You are on page 1of 36

Homework Title / No. : TERM PAPER Course Code:GEN 702 Course Instructor: Dr.

Babli Dhiman Course Tutor (if applicable) : ____________ Date of Allotment: 16/09/10 Date of submission: 26/11/10 Student’s Roll No.RQ 1001A14. Section No. : Q1001 Declaration: I declare that this assignment is my individual work. I have not copied from any other student’s work or from any other source except where due acknowledgment is made explicitly in the text, nor has any part been written for me by another person. Student’s Signature: Irina Rana Evaluator’s comments: _____________________________________________________________________ Marks obtained : ___________ out of ______________________

Awareness of technology in IT students of LPU Abstract
The study is conducted on B.tech students of ECE and CSE stream. The objective of study was to investigate that to study the awareness of technology among IT students,to study what influence a student to learn new technologies other than its curriculum. The sample size was 50; stratified sampling technique was used in order to check the student’s awareness regarding the technology. The result showed that the most of the students are not aware of the latest updated technology, which they should be aware of, they were aware of only that part which was the basics , which even a NON –IT will also be awared.

Key words: technology, students, IT students

Introduction
Information technology (IT) is increasingly becoming an invaluable and powerful tool driving development, supporting growth, promoting innovation, and enhancing competitiveness. Emerging information technology offers opportunities for developing nations to leapfrog earlier stages of development. It is also important to note that with an increasingly global environment less limited by time or distance, nations around the world need to get connected and join the global networked community. Otherwise, they may fall further behind and the gap they have with the developed world could get wider. Additionally, there is growing evidence that information technology is becoming an increasingly powerful tool when used as part of an overall development strategy coupled with partnerships between governments, business, and civil society (World Bank, 2003). Information and communication technology coupled with knowledge management hold much potential for propelling the development process (Okpaku, 2003). The vital role information and communication technology is playing is felt across many industries and sectors, affecting both economic development and growth at large in many societies. The resulting implications have had a major role in transforming such sectors and have affected the economic-development process in developing nations. The banking sector is an example in which information-technology infrastructures have had implications on the economic

development of many nations in the developing world. IT plays an important role in today’s scenario, one has to be updated timely in order to compete in technological environment.

Review of literature
Asan(2002) conducted study on “Pre-service Teachers’ Use of Technology to Create Instructional Materials”. The field experience component has always been a vital part of teacher education programs (Paese, 1989). The article describes collaborative work designed to give an opportunity to pre-service teachers to mesh theory with practice in an instructional material preparation course. Pre-service teachers were assigned to complete a computer project, which was used to support classroom lessons. The projects were supervised by the classroom teachers at the basic education schools and the supervising professor at the College of Education. As a result of that collaborative work, pre-service teachers and classroom teachers practiced developing instructional materials and integrating technology in subject content areas, became more comfortable with the technology and developed greater proficiency in their computer use. Asan(2003) conducted study on ,” Computer Technology Awareness by Elementary School Teachers”. In this study, teachers’ perspectives, their awareness level of specific technologies and the roles this technology plays in education are researched. Technical problems that inhibited the use of computers in their schools are also identified. Data was elicited from a sample of 252 teachers who were working in basic education schools in Trabzon, Turkey. The results revealed that many teachers were not computer users. Many teachers lacked a functional computer literacy foundation upon which to build new technology and skills. Analysis of teachers’ knowledge of computer technologies revealed low levels of technical knowledge, as well as some interesting perceptions of the role of some specific computer-related items. For most teachers, the use of computers and related technologies had not been a routine part of their own educational environment. The study showed that gender, years of teaching, and school status have a significant relationship to familiarity with computer technologies in Turkey. Lack of hardware, lack of knowledge and skills about using computers, lack of training or insufficient training opportunities, and crowded classrooms were determined as the most important problems that basic education schools face in Turkey. Data suggest that elementary school teachers in Turkey need to be increasingly encouraged to explore the emerging technologies for teaching.

