals are devices used to put information into or get information out of a computer. Peripheral types include input, output, and storage.[1]
Objectives and Skills
editObjectives and skills for the peripherals portion of CLEP Information Systems include:[2]
- Devices (processing, storage, input and output, telecommunications, networking)
Readings
editMultimedia
edit- YouTube: Understanding the Parts of Your Computer
- YouTube: What is a Peripheral
- YouTube: Input and output devices
- YouTube: Computer Terms: Peripherals
- YouTube: List of computer peripherals
- YouTube: OCR GCSE Computing: Input/output Devices
- YouTube: Explaining USB 3.1
- YouTube: What does Peripheral mean?
- YouTube: Peripheral vs. Hardware
- YouTube: What Are Peripheral Devices of a Computer Definition, Examples & Types
Activities
edit- Practice identifying personal computer hardware and peripherals.
- Create an inventory list of all peripherals available on your system. Include separate categories for input, output, and storage.
- Create an inventory list of all connectors available on your system. Note which peripherals use each connector type.
- Research and identify options not included in your system's current configuration. Are there options you could add that would make you more productive?
- Review Wikipedia: Unicode input. Insert special characters into a text document:
- Windows: Run the Notepad application and use the Character Map utility to select special characters and paste them into Notepad.
- macOS: Run the TextEdit application and insert special characters into the text file.
- Linux: Run the gedit application and use the GNOME Character Map utility to select special characters and paste them into gedit.
- Review Wikipedia: ASCII and Wikipedia: Alt code. On a PC, open Notepad and then use Alt codes to enter the ASCII value for the characters in your first name. Observe how the ASCII values are converted into standard display characters just as if you had typed those characters on the keyboard.
Research and Discussion
edit- Identify common computer peripherals in use in your work and personal environments. What devices are in use? How are they connected (built-in, wired, wireless)? What device or devices could you add to increase productivity?
- Research cloud computing services and cloud storage. Identify ways in which cloud services are replacing or have replaced peripherals in your work and home environments. What cloud services could you add to increase reliability or productivity?
Lesson Summary
editThere are many peripherals that go along with making a computer function as it should. Input devices, such as the mouse and keyboard are peripherals referred to as input because they are some of the many parts used to input, enter or give information, data, and instructions to the computer. Output peripheral devices such as the printer and headphones, help to get information out of the computer. Finally, there are devices with the dual functionality of input/output, such as the external hard drive or USB flash drives. These are able to be used to both send or store and receive or retrieve information to/from your computer.
Peripherals
edit- Peripherals are auxiliary devices used for computer input (keyboards, pointing devices, etc.), output (monitors, printers, etc.), or data storage (hard drives, flash drives, etc.).[3]
- Peripherals are ancillary components used to put information into a computer and as a way to get information out of a computer.[4]
Input
edit- Input devices are different instruments of computer hardware used to provide data to a computer or any other kind of IPS. .[5]
- Devices include mouse, keyboard, joystick, scanning device, touchscreens, etc..[6]
- Input device is any hardware device that sends data to a computer.[7]
Output
edit- Output devices are different instruments of computer hardware used to transfer commands from the user to the computer to store data, follow user commands, and perform computer tasks..[8]
- Devices include headphones, monitors, speakers, wireless devices, touchscreens, etc..[9]
- Output device is any peripheral that receives data from a computer.[10]
- Combined input / output devices are the pieces of hardware used by a human (or other system) to communicate with a computer. .[11]
Data Storage
edit- Data storage devices are used to transfer data from one computer source to the other. You may also use these devices for recording and storing information for future use and retrieval.[12]
- There are two types of storage devices that computers use, primary devices like RAM, and secondary devices like discs. The primary memory or storage is the brain of the computer where data can be stored for fast access. If the computer isn't running, all the data stored will be lost. However, with secondary memory, data is stored on a long term basis on devices like hard disk drive, DVD or CD, Flash drives, memory cards etc.[13]
- External devices, like solid state and hard disk drives, connect to the motherboard through an external USB or other port, providing extra storage space with the convenience of mobility.[14]
- External devices usually have a larger capacity to store enough data since primary devices can't. They also ensure the data stored is backed up and back up sources should be made known to most staff so that when need arises, data can be retrieved by anyone present at that time the data stored is backed up and these back up sources should be made known to most staff and trained on how to access them so that when need arises, data can be retrieved by anyone present at that time.[15]
- Rotating optical storage devices, such as CD and DVD drives, have even longer access times. Other examples of secondary storage technologies includeUSB flash drives floppy disks, magnetic tape, paper tape, punched cards, and RAM disks.[16]
Key Terms
edit- barcode reader
- An electronic device that can read and decode barcodes and send the result to a computer through the device's output port.[17]
- biometric reader
- Measures biological traits such as eyes, fingerprints, voice and face in an attempt to identify someone.[18]
- Blu-Ray (BD-ROM)
- A digital optical disc data storage format designed to supersede the DVD format, with a storage capacity of 25 GB per layer, and dual layer discs (50 GB) being the industry standard for high definition (1080p) feature-length video discs.[19]
- Bluetooth
- A wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).[20]
- CD (Compact Disc)
- A digital optical disc data storage format originally developed to store and play only sound recordings (CD-DA), but was later adapted for storage of data (CD-ROM), with a storage capacity of 737 MB.[21]
- CD-ROM (Compact Disc Read-Only Memory)
- A pre-pressed optical compact disc which contains data and is not writable or erasable.[22]
- CD-RW (Compact Disc-ReWritable)
- A compact disc that can be written, read arbitrarily many times, erased and written again.[23]
- CRT (Cathode Ray Tube)
- A vacuum tube containing one or more electron guns, and a fluorescent screen used to view images.[24]
- digital camera
- A camera that encodes digital images and videos digitally and stores them for later reproduction.[25]
- digitize
- Represent an object, image, sound, document or signal (usually an analog signal) by generating a series of numbers that describe a discrete set of its points or samples.[26]
- display resolution
- The number of distinct pixels in each dimensions that can be displayed on a device.[27]
- dot-matrix printer
- A type of computer printing which uses a print head that moves back and forth, or in an up and down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter.[28]
- DVD
- A digital optical disc storage format with a storage capacity of 4.7 GB for a single-layered, single-sided disc and 8.5 GB for a dual-layered, single-sided disc.[29]
- ergonomic keyboard
- A computer keyboard designed with ergonomic considerations to minimize muscle strain and related problems.[30]
- ergonomics
- The practice of designing products, systems or processes to take proper account of the interaction between them and the people who use them.[31]
- external drive
- A data storage device used for storing and retrieving digital information, connected via USB, eSATA, FireWire, or Thunderbolt.[32]
- fax (short for facsimile)
- The telephonic transmission of scanned printed material.[33]
- fax modem
- Enables a computer to transmit and receive documents as faxes on a telephone line.[34]
- FireWire (IEEE 1394)
- An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.[35]
- flash drive
- A data storage device that includes flash memory, typically with an integrated Universal Serial Bus (USB) interface.[36]
- flatscreen display / flat panel display
- A light, thin display usually based on LCD technologies, and back-lit to make them easier to read in bright environments.[37]
- graphics tablet
- A computer input device that enables a user to hand-draw images, animations and graphics, with a special pen-like stylus, similar to the way a person draws images with a pencil and paper.[38]
- handwriting recognition
- The ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices.[39]
- heads-up display
- Any transparent display that presents data without requiring users to look away from their usual viewpoints.[40]
- hot swap
- The ability to replace computer system components without shutting down the system.[41]
- impact printer
- Uses a print head that either hits the surface of the ink ribbon, pressing the ink ribbon against the paper (similar to the action of a typewriter), or hits the back of the paper, pressing the paper against the ink ribbon.[42]
- ink-jet printer
- A type of computer printer that recreates a digital image by propelling droplets of ink onto paper, plastic, or other substrates.[43]
- joystick
- An input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling.[44]
- keyboard
- A typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.[45]
- laser printer
- An electrostatic digital printing process that passes a laser beam back & forth over an electron-charged, cylindrical drum, to define a deferentially-charged image.[46]
- LCD (liquid-crystal display)
- A flat panel display, electronic visual display, or video display that uses the light modulating properties of liquid crystals. Liquid crystals do not emit light directly.[47]
- line printer
- An impact printer in which one line of text is printed at a time.[48]
- magnetic tape
- A medium for magnetic recording, made of a thin magnetizable coating on a long, narrow strip of plastic film.[49]
- MICR (magnetic ink character recognition)
- A character-recognition technology used mainly by the banking industry to ease the processing and clearance of checks and other documents.[50]
- memory card
- An electronic flash memory data storage device used for storing digital information, commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players and video game consoles.[51]
- microphone
- An acoustic-to-electric transducer or sensor that converts sound in air into an electrical signal.[52]
- MIDI (Musical Instrument Digital Interface)
- A technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.[53]
- modem
- A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.[54]
- monitor
- An electronic visual display device.[55]
- mouse
- A pointing device that detects two-dimensional motion relative to a surface.[56]
- multi-function printer (MFP)
- An office machine which incorporates the functionality of multiple devices in one, including printer, scanner, photocopier, fax, and e-mail.[57]
- multi-touch
- Technology that enables a surface to recognize the presence of more than one or two points of contact with the surface.[58]
- OCR
- The mechanical or electronic conversion of images of typewritten or printed text into machine-encoded text.[59]
- open architecture
- A type of computer architecture or software architecture that is designed to make adding, upgrading and swapping components easy.[60]
- optical disk drive
- A disk drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs.[61]
- optical mark reader
- A device used to capture human-marked data from document forms such as surveys and tests.[62]
- parallel port
- A communication interface based on a 25-pin connector, also known as a printer port or Centronics port.[63]
- pixel
- A physical point in a raster image, or the smallest addressable element in an all points addressable display device; so it is the smallest controllable element of a picture represented on the screen.[64]
- plotter
- A wide format printer for printing vector-based graphics.[65]
- POS terminal (Point of Sale terminal)
- A device which processes customer payments in exchange for goods or after provision of a service.[66]
- printer
- A peripheral which makes a persistent human readable representation of graphics or text on paper or similar physical media.[67]
- RFID
- The use of wireless electromagnetic fields to transfer data, for the purposes of identifying and tracking objects.[68]
- random access
- The ability to access an item of data at any given coordinates in a population of addressable elements.[69]
- repetitive strain injury
- Injury to the musculoskeletal and nervous systems that may be caused by repetitive tasks, forceful exertions, vibrations, mechanical compression, or sustained or awkward positions.[70]
- Retina Display
- A brand name used by Apple for screens that have a higher pixel density than their previous models.[71]
- scanner
- A device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image.[72]
- sensor
- A device whose purpose is to detect events or changes in its environment, and then provide a corresponding output.[73]
- sequential access
- The ability to access a group of data elements in a predetermined, ordered sequence.[74]
- solid-state drive (SSD)
- A device that uses integrated circuit assemblies as memory to store data persistently.[75]
- serial port
- A communication interface through which information transfers in or out one bit at a time and based on a 9-pin connector.[76]
- speaker
- A device which converts an electrical audio signal into a corresponding sound.[77]
- stylus pen
- A computer accessory used to assist in navigating or providing more precision when using a touchscreen.[78]
- tape drive
- A data storage device that reads and writes data on a magnetic tape.[79]
- thermal printer
- A digital printing device which produces a printed image by selectively heating coated thermochromic paper, primarily used for label printing.[80]
- touchscreen
- An input device normally layered on the top of an electronic visual display of an information processing system.[81]
- touchpad
- A pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is outputted to the screen.[82]
- trackball
- A stationary pointing device consisting of a ball held by a socket containing sensors to detect a rotation of the ball about two axes.[83]
- TrackPoint (pointing stick)
- An isometric joystick used as a pointing device and typically mounted in a computer keyboard.[84]
- uninterruptible power supply (UPS)
- An electrical apparatus that provides emergency power to a load when the input power source, typically main power, fails.[85]
- USB
- An industry standard that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices communicating at 12 Mbps, 480 Mbps, 5 Gbps, or 10 Gbps.[86]
- video projector
- A device that receives a video signal and projects the corresponding image on a projection screen using a lens system.[87]
- webcam
- A video camera that feeds or streams its image in real time to or through a computer to a computer network.[88]
- wireless
- The use of radio waves in place of cables allowing peripheral devices to transfer information to and from a computer through a transmitter in the device and a receiver plugged into the computer, usually in the form of a USB dongle.[89]
Review Questions
edit-
Peripherals are _____ used for _____, _____, or _____.Peripherals are auxiliary devices used for computer input (keyboards, pointing devices, etc.), output (monitors, printers, etc.), or data storage (hard drives, flash drives, etc.).
-
Input devices include _____, _____, _____, _____, and _____.Input devices include keyboards, pointing devices, scanners, microphones, and webcams.
-
Output devices include _____, _____, _____, and _____.Output devices include monitors, projectors, printers, and speakers.
-
Combined input / output devices include _____ and _____.Combined input / output devices include fax and touchscreen displays.
-
Data storage devices include _____, _____, _____, _____, _____, and _____.Data storage devices include hard drives, flash drives, optical drives, Network Attached Storage (NAS), media players, and smart phones.
-
External hard drives, including _____ and _____, connect to the motherboard through ____, providing _____.External hard drives, including solid state and hard disk drives, connect to the motherboard through an external USB or other port, providing extra storage space with the convenience of mobility.
Assessments
editSee Also
editAdditional Resources
edit- Doyle, Leo F. (1999). Computer Peripherals, 2nd Edition. ISBN 9780137794638
- Dummies: Connect Peripherals to Your PC
- Computer Hope: What is a Peripheral
References
edit- ↑ Wikipedia: Peripheral
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Peripheral
- ↑ "Peripheral". Wikipedia. 2018-04-27. https://en.wikipedia.org/w/index.php?title=Peripheral&oldid=838528142.
- ↑ Computer Hope: Output Device.
- ↑ Computer Hope: Output Device.
- ↑ Computer Hope: Input Device.
- ↑ Computer Hope: Output Device.
- ↑ Computer Hope: Output Device.
- ↑ Computer Hope: Output Device.
- ↑ Wikipedia: Input/Output.
- ↑ Wikibooks:Introduction to Computer Information Systems/Storage
- ↑ Wikibooks:Introduction to Computer Information Systems/Storage
- ↑ Wikibooks:Introduction to Computer Information Systems/Storage
- ↑ Wikibooks:Introduction to Computer Information Systems/Storage
- ↑ "data storage - Google Search". www.google.com. Retrieved 2019-05-29.
- ↑ Wikipedia: Barcode reader
- ↑ "Fingerprints and Other Biometrics". Federal Bureau of Investigation. Retrieved 2018-05-31.
- ↑ Wikipedia: Blu-ray
- ↑ Wikipedia: Bluetooth
- ↑ Wikipedia: Compact disc
- ↑ Wikipedia: CD-ROM
- ↑ Wikipedia: CD-RW
- ↑ Wikipedia: Cathode ray tube
- ↑ Wikipedia: Digital camera
- ↑ Wikipedia: Digitizing
- ↑ Wikipedia:Display resolution
- ↑ Wikipedia: Dot matrix printing
- ↑ Wikipedia: DVD
- ↑ Wikipedia: Ergonomic keyboard
- ↑ Wikipedia: Human factors and ergonomics
- ↑ Wikipedia: External hard drive
- ↑ Wikipedia: Fax
- ↑ Wikipedia: Fax modem
- ↑ Wikipedia: Firewire
- ↑ Wikipedia: USB flash drive
- ↑ Wikipedia: Flat panel display
- ↑ Wikipedia: Graphics tablet
- ↑ Wikipedia: Handwriting recognition
- ↑ Wikipedia: Head-up display
- ↑ Wikipedia: Hot swapping
- ↑ Wikipedia: Printer (computing)
- ↑ Wikipedia: Inkjet printer
- ↑ Wikipedia: Joystick
- ↑ Wikipedia: Computer keyboard
- ↑ Wikipedia: Laser printer
- ↑ Wikipedia: Liquid-crystal display
- ↑ Wikipedia: Line printer
- ↑ Wikipedia: Magnetic Tape
- ↑ Wikipedia: Magnetic ink character recognition
- ↑ Wikipedia: Memory card
- ↑ Wikipedia: Microphone
- ↑ Wikipedia: MIDI
- ↑ Wikipedia: Modem
- ↑ Wikipedia: Computer monitor
- ↑ Wikipedia: Mouse (computing)
- ↑ Wikipedia: Multifunction printer
- ↑ Wikipedia: Multi-touch
- ↑ Wikipedia: Optical character recognition
- ↑ Wikipedia: Open architecture
- ↑ Wikipedia: Optical disc drive
- ↑ Wikipedia: Optical mark recognition
- ↑ Wikipedia: Parallel port
- ↑ Wikipedia: Pixel
- ↑ Wikipedia: Plotter
- ↑ Wikipedia: Point of sale
- ↑ Wikipedia: Printer (computing)
- ↑ Wikipedia: Radio-frequency identification
- ↑ Wikipedia: Random access
- ↑ Wikipedia: Repetitive strain injury
- ↑ Wikipedia: Retina Display
- ↑ Wikipedia: Image scanner
- ↑ Wikipedia: Sensor
- ↑ Wikipedia: Sequential access
- ↑ Wikipedia: Solid-state drive
- ↑ Wikipedia: Serial port
- ↑ Wikipedia: Loudspeaker
- ↑ Wikipedia: Stylus
- ↑ Wikipedia: Tape drive
- ↑ Wikipedia: Thermal printer
- ↑ wikipedia: Touchscreen
- ↑ Wikipedia: Touchpad
- ↑ Wikipedia: Trackball
- ↑ Wikipedia: Pointing stick
- ↑ Wikipedia: Uninterruptible power supply
- ↑ Wikipedia: USB
- ↑ Wikipedia: Video projector
- ↑ Wikipedia: Webcam
- ↑ Wikipedia:Wireless
Lesson 4 - Operating Systems
editAn operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function.[1]
Objectives and Skills
editObjectives and skills for the operating systems portion of CLEP Information Systems include:[2]
- Concepts of computer architectures (mainframe, client/server, operating systems)
- Basic user functions of a desktop operating system (memory management, file management, interfaces, types of OS)
Readings
editMultimedia
edit- Operating Systems - Crash Course Computer Science
- YouTube: Operating System Functions
- YouTube: Types of Operating Systems
- YouTube: The History of Operating Systems
- YouTube: What Are Bits, and Are They Important?
- YouTube: Windows 10 updates
- YouTube: what is an Operating system as Fast As possible
- YouTube: Computer Basics: Understanding Operating Systems
- YouTube: Types of Operating Systems; Explained in Short Time
- YouTube: Basics of OS Computer System Operation
- YouTube: Split view: Mac vs Windows 10
- YouTube: Operating System Basics
Activities
edit- Complete the tutorial GCFLearnFree: Understanding Operating Systems.
- Determine whether your computer is running a 32 or 64-bit operating system:
- Windows: Review Microsoft: Is my PC running the 32-bit or 64-bit version of Windows?.
- macOS: Review Apple: macOS: 64-bit kernel frequently asked questions.
- Chrome OS: Settings tab, About Chrome OS; Copy link: chrome://settings/help
- Linux: Review Uname Run
uname -m
to see system information such as 32-bit or 64-bit.
- Use your system's monitoring utilities to review active processes and resources in use:
- Windows: Review Wikipedia: Windows Task Manager and Wikipedia: Resource Monitor and run both utilities.
- macOS: Review Wikipedia: Activity Monitor and run the utility.
- Linux: Review Top. Run
top
to see current system utilization of cpu, memory, swap, and processes.
- Review Wikipedia: Device Manager and Microsoft: Update a driver for hardware that isn't working properly. Run Device Manager on a Windows system Use Device Manager to check for updated drivers for all display adapters, network adapters, and sound controllers.
- Examine system health and recent events for your system:
- Windows: Review Microsoft: How to Use Reliability Monitor and Wikipedia: Event Viewer and run the utilities.
- macOS: Review Wikipedia: Console (macOS) and run the utility.
- Try out any of these Tips and Tricks on Windows 10[3]
- Identify your operating system version:
- Windows: Use the Start menu and run
winver
. - Linux: Open a Terminal window and run
lsb-release -a
. - macOS: Select the
Apple icon
in the top left corner of your screen and selectAbout this MAC
.
- Windows: Use the Start menu and run
- Test operating systems:
- Windows: MIT: Windows 10 Simulator
- macOS: alessioatzeni.com: Mac OSX Lion CSS3
- Linux: Download and install VNC Viewer and then test different Linux distributions using distrotest.net. Popular Linux desktop distributions include Ubuntu, Linux Mint, and Fedora.
- VirtualBox - Software - This link will take you to the Oracle VM VirtualBox software - you can download this for free and essentially "make your own machine" virtually to test out different components of a device - higher skill level recommended.
Research and Discussion
edit- Research operating systems in use in your work and personal environments. Consider server-based systems, personal computers, tablets, smartphones, and wearable devices. Are the operating systems proprietary or open-source? Does each provider charge for the operating system? If not, what do they receive in return for their efforts?
- Compare PC-based operating systems (Windows, macOS, Unix/Linux) and mobile operating systems (Android, ChromeOS, iOS). Describe advantages and disadvantages of each. Which operating system(s) do you prefer, and why.
- Research and compare different PC-based operating system functions. What is the purpose between the operating system and the computer hardware? Describe a few tasks that you frequently perform using your operating system, and why.
