SlideShare a Scribd company logo
1 of 34
 Ethics are a structure of standards and practices that influence how
people lead their lives. It is not strictly implemented to follow these
ethics, but it is basically for the benefit of everything that we do.
 Ethics are unlike laws that legally mandate what is right or wrong.
 Ethics illustrate society’s views about what is right and what is
wrong.
 Computer ethics are a set of moral standards that govern the use of
computers. It is society’s views about the use of computers, both
hardware and software. Privacy concerns, intellectual property
rights and effects on the society are some of the common issues of
computer ethics.
 Hacking – is unlawful intrusion into a computer or a network. A hacker can
intrude through the security levels of a computer system or network and can
acquire unauthorized access to other computers.
 Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A virus
can delete files from a hard drive while a spyware can collect data from a
computer.
 Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A virus
can delete files from a hard drive while a spyware can collect data from a
computer.
 Anonymity – is a way of keeping a user’s identity masked through various
applications.
 Copyright – is a form of intellectual property that gives proprietary publication,
distribution and usage rights for the author. This means that whatever idea the
author created cannot be employed or disseminated by anyone else without the
permission of the author.
 Plagiarism – is an act of copying and publishing another person’s work without
proper citation. It’s like stealing someone else’s work and releasing it as your own
work.
 Cracking – is a way of breaking into a system by getting past the security features
of the system. It’s a way of skipping the registration and authentication steps
when installing a software.
 Software License – allows the use of digital material by following the license
agreement. Ownership remains with the original copyright owner; users are just
granted licenses to use the material based on the agreement.
 Jobs – Some jobs have been abolished while some jobs have become simpler as
computers have taken over companies and businesses. Things can now be done in
just one click whereas before it takes multiple steps to perform a task.
 Environmental Impact – Environment has been affected by computers and the
internet since so much time spent using computers increases energy usage which
in turn increases the emission of greenhouse gases.
 Social Impact – Computers and the internet help people stay in touch with family
and friends. Social media has been very popular nowadays.
- Computer gaming influenced society both positively and negatively.
- Computer technology aids businesses by automating processes, reports and
analysis.
 What is ACM?
- ACM, the Association for Computing Machinery, is the world's largest educational
and scientific society, uniting computing educators, researchers and professionals
to inspire dialogue, share resources and address the field's challenges. ACM
strengthens the profession's collective voice through strong leadership, promotion
of the highest standards, and recognition of technical excellence.
- ACM supports the professional growth of its members by providing opportunities
for life-long learning, career development, and professional networking.
 The Association for Computing Machinery was founded as the Eastern Association
for Computing Machinery at a meeting at Columbia University in New York on
September 15, 1947.
 Its creation was the logical outgrowth of increasing interest in computers as
evidenced by several events, including a January 1947 symposium at Harvard
University on large-scale digital calculating machinery; the six-meeting series in
1946-47 on digital and analog computing machinery conducted by the New York
Chapter of the American Institute of Electrical Engineers; and the six-meeting
series in March and April 1947, on electronic computing machinery conducted by
the Department of Electrical Engineering at Massachusetts Institute of
Technology.
 . In January 1948, the word "Eastern" was dropped from the name of the
Association. In September 1949, a constitution was instituted by membership
approval.
 The original notice for the September 15, 1947, organization meeting stated in
part:
"The purpose of this organization would be to advance the science, development,
construction, and application of the new machinery for computing, reasoning, and
other handling of information.“
 The first and subsequent constitutions for the Association have elaborated on this
statement, although the essential content remains. The present constitution
states:
"The Association is an international scientific and educational organization
dedicated to advancing the art, science, engineering, and application of information
technology, serving both professional and public interests by fostering the open
interchange of information and by promoting the highest professional and ethical
standards."
 ACM publishes, distributes and archives original research and firsthand
perspectives from the world's leading thinkers in computing and information
technologies that help computing professionals negotiate the strategic challenges
and operating problems of the day.
 ACM publishes journals, plus newsletters and annual conference proceedings.
 ACM is also recognized worldwide for its published curricula recommendations,
both for colleges and universities and for secondary schools that are increasingly
concerned with preparing students for advanced education in the information
sciences and technologies.
 Information technology is revolutionizing products. Once composed solely of
