2. Ethics are a structure of standards and practices that influence how
people lead their lives. It is not strictly implemented to follow these
ethics, but it is basically for the benefit of everything that we do.
Ethics are unlike laws that legally mandate what is right or wrong.
Ethics illustrate society’s views about what is right and what is
wrong.
3. Computer ethics are a set of moral standards that govern the use of
computers. It is society’s views about the use of computers, both
hardware and software. Privacy concerns, intellectual property
rights and effects on the society are some of the common issues of
computer ethics.
4. Hacking – is unlawful intrusion into a computer or a network. A hacker can
intrude through the security levels of a computer system or network and can
acquire unauthorized access to other computers.
Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A virus
can delete files from a hard drive while a spyware can collect data from a
computer.
Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A virus
can delete files from a hard drive while a spyware can collect data from a
computer.
Anonymity – is a way of keeping a user’s identity masked through various
applications.
5. Copyright – is a form of intellectual property that gives proprietary publication,
distribution and usage rights for the author. This means that whatever idea the
author created cannot be employed or disseminated by anyone else without the
permission of the author.
Plagiarism – is an act of copying and publishing another person’s work without
proper citation. It’s like stealing someone else’s work and releasing it as your own
work.
Cracking – is a way of breaking into a system by getting past the security features
of the system. It’s a way of skipping the registration and authentication steps
when installing a software.
Software License – allows the use of digital material by following the license
agreement. Ownership remains with the original copyright owner; users are just
granted licenses to use the material based on the agreement.
6. Jobs – Some jobs have been abolished while some jobs have become simpler as
computers have taken over companies and businesses. Things can now be done in
just one click whereas before it takes multiple steps to perform a task.
Environmental Impact – Environment has been affected by computers and the
internet since so much time spent using computers increases energy usage which
in turn increases the emission of greenhouse gases.
Social Impact – Computers and the internet help people stay in touch with family
and friends. Social media has been very popular nowadays.
- Computer gaming influenced society both positively and negatively.
- Computer technology aids businesses by automating processes, reports and
analysis.
7. What is ACM?
- ACM, the Association for Computing Machinery, is the world's largest educational
and scientific society, uniting computing educators, researchers and professionals
to inspire dialogue, share resources and address the field's challenges. ACM
strengthens the profession's collective voice through strong leadership, promotion
of the highest standards, and recognition of technical excellence.
- ACM supports the professional growth of its members by providing opportunities
for life-long learning, career development, and professional networking.
8. The Association for Computing Machinery was founded as the Eastern Association
for Computing Machinery at a meeting at Columbia University in New York on
September 15, 1947.
Its creation was the logical outgrowth of increasing interest in computers as
evidenced by several events, including a January 1947 symposium at Harvard
University on large-scale digital calculating machinery; the six-meeting series in
1946-47 on digital and analog computing machinery conducted by the New York
Chapter of the American Institute of Electrical Engineers; and the six-meeting
series in March and April 1947, on electronic computing machinery conducted by
the Department of Electrical Engineering at Massachusetts Institute of
Technology.
. In January 1948, the word "Eastern" was dropped from the name of the
Association. In September 1949, a constitution was instituted by membership
approval.
9. The original notice for the September 15, 1947, organization meeting stated in
part:
"The purpose of this organization would be to advance the science, development,
construction, and application of the new machinery for computing, reasoning, and
other handling of information.“
The first and subsequent constitutions for the Association have elaborated on this
statement, although the essential content remains. The present constitution
states:
"The Association is an international scientific and educational organization
dedicated to advancing the art, science, engineering, and application of information
technology, serving both professional and public interests by fostering the open
interchange of information and by promoting the highest professional and ethical
standards."
10. ACM publishes, distributes and archives original research and firsthand
perspectives from the world's leading thinkers in computing and information
technologies that help computing professionals negotiate the strategic challenges
and operating problems of the day.
ACM publishes journals, plus newsletters and annual conference proceedings.
ACM is also recognized worldwide for its published curricula recommendations,
both for colleges and universities and for secondary schools that are increasingly
concerned with preparing students for advanced education in the information
sciences and technologies.
11. Information technology is revolutionizing products. Once composed solely of
mechanical and electrical parts, products have become complex systems that
combine hardware, sensors, data storage, microprocessors, software, and
connectivity in myriad ways. These “smart, connected products”—made possible
by vast improvements in processing power and device miniaturization and by the
network benefits of ubiquitous wireless connectivity—have unleashed a new era of
competition.