Lesson Summary
edit- An operating system is a software that manages computer hardware and software resources and provides common services for computer programs. Operating systems are crucial to system software as most applications require an OS to run.[4].
- The operating system allows you to communicate with the computer without knowing how to speak the computer language. The basic goal of an operating system is to carry out user programs and make the burden easier. In other words, it provides an interface between the user and the system.[5]
- Hardware functions such as input & output and memory allocation, the operating system acts as an intermediary between application programs and the computer hardware.
- The operating system coordinates all of the hardware and software components on the computer to make sure each program gets what it needs..[6]
- The operating system provides an environment for software applications like spreadsheets, word processors and database programs to function. For instance, word processors create, edit, save and print documents. [7]
- The operating system monitors system health and functionality of the computer by providing a file structure for data management.[8]
- Popular computer operating systems include Windows, macOS/macOS, Linux, and Chrome OS, with Windows 7 being the most popular operating system for desktop and laptops.[9][10]
- A mobile operating system, also referred to as mobile OS, is an operating system that operates a smartphone, with Android being the most popular smartphone operating system and IOS as the most popular tablet operating system, PDA, or other mobile devices.[11]
- macOS, Linux, Android, Chrome OS, and iOS are based on Unix. iOS is based on macOS which is, itself, a variant of a BSD UNIX kernel running on top of a micro kernel called Mach. [12], https://www.quora.com/Is-iOS-based-on-Linux-kernel-In-this-case-is-it-possible-to-install-a-Linux-program-in-an-iPhone-for-example-a-node-js-server.
- Popular distributions of Linux include Red Hat, Debian, Ubuntu, Linux Mint and Google's Android.[13]
- Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.[14]. Examples of the open-source software include internet browsers like Mozilla Firefox, LibreOffice and Google Chrome.
- Proprietary software or closed source software is computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.[15]
- A real-time operating system (RTOS) is an operating system intended for applications with fixed deadlines (real-time computing). This is completed by a core switching rapidly between tasks without buffer delays. [16]
Key Terms
edit- 32-bit
- A computer architecture that supports at most 32-bit integers, memory addresses, and other data units, limiting integer values to -2,147,483,648 through 2,147,483,647 and memory addresses to 4 GiB (gigabytes or gibibytes).[17]
- 64-bit
- A computer architecture that supports at most 64-bit integers, memory addresses, and other data units, limiting integer values to over 18 quintillion and memory addresses to 16 EiB (exbibytes).[18]
- agent
- A computer program that acts on behalf of a user or other program.[19]
- Android
- A mobile operating system (OS) based on the Linux kernel and currently developed by Google.[20]
- BlackBerry OS
- A proprietary mobile operating system developed by BlackBerry Ltd for its BlackBerry line of smartphone handheld devices.[21]
- booting
- The initialization of a computerized system.[22]
- command-line interface (CLI)
- A means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text.[23]
- compatibility
- The ability to run software on a given system.[24]
- copyright
- Used by proprietary software companies to prevent the unauthorized copying of their software and by open source licenses to enforce their terms.[25]
- cross-platform
- An attribute conferred to computer software or computing methods and concepts that are implemented and inter-operate on multiple computer platforms.[26]
- daemon
- A daemon is a long-running computer program that runs as a background process. Examples of this would be
inted
,httpd
,mysqld
, andsnmpd
.[27] - device driver
- A computer program that operates or controls a particular type of device that is attached to a computer, specifically hardware devices [28]
- disk operating system (DOS)
- An acronym for several computer operating systems that were operated by using the command line.[29]
- end-user license agreement (EULA)
- The contract between a licensor and purchaser, establishing the purchaser's right to use software.[30]
- file manager
- A computer program that provides a user interface to manage files and folders.[31]
- formatting
- The process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive for initial use.[32]
- fragmentation
- Occurs when a file system cannot or will not allocate enough contiguous space to store a complete file as a unit, but instead puts parts of it in gaps between existing files.[33]
- Google Chrome OS
- An operating system based on the Linux kernel and designed by Google to work with web applications and installed applications, initially designed as a pure web thin client operating system.[34]
- Graphical User Interface (GUI)
- A type of interface that allows users to interact with electronic devices through icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.[35]
- iOS
- A mobile operating system developed by Apple Inc. and distributed exclusively for Apple hardware, including iPods, iPhones, and iPads.[36]
- kernel
- A computer program that manages I/O requests from software, and translates them into data processing instructions for the central processing unit and other electronic components of a computer.[37]
- Linux
- A Unix-like computer operating system assembled under the model of free and open-source software development and distribution.[38]
- macOS
- A series of graphical user interface–based operating systems developed by Apple Inc. for their Macintosh line of computer systems, currently branded as macOS.[39]
- malware (short for malicious software)
- Any software intentionally designed to cause damage to a computer, server or computer network.[40]
- memory management
- Provides ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed.[41]
- menu bar
- A graphical control element that lists options or commands presented to an operator by a computer or communications system.[42]
- mobile operating system
- An operating system for smartphones, tablets, or other mobile devices (Android, iOS, Windows Phone, and Blackberry).[43]
- multi-tasking
- Performing multiple tasks over a certain period of time by executing them concurrently.[44]
- open source
- Computer software with its source code made available with a license in which the copyright holder provides the right to study, change and distribute the software to anyone and for any purpose.[45]
- operating system
- System software that manages computer hardware and software resources and provides common services for computer programs (Android, iOS, Windows Phone, and Blackberry).[46]
- macOS
- A series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. designed to run on Mac computers.[47]
- paging
- A memory management scheme by which a computer stores and retrieves data from the secondary storage for use in main memory.[48]
- path
- The general form of the name of a file or directory, specifies a unique location in a file system.[49]
- platform
- Computer hardware architecture, an operating system, and runtime libraries in which a piece of software is designed to run.[50]
- root directory
- The first or top-most directory in a hierarchy.[51]
- real-time operating system (RTOS)
- An operating system intended for applications with fixed deadlines (real-time computing). Such applications include some small embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.[52]
- safe mode
- A diagnostic mode of a computer operating system (OS). [53]
- shell
- A user interface used to access an operating system's services.[54]
- style
- predefined text formatting available in software applications.
- task manager
- A system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer.
- taskbar
- An element of a graphical user interface which typically shows which programs or applications are running on the device, as well as providing links or shortcuts to other programs or places. [55]
- Unix
- A family of multitasking, multi-user computer operating systems.[56]
- user interface
- The space where interactions between humans and machines occur.[57]
- virtual memory
- A memory management technique that is implemented using both hardware and software that maps memory addresses used by a program.[58]
- Windows
- A metafamily of graphical operating systems developed, marketed, and sold by Microsoft.[59]
- x64
- The 64-bit version of the x86 instruction set, supporting 64-bit addressing and processing, and fully backwards compatible with 16-bit and 32-bit x86 code.[60]
- x86
- A family of backward compatible instruction set architectures based on the Intel 8086 through 80486 CPUs supporting 16-bit and 32-bit addressing and processing.[61][62]
- Xbox OS
- The Xbox One system software, sometimes called the Xbox OS, is the operating system for the eighth-generation home video game console, Xbox One.[63]
Review Questions
edit-
An operating system is _____.An operating system is software that manages computer hardware and software resources and provides common services for computer programs.
-
The operating system provides an interface between _____.The operating system provides an Interface between the user and the system.
-
The operating system coordinates _____.The operating system coordinates hardware components.
-
The operating system provides an environment for _____.The operating system provides an environment for software applications to function.
-
The operating system monitors _____.The operating system monitors system health and functionality.
-
The operating system provides a file structure for _____.The operating system provides a file structure for data management.
-
Popular computer operating systems include _____.Popular computer operating systems include Windows, macOS, Linux, and Chrome OS.
-
What kinds of devices use a mobile operating system?A mobile operating system, also referred to as mobile OS, is an operating system that operates a smartphone, tablet, PDA, or other mobile device.
-
Name the (4) main mobile operating systems (2 popular, 2 less popular)Popular mobile operating systems include Android, iOS and to a lesser extent Windows Phone and Blackberry.
-
Name the (5) operating systems that are based on Unix:macOS, Linux, Android, Chrome OS and iOS are based on Unix.
-
Name the (5) popular distributions of Linux:Popular distributions of Linux include Red Hat, Debian, Ubuntu, Linux Mint and Google's Android.
-
What is Open-source software?Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
-
Proprietary software or closed source software is _____.Proprietary software or closed source software is computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.
-
What does RTOS stand for and its definition:A real-time operating system is an operating system intended for applications with fixed deadlines (real-time computing). Such applications include some small embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.15. What are the two most common operating systems:
Assessments
edit- Flashcards: Quizlet: Information Systems - Operating Systems
- Quiz: Quizlet: Information Systems - Operating Systems
- ProProfs Quiz: Introduction to Operating System
- Computer Parts and Operating System Quiz [8]
See Also
edit- Computer Software
- Using an Operating System
- IT Fundamentals/Operating Systems
- How Stuff Works: 5 Important Jobs Your Operating System Handles Without You Knowing about it
- How Stuff Works: How Operating Systems Work
- eHow.com: How does a computer operating system work?
- Nash Networks: The Pros and Cons of Operating Systems
- opensource.org: SE Linux A great opensource success story
- linuxquestions.org: Introduction to Linux A hands on guide
- computerworld.com: Is Chrome OS right for you?
- NetMarketShare: OS Market Share
- Bleeping Computer: What is a File Extension?
- TechWorm: Unix Vs. Linux
- Windows, mac or Linux PROS and CONS
References
edit- ↑ Wikipedia: Operating system
- ↑ CLEP: Information Systems
- ↑ Sele Training (2018-02-12), Top 20 Windows 10 Tips and Tricks, retrieved 2018-06-07
- ↑ Wikipedia: Operating system
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: Mac OS
- ↑ Wikipedia: Mobile operating system
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: Open-source software
- ↑ Wikipedia: Proprietary software
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: 32-bit
- ↑ Wikipedia: 64-bit
- ↑ Wikipedia: Software agent
- ↑ Wikipedia: Android (operating system)
- ↑ Wikipedia: BlackBerry OS
- ↑ Wikipedia: Booting
- ↑ Wikipedia: Command-line interface
- ↑ Wikipedia: Computer compatibility
- ↑ Wikipedia: Software copyright
- ↑ Wikipedia: Cross-platform
- ↑ Wikipedia:Daemon_(computing)
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: DOS
- ↑ Wikipedia: End-user license agreement
- ↑ Wikipedia: File manager
- ↑ Wikipedia: Disk formatting
- ↑ Wikipedia: Defragmentation
- ↑ Wikipedia: Chrome OS
- ↑ Wikipedia: Graphical user interface
- ↑ Wikipedia: iOS
- ↑ Wikipedia: Kernel (operating system)
- ↑ Wikipedia: Linux
- ↑ Wikipedia: macOS
- ↑ Wikipedia: Malware
- ↑ Wikipedia: Memory management
- ↑ Wikipedia: Menu bar
- ↑ Wikipedia: Mobile operating system
- ↑ Wikipedia: Computer multitasking
- ↑ Wikipedia: Open source
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: macOS
- ↑ Wikipedia: Paging
- ↑ Wikipedia: Path (computing)
- ↑ Wikipedia: Computing platform
- ↑ Wikipedia: Root directory
- ↑ Wikipedia: Operating system
- ↑ Wikipedia: Safe mode
- ↑ Wikipedia: Shell (computing)
- ↑ Wikipedia: Taskbar
- ↑ Wikipedia:Unix
- ↑ Wikipedia: User interface
- ↑ Wikipedia: Virtual memory
- ↑ Wikipedia: Microsoft Windows
- ↑ Wikipedia: x86-64
- ↑ Wikipedia: x86
- ↑ Wikipedia: IA-32
- ↑ Wikipedia: Xbox One system software
Lesson 5 - Applications
editApplication Software are the most common programs that run in the foreground of the computer. They tend to perform useful tasks which are not associated with computer maintenance, system boot-up, or hardware communication. Application Software are the most familiar forms of software and come in a variety of types. Most often they can be accessed through the graphical user interface of the operating system being used by double-clicking on an icon. Some of the most popular examples include word processors, spreadsheets, photo-editing programs, database programs, and accounting programs to name a few.[1]
Objectives and Skills
editObjectives and skills for the applications portion of CLEP Information Systems include:[2]
- Standard office suite tools (word processors, spreadsheets, presentation packages, end-user database packages)
- Office systems (e-mail, conferencing, cooperative work, document imaging, system resources, voicemail)
Readings
editMultimedia
editActivities
edit- Use the built-in text editor to create and edit text files:
- Windows: Review Microsoft: Open Notepad. Use Notepad to create a text file and save it under Documents.
- macOS: Review Apple: Mac Basics: TextEdit. Use TextEdit to create a text file and save it under Documents.
- Linux: Review Wikipedia: gedit. Use gedit to create a text file and save it under Documents.
- Review Wikipedia: OpenOffice and How To Geek: OpenOffice vs. LibreOffice. Download and install an open-source office software suite. Then review LibreOffice.org: Documentation. Use the open source software suite to create a short document, spreadsheet, and presentation. Save the files under Documents.
- Complete one or more of the following office suite tutorials for word processing, spreadsheets, and presentation software:
- Use screen sharing software to collaborate with other users:
- Windows: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
- macOS: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
- Linux: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
- All: Use collaboration features in one or more of the cloud-based office software suites to share and edit documents amongst users in real time.
- Use file compression software to compress and uncompress folders and files:
- Windows: Review Microsoft: Compress and Uncompress Files. Create a Zip file and compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
- macOS: Review macOS Daily: How to Zip Files in macOS. Compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
- Linux: Review Ubuntu.org: File Roller. Use the Archive Manager to create a new .gz or .zip file and compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
- Use video conferencing software to collaborate with other users:
- Windows: Search the Internet for information on Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
- macOS: Search the Internet for information on FaceTime, Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
- Linux: Search the Internet for information on Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
- Back up and restore files.
- Create a local system backup to a USB or NAS drive.
- Windows: Review Microsoft: Back Up Your Programs, System Settings, and Files. Create a system image backup.
- macOS: Review Apple: Time Machine Backs Up Your Mac. Configure Time Machine to back up your system.
- Linux: Check to see if your distribution has a built-in GUI backup tool, or review How-To-Geek: How to Use rsync to Backup Your Data on Linux. Back up your system.
- Restore a file or files to verify the backup.
- Set up automatic file backups:
- Windows: Review Backup and restore your files. Restore a file from backup.
- macOS: Review How to Schedule an Automatic File Backup in a Mac. Restore a file from backup.
- Schedule a system backup to run daily or weekly.
- Research cloud backup alternatives.
- Create a local system backup to a USB or NAS drive.
- Chrome OS explore and create Applications
- Chrome OS applications [9] Explore and Create, Get Stuff Done, and Play Games
Research and Discussion
edit- Compare proprietary and open-source office productivity suites (Google Apps, iWork, Libre Office, Microsoft Office, Open Office). Describe advantages and disadvantages of each. Which office productivity suite does your school or company use, and why?
- Research leading collaboration software (email platforms, shared calendaring or time management, groupware, virtual meeting software, chat, social media, etc.). Identify which platforms or applications are in use in your work and personal environments. Consider whether these applications enhance productivity or detract from it.
Lesson Summary
edit- An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.[3]
- Productivity software, or office productivity software, are application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.[4]
- Existing office suites contain a wide range of components. Most typically, the base components include a word processor, spreadsheet, and presentation program.[5]
- Popular office suites include Apache OpenOffice, LibreOffice, Microsoft Office and Google Docs.[6]
- Collaborative software, or groupware, is application software designed to help people involved in a common task to achieve goals. It can be divided into three categories depending on the level of collaboration: communication, conferencing and co-ordination.[7]
- Communication can be thought of as unstructured interchange of information. Examples of communication tools include synchronous conferencing, asynchronous conferencing, e-mail, faxing, voice mail, wikis, web publishing, and revision control.[8]
- Conferencing refers to interactive work toward a shared goal. Examples of conferencing include Internet forums, online chat, instant messaging, telephones, video conferencing, data conferencing, and application sharing.[9]
- Co-ordination refers to complex interdependent work toward a shared goal. Examples of co-ordination include electronic calendars, project management systems, online proofing, workflow systems, knowledge management systems, enterprise bookmarking, prediction markets, extranet, social software, online spreadsheets, and client portals.[10]
- Utility software is system software designed to help analyze, configure, optimize or maintain a computer.[11]
- Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is aimed at directly performing tasks that benefit ordinary users.[12]
- A filename extension is a suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.[13]
- Mobile apps are becoming more prevalent with the use of smartphones. More people use apps than search the internet: 51.1% vs. 49.8% respectively.[14]
Key Terms
edit- accounting software
- Application software that records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, payroll, and trial balance.[15]
- autocorrection
- An automatic data validation and replacement function commonly found in word processors and text editing interfaces.[16]
- automatic recalculation
- A feature which eliminates the need to manually request that a spreadsheet program recalculate values.[17]
- autosave
- A function in many computer applications or programs which saves an opened document automatically, helping to reduce the risk or impact of data loss in case of a crash or freeze.[18]
- bar chart
- A chart that presents grouped data with rectangular bars with lengths proportional to the values that they represent.[19]
- cell
- A unit in a spreadsheet formed by the intersection of a row and a column.[20]
- cell address
- Alphanumeric code used to identify a spreadsheet cell.[21]
- column
- A vertical element in a spreadsheet.[22]
- concurrent
- A software license that is based on the number of simultaneous users accessing the program. It typically deals with software running in the server where users connect via the network. For example, in a five-user concurrent use license, after five users are logged on to the program, the sixth user is prohibited.[23]
- conferencing
- Used as an umbrella term for various types of online collaborative services including web seminars, webcasts, and peer-level web meetings.[24]
- database
- An organized collection of facts and information such as text and numbers, and often can hold still images, sounds and videos or film clips.[25]
- desktop publishing (DTP)
- The creation of documents using page layout skills on a personal computer.[26]
- electronic paper
- Display technologies that mimic the appearance of ordinary ink on paper.[27]
- e-reader
- A mobile electronic device that is designed primarily for the purpose of reading digital e-books and periodicals.[28]
- equation solver
- Software used to find values (numbers, functions, sets, etc.) that fulfill a condition.[29]
- formula
- An expression that automatically calculates and displays a value based on the contents of other spreadsheet cells.[30]
- freeware
- Copyrighted software that may be used free of charge.[31]
- function
- A sequence of program instructions that perform a specific task, packaged as a unit.[32]
- groupware
- Application software designed to help people involved in a common task to achieve goals.[33]
- information retrieval
- Is the activity of obtaining information resources relevant to an information need from a collection of information resources.[34]
- instant messaging
- A type of online chat which offers real-time text transmission over the Internet.[35]
- justification
- A common type of text alignment where the spaces between words are stretched or compressed to align both the left and right ends of each line of text.[36]
- line chart
- A type of chart which displays information as a series of data points connected by straight line segments.[37]
- macro key
- A sequence of application or operating system instructions that is recorded or written once and then may be repeated using a keyboard shortcut or application interface button.[38]
- mail merge
- A software operation describing the production of multiple documents from a single template form and a structured data source.[39]
- mathematical software
- Software used to model, analyze or calculate numeric, symbolic or geometric data.[40]
- modeling
- Representing a system using symbols and equations or calculations.[41]
- multiuser
- A software license that allows more than one person to use the software. See concurrent use license, per seat license and EULA.[42]
- open source software
- Software programs made up of source code which is made available to the public. i.e. Wikibook.[43]
- outliner
- A computer program that allows text to be organized into discrete sections that are related in a tree structure or hierarchy and may be collapsed into a node, or expanded and edited.[44]
- page-layout software
- The primary purpose of page layout software is to make it easy to combine text and graphics when creating layouts for brochures, ads, newsletters, greeting cards, etc.[45]
- personal information manager (PIM)
- A type of application software that functions as a personal organizer.[46]
- pie chart
- A circular statistical graphic, which is divided into slices to illustrate numerical proportion.[47]
- presentation software
- Productivity software used to display information in the form of a slide show.[48]
- programming tools
- software in the form of programs or applications that software developers (also known as programmers, coders, hackers or software engineers) use to create, debug, maintain, or otherwise support software.[49]
- public domain software
- A software program which is not copyright so it is accessible to all users and able to be duplicated.[50]
- row
- A horizontal element in a spreadsheet.[51]
- scatter chart
- A type of mathematical diagram using Cartesian coordinates to display values for typically two variables for a set of data.[52]
- shareware
- A type of proprietary software which is provided (initially) free of charge to users, who are allowed and encouraged to make and share copies of the program, which helps to distribute it.[53]
- single-user
- The authorization that grants one user the right to use a software package. It may grant the user the right to install the software on only one machine, or it may authorize installation on any number of machines as long as that same licensee is the only user.[54]
- software
- Any set of machine-readable instructions that directs a computer's processor to perform specific operations.[55]
- software suite
- A group of related programs that interact together and are purchased together.[56]
- speech recognition software
- Software used for the translation of spoken words into text.[57]
- spell checker
- Software that flags words in a document that may not be spelled correctly.[58]
- spreadsheet software
- Productivity software used to perform the organization, analysis and storage of data in tabular form.[59]
- stack chart
- A bar chart with the bars grouped (stacked) to show cumulative effect.[60]
- style
- Predefined text formatting available in software applications.[61]
- template
- A standardized non-executable file type used by computer software as a pre-formatted example on which to base other files, especially documents.[62]
- utility program
- System software designed to help analyze, configure, optimize or maintain a computer.[63]
- web based software
- Software that is delivered on demand via the Web; also referred to as Software as Service (SaaS) or cloudware.[64]
- wizard
- A user interface type that presents a user with a sequence of dialog boxes that lead the user through a series of well-defined steps.[65]
- word processing
- Productivity software used to perform the composition, editing, formatting, and sometimes printing of any sort of written material.[66]
- word wrap
- The process of breaking a section of text into lines such that it will fit in the available width of a page, window or other display area.[67]
- worksheet
- A single array of data in spreadsheet software.[68]
Review Questions
edit-
Productivity software, or office productivity software, is application software dedicated to _____.Productivity software, or office productivity software, is application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.