mechanical and electrical parts, products have become complex systems that
combine hardware, sensors, data storage, microprocessors, software, and
connectivity in myriad ways. These “smart, connected products”—made possible
by vast improvements in processing power and device miniaturization and by the
network benefits of ubiquitous wireless connectivity—have unleashed a new era of
competition.
 Smart, connected products have three core elements: physical components,
“smart” components, and connectivity components. Smart components amplify the
capabilities and value of the physical components, while connectivity amplifies the
capabilities and value of the smart components and enables some of them to exist
outside the physical product itself. The result is a virtuous cycle of value
improvement.
 Physical components comprise the product’s mechanical and electrical parts
 Smart components comprise the sensors, microprocessors, data storage, controls, software, and,
typically, an embedded operating system and enhanced user interface.
 Connectivity components comprise the ports, antennae, and protocols enabling wired or wireless
connections with the product.
 Three forms of connectivity
- One-to-one: An individual product connects to the user, the manufacturer, or another product
through a port or other interface
- One-to-many: A central system is continuously or intermittently connected to many products
simultaneously. For example, many Tesla automobiles are connected to a single manufacturer
system that monitors performance and accomplishes remote service and upgrades.
- Many-to-many: Multiple products connected to many other types of products and often also to
external data sources. An array of types of farm equipment are connected to one another, and to
geolocation data, to coordinate and optimize the farm system.
The Echo is a Bluetooth speaker
powered by Alexa, Amazon's handy
voice assistant.
 The Arlo Ultra raises the bar for all
outdoor cameras. It's the first model
we've seen that streams and records
video in true 4K, or Ultra High
Definition (UHD). At $400, it's also
one of the most expensive cameras
out there, but it's loaded with cool
tech including automatic zooming,
motion tracking, color night vision, an
integrated spotlight and siren, one-
click 911 connectivity, a 180-degree
field of view, and more. It's also
completely wireless and a snap to
install.
 There are five major themes in contemporary software platform evolution:
1. Linux and open-source software
2. Java
3. Enterprise software
4. Web services and service-oriented architecture
5. Software outsourcing
 Open-source software is software produced by a community of several hundred
thousand of programmers around the world and is available free of charge to be
modified by users, with minimal restrictions.
 Linux, an operating system related to Unix, is one of the most well-known
opensource software, and is the world's fastest growing client and server operating
system, along with related Linux applications.
 Java, an operating system-independent, object-oriented programming language,
has become the leading programming environment for the Web, and its use has
migrated into cellular phones, cars, music players, and more.
 Software for enterprise integration is one of the most urgent software priorities
today for U.S. firms who need to integrate existing legacy software with newer
technology. Replacing isolated systems that cannot communicate with enterprise
software is one solution; however, many companies cannot simply jettison
essential legacy mainframe applications.
 (a) uses special middleware that
creates a common platform with
which all applications can freely
communicate with each other.
 EAI requires much less
programming than traditional
point-to-point integration (b).
 Web services, loosely coupled software components that use Web communication
standards, can exchange information between different systems regardless of
operating system of programming language.
 Web services technology is founded on Extensible Markup Language (XML). XML was
developed as a more powerful markup language than Hypertext Markup Language
(HTML), a page description language specifying how content appears on Web pages.
 Web services communicate through XML messages over standard Web protocols, such
as:
1. SOAP (Simple Object Access Protocol) is a set of rules for structuring messages that
enables applications to pass data and instructions to one another.
2. WSDL (Web Services Description Language) is a common framework for describing
the tasks performed by a Web service and the commands and data it will accept so
that it can be used by other applications.
3. UDDI (Universal Description, Discovery, and Integration) enables a Web service to
be listed in a directory of Web services so that it can be easily located.
 Dollar Rent A Car uses Web
services to provide a standard
intermediate layer of software to
“talk” to other companies’
information systems. Dollar Rent A
Car can use this set of Web services
to link to other companies’
information systems without having
to build a separate link to each
firm’s systems.
 Ajax (Asynchronous JavaScript and XML): Ajax, and a related set of techniques called
RIA ("rich Internet applications") use JavaScript or Macromedia Flash programs
downloaded to your client to maintain a near continuous conversation with the server
you are using.
 Web-based applications: Software firms are delivering software services over the Web
to client computers and their customer's sites. Google's Google Apps for Your Domain
is a Web-based suite of productivity tools, including online spreadsheet, word
processing, and calendars, aimed at small businesses.
 Mashups: Part of a movement called Web 2.0, and in the spirit of musical mashups,
