SlideShare una empresa de Scribd logo
1 de 33
Chapter 01: Information Technology, the Internet, and You
Presentation Tips ,[object Object],[object Object],[object Object],[object Object]
Competencies   (Page 1 of 2)   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Competencies   (Page 2 of 2) ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object]
Five Parts of an Information System ,[object Object],[object Object],[object Object],[object Object],[object Object]
People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software ,[object Object],[object Object],[object Object],[object Object]
System Software ,[object Object],[object Object],[object Object],[object Object],Return
Application Software ,[object Object],[object Object],[object Object],[object Object],Return
Hardware - Types of Computers ,[object Object],[object Object],[object Object],[object Object]
Microcomputer Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Desktop Computers ,[object Object],Return
Media Center System Units  ,[object Object],Return
Notebook or Laptop Computers Return ,[object Object]
Netbooks ,[object Object],[object Object],[object Object],[object Object],Return
Tablet PC ,[object Object],[object Object],Return
Handheld ,[object Object],[object Object],[object Object],Return
Microcomputer Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object]
System Unit ,[object Object],[object Object],[object Object],Return
Input/Output Devices ,[object Object],[object Object],Return
Secondary Storage ,[object Object],[object Object],Return
Communications ,[object Object],[object Object],[object Object],Return
Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Files ,[object Object],Return
Worksheet Files ,[object Object],Return
Database Files ,[object Object],Return
Presentation Files ,[object Object],Return
Connectivity, the Wireless Revolution, the Internet, and Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Careers in IT ,[object Object]
A Look to the Future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open-Ended Questions  (Page 1 of 2)   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Open-Ended Questions  (Page 2 of 2)   ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Types of Computer on the basis of work
Types of Computer on the basis of workTypes of Computer on the basis of work
Types of Computer on the basis of work
 
Components of a computer-Unit-2
Components of a computer-Unit-2Components of a computer-Unit-2
Components of a computer-Unit-2
 
Classification of computers by type
Classification of computers by typeClassification of computers by type
Classification of computers by type
 
Types of Computers
Types of ComputersTypes of Computers
Types of Computers
 
01 classification of computer
01  classification of computer01  classification of computer
01 classification of computer
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Types of computer
Types of computer Types of computer
Types of computer
 
types of computer
types of computer types of computer
types of computer
 
Classifications of computer by bikrant roy
Classifications of computer by bikrant royClassifications of computer by bikrant roy
Classifications of computer by bikrant roy
 
Introduction of computer
Introduction of computerIntroduction of computer
Introduction of computer
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Classification of computer_system
Classification of computer_systemClassification of computer_system
Classification of computer_system
 
Computer and its classification
Computer and its classificationComputer and its classification
Computer and its classification
 
DIGITAL COMPUTERS
DIGITAL COMPUTERSDIGITAL COMPUTERS
DIGITAL COMPUTERS
 
Cmp104 lec 4 types of computer
Cmp104 lec 4 types of computerCmp104 lec 4 types of computer
Cmp104 lec 4 types of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of computer on the basic of size
Classification of computer on the basic of sizeClassification of computer on the basic of size
Classification of computer on the basic of size
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 

Similar a IT Chapter 01: Information Systems

information tecnology
information tecnologyinformation tecnology
information tecnologyRezaSony
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Computing Essential
Computing Essential Computing Essential
Computing Essential VirusSami
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouJeremy Flores
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01drussell54
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01Nasir Jumani
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computerssir-smartt
 
Computer application in business
Computer application in businessComputer application in business
Computer application in businessManas Saha
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemCh Irfan
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxAdrianVANTOPINA
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015MUHAMADKASSIMMUHAMAD1
 

Similar a IT Chapter 01: Information Systems (20)

TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
 
information tecnology
information tecnologyinformation tecnology
information tecnology
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Computing Essential
Computing Essential Computing Essential
Computing Essential
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Ch02
Ch02Ch02
Ch02
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IT Chapter 01: Information Systems

  • 1. Chapter 01: Information Technology, the Internet, and You
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Notas del editor