-
Existing office suites contain a wide range of components. Most typically, the base components include _____.Existing office suites contain a wide range of components. Most typically, the base components include a word processor, spreadsheet, and presentation program.
-
The names of some popular office suites are _____.Popular office suites include Apache OpenOffice, LibreOffice, Microsoft Office and Google Docs.
-
Collaborative software, or groupware, is application software designed to _____.Collaborative software, or groupware, is application software designed to help people involved in a common task to achieve goals, such as email, calendaring, text chat, wiki, bookmarking, shared document storage, screen sharing, and video conferencing.
-
Communication can be thought of as _____. Examples of communication tools include _____.Communication can be thought of as unstructured interchange of information. Examples of communication tools are synchronous conferencing, asynchronous conferencing, e-mail, faxing, voice mail, wikis, web publishing, and revision control.
-
Conferencing refers to _____. Examples of conferencing include _____.Conferencing refers to interactive work toward a shared goal. Examples of conferencing are Internet forums, online chat, instant messaging, telephones, video conferencing, data conferencing, and application sharing.
-
Co-ordination refers to _____. Examples of co-ordination include _____.Co-ordination refers to complex interdependent work toward a shared goal. Examples of co-ordination include electronic calendars, project management systems, online proofing, workflow systems, knowledge management systems, enterprise bookmarking, prediction markets, extranet, social software, online spreadsheets, and client portals.
-
Utility software is system software designed to _____.Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
-
Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is _____.Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is aimed at directly performing tasks that benefit ordinary users.
-
A filename extension is _____.A filename extension is a suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.
Assessments
editSee Also
editReferences
edit- ↑ Wikibooks: Introduction to Computer Information Systems/System Software
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Application software
- ↑ Wikipedia: Productivity software
- ↑ Wikipedia: Productivity software
- ↑ Wikipedia: List of office suites
- ↑ Wikipedia: Collaborative software
- ↑ Wikipedia: Collaborative software
- ↑ Wikipedia: Collaborative software
- ↑ Wikipedia: Collaborative software
- ↑ Wikipedia: Utility software
- ↑ Wikipedia: Utility software
- ↑ Wikipedia: Filename extension
- ↑ "Mobile app". Wikipedia. 2018-05-29. https://en.wikipedia.org/w/index.php?title=Mobile_app&oldid=843477249.
- ↑ Wikipedia: Accounting Software
- ↑ Wikipedia: Autocorrection
- ↑ Wikipedia: Spreadsheet
- ↑ Wikipedia: Autosave
- ↑ Wikipedia: Bar Chart
- ↑ Wikipedia: Cell (database)
- ↑ Wikipedia: Spreadsheet
- ↑ Wikipedia: Column (disambiguation)
- ↑ [1]
- ↑ Wikipedia: Web conferencing
- ↑ Wikipedia: Database
- ↑ Wikipedia: Desktop publishing
- ↑ Wikipedia: Electronic paper
- ↑ Wikipedia: E-reader
- ↑ Wikipedia: Equation solving
- ↑ Wikipedia: Spreadsheet
- ↑ Wikipedia: Freeware
- ↑ Wikipedia: Subroutine
- ↑ Wikipedia: Collaborative software
- ↑ Wikipedia: Information retrieval
- ↑ Wikipedia: Instant messaging
- ↑ Wikipedia: Typographic alignment
- ↑ Wikipedia: Line chart
- ↑ Wikipedia: Macro (computer science)
- ↑ Wikipedia: Mail merge
- ↑ wikipedia: Mathematical software
- ↑ Wikipedia: Model
- ↑ [2]
- ↑ Wikipedia: Open-source software
- ↑ Wikipedia: Outliner
- ↑ Wikipedia: Page layout program
- ↑ Wikipedia: Personal information manager
- ↑ Wikipedia: Pie chart
- ↑ Wikipedia: Presentation program
- ↑ Wikipedia: Presentation program
- ↑ Wikipedia: Application software
- ↑ Wikipedia: Column (disambiguation)
- ↑ Wikipedia: Scatter plot
- ↑ Wikipedia: Shareware
- ↑ [3]
- ↑ Wikipedia: Software
- ↑ Wikipedia: Software Suites
- ↑ Wikipedia: Speech recognition
- ↑ Wikipedia: Spell checker
- ↑ Wikipedia: Spreadsheet
- ↑ Wikipedia: Bar chart
- ↑ Wikipedia: Word processor
- ↑ Wikipedia: Templates
- ↑ Wikipedia:Utility software
- ↑ Wikipedia:Utility software
- ↑ Wikipedia: Wizard (software)
- ↑ Wikipedia: Word processor
- ↑ Wikipedia: Line wrap and word wrap
- ↑ Wikipedia: Worksheet
Lesson 6 - Networking
editNetworking consists of a group of computer systems and computer hardware that connect together through different channels to facilitate sharing and receiving of data and information.
Objectives and Skills
editObjectives and skills for the networking portion of CLEP Information Systems include:[1]
- Devices (processing, storage, input and output, telecommunications, networking)
- Functions (computer, telecommunications, network hardware)
- Concepts of network architectures (local area, wide area, VPN (virtual private network), enterprise)
- Wireless computing/communication devices (Wi-Fi, cellular, satellite, PDA, GPS)
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Computer Networks
- Wikibooks: Introduction to Computer Information Systems/Computer Networks and the Internet
- Wikibooks: Internet Technologies/Protocols
- Wikipedia: Computer network
- Wikipedia: Wireless network
- Wikipedia: Wireless security
- Wikipedia: Node (networking)
Multimedia
edit- YouTube: Introduction to Computer Networks Part 1 - Easy to understand basics
- YouTube: Introduction to Computer Networks Part 2 - Easy to understand basics
- YouTube: Introduction to Computer Networks Part 3 - Easy to understand basics
- YouTube: Introduction to Networking
- YouTube: How Wireless Works
- YouTube: How to check whether you have a static or dynamic ip address and how to change it
- YouTube: Computer Information Systems—Networking
- YouTube: Management Information system: Networking Technologies
- YouTube: Introduction to Computer Networks
- YouTube: The Internet and the World Wide Web
- YouTube: The Internet: IP Addresses & DNS
- YouTube: Network Types
- YouTube: Learn Basic Networking in 4 Minutes
Activities
edit- Review IP address settings for your local network:
- Windows:
- Review Microsoft: How do I fix network adapter problems? and Microsoft: Change TCP/IP Settings. Review network settings for your system.
- Review ipconfig. Complete the activities to display IP address information, all information, and release and renew a dynamic IP address.
- macOS:
- Review Apple: About Network Utility. Use Network Utility to review network settings for your system.
- Review MacWorld: Configuring Your Mac's Network Settings Use System Preferences / Network to review network settings for your system. Use the Advanced button and TCP/IP settings to renew your DHCP lease.
- Review Wikipedia: ifconfig. Use
ifconfig
to review network settings for your system.
- Linux:
- Review YoLinux: Network GUI Configuration Tools. Use Network Configuration or System Settings / Networking to review network settings for your system.
- Review Wikipedia: ifconfig. Use
ifconfig
to review network settings for your system. Review CyberCiti: Linux Force DHCP Client to Renew IP Address. Usedhclient
to release and renew a dynamic IP address.
- Windows:
- Verify Internet connectivity:
- Verify a physical connection:
- Wired: Check for connectivity lights on the network adapter and switch or router.
- Wireless: Check for connectivity through the user interface.
- Verify ip address settings.
- Windows: Use
ipconfig
. - macOS: Use Network Utility, System Preferences / Network, or
ifconfig
. - Linux: Use Network Configuration, System Settings / Networking, or
ifconfig
.
- Windows: Use
- Review Ping/Host. Verify local and remote connectivity using
ping
.- Ping your local IP address.
- Ping your local default gateway address.
- Ping an Internet host such as 8.8.8.8.
- Review Nslookup. Verify name resolution using
nslookup
and an Internet host name, such as en.wikiversity.org.
- Verify a physical connection:
- Share a folder and connect to the shared folder:
- Windows GUI:
- Review Microsoft: File Sharing Essentials. Share a folder on your system.
- From another computer, use a UNC path to connect to the shared folder.
- Windows CLI:
- Review Microsoft: Net Share. Use the
net share
command to share a folder on your system. - Review Microsoft: Net Use. From another computer, use the
net use
command to connect to the shared folder.
- Review Microsoft: Net Share. Use the
- macOS:
- Review Apple: Mac Basics: File Sharing. Share a folder on your system.
- Review Apple: Connect to Shared Computers and File Servers on a Network. From another computer, connect to the shared folder.
- Linux:
- Review TechGage: Using Samba to Share Your Linux Folders. Install Samba if necessary and share a folder on your system.
- Review HowToGeek: 3 Easy Ways to Connect to Windows Shared Folders from Linux. From another computer, connect to the shared folder.
- Windows GUI:
- Experiment with the Wireshark open source packet analyzer. Follow the activities to install Wireshark and capture network traffic. Then view the captured information.
- Play the GoCertify: OSI Networking game to practice matching protocols to their corresponding OSI layer.
- Research Bureau Of Labor Statistics: Network and Computer Systems Administrators careers. Identify education requirements, job outlook, and median pay.
Research and Discussion
edit- You are interested in setting up an Internet connection on your new computer. Compare and contrast different options on how you can access the Internet. Which type would you prefer to use from your results? Support your answer.
- Computer users should be aware of the different wireless security options. Identify different wireless network security vulnerabilities and their potential risks. Discuss solutions to resolve those identified threats.
- Explore different network design types. Select one network design type based on performance, hardware, cost and setup requirements. Justify your answers with supported research.
Lesson Summary
edit- A computer network or data network is a telecommunications network that allows computers to exchange data. Networked computing devices pass data to each other in the form of packets across connections established using either cable or wireless media.[2]
- Computer networks support applications such as the access to the World Wide Web, storage servers, printers, and fax machines, and use of email and instant messaging applications. Two devices are said to be networked when they can exchange information between them.[3]
- The different networks are nanoscale communication network, personal area network, local area network, home area network, storage area, campus area, backbone network, metro area, enterprise private network, virtual private network, and global area network.
- A network packet is a formatted unit of data sent through a network to the destination. Once packets arrive, they are reassembled into their original message.[4]
- Wired media includes coaxial cable, twisted-pair cable, and optical fiber.[5]
- Wireless local area network connections use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.[6]
- A network interface controller (NIC) is hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.[7]
- In Ethernet networks, each NIC has a unique 48-bit Media Access Control (MAC) address.[8]
- A repeater or hub is an electronic device that receives a network signal in the form of bits. Most organization have replaced hubs with switches.[9]
- A bridge or switch is a device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.[10]
- A router is a device that forwards data packets between different computer networks based on the network address (IP address).[11]
- A modem is a device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.[12]
- A firewall is a device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.[13]
- An access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.[14]
- An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a network that uses the Internet Protocol for communication. An IP address serves two principal functions: host identification and network addressing.[15]
- IP addresses are 32-bit (IPv4) or 128-bit (IPv6) numbers usually written and displayed in human-readable notations, such as 198.51.100.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).[16]
- IP addresses are assigned to a host either anew at the time of booting, or permanently by fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP address. In contrast, in situations when the computer's IP address is assigned newly each time, this is known as using a dynamic IP address.[17]
- Static IP addresses are manually assigned to a computer by an administrator.[18]
- Dynamic IP addresses are assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).[19]
- A shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.[20]
- In SOHO networks, a decentralized approach is often used, where every user may make their local folders and printers available to others. This approach is sometimes denoted as a workgroup or peer-to-peer network.[21]
- In a workgroup, each computer is responsible for its own security, rather than relying on centralized authentication.[22]
- Windows 7 and later Microsoft operating systems extend the workgroup with a homegroup option that uses a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.[23]
- In larger networks, a centralized file server or print server, sometimes denoted client–server network is typically used. A client process on the local user computer takes the initiative to start the communication, while a server process on the file server or print server remote computer passively waits for requests to start a communication session.[24]
- The centralized authentication approach used in larger networks is referred to as a domain, where all user accounts, computers, printers and other security principals, are registered with a central directory service.[25]
- Users and network administrators typically have different views of their networks. Users can share printers and some servers from a workgroup, which usually means they are in the same geographic location and are on the same LAN, whereas a Network Administrator is responsible to keep that network up and running.[26]
- Network administrators can see networks from both physical and logical perspectives. The physical perspective involves geographic locations, physical cabling, and the network elements (e.g., routers, bridges and application layer gateways) that interconnect via the transmission media. Logical networks, called, in the TCP/IP architecture, subnets, map onto one or more transmission media.[27]
- Over the Internet, there can be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer (C2C) communications. When money or sensitive information is exchanged, the communications are apt to be protected by some form of communications security mechanism. Intranets and extranets can be securely superimposed onto the Internet, without any access by general Internet users and administrators, using secure Virtual Private Network (VPN) technology.[28]
- The word Cyberspace became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.[29]
- As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network.[30]
- Computer networking may be considered a branch of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of the related disciplines.[31]
- A computer network may be used by computer crackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from accessing the network via a denial of service attack.[32]
Key Terms
edit- bandwidth
- The amount of information that can be sent through a given communication channel in a given amount of time.[33]
- blog
- A discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically displayed in reverse chronological order (the most recent post appears first).[34]
- Bluetooth
- A wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4]) from fixed and mobile devices, and building personal area networks (PANs).[35]
- broadband
- A wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types.[36]
- chat room
- Describes any form of electronic conferencing, but traditionally refers to synchronous text-based communications with a group of users.[37]
- client
- A piece of computer hardware or software that accesses a service made available by a server.[38]
- cyberspace
- The notional environment in which communication over computer networks occurs.[39]
- coaxial cable
- copper or aluminum cables widely used for cable television systems, office buildings, and other work-sites for local area networks.[40]
- download
- To receive data to a local system from a remote system, or to initiate such a data transfer.[41]
- dynamic IP address
- An address assigned either by the computer interface or host software itself, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).[42]
- Ethernet
- A family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs), standardized in 1983 as IEEE 802.3.[43]
- file server
- A computer attached to a network that has the primary purpose of providing a location for shared storage of computer files that can be accessed by workstations attached to the same computer network. [44]
- forum
- An online discussion site where people can hold conversations in the form of posted messages.[45]
- global positioning system (GPS)
- A space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more GPS satellites.[46]
- instant messaging (IM)
- A type of online chat which offers real-time text transmission over the Internet.[47]
- local area network (LAN)
- A computer network that interconnects computers within a limited geographic area such as a home, school, computer laboratory, or office building.[48]
- mesh network
- A network topology in which each node relays data for the network.[49]
- network
- Telecommunications network which allows computers to exchange data.[50]
- network administrator
- An individual responsible for the maintenance of computer hardware and software systems that make up a computer network.[51]
- network adapter (NIC)
- A computer hardware component that connects a computer to a computer network. [52]
- network architecture
- The layout of the network. [53]
- network operating system (NOS)
- Software that implements an operating system of some kind that is oriented to computer networking.[54]
- network packet
- Formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream. When data is formatted into packets, the bandwidth of the communication medium can be better shared among users than if the network were circuit switched.[55]
- network switch
- A network switch (also called switching hub, bridging hub,) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.[56]
- network topology
- Arrangement of the various elements (links, nodes, etc.) of a computer network.[57]
- node
- A connection point, a redistribution point, or a communication endpoint (e.g. data terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network and is capable of creating, receiving, or transmitting information over a communications channel.[1] A passive distribution point such as a distribution frame or patch panel is consequently not a node. [58]
- optical fiber
- A glass fiber that carries pulses of light that represent data which can be used for long runs of cable carrying very high data rates, and are used for undersea cables to interconnect continents.[59]
- packet switching
- A digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, that are transmitted via a medium that may be shared by multiple simultaneous communication sessions.[60]
- peer-to-peer (P2P) protocol
- An application layer distributed networking protocol that can be used to form and maintain an overlay network among participant nodes.[61]
- POP Point of presence
- An artificial demarcation point or interface point between communicating entities.[62]
- protocol
- A system of rules that allow two or more entities of a communication system to communicate between them to transmit information via any kind of variation of a physical quantity.[63]
- Radio-frequency identification (RFID)
- The wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.[64]
- router
- A networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet.[65]
- static IP address
- An address manually assigned to a computer by an administrator.[66]
- SSID or Service Set Identifier
- The technical term for a network name.[67]
- TCP/IP
- The computer networking model and set of communications protocols used on the Internet and similar computer networks.[68]
- telecommunication
- The exchange of information between two or more entities using technology in the form of signals over a physical medium or in the form of electromagnetic waves.[69]
- text message
- A brief, electronic message sent between two or more mobile phones, or fixed or portable devices over a phone network.[70]
- twisted-pair
- A type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources.[71]
- upload
- The sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred, or the initiation of such a process.[72]
- virtual private network (VPN)
- A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet.[73]
- wide area network (WAN)
- A network that covers a broad geographic area using leased telecommunication lines.[74]
- WI-Fi
- A local area wireless computer networking technology based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards.[75]
- wireless access point (AP or WAP)
- A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. [76]
- wireless local area network (WLAN)
- Links two or more devices over a short distance using a wireless distribution method.[77]
Review Questions
edit-
A computer network or data network is a _____. Networked computing devices pass data to each other in the form of _____ across connections established using _____.A computer network or data network is a telecommunications network that allows computers to exchange data. Networked computing devices pass data to each other in the form of packets across connections established using either cable or wireless media.
-
A network packet is a _____. Once packets arrive, they are _____.A network packet is a formatted unit of data sent through a network to the destination. Once packets arrive, they are reassembled into their original message.
-
Wired media includes _____, _____, and _____.Wired media includes coaxial cable, twisted-pair cable, and optical fiber.
-
Wireless local area network connections use _____ technology based on a common flavor of open-standards wireless radio-wave technology defined as _____ and known as _____.Wireless local area network connections use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.
-
A network interface controller (NIC) is _____.A network interface controller (NIC) is hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.
-
In Ethernet networks, each NIC has a unique _____.In Ethernet networks, each NIC has a unique 48-bit Media Access Control (MAC) address.
-
A repeater or hub is _____. In local area networks, hubs have been replaced by _____.A repeater or hub is an electronic device that receives a network signal in the form of bits, cleans it of unnecessary noise, and regenerates it. In local area networks, switches have replaced hubs.
-
A bridge or switch is _____.A bridge or switch is a device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.
-
A router is _____.A router is a device that forwards data packets between different computer networks based on network address (IP address).
-
A modem is _____.A modem is a device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.
-
A firewall is _____.A firewall is a device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.
-
An access point is _____.An access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.
-
An Internet Protocol address (IP address) is _____. An IP address serves two principal functions: _____ and _____.An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a network that uses the Internet Protocol for communication. An IP address serves two principal functions: host identification and network addressing.
-
IP addresses are _____-bit (IPv4) or _____-bit (IPv6) numbers usually written and displayed in human-readable notations, such as _____ (IPv4), and _____ (IPv6).IP addresses are 32-bit (IPv4) or 128-bit (IPv6) numbers usually written and displayed in human-readable notations, such as 198.51.100.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).
-
IP addresses are assigned to a host either _____, or _____.IP addresses are assigned to a host either anew at the time of booting, or permanently by fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP address. In contrast, in situations when the computer's IP address is assigned newly each time, this is known as using a dynamic IP address.
-
Static IP addresses are assigned _____.Static IP addresses are assigned to a computer manually by an administrator.
-
Dynamic IP addresses are assigned _____.Dynamic IP addresses are assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).
-
A shared resource, or network share, is _____.A shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.
-
In SOHO networks, a decentralized approach is often used, where _____. This approach is sometimes denoted as a _____ or _____ network.In SOHO networks, a decentralized approach is often used, where every user may make their local folders and printers available to others. This approach is sometimes denoted as a workgroup or peer-to-peer network.
-
In a workgroup, each computer is responsible for _____.In a workgroup, each computer is responsible for its own security, rather than relying on centralized authentication.
-
Windows 7 and later Microsoft operating systems extend the workgroup with _____.Windows 7 and later Microsoft operating systems extend the workgroup with a homegroup option that uses a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.
-
In larger networks, a centralized file server or print server, sometimes denoted _____, is typically used. A _____ process on the local user computer takes the initiative to start the communication, while a _____ process on the file server or print server remote computer passively waits for requests to start a communication session.In larger networks, a centralized file server or print server, sometimes denoted client–server network, is typically used. A client process on the local user computer takes the initiative to start the communication, while a server process on the file server or print server remote computer passively waits for requests to start a communication session.
-
The centralized authentication approach used in larger networks is referred to as a _____, where all _____ are registered with _____.The centralized authentication approach used in larger networks is referred to as a domain, where all user accounts, computers, printers and other security principals, are registered with a central directory service.