Web mashups combine the capabilities of two or more online applications to create a
kind of hybrid that provides more customer value than the original sources alone.
 Web 2.0 refers to "the new Web applications" like those above and is also the name of
an annual conference. Web 2.0 can be described also as an expression of all the
changes above, plus changes in the way people and business use the Web and think
about human interaction on the Web.
 U.S. firms will spend nearly $340
billion on software in 2006. Over 30
percent of that software will come
from outsourcing its development
and operation to outside firms, and
another 15 percent will come from
purchasing the service from
application service providers either
on the Web or through traditional
channels.
 A commercial software package is a prewritten set of software programs for
certain functions, eliminating the need for a firm to write its own software
program. Enterprise systems are so complex that few corporations have the
expertise to develop these in house and instead rely on enterprise software
packages from vendors such as SAP and PeopleSoft.
 An application service provider (ASP) is a business that delivers and manages
applications and computer services from remote computer centers to multiple
users using the Internet or a private network. The software is paid for typically on
a per-user, subscription, or per-transaction basis. Renting enterprise software
avoids the expense and difficulty of installing, operating, and maintaining the
hardware and software needed for complex systems.
 Large and medium-sized businesses are using ASPs for enterprise systems, sales
force automation, or financial management, and small businesses are using them
for functions such as invoicing, tax calculations, electronic calendars, and
accounting. Application service providers also enable small and medium-sized
companies to use applications that they otherwise could not afford.
 What is Mobile Application?
A mobile application, most commonly referred to as an app, is a type of application
software designed to run on a mobile device, such as a smartphone or tablet
computer. Mobile applications frequently serve to provide users with similar
services to those accessed on PCs. Apps are generally small, individual software
units with limited function. This use of app software was originally popularized by
Apple Inc. and its App Store, which offers thousands of applications for the iPhone,
iPad and iPod Touch.
1. Activities An activity is the entry point for interacting with the user. It
represents a single screen with a user interface.
2. Services A service is a general-purpose entry point for keeping an app running
in the background for all kinds of reasons. It is a component that runs in the
background to perform long-running operations or to perform work for remote
processes. A service does not provide a user interface.
3. Broadcast receivers A broadcast receiver is a component that enables the
system to deliver events to the app outside of a regular user flow, allowing the
app to respond to system-wide broadcast announcements.
4. Content providers A content provider manages a shared set of app data that you
can store in the file system, in a SQLite database, on the web, or on any other
persistent storage location that your app can access. T
 Application architecture is a set of
technologies and models for the
development of fully-structured
mobile programs based on industry
and vendor-specific standards. As
you develop the architecture of your
app, you also consider programs
that work on wireless devices such
as smartphones and tablets.
 Presentation Layer - contains UI components as well as the components
processing them.
 Business Layer - composed of workflows, business entities and components.
 Data layer - comprises data utilities, data access components and service agents.
1. Native Mobile Apps Native apps
2. Hybrid Mobile Apps
3. Web-Based Apps
 Native apps are developed for a certain mobile device operating system like Windows
Phone or Android. Therefore, they are native for a certain device or platform. Apps
built for Android, Windows Phone, Blackberry, Symbian cannot be used on any other
platform expect on their own. Therefore, a mobile app designed for Android can only be
used on an Android device.
 Advantages:
- good user experience
- high performance
- puts no limits on app usage
- accessible form app stores
 Disadvantage:
- higher costs in comparison to other types of mobile apps
 Hybrid mobile apps are specifically built using different multi-platform web
technologies like JavaScript and HTML5. Hybrid apps are website applications
created in a native wrapper that means they use elements of both native and web-
based apps.
 Advantage:
- easy to develop since code base ensures low-cost maintenance
 Disadvantages:
- lack in speed, performance and overall optimization
- inability to look in the same way on different platforms
 Web-based applications behave in very similar fashion to those native mobile apps.
Web apps use a certain browser in order to run and they are commonly written in CSS,
JavaScript or HTML5. Web apps redirect users to URL and further offer install
options by creating a bookmark on their browser
 Advantage:
- requires a minimum of device memory
- Users can access web apps from any device that is connected to the Internet.
 Disadvantages:
- The use of web applications with poor internet connection commonly results in very
bad user experience. • access to not so many APIs, with exception of geolocation and
several others.
- A performance of web-based apps is inextricably linked to network connection and
browser work.
1. Social Media Sites
2. Ordering Food Online
3. Taxi Services
4. Booking Tickets
5. Entertainment

