SlideShare una empresa de Scribd logo
1 de 20
Professional Practices in IT
(CSC 110)
Course Outline
• Introduction to Information Technology (IT)
• Professionalism (in general and in the field of IT)
• Professional activities and their role in society
• Professional Ethics
• Misuse of IT and risks
• Hacking, ethical hacking
• Information Security and privacy
• Issues in Social Web (privacy, trust, influence, etc)
• plagiarism
• Intellectual property and software laws
• Social responsibilities of an IT professional
2
IT & Your Life: The Future Now
Definition: Information Technology (IT) describes any
technology that helps to produce, manipulate, store,
communicate, and/or disseminate information
– Part 1: Computer Technology
– Part 2: Communication Technology
3
How is IT being used in Education?
• 99% universities in Pakistan have internet access
• Majority of university students own their own computer
• 80% of students use the internet for 4 or more hours per
week
• ½ of professors in universities require students to use email in
their classes
• Distance Learning such as this is a prime example of usage of
IT in education.
4
Health: High Tech for Wellness
• Telemedicine: Medical care via telecommunications
lets doctors treat patients from far away
• 3D Computer models allow accurate tumor location
inside a skull
• Robots permit precise microsurgery
• Handheld computers allow patients to measure
blood sugar
• Medical implants allow stroke patients to directly
control computers to talk for them
• Health websites provide medical information
5
Money: Cashless Society?
• Definition: Virtual means something that is created,
simulated, or carried on by means of a computer or a
computer network
• Virtual airline tickets
• Virtual money
– Online bill paying
– PayPal
– Electronic payroll deposit
– Micropayments for online music
6
Leisure: Infotech in Entertainment & the Arts
• Videogames
• Downloading
– Movies
– Music
– ebooks
• Most movies use computer animation
• Digital editing
7
Jobs & Careers
• Office careers: Budget, payroll, letter-writing, email
• Teaching: Automated grading systems, emailing,
distance teaching
• Fashion: Sales/inventory control systems, ordering,
personnel
• Job-hunting:
– Use word processor to create resumes
– Post resumes online
– Online job searches
Question: Can anyone think of a career that does NOT require
computer skills?
8
The Telephone Grows Up
• 1973: First cellphone call
• 2006: Nokia estimates 2 billion mobile phone
subscribers
• Today’s cellphones:
– Are mobile
– Can take and send pictures
– Can connect to the internet
– Can send and receive text messages
9
Internet, World Wide Web, & Cyberspace
• World Wide Web
– The multimedia part of the internet
– An interconnected system of servers that support specially
formatted documents in multimedia form
– Includes text, still images, moving images, sound
– Responsible for the growth and popularity of the internet
10
Internet, World Wide Web, & Cyberspace
• Cyberspace
– Term coined by William Gibson in Neuromancer (1984)
– Described a futuristic computer network people “plugged”
into directly with their brains
– Now means
• The web
• Chat rooms
• Online diaries (blogs)
• The wired and wireless communications world
11
5 Computer Types
• Supercomputers
– Priced from $1 million to $350 million
– High-capacity machines with thousands of processors
– Multi-user systems
– To learn more about one, go to
http://www.llnl.gov/asci/platforms/bluegenel/
• Mainframe Computers
• Workstations
• Microcomputers
• Microcontrollers
12
5 Computer Types
• Supercomputers
• Mainframe Computers
– Until late 1960’s, the only computer available
– Cost $5,000 - $5 million
– Multi-user systems; accessed using a terminal
– Terminals only have a keyboard and monitor; can’t be used alone
– To see one, go to
http://www-03.ibm.com/servers/eserver/zseries/
• Workstations
• Microcomputers
• Microcontrollers
13
5 Computer Types
• Supercomputers
• Mainframe Computers
• Workstations
– Introduced in early 1980s
– Expensive, powerful personal computers
– Used for scientific, mathematical, engineering, computer-aided
design (CAD), computer-aided manufacturing (CAM)
– A less-expensive alternative to mainframes
– To see some examples with current pricing, go to
http://www.mce.com
• Microcomputers
• Microcontrollers
14
5 Computer Types
• Supercomputers
• Mainframe Computers
• Workstations
• Microcomputers
– Personal computers that cost Rs. 20,000 to Rs. 200,000
– Used either stand-alone or in a network
– Types include: desktop, tower, notebooks, or Personal
Digital Assistants (PDAs)
• Microcontrollers
15
5 Computer Types
• Supercomputers
• Mainframe Computers
• Workstations
• Microcomputers
• Microcontrollers
– Also called embedded computers
– Tiny, specialized microprocessors inside appliances and
automobiles
– They are in: microwaves, programmable ovens, blood-pressure
monitors, air bag sensors, vibration sensors, MP3 players, digital
cameras, e-pliances, keyboards, car engine controllers, etc.
Question: Now, how many
of you would say you have
NOT used a computer
today?
16
Servers
• Are central computers
• May be any of the 4 larger computer types.
• “Server” describes a function
– Hold data (databases) and programs
– Connect to and supply services for clients
– Clients are other computers like PCs, workstations, other
devices
17
Convergence, Portability, & Personalization
• Convergence: the combination of
– Computers
– Consumer electronics
– Entertainment
– Mass media
• Portability
• Collaboration: software that allows
– People to share anything instantly
– People to enhance the information as they forward it
18
Future of Information Technology
• 3 directions of Computer Development
– Miniaturization
– Speed
– Affordability
• 3 directions of Communications Development
– Connectivity
– Interactivity
– Multimedia
19
Summary
• What is IT
• Usage of IT in different walks of life
• Medium and technologies used in IT
• Types of computers
• Future of IT
20