12. Smart, connected products have three core elements: physical components,
“smart” components, and connectivity components. Smart components amplify the
capabilities and value of the physical components, while connectivity amplifies the
capabilities and value of the smart components and enables some of them to exist
outside the physical product itself. The result is a virtuous cycle of value
improvement.
13. Physical components comprise the product’s mechanical and electrical parts
Smart components comprise the sensors, microprocessors, data storage, controls, software, and,
typically, an embedded operating system and enhanced user interface.
Connectivity components comprise the ports, antennae, and protocols enabling wired or wireless
connections with the product.
Three forms of connectivity
- One-to-one: An individual product connects to the user, the manufacturer, or another product
through a port or other interface
- One-to-many: A central system is continuously or intermittently connected to many products
simultaneously. For example, many Tesla automobiles are connected to a single manufacturer
system that monitors performance and accomplishes remote service and upgrades.
- Many-to-many: Multiple products connected to many other types of products and often also to
external data sources. An array of types of farm equipment are connected to one another, and to
geolocation data, to coordinate and optimize the farm system.
14. The Echo is a Bluetooth speaker
powered by Alexa, Amazon's handy
voice assistant.
15. The Arlo Ultra raises the bar for all
outdoor cameras. It's the first model
we've seen that streams and records
video in true 4K, or Ultra High
Definition (UHD). At $400, it's also
one of the most expensive cameras
out there, but it's loaded with cool
tech including automatic zooming,
motion tracking, color night vision, an
integrated spotlight and siren, one-
click 911 connectivity, a 180-degree
field of view, and more. It's also
completely wireless and a snap to
install.
16. There are five major themes in contemporary software platform evolution:
1. Linux and open-source software
2. Java
3. Enterprise software
4. Web services and service-oriented architecture
5. Software outsourcing
17. Open-source software is software produced by a community of several hundred
thousand of programmers around the world and is available free of charge to be
modified by users, with minimal restrictions.
Linux, an operating system related to Unix, is one of the most well-known
opensource software, and is the world's fastest growing client and server operating
system, along with related Linux applications.
Java, an operating system-independent, object-oriented programming language,
has become the leading programming environment for the Web, and its use has
migrated into cellular phones, cars, music players, and more.
Software for enterprise integration is one of the most urgent software priorities
today for U.S. firms who need to integrate existing legacy software with newer
technology. Replacing isolated systems that cannot communicate with enterprise
software is one solution; however, many companies cannot simply jettison
essential legacy mainframe applications.
18. (a) uses special middleware that
creates a common platform with
which all applications can freely
communicate with each other.
EAI requires much less
programming than traditional
point-to-point integration (b).
19. Web services, loosely coupled software components that use Web communication
standards, can exchange information between different systems regardless of
operating system of programming language.
Web services technology is founded on Extensible Markup Language (XML). XML was
developed as a more powerful markup language than Hypertext Markup Language
(HTML), a page description language specifying how content appears on Web pages.
Web services communicate through XML messages over standard Web protocols, such
as:
1. SOAP (Simple Object Access Protocol) is a set of rules for structuring messages that
enables applications to pass data and instructions to one another.
2. WSDL (Web Services Description Language) is a common framework for describing
the tasks performed by a Web service and the commands and data it will accept so
that it can be used by other applications.
3. UDDI (Universal Description, Discovery, and Integration) enables a Web service to
be listed in a directory of Web services so that it can be easily located.
20. Dollar Rent A Car uses Web
services to provide a standard
intermediate layer of software to
“talk” to other companies’
information systems. Dollar Rent A
Car can use this set of Web services
to link to other companies’
information systems without having
to build a separate link to each
firm’s systems.
21. Ajax (Asynchronous JavaScript and XML): Ajax, and a related set of techniques called
RIA ("rich Internet applications") use JavaScript or Macromedia Flash programs
downloaded to your client to maintain a near continuous conversation with the server
you are using.
Web-based applications: Software firms are delivering software services over the Web
to client computers and their customer's sites. Google's Google Apps for Your Domain
is a Web-based suite of productivity tools, including online spreadsheet, word
processing, and calendars, aimed at small businesses.
Mashups: Part of a movement called Web 2.0, and in the spirit of musical mashups,
Web mashups combine the capabilities of two or more online applications to create a
kind of hybrid that provides more customer value than the original sources alone.