More Related Content

Similar to Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx

Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and YouAjboyDiog
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crimejuliakad84
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentalsImoh Etuk
 
Technology language & terms used in Digital Transformation
Technology language & terms used in Digital TransformationTechnology language & terms used in Digital Transformation
Technology language & terms used in Digital TransformationStrategic Business & IT Services
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...huong Tran thu
 
1)IT infrastructure is the shared technology resources that provid.pdf
1)IT infrastructure is the shared technology resources that provid.pdf1)IT infrastructure is the shared technology resources that provid.pdf
1)IT infrastructure is the shared technology resources that provid.pdfaparnawatchcompany
 
computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer systemloveobi25
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04Shaheen Khan
 

Similar to Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx (20)

Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
Case study no 2
Case study no 2Case study no 2
Case study no 2
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
chapter2.pptx
chapter2.pptxchapter2.pptx
chapter2.pptx
 
Phd presentation
Phd presentationPhd presentation
Phd presentation
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
Mis pdf
Mis pdfMis pdf
Mis pdf
 
5403 1.pdf
5403 1.pdf5403 1.pdf
5403 1.pdf
 
5403 1.pdf
5403 1.pdf5403 1.pdf
5403 1.pdf
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Technology language & terms used in Digital Transformation
Technology language & terms used in Digital TransformationTechnology language & terms used in Digital Transformation
Technology language & terms used in Digital Transformation
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
 
1)IT infrastructure is the shared technology resources that provid.pdf
1)IT infrastructure is the shared technology resources that provid.pdf1)IT infrastructure is the shared technology resources that provid.pdf
1)IT infrastructure is the shared technology resources that provid.pdf
 
computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer system
 
Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 

More from JohnsmithAlberto2

More from JohnsmithAlberto2 (7)

Recitation in Music.pptx
Recitation in Music.pptxRecitation in Music.pptx
Recitation in Music.pptx
 
hideseek.pptx
hideseek.pptxhideseek.pptx
hideseek.pptx
 
VOLLEYBALL.pptx
VOLLEYBALL.pptxVOLLEYBALL.pptx
VOLLEYBALL.pptx
 
VOLLEYBALL.pptx
VOLLEYBALL.pptxVOLLEYBALL.pptx
VOLLEYBALL.pptx
 
MUSIC GRADE 8-QUARTER 2-MODULE 2.pptx
MUSIC GRADE 8-QUARTER 2-MODULE 2.pptxMUSIC GRADE 8-QUARTER 2-MODULE 2.pptx
MUSIC GRADE 8-QUARTER 2-MODULE 2.pptx
 
PRESENTATION IN GRADE 8 ARTS - TOPIC 1 ONLY.pdf
PRESENTATION IN GRADE 8 ARTS - TOPIC 1 ONLY.pdfPRESENTATION IN GRADE 8 ARTS - TOPIC 1 ONLY.pdf
PRESENTATION IN GRADE 8 ARTS - TOPIC 1 ONLY.pdf
 