Assessments
editSee Also
editReferences
edit- ↑ CLEP: Information Systems
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Wireless access point
- ↑ Wikipedia: IP address
- ↑ Wikipedia: IP address
- ↑ Wikipedia: IP address
- ↑ Wikipedia: IP address
- ↑ Wikipedia: IP address
- ↑ Wikipedia: Shared resource
- ↑ Wikipedia: Shared resource
- ↑ Wikipedia: Workgroup (computer networking)
- ↑ Wikipedia: Features new to Windows 7
- ↑ Wikipedia: Shared resource
- ↑ Wikipedia: Windows domain
- ↑ Wikipedia: computer network
- ↑ Wikipedia: computer network
- ↑ Wikipedia: computer network
- ↑ Wikipedia: cyberspace
- ↑ Wikipedia: cyberspace
- ↑ Wikipedia: Computer Network
- ↑ Wikipedia: Computer Network
- ↑ Wikipedia: Bandwidth
- ↑ Wikipedia:Blog
- ↑ Wikipedia: Bluetooth
- ↑ Wikipedia: Broadband
- ↑ Wikipedia: Chat room
- ↑ Wikipedia: Client (computing)
- ↑ Wikipedia: Cyberspace
- ↑ Wikipedia: Computer Network
- ↑ Wikipedia: Download
- ↑ Wikipedia: IP address
- ↑ Wikipedia: Ethernet
- ↑ Wikipedia: File server
- ↑ Wikipedia: Internet forum
- ↑ Wikipedia: Global Positioning System
- ↑ Wikipedia: Instant Messaging
- ↑ Wikipedia: Local area network
- ↑ Wikipedia: Mesh network
- ↑ Wikipedia: Computer network
- ↑ Wikipedia : Network Administrator
- ↑ Wikipedia: Network interface controller
- ↑ Wikibooks: Introduction to Computer Information Systems/Computer Networks
- ↑ Wikipedia: Network Operating System
- ↑ Wikipedia: Network Packet
- ↑ [[4]]
- ↑ Wikipedia: Network Topology
- ↑ Wikipedia: Node (networking)
- ↑ Wikipedia: Computer network
- ↑ Wikipedia: Packet switching
- ↑ Wikipedia: Peer-to-Peer Protocol (P2PP)
- ↑ Wikipedia: Point of presence
- ↑ Wikipedia: Protocol
- ↑ Wikipedia: Radio-frequency identification
- ↑ Wikipedia: Router (computing)
- ↑ Wikipedia: IP address
- ↑ https://support.bell.ca/Internet/Connection-help/What-do-SSID-and-WPA2-mean
- ↑ Wikipedia: Internet protocol suite
- ↑ Wikipedia: Telecommunication
- ↑ Wikipedia: Text messaging
- ↑ Wikipedia: Twisted pair
- ↑ Wikipedia: Upload
- ↑ Wikipedia: Virtual private network
- ↑ Wikipedia: Wide area network
- ↑ Wikipedia: Wi-Fi
- ↑ Wikipedia: Wireless access point
- ↑ Wikipedia: Wireless LAN
Lesson 7 - Internet
editThe Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone."[1]
Objectives and Skills
editObjectives and skills for the Internet portion of CLEP Information Systems include:[2]
- Web browsers (URLs, protocols, standards, history, cookies, resource allocation)
- Internet and other online services and methods (World Wide Web, protocol, Web search engines, Web bots, intranet, cloud computing, communications, push/pull technology, W3C)
- Web technologies (HTML, XML, Javascript)
- Web site development (analysis, design, functionality, accessibility)
Readings
editMultimedia
edit- YouTube: How the Internet Works in 5 Minutes
- YouTube: What is the World Wide Web?
- YouTube: Web Development Tutorial for Beginners
- YouTube: JavaScript Tutorial for Beginners
- YouTube: Push Notifications
- YouTube: Cloud Computing Explained
- Youtube: How does Wi-Fi Work
- Youtube:How To: Improve or Optimize Your WIFI Signal
- Youtube:How to: Install VPN on Windows
- Youtube: What is the Internet?
- Youtube: Wi-Fi Security as Fast as Possible
- YouTube: What is a DNS?
- YouTube: How the Internet Was Invented Part 1
Activities
edit- Complete the tutorial GCF Learn Free: Internet 101: Browser Basics.
- Review Learn the Net: Master the basics and Learn the Net: The Web At a Glance.
- Review Google: How Search Works.
- Build a website one or more of the following ways :
- Use Google: Web Designer to build an interactive website through pre-determined templates.
- Review 2 Create a Website and follow the directions to build a website from scratch using HTML and code.
- Use Codecademy: Make a Website to make your own website.
- See how well your web browser scores on the HTML5 standards test, view how other browsers scored, and compare your browser with other browsers.
Research and Discussion
edit- How is the Internet changing education and the learning institutions today? Describe how distance learning has changed how you learn.
- Do you think the Internet needs controls or censorship? Support your answer.
- Communication over the Internet has expanded and broadened everyone's lives. The Internet can have positive and negative affects as we spend time online. Is living in the digital world good or bad for people? Support your answer.
Lesson Summary
editOverview
- The internet also has the ability to "talk" to other computers. The internet is connected to the point where access to just about anything is derived from the internet. The internet is a globally connected network system that uses TCP/IP to transmit data via various types of media. The internet is a network of global exchanges – including private, public, business, academic and government networks – connected by guided, wireless and fiber-optic technologies.[3]
Web Browsers
- Web browsers are used to deliver information resources, which are identified by a Uniform Resource Identifier (URL/URI). The user via a client/server model, can view and access information from the world wide web. [4]
- A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.[5]
- All web browsers follow standards of HTML and XHTML to ensure information is easily shared and communicated. All web browsers utilize protocols, that allow information to be routed between the source host and the user host. [6] [7]
- Cookies and history are used to personalize the users experience on a web page. They are also used to track, retrieve, and present information regarding of past activities on a website. Cookies and history data can be used to modify the user's current activity on the same website. Cookies may be deleted using a browser's Settings or Preferences options.[8] [9]
Internet Services
- The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.[10]
- The World Wide Web is an information system of interlinked hypertext documents and other digital resources that are accessed via the Internet.[11]
- The Internet operates without a central governing body.[12]
- A web search engine is a software system that is designed to search for information on the World Wide Web.[13]
- A web bot is a computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.[14][15]
Web Site Development
- Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).[16]
- Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, and social network services.[17]
- Web development takes into account many security considerations, such as data entry error checking through forms, filtering output, and encryption.[18]
- Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous.[19]
- The World Wide Web is only one of hundreds of services used on the Internet. The Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers(URIs).[20]
- URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web.[21]
- Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.[22]
- World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents.[23]
- Client-side software can include animations, games, office applications and scientific demonstrations.[24]
- The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available.[25]
- Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. [26]
- Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result.[27]
Key Terms
edit- 3G
- The third generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 1998.[28]
- 4G
- The fourth generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 2008.[29]
5G
editThe fifth generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 2017. [30]
- Active Server Pages (ASP)
- A common Microsoft server-side scripting language.[31]
- application server
- A software framework that provides both facilities to create web applications and a server environment to run them.[32]
- Application Service Provider (ASP)
- A business providing computer-based services to customers over a network using a standard protocol.[33]
- blog
- A discussion or informational site published on the World Wide Web and consisting of discrete entries typically displayed in reverse chronological order.[34]
- Business-to-Business (B2B)
- A situation where one business makes a commercial transaction with another.[35]
- Business-to-Consumer (B2C)
- A situation where a business makes a commercial transaction with a consumer.[36]
- cable modem
- A type of network bridge and modem that provides bi-directional data communication via radio frequency channels on a hybrid fibre-coaxial and RFoG infrastructure.[37]
- cloud computing
- A model for enabling ubiquitous, convenient, on-demand access to a shared pool of Internet-based configurable computing resources.[38]
- communication protocol
- A defined set of rules and regulations that determine how data is transmitted in telecommunications and computer networking.[39]
- Consumer-to-Consumer (C2C)
- A situation where a consumer makes a commercial transaction with another consumer.[40]
- Content Management System (CMS)
- A software development system that enables adding or updating text, images, and other Web site content without coding in HTML or using a Web authoring program.[41]
- cookie
- A small file deposited on a user’s hard disk by Web sites, enabling sites to remember what they know about their visitors between sessions.[42]
- cyberspace
- A term used to describe the Internet and other online networks, especially the artificial realities and virtual communities that form on them.[43]
- dial-up
- An early form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.[44]
- digital divide
- A term that describes the divide between the people who do and do not have access to the Internet.[45]
- Domain Name System (DNS)
- A system that translates a computer’s numerical IP address into an easier-to-remember string of names separated by dots.[46]
- Digital Subscriber Line (DSL)
- A family of technologies that are used to transmit digital data over telephone lines.[47]
- dynamic IP address
- An IP address that is assigned to a device when it connects to a network; when that device disconnects from the network, the IP address may be reused.[48]
- e-commerce (electronic commerce)
- Trading in products or services using computer networks, such as the Internet.[49]
- email (electronic mail)
- A method of exchanging digital messages from an author to one or more recipients.[50]
- email server
- A specialized server that acts like a local post office for a particular Internet host.[51]
- extranet
- A website that allows controlled access to partners, vendors and suppliers or an authorized set of customers.[52]
- file server
- In a LAN, a computer used as a storehouse for software and data that are shared by several users.[53]
- file sharing
- File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books.[54]
- File Transfer Protocol (FTP)
- A communications protocol that enables users to download files from remote servers to their computers and to upload files they want to share from their computers to these archives.[55]
- filtering software
- Software that, for the most part, keeps offensive and otherwise inappropriate Web content from being viewed by children, on-duty workers, and others.[56]
- Global Position System (GPS)
- A space-based navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more satellites.[57]
- grid computing
- The collection of computer resources from multiple locations to reach a common goal.[58]
- hotspot
- A physical location that offers Internet access over a wireless local area network (WLAN) through the use of a router connected to a link to an Internet service provider.[59]
- Hypertext Markup Language (HTML)
- A text file that includes codes that describe the format, layout, and logical structure of a hypermedia document.[60]
- Hypertext Transfer Protocol (HTTP)
- An application protocol for distributed, collaborative, hypermedia information systems used as the foundation of data communication for the World Wide Web.[61]
- Hyper Text Transfer Protocol Secure (HTTPS)
- is a communications protocol for secure communication over a computer network which is widely used on the Internet.[62]
- hypertext
- Text displayed on a computer display or other electronic devices with references or links to other text which the reader can immediately access, or where text can be revealed progressively at multiple levels of detail.[63]
- I-commerce
- Broad term covering all commercial activity on the internet, including auctioning, placing orders, making payments, transferring funds, and collaborating with trading partners. Internet commerce is not a synonym for electronic commerce (e-commerce) but one of its subsets.[64]
- Internet
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.[65]
- Internet bot
- Also known as web robot, WWW robot or simply -bot-, is a software application that runs automated tasks (scripts) over the Internet.[66]
- Internet safety
- The knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.[67]
- Internet Service Provider (ISP)
- A business that provides its customers with connections to the Internet along with other services.[68]
- internetworking
- Connecting different types of networks and computer systems.[69]
- intranet
- A private website, accessible only to an organization’s staff. Gives employees the ability to communicate, collaborate, share documents and other information.[70]
- Java
- A platform-neutral, object-oriented programming language developed by Sun Microsystems for use on multiplatform networks.[71]
- JavaScript
- An interpreted scripting language that enables Web page designers to add scripts to HTML code.[72]
- m-commerce (mobile commerce)
- The delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology.[73]
- malware
- Malicious software used and spread on the Internet includes computer viruses which copy with the help of humans, computer worms which copy themselves automatically.[74]
- Massively Multiplayer Online Role-Playing Games (MMORPG)
- Web browser-based games, in which a very large number of players interact with one another within a world.[75]
- net neutrality
- The principle that Internet access should be free from restrictions related to the type of equipment being connected and the type of communication being performed with that equipment.[76]
- open standards
- A standard that is publicly available and has various rights to use associated with it.[77]
- optical fiber
- A flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair.[78]
- packet-switching
- A digital networking communications method that groups all transmitted data into suitably sized blocks which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.[79]
- platform
- Whatever environment a piece of computer software or code object is designed to run within, obeying its constraints, and making use of its facilities.[80]
- plug-in
- P software extension that adds new features.[81]
- pull technology
- Technology in which browsers on client computers initiate requests from server machines before any information is delivered.[82]
- push technology
- Technology in which information is delivered automatically to a client computer.[83]
- Real-Time Communication (RTC)
- An integrated communication environment that permits computer users to exchange multimedia and audio content in real time.[84]
- Really Simple Syndication (RSS)
- An XML-based format for publishing frequently updated information.[85]
- satellite internet
- Internet access provided through communications satellites.[86]
- search engine optimization
- The process of affecting the visibility of a website or a web page in a search engine's unpaid results.[87]
- spam
- Unsolicited or undesired electronic messages.[88]
- static IP address
- An IP address assigned semipermanently to a particular device connected to a network.[89]
- social networking
- A platform to build relationships among people who share similar interests, activities, backgrounds or real-life connections.[90]
- streaming audio
- Sound files that play without being completely downloaded to the local hard disk.[91]
- streaming video
- Video clip files that play while being downloaded.[92]
- telecommuting
- A work arrangement in which employees use technology to reduce or eliminate commuting time.[93]
- Telnet
- An application protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.[94]
- Uniform Resource Identifier (URI)
- A string of characters used to identify a resource [95]
- Uniform Resource Locator (URL)
- The address of a Web site.[96]
- Virtual Private Network (VPN)
- A dedicated connection to a local area network via the internet.[97]
- Voice over IP (VoIP)
- A methodology and group of technologies for the delivery of voice communications and multimedia sessions over IP networks, such as the Internet.[98]
- World Wide Web Consortium (W3C)
- The main international standards organization for the World Wide Web.[99]
- web authoring software
- Programs that work like desktop publishing page layout programs to allow users to create, edit, and manage Web pages and sites without having to write HTML code.[100]
- web bot
- an internet bot computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. [101]
- web development
- A broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).[102]
- web portal
- A Web site designed as a Web entry station, offering quick and easy access to a variety of services.[103]
- web search engine
- A web search engine is a software system that is designed to search for information on the World Wide Web.[104]
- web server
- A server that stores Web pages and sends them to client programs that request them.[105]
- World Wide Web (WWW)
- Part of the Internet, a collection of multimedia documents created by organizations and users worldwide linked by hypertext.[106]
- Extensible Markup Language (XML)
- A markup language that defines a set of rules for encoding documents in a format which is both human-readable and machine-readable.[107]
Review Questions
edit-
A web browser is _____.A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.
-
Web browsers are _____.Web browsers are used to deliver information resources, which are identified by a Uniform Resource Identifier (URL/URI), to the user via a client/server model, so that the user can view and access information from the world wide web.
-
All web browsers follow standards of _____.All web browsers follow standards of HTML and XHTML to ensure information is easily shared and communicated and all web browsers utilize protocols, allowing information to be routed between the source host and the user host.
-
Cookies and history are used to _____.Cookies and history are used to personalize the users experience on a web page and also used to track, retrieve, and present information regarding past activity on a website and use it to modify the user's current activity on the same website.
-
The Internet is _____.The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
-
The World Wide Web is _____.The World Wide Web is an information system of interlinked hypertext documents and other digital resources that are accessed via the Internet.
-
The Internet operates _____.The Internet operates without a central governing body.
-
A web search engine _____.A web search engine is a software system that is designed to search for information on the World Wide Web.
-
A web bot is _____.A web bot is a computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.
-
Web development is _____.Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).
-
Web development can range from _____.Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, and social network services.
-
Web development takes into account _____.Web development takes into account many security considerations, such as data entry error checking through forms, filtering output, and encryption.
-
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but _____.Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous.
-
The World Wide Web is only one of _____.The World Wide Web is only one of hundreds of services used on the Internet. The Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers(URIs).
-
URIs symbolically identify _____.URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web.
-
Web services also use HTTP to _____.Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.
-
World Wide Web browser software, such as _____, lets users _____.World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents.
-
Client-side software can include _____.Client-side software can include animations, games, office applications and scientific demonstrations.
-
The Web has also enabled individuals and organizations to publish _____.The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available.
Assessments
editSee Also
editReferences
edit- ↑ Internet definition
- ↑ CLEP: Information Systems
- ↑ "What is the Internet? - Definition from Techopedia". Techopedia.com. Retrieved 2019-06-09.
- ↑ Wikipedia: Web browser
- ↑ Wikipedia: Web browser
- ↑ Wikipedia: Web browser
- ↑ Wikipedia: Internet Protocol
- ↑ Wikipedia: HTTP cookie
- ↑ Wikipedia: Web browser history
- ↑ Wikipedia: Internet
- ↑ Wikipedia: World Wide Web
- ↑ Wikipedia: Internet
- ↑ Wikipedia: Web search engine
- ↑ Wikipedia: Web Bot
- ↑ Wikipedia: Internet bot
- ↑ Wikipedia:Web development
- ↑ Wikipedia:Web development
- ↑ Wikipedia:Web development
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia:Internet
- ↑ Wikipedia: 3G
- ↑ Wikipedia: 4G
- ↑ "What Is 5G?". PCMAG. Retrieved 2018-06-14.
- ↑ Wikipedia: Active Server Pages
- ↑ Wikipedia: Application server
- ↑ Wikipedia: Application Service Provider
- ↑ Wikipedia: Blog
- ↑ Wikipedia:Business-to-Business
- ↑ Wikipedia:Business-to-Business
- ↑ Wikipedia: Cable modem
- ↑ Wikipedia: Cloud computing
- ↑ Wikipedia: Protocol
- ↑ Wikipedia:Business-to-Business
- ↑ Wikipedia: Content management
- ↑ Wikipedia: HTTP cookie
- ↑ Wikipedia: Cyberspace
- ↑ Wikipedia: Dial-up Internet access
- ↑ Wikipedia: Digital divide
- ↑ Wikipedia: Domain Name System
- ↑ Wikipedia:Digital_subscriber_line
- ↑ Wikipedia: IP address
- ↑ Wikipedia: E-commerce
- ↑ Wikipedia: Email
- ↑ Wikipedia: Message transfer agent
- ↑ Wikipedia:Extranet
- ↑ Wikipedia: File server
- ↑ Wikipedia: File sharing
- ↑ Wikipedia: File Transfer Protocol
- ↑ Wikipedia: Content-control software
- ↑ Wikipedia: Global Positioning System
- ↑ Wikipedia:Grid computing
- ↑ Wikipedia: Hotspot
- ↑ Wikipedia: HTML
- ↑ Wikipedia: Hypertext Transfer Protocol
- ↑ Wikipedia: HTTPS
- ↑ Wikipedia: Hypertext
- ↑ "What is internet commerce? definition and meaning". BusinessDictionary.com. Retrieved 2018-06-14.
- ↑ Wikipedia: Internet
- ↑ Wikipedia: Internet Bot
- ↑ wikipedia: Internet safety
- ↑ Wikipedia: Internet service provider
- ↑ Wikipedia: Internetworking
- ↑ Wikipedia: Intranet
- ↑ Wikipedia: Java
- ↑ Wikipedia: JavaScript
- ↑ Wikipedia: Mobile commerce
- ↑ Wikipedia: Malware
- ↑ Wikipedia: Massively multiplayer online role-playing game
- ↑ Wikipedia: Net neutrality
- ↑ Wikipedia: Open standard
- ↑ Wikipedia: Optical fiber
- ↑ Wikipedia: Packet switching
- ↑ Wikipedia: Computing platform
- ↑ Wikipedia: Plug-in (computing)
- ↑ Wikipedia: Pull Technology
- ↑ Wikipedia: Push technology
- ↑ Wikipedia: Real-time communication (RTC)
- ↑ Wikipedia: RSS
- ↑ Wikipedia: Satellite Internet access
- ↑ Wikipedia: Search engine optimization
- ↑ Wikipedia: Spam
- ↑ Wikipedia: IP address
- ↑ Wikipedia: Social networking service
- ↑ Wikipedia: Streaming media
- ↑ Wikipedia: Streaming media
- ↑ Wikipedia: Telecommuting
- ↑ Wikipedia: Telnet
- ↑ Wikipedia: Uniform resource identifier
- ↑ Wikipedia: Uniform resource locator
- ↑ Wikipedia: Virtual Private Network
- ↑ Wikipedia: VoIP
- ↑ Wikipedia: World Wide Web Consortium
- ↑ Wikipedia: HTML editor
- ↑ Wikipedia: Web bot
- ↑ Wikipedia: Web development
- ↑ Wikipedia: Web portal
- ↑ Wikipedia: Web search engine
- ↑ Wikipedia: Web server
- ↑ Wikipedia: World Wide Web
- ↑ Wikipedia: XML
Lesson 8 - Security
editThis lesson covers security in various forms of technology, such as phones, the internet, and computers.