  1. To be comfortable and competent with IT, one must comprehend the five parts an information system (refer to the ensuing slides)
  2. Define an information system Some students may think of a system as pertaining to just the hardware Remind them that a microcomputer is part of an information system To be a competent end user (Key Term), one must understand the essentials of IT Note that IT stands for information technology (Key Term) Concept check: What are the five parts of an information system? What is the difference between data and information? What is connectivity?
  3. People are the most important part of an information system Our lives are touched everyday by computers- many time the contact is direct and obvious, such as creating documents using a word processing program or when connecting to the internet. Other times, it isn’t as obvious and is much more indirect as shown in a couple of the pictures Have students give examples of how they use computer applications throughout the day Some examples are: Instant messaging Web-based applications Personal Web site Virus protection TV tuners and video clips Digital photography Music Home networking Spyware Job opportunities Refer to Figure 1-3 on pg. 8 in text. It provides a partial list of applications that students can use to “Make IT work for You”
  4. Software is another name for programs Programs are instructions that tell the computer how to process data into the form you want Emphasize differences between application and systems software System software Operating system (Key Term) Utilities Device drivers (Key Term) Application software Basic applications (Key Term) or General-purpose Specialized applications (Key Term) Concept Check Describe the two major kinds of software. Describe three types of system software programs. Define and compare basic and specialized applications.
  5. System Not a single program A collection of programs Two best known Operating systems are: Windows 7 Mac OS X Utilities Service programs such as Windows Disk Defragmenter Performs tasks related to managing computer resources Device drivers Application
  6. “ End-user” software – these are the types of programs you have to know to be considered computer competent An example of a basic application is a browser to navigate, explore and find information (Key Term) on the Internet Two major categories Basic applications - general purpose or “off-the-shelf” programs, such as Web browsers, and word processing, spreadsheet, and presentation software Specialized application – narrow focus on specific disciplines and occupations, such as graphics, audio, video, Web authoring, and cell phone apps
  7. There are four types of computers Supercomputers (key term) – the most powerful; special high-capacity computers used in very large corporations Mainframe computers (key term) – are capable of great processing speed and data storage; occupy specially wired, air-conditioned rooms; insurance companies use to process information about millions of policyholders Minicomputers (key term) - known as midrange computers (key term), are refrigerator sized machines used in medium sized companies or departments in large companies Microcomputers (key term) – least powerful but most widely used and fastest-growing type of computers Desktop (key term) Laptop or notebook (key term) Tablet PC (key term) Handheld computers (Key Term) Palm computers (Key Term) Personal digital assistants (PDA) (Key Term)
  8. Microcomputers Desktop Notebook Media Center Tablet PC Handheld computers Netbook
  9. Have students begin discussing the type(s) of a desktop computer (key term) they are using or familiar with
  10. Notebook computers are also known as laptops Have students begin discussing the type(s) of notebook or laptop computer(s) they are using or familiar with
  11. Accepts handwriting Ask students if they are familiar with tablet PCs
  12. Personal digital assistants (PDA) are the most widely used handheld computer Ask students if they are familiar with palm computers or PDAs
  13. System Unit is the container that houses most of the electronic components that make up a computer system. Input/Output – Input devices (key term) translate data and programs from a form humans understand to a form computers can process; Secondary Storage – Unlike memory (key term), secondary storage holds data and programs even after the electrical power has been turned off—examples of secondary storage include USB drives, hard drives and optical drives Communication – one computer communicating with another computer or other computer systems using communication devices (key term) such as a modem
  14. Systems unit-container houses most of the electronic components that make up a computer system The microprocessor controls and manipulates data to produce information Memory holds data and program instructions for processing the data. It also holds the processed information before it is output Memory is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted
  15. Hard disks are typically used to store programs and very large data files. Solid-state storage does not have any moving parts, is more reliable, and requires less power to operate Solid-state drives (SSDs) Flash memory cards USB drives Optical disks use laser technology and have the greatest capacity. Examples of optical disks include: compact discs (CDs) (Key Term) digital versatile discs (DVDs) (Key Term) high definition (hi def) (Key Term) discs
  16. Data is raw, unprocessed facts, that can be stored electronically in files. Four common types of files include: Document files (key term) - created by word processors to save memos, term papers, and letters Worksheet files (key term) - electronic spreadsheets for analyzing budgets and to predict sales Database files (key term) - electronic database management programs to contain highly structured and organized data Presentation files (key term) - electronic slide shows, audience handouts, and speaker notes
  17. Word processors are used to prepare written documents Create text-based documents One of the most flexible and widely used software tools Features to make entering, editing, and formatting documents easy
  18. Files created by spreadsheet programs Uses functions and formulas to analyze numeric data Manipulates numeric data Features include workbooks, worksheets, cells, ranges, text and numeric entries, formulas, functions, charts, recalculation, and what-if analysis
  19. A database management system (DBMS) or database manager is a program that sets up, or structures, a database Files created by database management programs Organizes data for efficient retrieval Is the electronic equivalent of a file cabinet It also provides tools to enter, edit, and retrieve data from the database
  20. Used to create a variety of visual objects to create attractive, visually interesting presentations Features include slides, AutoContent wizard, color schemes, slide layouts, special effects, master slides, and design templates Presentation files may contain audience handouts, speaker notes, and electronic slides
  21. Connectivity is the capability of your microcomputer to share information with other computers Wireless /mobile communication devices are more popular than ever A network is central to the concept of connectivity Ask students questions about the Internet. Here are some facts: No one owns the Internet There is no Internet, Inc. The Internet is a network of networks The Word Wide Web (key term) (WWW) provides multimedia interface to resources on the Internet Cloud computing can be used to create and store your work, such as documents, spreadsheets, databases, and presentations
  22. Internet & Web - browse the Web, communicate with others, locate Information, etc. Powerful Software - create professional looking documents, analyze massive amounts of data, create dynamic multimedia pages, and more. Powerful Hardware – more powerful & robust, new technologies such as wireless networks & their impact to connect, equipment can be dynamic vs. essential features of devices remain static Security & Privacy – negative impacts, potential mental & physical health risk, negative effects on the environment, etc. Organizations – organizational information systems and their use Changing Times – fast paced era and rapid change
  23. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements
  24. Have students turn to the end of Chapter 1 in their textbooks to view the same “Open-Ended” questions/statements