Environmental health
Environmental healthEnvironmental health
Environmental health
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx

  • 1.
  • 2.  Ethics are a structure of standards and practices that influence how people lead their lives. It is not strictly implemented to follow these ethics, but it is basically for the benefit of everything that we do.  Ethics are unlike laws that legally mandate what is right or wrong.  Ethics illustrate society’s views about what is right and what is wrong.
  • 3.  Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers, both hardware and software. Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.
  • 4.  Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorized access to other computers.  Malware – means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while a spyware can collect data from a computer.  Malware – means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while a spyware can collect data from a computer.  Anonymity – is a way of keeping a user’s identity masked through various applications.
  • 5.  Copyright – is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author.  Plagiarism – is an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.  Cracking – is a way of breaking into a system by getting past the security features of the system. It’s a way of skipping the registration and authentication steps when installing a software.  Software License – allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner; users are just granted licenses to use the material based on the agreement.
  • 6.  Jobs – Some jobs have been abolished while some jobs have become simpler as computers have taken over companies and businesses. Things can now be done in just one click whereas before it takes multiple steps to perform a task.  Environmental Impact – Environment has been affected by computers and the internet since so much time spent using computers increases energy usage which in turn increases the emission of greenhouse gases.  Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has been very popular nowadays. - Computer gaming influenced society both positively and negatively. - Computer technology aids businesses by automating processes, reports and analysis.
  • 7.  What is ACM? - ACM, the Association for Computing Machinery, is the world's largest educational and scientific society, uniting computing educators, researchers and professionals to inspire dialogue, share resources and address the field's challenges. ACM strengthens the profession's collective voice through strong leadership, promotion of the highest standards, and recognition of technical excellence. - ACM supports the professional growth of its members by providing opportunities for life-long learning, career development, and professional networking.
  • 8.  The Association for Computing Machinery was founded as the Eastern Association for Computing Machinery at a meeting at Columbia University in New York on September 15, 1947.  Its creation was the logical outgrowth of increasing interest in computers as evidenced by several events, including a January 1947 symposium at Harvard University on large-scale digital calculating machinery; the six-meeting series in 1946-47 on digital and analog computing machinery conducted by the New York Chapter of the American Institute of Electrical Engineers; and the six-meeting series in March and April 1947, on electronic computing machinery conducted by the Department of Electrical Engineering at Massachusetts Institute of Technology.  . In January 1948, the word "Eastern" was dropped from the name of the Association. In September 1949, a constitution was instituted by membership approval.
  • 9.  The original notice for the September 15, 1947, organization meeting stated in part: "The purpose of this organization would be to advance the science, development, construction, and application of the new machinery for computing, reasoning, and other handling of information.“  The first and subsequent constitutions for the Association have elaborated on this statement, although the essential content remains. The present constitution states: "The Association is an international scientific and educational organization dedicated to advancing the art, science, engineering, and application of information technology, serving both professional and public interests by fostering the open interchange of information and by promoting the highest professional and ethical standards."
  • 10.  ACM publishes, distributes and archives original research and firsthand perspectives from the world's leading thinkers in computing and information technologies that help computing professionals negotiate the strategic challenges and operating problems of the day.  ACM publishes journals, plus newsletters and annual conference proceedings.  ACM is also recognized worldwide for its published curricula recommendations, both for colleges and universities and for secondary schools that are increasingly concerned with preparing students for advanced education in the information sciences and technologies.
  • 11.  Information technology is revolutionizing products. Once composed solely of mechanical and electrical parts, products have become complex systems that combine hardware, sensors, data storage, microprocessors, software, and connectivity in myriad ways. These “smart, connected products”—made possible by vast improvements in processing power and device miniaturization and by the network benefits of ubiquitous wireless connectivity—have unleashed a new era of competition.