Objectives and Skills
editObjectives and skills for the security portion of CLEP Information Systems include:[1]
- Economic effects (secure transactions, viruses, malware, cost of security)
- Privacy concerns (individual, business, identity theft)
- Computer security and controls (system, application, personal computer, disaster recovery)
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Security
- Wikipedia: Computer security
- Wikipedia: Backup
- Wikipedia: Data recovery
- Wikipedia: Internet safety
- Wikipedia: Internet security
- Wikipedia: Internet privacy
- Wikipedia: Multi-factor authentication
- Wikipedia: Password manager
- Wikipedia: Mobile Security
- Wikipedia: Phishing
- Wikipedia: Encryption
Multimedia
edit- YouTube: Protecting Your Computer from Malware
- YouTube: Malware: Difference Between Computer Viruses, Worms and Trojans
- YouTube: Backup and Disaster Recovery Explained
- YouTube: How your computer gets hacked in under a minute
- YouTube: Computer Security
- YouTube: Securing your WIFI network
- YouTube: 5 tips for staying safe on the web
- YouTube: Protect your Privacy Completely: Web Browsing with TAILS
- YouTube: How to create a strong password
- YouTube: What is Two-Factor Authentication? (2FA)
- YouTube: Common Threats to Information Security
- YouTube: HTTPS and SSL tutorial
- YouTube: Information Security Management-Learn and Gain
- YouTube: Cyber Security – Top 10 Threats
- [https://www.youtube.com/watch?v=q2nsUgG0zfQ YouTube: The Best Password Managers, Compared
Activities
edit- Research Data Backup and Recovery. Schedule and perform regular data backups.
- Learn tips to make stronger passwords. Then research password managers. Consider installing and using a password manager on your system.
- Configure password management on your system.
- Windows: Review Microsoft: How to Configure Security Policy Settings. Consider modifying Password Policy and Account Lockout Policy settings.
- Linux: Review Xmodulo: How to set password policy on Linux. Consider modifying password policy settings.
- Mac: Review Mac Security. Consider one of these options for best Mac security.
- Research multi-factor authentication. Consider setting up multi-factor authentication on your Apple, Facebook, Google, and/or Microsoft accounts, as well as your password manager and your financial institutions.
- Review Protecting Your Computer. Use anti-malware software to scan your system and test malware detection.
- All: Set anti-malware,anti-virus software and operating system to automatically update.
- All: Review Wikipedia: Comparison of antivirus software. Download a free, well-known anti-malware application and scan your system.
- All: Review Wikipedia: EICAR test file. Download and save the EICAR test file to test your anti-malware application and follow the process for removing malware.
- Review Wikipedia: Wardriving. Use a free wireless scanner and scan your environment for wireless networks:
- Windows:
- Review BitDreamers: Improve WLAN Signal Without Additional Tools on Windows.
- Use the
netsh wlan show networks mode=bssid
command to scan for wireless networks.
- macOS:
- Review AppStorm: How to Discover Any Network with iStumbler.
- Download and install iStumbler and scan for wireless networks.
- Linux:
- Review TuxMobil.org: Linux Wireless Sniffer.
- Download and install a wireless scanner and scan for wireless networks.
- Android:
- Review Google: farproc Wifi Analyzer.
- Download and install Wifi Analyzer and scan for wireless networks.
- iOS:
- Review WLANBook: Free WiFi Scanner for iPhone and iPad Without Jailbreak.
- Download and install the Apple AirPort Utility and scan for wireless networks.
- Windows:
- Windows password security testing:
- Test your Windows environment to extract plain texts passwords, hash, PIN codes, and kerberos tickets from memory through the use of Mimikatz.
Research and Discussion
edit- You are browsing the Internet at your favorite restaurant. How can you browse the Internet safely? Identify different threats and potential solutions associated with using unsecured Wi-Fi locations?
- Identify various vulnerabilities that can affect you, your personal information. and your computer devices. Research, discuss and share information on how you can protect yourself against identify theft.
- Security is an important concern while using email. Identify risks and list best practice solutions on how to safely use email.
- Research top security software for common personal computer and mobile platforms. Include both proprietary and open source options. Install and test trial versions of one or more products. Which products would you recommend others use, and why?
Lesson Summary
edit- Computer security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[2] This includes controlling physical access to hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.[3] There are security tips you can follow to protect your computer and personal information. Tips, like updating your software, turning on two-factor authentication protection of passwords, back up your files and giving personal information over encrypted websites only, will keep Security threats like backdoors, denial-of-service attacks, direct-access attacks, eavesdropping, malware, spoofing, tampering, privilege escalation, phishing, and clickjacking.[4] at a distance.[5]
- Network Backups is a system where the named data from a single computer/network of computers is dispatched and sent to a backup server.[6] The primary aim of backups is to recover data after its loss, be it by data deletion or corruption and the minor purpose is to recover data from an earlier time, according to a user-defined data retention policy.[7]
- Data recovery is a process of retrieving inaccessible data from corrupted or damaged secondary storage, removable media or files, when the data they store cannot be accessed in a normal way.[8] Data recovery framework involves an operating system failure, break down and logical failure of storage devices and accidental damages.[9]
- A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.[10] It responds to unplanned incidents with precautions to minimize the effects of a disaster for an organization to continue with its operations.[11]
- Internet safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.[12] For your own safety from hackers, you need to keep your personal information professional and limited, keep your privacy settings on and practice safe browsing among other safe rules.[13]
- Common threats to personal safety on the Internet include cyberstalking, cyberbullying, online predation, and obscene/offensive content.[14]. we need to take precautions whenever we are suspicious of these threats.
- Malware, short for malicious software, is any software used to cause damage to a computer network, gather sensitive information, or gain access to private computer systems. It includes botnets, viruses, Trojan horses, spyware, scareware, ransomware, and worms.[15]. A game plan for protecting against malware is to stop harmful software from gaining access to the target computer.
- Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.[16] It is concerned with protecting user information. Privacy can entail either Personally-Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.[17]
- Risks to Internet privacy include activity monitoring, content searches, and social network profiling. [18].You may, however, protect your privacy online by using built-in features of many social networks and browsers and third-party tools.[19]
- Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages through credentials based on knowledge (something you know), possession (something you have), and inherence (something you are).[20]. in other words, it is a system that requires more than one method of authentication from a self-reliant listing of credentials to verify a user's identity for login.
- A password manager is a software application that helps a user store and organizes passwords.[21]. It assists in initiating and retrieving complex passwords, possibly calculating them on request. Password managers require a user to remember and create one master password to unlock and access any information stored in their databases.
Key Terms
edit- authentication
- The process of confirming identity.[22]
- authorization
- The function of specifying access rights to resources.[23]
- backdoor
- A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.[24]
- backup
- Copying and archiving of computer data so it may be used to restore the original after a data loss event.[25]
- biometrics
- Refers to measurements of human characteristics. [26]
- BitLocker
- A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and later Windows operating systems.[27]
- bot
- A software application that runs automated tasks over the Internet. [28]
- botnet
- A number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.[29]
- brute-force attack
- A cryptanalytic attack that consists of systematically checking all possible keys or passwords until the correct one is found.[30]
- computer forensics
- A branch of digital forensic science pertaining to the recovery and investigation of material found in computers and digital storage media, often related to computer crime. [31]
- computer security
- The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[32]
- cyber crime
- Any crime that involves a computer and a network.[33]
- cryptography
- the practice and study of techniques for secure communication in the presence of third parties called adversaries.[34]
- denial-of-service attack
- An attempt to make a machine or network resource unavailable to its intended users.[35]
- device hardening
- The process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services.[36]
- dictionary attack
- A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities from a list.[37]
- disaster recovery plan
- A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.[38]
- dumpster diving
- The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, but that may prove useful to the collector.[39]
- eavesdropping
- The act of surreptitiously listening to a private conversation, typically between hosts on a network.[40]
- encryption
- The process of encoding messages or information in such a way that only authorized parties can read it.[41]
- ethical hacker
- A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[42]
- filter
On the Internet, a filter is a program to screen and exclude from access or availability Web pages or e-mail that is deemed inappropriate.[43]
- firewall
- A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[44]
- hacking
- Seek and exploit weaknesses in a computer system or computer network.[45]
- HTTPS
- A communications protocol for secure communication over a computer network which is widely used on the Internet.[46]
- identity theft
- The deliberate use of someone else's personal information, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name.[47]
- internet security
- A catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.[48]
- iptables
- A Linux kernel software firewall that allows system administrators to configure rules and chains.[49]
- keystroke logging
- The action of recording the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.[50]
- malware
- Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.[51]
- multi-factor authentication
- A method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories of knowledge, possession, and inherence.[52]
- packet sniffer
- A computer program that can intercept and log traffic passing over a digital network.[53]
- password complexity
- The length and character set combinations used to create a password, such as upper case and lower case letters, numbers, and punctuation.[54]
- password confidentiality
- A set of rules or a promise that limits access or places restrictions on password sharing.[55]
- password cracking
- The process of recovering passwords from data that have been stored in or transmitted by a computer system, most often through brute-force or dictionary attacks.[56]
- password expiration
- A policy that requires users to change passwords periodically.[57]
- password reuse
- A policy that prevents users from repeating recently used passwords.[58]
- permissions
- Access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects.[59]
- penetration test
- A targeted and simulated attack on a system to identify potential security vulnerabilities.[60]
- phishing
- The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[61]
- physical security
- Measures designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm.[62]
- ransomware
- A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed.[63]
- rootkit
- A stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.[64]
- security patch
- A change applied to an asset to correct the weakness described by a vulnerability.[65]
- shoulder surfing
- Using direct observation techniques to obtain information such as passwords, PINs, security codes, and similar data.[66]
- single sign-on
- A property of access control systems that allows a user to log in once and gain access to all interrelated systems without being prompted to log in again.[67]
- social engineering
- Psychological manipulation of people to cause them to perform actions or divulge confidential information.[68]
- spam
- Unsolicited electronic messages, especially advertising.[69]
- spoofing
- Concealing the identity of the sender by impersonating another computing system.[70]
- spyware
- Software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.[71]
- system administrator
- A person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers.[72]
- Trojan
- A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm.[73]
- virus
- A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware.[74]
- worm
- A standalone malware computer program that replicates itself in order to spread to other computers.[75]
- WPA / WPA2 (Wi-Fi Protected Access)
- Security protocol used secure wireless computer networks.[76]
- zombie computer
- A computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.[77]
Review Questions
edit-
Computer security is _____.Computer security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
-
Computer security includes _____.Computer security includes controlling physical access to hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
-
Security threats include _____.Security threats include backdoors, denial-of-service attacks, direct-access attacks, eavesdropping, malware, spoofing, tampering, privilege escalation, phishing, and clickjacking.
-
Internet safety is _____.Internet safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
-
Network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules is called ________.Network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules is called Firewall.
-
Process of encoding messages or information in a way that only authorized parties can read it is called ________.Process of encoding messages or information in a way that only authorized parties can read it is called Encryption.
-
Common threats to personal safety on the Internet include _____.Common threats to personal safety on the Internet include cyberstalking, cyberbullying, online predation, and obscene/offensive content.
-
Malware, short for malicious software, is _____. It includes _____.Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
-
Malware, includes _____.Malware includes botnets, viruses, Trojan horses, spyware, scareware, ransomware, and worms.
-
Internet privacy involves _____.Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
-
Privacy can entail either _____.Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
-
Risks to Internet privacy include _____.Risks to Internet privacy include activity monitoring, content searches, and social network profiling.
-
Multi-factor authentication (MFA) is _____.Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages through credentials based on knowledge (something you know), possession (something you have), and inherence (something you are).
-
A password manager is _____.A password manager is a software application that helps a user store and organize passwords.
-
A non-self-replicating type of malware program which typically causes loss or theft of data, and possible system harm is called ______.A non-self-replicating type of malware program which typically causes loss or theft of data, and possible system harm is called Trojan.
Assessments
edit- Flashcards: / Study Stack: Information Security
- Quiz: Quizlet: Information Systems - Security
- Flashcards: Quizlet: Information Security & Computer Fraud
- Picture Match: / Study Stack: Information Security
See Also
edit- Introduction to Computers/Security
- Internet Fundamentals
- IT Fundamentals/Security
- IT Security
- Wikibooks: Information Security in Education/Authentication
- FBI:Cyber Crime
- Definition of Cybercrime and Examples
- Identity theft and cybercrime statistic
- Make Us Of: 10 ways to never get a virus
- How Stuff Works: How computer viruses work
- Lifehack: 10 free ways to track your passwords
- Last Pass: A Simple Password Solution - How it works
- Life Wire: 5 ways to back up your data and keep it safe
- Benefits of Using a Password Manager
- 10 Ways to Protect Yourself
References
edit- ↑ CLEP: Information Systems
- ↑ Wikipedia: Computer security
- ↑ Wikipedia: Computer security
- ↑ Wikipedia: Computer security
- ↑ https://www.consumer.ftc.gov/articles/0009-computer-security
- ↑ https://nordic-backup.com/blog/why-network-backup-is-essential-for-your-business/
- ↑ Wikipedia: Backup
- ↑ Wikipedia: Data recovery
- ↑ https://en.wikipedia.org/wiki/Data_recovery
- ↑ Wikipedia: Disaster recovery plan
- ↑ https://searchdisasterrecovery.techtarget.com/definition/disaster-recovery-plan
- ↑ Wikipedia: Internet safety
- ↑ https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-online
- ↑ Wikipedia: Internet safety
- ↑ Wikipedia: Internet security
- ↑ Wikipedia: Internet privacy
- ↑ Wikipedia: Internet privacy
- ↑ Wikipedia: Internet privacy
- ↑ https://blog.trendmicro.com/protecting-your-privacy-part-1-the-privacy-risks-of-social-networks-and-online-browsing/
- ↑ Wikipedia: Multi-factor authentication
- ↑ Wikipedia: Password manager
- ↑ Wikipedia: Authentication
- ↑ Wikipedia: Authorization (computer access control)
- ↑ Wikipedia: Backdoor (computing)
- ↑ Wikipedia: Backup
- ↑ Wikipedia: Biometrics
- ↑ Wikipedia: BitLocker
- ↑ Wikipedia: Internet bot
- ↑ Wikipedia: Botnet
- ↑ Wikipedia: Brute-force attack
- ↑ Wikipedia: Computer forensics
- ↑ Wikipedia: Computer security
- ↑ Wikipedia: Computer crime
- ↑ Wikipedia: Cryptography
- ↑ Wikipedia: Denial-of-service attack
- ↑ Wikipedia: Hardening (computing)
- ↑ Wikipedia: Dictionary attack
- ↑ Wikipedia: Disaster recovery plan
- ↑ Wikipedia: Garbage picking
- ↑ Wikipedia: Eavesdropping
- ↑ Wikipedia: Encryption
- ↑ Wikipedia: White hat (computer security)
- ↑ [[5]]
- ↑ Wikipedia: Firewall (computing)
- ↑ Wikipedia: Hacker (computer security)
- ↑ Wikipedia: HTTPS
- ↑ Wikipedia: Identity theft
- ↑ Techopedia; Internet Security
- ↑ Wikipedia: Iptables
- ↑ Wikipedia: Keystroke logging
- ↑ Wikipedia: Malware
- ↑ Wikipedia: Multi-factor authentication
- ↑ Wikipedia: Packet analyzer
- ↑ Wikipedia: Password strength
- ↑ Wikipedia: Confidentiality
- ↑ Wikipedia: Password cracking
- ↑ Wikipedia: Password policy
- ↑ Wikipedia: Password policy
- ↑ Wikipedia: File system permissions
- ↑ Wikipedia: Penetration_test
- ↑ Wikipedia: Phishing
- ↑ Wikipedia: Physical security
- ↑ Wikipedia: Ransomware
- ↑ Wikipedia: Rootkit
- ↑ Wikipedia: Security patch
- ↑ Wikipedia: Shoulder surfing (computer security)
- ↑ Wikipedia: Single sign-on
- ↑ Wikipedia: Social engineering (security)
- ↑ Wikipedia: Spamming
- ↑ Wikipedia: IP address spoofing
- ↑ Wikipedia: Spyware
- ↑ Wikipedia: System administrator
- ↑ Wikipedia: Trojan horse (computing)
- ↑ Wikipedia: Computer virus
- ↑ Wikipedia: Computer worm
- ↑ Wikipedia: Wi-Fi Protected Access
- ↑ Wikipedia: Zombie computer
Lesson 9 - Information Systems
editAn information system (IS) is an organized system for the collection, organization, storage and communication of information. More specifically, it is the study of complementary networks that people and organizations use to collect, filter, process, create and distribute data.[1]
Objectives and Skills
editObjectives and skills for the information systems portion of CLEP Information Systems include:[2]
- Specialized systems (expert systems, collaborative systems, DSS, GIS, BI, workflow management, project management tools)
- Electronic Data Interchange (standards, tools, characteristics, types of transactions)
- Enterprise-wide systems (ERP, CRM, SCM)
- Knowledge management (capturing, distributing, summarizing)
- Business strategies (competition, process re-engineering, process modeling, e-commerce, TQM, Web 2.0)
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Information Systems
- Wikipedia: Learning management system
- Wikipedia: Management information system
- Wikipedia: Transaction processing system
- Wikipedia: Office automation
- Wikipedia: Expert system
- Wikipedia: Enterprise resource planning
- Wikipedia: Knowledge management
- Wikipedia: Decision support system
- Wikipedia: Geographic information system
- Wikipedia: Systems development life cycle
- Wikipedia: Web 2.0
Multimedia
edit- YouTube: Knowledge Management Basics
- YouTube: What is EDI (Electronic Data Interchange)?
- YouTube: What is a Database?
- YouTube: How IT and Business Process Fit Together
- YouTube: Geographic Information Systems (GIS)
- YouTube: What is a Workflow?
- YouTube: What is Business Intelligence (BI)?
- YouTube: What is an ERP system
- YouTube: Introduction to Customer Relationship Management (CRM)
- YouTube: Decision Support System (DSS)
- YouTube: The 5 Components of an Information System
- YouTube: Microsoft Dynamics 365
Activities
edit- Review Wikipedia: Information system. Create a list of information systems you encounter every day. What systems and devices do you use that capture and interpret information? This may include computers, automobiles, shopping at stores, Internet purchases, Internet surfing, business systems, accounting systems, healthcare systems, etc.
- Review Wikipedia: Privacy. Consider the information that various vendors and providers track about you. What information do they have? How is your information used and who do they share it with? Select a vendor or provider and read their privacy policy to find out.
- Review Wikipedia: Enterprise resource planning. Research ERP systems. Who are the top three or top five vendors? Find out what these systems cost and consider why a company would make an investment in this type of system. Provide examples.
- Review Wikipedia: Supply chain management. Think about a recent manufactured food or beverage product purchase you made at a store. Now consider the full supply chain involved in making that item available for you to purchase. What inventory control systems are likely in place at the store, the distributor, and the manufacturer? What manufacturing processes and ingredients were necessary, and what information systems would have been required to support manufacturing and delivering this product to you?
- Review Wikipedia: Watson (computer). IBM's Watson computer system is now being used to improve health care. How does Watson use knowledge management concepts to improve healthcare, and what types of benefits are being seen? Provide examples.
- Review Wikipedia: Geographic Information System. Consider goods or services needed in your area(park, hospital etc.). Now, determine where the providers of these services should be placed.
Research and Discussion
edit- Employment in computer and information technology occupations are expected to increase within the next ten years. With these different types of advancements in information systems, what types of potential skills do you feel will be necessary for students to need to be successful?
- Most information systems include the discussion of hardware, software, data, people, and procedures. What is the importance of including people? What are some skills and concepts that are critical for people in information technology to be successful? Discuss.
- With our current use of technology and information system resources, do you feel that you receive enough information or not enough information to make appropriate decisions (personally or professionally)? Discuss.
- Many individuals may agree that the use of robots has benefits for our society. What do you think would be some potential positive and negative implications?
- From the above readings, select an information system and explain how that information system relates to you. Support your answer with potential advantages and disadvantages.