Más contenido relacionado

La actualidad más candente

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in ComputingSyed Zaid Irshad
 
System software and its types
System software and its typesSystem software and its types
System software and its typessamina khan
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Flow chart and pseudo code
Flow chart and pseudo code Flow chart and pseudo code
Flow chart and pseudo code Niva tharan
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its functionNikhi Jain
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 

La actualidad más candente (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
 
Computer generations
Computer generationsComputer generations
Computer generations
 
System software and its types
System software and its typesSystem software and its types
System software and its types
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Flow chart and pseudo code
Flow chart and pseudo code Flow chart and pseudo code
Flow chart and pseudo code
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Web browser
Web browserWeb browser
Web browser
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
Security policy
Security policySecurity policy
Security policy
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 

Destacado

Hiring IT Professionals
Hiring IT ProfessionalsHiring IT Professionals
Hiring IT ProfessionalsYogesh Gandhi
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Kashif Sohail
 
IT Professional Certification
IT Professional CertificationIT Professional Certification
IT Professional CertificationSoftheme
 
Problem Based Task 1
Problem Based Task 1Problem Based Task 1
Problem Based Task 1rozimm78
 
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEMFINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEMAmira Dolce Farhana
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...Alessandra Colonna
 

Destacado (20)

PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Hiring IT Professionals
Hiring IT ProfessionalsHiring IT Professionals
Hiring IT Professionals
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 
Lecture 3 Dl.ppt
Lecture 3 Dl.pptLecture 3 Dl.ppt
Lecture 3 Dl.ppt
 
IT Professional Certification
IT Professional CertificationIT Professional Certification
IT Professional Certification
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
 
Problem Based Task 1
Problem Based Task 1Problem Based Task 1
Problem Based Task 1
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEMFINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
 
01 computing
01 computing01 computing
01 computing
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...
Comunicare con efficacia: la Soluzione Bridge per il mondo farma e dei medica...
 