Cheat (2007) conducted study on “The Impact of Information Technology on Organizations”. but also to lack of cooperation. These imbalances could be broadly attributed to differences in funding. tried to recommend the best course of action when introduced EIS and finally try to sum up the implementation of his technology in an executive summary.” Computer Assisted Education: Pre-service Teachers’ Ideas about Learning and Teaching Physics”. McCabe (2006) of the Center for Academic Integrity (CAI) related that “levels of cheating and Plagiarism remain high. Mccafferty. then assessed the impacts that implementing EIS would had. workers mobility and reduced markets which were common factors in disfavored regions. He firstly introduced EIS and the automotive sector. Madray(2007) conducted study on .“ Developing Students’ Awareness of Plagiarism: Crisis and Opportunities”. The two novels that she wrote for the publisher Little. based on data collected from a survey that involved about 50.” In April of 2006. Meagan F. training.000 undergraduates from more than 60 colleges. Viswanathan’s first published book. Brown and Company contained passages that seemed strikingly similar to the writings of Another author. the imbalances could be broadly attributed to differences factors as industry.Maria et al (2007) conducted study on “The Adoption of Communication and Information Technologies and the Local Development”. a Harvard University Sophomore. Another plagiarism scandal involved Kaavya Viswanathan. dimension. management and technical expertise. Words and plot ideas from mccafferty’s Two books. In sample. Didis et al (2008) conducted study on. The technology which author chose to looked at in his report was Executive Information Systems (EIS) and he focused on its impact upon the automotive industry. In June 2005. Sloppy Firsts and Second Helpings. the Chronicle of Higher Education Reported that 37 graduate students studying mechanical engineering at Ohio University (ranked in the top 50 public national universities in the United States By U. S. According to Author the study examines the imbalances in the availability and usage of communication and information technology infrastructure. Computer usage in educational settings creates . management education. News & World Report) plagiarized their theses and dissertations. appeared in Opal Mehta. and other infrastructures like R&D institutions. exposure and awareness to available technologies.

The report found that during the decade since the last similar survey. science. Data analysis also revealed that e-learning resources helped students to compare rhetorical styles across cultures and that the interactive learning environment was effective in improving overseas students' English academic writing.” Raising Students' Awareness Of Cross-Cultural The study investigated Contrastive Rhetoric In English Writing Via An E-Learning Course”. The study was based on a comparison of Chinese and English rhetoric in academic writing. pre-service physics teachers’ ideas about learning and teaching physics by the assist of computers were examined. Five features of contrastive rhetoric were used as criteria for the comparison. Qualitative data were obtained and analyzed. engineering and technology. reaching a level of performance that equalled that of native English speakers. and participation in activities related to. doing experiments.more attractive and effective learning environments. Engineering and Technology: Report on Findings” . That was a survey of parents. Categories obtained by pre-service teachers’ ideas showed that they had some negative ideas in addition to the positive ideas about computer assisted physics learning and teaching. solving problems etc. and builds on three previous surveys conducted in 1991. community members and secondary school students on their attitudes to. Wang(2008) Conducted Study On . The report was preceded by a Literature Review on Changes in Awareness of SET.” Survey on Changes in Awareness and Understanding of Science. Deewr(2008) conducted study on . It provides opportunity to students practicing. researching.The report details the findings of the 2007 Survey on Changes in Awareness and Understanding of Science. by their selves. 1994 and 1997. the potential impact of e-learning on raising overseas students' cultural awareness and explored the possibility of creating an interactive learning environment for them to improve their English academic writing. In this study. including a comparison of Chinese students' writings in Chinese with native English speakers' writings in English and Chinese students' writings in English with the help of an e-course and Chinese students' writings in English without the help of an e-course. The experimental results show that the group using the e-course was successful in learning about defined aspects of English rhetoric in academic writing. people have generally become more positive . In addition. Engineering and Technology (SET). and they also design effective course materials which motivate students in lessons. teachers could use computers in their lessons for these aims.