Lesson Summary
edit- An information system is any organized system for the collection, organization, storage and communication of information.[3]
- Information systems aim to support operations, management, and decision making through inter-relation between data systems and activity systems.[4]
- Information systems are a combination of hardware, software, data, procedures, people, and feedback.[5]
- Expert systems are computer systems that emulate the decision-making ability of a human expert.[6]
- An expert system is divided into two sub-systems: the knowledge base and the inference engine. The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts.[7]
- Electronic data interchange (EDI) is an electronic communication method that provides standards for exchanging data via any electronic means. By adhering to the same standard, two different companies or organizations, even in two different countries, can electronically exchange documents (such as purchase orders, invoices, shipping notices, and many others).[8]
- EDI and other similar technologies save a company money by providing an alternative to, or replacing, information flows that require a great deal of human interaction and paper documents.[9]
- Barriers to implementing EDI systems include necessary business process changes and cost in time and money for initial set-up.[10]
- Enterprise resource planning (ERP) is business management software that an organization can use to collect, store, manage and interpret data from a variety of business activities.[11]
- ERP systems may include product planning, manufacturing or service delivery, marketing and sales, inventory management, shipping, and payment.[12]
- Knowledge management (KM) is the process of capturing, developing, sharing, and effectively using organizational knowledge.[13]
- Knowledge management efforts typically focus on organizational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organization.[14]
- GIS is a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographic data.[15]
Key Terms
edit- access point
- Box consisting of a radio receiver/transmitter and antennae that link to a wired network, router, or hub.[16]
- acceptance testing
- Provides the final certification that the system is ready to be used in a production setting.[17]
- artificial intelligence (AI)
- is intelligence demonstrated by machines, in contrast to the natural intelligence (NI) displayed by humans and other animals. In computer science AI research is defined as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[18]
- batch processing
- The execution of a series of programs on a computer without manual intervention.[19]
- business intelligence (BI)
- A set of techniques and tools for the acquisition and transformation of raw data into meaningful and useful information for business analysis purposes.[20]
- business strategy
- The formulation and implementation of the major goals and initiatives taken by a company's top management on behalf of owners, based on consideration of resources and an assessment of the internal and external environments in which the organization competes.[21]
- cost-benefit analysis (CBA)
- A systematic approach to estimating the strengths and weaknesses of alternatives that satisfy transactions, activities or functional requirements for a business.[22]
- critical path method (CPM)
- An algorithm for scheduling a set of project activities based on the time (duration) that each activity will take to complete, the dependencies between the activities, and logical end points such as milestones or deliverable items.[23]
- critical success factor (CSF)
- An element that is necessary for an organization or project to achieve its mission.[24]
- customer relationship management (CRM)
- An approach to managing a company’s interactions with current and future customers that often involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support.[25]
- data mining
- Analysis of large pools of data to find patterns and rules that can be used to guide decision making and predict future behavior.[26]
- data administration
- A special organizational function for managing the organization's data resources, concerned with information policy, data planning, maintenance of data dictionaries, and data quality standards.[27]
- database management system (DBMS)
- A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.[28]
- decision support system (DSS)
- A computer-based information system that supports business or organizational decision-making activities.[29]
- E-commerce (electronic commerce)
- Trading in products or services using computer networks, such as the Internet.[30]
- eLearning
- eLearning technology enables organizations to create customized training and education software. This can include lesson plans, monitoring progress against learning goals, online classes, etc. eLearning technology enables organizations to significantly reduce the cost of training and educating their members.[31]
- electronic data interchange (EDI)
- An electronic communication method that provides standards for exchanging data via any electronic means.[32]
- enterprise portal
- Web site that aggregates information across the entire organization or for groups within the organization such as project teams.[33]
- enterprise resource planning (ERP)
- Business management software that a company can use to collect, store, manage and interpret data from many business activities.[34]
- executive information system (EIS)
- A type of management information system that facilitates and supports senior executive information and decision-making needs.[35]
- expert system
- A computer system that emulates the decision-making ability of a human expert. [36]
- GIGO (garbage in, garbage out)
- Describes how computers may unquestioningly process unintended, even nonsensical, input data and produce undesired, often nonsensical, output.[37]
- geographic information system (GIS)
- A system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.[38]
- groupware
- Technologies that facilitate collaboration and sharing of organizational information. One of the earliest very successful products in this category was Lotus Notes. Notes provided tools for threaded discussions, sharing of documents, organization wide uniform email, etc.[39]
- information system
- A system composed of people and computers that processes or interprets information.[40]
- knowledge base
- Represents facts and rules.[41]
- knowledge management (KM)
- The process of capturing, developing, sharing, and effectively using organizational knowledge, It refers to a multi-disciplinary approach to achieving organizational objectives by making the best use of knowledge.[42]
- learning management system (LMS)
- Is a software application for the administration, documentation, tracking, reporting and delivery of educational courses or training programs.[43]
- management information system (MIS)
- The management of information systems to provide efficiency and effectiveness of strategic decision making. [44]
- robot
- A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically.[2] Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed to take on human form but most robots are machines designed to perform a task with no regard to how they look.[45]
- scheduling and planning tools
- Automate the creation and maintenance of an organization's schedule: scheduling meetings,notifying people of a meeting, etc. An example of a well known scheduling tool is Microsoft Outlook. The planning aspect can integrate with project management tools such as Microsoft Project. Some of the earliest successful uses of KM technology in the business world were the development of the following types of tools: online versions of corporate "yellow pages" with listing of contact info, relevant knowledge, and work history.[46]
- strategic planning
- An organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy.[47]
- supply chain management (SCM)
- The oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. .[48]
- telepresence
- Telepresence technology enables individuals to have virtual meetings rather than having to be in the same place. Videoconferencing is the most obvious example.[49]
- Total Quality Management (TQM)
- Consists of organization-wide efforts to install and make permanent a climate in which an organization continuously improves its ability to deliver high-quality products and services to customers.[50]
- software prototyping
- The activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed.[51]
- transaction processing system (TPS)
- A software system, or software/hardware combination, that processes data by dividing the processes into individual, indivisible operations.[52]
- value added network (VAN)
- A hosted service offering that acts as an intermediary between business partners sharing standards based on proprietary data via shared business processes. [53]
- value chain
- A set of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.[54]
- Web 2.0
- refers to World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users.[55]
- workflow tools
- Allow the representation of processes associated with the creation, use, and maintenance of organizational knowledge. For example the process to create and utilize forms and documents within an organization. For example, a workflow system can do things such as send notifications to appropriate supervisors when a new document has been produced and is awaiting their approval.[56]
- workflow management system (WMS)
- Provides an infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged as a workflow.[57]
Review Questions
edit-
An information system is _____.An information system is any organized system for the collection, organization, storage and communication of information.
-
Information systems aim to _____.Information systems aim to support operations, management and decision making through inter-relation between data systems and activity systems.
-
Information systems are a combination of _____, _____, _____, _____, _____, and _____.Information systems are a combination of hardware, software, data, procedures, people, and feedback.
-
Expert systems are _____.Expert systems are computer systems that emulate the decision-making ability of a human expert.
-
An expert system is divided into two sub-systems: _____ and _____. _____ represents facts and rules. _____ applies the rules to the known facts to deduce new facts.An expert system is divided into two sub-systems: the knowledge base and the inference engine. The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts.
-
Electronic data interchange (EDI) is _____.Electronic data interchange (EDI) is an electronic communication method that provides standards for exchanging data via any electronic means. By adhering to the same standard, two different companies or organizations, even in two different countries, can electronically exchange documents (such as purchase orders, invoices, shipping notices, and many others).
-
EDI and other similar technologies save a company money by _____.EDI and other similar technologies save a company money by providing an alternative to, or replacing, information flows that require a great deal of human interaction and paper documents.
-
Barriers to implementing EDI systems include _____.Barriers to implementing EDI systems include necessary business process changes and cost in time and money for initial set-up.
-
Enterprise resource planning (ERP) is _____.Enterprise resource planning (ERP) is business-management software that an organization can use to collect, store, manage and interpret data from a variety of business activities.
-
ERP systems may include processes such as _____.ERP systems may include processes product planning, manufacturing or service delivery, marketing and sales, inventory management, shipping, and payment.
-
Knowledge management (KM) is _____.Knowledge management (KM) is the process of capturing, developing, sharing, and effectively using organizational knowledge.
-
Knowledge management efforts typically focus on organizational objectives such as _____.Knowledge management efforts typically focus on organizational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organization.
Assessments
edit- Quiz: Quizlet: Information Systems - Information Systems
- Flashcards: Quizlet: Information systems (clep)
- Flashcards: Quizlet: Electronic Data Interchange
- Matching cards: Study Stack: Information systems
- Study Table: Study Stack: Information Managment
- Flashcards: Quizlet: Infomation Systems Vocab
See Also
editReferences
edit- ↑ Wikipedia: Information system
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Information system
- ↑ Wikipedia: Information system
- ↑ Wikipedia: Information system
- ↑ Wikipedia: Expert system
- ↑ Wikipedia: Expert system
- ↑ Wikipedia: Electronic data interchange
- ↑ Wikipedia: Electronic data interchange
- ↑ Wikipedia: Electronic data interchange
- ↑ Wikipedia: Enterprise resource planning
- ↑ Wikipedia: Enterprise resource planning
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Geographic Information System
- ↑ information systems
- ↑ information systems
- ↑ https://en.wikipedia.org/wiki/Artificial_intelligence
- ↑ Wikipedia: Batch processing
- ↑ Wikipedia: Business intelligence
- ↑ Wikipedia: Strategic management
- ↑ Wikipedia: Cost-benefit analysis
- ↑ Wikipedia: Critical path method
- ↑ Wikipedia: Critical success factor
- ↑ Wikipedia:Customer relationship management
- ↑ information systems
- ↑ information systems
- ↑ Wikipedia:database management
- ↑ Wikipedia: Decision support system
- ↑ Wikipedia:e-commerce
- ↑ Wikipedia:Knowledge management
- ↑ Wikipedia:Electronic data interchange
- ↑ Wikipedia:Knowledge management
- ↑ Wikipedia:Enterprise resource planning
- ↑ Wikipedia:Executive information system
- ↑ Wikipedia:Expert system
- ↑ Wikipedia: Garbage in, garbage out
- ↑ Wikipedia:Geographic information system
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Information system
- ↑ "Knowledge base". Wikipedia. 2019-04-30. https://en.wikipedia.org/w/index.php?title=Knowledge_base&oldid=894838115.
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Learning management
- ↑ Wikipedia: Management information system
- ↑ [[6]]
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Strategic planning
- ↑ Wikipedia:Supply chain management
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia:Total quality management
- ↑ Wikipedia:Software prototyping
- ↑ Wikipedia:Transaction processing system
- ↑ Wikipedia: Value added network
- ↑ Wikipedia:Value chain
- ↑ Wikipedia:Web 2.0
- ↑ Wikipedia: Knowledge management
- ↑ Wikipedia: Workflow management system
Lesson 10 - Systems Development
editSystems development is a process used in systems engineering, information systems, and software engineering for planning, creating, testing, and deploying an information system.[1]
Objectives and Skills
editObjectives and skills for the systems development portion of CLEP Information Systems include:[2]
- Software development (prototyping, SDLC, RAD, CASE, JAD, Agile)
- Systems development (feasibility, process, systems analysis, systems design, end-user development, project management)
- System implementation (testing, training, data conversion, system conversion, system maintenance, post-implementation activities, post-implementation review, documentation)
- Information processing methods (batch, real-time, transaction)
- User interface design (GUI, multimedia)
- Standards (development, purpose, proprietary, open source)
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Program Development
- Wikipedia: Systems development life cycle
- Wikipedia: Software development process
- Wikipedia: User interface design
- Wikipedia: Rapid application development
- Wikipedia: Computer-aided software engineering
- Wikipedia: Transaction processing system
- Wikipedia: Agile software development
Multimedia
edit- Youtube: CIS 121 - System Development Life Cycle
- Youtube: Simplified Software Development
- YouTube: Introduction To Agile
- YouTube: Business Analysis and System Development
- YouTube: System Implementation
- YouTube: Transaction Processing System
- YouTube: Understanding Agile
- Youtube: Rapid Application and Agile Development Methodologies
- Project Roles in System Development
Activities
edit- Review Wikipedia: Systems development life cycle and Wikipedia: Waterfall model. Compare and contrast the two methodologies. For historical reference, see University of North Florida: Software Development Life Cycle as an example of assignments from this perspective.
- Review Wikipedia: Systems development life cycle and Wikipedia: Agile software development. Compare and contrast the two methodologies.
- Review Wikipedia: Processing modes and the different types of computer processing. Consider your bank or credit card account. Is your current balance immediately available, suggesting real-time processing, or is it updated daily, suggesting batch processing?
- Read the article ConceptDraw: Graphic User Interface. Then identify different features of a GUI, including windows, title bars, buttons, menus, icons, content areas, scroll bars, status bars, etc.
- Review Wikipedia: Diagramming software. Select a diagramming program and create a diagram, flowchart, or mind map for systems development.
- Complete the TutorialsPoint: System Analysis and Design Tutorial
Research and Discussion
edit- A company you are working for is implementing a new system at your work location. Select a phase in the system development life cycle that interests you. Discuss the activities that may occur during this step of the SDLC and include how it has impacted you at your place of work.
- What are the benefits derived from using a systems development methodology? Support your answer.
- Describe the purpose of systems analysis and design when developing information systems and how it can apply to you. What are potential advantages and disadvantages to systems analysis?
- What do you do first when implementing a new system? Explain your experience. Does it support the SDLC?
- Compare and contrast SDLC and Agile development? What are the pros and cons of each development?
Lesson Summary
editSoftware Development
- Software development is the process of computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks involved in a software release life cycle and resulting in a software product.[3]
- Software prototyping is the activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed.[4]
- The systems development life cycle (SDLC), also referred to as the application development life cycle, is a term used in systems engineering, information systems, and software engineering to describe a process for planning, creating, testing, deploying and maintaining an information system.[5]
- Rapid application development (RAD) is an alternative to the conventional waterfall model of software development which puts less emphasis on planning tasks and more emphasis on development through the use of prototypes addition to or even sometimes in place of design specifications.[6]
- Computer-aided software engineering (CASE) is the domain of software tools used to design and implement software that is high-quality, defect-free, and maintainable.[7]
- Joint application design (JAD) is a process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications.[8]
- Agile software development is a group of software development methods in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. It promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change.[9]
- The Waterfall model is a breakdown of sequential project activities. Each phase depends on the completion of the prior step and corresponds to a specialization of tasks. this model does not allow for much flexibility and can be time consuming since you can't progress until the previous step is complete.
System Development
- Before any system planning is done, a feasibility study should be conducted to determine if creating a new or improved system is a viable solution. This will help to determine the costs, benefits, resource requirements, and specific user needs to be required for completion.[10]
- The goal of system analysis is to determine where the problem is, in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined.[11]
- In systems design, the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired system features in detail and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo-code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the system in sufficient detail, such that skilled developers and engineers may develop and deliver the system with minimal additional input design.[12]
- Project management is the discipline of carefully projecting or planning, organizing, motivating and controlling resources to achieve specific goals and meet specific success criteria. Project management processes include initiating, planning, executing, monitoring and controlling, and closing.[13]
System Implementation
- New systems are tested in a variety of ways and at various levels to provide information on the functionality and performance of the product or service that is to be utilized. [14] [15]
- After the system is tested, operational and production training is provided to users who will be maintaining the system and those using the system for production.[16]
- Data conversion and system conversion translates data and systems from one format to another, which can be completed in increments or all at once, allows users to access and process information and data all under the implemented system.[17]
- After a system is fully implemented, system maintenance and post-implementation activity are required for upkeep and enhancements, post-implementation review to analyze and evaluate the system's performance and assess any potential changes and enhancements to improve functionality.[18] [19]
- Documentation is taken throughout the whole implementation process-- pre-implementation, during implementation, and post-implementation-- to record, measure, and audit the system's effectiveness and functionality.[20]
Information Processing
- Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions.[21]
- Batch processing is the execution of a series of programs (jobs) on a computer without manual intervention. Several transactions, called a batch are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered; there is a time delay.[22]
- Real-time systems attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus. Each transaction in real-time processing is unique; it is not part of a group of transactions.[23]
Graphical user interface
- The goal of user interface design is to make the user's interaction as simple and efficient as possible. [24]
Key Terms
edit- agile software development
- A group of software development methods in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams which promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change. [25]
- alpha testing
- Simulated or actual operational testing by potential users/customers or an independent test team at the developers' site.[26]
- batch processing
- Batch processing is the execution of a series of programs (jobs) on a computer without manual intervention. Several transactions, called a batch are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered;[1] there is a time delay.[27]
- beta testing
- Comes after alpha testing and can be considered a form of external user acceptance testing.[28]
- compiler
- A language translator that converts an entire program into machine language before executing it.[29]
- computer aided design (CAD)
- The use of computer systems to assist in the creation, modification, analysis, or optimization of a design.[30]
- computer-aided software engineering (CASE)
- The domain of software tools used to design and implement software applications.[31]
- data dictionary
- A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format. [32]
- data flow diagram
- A graphical representation of the "flow" of data through an information system, modeling its process aspects.[33]
- decision table
- A precise yet compact way to model complex rule sets and their corresponding actions which associates conditions with actions to perform.[34]
- end-user development
- Activities and tools that allow end-users – people who are not professional software developers – to program computers.[35]
- Feasibility Study
- an assessment of the practicality of a proposed project or system which helps to determine the costs, benefits, resource requirements, and specific user needs required for completion.[36]
- flowchart
- A program design tool that graphically shows step-by-step the actions a computer program will take.[37]
- graphical user interface (GUI)
- is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.[38]
- implementation phase
- The SDLC phase that includes testing, training, equipment replacement, and file conversion.[39]
- information architecture
- Development of the process and/or information flow of the system.[40]
- integrated development environment (IDE)
- An IDE is a software development application that consists of tools for debugging, source code editing, and automation.[41]
- investigation phase
- The SDLC phase where existing business problems and/or opportunities are studied.[42]
- joint application design (JAD)
- A process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications.[43]
- maintenance phase
- The system is assessed to ensure it does not become obsolete and changes are made to initial software.[44]
- parallel systems
- A process used in testing systems where the old system and the new system are operated simultaneously to verify the new system is working properly.[45]
- program design
- The phase of the program development life cycle in which the program specifications are expanded into a complete design of the new program.[46]
- program coding
- The phase of the program development life cycle in which the program code is written using a programming language.[47]
- project management
- The process and activity of planning, organizing, motivating, and controlling resources, procedures and protocols to achieve specific goals in scientific or daily problems.[48]
- rapid application development (RAD)
- A design approach that emphasizes the necessity of adjusting requirements in reaction to knowledge gained as the project progresses, and based on the use of prototypes in addition to or even sometimes in place of design specifications.[49]
- real time processing
- Attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus.[50]
- scrum (Software Development)
- Scrum is a software development framework that is designed to work with small teams focusing on two weeks development cycles called "sprints".[51]
- source code
- A computer program before it is compiled.[52]
- systems development life cycle (SDLC)
- A process used by systems engineers and systems developers to plan for, design, build, test, deliver and maintain information systems.[53]
- stepwise refinement
- A process used to break problems down into smaller problems.[54]
- software maintenance
- After the deployment of a new interface, occasional maintenance may be required to fix software bugs, change features, or completely upgrade the system.[55]
- software prototyping
- The activity of creating incomplete test versions of a software program being developed. [56]
- systems design
- The process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements.[57]
- unified modeling language (UML)
- A set of standard notations for creating business models; widely used for modeling object-oriented programs.[58]
- usability inspection
- A set of methods where a tester evaluates a user interface.[59]
- user interface design (UI)
- is the design of user interface for machine and software, such as computer, home appliances, mobile devices and other electronic devices, with the focus on maximizing usability and the user experience. Wikipedia: User interface design [60]
- transaction processing (TPS)
- A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. Transaction processing systems also attempt to provide predictable response times to requests, although this is not as critical as for real-time systems. Rather than allowing the user to run arbitrary programs as time-sharing, transaction processing allows only predefined, structured transactions. Each transaction is usually short duration and the processing activity for each transaction is programmed in advance.[61]
Review Questions
edit-
The activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed is ____________.Software prototyping
-
What is the term used in systems engineering, information systems, and software engineering to describe a process for planning, creating, testing, deploying and maintaining an information system?The systems development life cycle (SDLC), also referred to as the application development life cycle.
-
An alternative to the conventional waterfall model of software development which puts less emphasis on planning tasks and more emphasis on development through the use of prototypes addition to or even sometimes in place of design specifications is ___________.Rapid application development (RAD)
-
What is the domain of software tools used to design and implement software that is high-quality, defect-free, and maintainable?Computer-aided software engineering (CASE)
-
What is the process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications?Joint application design (JAD)
-
A group of software development methods in which requirements and solutions evolve through collaboration between self-organizing and cross-functional teams is called _______________. It promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change.Agile software development
-
What should be conducted to determine if creating a new or improved system is a viable solution? This will help to determine the costs, benefits, resource requirements, and specific user needs required for completion.A feasibility study
-
The goal of system analysis is _____.The goal of system analysis is to determine where the problem is, in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined.
-
In systems design, _____.In systems design, the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired system features in detail and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo-code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the system in sufficient detail, such that skilled developers and engineers may develop and deliver the system with minimal additional input design.
-
What is the discipline of carefully projecting or planning, organizing, motivating and controlling resources to achieve specific goals and meet specific success criteria which contain the following processes: initiating, planning, executing, monitoring and controlling, and closing?Project management
-
New systems are tested _____.New systems are tested in a variety of ways and at various levels to provide information on the functionality and performance of the product or service that is to be utilized.
-
After the system is tested, _____ is provided to users who will be maintaining the system and those using the system for production.After the system is tested, operational and production training is provided to users who will be maintaining the system and those using the system for production.
-
Data conversion and system conversion _____.Data conversion and system conversion translates data and systems from one format to another, which can be completed in increments or all at once, allows users to access and process information and data all under the implemented system.
-
After a system is fully implemented, system maintenance and post-implementation activity are required for _____.Upkeep and enhancements, post-implementation review to analyze and evaluate the system's performance and assess any potential changes and enhancements to improve functionality.