  • 12.  Smart, connected products have three core elements: physical components, “smart” components, and connectivity components. Smart components amplify the capabilities and value of the physical components, while connectivity amplifies the capabilities and value of the smart components and enables some of them to exist outside the physical product itself. The result is a virtuous cycle of value improvement.
  • 13.  Physical components comprise the product’s mechanical and electrical parts  Smart components comprise the sensors, microprocessors, data storage, controls, software, and, typically, an embedded operating system and enhanced user interface.  Connectivity components comprise the ports, antennae, and protocols enabling wired or wireless connections with the product.  Three forms of connectivity - One-to-one: An individual product connects to the user, the manufacturer, or another product through a port or other interface - One-to-many: A central system is continuously or intermittently connected to many products simultaneously. For example, many Tesla automobiles are connected to a single manufacturer system that monitors performance and accomplishes remote service and upgrades. - Many-to-many: Multiple products connected to many other types of products and often also to external data sources. An array of types of farm equipment are connected to one another, and to geolocation data, to coordinate and optimize the farm system.
  • 14. The Echo is a Bluetooth speaker powered by Alexa, Amazon's handy voice assistant.
  • 15.  The Arlo Ultra raises the bar for all outdoor cameras. It's the first model we've seen that streams and records video in true 4K, or Ultra High Definition (UHD). At $400, it's also one of the most expensive cameras out there, but it's loaded with cool tech including automatic zooming, motion tracking, color night vision, an integrated spotlight and siren, one- click 911 connectivity, a 180-degree field of view, and more. It's also completely wireless and a snap to install.
  • 16.  There are five major themes in contemporary software platform evolution: 1. Linux and open-source software 2. Java 3. Enterprise software 4. Web services and service-oriented architecture 5. Software outsourcing
  • 17.  Open-source software is software produced by a community of several hundred thousand of programmers around the world and is available free of charge to be modified by users, with minimal restrictions.  Linux, an operating system related to Unix, is one of the most well-known opensource software, and is the world's fastest growing client and server operating system, along with related Linux applications.  Java, an operating system-independent, object-oriented programming language, has become the leading programming environment for the Web, and its use has migrated into cellular phones, cars, music players, and more.  Software for enterprise integration is one of the most urgent software priorities today for U.S. firms who need to integrate existing legacy software with newer technology. Replacing isolated systems that cannot communicate with enterprise software is one solution; however, many companies cannot simply jettison essential legacy mainframe applications.
  • 18.  (a) uses special middleware that creates a common platform with which all applications can freely communicate with each other.  EAI requires much less programming than traditional point-to-point integration (b).
  • 19.  Web services, loosely coupled software components that use Web communication standards, can exchange information between different systems regardless of operating system of programming language.  Web services technology is founded on Extensible Markup Language (XML). XML was developed as a more powerful markup language than Hypertext Markup Language (HTML), a page description language specifying how content appears on Web pages.  Web services communicate through XML messages over standard Web protocols, such as: 1. SOAP (Simple Object Access Protocol) is a set of rules for structuring messages that enables applications to pass data and instructions to one another. 2. WSDL (Web Services Description Language) is a common framework for describing the tasks performed by a Web service and the commands and data it will accept so that it can be used by other applications. 3. UDDI (Universal Description, Discovery, and Integration) enables a Web service to be listed in a directory of Web services so that it can be easily located.
  • 20.  Dollar Rent A Car uses Web services to provide a standard intermediate layer of software to “talk” to other companies’ information systems. Dollar Rent A Car can use this set of Web services to link to other companies’ information systems without having to build a separate link to each firm’s systems.
  • 21.  Ajax (Asynchronous JavaScript and XML): Ajax, and a related set of techniques called RIA ("rich Internet applications") use JavaScript or Macromedia Flash programs downloaded to your client to maintain a near continuous conversation with the server you are using.  Web-based applications: Software firms are delivering software services over the Web to client computers and their customer's sites. Google's Google Apps for Your Domain is a Web-based suite of productivity tools, including online spreadsheet, word processing, and calendars, aimed at small businesses.  Mashups: Part of a movement called Web 2.0, and in the spirit of musical mashups, Web mashups combine the capabilities of two or more online applications to create a kind of hybrid that provides more customer value than the original sources alone.  Web 2.0 refers to "the new Web applications" like those above and is also the name of an annual conference. Web 2.0 can be described also as an expression of all the changes above, plus changes in the way people and business use the Web and think about human interaction on the Web.