Latihan soal
Latihan soalLatihan soal
Latihan soal
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 

Similar a PPIT Lecture 1

Computers for managers notes
Computers for managers notesComputers for managers notes
Computers for managers notesAditya Mehra
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
Fundamentals of computer and information system(unit 1)
Fundamentals of computer and information system(unit 1)Fundamentals of computer and information system(unit 1)
Fundamentals of computer and information system(unit 1)SURBHI SAROHA
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsMudit Khetan
 
clasification of digital computer and application of computers
clasification of digital computer and application of computersclasification of digital computer and application of computers
clasification of digital computer and application of computersJelz JZ
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01ayahye
 
Unit#1_2_Intro_to_Comp_CS_22-23.pptx
Unit#1_2_Intro_to_Comp_CS_22-23.pptxUnit#1_2_Intro_to_Comp_CS_22-23.pptx
Unit#1_2_Intro_to_Comp_CS_22-23.pptxAlefiyabaiSunelwala
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptxNourhanTarek23
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
Changing conceptions of information
Changing conceptions of informationChanging conceptions of information
Changing conceptions of informationmukeshraj36
 
UC13.Chapter.01.ppsx
UC13.Chapter.01.ppsxUC13.Chapter.01.ppsx
UC13.Chapter.01.ppsxumair960210
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologiesLeslynBonachita1
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer ScienceMarlouPadua1
 
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1admin information
 

Similar a PPIT Lecture 1 (20)

Computers for managers notes
Computers for managers notesComputers for managers notes
Computers for managers notes
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Chap1 basic
Chap1 basicChap1 basic
Chap1 basic
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Fundamentals of computer and information system(unit 1)
Fundamentals of computer and information system(unit 1)Fundamentals of computer and information system(unit 1)
Fundamentals of computer and information system(unit 1)
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
clasification of digital computer and application of computers
clasification of digital computer and application of computersclasification of digital computer and application of computers
clasification of digital computer and application of computers
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
Unit#1_2_Intro_to_Comp_CS_22-23.pptx
Unit#1_2_Intro_to_Comp_CS_22-23.pptxUnit#1_2_Intro_to_Comp_CS_22-23.pptx
Unit#1_2_Intro_to_Comp_CS_22-23.pptx
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Changing conceptions of information
Changing conceptions of informationChanging conceptions of information
Changing conceptions of information
 
Intro ch 01_a
Intro ch 01_aIntro ch 01_a
Intro ch 01_a
 
UC13.Chapter.01.ppsx
UC13.Chapter.01.ppsxUC13.Chapter.01.ppsx
UC13.Chapter.01.ppsx
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer Science
 