The study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. but not so effective in influencing children towards considering a career in SET. The study extended the original TAM model by including an intrinsic motivation component — computer self efficacy. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Masrom et al (2009) conducted study on. such as Science Week and sciencerelated websites. There were minimal differences across gender. The second purpose of the study was to evaluate gender and age invariants of the causal structure of .” Ethical awareness of computer use among undergraduate students”.about the importance of SET and the rewards of a SET career. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. Most SET-related activities studied were highly effective in promoting understanding of an interest in SET. including for women. age. via the perceived usefulness and intention to use the technology voluntarily. However. the study assessed the direct and indirect effects of computer self efficacy on the use of the technology. and duration of computer use. Independent Samples t-tests for differences were performed across four distinct groups: university. computer mediated work setting. It was also found that both remote residence and lower socio-economic status have a significant negative impact on people’s participation in SET-awareness raising activities and the outcomes they get from them. Nordin et al (2010) conducted study on “Faculty’s acceptance of computer based technology: Cross-validation of an extended model”. In so doing. is low. young people are in some ways less positive towards and aware of SET than older people. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. age and duration of computer use. gender. The results were discussed and the implications for studies in an educational context are outlined. The first aim of the present study was to validate an extended technology acceptance model (TAME) on the data derived from the faculty members of a university in an ongoing. That suggests that computer ethics awareness training is needed for university users. and secondary students’ awareness of some science activities.

so the problem which raised due to this is lack of awareness in youth regarding information technology. Although the TAME’s causal structure was applicable to both male and female staff.TAME. and the results obtained revealed that the respondents almost accept M-learning as one method of teaching and learning process and also able to improve the educational efficiency by complementing traditional learning in UTP. Objective of study • • To study the awareness of technology among IT students. The data were collected from a self reported questionnaire administered to 731 faculty members of a public university in Malaysia. and thus the generality of TAME. Problem statement In today’s scenario awareness of technology plays a vital role in order to survive in competitive environment. To study what influence a student to learn new technologies other than its curriculum. Mobile learning (M-learning) is the current technology that is becoming more popular.age group appeared to moderate the structural relationships among the constructs of interest. The acceptance level of the students is high. The objective of the paper was to presents a survey from 90 undergraduate students of Universiti Teknologi PETRONAS (UTP). to identify the students’ perception on Mlearning. The results of structural equation modeling supported the adequacy of TAME. This cross-validation procedure determined whether gender and age group moderated the causal structure of the model.” University Students Awareness on M-Learning”. It uses the current mobile and wireless computing technology to complement the effectiveness of traditional learning process. Now a day’s students are so much busy in their college life that they don’t get time to update themselves with the latest technology. . Haron et al (2010) conducted study on. the students were willing to use M-learning. they only know those concepts which are taught to them in their subjects or which are in curriculum. From the results.

• Sample size: According to the study sample was taken as 50. 25 were from ECE department. .Research methodology • Collected the data from different sources. ECE students in order to take their view point regarding different technologies and its importance in their career. Stratified sampling was done on CSE. both primary and secondary sources. 25 were from CSE department. • Questionnaires method and focus group interviews was used for data collection.

according to the survey conducted in LPU.Analysis and Interpretation 1. . As the question was basic that every IT student should know this answer. Basically IT means exchange of idea using a technology. 52% gave correct response and 48 % gave wrong response. but it was not so. What do you mean by IT? Correct 26 Incorrect 24 Out of 50 students.

2. software. 3. That means it includes all. out of 50 students this answer 64% gave correct answer. and telecom. 36 % gave incorrect. networking. What is the file extension of MS-WORD document . IT includes which technologies? • • • • • Hardware Software Networking Telecom All of the Above Correct 32 Incorrect 18 IT includes hardware.

doc . which certification is required? • CISCO . 4. 88 % of students gave right response and 12 % of students were not aware of the correct answer.dox .dom None of these correct 44 Incorrect 6 Out of 50 students. In order to clear Dot Net exam.• • • • .

CCNA stands for • Computer component network admin . Out of 50 students 60% students were aware of this answer and 40 % marked it wrong. 5.• • • • SUN MICROSOFT REDHAT None of them correct 30 Incorrect 20 In order to clear Dot Net exam. Microsoft certification is required.

as if they were not aware of it. Which of the following is one of the popular applications at Facebook? • Sunnyville .• • • Cisco component network assemble Cisco certified network admin Cisco certified network associate correct 30 Incorrect 20 Out of 50 students 60% gave correct response for the full form of CCNA. 6. I e cisco certified network associate. 40 % student gave wrong response.

so for this reason out of 50 students. Where would you find the letters QWERTY • • Key Board Mouse .• • • Punjabville Farmville Happyville correct 50 Incorrect 0 This was the most easiest question to answer for those who are internet user and social networking lover. all gave right response i. Farmville 7.e.

still the graduate level students gave wrong response. Which of these is inaccessible (not censored) in China? • • Google Baidu .• • Numeric Keypad None of these correct 40 Incorrect 10 Out of 50 students 80 % student gave correct answer and rest were not aware of it. 20 % were not aware of it. as it was basic question. 8.