  • 22.  U.S. firms will spend nearly $340 billion on software in 2006. Over 30 percent of that software will come from outsourcing its development and operation to outside firms, and another 15 percent will come from purchasing the service from application service providers either on the Web or through traditional channels.
  • 23.  A commercial software package is a prewritten set of software programs for certain functions, eliminating the need for a firm to write its own software program. Enterprise systems are so complex that few corporations have the expertise to develop these in house and instead rely on enterprise software packages from vendors such as SAP and PeopleSoft.
  • 24.  An application service provider (ASP) is a business that delivers and manages applications and computer services from remote computer centers to multiple users using the Internet or a private network. The software is paid for typically on a per-user, subscription, or per-transaction basis. Renting enterprise software avoids the expense and difficulty of installing, operating, and maintaining the hardware and software needed for complex systems.
  • 25.  Large and medium-sized businesses are using ASPs for enterprise systems, sales force automation, or financial management, and small businesses are using them for functions such as invoicing, tax calculations, electronic calendars, and accounting. Application service providers also enable small and medium-sized companies to use applications that they otherwise could not afford.
  • 26.  What is Mobile Application? A mobile application, most commonly referred to as an app, is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. Apps are generally small, individual software units with limited function. This use of app software was originally popularized by Apple Inc. and its App Store, which offers thousands of applications for the iPhone, iPad and iPod Touch.
  • 27. 1. Activities An activity is the entry point for interacting with the user. It represents a single screen with a user interface. 2. Services A service is a general-purpose entry point for keeping an app running in the background for all kinds of reasons. It is a component that runs in the background to perform long-running operations or to perform work for remote processes. A service does not provide a user interface. 3. Broadcast receivers A broadcast receiver is a component that enables the system to deliver events to the app outside of a regular user flow, allowing the app to respond to system-wide broadcast announcements. 4. Content providers A content provider manages a shared set of app data that you can store in the file system, in a SQLite database, on the web, or on any other persistent storage location that your app can access. T
  • 28.  Application architecture is a set of technologies and models for the development of fully-structured mobile programs based on industry and vendor-specific standards. As you develop the architecture of your app, you also consider programs that work on wireless devices such as smartphones and tablets.
  • 29.  Presentation Layer - contains UI components as well as the components processing them.  Business Layer - composed of workflows, business entities and components.  Data layer - comprises data utilities, data access components and service agents.
  • 30. 1. Native Mobile Apps Native apps 2. Hybrid Mobile Apps 3. Web-Based Apps
  • 31.  Native apps are developed for a certain mobile device operating system like Windows Phone or Android. Therefore, they are native for a certain device or platform. Apps built for Android, Windows Phone, Blackberry, Symbian cannot be used on any other platform expect on their own. Therefore, a mobile app designed for Android can only be used on an Android device.  Advantages: - good user experience - high performance - puts no limits on app usage - accessible form app stores  Disadvantage: - higher costs in comparison to other types of mobile apps
  • 32.  Hybrid mobile apps are specifically built using different multi-platform web technologies like JavaScript and HTML5. Hybrid apps are website applications created in a native wrapper that means they use elements of both native and web- based apps.  Advantage: - easy to develop since code base ensures low-cost maintenance  Disadvantages: - lack in speed, performance and overall optimization - inability to look in the same way on different platforms
  • 33.  Web-based applications behave in very similar fashion to those native mobile apps. Web apps use a certain browser in order to run and they are commonly written in CSS, JavaScript or HTML5. Web apps redirect users to URL and further offer install options by creating a bookmark on their browser  Advantage: - requires a minimum of device memory - Users can access web apps from any device that is connected to the Internet.  Disadvantages: - The use of web applications with poor internet connection commonly results in very bad user experience. • access to not so many APIs, with exception of geolocation and several others. - A performance of web-based apps is inextricably linked to network connection and browser work.
  • 34. 1. Social Media Sites 2. Ordering Food Online 3. Taxi Services 4. Booking Tickets 5. Entertainment