-
What is created throughout the whole implementation process-- pre-implementation, during implementation, and post-implementation-- to record, measure, and audit the system's effectiveness and functionality?Documentation
-
The style of computing that divides work into individual, indivisible operations, is called ________________.Transaction processing
-
An execution of a series of programs (jobs) on a computer without manual intervention. Several transactions are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered; there is a time delay. This is known as ___________________.Batch processing
-
What type of systems attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus. Each transaction is unique and it is not part of a group of transactions.Real time systems
-
The goal of _________________________ is to make the user's interaction as simple and efficient as possible.user interface design
Assessments
editSee Also
editReferences
edit- ↑ Wikipedia: Systems development life cycle
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Software_development
- ↑ Wikipedia: Software prototyping
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Rapid application development
- ↑ Wikipedia: Computer-aided software engineering
- ↑ Wikipedia: Joint application design
- ↑ Wikipedia: Agile software development
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Project management
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Software testing
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Data conversion
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Project management
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: transaction processing
- ↑ Wikipedia: batch processing
- ↑ Wikipedia: real-time computing
- ↑ Wikipedia: Graphical user interface
- ↑ Wikipedia: Agile Software Development
- ↑ Wikipedia: Alpha Testing
- ↑ Wikipedia: Transaction processing system
- ↑ Wikipedia: Beta Testing
- ↑ Wikipedia: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: Computer-aided design
- ↑ Wikipedia: Computer-aided software engineering
- ↑ Wikipedia: Data dictionary
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Decision table
- ↑ Wikipedia: End-user development
- ↑ Wikipedia: Feasibility Study
- ↑ Wikipedia: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: User interface design
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: User interface design
- ↑ Wikipedia: Integrated_development_environment
- ↑ Wikipedia: System development life cycle
- ↑ Wikipedia: Joint application design
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Software testing
- ↑ Wikibooks: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: Project Management
- ↑ Wikipedia: rapid application development
- ↑ Wikipedia: Transaction processing system
- ↑ Wikipedia: Scrum_(software_development)
- ↑ Wikipedia: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Top-down and bottom-up design
- ↑ Wikipedia: Systems development life cycle
- ↑ Wikipedia: Software development process
- ↑ Wikipedia:Systems design
- ↑ Wikipedia: Introduction to Computer Information Systems/Program Development
- ↑ Wikipedia: Usability inspection
- ↑ Wikipedia: User interface design
- ↑ Wikipedia: Transaction processing system
Lesson 11 - Programming
editProgramming is the craft of writing useful, maintainable, and extensible source code which can be interpreted or compiled by a computing system to perform a meaningful task.[1]
Objectives and Skills
editObjectives and skills for the programming portion of CLEP Information Systems include:[2]
- Programming logic (Boolean, algorithmic, order of operations, SQL)
- Methodologies (object-oriented, structured)
- Data (concepts, types, structures, digital representation of data)
- File (types, structures)
Readings
editMultimedia
editActivities
edit- Learn programming concepts by playing a computer game at Code.org.
- Review the TIOBE: Software Index. Identify currently popular programming languages. If your organization does software development, find out what programming languages are used and where they fall on the software index. Otherwise, check programming classes available at your school and find out what languages are taught and where they fall on the software index.
- Complete one or more of the drag-and-drop programming tutorials at Code.org: Learn.
- Complete the dungeon levels of the first lesson of CodeCombat.
- Review Wikipedia: Macro (computer science) and complete the tutorial Microsoft: Save Time by Creating and Running Macros in Excel 2010 or complete one or more of the Excel Easy: VBA programming tutorials.
- Download the Visual Logic flowchart / coding tool and complete the tutorial.
- Review Wikipedia: Structured programming and Wikipedia: Diagramming software. Select a diagramming program and create a flowchart that includes examples of sequence, condition/selection, and loop/iteration structures.
- Review Wikipedia: Computer science and Wikipedia: Computer programming. Consider the differences between writing a program and designing an information system.
- Create a free account with Codecademy and start learning coding.
- Complete the Debugging JavaScript in Chrome at Google.com: JavaScript.
Research and Discussion
edit- When people and computers are creating a program, users generally blame the computer. Do you think it is more likely that a computer or a person would be responsible for a serious system problem? Support your answer.
- New programming languages are developed to meet different user needs. Identify and research one new programming language that interests you. Determine the purpose of the program and what it is used for. Is this a program that would be useful for you? Why or why not.
- Describe a computer program that you use at your workplace. Does this program enhance and support your job experience? Explain.
Lesson Summary
edit- Computer programming is a process that leads from an original formulation of a computing problem to executable computer programs.[3]
- Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.[4]
- Source code is written in one or more programming languages.[5] Popular programming languages include Java, C, C++, C#, and Python.[6]
- Programming quality is measured by:[7]
- Reliability: how often the results of a program are correct.
- Robustness: how well a program anticipates problems due to errors (not bugs).
- Usability: the ease with which a person can use the program for its intended purpose.
- Portability: the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.
- Maintainability: the ease with which a program can be modified by its present or future developers in order to make improvements.
- Efficiency: the amount of system resources a program consumes.
- Most programming languages follow the order of operations commonly used in mathematics of Parentheses, Exponents, Multiplication, Division, Addition, and Subtraction, or PEMDAS.[8]
- Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which are data structures that contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.[9]
- Most popular object-oriented programming languages are class-based, meaning that objects are instances of classes, which typically also determines their type.[10]
- Popular object-oriented programming languages include Java, C++, C#, and Python.[11]
- Structured programming is a programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures and for and while loops—in contrast to using simple tests and jumps such as the goto statement which could lead to "spaghetti code", which is difficult both to follow and to maintain. [12]
- Structured programming uses three control structures — sequencing, selection (conditions), and iteration (loops) — to define any program or function.[13]
- Structured query language (SQL) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[14]
- A data type is a classification identifying one of various types of data, such as integer, floating-point number, Boolean, character, or string, that determines the possible values for that type; the operations that can be done on values of that type; the meaning of the data; and the way values of that type are stored.[15]
- At the machine level, data types correspond to the sizes of system memory locations and processor data containers (registers) and supporting instructions.[16]
- A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[17]
Key Terms
edit- acceptance testing (beta testing/application testing/end user testing)
- A test conducted to determine if the requirements of a specification or contract are met.[18]
- advanced business application programming (ABAP)
- A high-level programming language created by the German software company SAP SE.[19]
- algorithm
- A self-contained step-by-step set of operations to be performed.[20]
- applet
- Any small application that performs one specific task that runs within the scope of a dedicated widget engine or a larger program, often as a plug-in. The term is frequently used to refer to a Java applet, a program written in the Java programming language that is designed to be placed on a web page.[21]
- assembly language
- A low-level programming language.[22]
- Boolean
- A data type having two values (usually denoted true and false), intended to represent the truth values of logic and Boolean algebra.[23]
- bug
- An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.[24]
- C
- A general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.[25]
- C++
- A general-purpose programming language that has imperative, object-oriented and generic programming features, while also providing facilities for low-level memory manipulation.[26]
- compiler
- A program that reads source code, translates it into machine language, and writes the machine language to binary (object) code that can be directly loaded and executed.[27]
- computer architecture
- A set of rules and methods that describe the functionality, organization, and implementation of computer systems.[28]
- computer file
- a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[29]
- computer programming
- A process that leads from an original formulation of a computing problem to executable computer programs.[30]
- control structure
- The order in which individual statements, instructions or function calls of an imperative program are executed or evaluated.[31]
- data flow diagram (DFD)
- A graphical representation of the "flow" of data through an information system, modeling its process aspects.[32]
- data structure
- A particular way of organizing data in a computer so that it can be used efficiently.[33]
- debugging
- The process of finding and resolving defects that prevent correct operation of computer software or a system.[34]
- decompiler
- A computer program that takes an executable file as input, and attempts to create a high level source file which can be recompiled successfully.[35]
- deployment environment
- A computer system in which a computer program or software component is deployed and executed.[36]
- Flowgorithm
- A graphical authoring tool which allows users to write and execute programs using flowcharts.[37]
- hard coding
- The software development practice of embedding an input or configuration data directly into the source code of a program or other executable object, instead of obtaining that data from external sources or generating data or formatting in the program itself with the given input.[38]
- interpreter
- A computer program that directly executes instructions written in a programming or scripting language, without previously compiling them into a machine language program.[39]
- Java
- A general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.[40]
- JavaScript
- A high-level, dynamic, weakly typed, object-based, multi-paradigm, and interpreted client-side programming language. It's also one of the three core technologies of World Wide Web content production alongside of HTML and CSS.[41]
- logic error
- A bug in a program that causes it to operate incorrectly, not to terminate abnormally, but produce unintended or undesired output or other behavior, although it may not immediately be recognized as such.[42]
- macro
- A rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure.[43]
- machine language
- A set of instructions executed directly by a computer's central processing unit (CPU).[44]
- maintainability
- the ease with which a program can be modified by its present or future developers in order to make improvements.[45]
- methodology
- The systematic, theoretical analysis of the methods applied to a field of study.[46]
- modular programming
- A software design technique that emphasizes separating the functionality of a program into independent and interchangeable units.[47]
- object-oriented programming (OOP)
- A programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.[48]
- order of operations
- A rule used to clarify which procedures should be performed first in a given mathematical expression.[49]
- pair programming
- An agile software development technique in which two programmers work together at one workstation. One, the driver, writes code while the other, the observer or navigator, reviews each line of code as it is typed in.[50]
- Portability
- the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.[51]
- PHP
- A server-side scripting language designed primarily for web development but also used as a general-purpose programming language.[52]
- pseudocode
- An informal high-level description of the operating principle of a computer program or other algorithm.[53]
- program analysis
- The process of automatically examining the behavior of computer programs regarding a property such as correctness, robustness, safety and liveness.[54]
- programming
- Involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.[55]
- programming language
- A formal constructed language designed to communicate instructions to a machine, particularly a computer.[56]
- Python
- A widely used general-purpose, high-level programming language that emphasizes code readability.[57]
- query language
- Computer languages used to make queries in databases and information systems.[58]
- reliability
- An attribute of resiliency and structural solidity.[59]
- robustness
- ability of a system to resist change without adapting its initial stable configuration.[60]
- run time
- The time during which a program is running (executing).[61]
- sandbox
- A testing environment that isolates untested code changes and outright experimentation from the production environment or repository.[62]
- scripting language
- A programming language that supports programs written for a special run-time environment that can interpret (rather than compile) and automate the execution of tasks that could alternatively be executed one-by-one by a human operator.[63]
- software development
- The computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks involved in a software release life cycle and resulting in a software product.[64]
- source code
- Any collection of computer instructions (possibly with comments) written using some human-readable computer language, usually as text.[65]
- Spaghetti Code
- is a pejorative phrase for unstructured and difficult to maintain source code, broadly construed. Spaghetti code can be caused by several factors, such as volatile project requirements, lack of programming style rules, and insufficient ability or experience.[65]
- SQL (Structured Query Language)
- A special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[66]
- structured programming
- programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures, for and while loops—in contrast to using simple tests and jumps such as the go to statement which could lead to "spaghetti code" causing difficulty to both follow and maintain.[67]
- subroutine
- A sequence of program instructions that perform a specific task, packaged as a unit.[68]
- syntax error
- An error in the sequence of characters or tokens that is intended to be written in a particular programming language.[69]
- systems development life cycle (SDLC)
- A term used to describe a process for planning, creating, testing, and deploying an information system. The concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both.[70]
- usability
- The ease with which a person can use the program for its intended purpose.[71]
- variable
- A storage location paired with an associated symbolic name (an identifier), which contains some known or unknown quantity of information referred to as a value.[72]
- visual programming language (VPL)
- Any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually. A VPL allows programming with visual expressions, spatial arrangements of text and graphic symbols, used either as elements of syntax or secondary notation.[73]
Review Questions
edit-
Computer programming is _____.Computer programming is a process that leads from an original formulation of a computing problem to executable computer programs.
-
Programming involves activities such as _____.Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.
-
Source code is written in one or more programming languages. Popular programming languages include _____.Source code is written in one or more programming languages. Popular programming languages include Java, C, C++, C#, and Python.
-
Programming quality is measured by _____.Programming quality is measured by reliability, robustness, usability, portability, maintainability, and efficiency.
-
Reliability is _____.Reliability is how often the results of a program are correct.
-
Robustness is _____.Robustness is how well a program anticipates problems due to errors (not bugs).
-
Usability is _____.Usability is the ease with which a person can use the program for its intended purpose.
-
Portability is _____.Portability is the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.
-
Maintainability is _____.Maintainability is the ease with which a program can be modified by its present or future developers in order to make improvements.
-
Efficiency is _____.Efficiency is the amount of system resources a program consumes.
-
Most programming languages follow the order of operations commonly used in mathematics of _____.Most programming languages follow the order of operations commonly used in mathematics of Parentheses, Exponents, Multiplication, Division, Addition, and Subtraction, or PEMDAS.
-
Object-oriented programming (OOP) is _____.Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which are data structures that contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.
-
Most popular object-oriented programming languages are class-based, meaning _____.Most popular object-oriented programming languages are class-based, meaning that objects are instances of classes, which typically also determines their type.
-
Popular object-oriented programming languages include _____.Popular object-oriented programming languages include Java, C++, C#, and Python.
-
Structured programming is _____.Structured programming is a programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures and for and while loops—in contrast to using simple tests and jumps such as the goto statement which could lead to "spaghetti code", which is difficult both to follow and to maintain.
-
Structured programming uses three control structures — _____, _____, and _____ — to define any program or function.Structured programming uses three control structures — sequencing, selection (conditions), and iteration (loops) — to define any program or function.
-
Structured query language (SQL) is_____Structured query language (SQL)is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).
-
A data type is _____.A data type is a classification identifying one of various types of data, such as integer, floating-point number, Boolean, character, or string, that determines the possible values for that type; the operations that can be done on values of that type; the meaning of the data; and the way values of that type are stored.
-
At the machine level, data types correspond to _____.At the machine level, data types correspond to the sizes of system memory locations and processor data containers (registers) and supporting instructions.
-
Data types may be combined into _____.Data types may be combined into composite data types such as arrays and structures.
-
A computer file is _____.A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
Assessments
edit- Flashcards: Quizlet: Information Systems - Programming
- Quiz: Quizlet: Information Systems - Programming
- Game: Quizlet gravity game
See Also
editReferences
edit- ↑ Wikibooks:Computer Programming
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Computer programming
- ↑ Wikipedia: Computer programming
- ↑ Wikipedia: Computer programming
- ↑ TIOBE: Software Index
- ↑ Wikipedia: Computer programming
- ↑ Wikipedia: Order of operations
- ↑ Wikipedia: Object-oriented programming
- ↑ Wikipedia: Object-oriented programming
- ↑ Wikipedia: Object-oriented programming
- ↑ Wikipedia: Structured programming
- ↑ Wikipedia: Structured programming
- ↑ Wikipedia: SQL
- ↑ Wikipedia: Data type
- ↑ Wikipedia: Data type
- ↑ Wikipedia: Computer file
- ↑ Wikipedia: Acceptance testing
- ↑ Wikipedia: ABAP
- ↑ Wikipedia: Algorithm
- ↑ Wikipedia: Applet
- ↑ Wikipedia: Assembly language
- ↑ Wikipedia: Boolean data type
- ↑ Wikipedia: Software bug
- ↑ Wikipedia: C (programming language)
- ↑ Wikipedia: C++
- ↑ Wikipedia: Compiler
- ↑ Wikipedia: Computer Architecture
- ↑ Wikipedia: Computer file
- ↑ Wikipedia: Computer programming
- ↑ Wikipedia: Control flow
- ↑ Wikipedia: Data Flow Diagram
- ↑ Wikipedia: Data structure
- ↑ Wikipedia: Debugging
- ↑ Wikipedia: Decompiler
- ↑ Wikipedia: Deployment environment
- ↑ Wikipedia: Flowgorithm
- ↑ Wikipedia: Hard coding
- ↑ Wikipedia: Interpreter (computing)
- ↑ Wikipedia: Java (programming language)
- ↑ Wikipedia: JavaScript
- ↑ Wikipedia: Logic error
- ↑ Wikipedia: Macro
- ↑ Wikipedia: Machine code
- ↑ Quizlet information systems/programming
- ↑ Wikipedia: Methodology
- ↑ Wikipedia: Modular programming
- ↑ Wikipedia: Object-Oriented Programming (OOP)
- ↑ Wikipedia: Order of operations
- ↑ Wikipedia: Pair programming
- ↑ Quizlet information systems/programming
- ↑ Wikipedia: PHP
- ↑ Wikipedia: Pseudocode
- ↑ Wikipedia: Program analysis
- ↑ Wikipedia: Computer programming
- ↑ Wikipedia: Programming language
- ↑ Wikipedia: Python (programming language)
- ↑ Wikipedia: Query language
- ↑ Wikipedia: Reliability
- ↑ Wikipedia: Robustness
- ↑ Wikipedia: Run time (program lifecycle phase)
- ↑ Wikipedia: Sandbox (software development)
- ↑ Wikipedia: scripting language
- ↑ Wikipedia: Software development
- ↑ 65.0 65.1 Wikipedia: Source code Cite error: Invalid
<ref>
tag; name ":0" defined multiple times with different content - ↑ Wikipedia: SQL
- ↑ Wikipedia: Structured programming
- ↑ Wikipedia: Subroutine
- ↑ Wikipedia: Syntax error
- ↑ Wikipedia: System Development Life Cycle (SDL)
- ↑ Wikipedia: Usability
- ↑ ̪Wikipedia: Variable (computer science)
- ↑ Wikipedia: Visual Programming Language
Lesson 12 - Databases
editDatabases are organized collections of data typically collected by schemas, tables, queries, reports and views. Databases are typically organized to process data to provide quick information retrieval.[1]
Objectives and Skills
editObjectives and skills for the databases portion of CLEP Information Systems include:[2]
- Database management systems (data warehousing, data mining, networking, security, validation, migration, storage, obsolescence)
- Database management systems (relational, hierarchical, network, management strategies)
- Difference between multidimensional, object-oriented, hierarchical, and relational databases.
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Database
- Wikipedia: Database
- Wikipedia: Data warehouse
- Wikipedia: Data mining
- Wikipedia: Data Security
- Wikipedia: Relational model
- Wikipedia: Hierarchical database model
- Wikipedia: Network database model
- Wikipedia: Data validation
- Wikipedia: Data migration
- Wikipedia: Database storage structures
- Wikipedia: Digital obsolescence
Multimedia
edit- YouTube: Introduction to Database Management System (Short Version)
- YouTube: Introduction to Database Management System (Longer Version)
- YouTube: Beginners MS Access Database Tutorial 1 - Introduction and Creating Database
- YouTube: What is Database & SQL
- YouTube: How to Create a Database in SQL Server 2016
- YouTube: 2016 whats new in 2016 Microsoft Access
- YouTube: RelationalDatabase Concepts
- YouTube: How to make a Database-Part 1 Tables
- YouTube: Database Security
- YouTube: Different types of Databases
- YouTube: Database Tutorial for Beginners
- YouTube: What Are Databases and Why Do We Need Them?
Activities
edit- Complete one or more of the following database tutorials:
- Complete A Quick-Start Tutorial on Relational Database Design.
- Review QCI: Database vs. Spreadsheet and PC Magazine: Spreadsheet Does Not = Database. Identify spreadsheets you use at work, school, or home that should be implemented as databases instead. If you are responsible for the data, try creating a database as a replacement. If someone else is responsible for the data, discuss with them the advantages of using a database.
Research and Discussion
edit- Identify different database management systems that you frequently use. Identify potential benefits and limitations of information stored in those systems.
- Research the various levels of security used to protect database management systems.
Lesson Summary
edit- A database is an organized collection of data, including schemas, tables, queries, reports, views and other objects.[3]
- A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. It allows you to keep accurate records and retrieve records quickly.[4]
- A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.[5]
- Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it.[6]
- A data warehouse is a central repository of integrated data from one or more disparate sources used for reporting and data analysis.[7]
- Data mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.[8]
- A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model.[9] The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).[10][11]
- A hierarchical database model is a data model in which the data is organized into a tree-like structure. The data is stored as records which are connected to one another through links. A record is a collection of fields, with each field containing only one value. The entity type of a record defines which fields the record contains.[12]
- An object database is a database management system in which information is represented in the form of objects as used in object-oriented programming.[13]
- The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.[14]
- Network databases create multiple linkages between sets by placing links, or pointers, to one set of records in another; the speed and versatility of network databases have led to their wide use within businesses and in e-commerce.[15]
- Data migration is the process of transferring data between computer storage types or file formats. It occurs for a variety of reasons, including server or storage equipment replacements, maintenance or upgrades, application migration, website consolidation and data center relocation.[16]
- Data warehouses (known as DW, DWH, and EDW) are systems used for reporting and data analysis. Current and historical data uploaded from the operational systems in stored in one single place and is used for creating analytical reports.[17].
Key Terms
edit- centralized database
- A database that is located, stored, and maintained in a single location.[18]
- client / server
- A distributed application structure that partitions tasks or workloads between the providers of a resource or service and service requesters.[19]
- data cleansing
- The process of detecting and correcting or removing corrupt or inaccurate records from a record set, table, or database.[20]
- data mining
- The computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.[21]
- data security
- protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users.[22]
- data validation
- The process of ensuring that a program operates on clean, correct and useful data.[23]
- data warehouse
- A central repository of integrated data from one or more disparate sources used for reporting and data analysis.[24]
- database administrator (DBA)
- The role responsible for installation, configuration, design, migration, capacity planning, performance monitoring, security, troubleshooting, as well as backup and recovery of a database or databases.[25]
- database management system(DBMS)
- software for creating and managing databases
- database model
- Determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized, and manipulated.[26]
- database storage
- The container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture.[27]
- database schema
- The structure of a database described in a formal language supported by the database management system.[28]
- digital obsolescence
- A situation where a digital resource is no longer readable because of its archaic format.[29]
- distributed database
- A database in which portions of the database are stored on multiple computers within a network.[30]
- export
- The act or process of retrieving data out of data sources for further data processing or data storage (data migration).[31]
- field
- A column or attribute of a record in a relational database.[32]
- geographical information system (GIS)
- A system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.[33]
- hierarchical database
- A data model in which the data is organized into a tree-like structure.[34]
- import
- The act or process of loading data into a data source.[35]
- join (SQL)
- combines columns from one or more tables in a relational database.[36]
- migration
- The process of transferring data between storage types, formats, or computer systems.[37]
- multidimensional database
- A database which uses aggregated, inter-related arrays to organize data and express the relationships between data and is used for online analytical processing.[38]
- network model
- A database model conceived as a flexible way of representing objects and their relationships.[39]
- object oriented database
- A database management system in which information is represented in the form of combinations of variables, functions, and data structures.[40][41]
- NoSQL
- (Originally referring to "non SQL" or "non relational") database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases. [42]
- query
- A precise request for information retrieval with database and information systems.[43]
- record
- A row or collection of attributes in a relational database.[44]
- relation (database)
- A set of tuples (d1, d2, ..., dn), where each element dj is a member of Dj, a data domain.[45]
- structured query language (SQL)
- A special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[46]
- table
- A collection of related data held in a structured format within a database.[47]
- tuple
- A finite ordered list (sequence) of elements.[48]
- XML (Extensible Markup Language)
- A markup language that defines a set of rules for encoding data in a format which is both human-readable and machine-readable.[49]
Review Questions
edit-
A database is an organized collection of _____.A database is an organized collection of data, including schemas, tables, queries, reports, views and other objects.