Which of the following are operating systems • • Win NT Fat32 . and out of that 48 % gave correct response. 9.• • • Twitter Orkut Facebook correct 24 Incorrect 26 Out of 50 students 52 % were not aware of the answer.

68 % were not able to respond. 10. only 32 % were aware of the answer and rest just made a guess and for this reason.• • redHat Enterprise 7 VNWare correct 16 Incorrect 34 Out of 50 students. which of the following are antivirus software? • • • Norton NOD32 Mcafee .

11.• Sophos correct 0 Incorrect 50 Out of 50 students. none of the student was aware of right answer. Intel's popular processor being used in the Netbooks is named: • • • • Intel Core i5 Intel Core i7 Intel Core2Duo Intel Quad Core . so surprisingly no one responded it correctly. although they made guess but it dint work.

Which of the following programs are generally used for malicicious purposes-? • • • • Virus Trojans Rootkit Filemon .• Intel Atom correct 7 Incorrect 43 Out of 50 students. 12. so in this case 86 % gave in correct response. only 14 % were aware of the right answer .

13. which shows that they are only book worms. Which of the following can be used as general purpose database: • • • • Oracle SQL Server DOS Notepad . 96 % were not aware of right answer only 4 % gave correct response.Correct 2 Incorrect 48 Out of 50 students.

correct 0 Incorrect 50 Well the correct answer was notepad . but none of the student was aware of it. So in this case 100 % incorrect response was there. which of the following are internet search engines• • • • Google Cuil Bing Yahoo . 14.

15.correct 0 Incorrect 50 Well the correct answer was cuil . Ownership of Internet Domain Names is governed by : • • • • An international Non Profit Organization Infosys and other MNC’S All national governments together National cyber law departments . So in this case 100 % incorrect response was there. but none of the student was aware of it.

90 % students gave wrong answer and only 10 % were aware of right answer.correct 5 Incorrect 45 Out of 50 students. Which of the following is not a top level domain? • • • • MOBI TV JP CRK correct 2 Incorrect 48 . 16.

96 % were not aware of right answer only 4 % gave correct response. Which of the following is / are hacking techniques: • • • • Phishing Pharming Brute force XSS correct 0 Incorrect 50 . 17.Out of 50 students. which shows that they are only book worms.

In windows how can you prevent a user from changing network setting : • • • • Group policy WinMgmt RegEdit Msconfig correct 4 Incorrect 46 . but none of the student was aware of it.Well the correct answer was pharming. So in this case 100 % incorrect response was there. 18.

which is the best method of fault tolerance • • • • UPS System RAID 0 RAID 5 Tape Backup correct 1 Incorrect 49 . To avoid data loss and reduced downtime. only 8 % of students were aware of it and rest 92 % were not aware of it.The correct answer was group policy but out of 50 students . 19.

I e 98 % gave wrong answer. only one student was aware of right answer. 20.Out of 50 students. 1 Byte is equivalent to _________________ bits correct 38 Incorrect 12 .

As per the findings it has been found that no students were aware of these updated technologies.Out of 50 students 76 % gave correct response and 24 % gave wrong response. . Findings • Out of 20 questions 12 questions were the major questions which could access the actual awareness of students towards the latest updates in technology.

because ultimately their knowledge is going to be helpful for them. . Conclusion The students are not aware of the latest updates which they should be aware of.• It was found that the students were only aware of the basic concepts. 2003 Journal of Information Technology Education http://jite. References Asan Askin(2003). Volume 2. so in order to overcome this problem. They are only aware of the basic concept which a non IT student will be aware of.org/documents/Vol2/v2p153-164-109.” Computer Technology Awareness by Elementary School Teachers: A Case Study from Turkey”. they should work hard in order to update with the latest updates. Ankara: Government of Turkey/IBRD/UNICEF.pdf Basic Education Pilot Project (Rural Component) (1998) Progress Report VI (January-March 1998).