Web 2.0 refers to "the new Web applications" like those above and is also the name of
an annual conference. Web 2.0 can be described also as an expression of all the
changes above, plus changes in the way people and business use the Web and think
about human interaction on the Web.
22. U.S. firms will spend nearly $340
billion on software in 2006. Over 30
percent of that software will come
from outsourcing its development
and operation to outside firms, and
another 15 percent will come from
purchasing the service from
application service providers either
on the Web or through traditional
channels.
23. A commercial software package is a prewritten set of software programs for
certain functions, eliminating the need for a firm to write its own software
program. Enterprise systems are so complex that few corporations have the
expertise to develop these in house and instead rely on enterprise software
packages from vendors such as SAP and PeopleSoft.
24. An application service provider (ASP) is a business that delivers and manages
applications and computer services from remote computer centers to multiple
users using the Internet or a private network. The software is paid for typically on
a per-user, subscription, or per-transaction basis. Renting enterprise software
avoids the expense and difficulty of installing, operating, and maintaining the
hardware and software needed for complex systems.
25. Large and medium-sized businesses are using ASPs for enterprise systems, sales
force automation, or financial management, and small businesses are using them
for functions such as invoicing, tax calculations, electronic calendars, and
accounting. Application service providers also enable small and medium-sized
companies to use applications that they otherwise could not afford.
26. What is Mobile Application?
A mobile application, most commonly referred to as an app, is a type of application
software designed to run on a mobile device, such as a smartphone or tablet
computer. Mobile applications frequently serve to provide users with similar
services to those accessed on PCs. Apps are generally small, individual software
units with limited function. This use of app software was originally popularized by
Apple Inc. and its App Store, which offers thousands of applications for the iPhone,
iPad and iPod Touch.
27. 1. Activities An activity is the entry point for interacting with the user. It
represents a single screen with a user interface.
2. Services A service is a general-purpose entry point for keeping an app running
in the background for all kinds of reasons. It is a component that runs in the
background to perform long-running operations or to perform work for remote
processes. A service does not provide a user interface.
3. Broadcast receivers A broadcast receiver is a component that enables the
system to deliver events to the app outside of a regular user flow, allowing the
app to respond to system-wide broadcast announcements.
4. Content providers A content provider manages a shared set of app data that you
can store in the file system, in a SQLite database, on the web, or on any other
persistent storage location that your app can access. T
28. Application architecture is a set of
technologies and models for the
development of fully-structured
mobile programs based on industry
and vendor-specific standards. As
you develop the architecture of your
app, you also consider programs
that work on wireless devices such
as smartphones and tablets.
29. Presentation Layer - contains UI components as well as the components
processing them.
Business Layer - composed of workflows, business entities and components.
Data layer - comprises data utilities, data access components and service agents.
30. 1. Native Mobile Apps Native apps
2. Hybrid Mobile Apps
3. Web-Based Apps
31. Native apps are developed for a certain mobile device operating system like Windows
Phone or Android. Therefore, they are native for a certain device or platform. Apps
built for Android, Windows Phone, Blackberry, Symbian cannot be used on any other
platform expect on their own. Therefore, a mobile app designed for Android can only be
used on an Android device.
Advantages:
- good user experience
- high performance
- puts no limits on app usage
- accessible form app stores
Disadvantage:
- higher costs in comparison to other types of mobile apps
32. Hybrid mobile apps are specifically built using different multi-platform web
technologies like JavaScript and HTML5. Hybrid apps are website applications
created in a native wrapper that means they use elements of both native and web-
based apps.
Advantage:
- easy to develop since code base ensures low-cost maintenance
Disadvantages:
- lack in speed, performance and overall optimization
- inability to look in the same way on different platforms
33. Web-based applications behave in very similar fashion to those native mobile apps.
Web apps use a certain browser in order to run and they are commonly written in CSS,
JavaScript or HTML5. Web apps redirect users to URL and further offer install
options by creating a bookmark on their browser
Advantage:
- requires a minimum of device memory
- Users can access web apps from any device that is connected to the Internet.
Disadvantages:
- The use of web applications with poor internet connection commonly results in very
bad user experience. • access to not so many APIs, with exception of geolocation and
several others.
- A performance of web-based apps is inextricably linked to network connection and
browser work.
34. 1. Social Media Sites
2. Ordering Food Online
3. Taxi Services
4. Booking Tickets
5. Entertainment