-
A database management system (DBMS) is a computer software application that _____.A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
-
A general-purpose DBMS is designed to allow _____.A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.
-
Because of the close relationship between them, the term "database" is often used casually to refer to _____.Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it.
-
A relational database management system (RDBMS) is a database management system (DBMS) that ______. The ______ represents _____.A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model. The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).
-
A hierarchical database model is a data model in which the data is organized into _____. The data is stored as ______.A hierarchical database model is a data model in which the data is organized into a tree-like structure. The data is stored as records which are connected to one another through links.
-
A record is a collection of ______. The ______ type of a record defines which fields the record contains.A record is a collection of fields, with each field containing only one value. The entity type of a record defines which fields the record contains.
-
The network model is a _____ model conceived as a ______. Its distinguishing feature is that the _____, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a _____ or a _______.The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
-
Management strategies include _____ and _____ users, enforcing data _____, monitoring _____, maintaining data integrity, dealing with concurrency control, and _____ information that has been _____ by some event such as an unexpected system failure.Management strategies include registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information that has been corrupted by some event such as an unexpected system failure.
-
A relational database management system (RDBMS) is a database managment system (DMS) that is based on the _____. The _____ represents data terms of ordered sets of _____, grouped into _____.A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model. The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).
-
Protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users is _____.Protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users is Data security.
-
Computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems is ____.Computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems is Data mining.
-
Process that provides certain well-defined guarantees for fitness, accuracy, and consistency for any of various kinds of user input into an application or automated system is ____.Process that provides certain well-defined guarantees for fitness, accuracy, and consistency for any of various kinds of user input into an application or automated system is Data validation.
-
The process of transferring data between computer storage types or file formats is ____.The process of transferring data between computer storage types or file formats is Data migration.
Assessments
edit- Flashcards: Quizlet: Information Systems - Databases
- Quiz: Quizlet: Information Systems - Databases
- Quiz: Database Quiz
- Quiz: In Depth Quiz on Databases
See Also
editReferences
edit- ↑ Wikipedia: Databases
- ↑ CLEP: Information Systems
- ↑ Wikipedia: Database
- ↑ Wikipedia: Database
- ↑ Wikipedia: Database
- ↑ Wikipedia: Database
- ↑ Wikipedia: Data warehouse
- ↑ Wikipedia: Data mining
- ↑ Wikipedia: Relational database management system
- ↑ Wikipedia: Relational model
- ↑ Wikipedia: Tuple
- ↑ Wikipedia: Hierarchical database model
- ↑ "Top 9 Object Databases - Compare Reviews, Features, Pricing in 2019". PAT RESEARCH: B2B Reviews, Buying Guides & Best Practices. 2018-05-10. Retrieved 2019-06-25.
- ↑ Wikipedia: Network model
- ↑ "database | Definition, Types, & Facts". Encyclopedia Britannica. Retrieved 2019-06-25.
- ↑ Wikipedia: Data migration
- ↑ Wikipedia: Data warehouse
- ↑ Wikipedia: Centralized database
- ↑ Wikipedia: Client-server model
- ↑ Wikipedia: Data Cleansing
- ↑ Wikipedia: Data mining
- ↑ Wikipedia: Data security
- ↑ Wikipedia: Data validation
- ↑ Wikipedia: Data warehouse
- ↑ Wikipedia: Database administrator
- ↑ Wikipedia: Database model
- ↑ Wikipedia: Database
- ↑ Wikipedia: Database schema
- ↑ Wikipedia: Digital obsolescence
- ↑ Wikipedia: Distributed database
- ↑ Wikipedia: Data extraction
- ↑ Wikipedia: Field (computer science)
- ↑ Wikipedia: Geographic information system
- ↑ Wikipedia: Hierarchical database model
- ↑ Wikipedia: Extract, transform, load
- ↑ Wikipedia: Join (SQL)
- ↑ Wikipedia: Data migration
- ↑ Wikipedia: Multidimensional database
- ↑ Wikipedia: Network Model
- ↑ Wikipedia: Object database
- ↑ Wikipedia: Object (computer science)
- ↑ Wikipedia: NoSQL
- ↑ Wikipedia: Query
- ↑ Wikipedia: Record (computer science)
- ↑ Wikipedia: Relation (database)
- ↑ Wikipedia: SQL
- ↑ Wikipedia: Table (database)
- ↑ Wikipedia: Tuple
- ↑ Wikipedia: XML
Lesson 13 - Social Issues
editThis lesson covers social issues related to information systems.
Objectives and Skills
editObjectives and skills for the social issues portion of CLEP Information Systems include:[1]
- Property rights (intellectual, legal ownership of materials, open source software)
- Effects of information technology on jobs (ergonomics, virtual teams, telecommuting, job design)
- Technology’s influence on workforce strategies (globalization, virtual teams, telecommuting, outsourcing, insourcing)
- Careers in IS (responsibilities, occupation, career path, certification)
- Social networking (benefits, risks, ethics, technology, Web 2.0)
- Ethical and Social Issues in Information Systems (ethics, social, and political issues)
Readings
edit- Wikibooks: Introduction to Computer Information Systems/Ethics
- Wikipedia: Science, technology and society
- Wikipedia: Intellectual property
- Wikipedia: Telecommuting
- Wikipedia: Professional certification (computer technology)
- Wikipedia: Social networking service
- Wikipedia: Open-source software
- Wikipedia: Web 2.0
- Wikipedia: Privacy issues of social networking sites
- Wikipedia: Information technology outsourcing
- Wikipedia: Technological convergence
- Wikipedia: Virtual team
Multimedia
edit- YouTube: Whats the Difference Between Copyrights vs. Trademark vs. Patent
- YouTube: Information Technology & Ethics with Social Media
- YouTube: The Impact of Information and Communication Technologies On Our Lives
- YouTube: The Economic Impact of Information Technology
- YouTube: Virtual Team Effectiveness - Closing the Gap in Workplace Performance
- YouTube: What is TELECOMMUTING? What does TELECOMMUTING mean?
- YouTube: What is Web 2.0? What is Social Media? What comes next??
- Ethics in the field of Information Systems
- YouTube: Stop Cyberbullying
- YouTube: Email Phishing Attack Example and How to Avoid Getting Hacked
- YouTube: Ethical and Social Issues in Information Systems
Activities
edit- Review Wikipedia: Creative Commons License. Consider the benefits that support the building of a richer public domain when an author wants to give people the right to share, use, and build upon a work that they have created.
- Review Microsoft: Computer Ergonomics Guide. If necessary, adjust your workspace to provide a healthy work environment.
- Complete one or more of the GCF LearnFree: Social Media tutorials.
- Review Wordpress:Ethical and Social Issues in Information Systems. Research the ethical problems that one can face in Information Systems.
- Review Quizlet: Virtual Teams Review keyterms and meanings.
- Complete the GCF LearnFree:Introduction to Internet safety tutorials.
- Review 5 Skills Every Information Systems Student Needs to Succeed
- Complete this tutorial: Internet Safety for Kids
- Complete this Quiz on Ergonomics: Proprofs' Ergo Quizry.DM3
Research and Discussion
edit- Review RIAA:About Piracy. Research legal issues and potential penalties related to illegal peer-to-peer file sharing.
- Review the advantages and disadvantages of outsourcing and offshoring. Describe the impact or potential impact of these business practices on your organization.
- Review the advantages and disadvantages of Intellectual property rights. Describe the impact or potential impact of these business practices on your organization.
Lesson Summary
edit- Technology impacts society through innovation and improved communication, resulting in both positive and negative consequences.[2]
- Intellectual property is a term referring to creations of the intellect for which a monopoly is assigned to designated owners by law.[3]
- Intellectual property rights (IPRs) are the protections granted to the creators of IP, and include trademarks, copyright, patents, industrial design rights, and in some jurisdictions trade secrets. Artistic works including music and literature, as well as discoveries, inventions, words, phrases, symbols, and designs can all be protected as intellectual property.[4]
- Intellectual Property law's main purpose is to encourage the creation of a wide variety of intellectual goods[5]
- The stated objective of most intellectual property law (with the exception of trademarks) is to "Promote progress." By exchanging limited exclusive rights for disclosure of inventions and creative works, society and the patent/copyright owner mutually benefit, and an incentive is created for inventors and authors to create and disclose their work.[6]
- Violation of intellectual property rights, called "infringement" with respect to patents, copyright, and trademarks, and "misappropriation" with respect to trade secrets, may be a breach of civil law or criminal law, depending on the type of intellectual property involved, jurisdiction, and the nature of the action.[7]
- Copyrights are there to protect individuals' work, such as literature, art and music. Trademarks are words, phrases, symbols, designs, or a combination of these that are used as an identifier in order to help consumers identify and distinguish one product/service from another one which might be similar. Patents are similar to copyrights and trademarks but protect a person's invention rather than their literary accomplishments or company logos.[8]
- Ergonomics is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.[9]
- Computer ergonomics are important because, believe it or not, working at a computer for prolonged periods of time can actually be harmful to your overall health.[10]
- Light ergonomics is the relationship between the light source and the individual.[11]
- Telecommuting, remote work, or telework is a work arrangement in which employees do not commute to a central place of work, but instead work from home or use mobile telecommunications technology to work from coffee shops or other locations.[12]
- A virtual team usually refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.[13]
- Professional certifications in computer technology are non-degree awards made to those who have achieved qualifications specified by a certifying authority to establish that an individual holding a certification is technically qualified to hold certain positions within the field.[14]
- A social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections.[15]
- Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network.[16]
- Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.[17]
- The open-source software development, or collaborative development from multiple independent sources, generates an increasingly more diverse scope of design perspective than any one company is capable of developing and sustaining long term.[18]
- Web 2.0 describes World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems and devices) for end users.[19]
- Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.[20]
- Information technology outsourcing is a company's outsourcing of computer or Internet related work, such as programming, to other companies. It is used in reference to business process outsourcing or BPO, which is the outsourcing of the work that does not require much of technical skills.[21]
Key Terms
edit- catfishing
- A type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, for attention seeking, bullying or as a romance scam.[22]
- computer-based training (CBT)
- The effective use of computers in learning through educational technology.[23]
- computer ethics
- A part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.[24]
- copyleft
- The practice of offering people the right to freely distribute copies and modified versions of a work with the stipulation that the same rights be preserved in derivative works down the line.[25]
- copyright
- A legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution.[26]
- copyright infringement (piracy, theft)
- The use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.[27]
- cyberbullying
- The act of harming or harassing via information technology networks in a repeated and deliberate manner.[28]
- cybercrime
- Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.[29]
- cyberstalking
- The use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.[30]
- Digital Millennium Copyright Act
- A United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO).[31]
- digital rights management (DRM) software
- Software used to protect and manage the rights of creators of digital content, such as art, music, photographs, and movies.[32]
- digital watermark
- A subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.[33]
- job design
- The application of sociotechnical systems principles and techniques to the humanization of work[34]
- e-learning
- A learning environment which uses information and communication technologies as a platform for teaching and learning activities.[35]
- ergonomics
- The practice of designing products, systems or processes to take proper account of the interaction between them and the people who use them.[36]
- ethics
- moral principles that govern a person's behavior or the conducting of an activity.[37]
- fair use
- A doctrine originating in the law of the United States that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.[38]
- facial recognition system
- A technology capable of identifying or verifying a person from a digital image or a video frame from a video source.[39]
- forum
- An online discussion site where people can hold conversations in the form of posted messages.[40]
- globalization
- The process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture.[41]
- hashtag (#)
- A type of label or metadata tag used on social network and microblogging services which makes it easier for users to find messages with a specific theme or content.[42]
- industrial design rights
- An intellectual property right that protects the visual design of objects that are not purely utilitarian. An industrial design consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three-dimensional form containing aesthetic value.[43]
- insourcing
- The commencement of performing a business function that could be contracted out internally.[44]
- instant messaging
- A type of online chat which offers real-time text transmission over the Internet.[45]
- intellectual property rights
- The legal rights to which creators of original creative works (such as artistic or literary works, inventions, corporate logos, and more) are entitled.[46]
- license
- An official permission or permit to do, use, or own something (as well as the document of that permission or permit).[47]
- Luddite
- One opposed to industrialization, automation, computerization or new technologies in general.[48]
- lurker
- A member of an online community who observes, but does not actively participate.[49]
- media psychology
- The branch of psychology that focuses on the relationships between human behavior and the media.[50]
- Massive Open Online Course (MOOC)
- An online course aimed at unlimited participation and open access via the web.[51]
- new media
- Refers to content available on-demand through the Internet, accessible on any digital device, usually containing interactive user feedback and creative participation.[52]
- online chat
- Any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver.[53]
- online learning community
- Public or private destination on the Internet that addresses the learning needs of its members by facilitating peer-to-peer learning.[54]
- open-source software
- Computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.[55]
- outsourcing
- The contracting out of a business process to another party.[56]
- patent
- A set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.[57]
- patent infringement
- The commission of a prohibited act with respect to a patented invention without permission from the patent holder. Permission may typically be granted in the form of a license.[58]
- phishing
- The attempt to obtain sensitive information such as user names, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.[59]
- plagiarism
- The "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work.[60]
- right to privacy
- A human right and an element of various legal traditions which may restrain both government and private party action that threatens the privacy of individuals.[61]
- social media
- Computer-mediated tools that allow people, companies and other organizations to create, share, or exchange information, career interests, ideas, and pictures/videos in virtual communities and networks. [62]
- social networking service
- A social networking service (also social networking site, SNS or social media) is an online platform that is used by people to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.[63]
- technology integration
- The use of technology tools in general content areas in education in order to allow students to apply computer and technology skills to learning and problem-solving.[64]
- technophobia
- The fear or dislike of advanced technology or complex devices, especially computers.[65]
- telecommuting
- A work arrangement in which employees do not commute to a central place of work.[66]
- trademark (trade mark, trade-mark)
- A recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks. The trademark owner can be an individual, business organization, or any legal entity.[67]
- trademark infringement
- A violation of the exclusive rights attached to a trademark without the authorization of the trademark owner or any licensees (provided that such authorization was within the scope of the licence).[68]
- trade secret
- A formula, practice, process, design, instrument, pattern, commercial method, or compilation of information not generally known or reasonably ascertainable by others by which a business can obtain an economic advantage over competitors or customers.[69]
- trolling
- Sowing discord on the Internet by starting arguments or upsetting people, by posting inflammatory, extraneous, or off-topic messages with the deliberate intent of provoking readers into an emotional response or of otherwise disrupting normal on-topic discussion.[70]
- Web 2.0
- The World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users. [71]
- virtual team
- Refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.[72]
- World Intellectual Property Organization (WIPO)
- One of the 17 specialized agencies of the United Nations. WIPO was created in 1967 "to encourage creative activity, to promote the protection of intellectual property throughout the world".[73]
Review Questions
edit-
Technology impacts society through _____.Technology impacts society through innovation and improved communication, resulting in both positive and negative consequences.
-
Intellectual property is _____.Intellectual property is a term referring to creations of the mind such as inventions, names symbols, and images used in commerce.
-
Some common types of intellectual property rights are _____.Some common types of intellectual property rights are copyright, patents, and industrial design rights; and the rights that protect trademarks, trade dress, and in some jurisdictions trade secrets: all these cover music, literature, and other artistic works; discoveries and inventions; and words, phrases, symbols, and designs.
-
Ergonomics is _____.Ergonomics is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.
-
Telecommuting, remote work, or telework is _____.Telecommuting, remote work, or telework is a work arrangement in which employees do not commute to a central place of work, but instead work from home or use mobile telecommunications technology to work from coffee shops or other locations.
-
Professional certifications in computer technology are _____.Professional certifications in computer technology are non-degree awards made to those who have achieved qualifications specified by a certifying authority to establish that an individual holding a certification is technically qualified to hold certain positions within the field.
-
A social networking service is _____.A social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections.
-
Social networking sites allow users to _____.Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network.
-
Open-source software is _____.Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.
-
Copy right is ____.Copy right is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution.
-
Web 2.0 describes _____.Web 2.0 describes World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems and devices) for end users.
-
Privacy concerns with social networking services is _____.Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
-
Information technology outsourcing _____.Information technology outsourcing is a company's outsourcing of computer or Internet related work, such as programming, to other companies.
-
Virtual team refers to _____.Virtual team refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.
Assessments
edit- Flashcards: Quizlet: Intellectual Property
- Flashcards: Quizlet: Information Systems - Social Issues
- Flashcards: Quizlet: Ergonomics
- Flashcards: Quizlet: Virtual Teams
- Quiz: Quizlet: Information Systems - Social Issues
See Also
edit- Wikibooks: Introduction to Computer Information Systems
- Prenhall: Chapter 4 Ethical and Social Issues in Information Systems
- US News: Best Technology Jobs
- DailyDot: 7 Signs You Shouldn't Put that on Facebook
- United States Copyright Office
- United States Patent and Trademark Office
- WIPO: World Intellectual Property Organization
- Wikipedia: Light ergonomics
- Entrepreneur: 10 Ways to Successfully Manage Virtual Teams
- Stanford: Copyright Ownership - Who Owns What?
- Career in IS: Computer and Information Systems Managers
- PayScale: (CIS) Average Salary
- Colorado.edu: Ethical Issues in Electronic Information Systems
- The Conversation: Facial Recognition is Increasingly Common
References
edit- ↑ CLEP: Information Systems
- ↑ Wikipedia: Science, technology, and society
- ↑ Wikipedia: Intellectual property
- ↑ Wikipedia: Intellectual property
- ↑ "Intellectual property". Wikipedia. 2019-06-16. https://en.wikipedia.org/w/index.php?title=Intellectual_property&oldid=902031116.
- ↑ Intellectual property
- ↑ Wikipedia: Intellectual property
- ↑ Wikibooks: Introduction to Computer Information Systems/Ethics
- ↑ Wikipedia: Human factors and ergonomics
- ↑ Surfnetkids: Why Computer Ergonomics Are Important
- ↑ Wikipedia:Light ergonomics
- ↑ Wikipedia: Telecommuting
- ↑ Wikipedia: Virtual Team
- ↑ Wikipedia: Professional certification (computer technology)
- ↑ Wikipedia: Social networking service
- ↑ Wikipedia: Social networking service
- ↑ Wikipedia: Open-source software
- ↑ Wikipedia: Open-source software
- ↑ Wikipedia: Web 2.0
- ↑ Wikipedia: Privacy concerns with social networking service
- ↑ Wikipedia: Information technology outsourcing
- ↑ Wikipedia: Catfishing
- ↑ Wikipedia: Educational technology
- ↑ Wikipedia: Computer ethics
- ↑ Wikipedia: Copyleft
- ↑ Wikipedia: Copyright
- ↑ Wikipedia: Copyright infringement
- ↑ Wikipedia: Cyberbullying
- ↑ Wikipedia: Cybercrime
- ↑ Wikipedia: Cyberstalking
- ↑ Wikipedia: Digital Millennium Copyright Act
- ↑ Wikipedia: Digital rights management
- ↑ Wikipedia: Digital watermarking
- ↑ Wikipedia: Sociotechnical system#Job design
- ↑ Wikipedia: E-learning
- ↑ Wikipedia: Ergonomics
- ↑ Wikipedia: Ethics
- ↑ Wikipedia: Fair use
- ↑ Wikipedia: Facial recognition system
- ↑ Wikipedia: Internet forum
- ↑ Wikipedia: Globalization
- ↑ Wikipedia: Hashtag
- ↑ Wikipedia: Industrial design right
- ↑ Wikipedia: Insourcing
- ↑ Wikipedia: Instant messaging
- ↑ Wikipedia: Intellectual property
- ↑ Wikipedia: License
- ↑ Wikipedia: Luddite
- ↑ Wikipedia: Lurker
- ↑ Wikipedia: Media psychology
- ↑ Wikipedia: Massive open online course
- ↑ Wikipedia: New media
- ↑ Wikipedia: Online chat
- ↑ Wikipedia: Online Learning Community
- ↑ Wikipedia: Open-source software
- ↑ Wikipedia: Outsourcing
- ↑ Wikipedia: Patent
- ↑ Wikipedia: Patent infringement
- ↑ Wikipedia: Phishing
- ↑ Wikipedia: Plagiarism
- ↑ Wikipedia: Right to privacy
- ↑ Wikipedia: Social media
- ↑ Wikipedia: Social Networking
- ↑ Wikipedia: Technology integration
- ↑ Wikipedia: Technophobia
- ↑ Wikipedia: Telecommuting
- ↑ Wikipedia: Trademark
- ↑ Wikipedia: Trademark infringement
- ↑ Wikipedia: Trade secret
- ↑ Wikipedia: Internet troll
- ↑ Wikipedia: Web 2.0
- ↑ Wikipedia: Virtual Team
- ↑ Wikipedia: World Intellectual Property Organization