Unit i
Unit  iUnit  i
Unit i
 
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1
 

Último

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 

Último (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 

PPIT Lecture 1

  • 2. Course Outline • Introduction to Information Technology (IT) • Professionalism (in general and in the field of IT) • Professional activities and their role in society • Professional Ethics • Misuse of IT and risks • Hacking, ethical hacking • Information Security and privacy • Issues in Social Web (privacy, trust, influence, etc) • plagiarism • Intellectual property and software laws • Social responsibilities of an IT professional 2
  • 3. IT & Your Life: The Future Now Definition: Information Technology (IT) describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information – Part 1: Computer Technology – Part 2: Communication Technology 3
  • 4. How is IT being used in Education? • 99% universities in Pakistan have internet access • Majority of university students own their own computer • 80% of students use the internet for 4 or more hours per week • ½ of professors in universities require students to use email in their classes • Distance Learning such as this is a prime example of usage of IT in education. 4
  • 5. Health: High Tech for Wellness • Telemedicine: Medical care via telecommunications lets doctors treat patients from far away • 3D Computer models allow accurate tumor location inside a skull • Robots permit precise microsurgery • Handheld computers allow patients to measure blood sugar • Medical implants allow stroke patients to directly control computers to talk for them • Health websites provide medical information 5
  • 6. Money: Cashless Society? • Definition: Virtual means something that is created, simulated, or carried on by means of a computer or a computer network • Virtual airline tickets • Virtual money – Online bill paying – PayPal – Electronic payroll deposit – Micropayments for online music 6
  • 7. Leisure: Infotech in Entertainment & the Arts • Videogames • Downloading – Movies – Music – ebooks • Most movies use computer animation • Digital editing 7
  • 8. Jobs & Careers • Office careers: Budget, payroll, letter-writing, email • Teaching: Automated grading systems, emailing, distance teaching • Fashion: Sales/inventory control systems, ordering, personnel • Job-hunting: – Use word processor to create resumes – Post resumes online – Online job searches Question: Can anyone think of a career that does NOT require computer skills? 8
  • 9. The Telephone Grows Up • 1973: First cellphone call • 2006: Nokia estimates 2 billion mobile phone subscribers • Today’s cellphones: – Are mobile – Can take and send pictures – Can connect to the internet – Can send and receive text messages 9
  • 10. Internet, World Wide Web, & Cyberspace • World Wide Web – The multimedia part of the internet – An interconnected system of servers that support specially formatted documents in multimedia form – Includes text, still images, moving images, sound – Responsible for the growth and popularity of the internet 10
  • 11. Internet, World Wide Web, & Cyberspace • Cyberspace – Term coined by William Gibson in Neuromancer (1984) – Described a futuristic computer network people “plugged” into directly with their brains – Now means • The web • Chat rooms • Online diaries (blogs) • The wired and wireless communications world 11
  • 12. 5 Computer Types • Supercomputers – Priced from $1 million to $350 million – High-capacity machines with thousands of processors – Multi-user systems – To learn more about one, go to http://www.llnl.gov/asci/platforms/bluegenel/ • Mainframe Computers • Workstations • Microcomputers • Microcontrollers 12
  • 13. 5 Computer Types • Supercomputers • Mainframe Computers – Until late 1960’s, the only computer available – Cost $5,000 - $5 million – Multi-user systems; accessed using a terminal – Terminals only have a keyboard and monitor; can’t be used alone – To see one, go to http://www-03.ibm.com/servers/eserver/zseries/ • Workstations • Microcomputers • Microcontrollers 13
  • 14. 5 Computer Types • Supercomputers • Mainframe Computers • Workstations – Introduced in early 1980s – Expensive, powerful personal computers – Used for scientific, mathematical, engineering, computer-aided design (CAD), computer-aided manufacturing (CAM) – A less-expensive alternative to mainframes – To see some examples with current pricing, go to http://www.mce.com • Microcomputers • Microcontrollers 14
  • 15. 5 Computer Types • Supercomputers • Mainframe Computers • Workstations • Microcomputers – Personal computers that cost Rs. 20,000 to Rs. 200,000 – Used either stand-alone or in a network – Types include: desktop, tower, notebooks, or Personal Digital Assistants (PDAs) • Microcontrollers 15
  • 16. 5 Computer Types • Supercomputers • Mainframe Computers • Workstations • Microcomputers • Microcontrollers – Also called embedded computers – Tiny, specialized microprocessors inside appliances and automobiles – They are in: microwaves, programmable ovens, blood-pressure monitors, air bag sensors, vibration sensors, MP3 players, digital cameras, e-pliances, keyboards, car engine controllers, etc. Question: Now, how many of you would say you have NOT used a computer today? 16
  • 17. Servers • Are central computers • May be any of the 4 larger computer types. • “Server” describes a function – Hold data (databases) and programs – Connect to and supply services for clients – Clients are other computers like PCs, workstations, other devices 17
  • 18. Convergence, Portability, & Personalization • Convergence: the combination of – Computers – Consumer electronics – Entertainment – Mass media • Portability • Collaboration: software that allows – People to share anything instantly – People to enhance the information as they forward it 18
  • 19. Future of Information Technology • 3 directions of Computer Development – Miniaturization – Speed – Affordability • 3 directions of Communications Development – Connectivity – Interactivity – Multimedia 19
  • 20. Summary • What is IT • Usage of IT in different walks of life • Medium and technologies used in IT • Types of computers • Future of IT 20