& Cakiroglu. Dasgupta. R..W.html Madray Amrita (2010). Journal of Technology and Teacher Education. N.”User acceptance of e-collaboration technology: An extension of technology acceptance model.Maria Teresa Borges-Tiago(2007).unirioja. J.M. 8. & Warshaw.Cagiltay. 2000. (1994). London: Holt. R. L. Granger. P. J.. Bagozzi.” The adoption of communication and information technologies and the local development in Côa’ Region.. 2. 111121 Dear Sir/Madam. APPENDIX I am student of M.2.” Group Decisions and Negotiations. N. Cakiroglu. Vol. & Crews. M. (2001) Teachers’ Views about Computer Use in Education.” Educational Renewal: better teachers.. P. C. (1989).. M. Davis. San Francisco Jossey-Bass. B.Ascensão Braga.”Principles of Instructional Design”. K. Briggs. pp. W. 21.J.Library Philosophy and Practice. S.I. pp. As a part of my project I am conducting a survey through this questionnaire on students in order to know how much aware they are of technologies which . I'm conducting a study on “Awareness of technology in students”.org/p/wiw/wiwrsa/ersa04p380. E. 11. 87-100. User acceptance of computer technology: A comparison of two theoretical models. Assessing the Technology Training Needs of Elementary School Teachers.” http://ideas. A. (1992) . better schools.” Developing Students' Awareness of Plagiarism: Crisis and Opportunities“. Vol. 9. ISSN 1522-0222. Maria Manuela Santos Natário .es/servlet/articulo?codigo=2322675 McCannon.. Phagwara. Preparing for Computer Assisted Instruction. 1972 Gagné.repec. New Jersey: Educational Technology Publications. T. Nº. Goodlad. Management Science. No. Journal of Education. Cagiltay. & McGarry. 38(8). 982-1003. 19-28. Punjab. (2002). Dyer. & Wager. 2007 http://dialnet.João Couto .Phill Management LPU. Rinehart and Winston. R.

I assure you that information gathered will be for academic purpose only.doc . What do you mean by IT? Area of interest: _________________________ Mobile Number _________________________ Age: _______________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ ___ 2. which certification is required? • • CISCO SUN . Name:________________ Qualification:_________ Stream: ______________ 1.dom None of these 4. In order to clear Dot Net exam. What is the file extension of MS-WORD document • • • • . IT includes which technologies? • • • • • Hardware Software Networking Telecom All of the Above 3.dox .would play a vital role in their career. So I kindly request you to cooperate with me to fill up the questionnaire.

CCNA stands for • • • • Computer component network admin Cisco component network assemble Cisco certified network admin Cisco certified network associate 6.• • • MICROSOFT REDHAT None of them 5. Which of the following is one of the popular applications at Facebook? • • • • Sunnyville Punjabville Farmville Happyville 7. Where would you find the letters QWERTY • • • • Key Board Mouse Numeric Keypad None of these 8. Which of these is inaccessible (not censored) in China? • • • • Google Baidu Twitter Orkut .

Intel's popular processor being used in the Netbooks is named: • • • • • Intel Core i5 Intel Core i7 Intel Core2Duo Intel Quad Core Intel Atom 12. Which of the following programs are generally used for malicicious purposes• • • • Virus Trojans Rootkit Filemon . Which of the following are operating systems • • • • Win NT Fat32 redHat Enterprise 7 VNWare 10. which of the following are antivirus software? • • • • Norton NOD32 Mcafee Sophos 11.• Facebook 9.

which of the following is not a top level domain: • • • • MOBI TV JP CRK . Which of the following can be used as general purpose database: • • • • Oracle SQL Server DOS Notepad 14. owenership of Internet Domain Names is governed by : • • • • An international Non Profit Organization Infosys and other MNC’S All national governments together National cyber law departments 16. which of the following are internet search engines• • • • Google Cuil Bing Yahoo 15.13.

In windows how can you prevent a user from changing network setting : • • • • Group policy WinMgmt RegEdit Msconfig 19. 1 Byte is equivalent to _________________ bits . which is the best method of fault tolerance • • • • UPS System RAID 0 RAID 5 Tape Backup 20. Which of the following is / are hacking techniques : • • • • Phishing Pharming Brute force XSS 18. To avoid data loss and reduced downtime.17.